I doubt that this wishlist should be addressed due

1. fail2ban works at the moment independently on each log line, thus it
is impossible to discriminate between multiple occasions of a single
line (which could be totally "legal") or different multiple matches.

2. xmlrpc vulnerability was fixed and there are multiple softwares
using it, and we don't want to block hosts which would access xmlrpc.php
for a good reason ;-)

thus at the moment I don't see this rule implemented.

but I would suggest to rephrase this wishlist may be as a new feature
request to have multiple separate regexps, and ban
if a given IP scans through the list, trying to sense present vulnerable
software. If you agree that it might be useful -- I would forward this
wishlist upstream. If you think that the issue is minor - I would like
to close the bug with "wontfix"

-- 
                                  .-.
=------------------------------   /v\  ----------------------------=
Keep in touch                    // \\     (yoh@|www.)onerussian.com
Yaroslav Halchenko              /(   )\               ICQ#: 60653192
                   Linux User    ^^-^^    [175555]


Attachment: pgpFeQN8IxS1p.pgp
Description: PGP signature

Reply via email to