Форум русскоязычного сообщества Ubuntu


Хотите сделать посильный вклад в развитие Ubuntu и русскоязычного сообщества?
Помогите нам с документацией!

Автор Тема: fail2ban не добавляет правила в iptables ssh  (Прочитано 5689 раз)

0 Пользователей и 1 Гость просматривают эту тему.

Оффлайн mut

  • Автор темы
  • Новичок
  • *
  • Сообщений: 40
  • nuub
    • Просмотр профиля
fail2ban не добавляет правила в iptables ssh
« : 05 Декабря 2013, 14:16:26 »
Доброго времени суток. Собственно проблема в заголовке темы.
файл конфигурации jail.conf
[DEFAULT]
ignoreip = 127.0.0.1/8
bantime  = 600
maxretry = 2
backend = auto
usedns = warn
# ACTIONS
banaction = iptables-multiport
mta = sendmail
protocol = tcp
chain = INPUT
action_ = %(banaction)s[name=%(__name__)s, port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]

action_mw = %(banaction)s[name=%(__name__)s, port="%(port)s", protocol="%(protol)s", chain="%(chain)s"]
              %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s", protocol)s", chain="%(chain)s"]

action_mwl = %(banaction)s[name=%(__name__)s, port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
               %(mta)s-whois-lines[name=%(__name__)s, dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]
action = %(action_)s

[ssh]

enabled  = true
port     = ssh
filter   = sshd
logpath  = /var/log/auth.log
maxretry = 1
bantime = 600
action = iptables[name=sshd, port=ssh, protocol=tcp]
вывод fail2ban-client status
Status
|- Number of jail: 1
`- Jail list: ssh
вывод fail2ban-client status ssh
Status for the jail: ssh
|- filter
|  |- File list: /var/log/auth.log
|  |- Currently failed: 0
|  `- Total failed: 0
`- action
   |- Currently banned: 0
   |  `- IP list:
   `- Total banned: 0
вывод fail2ban-regex /var/log/auth.log /etc/fail2ban/filter.d/sshd.conf
Running tests
=============

Use regex file : /etc/fail2ban/filter.d/sshd.conf
Use log file   : /var/log/auth.log

Determined IP using DNS Reverse Lookup: mut-virtualbox = ['192.168.56.101']
Determined IP using DNS Reverse Lookup: mut-virtualbox = ['192.168.56.101']
Determined IP using DNS Reverse Lookup: mut-virtualbox = ['192.168.56.101']
Determined IP using DNS Reverse Lookup: mut-virtualbox = ['192.168.56.101']
Determined IP using DNS Reverse Lookup: mut-virtualbox = ['192.168.56.101']
Determined IP using DNS Reverse Lookup: mut-virtualbox = ['192.168.56.101']
Determined IP using DNS Reverse Lookup: mut-virtualbox = ['192.168.56.101']
Determined IP using DNS Reverse Lookup: mut-virtualbox = ['192.168.56.101']
Determined IP using DNS Reverse Lookup: mut-virtualbox = ['192.168.56.101']
Determined IP using DNS Reverse Lookup: mut-virtualbox = ['192.168.56.101']
Determined IP using DNS Reverse Lookup: mut-virtualbox = ['192.168.56.101']
Determined IP using DNS Reverse Lookup: mut-virtualbox = ['192.168.56.101']
Determined IP using DNS Reverse Lookup: mut-virtualbox = ['192.168.56.101']
Determined IP using DNS Reverse Lookup: mut-virtualbox = ['192.168.56.101']
Determined IP using DNS Reverse Lookup: mut-virtualbox = ['192.168.56.101']
Determined IP using DNS Reverse Lookup: mut-virtualbox = ['192.168.56.101']
Determined IP using DNS Reverse Lookup: mut-virtualbox = ['192.168.56.101']

Results
=======

Failregex: 56 total
|- #) [# of hits] regular expression
|  3) [32] ^\s*(?:\S+ )?(?:kernel: \[\d+\.\d+\] )?(?:@vserver_\S+ )?(?:(?:\[\d+\])?:\s+[\[\(]?sshd(?:\(\S+\))?[\]\)]?:?|[\[\(]?sshd(?:\(\S+\))?[\]\)]?:?(?:\[\d+\])?:)?\s*Failed (?:password|publickey) for .* from <HOST>(?: port \d*)?(?: ssh\d*)?\s*$
|  5) [3] ^\s*(?:\S+ )?(?:kernel: \[\d+\.\d+\] )?(?:@vserver_\S+ )?(?:(?:\[\d+\])?:\s+[\[\(]?sshd(?:\(\S+\))?[\]\)]?:?|[\[\(]?sshd(?:\(\S+\))?[\]\)]?:?(?:\[\d+\])?:)?\s*[iI](?:llegal|nvalid) user .* from <HOST>\s*$
|  8) [21] ^\s*(?:\S+ )?(?:kernel: \[\d+\.\d+\] )?(?:@vserver_\S+ )?(?:(?:\[\d+\])?:\s+[\[\(]?sshd(?:\(\S+\))?[\]\)]?:?|[\[\(]?sshd(?:\(\S+\))?[\]\)]?:?(?:\[\d+\])?:)?\s*(?:pam_unix\(sshd:auth\):\s)?authentication failure; logname=\S* uid=\S* euid=\S* tty=\S* ruser=\S* rhost=<HOST>(?:\s+user=.*)?\s*$
`-

