Hi,

I've been using various versions of f2b for a while now and everything's
been working fine. I've recently upgraded to 0.9.4.dev0 from git, and at
the same time swapped from firehol to ufw.

I completely blew my old f2b configuration (which was hacked from a pre-0.9
installation and so was a really mess) and used the default setup that
comes with the install. I added my own filter:

[Definition]
failregex = ^.*IN-internet.*SRC=<HOST>
            ^.*SYN FLOOD.*SRC=<HOST>
            ^.*BLOCK.*IN=eth0.*<HOST>

Checking against fail2ban-regexp shows this hits /var/log/syslog perfectly
well.

I added the following jail:

[portscan]
enabled = true
protocol = any
action  = ufw[name=portscan]
logpath = /var/log/syslog
maxretry = 3

This seems to find infractions, but does nothing about them:

john@gold /etc/fail2ban % sudo fail2ban-client status portscan
Status for the jail: portscan
|- Filter
|  |- Currently failed: 2
|  |- Total failed:     2
|  `- File list:        /var/log/syslog
`- Actions
   |- Currently banned: 0
   |- Total banned:     0
   `- Banned IP list:

I've swapped out the action for:

action   = iptables-allports

That seems to make no difference. This configuration worked fine in 0.9.3.

So, am I misunderstanding something fundamental about how f2b (should) work
here, or is something not working right?

Thanks in advance,
Me...
------------------------------------------------------------------------------
What NetFlow Analyzer can do for you? Monitors network bandwidth and traffic
patterns at an interface-level. Reveals which users, apps, and protocols are 
consuming the most bandwidth. Provides multi-vendor support for NetFlow, 
J-Flow, sFlow and other flows. Make informed decisions using capacity 
planning reports. https://ad.doubleclick.net/ddm/clk/305295220;132659582;e
_______________________________________________
Fail2ban-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/fail2ban-users

Reply via email to