Activity for Fail2Ban

  • Serg G. Brester Serg G. Brester modified a comment on ticket #77

    Fewer than that from django (since the host takes place before any foreign input), but yes, it is. Because 301/400/404 could be theoretically everywhere in string (part of URI, agent etc), so a false positive for legitimate requests would be possible. To avoid that it must have no catch-all before response code, for instance like this: failregex = ^<ADDR> \S+ \S+(?: \[\])? "[^"]*" (?:301|40[04])\b And you don't need 3 RE's here (just enclose deviating parts into (?: ... ), separated by |).

  • Serg G. Brester Serg G. Brester modified a comment on ticket #77

    Fewer than that from django (since the host takes place before any foreign input), but yes, it is. Because 301/404/404 could be theoretically everywhere in string (part of URI, agent etc), so a false positive for legitimate requests would be possible. To avoid that it must have no catch-all before response code, for instance like this: failregex = ^<ADDR> \S+ \S+(?: \[\])? "\w+ [^"]*" (?:301|40[04])\b And you don't need 3 RE's here (just enclose deviating parts into (?: ... ), separated by |).

  • selena selena posted a comment on ticket #77

    Thanks so much. I didn't want to study the regex in depth. Good life.

  • Serg G. Brester Serg G. Brester posted a comment on ticket #77

    Fewer than that from django (since the host takes place before any foreign input), but yes, it is. Because 301/404/404 could be theoretically everywhere in string (part of URI, agent etc), so a false positive for legitimate requests would be possible. To avoid that it must have no catch-all before response code, for instance like this: failregex = ^<ADDR> \S+ \S+(?: \[\])? "\w+ [^"]*" (?:301|40[04]) And you don't need 3 RE's here (just enclose deviating parts into (?: ... ), separated by |).

  • selena selena modified a comment on ticket #77

    last help: 89.248.168.108 - - [10/Feb/2021:08:50:21 +0100] "HEAD / HTTP/1.0" 301 0 "-" "-" 177.152.152.37 - - [10/Feb/2021:10:56:58 +0100] "GET / HTTP/1.1" 404 580 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.103 Safari/537.36" 185.239.242.198 - - [10/Feb/2021:11:41:09 +0100] "GET / HTTP/1.0" 404 152 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:76.0) Gecko/20100101 Firefox/76.0" 89.248.168.108 - - [10/Feb/2021:11:41:24 +0100] "" 400 0 "-" "-"...

  • selena selena posted a comment on ticket #77

    last help: 89.248.168.108 - - [10/Feb/2021:08:50:21 +0100] "HEAD / HTTP/1.0" 301 0 "-" "-" 177.152.152.37 - - [10/Feb/2021:10:56:58 +0100] "GET / HTTP/1.1" 404 580 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.103 Safari/537.36" 185.239.242.198 - - [10/Feb/2021:11:41:09 +0100] "GET / HTTP/1.0" 404 152 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:76.0) Gecko/20100101 Firefox/76.0" 89.248.168.108 - - [10/Feb/2021:11:41:24 +0100] "" 400 0 "-" "-"...

  • Serg G. Brester Serg G. Brester posted a comment on ticket #77

    it is OK? No! This regex is vulnerable, since due to 2 catch-all's and unanchored matter can match the IP everywhere (e. g. in foreign input too). So it has several issues starting with performance and ending with certain vector for an injection on forign input. And ^.* is not an anchor at all (it can be removed and would change nothing), because this 2 regex are quasi equivalent: - ^.*something + something

  • selena selena modified a comment on ticket #77

    IT ALSO WORKS: failregex = ^.*login failure.*ip_address: "<HOST>" it is OK? Thanks!

  • selena selena modified a comment on ticket #77

    IT ALSO WORKS: failregex = ^.*login failure.'ip_address: "<HOST>" it is OK? Thanks!

  • selena selena modified a comment on ticket #77

    IT ALSO WORKS: failregex = ^.''login failure.''ip_address: "<host>" it is OK? Thanks!</host>

  • selena selena modified a comment on ticket #77

    IT ALSO WORKS: failregex = ^.login failure.ip_address: "<host>" it is OK? Thanks!</host>

  • selena selena posted a comment on ticket #77

    IT ALSO WORKS: failregex = ^.login failure.ip_address: "<host>" it is OK? Thanks!</host>

  • selena selena posted a comment on ticket #77

    Thanks!

