fail2ban
https://github.com/fail2ban/fail2ban
Fail2ban scans log files like /var/log/messages and bans IP addresses that makes too many password failures. It updates firewall rules to reject the IP address, can send e-mails, or set host.deny entries. These rules can be defined by the user. Fail2Ban can read multiple log files such as sshd or Apache web server ones.
- Sources inherited from project security
- Devel package for openSUSE:Factory
-
5
derived packages
- Links to openSUSE:Factory / fail2ban
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout home:redwil:15.4/fail2ban && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
_link | 0000000124 124 Bytes | |
f2b-restart.conf | 0000000163 163 Bytes | |
fail2ban-0.10.4-env-script-interpreter.patch | 0000000604 604 Bytes | |
fail2ban-0.10.4-upstream-pid-file-location.patch | 0000000891 891 Bytes | |
fail2ban-0.11.1.tar.gz | 0000538660 526 KB | |
fail2ban-0.11.1.tar.gz.asc | 0000000488 488 Bytes | |
fail2ban-disable-iptables-w-option.patch | 0000000855 855 Bytes | |
fail2ban-opensuse-locations.patch | 0000001158 1.13 KB | |
fail2ban-opensuse-service-sfw.patch | 0000000750 750 Bytes | |
fail2ban-opensuse-service.patch | 0000000959 959 Bytes | |
fail2ban-rpmlintrc | 0000000146 146 Bytes | |
fail2ban.changes | 0000063214 61.7 KB | |
fail2ban.logrotate | 0000000232 232 Bytes | |
fail2ban.spec | 0000011146 10.9 KB | |
fail2ban.sysconfig | 0000000200 200 Bytes | |
fail2ban.tmpfiles | 0000000031 31 Bytes | |
paths-opensuse.conf | 0000000975 975 Bytes | |
sfw-fail2ban.conf | 0000000217 217 Bytes |
Revision 100 (latest revision is 119)
Johannes Weberhofer (weberho)
accepted
request 807912
from
Paolo Stivanin (polslinux)
(revision 100)
- Update to 0.11.1: * Increment ban time (+ observer) functionality introduced. * Database functionality extended with bad ips. * New tags (usable in actions): - `<bancount>` - ban count of this offender if known as bad (started by 1 for unknown) - `<bantime>` - current ban-time of the ticket (prolongation can be retarded up to 10 sec.) * Introduced new action command `actionprolong` to prolong ban-time (e. g. set new timeout if expected); * algorithm of restore current bans after restart changed: update the restored ban-time (and therefore end of ban) of the ticket with ban-time of jail (as maximum), for all tickets with ban-time greater (or persistent) * added new setup-option `--without-tests` to skip building and installing of tests files (gh-2287). * added new command `fail2ban-client get <JAIL> banip ?sep-char|--with-time?` to get the banned ip addresses (gh-1916). * purge database will be executed now (within observer). restoring currently banned ip after service restart fixed (now < timeofban + bantime), ignore old log failures (already banned) * upgrade database: update new created table `bips` with entries from table `bans` (allows restore current bans after upgrade from version <= 0.10)
Comments 0