Ignoreregex: 0 total

Summary
=======

Addresses found:
[3]
    192.168.56.1 (Tue Oct 22 18:17:06 2013)
    192.168.56.1 (Fri Nov 22 12:17:09 2013)
    192.168.56.1 (Tue Nov 26 12:36:41 2013)
    192.168.56.1 (Thu Dec 05 10:52:44 2013)
    192.168.56.101 (Thu Dec 05 11:03:03 2013)
    192.168.56.101 (Thu Dec 05 11:03:06 2013)
    192.168.56.101 (Thu Dec 05 11:03:12 2013)
    192.168.56.101 (Thu Dec 05 11:05:48 2013)
    192.168.56.101 (Thu Dec 05 11:09:05 2013)
    192.168.56.101 (Thu Dec 05 11:10:08 2013)
    192.168.56.101 (Thu Dec 05 11:11:08 2013)
    192.168.56.101 (Thu Dec 05 11:12:56 2013)
    192.168.56.101 (Thu Dec 05 11:16:30 2013)
    192.168.56.101 (Thu Dec 05 11:16:31 2013)
    192.168.56.101 (Thu Dec 05 11:16:36 2013)
    192.168.56.101 (Thu Dec 05 11:18:25 2013)
    192.168.56.101 (Thu Dec 05 11:25:24 2013)
    192.168.56.101 (Thu Dec 05 11:25:35 2013)
    192.168.56.101 (Thu Dec 05 11:31:27 2013)
    192.168.56.101 (Thu Dec 05 11:37:40 2013)
    192.168.56.101 (Thu Dec 05 11:37:41 2013)
    192.168.56.101 (Thu Dec 05 11:37:42 2013)
    192.168.56.101 (Thu Dec 05 11:37:42 2013)
    192.168.56.101 (Thu Dec 05 11:40:58 2013)
    192.168.56.101 (Thu Dec 05 11:46:35 2013)
    192.168.56.101 (Thu Dec 05 11:46:38 2013)
    192.168.56.101 (Thu Dec 05 11:46:41 2013)
    192.168.56.101 (Thu Dec 05 11:55:50 2013)
    192.168.56.101 (Thu Dec 05 12:01:02 2013)
    192.168.56.101 (Thu Dec 05 13:07:03 2013)
    192.168.56.101 (Thu Dec 05 13:07:06 2013)
    192.168.56.101 (Thu Dec 05 13:07:09 2013)
[5]
    192.168.56.1 (Thu Dec 05 10:52:39 2013)
    192.168.56.101 (Thu Dec 05 11:46:33 2013)
    192.168.56.101 (Thu Dec 05 13:07:00 2013)
[8]
    192.168.56.1 (Tue Oct 22 18:17:04 2013)
    192.168.56.1 (Fri Nov 22 12:17:07 2013)
    192.168.56.1 (Tue Nov 26 12:36:39 2013)
    192.168.56.1 (Thu Dec 05 10:52:42 2013)
    192.168.56.101 (Thu Dec 05 11:03:00 2013)
    192.168.56.101 (Thu Dec 05 11:03:09 2013)
    192.168.56.101 (Thu Dec 05 11:05:45 2013)
    192.168.56.101 (Thu Dec 05 11:09:03 2013)
    192.168.56.101 (Thu Dec 05 11:10:06 2013)
    192.168.56.101 (Thu Dec 05 11:11:06 2013)
    192.168.56.101 (Thu Dec 05 11:12:55 2013)
    192.168.56.101 (Thu Dec 05 11:16:33 2013)
    192.168.56.101 (Thu Dec 05 11:18:22 2013)
    192.168.56.101 (Thu Dec 05 11:25:22 2013)
    192.168.56.101 (Thu Dec 05 11:25:33 2013)
    192.168.56.101 (Thu Dec 05 11:31:25 2013)
    192.168.56.101 (Thu Dec 05 11:40:55 2013)
    192.168.56.101 (Thu Dec 05 11:46:34 2013)
    192.168.56.101 (Thu Dec 05 11:55:48 2013)
    192.168.56.101 (Thu Dec 05 12:01:00 2013)
    192.168.56.101 (Thu Dec 05 13:07:01 2013)

Date template hits:
41581 hit(s): MONTH Day Hour:Minute:Second

Success, the total number of match is 56

However, look at the above section 'Running tests' which could contain important
information.
« Последнее редактирование: 05 Декабря 2013, 14:19:20 от mut »

Оффлайн ArcFi

  • Старожил
  • *
  • Сообщений: 15189
    • Просмотр профиля
    • aetera.net

Оффлайн mut

  • Автор темы
  • Новичок
  • *
  • Сообщений: 40
  • nuub
    • Просмотр профиля
Re: fail2ban не добавляет правила в iptables ssh
« Ответ #2 : 09 Декабря 2013, 11:55:06 »
спасибо. с бэкэндом polling все работает

 

Страница сгенерирована за 0.018 секунд. Запросов: 21.