  • Serg G. Brester Serg G. Brester modified ticket #74

    Fail2Ban Config Examples

  • Serg G. Brester Serg G. Brester modified ticket #77

    failregex

  • Serg G. Brester Serg G. Brester posted a comment on ticket #77

    In case the tags in info structure (JSON5?) are always given in this order (and there are no other tags in-between) you can use this one: failregex = ^\s*WARNING AXES: (?:New|Repeated) login failure by \{username: "<F-USER>[^"]+</F-USER>", ip_address: "<ADDR>" Otherwise you could use something like that: failregex = ^\s*WARNING AXES: (?:New|Repeated) login failure by \{(?:(?:username: "<F-USER>[^"]+</F-USER>"|ip_address: "<ADDR>"|\S+: (?:"[^"]*"|[^\s,]+))(?:,\s*|\}))+ If AXES is some dynamic data...

  • selena selena posted a comment on ticket #77

    failregex = ^. login failure . ip_address: "<host>"</host>

  • selena selena created ticket #77

    failregex

  • Jair Jair posted a comment on ticket #2

    Hello Serg, Thanks for the prompt answer, I will keep looking at fail2ban and the IPv6 progress. I appreciate all your team do. Sincerely,

  • Serg G. Brester Serg G. Brester posted a comment on ticket #2

    Due to support of IPv6 and other reasons, in new version banactions will execute actionstart on demand (by first ban of IP for corresponding family). See https://github.com/fail2ban/fail2ban/issues/1755#issuecomment-295286513 for more details.

  • Jair Jair created ticket #2

    iptables -l not showing fail2ban chain

  • Serg G. Brester Serg G. Brester modified ticket #76

    Modify “sendmail-whois-lines.conf” action

  • Serg G. Brester Serg G. Brester posted a comment on ticket #76

    This was reimplemented in 0.10 using tail command (see https://github.com/fail2ban/fail2ban/commit/a2af19c9f0c7ad42e733693f1cbf3d247cded582) so as grep-limit it uses https://github.com/fail2ban/fail2ban/blob/0.10/config/action.d/helpers-common.conf#L15 . But either you have to use logrotate in order to hold your log-files slim as possible, or use another actions which don't need to cumulate failures from the log-file, like "sendmail-whois-matches". Also note that current development as well as issue...

  • J Smith J Smith created ticket #76

    Modify “sendmail-whois-lines.conf” action

  • Frederic Steinfels Frederic Steinfels posted a comment on ticket #81

    Sorry, I made a mistake. It is better to do this: firewall-cmd --direct --add-rule ipv4 filter INPUT 1000 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT iptables -D INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT Reasons: - iptables cant set priorities, only firewall-cmd can - inserting the new rule before deleting the old one will make sure you wont be locked out

  • Frederic Steinfels Frederic Steinfels created ticket #81

    Banning udp (eg asterisk jail) does not work due

  • Serg G. Brester Serg G. Brester posted a comment on ticket #75

    Maybe it is my misconfiguration somewhere. ON action maybe? Perhaps... Dunno. Did you see any error by pf-action in fail2ban.log? Multiport? You set port 80 only (what is with https, which is 443) Some pf/kernel (MacOS?) related issue (e. g. it does not kill current connection for some reasons)

  • Serg G. Brester Serg G. Brester modified a comment on ticket #75

    I do have maxretry =5 [apache-noscript] port = http,https logpath = /var/log/apache2/error_log enabled = true action = pf[name=apache-noscript, port=80, protocol=tcp] abuseipdb[name=apache-noscript, port=80, protocol=tcp] maxretry = 5 bantime = 31536000 filter = apache-noscript It should ban the ip after 5 attemps but it did not! Maybe it is my misconfiguration somewhere. ON action maybe?

  • Eduardo Bonsi Eduardo Bonsi posted a comment on ticket #75

    I do have maxretry =5 [apache-noscript] port = http,https logpath = /var/log/apache2/error_log enabled = true action = pf[name=apache-noscript, port=80, protocol=tcp] abuseipdb[name=apache-noscript, port=80, protocol=tcp] maxretry = 5 bantime = 31536000 filter = apache-noscript It should ban the ip after 5 attemps but it did not! Maybe it is my misconfiguration somewhere. ON action maybe?

