Hello,

I installed fail2ban-0.10.0 on Scientific Linux 7.3  aka CentOS 7.3 with iptables v1.4.21, Python 2.7.5,
configured with paths-fedora.conf

I'm unable to get actions iptables or iptables-multiport to work.
There is no iptables chain f2b-...
I suspect, that no actionstart commands will be executed.
I added a simple /bin/date >> /tmp/... command to actionstart - with no effect.

See below the debug output  when starting the jail.

Any hints are welcome! (The epel-RPM 0.9.6 is working).

Thanks,
Frank

 +  141 7F29DF244740 fail2ban.jail             INFO  Creating new jail 'horde'
 +  141 7F29DF244740 fail2ban.jail             DEBUG Backend 'pyinotify' failed 
to initialize due to No module named pyinotify
 +  142 7F29DF244740 fail2ban.jail             DEBUG Backend 'gamin' failed to 
initialize due to No module named gamin
 +  142 7F29DF244740 fail2ban.jail             INFO  Jail 'horde' uses poller {}
 +  142 7F29DF244740 fail2ban.filter           DEBUG Setting usedns = warn for 
FilterPoll(Jail('horde'))
 +  142 7F29DF244740 fail2ban.filter           DEBUG Created 
FilterPoll(Jail('horde'))
 +  142 7F29DF244740 fail2ban.filterpoll       DEBUG Created FilterPoll
 +  143 7F29DF244740 fail2ban.jail             INFO  Initiated 'polling' backend
 +  143 7F29DF244740 fail2ban.server           DEBUG   failregex: '^ ERR: HORDE 
\\[horde\\] FAILED LOGIN for \\S+ to horde \\(<HOST>\\)(\\(forwarded for 
\\[\\S+\\]\\))? \\[pid \\d+ on line \\d+ of \\S+\\]$'
 +  145 7F29DF244740 fail2ban.filter           DEBUG Setting usedns = warn for 
FilterPoll(Jail('horde'))
 +  146 7F29DF244740 fail2ban.filter           INFO  Added logfile: 
'/var/log/horde.log' (pos = 0, hash = d41d8cd98f00b204e9800998ecf8427e)
 +  147 7F29DF244740 fail2ban.filter           INFO    maxRetry: 6
 +  147 7F29DF244740 fail2ban.filter           DEBUG   Add 127.0.0.0/8 to 
ignore list ('127.0.0.1/8')
 +  148 7F29DF244740 fail2ban.filter           INFO    encoding: UTF-8
 +  149 7F29DF244740 fail2ban.actions          INFO    banTime: 600
 +  150 7F29DF244740 fail2ban.filter           INFO    findtime: 600
 +  150 7F29DF244740 fail2ban.CommandAction    DEBUG Created <class 
'fail2ban.server.action.CommandAction'>
 +  151 7F29DF244740 fail2ban.CommandAction    DEBUG   Set actionunban = '<iptables> -D 
f2b-HTTP -s <ip> -j <blocktype>'
 +  151 7F29DF244740 fail2ban.CommandAction    DEBUG   Set actionflush = 
'<iptables> -F f2b-HTTP'
 +  152 7F29DF244740 fail2ban.CommandAction    DEBUG   Set actionstop = '<iptables> -D 
INPUT -p tcp --dport https -j f2b-HTTP\n<iptables> -F f2b-HTTP\n<iptables> -X 
f2b-HTTP'
 +  152 7F29DF244740 fail2ban.CommandAction    DEBUG   Set actionstart = '<iptables> -N 
f2b-HTTP\n<iptables> -A f2b-HTTP -j RETURN\n<iptables> -I INPUT -p tcp --dport https 
-j f2b-HTTP'
 +  152 7F29DF244740 fail2ban.CommandAction    DEBUG   Set actionban = '<iptables> -I 
f2b-HTTP 1 -s <ip> -j <blocktype>'
