SHA256
1
0
forked from pool/fail2ban

Accepting request 215524 from security

Security note: The update to version 0.8.11 has fixed two additional security
issues: A remote unauthenticated attacker may cause arbitrary IP addresses to
be blocked by Fail2ban causing legitimate users to be blocked from accessing
services protected by Fail2ban. CVE-2013-7177 (cyrus-imap) and CVE-2013-7176
(postfix) (forwarded request 215523 from weberho)

OBS-URL: https://build.opensuse.org/request/show/215524
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/fail2ban?expand=0&rev=31
This commit is contained in:
Stephan Kulow 2014-01-30 13:54:36 +00:00 committed by Git OBS Bridge
commit b17e75956e
6 changed files with 185 additions and 61 deletions

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:d8fa2bd1b106b65ad2bffd41c191f80a97bc3e9456b192d1714c4ee023af5e32
size 156411

3
fail2ban-0.8.12.tar.bz2 Normal file
View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:2cdd7cbbf8b770715ce0068aec9dd8857388cd4d690fd5211907d7f2f3bdcde4
size 169644

View File

@ -1,3 +1,94 @@
-------------------------------------------------------------------
Wed Jan 29 13:48:38 UTC 2014 - jweberhofer@weberhofer.at
Security note: The update to version 0.8.11 has fixed two additional security
issues: A remote unauthenticated attacker may cause arbitrary IP addresses to
be blocked by Fail2ban causing legitimate users to be blocked from accessing
services protected by Fail2ban. CVE-2013-7177 (cyrus-imap) and CVE-2013-7176
(postfix)
-------------------------------------------------------------------
Thu Jan 23 21:35:27 UTC 2014 - jweberhofer@weberhofer.at
- action firewallcmd-ipset had non-working actioncheck. Removed. rh#1046816
- lsof was required for fail2ban's SysVinit scripts only. Not longer used for
newer versions of openSUSE
-------------------------------------------------------------------
Thu Jan 23 08:40:40 UTC 2014 - jweberhofer@weberhofer.at
- Reviewed and fixed github references in the changelog
-------------------------------------------------------------------
Wed Jan 22 09:27:43 UTC 2014 - jweberhofer@weberhofer.at
- Use new flushlogs syntax after logrotate
-------------------------------------------------------------------
Wed Jan 22 08:50:05 UTC 2014 - jweberhofer@weberhofer.at
- Update to version 0.8.12
* Log rotation can now occur with the command "flushlogs" rather than
reloading fail2ban or keeping the logtarget settings consistent in
jail.conf/local and /etc/logrotate.d/fail2ban. (dep#697333, rh#891798).
* Added ignorecommand option for allowing dynamic determination as to ignore
and IP or not.
* Remove indentation of name and loglevel while logging to SYSLOG to resolve
syslog(-ng) parsing problems. (dep#730202). Log lines now also
report "[PID]" after the name portion too.
* Epoch dates can now be enclosed within []
* New actions: badips, firewallcmd-ipset, ufw, blocklist_de
* New filters: solid-pop3d, nsd, openwebmail, horde, freeswitch, squid,
ejabberd, openwebmail, groupoffice
* Filter improvements:
- apache-noscript now includes php cgi scripts
- exim-spam filter to match spamassassin log entry for option SAdevnull.
- Added to sshd filter expression for
"Received disconnect from : 3: Auth fail"
- Improved ACL-handling for Asterisk
- Added improper command pipelining to postfix filter.
