and the discussion here:
In brief, there's a bad interaction between gam_server and selinux which is breaking fail2ban. The issue is, if some process starts a gam_server as UID root it will be assigned a SElinux domain according to the process that started gam_server. If another UID root process tries to connect to the socket of that first gam_server, according to the gamin logic it should be allowed, since the UID is correct. However, the second process fails to connect because it has a different SElinux domain. In actual fact, this is showing up a security problem in gam_server, in that when used in this way, different processes can get at information thru' gam_server that they shouldn't necessarily have access too.
The gamin maintainer has explained that this is difficult to fix within the current gamin design. Furthermore, he points out that gamin really is designed for servicing desktop needs, rather than the sort of use that fail2ban is using it for.
I would suggest it's probably adviseable to deprecate gamin use in fail2ban in favour of python-inotify (which seems more actively maintained than pyinotify).
I'd be interested in your thoughts on this.