Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 26 Jun 2015 12:12:25 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 201108] security/py-fail2ban: ssh log entries are ignored
Message-ID:  <bug-201108-13-vPUT2F2Q10@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-201108-13@https.bugs.freebsd.org/bugzilla/>
References:  <bug-201108-13@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201108

--- Comment #4 from Jason Unovitch <jason.unovitch@gmail.com> ---
(In reply to oz42 from comment #3)

Ok, so it looked like you had adapted your configuration as you went since you
started with IPTables.  Starting from the bottom the issue seems to be ipfw(8)
configuration related since that is returning an error when it gets a valid IP
address from Fail2Ban.

2015-06-25 18:04:09,540 fail2ban.action         [605]: ERROR   ipfw table 1
delete 5.190.61.182 -- stdout: ''
2015-06-25 18:04:09,540 fail2ban.action         [605]: ERROR   ipfw table 1
delete 5.190.61.182 -- stderr: 'ipfw: setsockopt(IP_FW_TABLE_XDEL): No such
process\n'
2015-06-25 18:04:09,541 fail2ban.action         [605]: ERROR   ipfw table 1
delete 5.190.61.182 -- returned 71

If you post the link to your forum thread we can carry on the discussion there.
 I didn't seem to see it.

-- 
You are receiving this mail because:
You are the assignee for the bug.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-201108-13-vPUT2F2Q10>