Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 2015-03-26 14:17:13,754 fail2ban.comm [2743]: DEBUG Command: ['stop']
- 2015-03-26 14:17:13,754 fail2ban.server [2743]: DEBUG Removed socket file /var/run/fail2ban/fail2ban.sock
- 2015-03-26 14:17:13,754 fail2ban.server [2743]: DEBUG Socket shutdown
- 2015-03-26 14:17:13,754 fail2ban.server [2743]: INFO Stopping all jails
- 2015-03-26 14:17:13,754 fail2ban.server [2743]: DEBUG Stopping jail postfix-banhammer
- 2015-03-26 14:17:14,488 fail2ban.actions[2743]: DEBUG Flush ban list
- 2015-03-26 14:17:14,488 fail2ban.actions.action[2743]: DEBUG iptables -D INPUT -p tcp -m multiport --dports smtp,465,submission -j fail2ban-PFIX
- iptables -F fail2ban-PFIX
- iptables -X fail2ban-PFIX
- 2015-03-26 14:17:14,499 fail2ban.actions.action[2743]: DEBUG iptables -D INPUT -p tcp -m multiport --dports smtp,465,submission -j fail2ban-PFIX
- iptables -F fail2ban-PFIX
- iptables -X fail2ban-PFIX returned successfully
- 2015-03-26 14:17:14,500 fail2ban.actions[2743]: DEBUG postfix-banhammer: action terminated
- 2015-03-26 14:17:14,500 fail2ban.jail [2743]: INFO Jail 'postfix-banhammer' stopped
- 2015-03-26 14:17:14,500 fail2ban.server [2743]: DEBUG Stopping jail dovecot-banhammer
- 2015-03-26 14:17:15,489 fail2ban.actions[2743]: DEBUG Flush ban list
- 2015-03-26 14:17:15,489 fail2ban.actions.action[2743]: DEBUG iptables -D INPUT -p tcp -m multiport --dports pop3,pop3s,imap,imaps -j fail2ban-DCOT
- iptables -F fail2ban-DCOT
- iptables -X fail2ban-DCOT
- 2015-03-26 14:17:15,496 fail2ban.actions.action[2743]: DEBUG iptables -D INPUT -p tcp -m multiport --dports pop3,pop3s,imap,imaps -j fail2ban-DCOT
- iptables -F fail2ban-DCOT
- iptables -X fail2ban-DCOT returned successfully
- 2015-03-26 14:17:15,496 fail2ban.actions[2743]: DEBUG dovecot-banhammer: action terminated
- 2015-03-26 14:17:15,497 fail2ban.jail [2743]: INFO Jail 'dovecot-banhammer' stopped
- 2015-03-26 14:17:15,497 fail2ban.server [2743]: DEBUG Stopping jail sasl-banhammer
- 2015-03-26 14:17:16,491 fail2ban.actions[2743]: DEBUG Flush ban list
- 2015-03-26 14:17:16,492 fail2ban.actions.action[2743]: DEBUG iptables -D INPUT -p tcp -m multiport --dports smtp,465,submission -j fail2ban-SASL
- iptables -F fail2ban-SASL
- iptables -X fail2ban-SASL
- 2015-03-26 14:17:16,498 fail2ban.actions.action[2743]: DEBUG iptables -D INPUT -p tcp -m multiport --dports smtp,465,submission -j fail2ban-SASL
- iptables -F fail2ban-SASL
- iptables -X fail2ban-SASL returned successfully
- 2015-03-26 14:17:16,499 fail2ban.actions[2743]: DEBUG sasl-banhammer: action terminated
- 2015-03-26 14:17:16,499 fail2ban.jail [2743]: INFO Jail 'sasl-banhammer' stopped
- 2015-03-26 14:17:16,500 fail2ban.server [2743]: DEBUG Remove PID file /var/run/fail2ban/fail2ban.pid
- 2015-03-26 14:17:16,500 fail2ban.server [2743]: INFO Exiting Fail2ban
- 2015-03-26 14:17:16,985 fail2ban.server [3099]: INFO Changed logging target to /var/log/fail2ban.log for Fail2ban v0.8.14
- 2015-03-26 14:17:16,986 fail2ban.comm [3099]: DEBUG Command: ['add', 'postfix-banhammer', 'auto']
- 2015-03-26 14:17:16,986 fail2ban.jail [3099]: INFO Creating new jail 'postfix-banhammer'
- 2015-03-26 14:17:17,022 fail2ban.jail [3099]: INFO Jail 'postfix-banhammer' uses pyinotify
- 2015-03-26 14:17:17,040 fail2ban.filter [3099]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('postfix-banhammer'))
- 2015-03-26 14:17:17,051 fail2ban.filter [3099]: DEBUG Created FilterPyinotify(Jail('postfix-banhammer'))