* General fixes:
- Added lots of jail.conf entries for missing filters that creaped in
over the last year.
- synchat changed to use push method which verifies whether all data was
send. This ensures that all data is sent before closing the connection.
- Fixed python 2.4 compatibility (as sub-second in date patterns weren't
2.4 compatible)
- Complain/email actions fixed to only include relevant IPs to reporting
* Filter fixes:
- Added HTTP referrer bit of the apache access log to the apache filters.
- Apache 2.4 perfork regexes fixed
- Kernel syslog expression can have leading spaces
- allow for ",milliseconds" in the custom date format of proftpd.log
- recidive jail to block all protocols
- smtps not a IANA standard so may be missing from /etc/services. Due to
(still) common use 465 has been used as the explicit port number
- Filter dovecot reordered session and TLS items in regex with wider scope
for session characters
* Ugly Fixes (Potentially incompatible changes):
- Unfortunately at the end of last release when the action
firewall-cmd-direct-new was added it was too long and had a broken action
check. The action was renamed to firewallcmd-new to fit within jail name
name length. (gh#fail2ban/fail2ban#395).
- Last release added mysqld-syslog-iptables as a jail configuration. This
jailname was too long and it has been renamed to mysqld-syslog.
- Fixed formating of github references in changelog
- reformatted spec-file
------------------------------------------------------------------- -------------------------------------------------------------------
Thu Nov 14 05:14:35 UTC 2013 - jweberhofer@weberhofer.at Thu Nov 14 05:14:35 UTC 2013 - jweberhofer@weberhofer.at
@ -32,17 +123,19 @@ Thu Jun 13 08:58:53 UTC 2013 - jweberhofer@weberhofer.at
- Fixes - Fixes
* [6ccd5781] filter.d/apache-{auth,nohome,noscript,overflows} - anchor * [6ccd5781] filter.d/apache-{auth,nohome,noscript,overflows} - anchor
failregex at the beginning (and where applicable at the end). failregex at the beginning (and where applicable at the end).
Addresses a possible DoS. Closes gh-248, bnc#824710 Addresses a possible DoS. Closes gh#fail2ban/fail2ban#248, bnc#824710
* action.d/{route,shorewall}.conf - blocktype must be defined * action.d/{route,shorewall}.conf - blocktype must be defined
within [Init]. Closes gh-232 within [Init]. Closes gh#fail2ban/fail2ban#232
- Enhancements - Enhancements
* jail.conf -- assure all jails have actions and remove unused * jail.conf -- assure all jails have actions and remove unused
ports specifications ports specifications
* config/filter.d/roundcube-auth.conf -- support roundcube 0.9+ * config/filter.d/roundcube-auth.conf -- support roundcube 0.9+
* files/suse-initd -- update to the copy from stock SUSE * files/suse-initd -- update to the copy from stock SUSE
* Updates to asterisk filter. Closes gh-227/gh-230. * Updates to asterisk filter. Closes gh#fail2ban/fail2ban#227,
* Updates to asterisk to include AUTH_UNKNOWN_DOMAIN. Closes gh-244. gh#fail2ban/fail2ban#230.
* Updates to asterisk to include AUTH_UNKNOWN_DOMAIN. Closes
gh#fail2ban/fail2ban#244.
------------------------------------------------------------------ ------------------------------------------------------------------
Tue May 28 06:46:54 UTC 2013 - jweberhofer@weberhofer.at Tue May 28 06:46:54 UTC 2013 - jweberhofer@weberhofer.at
