Report forwarded
to debian-bugs-dist@lists.debian.org, Yaroslav Halchenko <debian@onerussian.com>: Bug#881648; Package fail2ban.
(Mon, 13 Nov 2017 20:57:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Christian Kohlstedde <christian@kohlsted.de>:
New Bug report received and forwarded. Copy sent to Yaroslav Halchenko <debian@onerussian.com>.
(Mon, 13 Nov 2017 20:57:04 GMT) (full text, mbox, link).
Package: fail2ban
Version: 0.9.7-2
The fail2ban team released the version 0.10.0 on Aug 9. This version
adds the long awaited IPv6 support. As fail2ban is a basic package and -
in my opinion - is essential for every public reachable system, I'm
interested in the status of fail2ban 0.10 in debian.
IPv6 usage is growing day by day and so getting fail2ban 0.10 to the
official debian repositories gets more important, too. I'm seeing the
first brute force attacks on the ssh login using ipv6 and don't like the
installation of software without a package. Thank you for your work and
in advance to the hopefully nearby release of a fail2ban 0.10 package in
the officially repositories!
Yours
Christian Kohlstedde
Information forwarded
to debian-bugs-dist@lists.debian.org, Yaroslav Halchenko <debian@onerussian.com>: Bug#881648; Package fail2ban.
(Mon, 15 Jan 2018 02:06:03 GMT) (full text, mbox, link).
Acknowledgement sent
to md@Linux.IT (Marco d'Itri):
Extra info received and forwarded to list. Copy sent to Yaroslav Halchenko <debian@onerussian.com>.
(Mon, 15 Jan 2018 02:06:03 GMT) (full text, mbox, link).
On Nov 13, Christian Kohlstedde <christian@kohlsted.de> wrote:
> IPv6 usage is growing day by day and so getting fail2ban 0.10 to the
> official debian repositories gets more important, too. I'm seeing the
> first brute force attacks on the ssh login using ipv6 and don't like the
> installation of software without a package. Thank you for your work and
Indeed, I see plenty of IPv6 brute force attacks.
Can you update us on the state of fail2ban in Debian and your plans?
--
ciao,
Marco
Information forwarded
to debian-bugs-dist@lists.debian.org: Bug#881648; Package fail2ban.
(Mon, 15 Jan 2018 10:33:06 GMT) (full text, mbox, link).
Acknowledgement sent
to Yaroslav Halchenko <debian@onerussian.com>:
Extra info received and forwarded to list.
(Mon, 15 Jan 2018 10:33:06 GMT) (full text, mbox, link).
Subject: Re: Bug#881648: outdated - fail2ban 0.10 is available with ipv6 support
Date: Mon, 15 Jan 2018 05:28:01 -0500
I Will try to do that later this week
On January 14, 2018 9:02:03 PM EST, md@Linux.IT wrote:
>On Nov 13, Christian Kohlstedde <christian@kohlsted.de> wrote:
>
>> IPv6 usage is growing day by day and so getting fail2ban 0.10 to the
>> official debian repositories gets more important, too. I'm seeing the
>> first brute force attacks on the ssh login using ipv6 and don't like
>the
>> installation of software without a package. Thank you for your work
>and
>Indeed, I see plenty of IPv6 brute force attacks.
>Can you update us on the state of fail2ban in Debian and your plans?
Reply sent
to Yaroslav Halchenko <debian@onerussian.com>:
You have taken responsibility.
(Tue, 23 Jan 2018 03:09:28 GMT) (full text, mbox, link).
Notification sent
to Christian Kohlstedde <christian@kohlsted.de>:
Bug acknowledged by developer.
(Tue, 23 Jan 2018 03:09:28 GMT) (full text, mbox, link).
Source: fail2ban
Source-Version: 0.10.2-1
We believe that the bug you reported is fixed in the latest version of
fail2ban, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 881648@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Yaroslav Halchenko <debian@onerussian.com> (supplier of updated fail2ban package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Mon, 22 Jan 2018 10:38:19 -0500
Source: fail2ban
Binary: fail2ban
Architecture: source all
Version: 0.10.2-1
Distribution: unstable
Urgency: medium
Maintainer: Yaroslav Halchenko <debian@onerussian.com>
Changed-By: Yaroslav Halchenko <debian@onerussian.com>
Description:
fail2ban - ban hosts that cause multiple authentication errors
Closes: 470417498164847728878038881648
Changes:
fail2ban (0.10.2-1) unstable; urgency=medium
.