- 2015-03-26 14:17:17,053 fail2ban.filter [3099]: DEBUG Created FilterPyinotify
- 2015-03-26 14:17:17,053 fail2ban.jail [3099]: INFO Initiated 'pyinotify' backend
- 2015-03-26 14:17:17,054 fail2ban.comm [3099]: DEBUG Command: ['set', 'postfix-banhammer', 'usedns', 'warn']
- 2015-03-26 14:17:17,054 fail2ban.filter [3099]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('postfix-banhammer'))
- 2015-03-26 14:17:17,054 fail2ban.comm [3099]: DEBUG Command: ['set', 'postfix-banhammer', 'addlogpath', '/var/log/maillog']
- 2015-03-26 14:17:17,054 fail2ban.filter [3099]: INFO Added logfile = /var/log/maillog
- 2015-03-26 14:17:17,055 fail2ban.filter [3099]: DEBUG Added monitor for the parent directory /var/log
- 2015-03-26 14:17:17,055 fail2ban.filter [3099]: DEBUG Added file watcher for /var/log/maillog
- 2015-03-26 14:17:17,055 fail2ban.filter.datedetector[3099]: DEBUG Sorting the template list
- 2015-03-26 14:17:17,055 fail2ban.filter.datedetector[3099]: DEBUG Winning template: WEEKDAY MONTH Day Hour:Minute:Second[.subsecond] Year with 0 hits
- 2015-03-26 14:17:17,055 fail2ban.comm [3099]: DEBUG Command: ['set', 'postfix-banhammer', 'maxretry', '3']
- 2015-03-26 14:17:17,055 fail2ban.filter [3099]: INFO Set maxRetry = 3
- 2015-03-26 14:17:17,056 fail2ban.comm [3099]: DEBUG Command: ['set', 'postfix-banhammer', 'ignorecommand', '']
- 2015-03-26 14:17:17,056 fail2ban.comm [3099]: DEBUG Command: ['set', 'postfix-banhammer', 'findtime', '600']
- 2015-03-26 14:17:17,056 fail2ban.filter [3099]: INFO Set findtime = 600
- 2015-03-26 14:17:17,056 fail2ban.comm [3099]: DEBUG Command: ['set', 'postfix-banhammer', 'bantime', '7200']
- 2015-03-26 14:17:17,056 fail2ban.actions[3099]: INFO Set banTime = 7200
- 2015-03-26 14:17:17,057 fail2ban.comm [3099]: DEBUG Command: ['set', 'postfix-banhammer', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?postfix/smtpd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?postfix/smtpd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*NOQUEUE: reject: RCPT from \\S+\\[<HOST>\\]: 554 5\\.7\\.1 .*$']
- 2015-03-26 14:17:17,059 fail2ban.comm [3099]: DEBUG Command: ['set', 'postfix-banhammer', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?postfix/smtpd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?postfix/smtpd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*NOQUEUE: reject: RCPT from \\S+\\[<HOST>\\]: 450 4\\.7\\.1 : Helo command rejected: Host not found; from=<> to=<> proto=ESMTP helo= *$']
- 2015-03-26 14:17:17,061 fail2ban.comm [3099]: DEBUG Command: ['set', 'postfix-banhammer', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?postfix/smtpd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?postfix/smtpd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*NOQUEUE: reject: VRFY from \\S+\\[<HOST>\\]: 550 5\\.1\\.1 .*$']
- 2015-03-26 14:17:17,062 fail2ban.comm [3099]: DEBUG Command: ['set', 'postfix-banhammer', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?postfix/smtpd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?postfix/smtpd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*improper command pipelining after \\S+ from [^[]*\\[<HOST>\\]:?$']
- 2015-03-26 14:17:17,064 fail2ban.comm [3099]: DEBUG Command: ['set', 'postfix-banhammer', 'addaction', 'iptables-multiport']
- 2015-03-26 14:17:17,064 fail2ban.actions.action[3099]: DEBUG Created Action
