Daniel Black
fa85be2eea
DOC/TST: fix configuration path for apache-auth test cases
2013-07-18 08:37:05 +10:00
Daniel Black
03ec7c211b
ENH: could not find a way to trigger filter ^%(_apache_error_client)s authorization failure \(no authenticated user\): \S*\s*$
2013-07-18 00:37:33 +10:00
Daniel Black
8ce9c78474
TST: apache-auth digest logs
2013-07-18 00:36:17 +10:00
Daniel Black
f8b5b3a1ef
ENH: apache-auth - quite a lot of authorization failure messages depending on module. Make a wildcard
2013-07-17 23:31:44 +10:00
Daniel Black
4eca2c0bd5
TST: apache-auth client denied by server configuration
2013-07-17 23:24:19 +10:00
Daniel Black
e0292913eb
ENH/TST: filter, testcase and log entry for apache-auth authorization scheme mod_authz_owner
2013-07-17 23:05:04 +10:00
Daniel Black
40cc336cd5
TST: testcases and logs for apache-auth basic
2013-07-17 22:46:04 +10:00
Daniel Black
1bb427cc14
TST: remove dup test log entry
2013-07-12 09:09:24 +10:00
Daniel Black
975999591f
ENH/DOC: more realm mismatch errors. Documented filter design criteria
2013-07-12 07:39:18 +10:00
Daniel Black
bf54db7ce7
ENH: ChangeLog notes for apache-auth enhancements
2013-07-11 23:10:44 +10:00
Daniel Black
10e3be857a
ENH: apache-auth filter added mod_auth_digest message
2013-07-11 23:08:46 +10:00
Daniel Black
384b72a535
ENH: apache-auth filter - client wrong auth
2013-07-11 22:58:36 +10:00
Daniel Black
fce431add8
ENH: add mod_authz_core failures to apache-auth
2013-07-11 22:28:27 +10:00
Daniel Black
6ce41a611d
BF: fix filter on apache-auth. Closes #286
2013-07-11 22:13:51 +10:00
Daniel Black
424da92601
DOC: close message for commits.
2013-07-09 08:51:11 +10:00
Daniel Black
c2696fe641
DOC: enhance development doc to show how CVE-2013-2178 was done
2013-06-30 15:03:13 +10:00
Daniel Black
ee786671aa
DOC: developing filters without DoS
2013-06-15 13:17:09 +10:00
Yaroslav Halchenko
9d4b613ee4
Merge branch '3proxy' of https://github.com/grooverdan/fail2ban
...
* '3proxy' of https://github.com/grooverdan/fail2ban :
BF: fix to proxy port in 3proxy example
ENH: sample log + more specific regex
BF: authentication errors end in 01-09 but the beginning part indicates the service as per https://github.com/fail2ban/fail2ban/issues/246#issuecomment-19327955 thanks to ykimon
BF: need to anchor the start to avoid another repeat of DoS injection like Apache
ENH: stricter regex thanks to Steven Hiscocks (kwirk)
DOC: credits
Conflicts:
ChangeLog
2013-06-14 12:32:51 -04:00
Yaroslav Halchenko
173fe48e77
Merge branch 'exim' of https://github.com/grooverdan/fail2ban
...
* 'exim' of https://github.com/grooverdan/fail2ban :
BF/ENH: Incorrect authentication data doesn't need tailier so that's optional. Also gained log entry for Unrouteable address
ENH: readibility thanks to Yaroslav
ENH/BF: exim improvements with sample
Conflicts:
ChangeLog
2013-06-14 12:28:07 -04:00
Yaroslav Halchenko
ec629ab4e8
Merge branch 'proftpd' of https://github.com/grooverdan/fail2ban
...
* 'proftpd' of https://github.com/grooverdan/fail2ban :
ENH: proftpd chan accept usernames with spaces
ENH: injection of fail data into USER field
ENH: proftp regex hardening and log messages
Conflicts:
ChangeLog
2013-06-14 12:16:59 -04:00
Yaroslav Halchenko
ab2c738b43
Merge branch 'dovecot' of https://github.com/grooverdan/fail2ban
...
* 'dovecot' of https://github.com/grooverdan/fail2ban :
TST: attempts at injection with username=rhost=1.2.3.4 have no user= logged in dovecot-1.2.15
ENH: dovecot regexs rewritten and extra failures
Conflicts:
ChangeLog -- merged entries
2013-06-14 12:14:40 -04:00
Daniel Black
8cc13b5b40
BF/ENH: Incorrect authentication data doesn't need tailier so that's optional. Also gained log entry for Unrouteable address
2013-06-14 18:12:53 +10:00
Daniel Black
a433a8ea5f
ENH: readibility thanks to Yaroslav
2013-06-14 15:21:50 +10:00
Yaroslav Halchenko
948be73115
Merge branch 'assp' of https://github.com/grooverdan/fail2ban
...
