forked from pool/fail2ban
Accepting request 215524 from security
Security note: The update to version 0.8.11 has fixed two additional security issues: A remote unauthenticated attacker may cause arbitrary IP addresses to be blocked by Fail2ban causing legitimate users to be blocked from accessing services protected by Fail2ban. CVE-2013-7177 (cyrus-imap) and CVE-2013-7176 (postfix) (forwarded request 215523 from weberho) OBS-URL: https://build.opensuse.org/request/show/215524 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/fail2ban?expand=0&rev=31
This commit is contained in:
commit
b17e75956e
@ -1,3 +0,0 @@
|
|||||||
version https://git-lfs.github.com/spec/v1
|
|
||||||
oid sha256:d8fa2bd1b106b65ad2bffd41c191f80a97bc3e9456b192d1714c4ee023af5e32
|
|
||||||
size 156411
|
|
3
fail2ban-0.8.12.tar.bz2
Normal file
3
fail2ban-0.8.12.tar.bz2
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:2cdd7cbbf8b770715ce0068aec9dd8857388cd4d690fd5211907d7f2f3bdcde4
|
||||||
|
size 169644
|
170
fail2ban.changes
170
fail2ban.changes
@ -1,3 +1,94 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Jan 29 13:48:38 UTC 2014 - jweberhofer@weberhofer.at
|
||||||
|
|
||||||
|
Security note: The update to version 0.8.11 has fixed two additional security
|
||||||
|
issues: A remote unauthenticated attacker may cause arbitrary IP addresses to
|
||||||
|
be blocked by Fail2ban causing legitimate users to be blocked from accessing
|
||||||
|
services protected by Fail2ban. CVE-2013-7177 (cyrus-imap) and CVE-2013-7176
|
||||||
|
(postfix)
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu Jan 23 21:35:27 UTC 2014 - jweberhofer@weberhofer.at
|
||||||
|
|
||||||
|
- action firewallcmd-ipset had non-working actioncheck. Removed. rh#1046816
|
||||||
|
|
||||||
|
- lsof was required for fail2ban's SysVinit scripts only. Not longer used for
|
||||||
|
newer versions of openSUSE
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu Jan 23 08:40:40 UTC 2014 - jweberhofer@weberhofer.at
|
||||||
|
|
||||||
|
- Reviewed and fixed github references in the changelog
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Jan 22 09:27:43 UTC 2014 - jweberhofer@weberhofer.at
|
||||||
|
|
||||||
|
- Use new flushlogs syntax after logrotate
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Jan 22 08:50:05 UTC 2014 - jweberhofer@weberhofer.at
|
||||||
|
|
||||||
|
- Update to version 0.8.12
|
||||||
|
|
||||||
|
* Log rotation can now occur with the command "flushlogs" rather than
|
||||||
|
reloading fail2ban or keeping the logtarget settings consistent in
|
||||||
|
jail.conf/local and /etc/logrotate.d/fail2ban. (dep#697333, rh#891798).
|
||||||
|
|
||||||
|
* Added ignorecommand option for allowing dynamic determination as to ignore
|
||||||
|
and IP or not.
|
||||||
|
|
||||||
|
* Remove indentation of name and loglevel while logging to SYSLOG to resolve
|
||||||
|
syslog(-ng) parsing problems. (dep#730202). Log lines now also
|
||||||
|
report "[PID]" after the name portion too.
|
||||||
|
|
||||||
|
* Epoch dates can now be enclosed within []
|
||||||
|
|
||||||
|
* New actions: badips, firewallcmd-ipset, ufw, blocklist_de
|
||||||
|
|
||||||
|
* New filters: solid-pop3d, nsd, openwebmail, horde, freeswitch, squid,
|
||||||
|
ejabberd, openwebmail, groupoffice
|
||||||
|
|
||||||
|
* Filter improvements:
|
||||||
|
- apache-noscript now includes php cgi scripts
|
||||||
|
- exim-spam filter to match spamassassin log entry for option SAdevnull.
|
||||||
|
- Added to sshd filter expression for
|
||||||
|
"Received disconnect from : 3: Auth fail"
|
||||||
|
- Improved ACL-handling for Asterisk
|
||||||
|
- Added improper command pipelining to postfix filter.
|
||||||
|
|
||||||
|
* General fixes:
|
||||||
|
- Added lots of jail.conf entries for missing filters that creaped in
|
||||||
|
over the last year.
