mirror of https://github.com/fail2ban/fail2ban
Fix actions in ufw.conf
On Ubuntu 15.04 the ufw action was not working. - With empty <application>, receiving errors: 2015-04-24 16:28:35,204 fail2ban.filter [8527]: INFO [sshd] Found 43.255.190.157 2015-04-24 16:28:35,695 fail2ban.actions [8527]: NOTICE [sshd] Ban 43.255.190.157 2015-04-24 16:28:35,802 fail2ban.action [8527]: ERROR [ -n "" ] && app="app " -- stdout: b'' 2015-04-24 16:28:35,803 fail2ban.action [8527]: ERROR [ -n "" ] && app="app " -- stderr: b'' 2015-04-24 16:28:35,803 fail2ban.action [8527]: ERROR [ -n "" ] && app="app " -- returned 1 - With action = ufw[application=OpenSSH], it was silently not doing anything (no errors after "Ban x.x.x.x", but no IP addresses in ufw status). Re-arranged the bash commands on two lines, and it works with or without <application>.pull/1037/head
parent
4aafb2d4ac
commit
7ae0ef2408
|
@ -11,6 +11,7 @@ ver. 0.9.2 (2014/XX/XXX) - wanna-be-released
|
||||||
-----------
|
-----------
|
||||||
|
|
||||||
- Fixes:
|
- Fixes:
|
||||||
|
* Fix ufw action commands
|
||||||
* infinite busy loop on _escapedTags match in substituteRecursiveTags gh-907.
|
* infinite busy loop on _escapedTags match in substituteRecursiveTags gh-907.
|
||||||
Thanks TonyThompson
|
Thanks TonyThompson
|
||||||
* port[s] typo in jail.conf/nginx-http-auth gh-913. Thanks Frederik Wagner (fnerdwq)
|
* port[s] typo in jail.conf/nginx-http-auth gh-913. Thanks Frederik Wagner (fnerdwq)
|
||||||
|
|
1
THANKS
1
THANKS
|
@ -6,6 +6,7 @@ the project. If you have been left off, please let us know
|
||||||
(preferably send a pull request on github with the "fix") and you will
|
(preferably send a pull request on github with the "fix") and you will
|
||||||
be added
|
be added
|
||||||
|
|
||||||
|
Aaron Brice
|
||||||
Adam Tkac
|
Adam Tkac
|
||||||
Adrien Clerc
|
Adrien Clerc
|
||||||
ache
|
ache
|
||||||
|
|
|
@ -13,9 +13,11 @@ actionstop =
|
||||||
|
|
||||||
actioncheck =
|
actioncheck =
|
||||||
|
|
||||||
actionban = [ -n "<application>" ] && app="app <application>" ; ufw insert <insertpos> <blocktype> from <ip> to <destination> $app
|
actionban = [ -n "<application>" ] && app="app <application>"
|
||||||
|
ufw insert <insertpos> <blocktype> from <ip> to <destination> $app
|
||||||
|
|
||||||
actionunban = [ -n "<application>" ] && app="app <application>" ; ufw delete <blocktype> from <ip> to <destination> $app
|
actionunban = [ -n "<application>" ] && app="app <application>"
|
||||||
|
ufw delete <blocktype> from <ip> to <destination> $app
|
||||||
|
|
||||||
[Init]
|
[Init]
|
||||||
# Option: insertpos
|
# Option: insertpos
|
||||||
|
|
Loading…
Reference in New Issue