parent
a1783e1929
commit
8f487f6165
@ -1,75 +0,0 @@
|
||||
commit d561a4c2bbc336db70d5923cf630813bc51dc3ee
|
||||
Author: Yaroslav Halchenko <debian@onerussian.com>
|
||||
Date: Mon Jan 28 09:54:08 2013 -0500
|
||||
|
||||
BF: do not rely on scripts being under /usr -- might differ eg on Fedora -- rely on import of common.version (Closes gh-112)
|
||||
|
||||
This is also not ideal, since if there happens to be some systemwide common.version -- we are doomed
|
||||
|
||||
but otherwise, we cannot keep extending comparison check to /bin, /sbin whatelse
|
||||
|
||||
diff --git a/fail2ban-client b/fail2ban-client
|
||||
index 1d8eb15..13d018e 100755
|
||||
--- a/fail2ban-client
|
||||
+++ b/fail2ban-client
|
||||
@@ -27,12 +27,13 @@ import getopt, time, shlex, socket
|
||||
|
||||
# Inserts our own modules path first in the list
|
||||
# fix for bug #343821
|
||||
-if os.path.abspath(__file__).startswith('/usr/'):
|
||||
- # makes sense to use system-wide library iff -client is also under /usr/
|
||||
+try:
|
||||
+ from common.version import version
|
||||
+except ImportError, e:
|
||||
sys.path.insert(1, "/usr/share/fail2ban")
|
||||
+ from common.version import version
|
||||
|
||||
-# Now we can import our modules
|
||||
-from common.version import version
|
||||
+# Now we can import the rest of modules
|
||||
from common.protocol import printFormatted
|
||||
from client.csocket import CSocket
|
||||
from client.configurator import Configurator
|
||||
diff --git a/fail2ban-regex b/fail2ban-regex
|
||||
index a42ed96..f9bc72c 100755
|
||||
--- a/fail2ban-regex
|
||||
+++ b/fail2ban-regex
|
||||
@@ -26,13 +26,14 @@ import getopt, sys, time, logging, os
|
||||
|
||||
# Inserts our own modules path first in the list
|
||||
# fix for bug #343821
|
||||
-if os.path.abspath(__file__).startswith('/usr/'):
|
||||
- # makes sense to use system-wide library iff -regex is also under /usr/
|
||||
- sys.path.insert(1, "/usr/share/fail2ban")
|
||||
+try:
|
||||
+ from common.version import version
|
||||
+except ImportError, e:
|
||||
+ sys.path.insert(1, "/usr/share/fail2ban")
|
||||
+ from common.version import version
|
||||
|
||||
from client.configparserinc import SafeConfigParserWithIncludes
|
||||
from ConfigParser import NoOptionError, NoSectionError, MissingSectionHeaderError
|
||||
-from common.version import version
|
||||
from server.filter import Filter
|
||||
from server.failregex import RegexException
|
||||
|
||||
diff --git a/fail2ban-server b/fail2ban-server
|
||||
index bd86e6c..0f3410c 100755
|
||||
--- a/fail2ban-server
|
||||
+++ b/fail2ban-server
|
||||
@@ -26,11 +26,12 @@ import getopt, sys, logging, os
|
||||
|
||||
# Inserts our own modules path first in the list
|
||||
# fix for bug #343821
|
||||
-if os.path.abspath(__file__).startswith('/usr/'):
|
||||
- # makes sense to use system-wide library iff -server is also under /usr/
|
||||
+try:
|
||||
+ from common.version import version
|
||||
+except ImportError, e:
|
||||
sys.path.insert(1, "/usr/share/fail2ban")