@ -60,59 +153,61 @@ Tue May 14 10:06:35 UTC 2013 - jweberhofer@weberhofer.at
- Fixes: Yaroslav Halchenko - Fixes: Yaroslav Halchenko
* [6f4dad46] python-2.4 is the minimal version. * [6f4dad46] python-2.4 is the minimal version.
* [1eb23cf8] do not rely on scripts being under /usr -- might differ e.g. * [1eb23cf8] do not rely on scripts being under /usr -- might differ e.g.
on Fedora. Closes gh-112. Thanks to Camusensei for the bug report. on Fedora. Closes gh#fail2ban/fail2ban#112. Thanks to Camusensei for the
bug report.
* [bf4d4af1] Changes for atomic writes. Thanks to Steven Hiscocks for * [bf4d4af1] Changes for atomic writes. Thanks to Steven Hiscocks for
insight. Closes gh-103. insight. Closes gh#fail2ban/fail2ban#103.
* [ab044b75] delay check for the existence of config directory until read. * [ab044b75] delay check for the existence of config directory until read.
* [3b4084d4] fixing up for handling of TAI64N timestamps. * [3b4084d4] fixing up for handling of TAI64N timestamps.
* [154aa38e] do not shutdown logging until all jails stop. * [154aa38e] do not shutdown logging until all jails stop.
* [f2156604] pyinotify -- monitor IN_MOVED_TO events. Closes gh-184. * [f2156604] pyinotify -- monitor IN_MOVED_TO events. Closes
Thanks to Jon Foster for report and troubleshooting. gh#fail2ban/fail2ban#184. Thanks to Jon Foster for report and
Orion Poplawski troubleshooting. Orion Poplawski
* [e4aedfdc00] pyinotify - use bitwise op on masks and do not try tracking * [e4aedfdc00] pyinotify - use bitwise op on masks and do not try tracking
newly created directories. newly created directories.
Nicolas Collignon Nicolas Collignon
* [39667ff6] Avoid leaking file descriptors. Closes gh-167. * [39667ff6] Avoid leaking file descriptors. Closes gh#fail2ban/fail2ban#167.
Sergey Brester Sergey Brester
* [b6bb2f88 and d17b4153] invalid date recognition, irregular because of * [b6bb2f88 and d17b4153] invalid date recognition, irregular because of
sorting template list. sorting template list.
Steven Hiscocks Steven Hiscocks
* [7a442f07] When changing log target with python2.{4,5} handle KeyError. * [7a442f07] When changing log target with python2.{4,5} handle KeyError.
Closes gh-147, gh-148. Closes gh#fail2ban/fail2ban#147, gh#fail2ban/fail2ban#148.
* [b6a68f51] Fix delaction on server side. Closes gh-124. * [b6a68f51] Fix delaction on server side. Closes gh#fail2ban/fail2ban#124.
Daniel Black Daniel Black
* [f0610c01] Allow more that a one word command when changing and Action via * [f0610c01] Allow more that a one word command when changing and Action via
the fail2ban-client. Closes gh-134. the fail2ban-client. Closes gh#fail2ban/fail2ban#134.
* [945ad3d9] Fix dates on email actions to work in different locals. Closes * [945ad3d9] Fix dates on email actions to work in different locals. Closes
gh-70. Thanks to iGeorgeX for the idea. gh#fail2ban/fail2ban#70. Thanks to iGeorgeX for the idea.
blotus blotus
* [96eb8986] ' and " should also be escaped in action tags Closes gh-109 * [96eb8986] ' and " should also be escaped in action tags Closes
gh#fail2ban/fail2ban#109
Christoph Theis, Nick Hilliard, Daniel Black Christoph Theis, Nick Hilliard, Daniel Black
* [b3bd877d,cde71080] Make syslog -v and syslog -vv formats work on FreeBSD * [b3bd877d,cde71080] Make syslog -v and syslog -vv formats work on FreeBSD