|
||||||
|
- synchat changed to use push method which verifies whether all data was
|
||||||
|
send. This ensures that all data is sent before closing the connection.
|
||||||
|
- Fixed python 2.4 compatibility (as sub-second in date patterns weren't
|
||||||
|
2.4 compatible)
|
||||||
|
- Complain/email actions fixed to only include relevant IPs to reporting
|
||||||
|
|
||||||
|
* Filter fixes:
|
||||||
|
- Added HTTP referrer bit of the apache access log to the apache filters.
|
||||||
|
- Apache 2.4 perfork regexes fixed
|
||||||
|
- Kernel syslog expression can have leading spaces
|
||||||
|
- allow for ",milliseconds" in the custom date format of proftpd.log
|
||||||
|
- recidive jail to block all protocols
|
||||||
|
- smtps not a IANA standard so may be missing from /etc/services. Due to
|
||||||
|
(still) common use 465 has been used as the explicit port number
|
||||||
|
- Filter dovecot reordered session and TLS items in regex with wider scope
|
||||||
|
for session characters
|
||||||
|
|
||||||
|
* Ugly Fixes (Potentially incompatible changes):
|
||||||
|
|
||||||
|
- Unfortunately at the end of last release when the action
|
||||||
|
firewall-cmd-direct-new was added it was too long and had a broken action
|
||||||
|
check. The action was renamed to firewallcmd-new to fit within jail name
|
||||||
|
name length. (gh#fail2ban/fail2ban#395).
|
||||||
|
|
||||||
|
- Last release added mysqld-syslog-iptables as a jail configuration. This
|
||||||
|
jailname was too long and it has been renamed to mysqld-syslog.
|
||||||
|
|
||||||
|
- Fixed formating of github references in changelog
|
||||||
|
- reformatted spec-file
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Thu Nov 14 05:14:35 UTC 2013 - jweberhofer@weberhofer.at
|
Thu Nov 14 05:14:35 UTC 2013 - jweberhofer@weberhofer.at
|
||||||
|
|
||||||
@ -32,17 +123,19 @@ Thu Jun 13 08:58:53 UTC 2013 - jweberhofer@weberhofer.at
|
|||||||
- Fixes
|
- Fixes
|
||||||
* [6ccd5781] filter.d/apache-{auth,nohome,noscript,overflows} - anchor
|
* [6ccd5781] filter.d/apache-{auth,nohome,noscript,overflows} - anchor
|
||||||
failregex at the beginning (and where applicable at the end).
|
failregex at the beginning (and where applicable at the end).
|
||||||
Addresses a possible DoS. Closes gh-248, bnc#824710
|
Addresses a possible DoS. Closes gh#fail2ban/fail2ban#248, bnc#824710
|
||||||
* action.d/{route,shorewall}.conf - blocktype must be defined
|
* action.d/{route,shorewall}.conf - blocktype must be defined
|
||||||
within [Init]. Closes gh-232
|
within [Init]. Closes gh#fail2ban/fail2ban#232
|
||||||
|
|
||||||
- Enhancements
|
- Enhancements
|
||||||
* jail.conf -- assure all jails have actions and remove unused
|
* jail.conf -- assure all jails have actions and remove unused
|
||||||
ports specifications
|
ports specifications
|
||||||
* config/filter.d/roundcube-auth.conf -- support roundcube 0.9+
|
* config/filter.d/roundcube-auth.conf -- support roundcube 0.9+
|
||||||
* files/suse-initd -- update to the copy from stock SUSE
|
* files/suse-initd -- update to the copy from stock SUSE
|
||||||
* Updates to asterisk filter. Closes gh-227/gh-230.
|
* Updates to asterisk filter. Closes gh#fail2ban/fail2ban#227,
|
||||||
* Updates to asterisk to include AUTH_UNKNOWN_DOMAIN. Closes gh-244.
|
gh#fail2ban/fail2ban#230.
|
||||||
|
* Updates to asterisk to include AUTH_UNKNOWN_DOMAIN. Closes
|
||||||
|
gh#fail2ban/fail2ban#244.
