debian default banactions are nftables, systemd backend for sshd

closes gh-3292
debian
sebres 2024-04-26 00:25:19 +02:00
parent f9d3e28c7c
commit 2e7396ee66
2 changed files with 9 additions and 2 deletions

View File

@ -15,6 +15,13 @@ ver. 1.1.0 (2024/04/25) - object-found--norad-59479-cospar-2024-069a--altitude-3
you can use the 0.11 or 1.0 version of fail2ban or upgrade python (or even build it from source). you can use the 0.11 or 1.0 version of fail2ban or upgrade python (or even build it from source).
### Fixes ### Fixes
* `jail.conf`:
- default banactions need to be specified in `paths-*.conf` (maintainer level) now
- since stock fail2ban includes `paths-debian.conf` by default, banactions are `nftables`
(can be overwritten in `jail.local` by user)
* `paths-debian.conf`:
- default banactions are `nftables`
- sshd backend switched to `systemd` (gh-3292)
* circumvent SEGFAULT in a python's socket module by getaddrinfo with disabled IPv6 (gh-3438) * circumvent SEGFAULT in a python's socket module by getaddrinfo with disabled IPv6 (gh-3438)
* avoid sporadic error in pyinotify backend if pending file deleted in other thread, e. g. by flushing logs (gh-3635) * avoid sporadic error in pyinotify backend if pending file deleted in other thread, e. g. by flushing logs (gh-3635)
* `action.d/cloudflare-token.conf` - fixes gh-3479, url-encode args by unban * `action.d/cloudflare-token.conf` - fixes gh-3479, url-encode args by unban

View File

@ -205,8 +205,8 @@ fail2ban_agent = Fail2Ban/%(fail2ban_version)s
# iptables-multiport, shorewall, etc) It is used to define # iptables-multiport, shorewall, etc) It is used to define
# action_* variables. Can be overridden globally or per # action_* variables. Can be overridden globally or per
# section within jail.local file # section within jail.local file
banaction = iptables-multiport #banaction = iptables-multiport
banaction_allports = iptables-allports #banaction_allports = iptables-allports
# The simplest action to take: ban only # The simplest action to take: ban only
action_ = %(banaction)s[port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"] action_ = %(banaction)s[port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]