mirror of https://github.com/fail2ban/fail2ban
Merge branch '0.10' into 0.11
commit
1ca3df877b
|
@ -15,7 +15,7 @@ Incompatibility list (compared to v.0.9):
|
|||
rewrite the regex like in example below resp. using `(?:(?P=ip4)|(?P=ip6)` instead of `(?P=host)`
|
||||
(or `(?:(?P=ip4)|(?P=ip6)|(?P=dns))` corresponding your `usedns` and `raw` settings).
|
||||
|
||||
Of course you can always your own capture-group (like below `_cond_ip_`) to do this.
|
||||
Of course you can always define your own capture-group (like below `_cond_ip_`) to do this.
|
||||
```
|
||||
testln="1500000000 failure from 192.0.2.1: bad host 192.0.2.1"
|
||||
fail2ban-regex "$testln" "^\s*failure from (?P<_cond_ip_><HOST>): bad host (?P=_cond_ip_)$"
|
||||
|
@ -35,8 +35,9 @@ ver. 0.11.0-dev-0 (2017/??/??) - development nightly edition
|
|||
-----------
|
||||
|
||||
### Incompatibility list:
|
||||
* The configuration for multiport jails using banaction `pf` can be incompatible after upgrade, if
|
||||
ports are enclosed in curly braces `{ }` in the `jail.local` etc. This may cause a double-brackets now.
|
||||
* The configuration for jails using banaction `pf` can be incompatible after upgrade, because pf-action uses
|
||||
anchors now (see `action.d/pf.conf` for more information). If you want use obsolete handling without anchors,
|
||||
just rewrite it in the `jail.local` by overwrite of `pfctl` parameter, e. g. like `banaction = pf[pfctl="pfctl"]`.
|
||||
|
||||
### Fixes
|
||||
* Fixed logging to systemd-journal: new logtarget value SYSOUT can be used instead of STDOUT, to avoid
|
||||
|
|
|
@ -26,7 +26,8 @@
|
|||
# }
|
||||
# to your main pf ruleset, where "namei" are the names of the jails
|
||||
# which invoke this action
|
||||
actionstart = echo "table <<tablename>-<name>> persist counters" | <pfctl> -f-
|
||||
actionstart = echo "table <<tablename>-<name>> persist counters" | <pfctl> -f-
|
||||
port="<port>"; if [ "$port" != "" ] && case "$port" in \{*) false;; esac; then port="{$port}"; fi
|
||||
echo "<block> proto <protocol> from <<tablename>-<name>> to <actiontype>" | <pfctl> -f-
|
||||
|
||||
# Option: start_on_demand - to start action on demand
|
||||
|
@ -119,5 +120,5 @@ allports = any
|
|||
# Option: multiport
|
||||
# Notes.: addition to block access only to specific ports
|
||||
# Usage.: use in jail config: "banaction = pf[actiontype=<multiport>]"
|
||||
multiport = any port {<port>}
|
||||
multiport = any port $port
|
||||
|
||||
|
|
|
@ -1524,7 +1524,8 @@ class ServerConfigReaderTests(LogCaptureTestCase):
|
|||
'ip4': (), 'ip6': (),
|
||||
'start': (
|
||||
'`echo "table <f2b-j-w-pf> persist counters" | pfctl -a f2b/j-w-pf -f-`',
|
||||
'`echo "block quick proto tcp from <f2b-j-w-pf> to any port {<port>}" | pfctl -a f2b/j-w-pf -f-`',
|
||||
'port="<port>"',
|
||||
'`echo "block quick proto tcp from <f2b-j-w-pf> to any port $port" | pfctl -a f2b/j-w-pf -f-`',
|
||||
),
|
||||
'flush': (
|
||||
'`pfctl -a f2b/j-w-pf -t f2b-j-w-pf -T flush`',
|
||||
|
@ -1546,7 +1547,8 @@ class ServerConfigReaderTests(LogCaptureTestCase):
|
|||
'ip4': (), 'ip6': (),
|
||||
'start': (
|
||||
'`echo "table <f2b-j-w-pf-mp> persist counters" | pfctl -a f2b/j-w-pf-mp -f-`',
|
||||
'`echo "block quick proto tcp from <f2b-j-w-pf-mp> to any port {http,https}" | pfctl -a f2b/j-w-pf-mp -f-`',
|
||||
'port="http,https"',
|
||||
'`echo "block quick proto tcp from <f2b-j-w-pf-mp> to any port $port" | pfctl -a f2b/j-w-pf-mp -f-`',
|
||||
),
|
||||
'flush': (
|
||||
'`pfctl -a f2b/j-w-pf-mp -t f2b-j-w-pf-mp -T flush`',
|
||||
|
|
Loading…
Reference in New Issue