Fail2ban 0.8.3 (Default branch)


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements Software Releases - RSS News Fail2ban 0.8.3 (Default branch)
# 1  
Old 07-18-2008
Fail2ban 0.8.3 (Default branch)

Fail2ban monitors log files and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. The software allows easy specification of different actions to be taken such as to ban an IP address using iptables or hostsdeny rules, or simply to send a notification email. It supports many services, and configuration can be easily extended for monitoring any other ASCII file. All filters and actions are given in the configuration files, thus fail2ban can be adopted to be used with a variety of files and firewalls. License: GNU General Public License (GPL) Changes:
failtickets are processed as long as failmanager is not empty. The "pam-generic" filter and more configuration fixes were added. The PID file while started in daemon mode was fixed. The "fail2ban-client get jail logpath" was fixed. The gssftpd filter was added. The "Day/Month/Year Hour:Minute:Second" date template was added. ignoreregex processing was fixed in fail2ban-client. The ISO 8601 date/time format was added. Some logging levels and messages were added and changed. Poll is used instead of select in asyncore.loop. This should solve the "Unknown error 514".Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

4 More Discussions You Might Find Interesting

1. Cybersecurity

Fail2ban ERROR Unable to contact server. Is it running?

Hello, my fail2ban service is running (ps aux) When i do: fail2ban-client status it returns: ERROR Unable to contact server. Is it running? same message on fail2ban restart. In /etc/fail2ban/fail2ban.conf i see this line: socket = /var/run/fail2ban/fail2ban.sock but this file does... (1 Reply)
Discussion started by: postcd
1 Replies

2. Shell Programming and Scripting

Read file, grab ip with fail2ban

Solved with iptables. Many thanks... Hello, Objective: What I would like to accomplish is : - To read file1 line by line and search each word in file2. - To grab corresponding ip addresses found in file2 - To send related ip addresses to fail2ban (not iptables) By this way, when I... (5 Replies)
Discussion started by: baris35
5 Replies

3. Shell Programming and Scripting

Script year_month_day_hour_minute with fail2ban

Hello, What I would like to do is a shell script which will read a database file, then it will compare the current date/hour/minute in each line existing in the database file. Today is 20140305 (year_month_day) & assume that the time is 15:11 at the moment. under /var/log/ database.txt ... (5 Replies)
Discussion started by: baris35
5 Replies

4. Windows & DOS: Issues & Discussions

Fail2ban: email notifications and banning ssh IP logins

Hi all. I am using Cygwin in Windows 7 and am trying to setup fail2ban so that I can ban foreign IP addresses under SSH, also getting email notifications. I downloaded fail2ban and installed it. I then created jail.local copy from jail.conf and changed some values in jail.local. Now when I try to... (2 Replies)
Discussion started by: synthesis
2 Replies
Login or Register to Ask a Question
eurephia-variables(7)													     eurephia-variables(7)

NAME
eurephia-variables - eurephia configuration variables DESCRIPTION
Overview over all eurephia configuration variables. These variables are stored in the database and can be modified by the eurephiadm con- fig command. PASSWORD HASH
These variables are related to the password hash configuration. All of them must be set, but they can be changed over time without affect- ing the functionality of the already stored passwords. These parameters are the first to be set when eurephia_init is run. The minimum and maximum hash rounds are bechmarked for you with this tool to find more suitable numbers for the hardware eurephia will be running on. passwordhash_salt_length Sets number of bytes to use for the password hash salt. passwordhash_rounds_min Sets the minimum number of hashing rounds to perform when calculating new password hashes. passwordhash_rounds_max Sets the maximum number of hashing rounds to perform when calculating new password hashes ATTEMPTS SETTINGS
eurephia can blacklist user names, certificates and IP addresses based on number of failed attempts. The following parameters defines the limits of how many attempts you are willing to allow before blacklisting them. allow_cert_attempts Defines the number of attempts of failed login attempts you allow before you will blacklist the OpenVPN clients cerrtificate. This number should normally be higher than allow_username_attempts. Default is 5. allow_username_attempts Defines the number of failed ttempts for a user name can be tried before you will blacklist the user name from further attempts. Default is 3. allow_ipaddr_attempts Defines the number of failed attempts for an IP address to be used before you will blacklist the IP address from further attempts. This one should be the least strictest limit. You also need to consider if your clients will log in via a proxy or NATed network and how many of your clients will do so. If you experience many users failing to log on and more of them are behind the same proxy or NAT gateway, this may blacklist the IP address quicker than intended. But if among many failing attempts a valid authentication happens, the attempts counter will be reset again, so this limit do not need to be too forgiving. Default is 10. FIREWALL INTEGRATION
If you are running the OpenVPN server with eurephia on a Linux server, it is possible to let eurephia interact with the firewall as well. These settings will enable the firewall integration and tell eurephia how to interact with the firewall. These parameters are very ipta- bles oriented. The iptables firewall module must be enabled at compile time and be installed to work. firewall_interface This is the variable which enables firewall integration. This variable must point at the firewall driver, which is a shared object file which eurephia will load dynamically. These drivers are prefixed efw and will be found in the same lib or lib64 directory as the eurephia-auth and edb-sqlite modules. The variable must contain the full path to the driver module. firewall_command This defines the binary the firewall module will execute to help update the firewall. For iptables this defaults to /sbin/iptables. firewall_destination Defines which predefined firewall rule to use when updating the firewall. The default value is vpn_users. firewall_blacklist_destination This activates firewall based IP address blacklisting in addition to the internal blacklist in eurephia. This variable defines which firewall rule to use when wanting to blacklist an IP address. firewall_blacklist_send_to This is an optional parameter. Normally when eurephia blacklists an IP address it will default to drop the network packets from that client. You can use this variable to send it to a different firewall target. This is useful if you to, for example, log the incident to the system log before dropping the packets. EUREPHIA UTILITIES
These settings are used by the eurephia administration utility, eurephiadm. eurephiadmin_autologout This defines how long a eurephia administration utility may have an open session before it is considered inactive. When exceeding this limit, the administrator user will be out automatically. The unit for this setting is minutes and the default value is 10. eurephiadm_xslt_path The eurephiadm utility uses XSLT templates for generating the output to the screen. This variable gives you the possibility to have your own set of templates in a different directory instead of using the system wide XSLT templates installed by default. This vari- able is not set by default. SEE ALSO
eurephiadm-config(7), eurephia_init(7), Administrators Tutorial and Manual AUTHOR
Copyright (C) 2008-2010 David Sommerseth <dazo@users.sourceforge.net> David Sommerseth July 2010 eurephia-variables(7)