|
||||
+ from common.version import version
|
||||
|
||||
-from common.version import version
|
||||
from server.server import Server
|
||||
|
||||
# Gets the instance of the logger.
|
@ -1,11 +0,0 @@
|
||||
diff -up fail2ban-0.9-1f1a561/files/redhat-initd.init fail2ban-0.9-1f1a561/files/redhat-initd
|
||||
--- fail2ban-0.9-1f1a561/files/redhat-initd.init 2013-09-24 16:57:09.515712728 -0600
|
||||
+++ fail2ban-0.9-1f1a561/files/redhat-initd 2013-09-24 16:57:52.435590284 -0600
|
||||
@@ -1,6 +1,6 @@
|
||||
#!/bin/bash
|
||||
#
|
||||
-# chkconfig: 345 92 08
|
||||
+# chkconfig: - 92 08
|
||||
# processname: fail2ban-server
|
||||
# config: /etc/fail2ban/fail2ban.conf
|
||||
# pidfile: /var/run/fail2ban/fail2ban.pid
|
@ -1,12 +0,0 @@
|
||||
diff -up fail2ban-0.8.10/config/fail2ban.conf.log2syslog fail2ban-0.8.10/config/fail2ban.conf
|
||||
--- fail2ban-0.8.10/config/fail2ban.conf.log2syslog 2013-06-12 11:21:12.000000000 -0600
|
||||
+++ fail2ban-0.8.10/config/fail2ban.conf 2013-06-12 16:12:48.233512068 -0600
|
||||
@@ -30,7 +30,7 @@ loglevel = 3
|
||||
# (e.g. /etc/logrotate.d/fail2ban on Debian systems)
|
||||
# Values: STDOUT STDERR SYSLOG file Default: /var/log/fail2ban.log
|
||||
#
|
||||
-logtarget = /var/log/fail2ban.log
|
||||
+logtarget = SYSLOG
|
||||
|
||||
# Option: socket
|
||||
# Notes.: Set the socket file. This is used to communicate with the daemon. Do
|
@ -1,211 +0,0 @@
|
||||
diff -up fail2ban-0.9-1f1a561/config/jail.conf.logfiles fail2ban-0.9-1f1a561/config/jail.conf
|
||||
--- fail2ban-0.9-1f1a561/config/jail.conf.logfiles 2013-09-08 05:02:35.000000000 -0600
|
||||
+++ fail2ban-0.9-1f1a561/config/jail.conf 2013-09-24 17:01:40.264930006 -0600
|
||||
@@ -152,20 +152,18 @@ action = %(action_)s
|
||||
[sshd]
|
||||
|
||||
port = ssh
|
||||
-logpath = /var/log/auth.log
|
||||
- /var/log/sshd.log
|
||||
+logpath = /var/log/secure
|
||||
|
||||
[sshd-ddos]
|
||||
|
||||
port = ssh
|
||||
-logpath = /var/log/auth.log
|
||||
- /var/log/sshd.log
|
||||
+logpath = /var/log/secure
|
||||
|
||||
[dropbear]
|
||||
|
||||
port = ssh
|
||||
filter = sshd
|
||||
-logpath = /var/log/dropbear
|
||||
+logpath = /var/log/secure
|
||||
|
||||
|
||||
# Generic filter for PAM. Has to be used with action which bans all
|
||||
@@ -175,12 +173,12 @@ logpath = /var/log/dropbear
|
||||
|
||||
# pam-generic filter can be customized to monitor specific subset of 'tty's
|
||||
banaction = iptables-allports
|
||||
-logpath = /var/log/auth.log
|
||||
+logpath = /var/log/secure
|
||||
|
||||
[xinetd-fail]
|
||||
|
||||
banaction = iptables-multiport-log
|
||||
-logpath = /var/log/daemon.log
|
||||
+logpath = /var/log/messages
|
||||
maxretry = 2
|
||||
|
||||
# .. custom jails
|
||||
@@ -194,7 +192,7 @@ filter = sshd
|
||||
action = hostsdeny[daemon_list=sshd]
|
||||
sendmail-whois[name=SSH, dest=you@example.com]
|
||||
ignoreregex = for myuser from
|
||||
-logpath = /var/log/sshd.log
|
||||
+logpath = /var/log/secure
|
||||
|
||||
# Here we use blackhole routes for not requiring any additional kernel support
|
