I'm running iptables-1.4.7-16.el6.x86_64 but I don't know what default
action is. I dug a little deeper and discovered others hare having
similar problems with the [pbx-gui] jail in fail2ban so it may be a
problem with the freepbx build itself. In the meantime I've gone back
up to fail2ban-0.9 like you said and I've locked the pbx gui logon
down to just one ip address in iptables.This will keep me safe until I
can sort this thing out. Thanks, Tony

On Thu, Oct 20, 2016 at 11:47 AM, Nick Howitt <n...@howitts.co.uk> wrote:
> Please make sure you do a reply-to-all or a reply-to-list as all your
> replies are bypassing the mailing lists and coming straight to me.
>
> Which firewall are you running and what is your default action?
>
> Try increasing your loglevel to get more information. You say your
> fail2ban log looks perfect. What are you seeing in it when you make a
> few failed attempts? Can you post a snippet?
>
> I'd also stick with 0.9.x as its set up is slightly different from 0.8.x
> (lots more defaulting).
>
> On 20/10/2016 09:13, Anthony Griffiths wrote:
>> something is really wrong here. I uninstalled fail2ban 0.9 and
>> completely deleted all remaining traces. Then I downloaded and
>> installed this:
>> http://yum.schmoozecom.net/schmooze-commercial/6/x86_64/RPMS/fail2ban/fail2ban-0.8.14-1.shmz65.1.129.noarch.rpm
>> this is fail2ban specifically designed around freepbx. But it still
>> doesn't work.
>> The new fail2ban-0.8 starts fine, the fail2ban.log looks perfect, I do
>> some deliberate failed logins to the freepbx-gui and nothing happens.
>> I'm watching the log while doing the failed logins and it just sits
>> there doing nothing.
>> If I run:
>> fail2ban-regex /var/log/asterisk/freepbx_security.log
>> /etc/fail2ban/filter.d/freepbx.conf
>> I get:
>> ----------------------------------------------------------
>> Running tests
>> =============
>>
>> Use   failregex file : /etc/fail2ban/filter.d/freepbx.conf
>> Use         log file : /var/log/asterisk/freepbx_security.log
>>
>>
>> Results
>> =======
>>
>> Failregex: 87 total
>> |-  #) [# of hits] regular expression
>> |   1) [87] Authentication failure for .* from <HOST>
>> `-
>>
>> Ignoreregex: 0 total
>>
>> Date template hits:
>> |- [# of hits] date format
>> |  [262] Year-Month-Day Hour:Minute:Second
>> `-
>>
>> Lines: 262 lines, 0 ignored, 87 matched, 175 missed
>> Missed line(s): too many to print.  Use --print-all-missed to print
>> all 175 lines
>> --------------------------------------------------------
>>
>> In jail.local I have 'ignoreip = 127.0.0.1' and that's all.
>>
>> this to me looks correct. If you can shed any light on this I'd be
>> really grateful. Fail2ban-regex is the only troubleshooting command i
>> know. Are there any others I could use?
>>
>> ps: and to make matters worse the sshd jail doesn't work either.
>> Thanks for any further thoughts.
>>
>> On Wed, Oct 19, 2016 at 10:19 PM, Nick Howitt <n...@howitts.co.uk> wrote:
>>> On 19/10/2016 22:08, Anthony Griffiths wrote:
>>>>>    From the changelog, 0.9.4 is not much different from 0.9.3 syntax-wise
>>>>> so my jail and filter should be OK.
>>>>>
>>>>> When doing your failed logins, are they from any IP covered by the
>>>>> ignoreip parameter in jail.conf or jail.local? If loglevel is set to
>>>>> INFO you should get an f2b message every time you get a filter hit, but
>>>>> I'm not sure if it is covered by your ignoreip.
>>>> I've double check jail.local and all I have is: ignoreip = 127.0.0.1/8
>>>> There is one thing at the back of my mind though, I assumed the failed
>>>> login was on port 80 however this could be wrong. I've asked on the
>>>> freepbx forum but no response yet.
>>> Even then you should still be able to see the banning in the logs. Also,
>>> if you're using iptables you can do an "iptables -nvL" and see if your
>>> f2b-pbx-gui lists your IP. It won't be effective if it is blocking the
>>> wrong ports but it will be there.
>>>
>>> ------------------------------------------------------------------------------
>>> Check out the vibrant tech community on one of the world's most
>>> engaging tech sites, SlashDot.org! http://sdm.link/slashdot
>>> _______________________________________________
>>> Fail2ban-users mailing list
>>> Fail2ban-users@lists.sourceforge.net
>>> https://lists.sourceforge.net/lists/listinfo/fail2ban-users
>
>
> ------------------------------------------------------------------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, SlashDot.org! http://sdm.link/slashdot
> _______________________________________________
> Fail2ban-users mailing list
> Fail2ban-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/fail2ban-users

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most 
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Fail2ban-users mailing list
Fail2ban-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/fail2ban-users

Reply via email to