- New features: - New features:
Yaroslav Halchenko Yaroslav Halchenko
* [9ba27353] Add support for jail.d/{confilefile} and fail2ban.d/{configfile} * [9ba27353] Add support for jail.d/{confilefile} and fail2ban.d/{configfile}
to provide additional flexibility to system adminstrators. Thanks to to provide additional flexibility to system adminstrators. Thanks to
beilber for the idea. Closes gh-114. beilber for the idea. Closes gh#fail2ban/fail2ban#114.
* [3ce53e87] Add exim filter. * [3ce53e87] Add exim filter.
Erwan Ben Souiden Erwan Ben Souiden
* [d7d5228] add nagios integration documentation and script to ensure * [d7d5228] add nagios integration documentation and script to ensure
fail2ban is running. Closes gh-166. fail2ban is running. Closes gh#fail2ban/fail2ban#166.
Artur Penttinen Artur Penttinen
* [29d0df5] Add mysqld filter. Closes gh-152. * [29d0df5] Add mysqld filter. Closes gh#fail2ban/fail2ban#152.
ArndRaphael Brandes ArndRaphael Brandes
* [bba3fd8] Add Sogo filter. Closes gh-117. * [bba3fd8] Add Sogo filter. Closes gh#fail2ban/fail2ban#117.
Michael Gebetsriother Michael Gebetsriother
* [f9b78ba] Add action route to block at routing level. * [f9b78ba] Add action route to block at routing level.
Teodor Micu & Yaroslav Halchenko Teodor Micu & Yaroslav Halchenko
* [5f2d383] Add roundcube auth filter. Closes Debian bug #699442. * [5f2d383] Add roundcube auth filter. Closes Debian bug #699442.
Daniel Black Daniel Black
* [be06b1b] Add action for iptables-ipsets. Closes gh-102. * [be06b1b] Add action for iptables-ipsets. Closes gh#fail2ban/fail2ban#102.
Nick Munger, Ken Menzel, Daniel Black, Christoph Theis & Fabian Wenk Nick Munger, Ken Menzel, Daniel Black, Christoph Theis & Fabian Wenk
* [b6d0e8a] Add and enhance the bsd-ipfw action from * [b6d0e8a] Add and enhance the bsd-ipfw action from
FreeBSD ports. FreeBSD ports.
Soulard Morgan Soulard Morgan
* [f336d9f] Add filter for webmin. Closes gh-99. * [f336d9f] Add filter for webmin. Closes gh#fail2ban/fail2ban#99.
Steven Hiscocks Steven Hiscocks
* [..746c7d9] bash interactive shell completions for fail2ban-*'s * [..746c7d9] bash interactive shell completions for fail2ban-*'s
Nick Hilliard Nick Hilliard
@ -122,23 +217,23 @@ Tue May 14 10:06:35 UTC 2013 - jweberhofer@weberhofer.at
* [24a8d07] Added new date format for ASSP SMTP Proxy. * [24a8d07] Added new date format for ASSP SMTP Proxy.
Steven Hiscocks Steven Hiscocks
* [3d6791f] Ensure restart of Actions after a check fails occurs * [3d6791f] Ensure restart of Actions after a check fails occurs
consistently. Closes gh-172. consistently. Closes gh#fail2ban/fail2ban#172.
* [MANY] Improvements to test cases, travis, and code coverage (coveralls). * [MANY] Improvements to test cases, travis, and code coverage (coveralls).
* [b36835f] Add get cinfo to fail2ban-client. Closes gh-124. * [b36835f] Add get cinfo to fail2ban-client. Closes gh#fail2ban/fail2ban#124.
* [ce3ab34] Added ability to specify PID file. * [ce3ab34] Added ability to specify PID file.
Orion Poplawski Orion Poplawski
* [ddebcab] Enhance fail2ban.service definition dependencies and Pidfile. * [ddebcab] Enhance fail2ban.service definition dependencies and Pidfile.
Closes gh-142. Closes gh#fail2ban/fail2ban#142.
Yaroslav Halchenko Yaroslav Halchenko