[ Yaroslav Halchenko ]
* New major upstream release (thanks to Ervin Hegedüs for help updating
packaging)
- Major performance improvements, especially in tests battery
execution, and shutdown (Closes: #878038)
- Incremental increase of bantime (Closes: #498164)
- IPv6 support (Closes: #881648, #470417)
- Some filters refactored/deprecated, e.g. to take advantage of new
filter option mode
- sshd-aggressive and sshd-ddos absorbed into sshd filter
(modes: normal, ddos, extra, or aggressive)
- postfix-rbl and postfix-sasl absorbed into postfix
(modes: more, normal, auth, rbl, ddos, extra, or aggressive)
- New actions: abuseipd, nginx-block-map
- New filters: phpmyadmin-syslog, zoneminder
* A number of new patches added to address failing tests from
https://github.com/fail2ban/fail2ban/pull/2025
* debian/control
- Boosted policy to 4.1.3
- sqlite3 is now needed for some tests, thus added to build-depends
and suggests
* debian/README.Debian
- Instructions on how to establish correct startup/shutdown sequence
in systemd for shorewall (Closes: #847728). Thanks Ben Coleman for the
final recipe
.
[ Viktor Szépe ]
* Install provided config for monit under /etc/monit/conf-available
(instead of /etc/monit/monitrc.d, location changed after monit 1:5.15-2)
Checksums-Sha1:
7abc12df0f8940297893115c79a1e6cea4ba204f 1897 fail2ban_0.10.2-1.dsc
e0502d6d1b9aa6416d49ab977dbe3b14cf803c4e 474739 fail2ban_0.10.2.orig.tar.gz
9041b020e11b7940f68aba6bf7459716eb520620 28920 fail2ban_0.10.2-1.debian.tar.xz
927f8588fa22482d060c05e96b2a4f610e657846 384024 fail2ban_0.10.2-1_all.deb
4c612507b7030ff6cc4ab2af2b570b1742b95915 6045 fail2ban_0.10.2-1_amd64.buildinfo
Checksums-Sha256:
fcd49c3eff53c0b9ff200675522de231ebba172fe44b2efb5aea7bc85b2bba7b 1897 fail2ban_0.10.2-1.dsc
22744cb9f2dbc50ba50873b14dbfc9b4c078c170f4d29b2600faf3da99b4038d 474739 fail2ban_0.10.2.orig.tar.gz
7e976c5e052ff482ad571f1f3f4c6d4d0a2e9309e09e59d5ca273158e7e69908 28920 fail2ban_0.10.2-1.debian.tar.xz
9245f91ef6c03fdf4d026abda93475a94ec61505a62b9554684507d3c1f62c80 384024 fail2ban_0.10.2-1_all.deb
ffa5a737972350339d3b95801bdbd492627f7c5ae7a8143f732baa3102ec8385 6045 fail2ban_0.10.2-1_amd64.buildinfo
Files:
bde538ca15b55a19ce11d5366a29ac39 1897 net optional fail2ban_0.10.2-1.dsc
298a50cbc6298b8aef6a6bf8aae142e6 474739 net optional fail2ban_0.10.2.orig.tar.gz
20de852436c07475da073e02316625f2 28920 net optional fail2ban_0.10.2-1.debian.tar.xz
431faabc96c0b1170d026e4b942bd0f6 384024 net optional fail2ban_0.10.2-1_all.deb
13c951ad840130cbc8b7d54621057c1f 6045 net optional fail2ban_0.10.2-1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEExbkF8OjZ/ZZo/zZvot4jUGLaM/oFAlpmoLsACgkQot4jUGLa
M/rBIQ/9HZLQRQHUhWnf9e3uHMje5wvuCMZh2trDBCasHIfF/79IMO6w2JMpCOlM
11swPXkbX3HedFyCJXOt41543/C1vqAWfzk2nUMnz/k3/26M/n0mohJM9CzGmGqT
mYUGpZq9B8ascQirHFJqq3OOU1TunksCqx9uENIGgMuhzKwcMu0ANY6llOn6wwNu
vDRRRfeEMdZrXnyaRzpKdRSuE9Np9o22/vj0L1nGDFWa2cZ3wOtMxmkSM0e89tYi
B5eOdWnLxCyHFj2tSGy7TBmIo61rQCeHfwhGLHjHmXuZc7P3EfQdsSN9bw/g/s1k
9Zs07oIgQ/gqqxReccuzMubAFvA7EOOQCmzHbCsKtyNCwUqp1OFj3oIN9WBr5UWv
/BgJyBmzOwCTjQvgzVSBRF6NDyhEYUeiut/q9nbSvbEgH4BL3XHEVdSRmqNiuS0U
ZaXLnYHWFi5th1HkIO15uYagbbenQLK0Sm8RsYBdnqai+vGkahnJ+DXdjOc6/erw
Mi/04iWcesw3wsT4jBNhAjYAxHtnzRbH09+1z36HUWkeWbF5n9oT3fULKXMXoQHe
c+fK6UgoG9U/P8h0joaWL7b0D0ybfQRO9XPdAu1NtHYjTxNb9Ewn8AECJgylsD4P
lGb8YCfIEYrBHcoz1eaPzscHz4sS2hWVlqj3269MMP88s9NRsLM=
=fHUc
-----END PGP SIGNATURE-----
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Sun, 25 Feb 2018 07:29:07 GMT) (full text, mbox, link).
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.