Bans IP addresses that make too many authentication failures
Fail2ban scans log files like /var/log/messages and bans IP addresses
that makes too many password failures. It updates firewall rules to
reject the IP address, can send e-mails, or set host.deny entries.
These rules can be defined by the user. Fail2Ban can read multiple log
files such as sshd or Apache web server ones.
- Developed at security
- Sources inherited from project openSUSE:Factory
-
4
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Leap:16.0:FactoryCandidates/fail2ban && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
f2b-restart.conf | 0000000163 163 Bytes | |
fail2ban-0.10.4-env-script-interpreter.patch | 0000000604 604 Bytes | |
fail2ban-1.1.0.tar.gz | 0000603854 590 KB | |
fail2ban-1.1.0.tar.gz.asc | 0000000488 488 Bytes | |
fail2ban-fix-openssh98.patch | 0000000453 453 Bytes | |
fail2ban-opensuse-locations.patch | 0000001146 1.12 KB | |
fail2ban-opensuse-service-sfw.patch | 0000000750 750 Bytes | |
fail2ban-opensuse-service.patch | 0000001321 1.29 KB | |
fail2ban.changes | 0000075013 73.3 KB | |
fail2ban.keyring | 0000001696 1.66 KB | |
fail2ban.logrotate | 0000000232 232 Bytes | |
fail2ban.spec | 0000010771 10.5 KB | |
fail2ban.sysconfig | 0000000200 200 Bytes | |
fail2ban.tmpfiles | 0000000031 31 Bytes | |
harden_fail2ban.service.patch | 0000000762 762 Bytes | |
paths-opensuse.conf | 0000000975 975 Bytes | |
sfw-fail2ban.conf | 0000000217 217 Bytes |
Latest Revision
Ana Guerrero (anag+factory)
accepted
request 1217267
from
Dirk Mueller (dirkmueller)
(revision 70)
- update to 1.1.0: * circumvent SEGFAULT in a python's socket module by getaddrinfo with disabled IPv6 (gh-3438) * avoid sporadic error in pyinotify backend if pending file deleted in other thread, e. g. by flushing logs (gh-3635) * `action.d/cloudflare-token.conf` - fixes gh-3479, url-encode args by unban * `action.d/*ipset*`: make `maxelem` ipset option configurable through banaction arguments (gh-3564) * `filter.d/apache-common.conf` - accepts remote besides client (gh-3622) * `filter.d/mysqld-auth.conf` - matches also if no suffix in message (mariadb 10.3 log format, gh-3603) * `filter.d/nginx-*.conf` - nginx error-log filters extended with support of journal format (gh-3646) * `filter.d/postfix.conf`: - "rejected" rule extended to match "Access denied" too - avoid double counting ('lost connection after AUTH' together with message 'disconnect ...', gh-3505) - add Sender address rejected: Malformed DNS server reply - add to postfix syslog daemon format (gh-3690) - change journalmatch postfix, allow sub-units with postfix@-.service (gh-3692) * `filter.d/recidive.conf`: support for systemd-journal, conditional RE depending on logtype (for file or journal, gh-3693) * `filter.d/slapd.conf` - filter rewritten for single-line processing, matches errored result without `text=...` (gh-3604) * supports python 3.12 and 3.13 (gh-3487)
Comments 0