Hi Samuel,

Thank you for sharing your configuration files!  Would you mind to
submit a "proper" pull request with them at

https://github.com/fail2ban/fail2ban/pulls

upon a brief look I am afraid they might be a bit 'too flexible' thus
theoretically allowing for injection attacks, e.g. having .*
before AND after .* pretty much demolishes any anchoring at the end you
have.  Have a look at
https://github.com/fail2ban/fail2ban/blob/HEAD/FILTERS regarding some
"hints" on regular expressions and test cases.

Thanks in advance for the PR.

On Wed, 14 May 2014, Samuel Thibault wrote:

> Package: fail2ban
> Version: 0.8.13-1
> Severity: normal
> Tags: patch

> Hello,

> We use fail2ban for openvpn, here are the rules we are using.

-- 
Yaroslav O. Halchenko, Ph.D.
http://neuro.debian.net http://www.pymvpa.org http://www.fail2ban.org
Research Scientist,            Psychological and Brain Sciences Dept.
Dartmouth College, 419 Moore Hall, Hinman Box 6207, Hanover, NH 03755
Phone: +1 (603) 646-9834                       Fax: +1 (603) 646-1419
WWW:   http://www.linkedin.com/in/yarik        


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to