|
||||||
|
|
||||||
------------------------------------------------------------------
|
------------------------------------------------------------------
|
||||||
Tue May 28 06:46:54 UTC 2013 - jweberhofer@weberhofer.at
|
Tue May 28 06:46:54 UTC 2013 - jweberhofer@weberhofer.at
|
||||||
@ -60,59 +153,61 @@ Tue May 14 10:06:35 UTC 2013 - jweberhofer@weberhofer.at
|
|||||||
- Fixes: Yaroslav Halchenko
|
- Fixes: Yaroslav Halchenko
|
||||||
* [6f4dad46] python-2.4 is the minimal version.
|
* [6f4dad46] python-2.4 is the minimal version.
|
||||||
* [1eb23cf8] do not rely on scripts being under /usr -- might differ e.g.
|
* [1eb23cf8] do not rely on scripts being under /usr -- might differ e.g.
|
||||||
on Fedora. Closes gh-112. Thanks to Camusensei for the bug report.
|
on Fedora. Closes gh#fail2ban/fail2ban#112. Thanks to Camusensei for the
|
||||||
|
bug report.
|
||||||
* [bf4d4af1] Changes for atomic writes. Thanks to Steven Hiscocks for
|
* [bf4d4af1] Changes for atomic writes. Thanks to Steven Hiscocks for
|
||||||
insight. Closes gh-103.
|
insight. Closes gh#fail2ban/fail2ban#103.
|
||||||
* [ab044b75] delay check for the existence of config directory until read.
|
* [ab044b75] delay check for the existence of config directory until read.
|
||||||
* [3b4084d4] fixing up for handling of TAI64N timestamps.
|
* [3b4084d4] fixing up for handling of TAI64N timestamps.
|
||||||
* [154aa38e] do not shutdown logging until all jails stop.
|
* [154aa38e] do not shutdown logging until all jails stop.
|
||||||
* [f2156604] pyinotify -- monitor IN_MOVED_TO events. Closes gh-184.
|
* [f2156604] pyinotify -- monitor IN_MOVED_TO events. Closes
|
||||||
Thanks to Jon Foster for report and troubleshooting.
|
gh#fail2ban/fail2ban#184. Thanks to Jon Foster for report and
|
||||||
Orion Poplawski
|
troubleshooting. Orion Poplawski
|
||||||
* [e4aedfdc00] pyinotify - use bitwise op on masks and do not try tracking
|
* [e4aedfdc00] pyinotify - use bitwise op on masks and do not try tracking
|
||||||
newly created directories.
|
newly created directories.
|
||||||
Nicolas Collignon
|
Nicolas Collignon
|
||||||
* [39667ff6] Avoid leaking file descriptors. Closes gh-167.
|
* [39667ff6] Avoid leaking file descriptors. Closes gh#fail2ban/fail2ban#167.
|
||||||
Sergey Brester
|
Sergey Brester
|
||||||
* [b6bb2f88 and d17b4153] invalid date recognition, irregular because of
|
* [b6bb2f88 and d17b4153] invalid date recognition, irregular because of
|
||||||
sorting template list.
|
sorting template list.
|
||||||
Steven Hiscocks
|
Steven Hiscocks
|
||||||
* [7a442f07] When changing log target with python2.{4,5} handle KeyError.
|
* [7a442f07] When changing log target with python2.{4,5} handle KeyError.
|
||||||
Closes gh-147, gh-148.
|
Closes gh#fail2ban/fail2ban#147, gh#fail2ban/fail2ban#148.
|
||||||
* [b6a68f51] Fix delaction on server side. Closes gh-124.
|
* [b6a68f51] Fix delaction on server side. Closes gh#fail2ban/fail2ban#124.
|
||||||
Daniel Black
|
Daniel Black
|
||||||
* [f0610c01] Allow more that a one word command when changing and Action via
|
* [f0610c01] Allow more that a one word command when changing and Action via
|
||||||
the fail2ban-client. Closes gh-134.
|
the fail2ban-client. Closes gh#fail2ban/fail2ban#134.
|
||||||
* [945ad3d9] Fix dates on email actions to work in different locals. Closes
|
* [945ad3d9] Fix dates on email actions to work in different locals. Closes
|
||||||
gh-70. Thanks to iGeorgeX for the idea.
|
gh#fail2ban/fail2ban#70. Thanks to iGeorgeX for the idea.
