Package: fail2ban
Version: 0.11.2-2
Severity: normal
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Dear Maintainer,
we have problem using fail2ban on proftpd and sshd jails on Debian Bullseye and
Buster.
we have pretty simple/standard config, with proftpd jail enabled in our file
/etc/fail2ban/jail.d/proftpd.conf
[proftpd]
enabled = true
Some hosts use default banaction, some use banaction with ipset.
We use iptables-legacy, because we use firehol for generating our firewall.
Problem is, proftpd and sshd jails are never registered in firewall, but
fail2ban loads them.
Some other jails are loaded and registered in firewall without problems
(mostly...).
For example:
# iptables -L -n -v | grep f2b
140K 8379K DROP all -- * * 0.0.0.0/0 0.0.0.0/0
match-set f2b-firehol src
# fail2ban-client status
Status
|- Number of jail: 3
`- Jail list: firehol, proftpd, sshd
# fail2ban-client status proftpd
Status for the jail: proftpd
|- Filter
| |- Currently failed: 0
| |- Total failed: 0
| `- File list: /var/log/proftpd/proftpd.log
`- Actions
|- Currently banned: 0
|- Total banned: 0
`- Banned IP list:
and this is in log
2022-05-11 12:51:09,596 fail2ban.jail [732814]: INFO Creating new
jail 'proftpd'
2022-05-11 12:51:09,596 fail2ban.jail [732814]: INFO Jail
'proftpd' uses pyinotify {}
2022-05-11 12:51:09,596 fail2ban.filter [732814]: DEBUG Setting
usedns = warn for FilterPyinotify(Jail('proftpd'))
2022-05-11 12:51:09,596 fail2ban.filter [732814]: DEBUG Created
FilterPyinotify(Jail('proftpd'))
2022-05-11 12:51:09,599 fail2ban.filter [732814]: DEBUG Setting
usedns = warn for FilterPyinotify(Jail('proftpd'))
2022-05-11 12:51:09,599 fail2ban.server [732814]: DEBUG prefregex:
'^(?:\\[\\])?\\s*(?:<[^.]+\\.[^.]+>\\s+)?(?:\\S+\\s+)?(?:kernel:\\s?\\[
*\\d+\\.\\d+\\]:?\\s+)?(?:@vserver_\\S+\\s+)?(?:(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?proftpd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?proftpd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)\\s+)?(?:\\[ID
\\d+ \\S+\\]\\s+)?\\S+ \\(\\S+\\[<HOST>\\]\\)[: -]+
<F-CONTENT>(?:USER|SECURITY|Maximum) .+</F-CONTENT>$'
2022-05-11 12:51:09,601 fail2ban.filter [732814]: INFO Added
logfile: '/var/log/proftpd/proftpd.log' (pos = 3553, hash =
621b6cc23a2073ed6173a4b7bff999ac9705b311)
2022-05-11 12:51:09,602 fail2ban.filterpyinotify[732814]: DEBUG New <Watch
wd=1 path=/var/log/proftpd mask=1073745280 proc_fun=None auto_add=False
exclude_filter=<function WatchManager.<lambda> at 0x7fe14c092ca0> dir=True >
2022-05-11 12:51:09,602 fail2ban.filterpyinotify[732814]: DEBUG Added monitor
for the parent directory /var/log/proftpd
2022-05-11 12:51:09,602 fail2ban.filterpyinotify[732814]: DEBUG New <Watch
wd=2 path=/var/log/proftpd/proftpd.log mask=2 proc_fun=None auto_add=False
exclude_filter=<function WatchManager.<lambda> at 0x7fe14c092ca0> dir=False >
2022-05-11 12:51:09,602 fail2ban.filterpyinotify[732814]: DEBUG Added file
watcher for /var/log/proftpd/proftpd.log
2022-05-11 12:51:09,602 fail2ban.filterpyinotify[732814]: MSG Log absence
detected (possibly rotation) for /var/log/proftpd/proftpd.log, reason: INITIAL
of /var/log/proftpd/proftpd.log
2022-05-11 12:51:09,602 fail2ban.CommandAction [732814]: DEBUG Set name =
'proftpd'
2022-05-11 12:51:09,611 fail2ban.jail [732814]: DEBUG Starting jail
'proftpd'
2022-05-11 12:51:09,611 fail2ban.filterpyinotify[732814]: DEBUG [proftpd]
filter started (pyinotifier)
2022-05-11 12:51:09,611 fail2ban.filterpyinotify[732814]: MSG Log presence
detected for file /var/log/proftpd/proftpd.log
2022-05-11 12:51:09,611 fail2ban.jail [732814]: INFO Jail
'proftpd' started
2022-05-11 12:51:23,025 fail2ban.jail [732814]: DEBUG Stopping jail
'proftpd'
2022-05-11 12:51:23,025 fail2ban.filter [732814]: INFO Removed
logfile: '/var/log/proftpd/proftpd.log'
2022-05-11 12:51:23,025 fail2ban.filterpyinotify[732814]: DEBUG Removed file
watcher for /var/log/proftpd/proftpd.log
2022-05-11 12:51:23,025 fail2ban.filterpyinotify[732814]: DEBUG Removed
monitor for the parent directory /var/log/proftpd
2022-05-11 12:51:23,127 fail2ban.filterpyinotify[732814]: DEBUG [proftpd]
filter exited (pyinotifier)
2022-05-11 12:51:23,628 fail2ban.actions [732814]: NOTICE [proftpd]
Flush ticket(s) with iptables-ipset-proto6-drop
2022-05-11 12:51:23,628 fail2ban.actions [732814]: DEBUG Unbanned 0,
0 ticket(s) in 'proftpd'
2022-05-11 12:51:23,628 fail2ban.actions [732814]: DEBUG proftpd:
action iptables-ipset-proto6-drop terminated
2022-05-11 12:51:23,629 fail2ban.filterpyinotify[732814]: DEBUG [proftpd]
filter terminated (pyinotifier)
2022-05-11 12:51:23,629 fail2ban.jail [732814]: INFO Jail
'proftpd' stopped
2022-05-11 12:51:23,765 fail2ban.jail [733102]: INFO Creating new
jail 'proftpd'
2022-05-11 12:51:23,765 fail2ban.jail [733102]: INFO Jail
'proftpd' uses pyinotify {}
2022-05-11 12:51:23,773 fail2ban.filter [733102]: INFO Added
logfile: '/var/log/proftpd/proftpd.log' (pos = 3553, hash =
621b6cc23a2073ed6173a4b7bff999ac9705b311)
2022-05-11 12:51:23,783 fail2ban.jail [733102]: INFO Jail
'proftpd' started
What can cause the problems? I remember, there were some lock problems when
using iptables-legacy, but i don't see any error message in logs
With regards,
Libor
- -- System Information:
Debian Release: bookworm/sid
APT prefers experimental
APT policy: (700, 'experimental'), (700, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 5.17.0-1-amd64 (SMP w/8 CPU threads; PREEMPT)
Locale: LANG=cs_CZ.UTF-8, LC_CTYPE=cs_CZ.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages fail2ban depends on:
ii lsb-base 11.1.0
ii python3 3.10.4-1+b1
Versions of packages fail2ban recommends:
ii iptables 1.8.7-1
ii python3-pyinotify 0.9.6-1.3
pn python3-systemd <none>
ii whois 5.5.13
Versions of packages fail2ban suggests:
pn mailx <none>
pn monit <none>
ii rsyslog [system-log-daemon] 8.2204.1-1
ii sqlite3 3.38.5-1
-----BEGIN PGP SIGNATURE-----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=FTmp
-----END PGP SIGNATURE-----