 +  152 7F29DF244740 fail2ban.CommandAction    DEBUG   Set actioncheck = "<iptables> 
-n -L INPUT | grep -q 'f2b-HTTP[ \\t]'"
 +  152 7F29DF244740 fail2ban.CommandAction    DEBUG   Set iptables = 'iptables 
<lockingopt>'
 +  152 7F29DF244740 fail2ban.CommandAction    DEBUG   Set lockingopt = '-w'
 +  152 7F29DF244740 fail2ban.CommandAction    DEBUG   Set known/lockingopt = 
'-w'
 +  152 7F29DF244740 fail2ban.CommandAction    DEBUG   Set 
blocktype?family=inet6 = 'REJECT --reject-with icmp6-port-unreachable'
 +  153 7F29DF244740 fail2ban.CommandAction    DEBUG   Set protocol = 'tcp'
 +  153 7F29DF244740 fail2ban.CommandAction    DEBUG   Set name = 'HTTP'
 +  153 7F29DF244740 fail2ban.CommandAction    DEBUG   Set chain = 'INPUT'
 +  153 7F29DF244740 fail2ban.CommandAction    DEBUG   Set 
known/blocktype?family=inet6 = 'REJECT --reject-with icmp6-port-unreachable'
 +  153 7F29DF244740 fail2ban.CommandAction    DEBUG   Set known/protocol = 
'tcp'
 +  153 7F29DF244740 fail2ban.CommandAction    DEBUG   Set known/port = 'ssh'
 +  153 7F29DF244740 fail2ban.CommandAction    DEBUG   Set known/returntype = 
'RETURN'
 +  153 7F29DF244740 fail2ban.CommandAction    DEBUG   Set known/iptables = 'iptables 
<lockingopt>'
 +  154 7F29DF244740 fail2ban.CommandAction    DEBUG   Set known/chain = 'INPUT'
 +  154 7F29DF244740 fail2ban.CommandAction    DEBUG   Set returntype = 'RETURN'
 +  154 7F29DF244740 fail2ban.CommandAction    DEBUG   Set known/name = 
'default'
 +  154 7F29DF244740 fail2ban.CommandAction    DEBUG   Set known/blocktype = 
'REJECT --reject-with icmp-port-unreachable'
 +  154 7F29DF244740 fail2ban.CommandAction    DEBUG   Set iptables?family=inet6 = 
'ip6tables <lockingopt>'
 +  154 7F29DF244740 fail2ban.CommandAction    DEBUG   Set 
known/iptables?family=inet6 = 'ip6tables <lockingopt>'
 +  154 7F29DF244740 fail2ban.CommandAction    DEBUG   Set blocktype = 'REJECT 
--reject-with icmp-port-unreachable'
 +  154 7F29DF244740 fail2ban.CommandAction    DEBUG   Set actname = 'iptables'
 +  155 7F29DF244740 fail2ban.CommandAction    DEBUG   Set port = 'https'
 +  155 7F29DF244740 fail2ban.CommandAction    DEBUG Created <class 
'fail2ban.server.action.CommandAction'>
 +  156 7F29DF244740 fail2ban.CommandAction    DEBUG   Set actionban = 'printf %b "Subject: [Fail2Ban] HTTP: banned 
<ip> from <fq-hostname>\nDate: `LC_ALL=C date +"%a, %d %h %Y %T %z"`\nFrom: Fail2Ban 
<r...@hrz.tu-chemnitz.de>\nTo: f...@hrz.tu-chemnitz.de\\n\nHi,\\n\nThe IP <ip> has just been banned by Fail2Ban 
after\n<failures> attempts against HTTP.\\n\nRegards,\\n\nFail2Ban" | /usr/sbin/sendmail -f r...@hrz.tu-chemnitz.de 
f...@hrz.tu-chemnitz.de'
 +  156 7F29DF244740 fail2ban.CommandAction    DEBUG   Set actionstop = 'printf %b "Subject: [Fail2Ban] 
HTTP: stopped on <fq-hostname>\nDate: `LC_ALL=C date +"%a, %d %h %Y %T %z"`\nFrom: Fail2Ban 