* 'assp' of https://github.com/grooverdan/fail2ban :
BF: missed a space
BF: [SSL-out] is optional in assp
ENH: regex hardening on assp
Conflicts:
ChangeLog -- merged the two entries into 1
2013-06-13 23:32:45 -04:00
Yaroslav Halchenko
9b351350dd
DOC: Changelog for asterisk hardening
2013-06-13 23:19:28 -04:00
Yaroslav Halchenko
09302c5c25
ENH: asterisk -- use \S instead of [^:] + prefix failregex with ^\[
...
detected date portion is stripped from the string to be matched, so it is not only
the right ] is left, but also the left one ;-)
2013-06-13 23:15:48 -04:00
Daniel Black
7018d81244
BF: missed a space
2013-06-14 12:35:44 +10:00
Daniel Black
a447aa615d
BF: [SSL-out] is optional in assp
2013-06-14 12:27:35 +10:00
Daniel Black
d4940563d3
ENH: regex hardening on assp
2013-06-14 08:55:25 +10:00
Daniel Black
6a09ecff5c
ENH: anchor a bit mor. Use \d and \w where possible. Escape a literal .
2013-06-14 08:41:50 +10:00
Daniel Black
e8b6acfa65
TST: attempts at injection with username=rhost=1.2.3.4 have no user= logged in dovecot-1.2.15
2013-06-14 00:53:03 +10:00
Daniel Black
9940cd1b6b
ENH: proftpd chan accept usernames with spaces
2013-06-14 00:29:43 +10:00
Daniel Black
2e2ec5d1f5
ENH: injection of fail data into USER field
2013-06-14 00:17:41 +10:00
Daniel Black
dbe7ffe050
ENH: dovecot regexs rewritten and extra failures
2013-06-13 23:52:15 +10:00
Daniel Black
4c67a269bf
ENH: proftp regex hardening and log messages
2013-06-13 22:11:05 +10:00
Daniel Black
3e3802512a
ENH/BF: exim improvements with sample
2013-06-13 17:44:18 +10:00
Daniel Black
88b4598ed8
BF: fix to proxy port in 3proxy example
2013-06-13 14:43:15 +10:00
Yaroslav Halchenko
460e09af66
it was not the end of the world and we should continue
2013-06-12 21:22:26 -04:00
Daniel Black
9dbaec0894
ENH: sample log + more specific regex
2013-06-13 10:23:14 +10:00
Daniel Black
8faf84b7f7
BF: authentication errors end in 01-09 but the beginning part indicates the service as per https://github.com/fail2ban/fail2ban/issues/246#issuecomment-19327955 thanks to ykimon
2013-06-13 08:34:10 +10:00
Yaroslav Halchenko
921d9a8e4b
DOC: add information on where to report vulnerabilities + pointer to HOWTO_Seek_Help
...
originally following command was used to add header to all config files:
sed -ie '/# Author/ i\# Please report vulnerabilities to fail2ban-vulnerabilities at lists dot sourceforge dot net\n# and see http://www.fail2ban.org/wiki/index.php/HOWTO_Seek_Help for generic bug-reports.\n#' action.d/* filter.d/*
but it would be overkill ATM causing havoc in user-tuned configs -- postponed for now
Also adjusted the release date for today (by mistake in 1 commit ... sorry)
2013-06-12 13:21:12 -04:00
Yaroslav Halchenko
728b5e8bf4
Changes for 0.8.10 release (changelog, version, etc)
2013-06-11 19:20:50 -04:00
Yaroslav Halchenko
6ccd57813c
BF: anchor apache- filters. Close #248
...
See https://vndh.net/note:fail2ban-089-denial-service for more information
2013-06-11 19:19:25 -04:00
Daniel Black
fd9f9f16e0
BF: need to anchor the start to avoid another repeat of DoS injection like Apache
2013-06-12 08:48:30 +10:00
Daniel Black
f2fa4d53a8
ENH: stricter regex thanks to Steven Hiscocks (kwirk)
2013-06-12 08:30:59 +10:00
Daniel Black
16d63434ef
DOC: credits
2013-06-11 23:56:09 +10:00
Daniel Black
4787777cee
DOC: credits for gh-244
2013-06-11 10:30:56 +10:00
Daniel Black
66d8210f80
Merge pull request #244 from clopez/filter-asterisk
...
Filter Asterisk: Add AUTH_UNKNOWN_DOMAIN error to list
2013-06-10 17:28:35 -07:00
Carlos Alberto Lopez Perez
7248ef4564
Filter Asterisk: Add sample log entry to testcase.
...
* Sample log entry for AUTH_UNKNOWN_DOMAIN (Not a local domain)
2013-06-11 02:13:37 +02:00
Carlos Alberto Lopez Perez
47b063b022
Filter Asterisk: Add AUTH_UNKNOWN_DOMAIN error to list
...
* I have been seeing bruteforcing attempts where asterisk fails with
AUTH_UNKNOWN_DOMAIN (Not a local domain)
2013-06-10 19:50:35 +02:00