* [MANY] Lots of improvements to log messages, man pages and test cases. * [MANY] Lots of improvements to log messages, man pages and test cases.
* [91d5736] Postfix filter improvements - empty helo, from and rcpt to. * [91d5736] Postfix filter improvements - empty helo, from and rcpt to.
Closes gh-126. Bug report by Michael Heuberger. Closes gh#fail2ban/fail2ban#126. Bug report by Michael Heuberger.
* [40c5a2d] adding more of diagnostic messages into -client while starting * [40c5a2d] adding more of diagnostic messages into -client while starting
the daemon. the daemon.
* [8e63d4c] Compare against None with 'is' instead of '=='. * [8e63d4c] Compare against None with 'is' instead of '=='.
* [6fef85f] Strip CR and LF while analyzing the log line * [6fef85f] Strip CR and LF while analyzing the log line
Daniel Black Daniel Black
* [3aeb1a9] Add jail.conf manual page. Closes gh-143. * [3aeb1a9] Add jail.conf manual page. Closes gh#fail2ban/fail2ban#143.
* [MANY] man page edits. * [MANY] man page edits.
* [7cd6dab] Added help command to fail2ban-client. * [7cd6dab] Added help command to fail2ban-client.
* [c8c7b0b,23bbc60] Better logging of log file read errors. * [c8c7b0b,23bbc60] Better logging of log file read errors.
@ -171,21 +266,23 @@ would be at a significant security risk.
- Fixes: - Fixes:
Alan Jenkins Alan Jenkins
* [8c38907] Removed 'POSSIBLE BREAK-IN ATTEMPT' from sshd filter to avoid * [8c38907] Removed 'POSSIBLE BREAK-IN ATTEMPT' from sshd filter to avoid
banning due to misconfigured DNS. Close gh-64 banning due to misconfigured DNS. Close gh#fail2ban/fail2ban#64
Yaroslav Halchenko Yaroslav Halchenko
* [83109bc] IMPORTANT: escape the content of <matches> (if used in * [83109bc] IMPORTANT: escape the content of <matches> (if used in
custom action files) since its value could contain arbitrary custom action files) since its value could contain arbitrary
symbols. Thanks for discovery go to the NBS System security symbols. Thanks for discovery go to the NBS System security
team team
* [0935566,5becaf8] Various python 2.4 and 2.5 compatibility fixes. Close gh-83 * [0935566,5becaf8] Various python 2.4 and 2.5 compatibility fixes.
Close gh#fail2ban/fail2ban#83
* [b159eab] do not enable pyinotify backend if pyinotify < 0.8.3 * [b159eab] do not enable pyinotify backend if pyinotify < 0.8.3
* [37a2e59] store IP as a base, non-unicode str to avoid spurious messages * [37a2e59] store IP as a base, non-unicode str to avoid spurious messages
in the console. Close gh-91 in the console. Close gh#fail2ban/fail2ban#91
- New features: - New features:
David Engeset David Engeset
* [2d672d1,6288ec2] 'unbanip' command for the client + avoidance of touching * [2d672d1,6288ec2] 'unbanip' command for the client + avoidance of touching
the log file to take 'banip' or 'unbanip' in effect. Close gh-81, gh-86 the log file to take 'banip' or 'unbanip' in effect.
Close gh#fail2ban/fail2ban#81, gh#fail2ban/fail2ban#86
- Enhancements: - Enhancements:
* [2d66f31] replaced uninformative "Invalid command" message with warning log * [2d66f31] replaced uninformative "Invalid command" message with warning log
@ -193,9 +290,10 @@ would be at a significant security risk.
* [958a1b0] improved failregex to "support" auth.backend = "htdigest" * [958a1b0] improved failregex to "support" auth.backend = "htdigest"