  • Serg G. Brester Serg G. Brester modified ticket #75

    What jail configuration will stop this from happen?

  • Serg G. Brester Serg G. Brester posted a comment on ticket #75

    Could someone help me figure out how to configure a jail to stop this from happen? Thanks! further in https://github.com/fail2ban/fail2ban/issues/2468... It is possible to stop the offending ip from running its DDoS attack by the 5th request? use the force of maxretry = 5, Luke :)

  • Eduardo Bonsi Eduardo Bonsi posted a comment on ticket #75

    It is possible to stop the offending ip from running its DDoS attack by the 5th request?

  • Eduardo Bonsi Eduardo Bonsi created ticket #75

    What jail configuration will stop this from happen?

  • Serg G. Brester Serg G. Brester posted a comment on ticket #74

    As already said we're moved to github, so it is now primary target for that. Wiki is for configs, examples etc. For possible discussions or if you want to share your configs, simply open an issueon github (I'll add a label "Dokumentation" or "How-To" for that and close it if we cannot obtain something in our standard installation, but it remains open for further comments).

  • Serg G. Brester Serg G. Brester modified ticket #80

    fail2ban Failed to restart server : ERROR NOK

  • Serg G. Brester Serg G. Brester posted a comment on ticket #80

    No. No idea what webmin is, but I don't think it is an issue of fail2ban as long as start via packet manager succeeds. Perhaps simply missing permissions.

  • Eduardo Bonsi Eduardo Bonsi created ticket #80

    fail2ban Failed to restart server : ERROR NOK

  • Eduardo Bonsi Eduardo Bonsi modified a comment on ticket #74

    Ok, no answer it could be that is difficult to implement as everything here are based on "tickets". However, tickets are more catered to "bugs" and what I am trying to do here is not necessarily a "bug" but sharing information about installations and configurations in your OS system (at least the ones that are already implemented and working). Perhaps, this is a "Label" placement issue. When I was posting this ticket, I did not see a correspondent label to assign to this topic. It could be "Installation...

  • Eduardo Bonsi Eduardo Bonsi modified a comment on ticket #74

    Ok, no answer it could be that is difficult to implement as everything here are based on "tickets". However, tickets are more catered to "bugs" and what I am trying to do here is not necessarily a "bug" but sharing information about installations and configurations in your OS system (at least the ones that are already implemented and working). Perhaps, this is a "Label" placement issue. When I was posting this ticket, I did not see a correspondent label to assign to this topic. It could be "Installation...

  • Eduardo Bonsi Eduardo Bonsi posted a comment on ticket #74

    Ok, no answer it could be that is difficult to implement as everything here are based on "tickets". However, tickets are more catered to "bugs" and what I am trying to do here is not necessarily a "bug" but sharing information about installations and configurations in your OS system. Perhaps this is a "Label" placement. When I was posting this ticket, I did not see a correspondent label to assign to this topic. It could be "Installation Tutorial" or "Configuration" because the information on the...

  • Eduardo Bonsi Eduardo Bonsi created ticket #74

    Fail2Ban Config Examples

  • Eduardo Bonsi Eduardo Bonsi modified a comment on ticket #79

    Serg, I will not fill a bug report on this because it is mostly my misconfiguration issue. What I did was to delete the whole thing and re-install fail2ban with homebrew and things clear up. Now, I am using webmin for the configuration and through their API, I am able to see the configuration much better and take step by step. I am looking ways to stop people that use an (one ip address repeatedly) to DDoS on the server. I have been making a list of their ip addresses and many are from china networks....

  • Eduardo Bonsi Eduardo Bonsi modified a comment on ticket #79

    Serg, I will not fill a bug report on this because it is mostly my misconfiguration issue. What I did was to delete the whole thing and re-install fail2ban with homebrew and things clear up. Now, I am using webmin for the configuration and through their API, I am able to see the configuration much better and take step by step. I am looking ways to stop people that use an ip address to DDoS on the server. I have been making a list of their ip addresses and many are from china networks. Jan-Feb-March...

  • Eduardo Bonsi Eduardo Bonsi modified a comment on ticket #79

    Serg, I will not fill a bug report on this because it is mostly my misconfiguration issue. What I did was to delete the whole thing and re-install fail2ban with homebrew and things clear up. Now, I am using webmin for the configuration and through their API, I am able to see the configuration much better and take step by step. I am looking ways to stop people that use an ip address to DDoS on the server. I have been making a list of their ip addresses and many are from china networks. Jan-Feb-March...

