Debian Bug report logs - #881648
outdated - fail2ban 0.10 is available with ipv6 support

version graph

Package: fail2ban; Maintainer for fail2ban is Debian Python Team <team+python@tracker.debian.org>; Source for fail2ban is src:fail2ban (PTS, buildd, popcon).

Reported by: Christian Kohlstedde <christian@kohlsted.de>

Date: Mon, 13 Nov 2017 20:57:02 UTC

Severity: normal

Found in version fail2ban/0.9.7-2

Fixed in version fail2ban/0.10.2-1

Done: Yaroslav Halchenko <debian@onerussian.com>

Bug is archived. No further changes may be made.

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Yaroslav Halchenko <debian@onerussian.com>:
Bug#881648; Package fail2ban. (Mon, 13 Nov 2017 20:57:03 GMT) (full text, mbox, link).


Acknowledgement sent to Christian Kohlstedde <christian@kohlsted.de>:
New Bug report received and forwarded. Copy sent to Yaroslav Halchenko <debian@onerussian.com>. (Mon, 13 Nov 2017 20:57:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Christian Kohlstedde <christian@kohlsted.de>
To: submit@bugs.debian.org
Subject: outdated - fail2ban 0.10 is available with ipv6 support
Date: Mon, 13 Nov 2017 21:48:19 +0100
[Message part 1 (text/plain, inline)]
Package: fail2ban
Version: 0.9.7-2

The fail2ban team released the version 0.10.0 on Aug 9. This version
adds the long awaited IPv6 support. As fail2ban is a basic package and -
in my opinion - is essential for every public reachable system, I'm
interested in the status of fail2ban 0.10 in debian.
IPv6 usage is growing day by day and so getting fail2ban 0.10 to the
official debian repositories gets more important, too. I'm seeing the
first brute force attacks on the ssh login using ipv6 and don't like the
installation of software without a package. Thank you for your work and
in advance to the hopefully nearby release of a fail2ban 0.10 package in
the officially repositories!

Yours
Christian Kohlstedde

[signature.asc (application/pgp-signature, attachment)]

Information forwarded to debian-bugs-dist@lists.debian.org, Yaroslav Halchenko <debian@onerussian.com>:
Bug#881648; Package fail2ban. (Mon, 15 Jan 2018 02:06:03 GMT) (full text, mbox, link).


Acknowledgement sent to md@Linux.IT (Marco d'Itri):
Extra info received and forwarded to list. Copy sent to Yaroslav Halchenko <debian@onerussian.com>. (Mon, 15 Jan 2018 02:06:03 GMT) (full text, mbox, link).


Message #10 received at 881648@bugs.debian.org (full text, mbox, reply):

From: md@Linux.IT (Marco d'Itri)
To: Yaroslav Halchenko <debian@onerussian.com>, 881648@bugs.debian.org
Subject: Re: Bug#881648: outdated - fail2ban 0.10 is available with ipv6 support
Date: Mon, 15 Jan 2018 03:02:03 +0100
[Message part 1 (text/plain, inline)]
On Nov 13, Christian Kohlstedde <christian@kohlsted.de> wrote:

> IPv6 usage is growing day by day and so getting fail2ban 0.10 to the
> official debian repositories gets more important, too. I'm seeing the
> first brute force attacks on the ssh login using ipv6 and don't like the
> installation of software without a package. Thank you for your work and
Indeed, I see plenty of IPv6 brute force attacks.
Can you update us on the state of fail2ban in Debian and your plans?

-- 
ciao,
Marco
[signature.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org:
Bug#881648; Package fail2ban. (Mon, 15 Jan 2018 10:33:06 GMT) (full text, mbox, link).


Acknowledgement sent to Yaroslav Halchenko <debian@onerussian.com>:
Extra info received and forwarded to list. (Mon, 15 Jan 2018 10:33:06 GMT) (full text, mbox, link).


Message #15 received at 881648@bugs.debian.org (full text, mbox, reply):

From: Yaroslav Halchenko <debian@onerussian.com>
To: md@Linux.IT,881648@bugs.debian.org
Subject: Re: Bug#881648: outdated - fail2ban 0.10 is available with ipv6 support
Date: Mon, 15 Jan 2018 05:28:01 -0500
I Will try to do that later this week

On January 14, 2018 9:02:03 PM EST, md@Linux.IT wrote:
>On Nov 13, Christian Kohlstedde <christian@kohlsted.de> wrote:
>
>> IPv6 usage is growing day by day and so getting fail2ban 0.10 to the
>> official debian repositories gets more important, too. I'm seeing the
>> first brute force attacks on the ssh login using ipv6 and don't like
>the
>> installation of software without a package. Thank you for your work
>and
>Indeed, I see plenty of IPv6 brute force attacks.
>Can you update us on the state of fail2ban in Debian and your plans?



Reply sent to Yaroslav Halchenko <debian@onerussian.com>:
You have taken responsibility. (Tue, 23 Jan 2018 03:09:28 GMT) (full text, mbox, link).


