Bans IP addresses that make too many authentication failures

Edit Package fail2ban

Fail2ban scans log files like /var/log/messages and bans IP addresses
that makes too many password failures. It updates firewall rules to
reject the IP address, can send e-mails, or set host.deny entries.
These rules can be defined by the user. Fail2Ban can read multiple log
files such as sshd or Apache web server ones.

Refresh
Refresh
Source Files
Filename Size Changed
f2b-restart.conf 0000000163 163 Bytes
fail2ban-0.10.4-env-script-interpreter.patch 0000000604 604 Bytes
fail2ban-1.1.0.tar.gz 0000603854 590 KB
fail2ban-1.1.0.tar.gz.asc 0000000488 488 Bytes
fail2ban-fix-openssh98.patch 0000000453 453 Bytes
fail2ban-opensuse-locations.patch 0000001146 1.12 KB
fail2ban-opensuse-service-sfw.patch 0000000750 750 Bytes
fail2ban-opensuse-service.patch 0000001321 1.29 KB
fail2ban.changes 0000075013 73.3 KB
fail2ban.keyring 0000001696 1.66 KB
fail2ban.logrotate 0000000232 232 Bytes
fail2ban.spec 0000010771 10.5 KB
fail2ban.sysconfig 0000000200 200 Bytes
fail2ban.tmpfiles 0000000031 31 Bytes
harden_fail2ban.service.patch 0000000762 762 Bytes
paths-opensuse.conf 0000000975 975 Bytes
sfw-fail2ban.conf 0000000217 217 Bytes
Latest Revision
Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1217267 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 70)
- update to 1.1.0:
  * circumvent SEGFAULT in a python's socket module by
    getaddrinfo with disabled IPv6 (gh-3438)
  * avoid sporadic error in pyinotify backend if pending file
    deleted in other thread, e. g. by flushing logs (gh-3635)
  * `action.d/cloudflare-token.conf` - fixes gh-3479, url-encode
    args by unban
  * `action.d/*ipset*`: make `maxelem` ipset option configurable
    through banaction arguments (gh-3564)
  * `filter.d/apache-common.conf` - accepts remote besides client
    (gh-3622)
  * `filter.d/mysqld-auth.conf` - matches also if no suffix in
    message (mariadb 10.3 log format, gh-3603)
  * `filter.d/nginx-*.conf` - nginx error-log filters extended
    with support of journal format (gh-3646)
  * `filter.d/postfix.conf`:
    - "rejected" rule extended to match "Access denied" too
    - avoid double counting ('lost connection after AUTH'
      together with message 'disconnect ...', gh-3505)
    - add Sender address rejected: Malformed DNS server reply
    - add to postfix syslog daemon format (gh-3690)
    - change journalmatch postfix, allow sub-units with
      postfix@-.service (gh-3692)
  * `filter.d/recidive.conf`: support for systemd-journal,
    conditional RE depending on logtype (for file or journal,
    gh-3693)
  * `filter.d/slapd.conf` - filter rewritten for single-line
    processing, matches errored result without `text=...`
    (gh-3604)
  * supports python 3.12 and 3.13 (gh-3487)
Comments 0
openSUSE Build Service is sponsored by