* [9e7a3b7] until we make it proper module -- adjusted sys.path only if * [9e7a3b7] until we make it proper module -- adjusted sys.path only if
system-wide run system-wide run
* [f52ba99] downgraded "already banned" from WARN to INFO level. Closes gh-79 * [f52ba99] downgraded "already banned" from WARN to INFO level.
Closes gh#fail2ban/fail2ban#79
* [f105379] added hints into the log on some failure return codes (e.g. 0x7f00 * [f105379] added hints into the log on some failure return codes (e.g. 0x7f00
for this gh-87) for this gh#fail2ban/fail2ban#87)
* Various others: travis-ci integration, script to run tests * Various others: travis-ci integration, script to run tests
against all available Python versions, etc against all available Python versions, etc
@ -237,11 +335,11 @@ Tue Oct 2 08:09:20 UTC 2012 - jweberhofer@weberhofer.at
* [4c76fb3] allow trailing white-spaces in lighttpd-auth.conf * [4c76fb3] allow trailing white-spaces in lighttpd-auth.conf
* [25f1e8d] allow trailing whitespace in few missing it regexes for sshd.conf * [25f1e8d] allow trailing whitespace in few missing it regexes for sshd.conf
* [ed16ecc] enforce "ip" field returned as str, not unicode so that log * [ed16ecc] enforce "ip" field returned as str, not unicode so that log
message stays non-unicode. Close gh-32 message stays non-unicode. Close gh#fail2ban/fail2ban#32
* [b257be4] added %m-%d-%Y pattern + do not add %Y for Feb 29 fix if * [b257be4] added %m-%d-%Y pattern + do not add %Y for Feb 29 fix if
already present in the pattern already present in the pattern
* [47e956b] replace "|" with "_" in ipmasq-ZZZzzz|fail2ban.rul to be * [47e956b] replace "|" with "_" in ipmasq-ZZZzzz|fail2ban.rul to be
friend to developers stuck with Windows (Closes gh-66) friend to developers stuck with Windows (Closes gh#fail2ban/fail2ban#66)
* [80b191c] anchor grep regexp in actioncheck to not match partial names * [80b191c] anchor grep regexp in actioncheck to not match partial names
of the jails (Closes: #672228) (Thanks Szépe Viktor for the report) of the jails (Closes: #672228) (Thanks Szépe Viktor for the report)
- New features: - New features:
@ -254,7 +352,7 @@ Tue Oct 2 08:09:20 UTC 2012 - jweberhofer@weberhofer.at
use of DNS use of DNS
- Tom Hendrikx - Tom Hendrikx
* [f94a121..] 'recidive' filter/jail to monitor fail2ban.conf to ban * [f94a121..] 'recidive' filter/jail to monitor fail2ban.conf to ban
repeated offenders. Close gh-19 repeated offenders. Close gh#fail2ban/fail2ban#19
- Xavier Devlamynck - Xavier Devlamynck
* [7d465f9..] Add asterisk support * [7d465f9..] Add asterisk support
- Zbigniew Jedrzejewski-Szmek - Zbigniew Jedrzejewski-Szmek
@ -274,7 +372,7 @@ Tue Oct 2 08:09:20 UTC 2012 - jweberhofer@weberhofer.at
* [a7d47e8] Update Free Software Foundation's address * [a7d47e8] Update Free Software Foundation's address
- Petr Voralek - Petr Voralek
* [4007751] catch failed ssh logins due to being listed in DenyUsers. * [4007751] catch failed ssh logins due to being listed in DenyUsers.
Close gh-47 (Closes: #669063) Close gh#fail2ban/fail2ban#47 (Closes: #669063)
- Yaroslav Halchenko - Yaroslav Halchenko
* [MANY] extended and robustified unittests: test different backends * [MANY] extended and robustified unittests: test different backends
* [d9248a6] refactored Filter's to avoid duplicate functionality * [d9248a6] refactored Filter's to avoid duplicate functionality

