Am 29.04.15 um 15:04 schrieb Yaroslav Halchenko:
> Dear All,
>
> On behalf of everyone who contributed (and there were 17 people) to the
> development of Fail2Ban since 0.9.1, I am proud to announce that
>
> 0.9.2  was tagged on GitHub, and uploaded to Debian sid.  master branch is
> ready to accept new PRs but you might need to re-merge master into it or 
> rebase
> on top of it.
>
> I have also uploaded backport builds of Debian package to -devel
> repository of the NeuroDebian happen you would like to try your luck using
> Fail2Ban on previous releases of Debian or Ubuntu.  Those builds (for older
> than jessie/Ubuntu 14.10) differ from stock Debian sid build that they still
> use Python 2 while upload to sid uses Python 3 since there is only
> python3-systemd package now.
>
> Thanks once again to everyone who contributed by commits/pull-requests
> and/or helping out on the issue tracker and mailing list!  Even though we
> have planned few more things to be done for this release, imho it is better to
> release now (already behind any non-schedule) than drag it even longer.
>
> Changelog for this release is quite respectful anyways in terms of new 
> features
> and fixes -- so I once again applaud to everyone who was involved: keep up the
> great work!
>
>
> ver. 0.9.2 (2015/04/29) - better-quick-now-than-later
> ----------
>
> - Fixes:
>     * Fix ufw action commands
>     * infinite busy loop on _escapedTags match in substituteRecursiveTags 
> gh-907.
>       Thanks TonyThompson
>     * port[s] typo in jail.conf/nginx-http-auth gh-913. Thanks Frederik Wagner
>       (fnerdwq)
>     * $ typo in jail.conf. Thanks Skibbi. Debian bug #767255
>     * grep'ing for IP in *mail-whois-lines.conf should now match also
>       at the beginning and EOL.  Thanks Dean Lee
>     * jail.conf
>       - php-url-fopen: separate logpath entries by newline
>     * failregex declared direct in jail was joined to single line (specifying 
> of
>       multiple expressions was not possible).
>     * filters.d/exim.conf - cover different settings of exim logs
>       details. Thanks bes.internal
>     * filter.d/postfix-sasl.conf - failregex is now case insensitive
>     * filters.d/postfix.conf - add 'Client host rejected error message' 
> failregex
>     * fail2ban/__init__.py - add strptime thread safety hack-around
>     * recidive uses iptables-allports banaction by default now.
>       Avoids problems with iptables versions not understanding 'all' for
>       protocols and ports
>     * filter.d/dovecot.conf
>       - match pam_authenticate line from EL7
>       - match unknown user line from EL7
>     * Use use_poll=True for Python 2.7 and >=3.4 to overcome "Bad file
>       descriptor" msgs issue (gh-161)
>     * filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to 
> ignore
>       system authentication issues
>     * fail2ban-regex reads filter file(s) completely, incl. '.local' file etc.
>       (gh-954)
>     * firewallcmd-* actions: split output into separate lines for grepping 
> (gh-908)
>     * Guard unicode encode/decode issues while storing records in the 
> database.
>       Fixes "binding parameter error (unsupported type)" (gh-973), thanks to 
> kot
>       for reporting
>     * filter.d/sshd added regex for matching openSUSE ssh authentication 
> failure
>     * filter.d/asterisk.conf:
>       - Dropped "Sending fake auth rejection" failregex since it incorrectly
>         targets the asterisk server itself
>       - match "hacking attempt detected" logs
>
> - New Features:
>     - New filters:
>       - postfix-rbl  Thanks Lee Clemens
>       - apache-fakegooglebot.conf  Thanks Lee Clemens
>       - nginx-botsearch  Thanks Frantisek Sumsal
>       - drupal-auth  Thanks Lee Clemens
>     - New recursive embedded substitution feature added:
>       - `<<PREF>HOST>` becomes `<IPV4HOST>` for PREF=`IPV4`;
>       - `<<PREF>HOST>` becomes `1.2.3.4` for PREF=`IPV4` and 
> IPV4HOST=`1.2.3.4`;
>     - New interpolation feature for config readers - `%(known/parameter)s`.
>       (means last known option with name `parameter`). This interpolation 
> makes
>       possible to extend a stock filter or jail regexp in .local file
>       (opposite to simply set failregex/ignoreregex that overwrites it),
>       see gh-867.
>     - Monit config for fail2ban in files/monit/
>     - New actions:
>       - action.d/firewallcmd-multiport and action.d/firewallcmd-allports 
> Thanks Donald Yandt
>       - action.d/sendmail-geoip-lines.conf
>       - action.d/nsupdate to update DNSBL. Thanks Andrew St. Jean
>     - New status argument for fail2ban-client -- flavor:
>       fail2ban-client status <jail> [flavor]
>       - empty or "basic" works as-is
>       - "cymru" additionally prints (ASN, Country RIR) per banned IP
>         (requires dnspython or dnspython3)
>     - Flush log at USR1 signal
>
> - Enhancements:
>     * Enable multiport for firewallcmd-new action.  Closes gh-834
>     * files/debian-initd migrated from the debian branch and should be
>       suitable for manual installations now (thanks Juan Karlo de Guzman)
>     * Define empty ignoreregex in filters which didn't have it to avoid
>       warnings (gh-934)
>     * action.d/{sendmail-*,xarf-login-attack}.conf - report local
>       timezone not UTC time/zone. Closes gh-911
>     * Conditionally log Ignore IP with reason (dns, ip, command). Closes 
> gh-916
>     * Absorbed DNSUtils.cidr into addr2bin in filter.py, added unittests
>     * Added syslogsocket configuration to fail2ban.conf
>     * Note in the jail.conf for the recidive jail to increase dbpurgeage 
> (gh-964)
>
>
>

Dear Yaroslav!

Thank you for tagging the release. It would be great if you could mark the tag 
as Release in Github and add your changelogs!

Best regards,
Johannes

-- 
Johannes Weberhofer
Weberhofer GmbH, Austria, Vienna

------------------------------------------------------------------------------
One dashboard for servers and applications across Physical-Virtual-Cloud 
Widest out-of-the-box monitoring support with 50+ applications
Performance metrics, stats and reports that give you Actionable Insights
Deep dive visibility with transaction tracing using APM Insight.
http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
_______________________________________________
Fail2ban-users mailing list
Fail2ban-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/fail2ban-users

Reply via email to