|
||||||
blotus
|
blotus
|
||||||
* [96eb8986] ' and " should also be escaped in action tags Closes gh-109
|
* [96eb8986] ' and " should also be escaped in action tags Closes
|
||||||
|
gh#fail2ban/fail2ban#109
|
||||||
Christoph Theis, Nick Hilliard, Daniel Black
|
Christoph Theis, Nick Hilliard, Daniel Black
|
||||||
* [b3bd877d,cde71080] Make syslog -v and syslog -vv formats work on FreeBSD
|
* [b3bd877d,cde71080] Make syslog -v and syslog -vv formats work on FreeBSD
|
||||||
- New features:
|
- New features:
|
||||||
Yaroslav Halchenko
|
Yaroslav Halchenko
|
||||||
* [9ba27353] Add support for jail.d/{confilefile} and fail2ban.d/{configfile}
|
* [9ba27353] Add support for jail.d/{confilefile} and fail2ban.d/{configfile}
|
||||||
to provide additional flexibility to system adminstrators. Thanks to
|
to provide additional flexibility to system adminstrators. Thanks to
|
||||||
beilber for the idea. Closes gh-114.
|
beilber for the idea. Closes gh#fail2ban/fail2ban#114.
|
||||||
* [3ce53e87] Add exim filter.
|
* [3ce53e87] Add exim filter.
|
||||||
Erwan Ben Souiden
|
Erwan Ben Souiden
|
||||||
* [d7d5228] add nagios integration documentation and script to ensure
|
* [d7d5228] add nagios integration documentation and script to ensure
|
||||||
fail2ban is running. Closes gh-166.
|
fail2ban is running. Closes gh#fail2ban/fail2ban#166.
|
||||||
Artur Penttinen
|
Artur Penttinen
|
||||||
* [29d0df5] Add mysqld filter. Closes gh-152.
|
* [29d0df5] Add mysqld filter. Closes gh#fail2ban/fail2ban#152.
|
||||||
ArndRaphael Brandes
|
ArndRaphael Brandes
|
||||||
* [bba3fd8] Add Sogo filter. Closes gh-117.
|
* [bba3fd8] Add Sogo filter. Closes gh#fail2ban/fail2ban#117.
|
||||||
Michael Gebetsriother
|
Michael Gebetsriother
|
||||||
* [f9b78ba] Add action route to block at routing level.
|
* [f9b78ba] Add action route to block at routing level.
|
||||||
Teodor Micu & Yaroslav Halchenko
|
Teodor Micu & Yaroslav Halchenko
|
||||||
* [5f2d383] Add roundcube auth filter. Closes Debian bug #699442.
|
* [5f2d383] Add roundcube auth filter. Closes Debian bug #699442.
|
||||||
Daniel Black
|
Daniel Black
|
||||||
* [be06b1b] Add action for iptables-ipsets. Closes gh-102.
|
* [be06b1b] Add action for iptables-ipsets. Closes gh#fail2ban/fail2ban#102.
|
||||||
Nick Munger, Ken Menzel, Daniel Black, Christoph Theis & Fabian Wenk
|
Nick Munger, Ken Menzel, Daniel Black, Christoph Theis & Fabian Wenk
|
||||||
* [b6d0e8a] Add and enhance the bsd-ipfw action from
|
* [b6d0e8a] Add and enhance the bsd-ipfw action from
|
||||||
FreeBSD ports.
|
FreeBSD ports.
|
||||||
Soulard Morgan
|
Soulard Morgan
|
||||||
* [f336d9f] Add filter for webmin. Closes gh-99.
|
* [f336d9f] Add filter for webmin. Closes gh#fail2ban/fail2ban#99.
|
||||||
Steven Hiscocks
|
Steven Hiscocks
|
||||||
* [..746c7d9] bash interactive shell completions for fail2ban-*'s
|
* [..746c7d9] bash interactive shell completions for fail2ban-*'s
|
||||||
Nick Hilliard
|
Nick Hilliard
|
||||||
@ -122,23 +217,23 @@ Tue May 14 10:06:35 UTC 2013 - jweberhofer@weberhofer.at
|
|||||||
* [24a8d07] Added new date format for ASSP SMTP Proxy.
|
* [24a8d07] Added new date format for ASSP SMTP Proxy.
|
||||||
Steven Hiscocks
|
Steven Hiscocks
|
||||||
* [3d6791f] Ensure restart of Actions after a check fails occurs
|
* [3d6791f] Ensure restart of Actions after a check fails occurs
|
||||||
consistently. Closes gh-172.
|
consistently. Closes gh#fail2ban/fail2ban#172.