- 2015-03-26 14:17:17,065 fail2ban.comm [3099]: DEBUG Command: ['set', 'postfix-banhammer', 'actionban', 'iptables-multiport', 'iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>']
- 2015-03-26 14:17:17,065 fail2ban.actions.action[3099]: DEBUG Set actionBan = iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>
- 2015-03-26 14:17:17,065 fail2ban.comm [3099]: DEBUG Command: ['set', 'postfix-banhammer', 'actionstop', 'iptables-multiport', 'iptables -D <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>\niptables -F fail2ban-<name>\niptables -X fail2ban-<name>']
- 2015-03-26 14:17:17,065 fail2ban.actions.action[3099]: DEBUG Set actionStop = iptables -D <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>
- iptables -F fail2ban-<name>
- iptables -X fail2ban-<name>
- 2015-03-26 14:17:17,065 fail2ban.comm [3099]: DEBUG Command: ['set', 'postfix-banhammer', 'actionstart', 'iptables-multiport', 'iptables -N fail2ban-<name>\niptables -A fail2ban-<name> -j RETURN\niptables -I <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>']
- 2015-03-26 14:17:17,065 fail2ban.actions.action[3099]: DEBUG Set actionStart = iptables -N fail2ban-<name>
- iptables -A fail2ban-<name> -j RETURN
- iptables -I <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>
- 2015-03-26 14:17:17,066 fail2ban.comm [3099]: DEBUG Command: ['set', 'postfix-banhammer', 'actionunban', 'iptables-multiport', 'iptables -D fail2ban-<name> -s <ip> -j <blocktype>']
- 2015-03-26 14:17:17,066 fail2ban.actions.action[3099]: DEBUG Set actionUnban = iptables -D fail2ban-<name> -s <ip> -j <blocktype>
- 2015-03-26 14:17:17,066 fail2ban.comm [3099]: DEBUG Command: ['set', 'postfix-banhammer', 'actioncheck', 'iptables-multiport', "iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \\t]'"]
- 2015-03-26 14:17:17,066 fail2ban.actions.action[3099]: DEBUG Set actionCheck = iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \t]'
- 2015-03-26 14:17:17,066 fail2ban.comm [3099]: DEBUG Command: ['set', 'postfix-banhammer', 'setcinfo', 'iptables-multiport', 'blocktype', 'REJECT --reject-with icmp-port-unreachable']
- 2015-03-26 14:17:17,067 fail2ban.comm [3099]: DEBUG Command: ['set', 'postfix-banhammer', 'setcinfo', 'iptables-multiport', 'protocol', 'tcp']
- 2015-03-26 14:17:17,067 fail2ban.comm [3099]: DEBUG Command: ['set', 'postfix-banhammer', 'setcinfo', 'iptables-multiport', 'name', 'PFIX']
- 2015-03-26 14:17:17,067 fail2ban.comm [3099]: DEBUG Command: ['set', 'postfix-banhammer', 'setcinfo', 'iptables-multiport', 'chain', 'INPUT']
- 2015-03-26 14:17:17,067 fail2ban.comm [3099]: DEBUG Command: ['set', 'postfix-banhammer', 'setcinfo', 'iptables-multiport', 'port', 'smtp,465,submission']
- 2015-03-26 14:17:17,068 fail2ban.comm [3099]: DEBUG Command: ['add', 'dovecot-banhammer', 'auto']
- 2015-03-26 14:17:17,068 fail2ban.jail [3099]: INFO Creating new jail 'dovecot-banhammer'
- 2015-03-26 14:17:17,068 fail2ban.jail [3099]: INFO Jail 'dovecot-banhammer' uses pyinotify
- 2015-03-26 14:17:17,068 fail2ban.filter [3099]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('dovecot-banhammer'))
- 2015-03-26 14:17:17,068 fail2ban.filter [3099]: DEBUG Created FilterPyinotify(Jail('dovecot-banhammer'))
- 2015-03-26 14:17:17,071 fail2ban.filter [3099]: DEBUG Created FilterPyinotify
- 2015-03-26 14:17:17,071 fail2ban.jail [3099]: INFO Initiated 'pyinotify' backend
- 2015-03-26 14:17:17,071 fail2ban.comm [3099]: DEBUG Command: ['set', 'dovecot-banhammer', 'usedns', 'warn']
