Hi

You are rightfully confused. It should definitely be available (I did not
think of that obvious case). Maybe this is an ipv6 issue.

I'll see if I can find a solution.

This local computer, was it connected using ipv4 or ipv6?

/ Ola

Sent from a phone
Den 10 jun 2016 01:39 skrev "Mitch Deoudes" <mi...@houseofpain.org>:

>
>
> On 6/9/2016 5:36 PM, Ola Lundqvist wrote:
>
>> Hi Mitch
>>
>> I'm not fully sure whether the remote IP address is available through
>> the socket. If it is, then we could probably fetch it in some way.
>>
>> A possible workaround would be to avoid banning 0.0.0.0.
>>
>> Patches are welcome.
>>
>>
> I'm a bit confused...  The current code doesn't fetch the remote IP at
> all?  (It's not clear to me that it's an IPv6 vs IP4 issue in my case.  I
> regularly get ssh hack attempts from IPv4 addresses.  So I'm not sure where
> the 0.0.0.0 is coming from.)  If so, then how does blacklisting *ever* work?
>
> Hmm - looks like maybe that's true.  I just checked my vnc log, and saw
> the following after connecting from another machine on my local LAN.  Looks
> like all connections are reported as 0.0.0.0.  I'm really surprised this
> has gone unnoticed (judging by the low post rate on this bug) for so long...
>
>     Thu Jun  9 19:20:46 2016
>     Connections: accepted: 0.0.0.0::5432
>
> I'm afraid a patch is beyond me, though.  I've got a CS degree, but it's
> about 3 decades old, so the amount of time it would take for me to sift
> through the code to find the problem is likely very large.
>
> Meantime, I'm happy to script up a fail2ban jail, if the IP info is
> available elsewhere.  I've seen mention that iptables can be configured to
> log such stuff, but haven't yet had the time to figure it out.  Suggestions
> welcome.
>
> mitch
>

Reply via email to