|
||||||
* [MANY] Improvements to test cases, travis, and code coverage (coveralls).
|
* [MANY] Improvements to test cases, travis, and code coverage (coveralls).
|
||||||
* [b36835f] Add get cinfo to fail2ban-client. Closes gh-124.
|
* [b36835f] Add get cinfo to fail2ban-client. Closes gh#fail2ban/fail2ban#124.
|
||||||
* [ce3ab34] Added ability to specify PID file.
|
* [ce3ab34] Added ability to specify PID file.
|
||||||
Orion Poplawski
|
Orion Poplawski
|
||||||
* [ddebcab] Enhance fail2ban.service definition dependencies and Pidfile.
|
* [ddebcab] Enhance fail2ban.service definition dependencies and Pidfile.
|
||||||
Closes gh-142.
|
Closes gh#fail2ban/fail2ban#142.
|
||||||
Yaroslav Halchenko
|
Yaroslav Halchenko
|
||||||
* [MANY] Lots of improvements to log messages, man pages and test cases.
|
* [MANY] Lots of improvements to log messages, man pages and test cases.
|
||||||
* [91d5736] Postfix filter improvements - empty helo, from and rcpt to.
|
* [91d5736] Postfix filter improvements - empty helo, from and rcpt to.
|
||||||
Closes gh-126. Bug report by Michael Heuberger.
|
Closes gh#fail2ban/fail2ban#126. Bug report by Michael Heuberger.
|
||||||
* [40c5a2d] adding more of diagnostic messages into -client while starting
|
* [40c5a2d] adding more of diagnostic messages into -client while starting
|
||||||
the daemon.
|
the daemon.
|
||||||
* [8e63d4c] Compare against None with 'is' instead of '=='.
|
* [8e63d4c] Compare against None with 'is' instead of '=='.
|
||||||
* [6fef85f] Strip CR and LF while analyzing the log line
|
* [6fef85f] Strip CR and LF while analyzing the log line
|
||||||
Daniel Black
|
Daniel Black
|
||||||
* [3aeb1a9] Add jail.conf manual page. Closes gh-143.
|
* [3aeb1a9] Add jail.conf manual page. Closes gh#fail2ban/fail2ban#143.
|
||||||
* [MANY] man page edits.
|
* [MANY] man page edits.
|
||||||
* [7cd6dab] Added help command to fail2ban-client.
|
* [7cd6dab] Added help command to fail2ban-client.
|
||||||
* [c8c7b0b,23bbc60] Better logging of log file read errors.
|
* [c8c7b0b,23bbc60] Better logging of log file read errors.
|
||||||
@ -171,21 +266,23 @@ would be at a significant security risk.
|
|||||||
- Fixes:
|
- Fixes:
|
||||||
Alan Jenkins
|
Alan Jenkins
|
||||||
* [8c38907] Removed 'POSSIBLE BREAK-IN ATTEMPT' from sshd filter to avoid
|
* [8c38907] Removed 'POSSIBLE BREAK-IN ATTEMPT' from sshd filter to avoid
|
||||||
banning due to misconfigured DNS. Close gh-64
|
banning due to misconfigured DNS. Close gh#fail2ban/fail2ban#64
|
||||||
Yaroslav Halchenko
|
Yaroslav Halchenko
|
||||||
* [83109bc] IMPORTANT: escape the content of <matches> (if used in
|
* [83109bc] IMPORTANT: escape the content of <matches> (if used in
|
||||||
custom action files) since its value could contain arbitrary
|
custom action files) since its value could contain arbitrary
|
||||||
symbols. Thanks for discovery go to the NBS System security
|
symbols. Thanks for discovery go to the NBS System security
|
||||||
team
|
team
|
||||||
* [0935566,5becaf8] Various python 2.4 and 2.5 compatibility fixes. Close gh-83
|
* [0935566,5becaf8] Various python 2.4 and 2.5 compatibility fixes.
