Am 29.04.15 um 15:04 schrieb Yaroslav Halchenko: > Dear All, > > On behalf of everyone who contributed (and there were 17 people) to the > development of Fail2Ban since 0.9.1, I am proud to announce that > > 0.9.2 was tagged on GitHub, and uploaded to Debian sid. master branch is > ready to accept new PRs but you might need to re-merge master into it or > rebase > on top of it. > > I have also uploaded backport builds of Debian package to -devel > repository of the NeuroDebian happen you would like to try your luck using > Fail2Ban on previous releases of Debian or Ubuntu. Those builds (for older > than jessie/Ubuntu 14.10) differ from stock Debian sid build that they still > use Python 2 while upload to sid uses Python 3 since there is only > python3-systemd package now. > > Thanks once again to everyone who contributed by commits/pull-requests > and/or helping out on the issue tracker and mailing list! Even though we > have planned few more things to be done for this release, imho it is better to > release now (already behind any non-schedule) than drag it even longer. > > Changelog for this release is quite respectful anyways in terms of new > features > and fixes -- so I once again applaud to everyone who was involved: keep up the > great work! > > > ver. 0.9.2 (2015/04/29) - better-quick-now-than-later > ---------- > > - Fixes: > * Fix ufw action commands > * infinite busy loop on _escapedTags match in substituteRecursiveTags > gh-907. > Thanks TonyThompson > * port[s] typo in jail.conf/nginx-http-auth gh-913. Thanks Frederik Wagner > (fnerdwq) > * $ typo in jail.conf. Thanks Skibbi. Debian bug #767255 > * grep'ing for IP in *mail-whois-lines.conf should now match also > at the beginning and EOL. Thanks Dean Lee > * jail.conf > - php-url-fopen: separate logpath entries by newline > * failregex declared direct in jail was joined to single line (specifying > of > multiple expressions was not possible). > * filters.d/exim.conf - cover different settings of exim logs > details. Thanks bes.internal > * filter.d/postfix-sasl.conf - failregex is now case insensitive > * filters.d/postfix.conf - add 'Client host rejected error message' > failregex > * fail2ban/__init__.py - add strptime thread safety hack-around > * recidive uses iptables-allports banaction by default now. > Avoids problems with iptables versions not understanding 'all' for > protocols and ports > * filter.d/dovecot.conf > - match pam_authenticate line from EL7 > - match unknown user line from EL7 > * Use use_poll=True for Python 2.7 and >=3.4 to overcome "Bad file > descriptor" msgs issue (gh-161) > * filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to > ignore > system authentication issues > * fail2ban-regex reads filter file(s) completely, incl. '.local' file etc. > (gh-954) > * firewallcmd-* actions: split output into separate lines for grepping > (gh-908) > * Guard unicode encode/decode issues while storing records in the > database. > Fixes "binding parameter error (unsupported type)" (gh-973), thanks to > kot > for reporting > * filter.d/sshd added regex for matching openSUSE ssh authentication > failure > * filter.d/asterisk.conf: > - Dropped "Sending fake auth rejection" failregex since it incorrectly > targets the asterisk server itself > - match "hacking attempt detected" logs > > - New Features: > - New filters: > - postfix-rbl Thanks Lee Clemens > - apache-fakegooglebot.conf Thanks Lee Clemens > - nginx-botsearch Thanks Frantisek Sumsal > - drupal-auth Thanks Lee Clemens > - New recursive embedded substitution feature added: > - `<<PREF>HOST>` becomes `<IPV4HOST>` for PREF=`IPV4`; > - `<<PREF>HOST>` becomes `1.2.3.4` for PREF=`IPV4` and > IPV4HOST=`1.2.3.4`; > - New interpolation feature for config readers - `%(known/parameter)s`. > (means last known option with name `parameter`). This interpolation > makes > possible to extend a stock filter or jail regexp in .local file > (opposite to simply set failregex/ignoreregex that overwrites it), > see gh-867. > - Monit config for fail2ban in files/monit/ > - New actions: > - action.d/firewallcmd-multiport and action.d/firewallcmd-allports > Thanks Donald Yandt > - action.d/sendmail-geoip-lines.conf > - action.d/nsupdate to update DNSBL. Thanks Andrew St. Jean > - New status argument for fail2ban-client -- flavor: > fail2ban-client status <jail> [flavor] > - empty or "basic" works as-is > - "cymru" additionally prints (ASN, Country RIR) per banned IP > (requires dnspython or dnspython3) > - Flush log at USR1 signal > > - Enhancements: > * Enable multiport for firewallcmd-new action. Closes gh-834 > * files/debian-initd migrated from the debian branch and should be > suitable for manual installations now (thanks Juan Karlo de Guzman) > * Define empty ignoreregex in filters which didn't have it to avoid > warnings (gh-934) > * action.d/{sendmail-*,xarf-login-attack}.conf - report local > timezone not UTC time/zone. Closes gh-911 > * Conditionally log Ignore IP with reason (dns, ip, command). Closes > gh-916 > * Absorbed DNSUtils.cidr into addr2bin in filter.py, added unittests > * Added syslogsocket configuration to fail2ban.conf > * Note in the jail.conf for the recidive jail to increase dbpurgeage > (gh-964) > > >
Dear Yaroslav! Thank you for tagging the release. It would be great if you could mark the tag as Release in Github and add your changelogs! Best regards, Johannes -- Johannes Weberhofer Weberhofer GmbH, Austria, Vienna ------------------------------------------------------------------------------ One dashboard for servers and applications across Physical-Virtual-Cloud Widest out-of-the-box monitoring support with 50+ applications Performance metrics, stats and reports that give you Actionable Insights Deep dive visibility with transaction tracing using APM Insight. http://ad.doubleclick.net/ddm/clk/290420510;117567292;y _______________________________________________ Fail2ban-users mailing list Fail2ban-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/fail2ban-users