||||
# to store large volumes of banned IPs
|
||||
@@ -203,7 +201,7 @@ logpath = /var/log/sshd.log
|
||||
|
||||
filter = sshd
|
||||
action = route
|
||||
-logpath = /var/log/sshd.log
|
||||
+logpath = /var/log/secure
|
||||
|
||||
# Here we use a combination of Netfilter/Iptables and IPsets
|
||||
# for storing large volumes of banned IPs
|
||||
@@ -214,13 +212,13 @@ logpath = /var/log/sshd.log
|
||||
|
||||
filter = sshd
|
||||
action = iptables-ipset-proto4[name=SSH, port=ssh, protocol=tcp]
|
||||
-logpath = /var/log/sshd.log
|
||||
+logpath = /var/log/secure
|
||||
|
||||
[sshd-iptables-ipset6]
|
||||
|
||||
filter = sshd
|
||||
action = iptables-ipset-proto6[name=SSH, port=ssh, protocol=tcp, bantime=600]
|
||||
-logpath = /var/log/sshd.log
|
||||
+logpath = /var/log/secure
|
||||
|
||||
# This jail uses ipfw, the standard firewall on FreeBSD. The "ignoreip"
|
||||
# option is overridden in this jail. Moreover, the action "mail-whois" defines
|
||||
@@ -231,7 +229,7 @@ logpath = /var/log/sshd.log
|
||||
filter = sshd
|
||||
action = ipfw[localhost=192.168.0.1]
|
||||
sendmail-whois[name="SSH,IPFW", dest=you@example.com]
|
||||
-logpath = /var/log/auth.log
|
||||
+logpath = /var/log/secure
|
||||
|
||||
# bsd-ipfw is ipfw used by BSD. It uses ipfw tables.
|
||||
# table number must be unique.
|
||||
@@ -243,14 +241,14 @@ logpath = /var/log/auth.log
|
||||
|
||||
filter = sshd
|
||||
action = bsd-ipfw[port=ssh,table=1]
|
||||
-logpath = /var/log/auth.log
|
||||
+logpath = /var/log/secure
|
||||
|
||||
# PF is a BSD based firewall
|
||||
[ssh-pf]
|
||||
|
||||
filter = sshd
|
||||
action = pf
|
||||
-logpath = /var/log/sshd.log
|
||||
+logpath = /var/log/secure
|
||||
maxretry= 5
|
||||
|
||||
#
|
||||
@@ -260,7 +258,7 @@ maxretry= 5
|
||||
[apache-auth]
|
||||
|
||||
port = http,https
|
||||
-logpath = /var/log/apache*/*error.log
|
||||
+logpath = /var/log/httpd/*error_log
|
||||
|
||||
# Ban hosts which agent identifies spammer robots crawling the web
|
||||
# for email addresses. The mail outputs are buffered.
|
||||
@@ -268,21 +266,20 @@ logpath = /var/log/apache*/*error.log
|
||||
[apache-badbots]
|
||||
|
||||
port = http,https
|
||||
-logpath = /var/log/apache*/*access.log
|
||||
- /var/www/*/logs/access_log
|
||||
+logpath = /var/log/httpd/*access_log
|
||||
bantime = 172800
|
||||
maxretry = 1
|
||||
|
||||
[apache-noscript]
|
||||
|
||||
port = http,https
|
||||
-logpath = /var/log/apache*/*error.log
|
||||
+logpath = /var/log/httpd/*error_log
|
||||
maxretry = 6
|
||||
|
||||
[apache-overflows]
|
||||
|
||||
port = http,https
|
||||
-logpath = /var/log/apache*/*error.log
|
||||
+logpath = /var/log/httpd/*error_log
|
||||
maxretry = 2
|
||||
|
||||
# Ban attackers that try to use PHP's URL-fopen() functionality
|
||||
@@ -292,7 +289,7 @@ maxretry = 2
|
||||
[php-url-fopen]
|
||||
|
||||
port = http,https
|
||||
-logpath = /var/www/*/logs/access_log
|
||||
+logpath = /var/log/httpd/*access_log
|
||||
|
||||
[suhosin]
|
||||
|
||||
@@ -325,7 +322,7 @@ logpath = /var/log/sogo/sogo.log
|