  • Eduardo Bonsi Eduardo Bonsi posted a comment on ticket #79

    Serg, I will not fill a bug report on this because it is mostly my misconfiguration issue. What I did was to delete the whole thing and re-install fail2ban with homebrew and things clear up. Now, I am using webmin for the configuration and through their API, I am able to see the configuration much better and take step by step. I am looking ways to stop people that use an ip address to DDoS on the server. I have been making a list of their ip addresses and many are from china networks. Jan-Feb-March...

  • Eduardo Bonsi Eduardo Bonsi posted a comment on ticket #79

    @sebres Serg, Thanks so much for your answer! I also installed fail2ban in another backup server. It is original installation untouched. I'll check the original configuration there and compare these two.

  • Serg G. Brester Serg G. Brester modified ticket #79

    Fail2Ban Config Mac OS Mojave

  • Serg G. Brester Serg G. Brester posted a comment on ticket #79

    Well, normally the issue tacker is moved to github. So better is to open it there. But it looks, like your config is wrong, at leastsshd_backend seems to be not defined. And backend is per default a substitution of %(sshd_backend)s which is missed. This is basicaly a part of every path-*.conf include (see https://github.com/fail2ban/fail2ban/search?q=sshd_backend&unscoped_q=sshd_backend), which seems to be not provided in your configs. So either try to find somewhere a proper file path-macos.conf...

  • Eduardo Bonsi Eduardo Bonsi posted a comment on ticket #79

    You might ask why I am installing fail2ban! The reason is because some characters keep doing the same insane boot DDoS attack on the server expecting different results. Why they are "insane"? Because many times is the same attack using different ip addresses expecting different results. So, if they never get anywhere, why bother? The issue is that when they run these types of attacks, they consume lots of bandwidth and causes interruptions on videos and sevices. Here is an small example of their...

  • Eduardo Bonsi Eduardo Bonsi created ticket #79

    Fail2Ban Config Mac OS Mojave

  • Ben Rothman Ben Rothman created ticket #78

    fail2ban not really compatible with mac

  • Schmueller Schmueller created ticket #73

    dovecot imap-login: distributed attack single username from different IP's

  • Serg G. Brester Serg G. Brester posted a comment on ticket #72

    Not really (excepting documentation e. g. because here we use python, in python). Let alone this is not so simple to learn (but too simple to make something wrong) and I don't know your skill to recommend you something.

  • ti tho ti tho posted a comment on ticket #72

    Have you a tipp/website where i can learn regex?!

  • Serg G. Brester Serg G. Brester modified a comment on ticket #72

    Well, fail2ban-regex is your friend if you will construct own regex. [jail] filter = failregex = ^\s*(?:\[\])?\s*\[[^\]]+\] HTTP Response 40\d to "<HOST>"

  • Serg G. Brester Serg G. Brester posted a comment on ticket #72

    OK then, if you want to catch 401 (Unauthorized) only, you should change 40\d to 401

  • ti tho ti tho posted a comment on ticket #72

    !!!!Hi very very very special thanks!!!!! i dont understand the regualr expressions Thank YOU!!

  • Serg G. Brester Serg G. Brester posted a comment on ticket #72

    Well, fail2ban-regex is your friend if you will construct own regex. [jail] filter = failregex = ^\s*(?:\[\])?\s*\[[^\]]+\] HTTP Response 40\d+ to "<HOST>"

  • ti tho ti tho created ticket #72

    failregex jellyfin

  • Anthony Anthony posted a comment on ticket #77

    Case closed by some extra findings

  • Anthony Anthony created ticket #77

    curl in blocklist.de action return error 22

  • mildred ratched mildred ratched posted a comment on ticket #76

    Thanks, my mistake. Sorry.

  • Serg G. Brester Serg G. Brester posted a comment on ticket #76

    the development as well as issue tracker are located on github currently, can you re-open it there?

  • mildred ratched mildred ratched posted a comment on ticket #76

    Somehow my formatting was lost - [DEFAULT] [INCLUDES] and the 3 ignoreip lines were indented to whow they belong to each other - my backticks were lost fort the ignoreip = cat commands.