|
||||||
|
Close gh#fail2ban/fail2ban#83
|
||||||
* [b159eab] do not enable pyinotify backend if pyinotify < 0.8.3
|
* [b159eab] do not enable pyinotify backend if pyinotify < 0.8.3
|
||||||
* [37a2e59] store IP as a base, non-unicode str to avoid spurious messages
|
* [37a2e59] store IP as a base, non-unicode str to avoid spurious messages
|
||||||
in the console. Close gh-91
|
in the console. Close gh#fail2ban/fail2ban#91
|
||||||
|
|
||||||
- New features:
|
- New features:
|
||||||
David Engeset
|
David Engeset
|
||||||
* [2d672d1,6288ec2] 'unbanip' command for the client + avoidance of touching
|
* [2d672d1,6288ec2] 'unbanip' command for the client + avoidance of touching
|
||||||
the log file to take 'banip' or 'unbanip' in effect. Close gh-81, gh-86
|
the log file to take 'banip' or 'unbanip' in effect.
|
||||||
|
Close gh#fail2ban/fail2ban#81, gh#fail2ban/fail2ban#86
|
||||||
|
|
||||||
- Enhancements:
|
- Enhancements:
|
||||||
* [2d66f31] replaced uninformative "Invalid command" message with warning log
|
* [2d66f31] replaced uninformative "Invalid command" message with warning log
|
||||||
@ -193,9 +290,10 @@ would be at a significant security risk.
|
|||||||
* [958a1b0] improved failregex to "support" auth.backend = "htdigest"
|
* [958a1b0] improved failregex to "support" auth.backend = "htdigest"
|
||||||
* [9e7a3b7] until we make it proper module -- adjusted sys.path only if
|
* [9e7a3b7] until we make it proper module -- adjusted sys.path only if
|
||||||
system-wide run
|
system-wide run
|
||||||
* [f52ba99] downgraded "already banned" from WARN to INFO level. Closes gh-79
|
* [f52ba99] downgraded "already banned" from WARN to INFO level.
|
||||||
|
Closes gh#fail2ban/fail2ban#79
|
||||||
* [f105379] added hints into the log on some failure return codes (e.g. 0x7f00
|
* [f105379] added hints into the log on some failure return codes (e.g. 0x7f00
|
||||||
for this gh-87)
|
for this gh#fail2ban/fail2ban#87)
|
||||||
* Various others: travis-ci integration, script to run tests
|
* Various others: travis-ci integration, script to run tests
|
||||||
against all available Python versions, etc
|
against all available Python versions, etc
|
||||||
|
|
||||||
@ -237,11 +335,11 @@ Tue Oct 2 08:09:20 UTC 2012 - jweberhofer@weberhofer.at
|
|||||||
* [4c76fb3] allow trailing white-spaces in lighttpd-auth.conf
|
* [4c76fb3] allow trailing white-spaces in lighttpd-auth.conf
|
||||||
* [25f1e8d] allow trailing whitespace in few missing it regexes for sshd.conf
|
* [25f1e8d] allow trailing whitespace in few missing it regexes for sshd.conf
|
||||||
* [ed16ecc] enforce "ip" field returned as str, not unicode so that log
|
* [ed16ecc] enforce "ip" field returned as str, not unicode so that log
|
||||||
message stays non-unicode. Close gh-32
|
message stays non-unicode. Close gh#fail2ban/fail2ban#32
|
||||||
* [b257be4] added %m-%d-%Y pattern + do not add %Y for Feb 29 fix if
|
* [b257be4] added %m-%d-%Y pattern + do not add %Y for Feb 29 fix if
|
||||||
already present in the pattern
|
already present in the pattern
|
||||||
* [47e956b] replace "|" with "_" in ipmasq-ZZZzzz|fail2ban.rul to be
|
* [47e956b] replace "|" with "_" in ipmasq-ZZZzzz|fail2ban.rul to be
|
||||||
friend to developers stuck with Windows (Closes gh-66)
|
friend to developers stuck with Windows (Closes gh#fail2ban/fail2ban#66)
|
||||||
* [80b191c] anchor grep regexp in actioncheck to not match partial names
|
* [80b191c] anchor grep regexp in actioncheck to not match partial names
|
||||||
of the jails (Closes: #672228) (Thanks Szépe Viktor for the report)
|
of the jails (Closes: #672228) (Thanks Szépe Viktor for the report)
|
||||||
- New features:
|
- New features:
|
||||||
@ -254,7 +352,7 @@ Tue Oct 2 08:09:20 UTC 2012 - jweberhofer@weberhofer.at
|
|||||||
use of DNS
|
use of DNS
|
||||||
- Tom Hendrikx
|
- Tom Hendrikx
|
||||||
* [f94a121..] 'recidive' filter/jail to monitor fail2ban.conf to ban
|
* [f94a121..] 'recidive' filter/jail to monitor fail2ban.conf to ban
|
||||||
repeated offenders. Close gh-19
|
repeated offenders. Close gh#fail2ban/fail2ban#19
|
||||||
- Xavier Devlamynck
|
- Xavier Devlamynck
|
||||||
* [7d465f9..] Add asterisk support
|
* [7d465f9..] Add asterisk support
|
||||||
- Zbigniew Jedrzejewski-Szmek
|
- Zbigniew Jedrzejewski-Szmek
|
||||||
@ -274,7 +372,7 @@ Tue Oct 2 08:09:20 UTC 2012 - jweberhofer@weberhofer.at
|
|||||||
* [a7d47e8] Update Free Software Foundation's address
|
* [a7d47e8] Update Free Software Foundation's address
|
||||||
- Petr Voralek
|
- Petr Voralek
|
||||||
* [4007751] catch failed ssh logins due to being listed in DenyUsers.
