CentOS 6 with fail2ban-0.9.2-1.el6.noarch, and iptables-1.4.7-16.el6.x86_64

Not sure where my issue lies. It appears that f2b is processing the log
file(s) fine and adding 'iptables' rules, but I still see connection
attempts and authentication errors on the ssh daemon.

Example. From /var/log/messages, it triggered a ban for this IP at 0858hrs

Sep  8 08:58:20 ####### fail2ban.actions[28791]: NOTICE [sshdext] Ban
124.190.106.117

'iptables' shows the IP should be DROPping

# iptables --list
Chain INPUT (policy ACCEPT)
target     prot opt source               destination
f2b-sshdext  tcp  --  anywhere             anywhere            multiport
dports sshdext
f2b-vsftpd  tcp  --  anywhere             anywhere            multiport
dports ftp,ftp-data,ftps,ftps-data

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination

Chain f2b-sshdext (1 references)
target     prot opt source               destination
DROP       all  --  dynamicip-94-180-107-204.pppoe.nsk.ertelecom.ru
 anywhere
DROP       all  --  CPE-124-190-106-117.vic.bigpond.net.au  anywhere
        <<<<<<<<<<<<<<<<
DROP       all  --  clientes.143-137-79-250.dynamic.net4you.psi.br  anywhere
DROP       all  --  59.45.175.98         anywhere
DROP       all  --  59.45.175.97         anywhere
DROP       all  --  13.84.188.226        anywhere
RETURN     all  --  anywhere             anywhere

Chain f2b-vsftpd (1 references)
target     prot opt source               destination
RETURN     all  --  anywhere             anywhere

However, minutes later, the daemon still logging connections and
authentication errors...

Sep  8 09:02:50 ### sshdext[29248]: pam_unix(sshdext:auth): authentication
failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=
cpe-124-190-106-117.vic.bigpond.net.au
Sep  8 09:02:52 ### sshdext[29250]: Connection from 124.190.106.117 port
60685
Sep  8 09:02:54 ### sshdext[29250]: pam_unix(sshdext:auth): authentication
failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=
cpe-124-190-106-117.vic.bigpond.net.au
Sep  8 09:02:58 ### sshdext[29258]: Connection from 124.190.106.117 port
60697
Sep  8 09:03:00 ### sshdext[29258]: pam_unix(sshdext:auth): authentication
failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=
cpe-124-190-106-117.vic.bigpond.net.au
Sep  8 09:03:02 ### sshdext[29260]: Connection from 124.190.106.117 port
60708
Sep  8 09:03:05 ### sshdext[29260]: pam_unix(sshdext:auth): authentication
failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=
cpe-124-190-106-117.vic.bigpond.net.au


The 'sshdext' serivce is just 'sshd' running on an alternate port for
external users - corporate firewall blocks incoming port 22.
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Fail2ban-users mailing list
Fail2ban-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/fail2ban-users

Reply via email to