Date: Fri, 26 Jun 2015 12:12:25 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 201108] security/py-fail2ban: ssh log entries are ignored Message-ID: <bug-201108-13-vPUT2F2Q10@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-201108-13@https.bugs.freebsd.org/bugzilla/> References: <bug-201108-13@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201108 --- Comment #4 from Jason Unovitch <jason.unovitch@gmail.com> --- (In reply to oz42 from comment #3) Ok, so it looked like you had adapted your configuration as you went since you started with IPTables. Starting from the bottom the issue seems to be ipfw(8) configuration related since that is returning an error when it gets a valid IP address from Fail2Ban. 2015-06-25 18:04:09,540 fail2ban.action [605]: ERROR ipfw table 1 delete 5.190.61.182 -- stdout: '' 2015-06-25 18:04:09,540 fail2ban.action [605]: ERROR ipfw table 1 delete 5.190.61.182 -- stderr: 'ipfw: setsockopt(IP_FW_TABLE_XDEL): No such process\n' 2015-06-25 18:04:09,541 fail2ban.action [605]: ERROR ipfw table 1 delete 5.190.61.182 -- returned 71 If you post the link to your forum thread we can carry on the discussion there. I didn't seem to see it. -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-201108-13-vPUT2F2Q10>