View File

@ -8,6 +8,6 @@
missingok missingok
create 644 root root create 644 root root
postrotate postrotate
fail2ban-client set logtarget /var/log/fail2ban.log 1>/dev/null || true fail2ban-client flushlogs 1>/dev/null || true
endscript endscript
} }

View File

@ -1,7 +1,7 @@
# #
# spec file for package fail2ban # spec file for package fail2ban
# #
# Copyright (c) 2013 SUSE LINUX Products GmbH, Nuernberg, Germany. # Copyright (c) 2014 SUSE LINUX Products GmbH, Nuernberg, Germany.
# #
# All modifications and additions to the file contributed by third parties # All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed # remain the property of their copyright owners, unless otherwise agreed
@ -17,10 +17,31 @@
Name: fail2ban Name: fail2ban
Version: 0.8.12
Release: 0
Url: http://www.fail2ban.org/
BuildRoot: %{_tmppath}/%{name}-%{version}-build
BuildArch: noarch
Summary: Bans IP addresses that make too many authentication failures
License: GPL-2.0+
Group: Productivity/Networking/Security
Source0: https://github.com/%{name}/%{name}/releases/download/%{version}/%{name}-%{version}.tar.bz2
%if 0%{?suse_version} < 1230
# the init-script requires lsof
Requires: lsof
Source1: %{name}.init
%endif
Source2: %{name}.sysconfig
Source3: %{name}.logrotate
%if 0%{?suse_version} >= 1230
Source4: %{name}.service
Source5: %{name}.tmpfiles
%endif
# PATCH-FIX-UPSTREAM fix-for-upstream-firewallcmd-ipset.conf.patch rh#1046816
Patch0: fix-for-upstream-firewallcmd-ipset.conf.patch
Requires: cron Requires: cron
Requires: iptables Requires: iptables
Requires: logrotate Requires: logrotate
Requires: lsof
Requires: python >= 2.5 Requires: python >= 2.5
%if 0%{?suse_version} >= 1140 && 0%{?sles_version} == 0 %if 0%{?suse_version} >= 1140 && 0%{?sles_version} == 0
Requires: python-pyinotify Requires: python-pyinotify
@ -34,25 +55,6 @@ BuildRequires: systemd
%endif %endif
BuildRequires: logrotate BuildRequires: logrotate
BuildRequires: python-devel BuildRequires: python-devel
PreReq: %fillup_prereq
Version: 0.8.11
Release: 0
Url: http://www.fail2ban.org/
BuildRoot: %{_tmppath}/%{name}-%{version}-build
BuildArch: noarch
Summary: Bans IP addresses that make too many authentication failures
License: GPL-2.0+
Group: Productivity/Networking/Security
Source0: https://github.com/%{name}/%{name}/releases/download/%{version}/%{name}-%{version}.tar.bz2
%if 0%{?suse_version} < 1230
Source1: %{name}.init
%endif
Source2: %{name}.sysconfig
Source3: %{name}.logrotate
%if 0%{?suse_version} >= 1230
Source4: %{name}.service
Source5: %{name}.tmpfiles
%endif
%description %description
Fail2ban scans log files like /var/log/messages and bans IP addresses Fail2ban scans log files like /var/log/messages and bans IP addresses
@ -63,6 +65,7 @@ files such as sshd or Apache web server ones.
%prep %prep
%setup %setup
%patch0 -p1
# correct doc-path # correct doc-path
sed -i -e 's|/usr/share/doc/fail2ban|%{_docdir}/%{name}|' setup.py sed -i -e 's|/usr/share/doc/fail2ban|%{_docdir}/%{name}|' setup.py

View File

@ -0,0 +1,23 @@
diff -ur fail2ban-0.8.12.orig/config/action.d/firewallcmd-ipset.conf fail2ban-0.8.12/config/action.d/firewallcmd-ipset.conf
--- fail2ban-0.8.12.orig/config/action.d/firewallcmd-ipset.conf 2014-01-16 09:20:14.000000000 +0100
+++ fail2ban-0.8.12/config/action.d/firewallcmd-ipset.conf 2014-01-23 22:43:53.115263616 +0100
@@ -25,8 +25,6 @@
ipset flush fail2ban-<name>
ipset destroy fail2ban-<name>
-actioncheck = firewall-cmd --direct --get-chains ipv4 filter | grep -q '^fail2ban-<name>$'
-
actionban = ipset add fail2ban-<name> <ip> timeout <bantime> -exist
actionunban = ipset del fail2ban-<name> <ip> -exist
diff -ur fail2ban-0.8.12.orig/THANKS fail2ban-0.8.12/THANKS
--- fail2ban-0.8.12.orig/THANKS 2014-01-21 21:59:49.000000000 +0100
+++ fail2ban-0.8.12/THANKS 2014-01-23 22:43:53.115263616 +0100
@@ -30,6 +30,7 @@
Daniel B.
Daniel Black
David Nutter
+Derek Atkins
Eric Gerbier
Enrico Labedzki
ftoppi