Thanks. I will look into picking up this patch into Jessie's version On March 15, 2016 11:30:27 AM EDT, Mike Gabriel <[email protected]> wrote: >Package: fail2ban >Version: 0.8.13-1 >Tags: patch > >Dear Yaroslav / maintainer, > >I just tried out fail2ban on Debian jessie and discovered an issues >with the ssh-ddos filter: > >``` >root@www:~# tail -f /var/log/fail2ban.log >2016-03-15 16:03:04,660 fail2ban.jail [18444]: INFO Creating new >jail 'ssh-ddos' >2016-03-15 16:03:04,660 fail2ban.jail [18444]: INFO Jail >'ssh-ddos' uses pyinotify >2016-03-15 16:03:04,669 fail2ban.jail [18444]: INFO Initiated >'pyinotify' backend >2016-03-15 16:03:04,671 fail2ban.filter [18444]: INFO Added logfile > >= /var/log/auth.log >2016-03-15 16:03:04,672 fail2ban.filter [18444]: INFO Set maxRetry = >6 >2016-03-15 16:03:04,673 fail2ban.filter [18444]: INFO Set findtime = >600 >2016-03-15 16:03:04,673 fail2ban.actions[18444]: INFO Set banTime = >600 >2016-03-15 16:03:04,685 fail2ban.jail [18444]: INFO Jail 'ssh' >started >2016-03-15 16:03:04,691 fail2ban.jail [18444]: INFO Jail >'ssh-ddos' started >2016-03-15 16:05:46,036 fail2ban.filter [18444]: ERROR Error in >FilterPyinotify callback: 'module' object has no attribute >'_strptime_time' >``` > >This issue has been fixed upstream and the patch may be worth pulling >in for the fail2ban version in Debian jessie: > >https://github.com/fail2ban/fail2ban/issues/755 > >After applying that patch ssh-ddos filtering works here. > >light+love >Mike >-- > >DAS-NETZWERKTEAM >mike gabriel, herweg 7, 24357 fleckeby >fon: +49 (1520) 1976 148 > >GnuPG Key ID 0x25771B31 >mail: [email protected], http://das-netzwerkteam.de > >freeBusy: >https://mail.das-netzwerkteam.de/mailxchange/kronolith/fb.php?u=m.gabriel%40das-netzwerkteam.de
-- Sent from a phone which beats iPhone.