- 2015-03-26 14:17:17,071 fail2ban.filter [3099]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('dovecot-banhammer'))
- 2015-03-26 14:17:17,072 fail2ban.comm [3099]: DEBUG Command: ['set', 'dovecot-banhammer', 'addlogpath', '/var/log/maillog']
- 2015-03-26 14:17:17,072 fail2ban.filter [3099]: INFO Added logfile = /var/log/maillog
- 2015-03-26 14:17:17,072 fail2ban.filter [3099]: DEBUG Added monitor for the parent directory /var/log
- 2015-03-26 14:17:17,072 fail2ban.filter [3099]: DEBUG Added file watcher for /var/log/maillog
- 2015-03-26 14:17:17,072 fail2ban.filter.datedetector[3099]: DEBUG Sorting the template list
- 2015-03-26 14:17:17,072 fail2ban.filter.datedetector[3099]: DEBUG Winning template: WEEKDAY MONTH Day Hour:Minute:Second[.subsecond] Year with 0 hits
- 2015-03-26 14:17:17,072 fail2ban.comm [3099]: DEBUG Command: ['set', 'dovecot-banhammer', 'maxretry', '10']
- 2015-03-26 14:17:17,072 fail2ban.filter [3099]: INFO Set maxRetry = 10
- 2015-03-26 14:17:17,073 fail2ban.comm [3099]: DEBUG Command: ['set', 'dovecot-banhammer', 'ignorecommand', '']
- 2015-03-26 14:17:17,073 fail2ban.comm [3099]: DEBUG Command: ['set', 'dovecot-banhammer', 'findtime', '300']
- 2015-03-26 14:17:17,073 fail2ban.filter [3099]: INFO Set findtime = 300
- 2015-03-26 14:17:17,073 fail2ban.comm [3099]: DEBUG Command: ['set', 'dovecot-banhammer', 'bantime', '1800']
- 2015-03-26 14:17:17,073 fail2ban.actions[3099]: INFO Set banTime = 1800
- 2015-03-26 14:17:17,074 fail2ban.comm [3099]: DEBUG Command: ['set', 'dovecot-banhammer', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?(auth|dovecot(-auth)?|auth-worker)(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?(auth|dovecot(-auth)?|auth-worker)(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*(pam_unix(\\(dovecot:auth\\))?:)?\\s+authentication failure; logname=\\S* uid=\\S* euid=\\S* tty=dovecot ruser=\\S* rhost=<HOST>(\\s+user=\\S*)?\\s*$']
- 2015-03-26 14:17:17,076 fail2ban.comm [3099]: DEBUG Command: ['set', 'dovecot-banhammer', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?(auth|dovecot(-auth)?|auth-worker)(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?(auth|dovecot(-auth)?|auth-worker)(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*(pop3|imap)-login: (Info: )?(Aborted login|Disconnected)(: Inactivity)? \\(((auth failed, \\d+ attempts)( in \\d+ secs)?|tried to use (disabled|disallowed) \\S+ auth)\\):( user=<\\S*>,)?( method=\\S+,)? rip=<HOST>(, lip=(\\d{1,3}\\.){3}\\d{1,3})?(, TLS( handshaking(: SSL_accept\\(\\) failed: error:[\\dA-F]+:SSL routines:[TLS\\d]+_GET_CLIENT_HELLO:unknown protocol)?)?(: Disconnected)?)?(, session=<\\S+>)?\\s*$']
- 2015-03-26 14:17:17,080 fail2ban.comm [3099]: DEBUG Command: ['set', 'dovecot-banhammer', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?(auth|dovecot(-auth)?|auth-worker)(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?(auth|dovecot(-auth)?|auth-worker)(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*(Info|dovecot: auth\\(default\\)): pam\\(\\S+,<HOST>\\): pam_authenticate\\(\\) failed: (User not known to the underlying authentication module: \\d+ Time\\(s\\)|Authentication failure \\(password mismatch\\?\\))\\s*$']
- 2015-03-26 14:17:17,083 fail2ban.comm [3099]: DEBUG Command: ['set', 'dovecot-banhammer', 'addaction', 'iptables-multiport']
- 2015-03-26 14:17:17,083 fail2ban.actions.action[3099]: DEBUG Created Action
