Package: fail2ban
Version: 0.8.1-2
Severity: normal

Might warrant higher severity if my analysis is correct and the
problem is general.  However, it only arises when clocks change.

On Nov 4 my logs show the same rhost attempting to login via ssh every
3 seconds from 01:44:30 through 02:00:09.  At that point, fail2ban's
log shows it blocked the offending IP.

In my timezone, clocks moved back an hour on Nov 4 02:00.

I strongly suspect that fail2ban is using the nominal time to
determine when it should wake up.  So, the first time the clock moved
from 1am to 2am, it recorded that it should wake up shortly after 2am.
This meant it went to sleep for an hour, from the second 01:00 to
02:00.

It's possible there might be issues when clocks move forward as well.

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (990, 'testing'), (990, 'stable'), (50, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.18-5-686 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages fail2ban depends on:
ii  iptables                1.3.8.0debian1-1 administration tools for packet fi
ii  lsb-base                3.1-24           Linux Standard Base 3.1 init scrip
ii  python                  2.4.4-6          An interactive high-level object-o
ii  python-central          0.5.15           register and build utility for Pyt

fail2ban recommends no packages.

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to