  • mildred ratched mildred ratched created ticket #76

    ignoreip requirements

  • Andrew Andrew created ticket #75

    fail2ban-client help ERROR NOK: ('Invalid command',)

  • jadeddragoon jadeddragoon posted a comment on ticket #71

    I was going to post an example log... but just the errors produced from this in a single day was more than four megabytes so Pastebin refused it. I'll say that agian... four megabytes of raw text... in just (not-really-)errors... from one ignorecommand script. 33,197 lines. What's more absurd than absurd? I don't know. I also have no idea if this log contains any other kinds of errors. Because I'm not going to try to read four megabytes of text and I shouldn't have to rely on grep just to find the...

  • jadeddragoon jadeddragoon created ticket #71

    Change the mechanism for ignorecommand to use STDOUT instead of exit codes.

  • Serg G. Brester Serg G. Brester posted a comment on ticket #70

    The current development (as well as the issue- resp. rfe-tracker) happens on github... Thus please let us do the future comminication there. Regarding this RFE, I've created similar handling for one customer of me, however using nginx and a bit customized fail2ban-version. Additionally you could use nginx as load balancer before your apache. But in your case, if I correct understand, it'll be possibe without fail2ban customization (or will work totally without fail2ban). If interested please contact...

  • Saw Min oo Saw Min oo posted a comment on ticket #24

    Really nice post.

  • raju raju created ticket #70

    How to Block Bad Bots using Fail2Ban

  • Anonymous modified a comment on ticket #20

    patch adding locking to executeCmd1

  • seker seker posted a comment on ticket #1

    Sorry the messages are this: https://sourceforge.net/p/fail2ban/mailman/message/34378999/ Everything online with my name and email jbenjumea@gmail.com should be deleted please. Regars,

  • seker seker created ticket #1

    URGENT - Privacy data remove request

  • Martin Martin created ticket #74

    apache-badbots Filter is broken

  • mildred ratched mildred ratched created ticket #73

    ERROR NOK: ('list index out of range',)

  • AndrzejL AndrzejL created ticket #72

    WARNING Command ['start', 'dovecot'] has failed. Received RuntimeError("can't start new thread",)

  • Ric Anderson Ric Anderson posted a comment on ticket #39

    I really need this feature as well. Almost every ssh and vsftp login produces a failure...

  • Mao Mao created ticket #69

    Read from named pipe for remote syslog

  • Eugen Ostrowski Eugen Ostrowski created ticket #71

    Unnecessary dependance from iptables

  • Michael Heuberger Michael Heuberger created ticket #70

    WARNING 'ignoreregex' not defined

  • Eugene Eugene posted a comment on ticket #69

    Ok, thanks for info.

  • Yaroslav Halchenko Yaroslav Halchenko posted a comment on ticket #69

    It is a known issue and unfortunately I don't know the answer yet :-/ "official"...

  • Eugene Eugene posted a comment on ticket #69

    Here is fail2ban logfile.

  • Eugene Eugene created ticket #69

    segfault at 5c ip 00007fd7c9a6e764 sp 00007fd7c920e7b0 error 4 in libsqlite3.so.0.8.6

  • Cidi Rome Cidi Rome created ticket #68

    Reduce the maxretry if ban volume is high

  • Cidi Rome Cidi Rome posted a comment on ticket #64

    Hi. There is a filter for Asterisk: /etc/fail2ban/filter.d/asterisk.conf [INCLUDES]...

  • Anonymous modified a comment on ticket #52

    did some bug fix an improvement to fix. Here the latest script running on my server...

  • Dave Dave created ticket #68

    Fail2Ban Exim WARNING fail2ban.log (since version 0.9.0)

  • Sunnx Sunnx posted a comment on ticket #67

    Filter has host as well, it is getting auto deleted in your system.

  • Sunnx Sunnx posted a comment on ticket #67

    Correction my Filter has as well failregex = /login.jsp login

  • Sunnx Sunnx created ticket #67

    maxretry not working and alerting me for every match

  • Hank Leininger Hank Leininger posted a comment on ticket #25

    Hang on... I think I misunderstood what --print-all-{missed,ignored} meant. I thought...

  • Hank Leininger Hank Leininger created ticket #25

    fail2ban-regex: fix --print-all-missed and --print-all-ignored

1
MongoDB Logo MongoDB