Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 01 Jul 2015 07:38:32 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 201108] security/py-fail2ban: ssh log entries are ignored
Message-ID:  <bug-201108-13-BKDAHW88io@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-201108-13@https.bugs.freebsd.org/bugzilla/>
References:  <bug-201108-13@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201108

--- Comment #7 from oz42@oz42.eu ---
This is because with ipfw.conf, rules are added at the end which is pointless
because my last rules are

01400 reset log logamount 20 tcp from any to me in via vtnet0
01500 unreach port log logamount 20 udp from any to me in via vtnet0
01600 deny log logamount 20 ip from any to me in via vtnet0

I need to insert the fail2ban rules at the top, so my 1st line of the ruleset
is

00100 deny log logamount 20 ip from table(1) to me

and ipfw-oz.conf adds rules to table 1.

if we could insert rules ('iptables -I' in Linux speech) this would not be
necessary.

-- 
You are receiving this mail because:
You are the assignee for the bug.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-201108-13-BKDAHW88io>