<r...@hrz.tu-chemnitz.de>\nTo: f...@hrz.tu-chemnitz.de\\n\nHi,\\n\nThe jail HTTP has been 
stopped.\\n\nRegards,\\n\nFail2Ban" | /usr/sbin/sendmail -f r...@hrz.tu-chemnitz.de 
f...@hrz.tu-chemnitz.de'
 +  156 7F29DF244740 fail2ban.CommandAction    DEBUG   Set actioncheck = ''
 +  157 7F29DF244740 fail2ban.CommandAction    DEBUG   Set norestored = True
 +  157 7F29DF244740 fail2ban.CommandAction    DEBUG   Set actionstart = 'printf %b "Subject: [Fail2Ban] 
HTTP: started on <fq-hostname>\nDate: `LC_ALL=C date +"%a, %d %h %Y %T %z"`\nFrom: Fail2Ban 
<r...@hrz.tu-chemnitz.de>\nTo: f...@hrz.tu-chemnitz.de\\n\nHi,\\n\nThe jail HTTP has been started 
successfully.\\n\nRegards,\\n\nFail2Ban" | /usr/sbin/sendmail -f r...@hrz.tu-chemnitz.de 
f...@hrz.tu-chemnitz.de'
 +  157 7F29DF244740 fail2ban.CommandAction    DEBUG   Set actionunban = ''
 +  157 7F29DF244740 fail2ban.CommandAction    DEBUG   Set name = 'HTTP'
 +  157 7F29DF244740 fail2ban.CommandAction    DEBUG   Set known/sender = 
'fail2ban'
 +  157 7F29DF244740 fail2ban.CommandAction    DEBUG   Set dest = 
'f...@hrz.tu-chemnitz.de'
 +  157 7F29DF244740 fail2ban.CommandAction    DEBUG   Set known/dest = 'root'
 +  157 7F29DF244740 fail2ban.CommandAction    DEBUG   Set known/name = 
'default'
 +  158 7F29DF244740 fail2ban.CommandAction    DEBUG   Set known/sendername = 
'Fail2Ban'
 +  158 7F29DF244740 fail2ban.CommandAction    DEBUG   Set actname = 'sendmail'
 +  158 7F29DF244740 fail2ban.CommandAction    DEBUG   Set sendername = 
'Fail2Ban'
 +  158 7F29DF244740 fail2ban.CommandAction    DEBUG   Set sender = 
'r...@hrz.tu-chemnitz.de'
 +  158 7F29DF244740 fail2ban.jail             DEBUG Starting jail 'sshd'
 +  160 7F29DF244740 fail2ban.jail             INFO  Jail 'sshd' started
 +  160 7F29DF244740 fail2ban.jail             DEBUG Starting jail 'horde'
 +  160 7F29CDA16700 fail2ban.filterpoll       DEBUG /var/log/horde.log has 
been modified
 +  161 7F29CDA16700 fail2ban.filter           DEBUG Seek to find time 
1505379085.7 (2017-09-14 10:51:25), file size 0
 +  161 7F29CDA16700 fail2ban.filter           DEBUG Position -1 from 0, found 
time None () within 0 seeks
 +  161 7F29DF244740 fail2ban.jail             INFO  Jail 'horde' started
 +  164 7F29CD215700 fail2ban.action           DEBUG printf %b "Subject: [Fail2Ban] 
HTTP: started on <fq-hostname>
Date: `LC_ALL=C date +"%a, %d %h %Y %T %z"`
From: Fail2Ban <r...@hrz.tu-chemnitz.de>
To: f...@hrz.tu-chemnitz.de\n
Hi,\n
The jail HTTP has been started successfully.\n
Regards,\n
Fail2Ban" | /usr/sbin/sendmail -f r...@hrz.tu-chemnitz.de 
f...@hrz.tu-chemnitz.de
 +  183 7F29CD215700 fail2ban.utils            DEBUG 7f29b8001a40 -- returned 
successfully 0

--
Frank Richter
Computing Services, Chemnitz University of Technology, Germany

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Fail2ban-users mailing list
Fail2ban-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/fail2ban-users

Reply via email to