|
* [4007751] catch failed ssh logins due to being listed in DenyUsers.
|
||||||
Close gh-47 (Closes: #669063)
|
Close gh#fail2ban/fail2ban#47 (Closes: #669063)
|
||||||
- Yaroslav Halchenko
|
- Yaroslav Halchenko
|
||||||
* [MANY] extended and robustified unittests: test different backends
|
* [MANY] extended and robustified unittests: test different backends
|
||||||
* [d9248a6] refactored Filter's to avoid duplicate functionality
|
* [d9248a6] refactored Filter's to avoid duplicate functionality
|
||||||
|
@ -8,6 +8,6 @@
|
|||||||
missingok
|
missingok
|
||||||
create 644 root root
|
create 644 root root
|
||||||
postrotate
|
postrotate
|
||||||
fail2ban-client set logtarget /var/log/fail2ban.log 1>/dev/null || true
|
fail2ban-client flushlogs 1>/dev/null || true
|
||||||
endscript
|
endscript
|
||||||
}
|
}
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
#
|
#
|
||||||
# spec file for package fail2ban
|
# spec file for package fail2ban
|
||||||
#
|
#
|
||||||
# Copyright (c) 2013 SUSE LINUX Products GmbH, Nuernberg, Germany.
|
# Copyright (c) 2014 SUSE LINUX Products GmbH, Nuernberg, Germany.
|
||||||
#
|
#
|
||||||
# All modifications and additions to the file contributed by third parties
|
# All modifications and additions to the file contributed by third parties
|
||||||
# remain the property of their copyright owners, unless otherwise agreed
|
# remain the property of their copyright owners, unless otherwise agreed
|
||||||
@ -17,10 +17,31 @@
|
|||||||
|
|
||||||
|
|
||||||
Name: fail2ban
|
Name: fail2ban
|
||||||
|
Version: 0.8.12
|
||||||
|
Release: 0
|
||||||
|
Url: http://www.fail2ban.org/
|
||||||
|
BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
||||||
|
BuildArch: noarch
|
||||||
|
Summary: Bans IP addresses that make too many authentication failures
|
||||||
|
License: GPL-2.0+
|
||||||
|
Group: Productivity/Networking/Security
|
||||||
|
Source0: https://github.com/%{name}/%{name}/releases/download/%{version}/%{name}-%{version}.tar.bz2
|
||||||
|
%if 0%{?suse_version} < 1230
|
||||||
|
# the init-script requires lsof
|
||||||
|
Requires: lsof
|
||||||
|
Source1: %{name}.init
|
||||||
|
%endif
|
||||||
|
Source2: %{name}.sysconfig
|
||||||
|
Source3: %{name}.logrotate
|
||||||
|
%if 0%{?suse_version} >= 1230
|
||||||
|
Source4: %{name}.service
|
||||||
|
Source5: %{name}.tmpfiles
|
||||||
|
%endif
|
||||||
|
# PATCH-FIX-UPSTREAM fix-for-upstream-firewallcmd-ipset.conf.patch rh#1046816
|
||||||
|
Patch0: fix-for-upstream-firewallcmd-ipset.conf.patch
|
||||||
Requires: cron
|
Requires: cron
|
||||||
Requires: iptables
|
Requires: iptables
|
||||||
Requires: logrotate
|
Requires: logrotate
|
||||||
Requires: lsof
|
|
||||||
Requires: python >= 2.5
|
Requires: python >= 2.5
|
||||||
%if 0%{?suse_version} >= 1140 && 0%{?sles_version} == 0
|
%if 0%{?suse_version} >= 1140 && 0%{?sles_version} == 0
|
||||||
Requires: python-pyinotify
|
Requires: python-pyinotify
