Package: fail2ban
Version: 0.8.3-2
Severity: normal

fail2ban fails to detect proftpd login attempts with unknown users.
proftpd logs unknown users like this:

---CUT---
Dec  6 14:10:31 hel proftpd[24498]: dist.bestsolution.at \
(202.143.142.166[202.143.142.166]) - USER Administrator: no such \
user found from 202.143.142.166 [202.143.142.166] to 81.16.98.107:21
---CUT---

/etc/fail2ban/filters.d/proftpd.conf contains this line to match those lines:

---CUT---
\(\S+\[<HOST>\]\)[: -]+ USER \S+: no such user found from \S+ \[\S+\] to 
\S+:\S+$
---CUT---

Using this line with fail2ban-regex gives zero matches, changing the line to

---CUT---
\(\S+\[<HOST>\]\)[: -]+ USER \S+: no such user found from \S+ \[\S+\] to \S+:\S+
---CUT---

finally matches all the failed login attempts.

So for reasons unknown EOL matching does not work as intended, at least with
proftpd log entries.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.22-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages fail2ban depends on:
ii  lsb-base                      3.2-18     Linux Standard Base 3.2 init scrip
ii  python                        2.5.2-3    An interactive high-level object-o
ii  python-central                0.6.8      register and build utility for Pyt

Versions of packages fail2ban recommends:
ii  iptables                1.3.8.0debian1-1 administration tools for packet fi
ii  whois                   4.7.24           the GNU whois client

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to