CentOS 6.9 (Final), fully patched, fail2ban-0.9.6-1.el6 from EPEL, iptables-1.4.7-16.el6
Jul 16 20:21:49 lake fail2ban.filter[2785]: INFO [ssh-iptables] Found 123.183.209.136 Jul 16 20:21:50 lake fail2ban.actions[2785]: NOTICE [ssh-iptables] Ban 123.183.209.136 Jul 16 20:21:50 lake fail2ban.CommandAction[2785]: ERROR Invariant check failed. Trying to restore a sane environment Jul 16 20:21:50 lake fail2ban.actions[2785]: ERROR Failed to execute ban jail 'ssh-iptables' action 'iptables' info 'CallingMap({'ipjailmatches': <function <lambda> at 0x7fccd19edcf8>, 'matches': u'Jul 16 20:20:08 lake sshd[30231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.183.209.136 user=root\nJul 16 20:20:10 lake sshd[30231]: Failed password for root from 123.183.209.136 port 30358 ssh2\nJul 16 20:20:12 lake sshd[30231]: Failed password for root from 123.183.209.136 port 30358 ssh2\nJul 16 20:20:16 lake sshd[30231]: Failed password for root from 123.183.209.136 port 30358 ssh2\nJul 16 20:21:49 lake sshd[30252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.183.209.136 user=root', 'ip': '123.183.209.136', 'ipmatches': <function <lambda> at 0x7fccd19edd70>, 'ipfailures': <function <lambda> at 0x7fccd19edf50>, 'time': 1500236510.687964, 'failures': 5, 'ipjailfailures': <function <lambda> at 0x7fccd19eded8>})': Error stopping action Jul 16 20:21:51 lake fail2ban.filter[2785]: INFO [ssh-iptables] Found 123.183.209.136 Jul 16 20:21:54 lake fail2ban.filter[2785]: INFO [ssh-iptables] Found 123.183.209.136 Jul 16 20:21:55 lake fail2ban.filter[2785]: INFO [ssh-iptables] Found 123.183.209.136 [joliver@lake ~]$ sudo iptables -L Chain INPUT (policy DROP) target prot opt source destination ACCEPT all -- anywhere anywhere ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED ACCEPT tcp -- anywhere anywhere tcp dpt:ftp ACCEPT tcp -- anywhere anywhere tcp dpt:ssh ACCEPT tcp -- anywhere anywhere tcp dpt:smtp ACCEPT udp -- anywhere anywhere udp dpt:domain ACCEPT tcp -- anywhere anywhere tcp dpt:domain ACCEPT tcp -- anywhere anywhere tcp dpt:http ACCEPT tcp -- anywhere anywhere tcp dpt:https LOGGING all -- anywhere anywhere Chain FORWARD (policy DROP) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain LOGGING (1 references) target prot opt source destination LOG all -- anywhere anywhere LOG level warning prefix `iptables ' DROP all -- anywhere anywhere Clearly, something isn't right. Googling leads to a bunch of different explanations. As I recall, all I did after installing was copy jail.conf to jail.local and enabled ssh-iptables What am I missing? -- *********************************************************************** * John Oliver, RHCE, LFCS http://www.john-oliver.net/ * * * *********************************************************************** ------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot _______________________________________________ Fail2ban-users mailing list Fail2ban-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/fail2ban-users