Package: fail2ban
Version: 0.7.4-3
Severity: wishlist

I'm tempted to give this higher severity.  It's very hard to figure
out how to use this package, or at least to customize it, with current
documentation.  Even after reading the provided docs (both man and
/usr/share/doc) and visiting the web site, I'm pretty baffled.  And
I've been using earlier versions of the program!

One can make informed guesses, but it shouldn't be necessary to guess.

More overall orientation is needed.  The docs do provide the overall
purpose of the program, but the next level of detail down is missing.

What are the parts of the system (client, server, entries in iptables,
apparently--some of this becomes apparent on the man pages)?  Some of
the documentation seems to imply local customization can be done
entirely from the client.  Is that true?  Is that preferred?

What are the basic concepts of the system?  What's a jail?  What is
the difference between the configuration subdirectories (some help on
http://fail2ban.sourceforge.net/wiki/index.php/MANUAL_0_8)?

What is the syntax of the configuration file?  There is clearly some
template system at work--what is it?  It also looks as if there are
some global options that may be overriddent for the monitoring of a
particular application.

What are the keywords and what do they mean?

How does fail2ban interact with other systems (e.g. firewall front
ends) or administrators who might mess around with the iptables?  For
example, are such combinations a no-no?  Do they risk blowing away
fail2ban's settings?

How do the overrides work?  I first had the impression that to
override foo.conf you copied it to foo.conf.local and then modified
it--foo.conf would not be read at all.  However, comments in
jail.conf,
--------------------------------------------------
# Default action to take: ban & send an e-mail with whois report
# to the destemail. Copy/paste+uncomment next 2 lines into jail.local
# to activate
#action = iptables[name=%(__name__)s, port=%(port)s]
#                 mail-whois[name=%(__name__)s, dest=%(destemail)s].
-----------------------------------------------------
indicate 1) the correct file name is foo.local,
2) that file supplements foo.conf;
3) apparently foo.local overrides variable definitions without needing
to comment out the original.

The advice in that comment is also wrong.  I followed it and got
ConfigParser.MissingSectionHeaderError: File contains no section headers.
file: /etc/fail2ban/jail.local, line: 1
'action = iptables[name=%(__name__)s, port=%(port)s]\n'
 failed!
when I tried to restart.  Adding a [DEFAULT] header got it going,
though I'm a little unsure whether I should have copied the other
entries over as well.

The comments in the configuration files are cryptic:
----------------------------------------
# Option:  fwstart
# Notes.:  command executed once at the start of Fail2Ban.
# Values:  CMD
#
actionstart = touch <tmpfile>
-------------------------------------------------
Huh?  What's fwstart?  And again, what's the syntax.

The man page, among other places, uses syntax like <JAIL>.  Is that a
number?  A string?

The Debian package suggests python-gamin, and the web site mentions
gamin as well.  Neither provide much indication of how it's used.  I
guess from the Debian packaging it's not required, and I guess from
the gamin site that fail2ban can monitor more efficiently if the
package is present.

The web site is a mixed blessing.  For example,
http://fail2ban.sourceforge.net/wiki/index.php/FAQ_english#Configuration
says "There is only one configuration file, where Fail2ban can be
whole configurated, this file is located at: /etc/fail2ban.conf".  Not
true any more (or is that just a Debian thing?).

As a specific example, I doubt I would have found where to customize
the email notification without your specific guidance (from a
different bug).

BTW, TODO.Debian includes moving to a split config; it's probably time
to remove that item :)

-- System Information:
Debian Release: 4.0
  APT prefers testing
  APT policy: (990, 'testing'), (990, 'stable'), (50, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.4.27advncdfs
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages fail2ban depends on:
ii  iptables                1.3.6.0debian1-3 administration tools for packet fi
ii  lsb-base                3.1-15           Linux Standard Base 3.1 init scrip
ii  python                  2.4.3-11         An interactive high-level object-o
ii  python-central          0.5.10           register and build utility for Pyt
ii  python2.4               2.4.3-8          An interactive high-level object-o

fail2ban recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to