||||
|
||||
filter = apache-auth
|
||||
action = hostsdeny
|
||||
-logpath = /var/log/apache*/*error.log
|
||||
+logpath = /var/log/httpd/*error_log
|
||||
maxretry = 6
|
||||
|
||||
[3proxy]
|
||||
@@ -347,7 +344,7 @@ logpath = /var/log/proftpd/proftpd.log
|
||||
[pure-ftpd]
|
||||
|
||||
port = ftp,ftp-data,ftps,ftps-data
|
||||
-logpath = /var/log/auth.log
|
||||
+logpath = /var/log/secure
|
||||
maxretry = 6
|
||||
|
||||
[vsftpd]
|
||||
@@ -355,7 +352,7 @@ maxretry = 6
|
||||
port = ftp,ftp-data,ftps,ftps-data
|
||||
logpath = /var/log/vsftpd.log
|
||||
# or overwrite it in jails.local to be
|
||||
-# logpath = /var/log/auth.log
|
||||
+# logpath = /var/log/secure
|
||||
# if you want to rely on PAM failed login attempts
|
||||
# vsftpd's failregex should match both of those formats
|
||||
|
||||
@@ -390,12 +387,12 @@ logpath = /root/path/to/assp/logs/maill
|
||||
[courier-smtp]
|
||||
|
||||
port = smtp,ssmtp,submission
|
||||
-logpath = /var/log/mail.log
|
||||
+logpath = /var/log/maillog
|
||||
|
||||
[postfix]
|
||||
|
||||
port = smtp,ssmtp,submission
|
||||
-logpath = /var/log/mail.log
|
||||
+logpath = /var/log/maillog
|
||||
|
||||
# The hosts.deny path can be defined with the "file" argument if it is
|
||||
# not in /etc.
|
||||
@@ -427,7 +424,7 @@ logpath = /var/log/exim/mainlog
|
||||
[courier-auth]
|
||||
|
||||
port = smtp,ssmtp,submission,imap2,imap3,imaps,pop3,pop3s
|
||||
-logpath = /var/log/mail.log
|
||||
+logpath = /var/log/maillog
|
||||
|
||||
|
||||
[sasl]
|
||||
@@ -436,12 +433,12 @@ port = smtp,ssmtp,submission,imap2,i
|
||||
# You might consider monitoring /var/log/mail.warn instead if you are
|
||||
# running postfix since it would provide the same log lines at the
|
||||
# "warn" level but overall at the smaller filesize.
|
||||
-logpath = /var/log/mail.log
|
||||
+logpath = /var/log/maillog
|
||||
|
||||
[dovecot]
|
||||
|
||||
port = smtp,ssmtp,submission,imap2,imap3,imaps,pop3,pop3s
|
||||
-logpath = /var/log/mail.log
|
||||
+logpath = /var/log/maillog
|
||||
|
||||
[perdition]
|
||||
|
@ -1,9 +0,0 @@
|
||||
/var/log/fail2ban.log {
|
||||
missingok
|
||||
notifempty
|
||||
size 30k
|
||||
create 0600 root root
|
||||
postrotate
|
||||
/usr/bin/fail2ban-client set logtarget SYSLOG 2> /dev/null || true
|
||||
endscript
|
||||
}
|
@ -1,18 +0,0 @@
|
||||
commit f8983872ad4297ddb3017f4818edd08892dd2129
|
||||
Author: Yaroslav Halchenko <debian@onerussian.com>
|
||||
Date: Fri Feb 1 16:07:00 2013 -0500
|
||||
|
||||
BF: return str(host) to avoid spurious characters in the logs (Close gh-113)
|
||||
|
||||
thanks to opoplawski@github
|
||||
|
||||
diff --git a/server/failregex.py b/server/failregex.py
|
||||
index 8ce9597..b194d47 100644
|
||||
--- a/server/failregex.py
|
||||
+++ b/server/failregex.py
|
||||
@@ -130,4 +130,4 @@ class FailRegex(Regex):
|
||||
s = self._matchCache.string
|
||||
r = self._matchCache.re
|
||||
raise RegexException("No 'host' found in '%s' using '%s'" % (s, r))
|
||||
- return host
|
||||
+ return str(host)
|
Loading…
Reference in new issue