diff --git a/CHANGELOG b/CHANGELOG index 94a7b411..6d05c5c8 100644 --- a/CHANGELOG +++ b/CHANGELOG @@ -4,9 +4,34 @@ |_| \__,_|_|_/___|_.__/\__,_|_||_| ============================================================= -Fail2Ban (version 0.8.0) 2007/05/03 +Fail2Ban (version 0.8.1) 2007/08/14 ============================================================= +ver. 0.8.1 (2007/08/14) - stable +---------- +- Fixed vulnerability in sshd.conf. Thanks to Daniel B. Cid +- Expand in ignoreregex. Thanks to Yaroslav Halchenko +- Improved regular expressions. Thanks to Yaroslav Halchenko + and others +- Added sendmail actions. The action started with "mail" are + now deprecated. Thanks to Raphaël Marichez +- Added "ignoreregex" support to fail2ban-regex +- Updated suse-initd and added it to MANIFEST. Thanks to + Christian Rauch +- Tightening up the pid check in redhat-initd. Thanks to + David Nutter +- Added webmin authentication filter. Thanks to Guillaume + Delvit +- Removed textToDns() which is not required anymore. Thanks + to Yaroslav Halchenko +- Added new action iptables-allports. Thanks to Yaroslav + Halchenko +- Added "named" date format to date detector. Thanks to + Yaroslav Halchenko +- Added filter file for named (bind9). Thanks to Yaroslav + Halchenko +- Fixed vsftpd filter. Thanks to Yaroslav Halchenko + ver. 0.8.0 (2007/05/03) - stable ---------- - Fixed RedHat init script. Thanks to Jonathan Underwood diff --git a/PKG-INFO b/PKG-INFO index f1c670ae..d05c8004 100644 --- a/PKG-INFO +++ b/PKG-INFO @@ -1,6 +1,6 @@ Metadata-Version: 1.0 Name: fail2ban -Version: 0.8.0 +Version: 0.8.1 Summary: Ban IPs that make too many password failure Home-page: http://fail2ban.sourceforge.net Author: Cyril Jaquier diff --git a/README b/README index 7a4aa86f..5cece798 100644 --- a/README +++ b/README @@ -4,7 +4,7 @@ |_| \__,_|_|_/___|_.__/\__,_|_||_| ============================================================= -Fail2Ban (version 0.8.0) 2007/05/03 +Fail2Ban (version 0.8.1) 2007/08/14 ============================================================= Fail2Ban scans log files like /var/log/pwdfail and bans IP @@ -28,8 +28,8 @@ Optional: To install, just do: -> tar xvfj fail2ban-0.8.0.tar.bz2 -> cd fail2ban-0.8.0 +> tar xvfj fail2ban-0.8.1.tar.bz2 +> cd fail2ban-0.8.1 > python setup.py install This will install Fail2Ban into /usr/share/fail2ban. The @@ -73,7 +73,9 @@ Jonathan Kamens, Stephen Gildea, Markus Hoffmann, Mark Edgington, Patrick Börjesson, kojiro, zugeschmiert, Tyler, Nick Munger, Christoph Haas, Justin Shore, Joël Bertrand, René Berber, mEDI, Axel Thimm, Eric Gerbier, Christian Rauch, -Michael C. Haller, Jonathan Underwood, Hanno 'Rince' Wagner +Michael C. Haller, Jonathan Underwood, Hanno 'Rince' Wagner, +Daniel B. Cid, David Nutter, Raphaël Marichez, Guillaume +Delvit, Vaclav Misek License: -------- diff --git a/common/version.py b/common/version.py index 952236c6..8b2a3d84 100644 --- a/common/version.py +++ b/common/version.py @@ -16,12 +16,12 @@ # Author: Cyril Jaquier # -# $Revision: 578 $ +# $Revision: 614 $ __author__ = "Cyril Jaquier" -__version__ = "$Revision: 578 $" -__date__ = "$Date: 2007-05-03 22:30:28 +0200 (Thu, 03 May 2007) $" +__version__ = "$Revision: 614 $" +__date__ = "$Date: 2007-08-14 23:39:15 +0200 (Tue, 14 Aug 2007) $" __copyright__ = "Copyright (c) 2004 Cyril Jaquier" __license__ = "GPL" -version = "0.8.0" +version = "0.8.1" diff --git a/config/action.d/iptables-allports.conf b/config/action.d/iptables-allports.conf new file mode 100644 index 00000000..a3c82af7 --- /dev/null +++ b/config/action.d/iptables-allports.conf @@ -0,0 +1,65 @@ +# Fail2Ban configuration file +# +# Author: Cyril Jaquier +# Modified: Yaroslav O. Halchenko +# made active on all ports from original iptables.conf +# +# $Revision: 606 $ +# + +[Definition] + +# Option: actionstart +# Notes.: command executed once at the start of Fail2Ban. +# Values: CMD +# +actionstart = iptables -N fail2ban- + iptables -A fail2ban- -j RETURN + iptables -I INPUT -p -j fail2ban- + +# Option: actionend +# Notes.: command executed once at the end of Fail2Ban +# Values: CMD +# +actionstop = iptables -D INPUT -p -j fail2ban- + iptables -F fail2ban- + iptables -X fail2ban- + +# Option: actioncheck +# Notes.: command executed once before each actionban command +# Values: CMD +# +actioncheck = iptables -n -L INPUT | grep -q fail2ban- + +# Option: actionban +# Notes.: command executed when banning an IP. Take care that the +# command is executed with Fail2Ban user rights. +# Tags: IP address +# number of failures +#