SHA256
1
0
forked from pool/fail2ban
Commit Graph

4 Commits

Author SHA256 Message Date
Johannes Weberhofer
346c68ba29 Accepting request 536273 from home:weberho:branches:security
- Updated to version 0.10.1. Changelog:
  https://github.com/fail2ban/fail2ban/blob/0.10/ChangeLog
- Removed 607568f.patch and 1783.patch
- New features: 
  * IPv6 support
    - IP addresses are now handled as objects rather than strings capable for 
      handling both address types IPv4 and IPv6
    - iptables related actions have been amended to support IPv6 specific actions
      additionally
    - hostsdeny and route actions have been tested to be aware of v4 and v6 already
    - pf action for *BSD systems has been improved and supports now also v4 and v6
    - name resolution is now working for either address type
    - new conditional section functionality used in config resp. includes:
      - [Init?family=inet4] - IPv4 qualified hosts only
      - [Init?family=inet6] - IPv6 qualified hosts only
  * Reporting via abuseipdb.com
    - Bans can now be reported to abuseipdb
    - Catagories must be set in the config
    - Relevant log lines included in report
  * Several commands extended and new commands introduced
  * Implemented execution of `actionstart` on demand
  * nftables actions are IPv6-capable now
  * Introduced new filter option `prefregex` for pre-filtering using single regular expression
  * Many times faster because of several optimizations
  * Several filters optimized
  * Introduced new jail option "ignoreself"
- Lots of fixes and internal improvements
- Incompatibitilities:
  * Filter (or `failregex`) internal capture-groups:
  - If you've your own `failregex` or custom filters using conditional match `(?P=host)`, you should
    rewrite the regex like in example below resp. using `(?:(?P=ip4)|(?P=ip6)` instead of `(?P=host)`
    (or `(?:(?P=ip4)|(?P=ip6)|(?P=dns))` corresponding your `usedns` and `raw` settings).
    Of course you can always your own capture-group (like below `_cond_ip_`) to do this.
    ```
    testln="1500000000 failure from 192.0.2.1: bad host 192.0.2.1"
    fail2ban-regex "$testln" "^\s*failure from (?P<_cond_ip_><HOST>): bad host (?P=_cond_ip_)$"
    ```
  - New internal groups (currently reserved for internal usage):
    `ip4`, `ip6`, `dns`, `fid`, `fport`, additionally `user` and another captures in lower case if
    mapping from tag `<F-*>` used in failregex (e. g. `user` by `<F-USER>`).
  * v.0.10 uses more precise date template handling, that can be theoretically incompatible to some
  user configurations resp. `datepattern`.
  * Since v0.10 fail2ban supports the matching of the IPv6 addresses, but not all ban actions are
  IPv6-capable now.

OBS-URL: https://build.opensuse.org/request/show/536273
OBS-URL: https://build.opensuse.org/package/show/security/fail2ban?expand=0&rev=83
2017-10-24 10:04:00 +00:00
Johannes Weberhofer
499398214d Accepting request 452855 from home:computersalat:devel:security
update to 0.9.6

OBS-URL: https://build.opensuse.org/request/show/452855
OBS-URL: https://build.opensuse.org/package/show/security/fail2ban?expand=0&rev=75
2017-01-27 17:09:05 +00:00
Johannes Weberhofer
7ac30d5336 Accepting request 369600 from home:weberho:branches:security
- Update to version 0.9.4
- Defined services which per default uses systemd logger
- The update to this versions allow to close boo#917818, as the logger-backends for several services are now centrally set in /etc/fail2ban/paths-opensuse.conf

OBS-URL: https://build.opensuse.org/request/show/369600
OBS-URL: https://build.opensuse.org/package/show/security/fail2ban?expand=0&rev=69
2016-03-10 12:14:45 +00:00
Johannes Weberhofer
1b961970e4 Accepting request 314731 from home:weberho:branches:security
Major update to version 0.9.2

OBS-URL: https://build.opensuse.org/request/show/314731
OBS-URL: https://build.opensuse.org/package/show/security/fail2ban?expand=0&rev=59
2015-07-01 19:56:17 +00:00