Thanks. I will look into picking up this patch into Jessie's version

On March 15, 2016 11:30:27 AM EDT, Mike Gabriel 
<[email protected]> wrote:
>Package: fail2ban
>Version: 0.8.13-1
>Tags: patch
>
>Dear Yaroslav / maintainer,
>
>I just tried out fail2ban on Debian jessie and discovered an issues  
>with the ssh-ddos filter:
>
>```
>root@www:~# tail -f /var/log/fail2ban.log
>2016-03-15 16:03:04,660 fail2ban.jail   [18444]: INFO    Creating new  
>jail 'ssh-ddos'
>2016-03-15 16:03:04,660 fail2ban.jail   [18444]: INFO    Jail  
>'ssh-ddos' uses pyinotify
>2016-03-15 16:03:04,669 fail2ban.jail   [18444]: INFO    Initiated  
>'pyinotify' backend
>2016-03-15 16:03:04,671 fail2ban.filter [18444]: INFO    Added logfile 
>
>= /var/log/auth.log
>2016-03-15 16:03:04,672 fail2ban.filter [18444]: INFO    Set maxRetry =
>6
>2016-03-15 16:03:04,673 fail2ban.filter [18444]: INFO    Set findtime =
>600
>2016-03-15 16:03:04,673 fail2ban.actions[18444]: INFO    Set banTime =
>600
>2016-03-15 16:03:04,685 fail2ban.jail   [18444]: INFO    Jail 'ssh'
>started
>2016-03-15 16:03:04,691 fail2ban.jail   [18444]: INFO    Jail  
>'ssh-ddos' started
>2016-03-15 16:05:46,036 fail2ban.filter [18444]: ERROR   Error in  
>FilterPyinotify callback: 'module' object has no attribute  
>'_strptime_time'
>```
>
>This issue has been fixed upstream and the patch may be worth pulling  
>in for the fail2ban version in Debian jessie:
>
>https://github.com/fail2ban/fail2ban/issues/755
>
>After applying that patch ssh-ddos filtering works here.
>
>light+love
>Mike
>-- 
>
>DAS-NETZWERKTEAM
>mike gabriel, herweg 7, 24357 fleckeby
>fon: +49 (1520) 1976 148
>
>GnuPG Key ID 0x25771B31
>mail: [email protected], http://das-netzwerkteam.de
>
>freeBusy:
>https://mail.das-netzwerkteam.de/mailxchange/kronolith/fb.php?u=m.gabriel%40das-netzwerkteam.de

-- 
Sent from a phone which beats iPhone.

Reply via email to