- 2015-03-26 14:17:17,083 fail2ban.comm [3099]: DEBUG Command: ['set', 'dovecot-banhammer', 'actionban', 'iptables-multiport', 'iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>']
- 2015-03-26 14:17:17,083 fail2ban.actions.action[3099]: DEBUG Set actionBan = iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>
- 2015-03-26 14:17:17,083 fail2ban.comm [3099]: DEBUG Command: ['set', 'dovecot-banhammer', 'actionstop', 'iptables-multiport', 'iptables -D <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>\niptables -F fail2ban-<name>\niptables -X fail2ban-<name>']
- 2015-03-26 14:17:17,083 fail2ban.actions.action[3099]: DEBUG Set actionStop = iptables -D <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>
- iptables -F fail2ban-<name>
- iptables -X fail2ban-<name>
- 2015-03-26 14:17:17,084 fail2ban.comm [3099]: DEBUG Command: ['set', 'dovecot-banhammer', 'actionstart', 'iptables-multiport', 'iptables -N fail2ban-<name>\niptables -A fail2ban-<name> -j RETURN\niptables -I <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>']
- 2015-03-26 14:17:17,084 fail2ban.actions.action[3099]: DEBUG Set actionStart = iptables -N fail2ban-<name>
- iptables -A fail2ban-<name> -j RETURN
- iptables -I <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>
- 2015-03-26 14:17:17,084 fail2ban.comm [3099]: DEBUG Command: ['set', 'dovecot-banhammer', 'actionunban', 'iptables-multiport', 'iptables -D fail2ban-<name> -s <ip> -j <blocktype>']
- 2015-03-26 14:17:17,084 fail2ban.actions.action[3099]: DEBUG Set actionUnban = iptables -D fail2ban-<name> -s <ip> -j <blocktype>
- 2015-03-26 14:17:17,084 fail2ban.comm [3099]: DEBUG Command: ['set', 'dovecot-banhammer', 'actioncheck', 'iptables-multiport', "iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \\t]'"]
- 2015-03-26 14:17:17,085 fail2ban.actions.action[3099]: DEBUG Set actionCheck = iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \t]'
- 2015-03-26 14:17:17,085 fail2ban.comm [3099]: DEBUG Command: ['set', 'dovecot-banhammer', 'setcinfo', 'iptables-multiport', 'blocktype', 'REJECT --reject-with icmp-port-unreachable']
- 2015-03-26 14:17:17,085 fail2ban.comm [3099]: DEBUG Command: ['set', 'dovecot-banhammer', 'setcinfo', 'iptables-multiport', 'protocol', 'tcp']
- 2015-03-26 14:17:17,085 fail2ban.comm [3099]: DEBUG Command: ['set', 'dovecot-banhammer', 'setcinfo', 'iptables-multiport', 'name', 'DCOT']
- 2015-03-26 14:17:17,086 fail2ban.comm [3099]: DEBUG Command: ['set', 'dovecot-banhammer', 'setcinfo', 'iptables-multiport', 'chain', 'INPUT']
- 2015-03-26 14:17:17,086 fail2ban.comm [3099]: DEBUG Command: ['set', 'dovecot-banhammer', 'setcinfo', 'iptables-multiport', 'port', 'pop3,pop3s,imap,imaps']
- 2015-03-26 14:17:17,086 fail2ban.comm [3099]: DEBUG Command: ['add', 'sasl-banhammer', 'auto']
- 2015-03-26 14:17:17,086 fail2ban.jail [3099]: INFO Creating new jail 'sasl-banhammer'
- 2015-03-26 14:17:17,086 fail2ban.jail [3099]: INFO Jail 'sasl-banhammer' uses pyinotify
- 2015-03-26 14:17:17,086 fail2ban.filter [3099]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('sasl-banhammer'))
- 2015-03-26 14:17:17,087 fail2ban.filter [3099]: DEBUG Created FilterPyinotify(Jail('sasl-banhammer'))
- 2015-03-26 14:17:17,089 fail2ban.filter [3099]: DEBUG Created FilterPyinotify
- 2015-03-26 14:17:17,090 fail2ban.jail [3099]: INFO Initiated 'pyinotify' backend
- 2015-03-26 14:17:17,090 fail2ban.comm [3099]: DEBUG Command: ['set', 'sasl-banhammer', 'usedns', 'warn']
