Package: fail2ban
Version: 0.6.0-3
Severity: minor

If two users access a host with fail2ban from the same originating ip,
login failures from one of them will also lock the other one out.

I've been using a small change in the rules that, I believe, will block
only new connects instead of already established one. This way, at
least, another users' already running ssh sessions will not be suddenly
frozen by someone/something other tripping fail2ban. New connects will
still be blocked from/to any source/user as the approach is based on ip
address blocking.

I changed the INPU rules in the config to say:

@@ -134,13 +134,13 @@
 #
 fwstart = iptables -N fail2ban-%(__name__)s
           iptables -A fail2ban-%(__name__)s -j RETURN
-          iptables -I INPUT -m state --state NEW -p %(protocol)s --dport 
%(port)s -j fail2ban-%(__name__)s
+          iptables -I INPUT -p %(protocol)s --dport %(port)s -j 
fail2ban-%(__name__)s

 # Option:  fwend
 # Notes.:  command executed once at the end of Fail2Ban
 # Values:  CMD  Default:
 #
-fwend = iptables -D INPUT -m state --state NEW -p %(protocol)s --dport 
%(port)s -j fail2ban-%(__name__)s
+fwend = iptables -D INPUT -p %(protocol)s --dport %(port)s -j 
fail2ban-%(__name__)s
         iptables -F fail2ban-%(__name__)s
         iptables -X fail2ban-%(__name__)s



-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (990, 'testing'), (900, 'stable'), (400, 'unstable'), (1, 
'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.10-1-686
Locale: LANG=en_GB, [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages fail2ban depends on:
ii  iptables                      1.3.3-2    Linux kernel 2.4+ iptables adminis
ii  python                        2.3.5-5    An interactive high-level object-o

fail2ban recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to