On Sat, Oct 01, 2005 at 03:04:20AM -0400, Yaroslav Halchenko wrote:
> Hi Joshua,
> 
> Thank you for you feedback. If you have a moment
> could you please give a try to the "fixed" revision. I've placed in
> changelog entry which states that it is necessary to update config file
> to have the breach closed
> 
> http://itanix.rutgers.edu/rumba/dists/unstable/perspect/binary-all/net/fail2ban_0.5.4-5pre1_all.deb
> 
> Do you think that the solution I've proposed is sufficient to close the
> bug?

Hi Yaroslav, sorry for my uselessly late reply.

The approach should work but I have two concerns.  Please consider them
yourself.

1) The package does not on install make it clear (at least with my
debian configuration) that replacing the configuration file is necessary
to close the bug.

I'm not even sure how this would be done in the debian world, save
perhaps an email to the system owner?

2) The regex is not verifiable nor even understandable by me.  I accept
that sophisticated regex has its place, but it is effectively a bit of a
programming language, and I think configfiles should not really contain
significant chunks of code, especially ones that are moderately opaque.

I'm sure I could go to some effort to read the python regex docs to find
out what is going on there, but I was hoping for something that would be
apparent to any admin so it could be vetted and/or updated as necessary.

Is this a reasonable approach?

 1)  Regex which identifies a false login.  This can be as simple as
     before.  If someone logs in as  "illegal user" to create a false
     positive, so be it.

  2) Second pattern which simply identifies the IP address component of
     the line.

I think these can both be kept simple.

Should I be sending these to the upstream author, or will he/she
probably see all this anyway.


Aside: Many thanks to my debian maintainers.  I should buy you all a
beer.

-josh


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to