- 2015-03-26 14:17:17,090 fail2ban.filter [3099]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('sasl-banhammer'))
- 2015-03-26 14:17:17,090 fail2ban.comm [3099]: DEBUG Command: ['set', 'sasl-banhammer', 'addlogpath', '/var/log/maillog']
- 2015-03-26 14:17:17,090 fail2ban.filter [3099]: INFO Added logfile = /var/log/maillog
- 2015-03-26 14:17:17,090 fail2ban.filter [3099]: DEBUG Added monitor for the parent directory /var/log
- 2015-03-26 14:17:17,091 fail2ban.filter [3099]: DEBUG Added file watcher for /var/log/maillog
- 2015-03-26 14:17:17,091 fail2ban.filter.datedetector[3099]: DEBUG Sorting the template list
- 2015-03-26 14:17:17,091 fail2ban.filter.datedetector[3099]: DEBUG Winning template: WEEKDAY MONTH Day Hour:Minute:Second[.subsecond] Year with 0 hits
- 2015-03-26 14:17:17,091 fail2ban.comm [3099]: DEBUG Command: ['set', 'sasl-banhammer', 'maxretry', '10']
- 2015-03-26 14:17:17,091 fail2ban.filter [3099]: INFO Set maxRetry = 10
- 2015-03-26 14:17:17,091 fail2ban.comm [3099]: DEBUG Command: ['set', 'sasl-banhammer', 'ignorecommand', '']
- 2015-03-26 14:17:17,092 fail2ban.comm [3099]: DEBUG Command: ['set', 'sasl-banhammer', 'findtime', '300']
- 2015-03-26 14:17:17,092 fail2ban.filter [3099]: INFO Set findtime = 300
- 2015-03-26 14:17:17,092 fail2ban.comm [3099]: DEBUG Command: ['set', 'sasl-banhammer', 'bantime', '1800']
- 2015-03-26 14:17:17,092 fail2ban.actions[3099]: INFO Set banTime = 1800
- 2015-03-26 14:17:17,092 fail2ban.comm [3099]: DEBUG Command: ['set', 'sasl-banhammer', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?postfix/smtpd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?postfix/smtpd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*warning: [-._\\w]+\\[<HOST>\\]: SASL (?:LOGIN|PLAIN|(?:CRAM|DIGEST)-MD5) authentication failed(: [ A-Za-z0-9+/]*={0,2})?\\s*$']
- 2015-03-26 14:17:17,094 fail2ban.comm [3099]: DEBUG Command: ['set', 'sasl-banhammer', 'addaction', 'iptables-multiport']
- 2015-03-26 14:17:17,094 fail2ban.actions.action[3099]: DEBUG Created Action
- 2015-03-26 14:17:17,095 fail2ban.comm [3099]: DEBUG Command: ['set', 'sasl-banhammer', 'actionban', 'iptables-multiport', 'iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>']
- 2015-03-26 14:17:17,095 fail2ban.actions.action[3099]: DEBUG Set actionBan = iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>
- 2015-03-26 14:17:17,095 fail2ban.comm [3099]: DEBUG Command: ['set', 'sasl-banhammer', 'actionstop', 'iptables-multiport', 'iptables -D <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>\niptables -F fail2ban-<name>\niptables -X fail2ban-<name>']
- 2015-03-26 14:17:17,095 fail2ban.actions.action[3099]: DEBUG Set actionStop = iptables -D <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>
- iptables -F fail2ban-<name>
- iptables -X fail2ban-<name>
- 2015-03-26 14:17:17,095 fail2ban.comm [3099]: DEBUG Command: ['set', 'sasl-banhammer', 'actionstart', 'iptables-multiport', 'iptables -N fail2ban-<name>\niptables -A fail2ban-<name> -j RETURN\niptables -I <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>']
- 2015-03-26 14:17:17,095 fail2ban.actions.action[3099]: DEBUG Set actionStart = iptables -N fail2ban-<name>
- iptables -A fail2ban-<name> -j RETURN
- iptables -I <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>
- 2015-03-26 14:17:17,096 fail2ban.comm [3099]: DEBUG Command: ['set', 'sasl-banhammer', 'actionunban', 'iptables-multiport', 'iptables -D fail2ban-<name> -s <ip> -j <blocktype>']