|
||||||
@ -34,25 +55,6 @@ BuildRequires: systemd
|
|||||||
%endif
|
%endif
|
||||||
BuildRequires: logrotate
|
BuildRequires: logrotate
|
||||||
BuildRequires: python-devel
|
BuildRequires: python-devel
|
||||||
PreReq: %fillup_prereq
|
|
||||||
Version: 0.8.11
|
|
||||||
Release: 0
|
|
||||||
Url: http://www.fail2ban.org/
|
|
||||||
BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
|
||||||
BuildArch: noarch
|
|
||||||
Summary: Bans IP addresses that make too many authentication failures
|
|
||||||
License: GPL-2.0+
|
|
||||||
Group: Productivity/Networking/Security
|
|
||||||
Source0: https://github.com/%{name}/%{name}/releases/download/%{version}/%{name}-%{version}.tar.bz2
|
|
||||||
%if 0%{?suse_version} < 1230
|
|
||||||
Source1: %{name}.init
|
|
||||||
%endif
|
|
||||||
Source2: %{name}.sysconfig
|
|
||||||
Source3: %{name}.logrotate
|
|
||||||
%if 0%{?suse_version} >= 1230
|
|
||||||
Source4: %{name}.service
|
|
||||||
Source5: %{name}.tmpfiles
|
|
||||||
%endif
|
|
||||||
|
|
||||||
%description
|
%description
|
||||||
Fail2ban scans log files like /var/log/messages and bans IP addresses
|
Fail2ban scans log files like /var/log/messages and bans IP addresses
|
||||||
@ -63,6 +65,7 @@ files such as sshd or Apache web server ones.
|
|||||||
|
|
||||||
%prep
|
%prep
|
||||||
%setup
|
%setup
|
||||||
|
%patch0 -p1
|
||||||
# correct doc-path
|
# correct doc-path
|
||||||
sed -i -e 's|/usr/share/doc/fail2ban|%{_docdir}/%{name}|' setup.py
|
sed -i -e 's|/usr/share/doc/fail2ban|%{_docdir}/%{name}|' setup.py
|
||||||
|
|
||||||
|
23
fix-for-upstream-firewallcmd-ipset.conf.patch
Normal file
23
fix-for-upstream-firewallcmd-ipset.conf.patch
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
diff -ur fail2ban-0.8.12.orig/config/action.d/firewallcmd-ipset.conf fail2ban-0.8.12/config/action.d/firewallcmd-ipset.conf
|
||||||
|
--- fail2ban-0.8.12.orig/config/action.d/firewallcmd-ipset.conf 2014-01-16 09:20:14.000000000 +0100
|
||||||
|
+++ fail2ban-0.8.12/config/action.d/firewallcmd-ipset.conf 2014-01-23 22:43:53.115263616 +0100
|
||||||
|
@@ -25,8 +25,6 @@
|
||||||
|
ipset flush fail2ban-<name>
|
||||||
|
ipset destroy fail2ban-<name>
|
||||||
|
|
||||||
|
-actioncheck = firewall-cmd --direct --get-chains ipv4 filter | grep -q '^fail2ban-<name>$'
|
||||||
|
-
|
||||||
|
actionban = ipset add fail2ban-<name> <ip> timeout <bantime> -exist
|
||||||
|
|
||||||
|
actionunban = ipset del fail2ban-<name> <ip> -exist
|
||||||
|
diff -ur fail2ban-0.8.12.orig/THANKS fail2ban-0.8.12/THANKS
|
||||||
|
--- fail2ban-0.8.12.orig/THANKS 2014-01-21 21:59:49.000000000 +0100
|
||||||
|
+++ fail2ban-0.8.12/THANKS 2014-01-23 22:43:53.115263616 +0100
|
||||||
|
@@ -30,6 +30,7 @@
|
||||||
|
Daniel B.
|
||||||
|
Daniel Black
|
||||||
|
David Nutter
|
||||||
|
+Derek Atkins
|
||||||
|
Eric Gerbier
|
||||||
|
Enrico Labedzki
|
||||||
|
ftoppi
|
Loading…
Reference in New Issue
Block a user