Notification sent to Christian Kohlstedde <christian@kohlsted.de>:
Bug acknowledged by developer. (Tue, 23 Jan 2018 03:09:28 GMT) (full text, mbox, link).


Message #20 received at 881648-close@bugs.debian.org (full text, mbox, reply):

From: Yaroslav Halchenko <debian@onerussian.com>
To: 881648-close@bugs.debian.org
Subject: Bug#881648: fixed in fail2ban 0.10.2-1
Date: Tue, 23 Jan 2018 03:05:15 +0000
Source: fail2ban
Source-Version: 0.10.2-1

We believe that the bug you reported is fixed in the latest version of
fail2ban, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 881648@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Yaroslav Halchenko <debian@onerussian.com> (supplier of updated fail2ban package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 22 Jan 2018 10:38:19 -0500
Source: fail2ban
Binary: fail2ban
Architecture: source all
Version: 0.10.2-1
Distribution: unstable
Urgency: medium
Maintainer: Yaroslav Halchenko <debian@onerussian.com>
Changed-By: Yaroslav Halchenko <debian@onerussian.com>
Description:
 fail2ban   - ban hosts that cause multiple authentication errors
Closes: 470417 498164 847728 878038 881648
Changes:
 fail2ban (0.10.2-1) unstable; urgency=medium
 .
   [ Yaroslav Halchenko ]
   * New major upstream release (thanks to Ervin Hegedüs for help updating
     packaging)
     - Major performance improvements, especially in tests battery
       execution, and shutdown (Closes: #878038)
     - Incremental increase of bantime (Closes: #498164)
     - IPv6 support (Closes: #881648, #470417)
     - Some filters refactored/deprecated, e.g. to take advantage of new
       filter option mode
       - sshd-aggressive and sshd-ddos absorbed into sshd filter
         (modes: normal, ddos, extra, or aggressive)
       - postfix-rbl and postfix-sasl absorbed into postfix
         (modes: more, normal, auth, rbl, ddos, extra, or aggressive)
     - New actions: abuseipd, nginx-block-map
     - New filters: phpmyadmin-syslog, zoneminder
   * A number of new patches added to address failing tests from
     https://github.com/fail2ban/fail2ban/pull/2025
   * debian/control
     - Boosted policy to 4.1.3
     - sqlite3 is now needed for some tests, thus added to build-depends
       and suggests
   * debian/README.Debian
     - Instructions on how to establish correct startup/shutdown sequence
       in systemd for shorewall (Closes: #847728). Thanks Ben Coleman for the
       final recipe
 .
   [ Viktor Szépe ]
   * Install provided config for monit under /etc/monit/conf-available
     (instead of /etc/monit/monitrc.d, location changed after monit 1:5.15-2)
Checksums-Sha1:
 7abc12df0f8940297893115c79a1e6cea4ba204f 1897 fail2ban_0.10.2-1.dsc
 e0502d6d1b9aa6416d49ab977dbe3b14cf803c4e 474739 fail2ban_0.10.2.orig.tar.gz
 9041b020e11b7940f68aba6bf7459716eb520620 28920 fail2ban_0.10.2-1.debian.tar.xz
 927f8588fa22482d060c05e96b2a4f610e657846 384024 fail2ban_0.10.2-1_all.deb
 4c612507b7030ff6cc4ab2af2b570b1742b95915 6045 fail2ban_0.10.2-1_amd64.buildinfo
Checksums-Sha256:
 fcd49c3eff53c0b9ff200675522de231ebba172fe44b2efb5aea7bc85b2bba7b 1897 fail2ban_0.10.2-1.dsc
 22744cb9f2dbc50ba50873b14dbfc9b4c078c170f4d29b2600faf3da99b4038d 474739 fail2ban_0.10.2.orig.tar.gz
 7e976c5e052ff482ad571f1f3f4c6d4d0a2e9309e09e59d5ca273158e7e69908 28920 fail2ban_0.10.2-1.debian.tar.xz
 9245f91ef6c03fdf4d026abda93475a94ec61505a62b9554684507d3c1f62c80 384024 fail2ban_0.10.2-1_all.deb
 ffa5a737972350339d3b95801bdbd492627f7c5ae7a8143f732baa3102ec8385 6045 fail2ban_0.10.2-1_amd64.buildinfo
Files:
 bde538ca15b55a19ce11d5366a29ac39 1897 net optional fail2ban_0.10.2-1.dsc
 298a50cbc6298b8aef6a6bf8aae142e6 474739 net optional fail2ban_0.10.2.orig.tar.gz
 20de852436c07475da073e02316625f2 28920 net optional fail2ban_0.10.2-1.debian.tar.xz
 431faabc96c0b1170d026e4b942bd0f6 384024 net optional fail2ban_0.10.2-1_all.deb
 13c951ad840130cbc8b7d54621057c1f 6045 net optional fail2ban_0.10.2-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=fHUc
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 25 Feb 2018 07:29:07 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Fri Nov 22 00:09:53 2024; Machine Name: bembo

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.