- 2015-03-26 14:17:17,096 fail2ban.actions.action[3099]: DEBUG Set actionUnban = iptables -D fail2ban-<name> -s <ip> -j <blocktype>
- 2015-03-26 14:17:17,096 fail2ban.comm [3099]: DEBUG Command: ['set', 'sasl-banhammer', 'actioncheck', 'iptables-multiport', "iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \\t]'"]
- 2015-03-26 14:17:17,096 fail2ban.actions.action[3099]: DEBUG Set actionCheck = iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \t]'
- 2015-03-26 14:17:17,096 fail2ban.comm [3099]: DEBUG Command: ['set', 'sasl-banhammer', 'setcinfo', 'iptables-multiport', 'blocktype', 'REJECT --reject-with icmp-port-unreachable']
- 2015-03-26 14:17:17,097 fail2ban.comm [3099]: DEBUG Command: ['set', 'sasl-banhammer', 'setcinfo', 'iptables-multiport', 'protocol', 'tcp']
- 2015-03-26 14:17:17,097 fail2ban.comm [3099]: DEBUG Command: ['set', 'sasl-banhammer', 'setcinfo', 'iptables-multiport', 'name', 'SASL']
- 2015-03-26 14:17:17,097 fail2ban.comm [3099]: DEBUG Command: ['set', 'sasl-banhammer', 'setcinfo', 'iptables-multiport', 'chain', 'INPUT']
- 2015-03-26 14:17:17,098 fail2ban.comm [3099]: DEBUG Command: ['set', 'sasl-banhammer', 'setcinfo', 'iptables-multiport', 'port', 'smtp,465,submission']
- 2015-03-26 14:17:17,098 fail2ban.comm [3099]: DEBUG Command: ['start', 'postfix-banhammer']
- 2015-03-26 14:17:17,098 fail2ban.jail [3099]: INFO Jail 'postfix-banhammer' started
- 2015-03-26 14:17:17,098 fail2ban.comm [3099]: DEBUG Command: ['start', 'dovecot-banhammer']
- 2015-03-26 14:17:17,099 fail2ban.actions.action[3099]: DEBUG iptables -N fail2ban-PFIX
- iptables -A fail2ban-PFIX -j RETURN
- iptables -I INPUT -p tcp -m multiport --dports smtp,465,submission -j fail2ban-PFIX
- 2015-03-26 14:17:17,099 fail2ban.filter [3099]: DEBUG pyinotifier started for postfix-banhammer.
- 2015-03-26 14:17:17,101 fail2ban.jail [3099]: INFO Jail 'dovecot-banhammer' started
- 2015-03-26 14:17:17,102 fail2ban.comm [3099]: DEBUG Command: ['start', 'sasl-banhammer']
- 2015-03-26 14:17:17,102 fail2ban.actions.action[3099]: DEBUG iptables -N fail2ban-DCOT
- iptables -A fail2ban-DCOT -j RETURN
- iptables -I INPUT -p tcp -m multiport --dports pop3,pop3s,imap,imaps -j fail2ban-DCOT
- 2015-03-26 14:17:17,102 fail2ban.filter [3099]: DEBUG pyinotifier started for dovecot-banhammer.
- 2015-03-26 14:17:17,103 fail2ban.jail [3099]: INFO Jail 'sasl-banhammer' started
- 2015-03-26 14:17:17,108 fail2ban.actions.action[3099]: DEBUG iptables -N fail2ban-SASL
- iptables -A fail2ban-SASL -j RETURN
- iptables -I INPUT -p tcp -m multiport --dports smtp,465,submission -j fail2ban-SASL
- 2015-03-26 14:17:17,108 fail2ban.filter [3099]: DEBUG pyinotifier started for sasl-banhammer.
- 2015-03-26 14:17:17,109 fail2ban.actions.action[3099]: DEBUG iptables -N fail2ban-PFIX
- iptables -A fail2ban-PFIX -j RETURN
- iptables -I INPUT -p tcp -m multiport --dports smtp,465,submission -j fail2ban-PFIX returned successfully
- 2015-03-26 14:17:17,114 fail2ban.actions.action[3099]: DEBUG iptables -N fail2ban-DCOT
- iptables -A fail2ban-DCOT -j RETURN
- iptables -I INPUT -p tcp -m multiport --dports pop3,pop3s,imap,imaps -j fail2ban-DCOT returned successfully
- 2015-03-26 14:17:17,118 fail2ban.actions.action[3099]: DEBUG iptables -N fail2ban-SASL
- iptables -A fail2ban-SASL -j RETURN
- iptables -I INPUT -p tcp -m multiport --dports smtp,465,submission -j fail2ban-SASL returned successfully
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement