Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 2014-12-05 10:39:13,494 fail2ban.actions.action[1088]: ERROR iptables -D INPUT -p tcp --dport ssh -j fail2ban-SSH
- iptables -F fail2ban-SSH
- iptables -X fail2ban-SSH returned 100
- 2014-12-05 10:39:18,057 fail2ban.server [1362]: INFO Changed logging target to /var/log/fail2ban.log for Fail2ban v0.8.14
- 2014-12-05 10:39:18,058 fail2ban.comm [1362]: DEBUG Command: ['add', 'dovecot-auth', 'auto']
- 2014-12-05 10:39:18,058 fail2ban.jail [1362]: INFO Creating new jail 'dovecot-auth'
- 2014-12-05 10:39:18,118 fail2ban.jail [1362]: INFO Jail 'dovecot-auth' uses pyinotify
- 2014-12-05 10:39:18,126 fail2ban.filter [1362]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('dovecot-auth'))
- 2014-12-05 10:39:18,137 fail2ban.filter [1362]: DEBUG Created FilterPyinotify(Jail('dovecot-auth'))
- 2014-12-05 10:39:18,137 fail2ban.filter [1362]: DEBUG Created FilterPyinotify
- 2014-12-05 10:39:18,137 fail2ban.jail [1362]: INFO Initiated 'pyinotify' backend
- 2014-12-05 10:39:18,138 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot-auth', 'usedns', 'warn']
- 2014-12-05 10:39:18,138 fail2ban.filter [1362]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('dovecot-auth'))
- 2014-12-05 10:39:18,138 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot-auth', 'addlogpath', '/var/log/secure']
- 2014-12-05 10:39:18,139 fail2ban.filter [1362]: INFO Added logfile = /var/log/secure
- 2014-12-05 10:39:18,139 fail2ban.filter [1362]: DEBUG Added monitor for the parent directory /var/log
- 2014-12-05 10:39:18,139 fail2ban.filter [1362]: DEBUG Added file watcher for /var/log/secure
- 2014-12-05 10:39:18,139 fail2ban.filter.datedetector[1362]: DEBUG Sorting the template list
- 2014-12-05 10:39:18,139 fail2ban.filter.datedetector[1362]: DEBUG Winning template: WEEKDAY MONTH Day Hour:Minute:Second[.subsecond] Year with 0 hits
- 2014-12-05 10:39:18,140 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot-auth', 'maxretry', '3']
- 2014-12-05 10:39:18,140 fail2ban.filter [1362]: INFO Set maxRetry = 3
- 2014-12-05 10:39:18,140 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot-auth', 'addignoreip', '127.0.0.1/8']
- 2014-12-05 10:39:18,141 fail2ban.filter [1362]: DEBUG Add 127.0.0.1/8 to ignore list
- 2014-12-05 10:39:18,141 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot-auth', 'ignorecommand', '']
- 2014-12-05 10:39:18,142 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot-auth', 'findtime', '600']
- 2014-12-05 10:39:18,142 fail2ban.filter [1362]: INFO Set findtime = 600
- 2014-12-05 10:39:18,143 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot-auth', 'bantime', '600']
- 2014-12-05 10:39:18,143 fail2ban.actions[1362]: INFO Set banTime = 600
- 2014-12-05 10:39:18,143 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot-auth', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?(auth|dovecot(-auth)?|auth-worker)(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?(auth|dovecot(-auth)?|auth-worker)(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*(pam_unix(\\(dovecot:auth\\))?:)?\\s+authentication failure; logname=\\S* uid=\\S* euid=\\S* tty=dovecot ruser=\\S* rhost=<HOST>(\\s+user=\\S*)?\\s*$']
- 2014-12-05 10:39:18,149 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot-auth', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?(auth|dovecot(-auth)?|auth-worker)(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?(auth|dovecot(-auth)?|auth-worker)(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*(pop3|imap)-login: (Info: )?(Aborted login|Disconnected)(: Inactivity)? \\(((auth failed, \\d+ attempts)( in \\d+ secs)?|tried to use (disabled|disallowed) \\S+ auth)\\):( user=<\\S*>,)?( method=\\S+,)? rip=<HOST>(, lip=(\\d{1,3}\\.){3}\\d{1,3})?(, TLS( handshaking(: SSL_accept\\(\\) failed: error:[\\dA-F]+:SSL routines:[TLS\\d]+_GET_CLIENT_HELLO:unknown protocol)?)?(: Disconnected)?)?(, session=<\\S+>)?\\s*$']
- 2014-12-05 10:39:18,158 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot-auth', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?(auth|dovecot(-auth)?|auth-worker)(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?(auth|dovecot(-auth)?|auth-worker)(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*(Info|dovecot: auth\\(default\\)): pam\\(\\S+,<HOST>\\): pam_authenticate\\(\\) failed: (User not known to the underlying authentication module: \\d+ Time\\(s\\)|Authentication failure \\(password mismatch\\?\\))\\s*$']
- 2014-12-05 10:39:18,166 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot-auth', 'addaction', 'iptables-multiport']
- 2014-12-05 10:39:18,166 fail2ban.actions.action[1362]: DEBUG Created Action
- 2014-12-05 10:39:18,167 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot-auth', 'actionban', 'iptables-multiport', 'iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>']
- 2014-12-05 10:39:18,167 fail2ban.actions.action[1362]: DEBUG Set actionBan = iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>
- 2014-12-05 10:39:18,167 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot-auth', 'actionstop', 'iptables-multiport', 'iptables -D <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>\niptables -F fail2ban-<name>\niptables -X fail2ban-<name>']
- 2014-12-05 10:39:18,167 fail2ban.actions.action[1362]: DEBUG Set actionStop = iptables -D <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>
- iptables -F fail2ban-<name>
- iptables -X fail2ban-<name>
- 2014-12-05 10:39:18,168 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot-auth', 'actionstart', 'iptables-multiport', 'iptables -N fail2ban-<name>\niptables -A fail2ban-<name> -j RETURN\niptables -I <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>']
- 2014-12-05 10:39:18,168 fail2ban.actions.action[1362]: DEBUG Set actionStart = iptables -N fail2ban-<name>
- iptables -A fail2ban-<name> -j RETURN
- iptables -I <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>
- 2014-12-05 10:39:18,169 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot-auth', 'actionunban', 'iptables-multiport', 'iptables -D fail2ban-<name> -s <ip> -j <blocktype>']
- 2014-12-05 10:39:18,169 fail2ban.actions.action[1362]: DEBUG Set actionUnban = iptables -D fail2ban-<name> -s <ip> -j <blocktype>
- 2014-12-05 10:39:18,169 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot-auth', 'actioncheck', 'iptables-multiport', "iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \\t]'"]
- 2014-12-05 10:39:18,169 fail2ban.actions.action[1362]: DEBUG Set actionCheck = iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \t]'
- 2014-12-05 10:39:18,170 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot-auth', 'setcinfo', 'iptables-multiport', 'blocktype', 'REJECT --reject-with icmp-port-unreachable']
- 2014-12-05 10:39:18,170 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot-auth', 'setcinfo', 'iptables-multiport', 'protocol', 'tcp']
- 2014-12-05 10:39:18,171 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot-auth', 'setcinfo', 'iptables-multiport', 'name', 'dovecot-auth']
- 2014-12-05 10:39:18,171 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot-auth', 'setcinfo', 'iptables-multiport', 'chain', 'INPUT']
- 2014-12-05 10:39:18,172 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot-auth', 'setcinfo', 'iptables-multiport', 'port', 'pop3,pop3s,imap,imaps,submission,465,sieve']
- 2014-12-05 10:39:18,172 fail2ban.comm [1362]: DEBUG Command: ['add', 'selinux-ssh', 'auto']
- 2014-12-05 10:39:18,172 fail2ban.jail [1362]: INFO Creating new jail 'selinux-ssh'
- 2014-12-05 10:39:18,173 fail2ban.jail [1362]: INFO Jail 'selinux-ssh' uses pyinotify
- 2014-12-05 10:39:18,173 fail2ban.filter [1362]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('selinux-ssh'))
- 2014-12-05 10:39:18,173 fail2ban.filter [1362]: DEBUG Created FilterPyinotify(Jail('selinux-ssh'))
- 2014-12-05 10:39:18,173 fail2ban.filter [1362]: DEBUG Created FilterPyinotify
- 2014-12-05 10:39:18,173 fail2ban.jail [1362]: INFO Initiated 'pyinotify' backend
- 2014-12-05 10:39:18,174 fail2ban.comm [1362]: DEBUG Command: ['set', 'selinux-ssh', 'usedns', 'warn']
- 2014-12-05 10:39:18,174 fail2ban.filter [1362]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('selinux-ssh'))
- 2014-12-05 10:39:18,174 fail2ban.comm [1362]: DEBUG Command: ['set', 'selinux-ssh', 'addlogpath', '/var/log/audit/audit.log']
- 2014-12-05 10:39:18,175 fail2ban.filter [1362]: INFO Added logfile = /var/log/audit/audit.log
- 2014-12-05 10:39:18,175 fail2ban.filter [1362]: DEBUG Added monitor for the parent directory /var/log/audit
- 2014-12-05 10:39:18,175 fail2ban.filter [1362]: DEBUG Added file watcher for /var/log/audit/audit.log
- 2014-12-05 10:39:18,175 fail2ban.filter.datedetector[1362]: DEBUG Sorting the template list
- 2014-12-05 10:39:18,175 fail2ban.filter.datedetector[1362]: DEBUG Winning template: WEEKDAY MONTH Day Hour:Minute:Second[.subsecond] Year with 0 hits
- 2014-12-05 10:39:18,176 fail2ban.comm [1362]: DEBUG Command: ['set', 'selinux-ssh', 'maxretry', '5']
- 2014-12-05 10:39:18,176 fail2ban.filter [1362]: INFO Set maxRetry = 5
- 2014-12-05 10:39:18,177 fail2ban.comm [1362]: DEBUG Command: ['set', 'selinux-ssh', 'addignoreip', '127.0.0.1/8']
- 2014-12-05 10:39:18,177 fail2ban.filter [1362]: DEBUG Add 127.0.0.1/8 to ignore list
- 2014-12-05 10:39:18,177 fail2ban.comm [1362]: DEBUG Command: ['set', 'selinux-ssh', 'ignorecommand', '']
- 2014-12-05 10:39:18,178 fail2ban.comm [1362]: DEBUG Command: ['set', 'selinux-ssh', 'findtime', '600']
- 2014-12-05 10:39:18,178 fail2ban.filter [1362]: INFO Set findtime = 600
- 2014-12-05 10:39:18,178 fail2ban.comm [1362]: DEBUG Command: ['set', 'selinux-ssh', 'bantime', '600']
- 2014-12-05 10:39:18,179 fail2ban.actions[1362]: INFO Set banTime = 600
- 2014-12-05 10:39:18,179 fail2ban.comm [1362]: DEBUG Command: ['set', 'selinux-ssh', 'addfailregex', '^type=USER_(ERR|AUTH) msg=audit\\(:\\d+\\): (user )?pid=\\d+ uid=0 auid=\\d+ ses=\\d+ subj=(?:unconfined_u|system_u):system_r:sshd_t:s0-s0:c0\\.c1023 msg=\'op=\\S+ acct=(?P<_quote_acct>"?)\\S+(?P=_quote_acct) exe="/usr/sbin/sshd" hostname=(\\?|(\\d+\\.){3}\\d+) addr=<HOST> terminal=ssh res=failed\'$']
- 2014-12-05 10:39:18,182 fail2ban.comm [1362]: DEBUG Command: ['set', 'selinux-ssh', 'addaction', 'iptables']
- 2014-12-05 10:39:18,182 fail2ban.actions.action[1362]: DEBUG Created Action
- 2014-12-05 10:39:18,183 fail2ban.comm [1362]: DEBUG Command: ['set', 'selinux-ssh', 'actionban', 'iptables', 'iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>']
- 2014-12-05 10:39:18,183 fail2ban.actions.action[1362]: DEBUG Set actionBan = iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>
- 2014-12-05 10:39:18,184 fail2ban.comm [1362]: DEBUG Command: ['set', 'selinux-ssh', 'actionstop', 'iptables', 'iptables -D <chain> -p <protocol> --dport <port> -j fail2ban-<name>\niptables -F fail2ban-<name>\niptables -X fail2ban-<name>']
- 2014-12-05 10:39:18,184 fail2ban.actions.action[1362]: DEBUG Set actionStop = iptables -D <chain> -p <protocol> --dport <port> -j fail2ban-<name>
- iptables -F fail2ban-<name>
- iptables -X fail2ban-<name>
- 2014-12-05 10:39:18,184 fail2ban.comm [1362]: DEBUG Command: ['set', 'selinux-ssh', 'actionstart', 'iptables', 'iptables -N fail2ban-<name>\niptables -A fail2ban-<name> -j RETURN\niptables -I <chain> -p <protocol> --dport <port> -j fail2ban-<name>']
- 2014-12-05 10:39:18,185 fail2ban.actions.action[1362]: DEBUG Set actionStart = iptables -N fail2ban-<name>
- iptables -A fail2ban-<name> -j RETURN
- iptables -I <chain> -p <protocol> --dport <port> -j fail2ban-<name>
- 2014-12-05 10:39:18,185 fail2ban.comm [1362]: DEBUG Command: ['set', 'selinux-ssh', 'actionunban', 'iptables', 'iptables -D fail2ban-<name> -s <ip> -j <blocktype>']
- 2014-12-05 10:39:18,185 fail2ban.actions.action[1362]: DEBUG Set actionUnban = iptables -D fail2ban-<name> -s <ip> -j <blocktype>
- 2014-12-05 10:39:18,186 fail2ban.comm [1362]: DEBUG Command: ['set', 'selinux-ssh', 'actioncheck', 'iptables', "iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \\t]'"]
- 2014-12-05 10:39:18,186 fail2ban.actions.action[1362]: DEBUG Set actionCheck = iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \t]'
- 2014-12-05 10:39:18,186 fail2ban.comm [1362]: DEBUG Command: ['set', 'selinux-ssh', 'setcinfo', 'iptables', 'blocktype', 'REJECT --reject-with icmp-port-unreachable']
- 2014-12-05 10:39:18,187 fail2ban.comm [1362]: DEBUG Command: ['set', 'selinux-ssh', 'setcinfo', 'iptables', 'protocol', 'tcp']
- 2014-12-05 10:39:18,188 fail2ban.comm [1362]: DEBUG Command: ['set', 'selinux-ssh', 'setcinfo', 'iptables', 'name', 'SELINUX-SSH']
- 2014-12-05 10:39:18,188 fail2ban.comm [1362]: DEBUG Command: ['set', 'selinux-ssh', 'setcinfo', 'iptables', 'chain', 'INPUT']
- 2014-12-05 10:39:18,188 fail2ban.comm [1362]: DEBUG Command: ['set', 'selinux-ssh', 'setcinfo', 'iptables', 'port', 'ssh']
- 2014-12-05 10:39:18,189 fail2ban.comm [1362]: DEBUG Command: ['add', 'ssh-iptables', 'auto']
- 2014-12-05 10:39:18,189 fail2ban.jail [1362]: INFO Creating new jail 'ssh-iptables'
- 2014-12-05 10:39:18,190 fail2ban.jail [1362]: INFO Jail 'ssh-iptables' uses pyinotify
- 2014-12-05 10:39:18,190 fail2ban.filter [1362]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('ssh-iptables'))
- 2014-12-05 10:39:18,190 fail2ban.filter [1362]: DEBUG Created FilterPyinotify(Jail('ssh-iptables'))
- 2014-12-05 10:39:18,190 fail2ban.filter [1362]: DEBUG Created FilterPyinotify
- 2014-12-05 10:39:18,190 fail2ban.jail [1362]: INFO Initiated 'pyinotify' backend
- 2014-12-05 10:39:18,191 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'usedns', 'warn']
- 2014-12-05 10:39:18,191 fail2ban.filter [1362]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('ssh-iptables'))
- 2014-12-05 10:39:18,192 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'addlogpath', '/var/log/secure']
- 2014-12-05 10:39:18,192 fail2ban.filter [1362]: INFO Added logfile = /var/log/secure
- 2014-12-05 10:39:18,192 fail2ban.filter [1362]: DEBUG Added monitor for the parent directory /var/log
- 2014-12-05 10:39:18,192 fail2ban.filter [1362]: DEBUG Added file watcher for /var/log/secure
- 2014-12-05 10:39:18,193 fail2ban.filter.datedetector[1362]: DEBUG Sorting the template list
- 2014-12-05 10:39:18,193 fail2ban.filter.datedetector[1362]: DEBUG Winning template: WEEKDAY MONTH Day Hour:Minute:Second[.subsecond] Year with 0 hits
- 2014-12-05 10:39:18,193 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'maxretry', '5']
- 2014-12-05 10:39:18,194 fail2ban.filter [1362]: INFO Set maxRetry = 5
- 2014-12-05 10:39:18,194 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'addignoreip', '127.0.0.1/8']
- 2014-12-05 10:39:18,194 fail2ban.filter [1362]: DEBUG Add 127.0.0.1/8 to ignore list
- 2014-12-05 10:39:18,195 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'ignorecommand', '']
- 2014-12-05 10:39:18,195 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'findtime', '600']
- 2014-12-05 10:39:18,196 fail2ban.filter [1362]: INFO Set findtime = 600
- 2014-12-05 10:39:18,196 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'bantime', '600']
- 2014-12-05 10:39:18,196 fail2ban.actions[1362]: INFO Set banTime = 600
- 2014-12-05 10:39:18,197 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*(?:error: PAM: )?[aA]uthentication (?:failure|error) for .* from <HOST>( via \\S+)?\\s*$']
- 2014-12-05 10:39:18,202 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*(?:error: PAM: )?User not known to the underlying authentication module for .* from <HOST>\\s*$']
- 2014-12-05 10:39:18,206 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*Failed \\S+ for .*? from <HOST>(?: port \\d*)?(?: ssh\\d*)?(: (ruser .*|(\\S+ ID \\S+ \\(serial \\d+\\) CA )?\\S+ (?:[\\da-f]{2}:){15}[\\da-f]{2}(, client user ".*", client host ".*")?))?\\s*$']
- 2014-12-05 10:39:18,213 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*ROOT LOGIN REFUSED.* FROM <HOST>\\s*$']
- 2014-12-05 10:39:18,219 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*[iI](?:llegal|nvalid) user .* from <HOST>\\s*$']
- 2014-12-05 10:39:18,226 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*User .+ from <HOST> not allowed because not listed in AllowUsers\\s*$']
- 2014-12-05 10:39:18,234 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*User .+ from <HOST> not allowed because listed in DenyUsers\\s*$']
- 2014-12-05 10:39:18,244 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*User .+ from <HOST> not allowed because not in any group\\s*$']
- 2014-12-05 10:39:18,255 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*refused connect from \\S+ \\(<HOST>\\)\\s*$']
- 2014-12-05 10:39:18,267 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*Received disconnect from <HOST>: 3: \\S+: Auth fail$']
- 2014-12-05 10:39:18,286 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*User .+ from <HOST> not allowed because a group is listed in DenyGroups\\s*$']
- 2014-12-05 10:39:18,303 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'addfailregex', "^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*User .+ from <HOST> not allowed because none of user's groups are listed in AllowGroups\\s*$"]
- 2014-12-05 10:39:18,323 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'addaction', 'iptables']
- 2014-12-05 10:39:18,323 fail2ban.actions.action[1362]: DEBUG Created Action
- 2014-12-05 10:39:18,324 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'actionban', 'iptables', 'iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>']
- 2014-12-05 10:39:18,324 fail2ban.actions.action[1362]: DEBUG Set actionBan = iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>
- 2014-12-05 10:39:18,324 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'actionstop', 'iptables', 'iptables -D <chain> -p <protocol> --dport <port> -j fail2ban-<name>\niptables -F fail2ban-<name>\niptables -X fail2ban-<name>']
- 2014-12-05 10:39:18,324 fail2ban.actions.action[1362]: DEBUG Set actionStop = iptables -D <chain> -p <protocol> --dport <port> -j fail2ban-<name>
- iptables -F fail2ban-<name>
- iptables -X fail2ban-<name>
- 2014-12-05 10:39:18,325 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'actionstart', 'iptables', 'iptables -N fail2ban-<name>\niptables -A fail2ban-<name> -j RETURN\niptables -I <chain> -p <protocol> --dport <port> -j fail2ban-<name>']
- 2014-12-05 10:39:18,325 fail2ban.actions.action[1362]: DEBUG Set actionStart = iptables -N fail2ban-<name>
- iptables -A fail2ban-<name> -j RETURN
- iptables -I <chain> -p <protocol> --dport <port> -j fail2ban-<name>
- 2014-12-05 10:39:18,325 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'actionunban', 'iptables', 'iptables -D fail2ban-<name> -s <ip> -j <blocktype>']
- 2014-12-05 10:39:18,326 fail2ban.actions.action[1362]: DEBUG Set actionUnban = iptables -D fail2ban-<name> -s <ip> -j <blocktype>
- 2014-12-05 10:39:18,326 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'actioncheck', 'iptables', "iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \\t]'"]
- 2014-12-05 10:39:18,326 fail2ban.actions.action[1362]: DEBUG Set actionCheck = iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \t]'
- 2014-12-05 10:39:18,327 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'setcinfo', 'iptables', 'blocktype', 'REJECT --reject-with icmp-port-unreachable']
- 2014-12-05 10:39:18,327 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'setcinfo', 'iptables', 'protocol', 'tcp']
- 2014-12-05 10:39:18,328 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'setcinfo', 'iptables', 'name', 'SSH']
- 2014-12-05 10:39:18,328 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'setcinfo', 'iptables', 'chain', 'INPUT']
- 2014-12-05 10:39:18,329 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'setcinfo', 'iptables', 'port', 'ssh']
- 2014-12-05 10:39:18,329 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'addaction', 'sendmail-whois']
- 2014-12-05 10:39:18,329 fail2ban.actions.action[1362]: DEBUG Created Action
- 2014-12-05 10:39:18,330 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'actionban', 'sendmail-whois', 'printf %b "Subject: [Fail2Ban] <name>: banned <ip> from `uname -n`\nDate: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`\nFrom: <sendername> <<sender>>\nTo: <dest>\\n\nHi,\\n\nThe IP <ip> has just been banned by Fail2Ban after\n<failures> attempts against <name>.\\n\\n\nHere is more information about <ip>:\\n\n`/usr/bin/whois <ip> || echo missing whois program`\\n\nRegards,\\n\nFail2Ban" | /usr/sbin/sendmail -f <sender> <dest>']
- 2014-12-05 10:39:18,330 fail2ban.actions.action[1362]: DEBUG Set actionBan = printf %b "Subject: [Fail2Ban] <name>: banned <ip> from `uname -n`
- Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
- From: <sendername> <<sender>>
- To: <dest>\n
- Hi,\n
- The IP <ip> has just been banned by Fail2Ban after
- <failures> attempts against <name>.\n\n
- Here is more information about <ip>:\n
- `/usr/bin/whois <ip> || echo missing whois program`\n
- Regards,\n
- Fail2Ban" | /usr/sbin/sendmail -f <sender> <dest>
- 2014-12-05 10:39:18,331 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'actionstop', 'sendmail-whois', 'printf %b "Subject: [Fail2Ban] <name>: stopped on `uname -n`\nDate: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`\nFrom: <sendername> <<sender>>\nTo: <dest>\\n\nHi,\\n\nThe jail <name> has been stopped.\\n\nRegards,\\n\nFail2Ban" | /usr/sbin/sendmail -f <sender> <dest>']
- 2014-12-05 10:39:18,331 fail2ban.actions.action[1362]: DEBUG Set actionStop = printf %b "Subject: [Fail2Ban] <name>: stopped on `uname -n`
- Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
- From: <sendername> <<sender>>
- To: <dest>\n
- Hi,\n
- The jail <name> has been stopped.\n
- Regards,\n
- Fail2Ban" | /usr/sbin/sendmail -f <sender> <dest>
- 2014-12-05 10:39:18,332 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'actionstart', 'sendmail-whois', 'printf %b "Subject: [Fail2Ban] <name>: started on `uname -n`\nDate: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`\nFrom: <sendername> <<sender>>\nTo: <dest>\\n\nHi,\\n\nThe jail <name> has been started successfully.\\n\nRegards,\\n\nFail2Ban" | /usr/sbin/sendmail -f <sender> <dest>']
- 2014-12-05 10:39:18,332 fail2ban.actions.action[1362]: DEBUG Set actionStart = printf %b "Subject: [Fail2Ban] <name>: started on `uname -n`
- Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
- From: <sendername> <<sender>>
- To: <dest>\n
- Hi,\n
- The jail <name> has been started successfully.\n
- Regards,\n
- Fail2Ban" | /usr/sbin/sendmail -f <sender> <dest>
- 2014-12-05 10:39:18,333 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'actionunban', 'sendmail-whois', '']
- 2014-12-05 10:39:18,333 fail2ban.actions.action[1362]: DEBUG Set actionUnban =
- 2014-12-05 10:39:18,333 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'actioncheck', 'sendmail-whois', '']
- 2014-12-05 10:39:18,333 fail2ban.actions.action[1362]: DEBUG Set actionCheck =
- 2014-12-05 10:39:18,334 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'setcinfo', 'sendmail-whois', 'dest', '[email protected]']
- 2014-12-05 10:39:18,334 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'setcinfo', 'sendmail-whois', 'sendername', 'Fail2Ban']
- 2014-12-05 10:39:18,335 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'setcinfo', 'sendmail-whois', 'name', 'SSH']
- 2014-12-05 10:39:18,335 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-iptables', 'setcinfo', 'sendmail-whois', 'sender', '[email protected]']
- 2014-12-05 10:39:18,335 fail2ban.comm [1362]: DEBUG Command: ['add', 'exim', 'auto']
- 2014-12-05 10:39:18,336 fail2ban.jail [1362]: INFO Creating new jail 'exim'
- 2014-12-05 10:39:18,336 fail2ban.jail [1362]: INFO Jail 'exim' uses pyinotify
- 2014-12-05 10:39:18,336 fail2ban.filter [1362]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('exim'))
- 2014-12-05 10:39:18,336 fail2ban.filter [1362]: DEBUG Created FilterPyinotify(Jail('exim'))
- 2014-12-05 10:39:18,336 fail2ban.filter [1362]: DEBUG Created FilterPyinotify
- 2014-12-05 10:39:18,337 fail2ban.jail [1362]: INFO Initiated 'pyinotify' backend
- 2014-12-05 10:39:18,337 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'usedns', 'warn']
- 2014-12-05 10:39:18,337 fail2ban.filter [1362]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('exim'))
- 2014-12-05 10:39:18,338 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'addlogpath', '/var/log/exim_mainlog']
- 2014-12-05 10:39:18,338 fail2ban.filter [1362]: INFO Added logfile = /var/log/exim_mainlog
- 2014-12-05 10:39:18,338 fail2ban.filter [1362]: DEBUG Added monitor for the parent directory /var/log
- 2014-12-05 10:39:18,338 fail2ban.filter [1362]: DEBUG Added file watcher for /var/log/exim_mainlog
- 2014-12-05 10:39:18,338 fail2ban.filter.datedetector[1362]: DEBUG Sorting the template list
- 2014-12-05 10:39:18,339 fail2ban.filter.datedetector[1362]: DEBUG Winning template: WEEKDAY MONTH Day Hour:Minute:Second[.subsecond] Year with 0 hits
- 2014-12-05 10:39:18,339 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'maxretry', '3']
- 2014-12-05 10:39:18,339 fail2ban.filter [1362]: INFO Set maxRetry = 3
- 2014-12-05 10:39:18,340 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'addignoreip', '127.0.0.1/8']
- 2014-12-05 10:39:18,340 fail2ban.filter [1362]: DEBUG Add 127.0.0.1/8 to ignore list
- 2014-12-05 10:39:18,340 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'ignorecommand', '']
- 2014-12-05 10:39:18,341 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'findtime', '600']
- 2014-12-05 10:39:18,341 fail2ban.filter [1362]: INFO Set findtime = 600
- 2014-12-05 10:39:18,341 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'bantime', '600']
- 2014-12-05 10:39:18,341 fail2ban.actions[1362]: INFO Set banTime = 600
- 2014-12-05 10:39:18,342 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'addfailregex', '^( \\[\\d+\\])? H=([\\w.-]+ )?(\\(\\S+\\) )?\\[<HOST>\\](:\\d+)? (I=\\[\\S+\\]:\\d+ )?(U=\\S+ )?(P=e?smtp )?sender verify fail for <\\S+>: (?:Unknown user|Unrouteable address|all relevant MX records point to non-existent hosts)\\s*$']
- 2014-12-05 10:39:18,345 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'addfailregex', '^( \\[\\d+\\])? \\w+ authenticator failed for (\\S+ )?\\(\\S+\\) \\[<HOST>\\]: 535 Incorrect authentication data( \\(set_id=.*\\)|: \\d+ Time\\(s\\))?\\s*$']
- 2014-12-05 10:39:18,347 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'addfailregex', '^( \\[\\d+\\])? H=([\\w.-]+ )?(\\(\\S+\\) )?\\[<HOST>\\](:\\d+)? (I=\\[\\S+\\]:\\d+ )?(U=\\S+ )?(P=e?smtp )?F=(<>|[^@]+@\\S+) rejected RCPT [^@]+@\\S+: (relay not permitted|Sender verify failed|Unknown user)\\s*$']
- 2014-12-05 10:39:18,351 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'addfailregex', '^( \\[\\d+\\])? SMTP protocol synchronization error \\([^)]*\\): rejected (connection from|"\\S+") H=([\\w.-]+ )?(\\(\\S+\\) )?\\[<HOST>\\](:\\d+)? (I=\\[\\S+\\]:\\d+ )?(U=\\S+ )?(P=e?smtp )?(next )?input=".*"\\s*$']
- 2014-12-05 10:39:18,355 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'addfailregex', '^( \\[\\d+\\])? SMTP call from \\S+ \\[<HOST>\\](:\\d+)? (I=\\[\\S+\\]:\\d+ )?dropped: too many nonmail commands \\(last was "\\S+"\\)\\s*$']
- 2014-12-05 10:39:18,358 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'addaction', 'iptables-multiport']
- 2014-12-05 10:39:18,358 fail2ban.actions.action[1362]: DEBUG Created Action
- 2014-12-05 10:39:18,359 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'actionban', 'iptables-multiport', 'iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>']
- 2014-12-05 10:39:18,359 fail2ban.actions.action[1362]: DEBUG Set actionBan = iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>
- 2014-12-05 10:39:18,359 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'actionstop', 'iptables-multiport', 'iptables -D <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>\niptables -F fail2ban-<name>\niptables -X fail2ban-<name>']
- 2014-12-05 10:39:18,359 fail2ban.actions.action[1362]: DEBUG Set actionStop = iptables -D <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>
- iptables -F fail2ban-<name>
- iptables -X fail2ban-<name>
- 2014-12-05 10:39:18,360 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'actionstart', 'iptables-multiport', 'iptables -N fail2ban-<name>\niptables -A fail2ban-<name> -j RETURN\niptables -I <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>']
- 2014-12-05 10:39:18,360 fail2ban.actions.action[1362]: DEBUG Set actionStart = iptables -N fail2ban-<name>
- iptables -A fail2ban-<name> -j RETURN
- iptables -I <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>
- 2014-12-05 10:39:18,361 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'actionunban', 'iptables-multiport', 'iptables -D fail2ban-<name> -s <ip> -j <blocktype>']
- 2014-12-05 10:39:18,361 fail2ban.actions.action[1362]: DEBUG Set actionUnban = iptables -D fail2ban-<name> -s <ip> -j <blocktype>
- 2014-12-05 10:39:18,361 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'actioncheck', 'iptables-multiport', "iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \\t]'"]
- 2014-12-05 10:39:18,361 fail2ban.actions.action[1362]: DEBUG Set actionCheck = iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \t]'
- 2014-12-05 10:39:18,362 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'setcinfo', 'iptables-multiport', 'blocktype', 'REJECT --reject-with icmp-port-unreachable']
- 2014-12-05 10:39:18,362 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'setcinfo', 'iptables-multiport', 'protocol', 'tcp']
- 2014-12-05 10:39:18,363 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'setcinfo', 'iptables-multiport', 'name', 'exim']
- 2014-12-05 10:39:18,363 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'setcinfo', 'iptables-multiport', 'chain', 'INPUT']
- 2014-12-05 10:39:18,364 fail2ban.comm [1362]: DEBUG Command: ['set', 'exim', 'setcinfo', 'iptables-multiport', 'port', '25,465,587']
- 2014-12-05 10:39:18,364 fail2ban.comm [1362]: DEBUG Command: ['add', 'ssh-blocklist', 'auto']
- 2014-12-05 10:39:18,364 fail2ban.jail [1362]: INFO Creating new jail 'ssh-blocklist'
- 2014-12-05 10:39:18,364 fail2ban.jail [1362]: INFO Jail 'ssh-blocklist' uses pyinotify
- 2014-12-05 10:39:18,365 fail2ban.filter [1362]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('ssh-blocklist'))
- 2014-12-05 10:39:18,365 fail2ban.filter [1362]: DEBUG Created FilterPyinotify(Jail('ssh-blocklist'))
- 2014-12-05 10:39:18,365 fail2ban.filter [1362]: DEBUG Created FilterPyinotify
- 2014-12-05 10:39:18,365 fail2ban.jail [1362]: INFO Initiated 'pyinotify' backend
- 2014-12-05 10:39:18,366 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'usedns', 'warn']
- 2014-12-05 10:39:18,366 fail2ban.filter [1362]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('ssh-blocklist'))
- 2014-12-05 10:39:18,366 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'addlogpath', '/var/log/secure']
- 2014-12-05 10:39:18,367 fail2ban.filter [1362]: INFO Added logfile = /var/log/secure
- 2014-12-05 10:39:18,367 fail2ban.filter [1362]: DEBUG Added monitor for the parent directory /var/log
- 2014-12-05 10:39:18,367 fail2ban.filter [1362]: DEBUG Added file watcher for /var/log/secure
- 2014-12-05 10:39:18,367 fail2ban.filter.datedetector[1362]: DEBUG Sorting the template list
- 2014-12-05 10:39:18,367 fail2ban.filter.datedetector[1362]: DEBUG Winning template: WEEKDAY MONTH Day Hour:Minute:Second[.subsecond] Year with 0 hits
- 2014-12-05 10:39:18,368 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'maxretry', '20']
- 2014-12-05 10:39:18,368 fail2ban.filter [1362]: INFO Set maxRetry = 20
- 2014-12-05 10:39:18,368 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'addignoreip', '127.0.0.1/8']
- 2014-12-05 10:39:18,369 fail2ban.filter [1362]: DEBUG Add 127.0.0.1/8 to ignore list
- 2014-12-05 10:39:18,369 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'ignorecommand', '']
- 2014-12-05 10:39:18,369 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'findtime', '600']
- 2014-12-05 10:39:18,370 fail2ban.filter [1362]: INFO Set findtime = 600
- 2014-12-05 10:39:18,370 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'bantime', '600']
- 2014-12-05 10:39:18,370 fail2ban.actions[1362]: INFO Set banTime = 600
- 2014-12-05 10:39:18,371 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*(?:error: PAM: )?[aA]uthentication (?:failure|error) for .* from <HOST>( via \\S+)?\\s*$']
- 2014-12-05 10:39:18,371 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*(?:error: PAM: )?User not known to the underlying authentication module for .* from <HOST>\\s*$']
- 2014-12-05 10:39:18,372 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*Failed \\S+ for .*? from <HOST>(?: port \\d*)?(?: ssh\\d*)?(: (ruser .*|(\\S+ ID \\S+ \\(serial \\d+\\) CA )?\\S+ (?:[\\da-f]{2}:){15}[\\da-f]{2}(, client user ".*", client host ".*")?))?\\s*$']
- 2014-12-05 10:39:18,375 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*ROOT LOGIN REFUSED.* FROM <HOST>\\s*$']
- 2014-12-05 10:39:18,378 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*[iI](?:llegal|nvalid) user .* from <HOST>\\s*$']
- 2014-12-05 10:39:18,382 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*User .+ from <HOST> not allowed because not listed in AllowUsers\\s*$']
- 2014-12-05 10:39:18,387 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*User .+ from <HOST> not allowed because listed in DenyUsers\\s*$']
- 2014-12-05 10:39:18,394 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*User .+ from <HOST> not allowed because not in any group\\s*$']
- 2014-12-05 10:39:18,403 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*refused connect from \\S+ \\(<HOST>\\)\\s*$']
- 2014-12-05 10:39:18,413 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*Received disconnect from <HOST>: 3: \\S+: Auth fail$']
- 2014-12-05 10:39:18,425 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*User .+ from <HOST> not allowed because a group is listed in DenyGroups\\s*$']
- 2014-12-05 10:39:18,440 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'addfailregex', "^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*User .+ from <HOST> not allowed because none of user's groups are listed in AllowGroups\\s*$"]
- 2014-12-05 10:39:18,457 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'addaction', 'iptables']
- 2014-12-05 10:39:18,457 fail2ban.actions.action[1362]: DEBUG Created Action
- 2014-12-05 10:39:18,457 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'actionban', 'iptables', 'iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>']
- 2014-12-05 10:39:18,458 fail2ban.actions.action[1362]: DEBUG Set actionBan = iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>
- 2014-12-05 10:39:18,458 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'actionstop', 'iptables', 'iptables -D <chain> -p <protocol> --dport <port> -j fail2ban-<name>\niptables -F fail2ban-<name>\niptables -X fail2ban-<name>']
- 2014-12-05 10:39:18,458 fail2ban.actions.action[1362]: DEBUG Set actionStop = iptables -D <chain> -p <protocol> --dport <port> -j fail2ban-<name>
- iptables -F fail2ban-<name>
- iptables -X fail2ban-<name>
- 2014-12-05 10:39:18,459 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'actionstart', 'iptables', 'iptables -N fail2ban-<name>\niptables -A fail2ban-<name> -j RETURN\niptables -I <chain> -p <protocol> --dport <port> -j fail2ban-<name>']
- 2014-12-05 10:39:18,459 fail2ban.actions.action[1362]: DEBUG Set actionStart = iptables -N fail2ban-<name>
- iptables -A fail2ban-<name> -j RETURN
- iptables -I <chain> -p <protocol> --dport <port> -j fail2ban-<name>
- 2014-12-05 10:39:18,459 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'actionunban', 'iptables', 'iptables -D fail2ban-<name> -s <ip> -j <blocktype>']
- 2014-12-05 10:39:18,459 fail2ban.actions.action[1362]: DEBUG Set actionUnban = iptables -D fail2ban-<name> -s <ip> -j <blocktype>
- 2014-12-05 10:39:18,460 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'actioncheck', 'iptables', "iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \\t]'"]
- 2014-12-05 10:39:18,460 fail2ban.actions.action[1362]: DEBUG Set actionCheck = iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \t]'
- 2014-12-05 10:39:18,460 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'setcinfo', 'iptables', 'blocktype', 'REJECT --reject-with icmp-port-unreachable']
- 2014-12-05 10:39:18,461 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'setcinfo', 'iptables', 'protocol', 'tcp']
- 2014-12-05 10:39:18,461 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'setcinfo', 'iptables', 'name', 'SSH']
- 2014-12-05 10:39:18,462 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'setcinfo', 'iptables', 'chain', 'INPUT']
- 2014-12-05 10:39:18,462 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'setcinfo', 'iptables', 'port', 'ssh']
- 2014-12-05 10:39:18,463 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'addaction', 'sendmail-whois']
- 2014-12-05 10:39:18,463 fail2ban.actions.action[1362]: DEBUG Created Action
- 2014-12-05 10:39:18,463 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'actionban', 'sendmail-whois', 'printf %b "Subject: [Fail2Ban] <name>: banned <ip> from `uname -n`\nDate: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`\nFrom: <sendername> <<sender>>\nTo: <dest>\\n\nHi,\\n\nThe IP <ip> has just been banned by Fail2Ban after\n<failures> attempts against <name>.\\n\\n\nHere is more information about <ip>:\\n\n`/usr/bin/whois <ip> || echo missing whois program`\\n\nRegards,\\n\nFail2Ban" | /usr/sbin/sendmail -f <sender> <dest>']
- 2014-12-05 10:39:18,463 fail2ban.actions.action[1362]: DEBUG Set actionBan = printf %b "Subject: [Fail2Ban] <name>: banned <ip> from `uname -n`
- Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
- From: <sendername> <<sender>>
- To: <dest>\n
- Hi,\n
- The IP <ip> has just been banned by Fail2Ban after
- <failures> attempts against <name>.\n\n
- Here is more information about <ip>:\n
- `/usr/bin/whois <ip> || echo missing whois program`\n
- Regards,\n
- Fail2Ban" | /usr/sbin/sendmail -f <sender> <dest>
- 2014-12-05 10:39:18,464 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'actionstop', 'sendmail-whois', 'printf %b "Subject: [Fail2Ban] <name>: stopped on `uname -n`\nDate: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`\nFrom: <sendername> <<sender>>\nTo: <dest>\\n\nHi,\\n\nThe jail <name> has been stopped.\\n\nRegards,\\n\nFail2Ban" | /usr/sbin/sendmail -f <sender> <dest>']
- 2014-12-05 10:39:18,464 fail2ban.actions.action[1362]: DEBUG Set actionStop = printf %b "Subject: [Fail2Ban] <name>: stopped on `uname -n`
- Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
- From: <sendername> <<sender>>
- To: <dest>\n
- Hi,\n
- The jail <name> has been stopped.\n
- Regards,\n
- Fail2Ban" | /usr/sbin/sendmail -f <sender> <dest>
- 2014-12-05 10:39:18,465 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'actionstart', 'sendmail-whois', 'printf %b "Subject: [Fail2Ban] <name>: started on `uname -n`\nDate: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`\nFrom: <sendername> <<sender>>\nTo: <dest>\\n\nHi,\\n\nThe jail <name> has been started successfully.\\n\nRegards,\\n\nFail2Ban" | /usr/sbin/sendmail -f <sender> <dest>']
- 2014-12-05 10:39:18,465 fail2ban.actions.action[1362]: DEBUG Set actionStart = printf %b "Subject: [Fail2Ban] <name>: started on `uname -n`
- Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
- From: <sendername> <<sender>>
- To: <dest>\n
- Hi,\n
- The jail <name> has been started successfully.\n
- Regards,\n
- Fail2Ban" | /usr/sbin/sendmail -f <sender> <dest>
- 2014-12-05 10:39:18,466 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'actionunban', 'sendmail-whois', '']
- 2014-12-05 10:39:18,466 fail2ban.actions.action[1362]: DEBUG Set actionUnban =
- 2014-12-05 10:39:18,466 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'actioncheck', 'sendmail-whois', '']
- 2014-12-05 10:39:18,467 fail2ban.actions.action[1362]: DEBUG Set actionCheck =
- 2014-12-05 10:39:18,467 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'setcinfo', 'sendmail-whois', 'dest', '[email protected]']
- 2014-12-05 10:39:18,468 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'setcinfo', 'sendmail-whois', 'sendername', 'Fail2Ban']
- 2014-12-05 10:39:18,468 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'setcinfo', 'sendmail-whois', 'name', 'SSH']
- 2014-12-05 10:39:18,469 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'setcinfo', 'sendmail-whois', 'sender', '[email protected]']
- 2014-12-05 10:39:18,469 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'addaction', 'blocklist_de']
- 2014-12-05 10:39:18,469 fail2ban.actions.action[1362]: DEBUG Created Action
- 2014-12-05 10:39:18,470 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'actionban', 'blocklist_de', 'curl --fail --data-urlencode \'server=<email>\' --data \'apikey=<apikey>\' --data \'service=<service>\' --data \'ip=<ip>\' --data-urlencode \'logs=<matches>\' --data \'format=text\' --user-agent "fail2ban v0.8.12" "https://www.blocklist.de/en/httpreports.html"']
- 2014-12-05 10:39:18,470 fail2ban.actions.action[1362]: DEBUG Set actionBan = curl --fail --data-urlencode 'server=<email>' --data 'apikey=<apikey>' --data 'service=<service>' --data 'ip=<ip>' --data-urlencode 'logs=<matches>' --data 'format=text' --user-agent "fail2ban v0.8.12" "https://www.blocklist.de/en/httpreports.html"
- 2014-12-05 10:39:18,470 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'actionstop', 'blocklist_de', '']
- 2014-12-05 10:39:18,470 fail2ban.actions.action[1362]: DEBUG Set actionStop =
- 2014-12-05 10:39:18,471 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'actionstart', 'blocklist_de', '']
- 2014-12-05 10:39:18,471 fail2ban.actions.action[1362]: DEBUG Set actionStart =
- 2014-12-05 10:39:18,471 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'actionunban', 'blocklist_de', '']
- 2014-12-05 10:39:18,472 fail2ban.actions.action[1362]: DEBUG Set actionUnban =
- 2014-12-05 10:39:18,472 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'actioncheck', 'blocklist_de', '']
- 2014-12-05 10:39:18,472 fail2ban.actions.action[1362]: DEBUG Set actionCheck =
- 2014-12-05 10:39:18,473 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'setcinfo', 'blocklist_de', 'apikey', 'xxxxxx']
- 2014-12-05 10:39:18,473 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'setcinfo', 'blocklist_de', 'email', '[email protected]']
- 2014-12-05 10:39:18,473 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-blocklist', 'setcinfo', 'blocklist_de', 'service', 'sshd']
- 2014-12-05 10:39:18,474 fail2ban.comm [1362]: DEBUG Command: ['add', 'sendmail-auth', 'auto']
- 2014-12-05 10:39:18,474 fail2ban.jail [1362]: INFO Creating new jail 'sendmail-auth'
- 2014-12-05 10:39:18,474 fail2ban.jail [1362]: INFO Jail 'sendmail-auth' uses pyinotify
- 2014-12-05 10:39:18,474 fail2ban.filter [1362]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('sendmail-auth'))
- 2014-12-05 10:39:18,475 fail2ban.filter [1362]: DEBUG Created FilterPyinotify(Jail('sendmail-auth'))
- 2014-12-05 10:39:18,475 fail2ban.filter [1362]: DEBUG Created FilterPyinotify
- 2014-12-05 10:39:18,475 fail2ban.jail [1362]: INFO Initiated 'pyinotify' backend
- 2014-12-05 10:39:18,475 fail2ban.comm [1362]: DEBUG Command: ['set', 'sendmail-auth', 'usedns', 'warn']
- 2014-12-05 10:39:18,476 fail2ban.filter [1362]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('sendmail-auth'))
- 2014-12-05 10:39:18,476 fail2ban.comm [1362]: DEBUG Command: ['set', 'sendmail-auth', 'addlogpath', '/var/log/maillog']
- 2014-12-05 10:39:18,476 fail2ban.filter [1362]: INFO Added logfile = /var/log/maillog
- 2014-12-05 10:39:18,476 fail2ban.filter [1362]: DEBUG Added monitor for the parent directory /var/log
- 2014-12-05 10:39:18,477 fail2ban.filter [1362]: DEBUG Added file watcher for /var/log/maillog
- 2014-12-05 10:39:18,477 fail2ban.filter.datedetector[1362]: DEBUG Sorting the template list
- 2014-12-05 10:39:18,477 fail2ban.filter.datedetector[1362]: DEBUG Winning template: WEEKDAY MONTH Day Hour:Minute:Second[.subsecond] Year with 0 hits
- 2014-12-05 10:39:18,478 fail2ban.comm [1362]: DEBUG Command: ['set', 'sendmail-auth', 'maxretry', '3']
- 2014-12-05 10:39:18,478 fail2ban.filter [1362]: INFO Set maxRetry = 3
- 2014-12-05 10:39:18,478 fail2ban.comm [1362]: DEBUG Command: ['set', 'sendmail-auth', 'addignoreip', '127.0.0.1/8']
- 2014-12-05 10:39:18,478 fail2ban.filter [1362]: DEBUG Add 127.0.0.1/8 to ignore list
- 2014-12-05 10:39:18,479 fail2ban.comm [1362]: DEBUG Command: ['set', 'sendmail-auth', 'ignorecommand', '']
- 2014-12-05 10:39:18,479 fail2ban.comm [1362]: DEBUG Command: ['set', 'sendmail-auth', 'findtime', '600']
- 2014-12-05 10:39:18,479 fail2ban.filter [1362]: INFO Set findtime = 600
- 2014-12-05 10:39:18,480 fail2ban.comm [1362]: DEBUG Command: ['set', 'sendmail-auth', 'bantime', '600']
- 2014-12-05 10:39:18,480 fail2ban.actions[1362]: INFO Set banTime = 600
- 2014-12-05 10:39:18,480 fail2ban.comm [1362]: DEBUG Command: ['set', 'sendmail-auth', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?(?:sm-(mta|acceptingconnections))(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?(?:sm-(mta|acceptingconnections))(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*\\w{14}: (\\S+ )?\\[<HOST>\\]( \\(may be forged\\))?: possible SMTP attack: command=AUTH, count=\\d+$']
- 2014-12-05 10:39:18,485 fail2ban.comm [1362]: DEBUG Command: ['set', 'sendmail-auth', 'addaction', 'iptables-multiport']
- 2014-12-05 10:39:18,485 fail2ban.actions.action[1362]: DEBUG Created Action
- 2014-12-05 10:39:18,486 fail2ban.comm [1362]: DEBUG Command: ['set', 'sendmail-auth', 'actionban', 'iptables-multiport', 'iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>']
- 2014-12-05 10:39:18,486 fail2ban.actions.action[1362]: DEBUG Set actionBan = iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>
- 2014-12-05 10:39:18,486 fail2ban.comm [1362]: DEBUG Command: ['set', 'sendmail-auth', 'actionstop', 'iptables-multiport', 'iptables -D <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>\niptables -F fail2ban-<name>\niptables -X fail2ban-<name>']
- 2014-12-05 10:39:18,487 fail2ban.actions.action[1362]: DEBUG Set actionStop = iptables -D <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>
- iptables -F fail2ban-<name>
- iptables -X fail2ban-<name>
- 2014-12-05 10:39:18,487 fail2ban.comm [1362]: DEBUG Command: ['set', 'sendmail-auth', 'actionstart', 'iptables-multiport', 'iptables -N fail2ban-<name>\niptables -A fail2ban-<name> -j RETURN\niptables -I <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>']
- 2014-12-05 10:39:18,487 fail2ban.actions.action[1362]: DEBUG Set actionStart = iptables -N fail2ban-<name>
- iptables -A fail2ban-<name> -j RETURN
- iptables -I <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>
- 2014-12-05 10:39:18,488 fail2ban.comm [1362]: DEBUG Command: ['set', 'sendmail-auth', 'actionunban', 'iptables-multiport', 'iptables -D fail2ban-<name> -s <ip> -j <blocktype>']
- 2014-12-05 10:39:18,488 fail2ban.actions.action[1362]: DEBUG Set actionUnban = iptables -D fail2ban-<name> -s <ip> -j <blocktype>
- 2014-12-05 10:39:18,488 fail2ban.comm [1362]: DEBUG Command: ['set', 'sendmail-auth', 'actioncheck', 'iptables-multiport', "iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \\t]'"]
- 2014-12-05 10:39:18,488 fail2ban.actions.action[1362]: DEBUG Set actionCheck = iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \t]'
- 2014-12-05 10:39:18,489 fail2ban.comm [1362]: DEBUG Command: ['set', 'sendmail-auth', 'setcinfo', 'iptables-multiport', 'blocktype', 'REJECT --reject-with icmp-port-unreachable']
- 2014-12-05 10:39:18,489 fail2ban.comm [1362]: DEBUG Command: ['set', 'sendmail-auth', 'setcinfo', 'iptables-multiport', 'protocol', 'tcp']
- 2014-12-05 10:39:18,490 fail2ban.comm [1362]: DEBUG Command: ['set', 'sendmail-auth', 'setcinfo', 'iptables-multiport', 'name', 'sendmail-auth']
- 2014-12-05 10:39:18,490 fail2ban.comm [1362]: DEBUG Command: ['set', 'sendmail-auth', 'setcinfo', 'iptables-multiport', 'chain', 'INPUT']
- 2014-12-05 10:39:18,491 fail2ban.comm [1362]: DEBUG Command: ['set', 'sendmail-auth', 'setcinfo', 'iptables-multiport', 'port', 'submission,465,smtp']
- 2014-12-05 10:39:18,492 fail2ban.comm [1362]: DEBUG Command: ['add', 'dovecot', 'auto']
- 2014-12-05 10:39:18,492 fail2ban.jail [1362]: INFO Creating new jail 'dovecot'
- 2014-12-05 10:39:18,492 fail2ban.jail [1362]: INFO Jail 'dovecot' uses pyinotify
- 2014-12-05 10:39:18,492 fail2ban.filter [1362]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('dovecot'))
- 2014-12-05 10:39:18,493 fail2ban.filter [1362]: DEBUG Created FilterPyinotify(Jail('dovecot'))
- 2014-12-05 10:39:18,493 fail2ban.filter [1362]: DEBUG Created FilterPyinotify
- 2014-12-05 10:39:18,493 fail2ban.jail [1362]: INFO Initiated 'pyinotify' backend
- 2014-12-05 10:39:18,493 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot', 'usedns', 'warn']
- 2014-12-05 10:39:18,493 fail2ban.filter [1362]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('dovecot'))
- 2014-12-05 10:39:18,494 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot', 'addlogpath', '/var/log/maillog']
- 2014-12-05 10:39:18,494 fail2ban.filter [1362]: INFO Added logfile = /var/log/maillog
- 2014-12-05 10:39:18,494 fail2ban.filter [1362]: DEBUG Added monitor for the parent directory /var/log
- 2014-12-05 10:39:18,494 fail2ban.filter [1362]: DEBUG Added file watcher for /var/log/maillog
- 2014-12-05 10:39:18,495 fail2ban.filter.datedetector[1362]: DEBUG Sorting the template list
- 2014-12-05 10:39:18,495 fail2ban.filter.datedetector[1362]: DEBUG Winning template: WEEKDAY MONTH Day Hour:Minute:Second[.subsecond] Year with 0 hits
- 2014-12-05 10:39:18,495 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot', 'maxretry', '3']
- 2014-12-05 10:39:18,495 fail2ban.filter [1362]: INFO Set maxRetry = 3
- 2014-12-05 10:39:18,496 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot', 'addignoreip', '127.0.0.1/8']
- 2014-12-05 10:39:18,496 fail2ban.filter [1362]: DEBUG Add 127.0.0.1/8 to ignore list
- 2014-12-05 10:39:18,497 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot', 'ignorecommand', '']
- 2014-12-05 10:39:18,497 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot', 'findtime', '600']
- 2014-12-05 10:39:18,497 fail2ban.filter [1362]: INFO Set findtime = 600
- 2014-12-05 10:39:18,498 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot', 'bantime', '600']
- 2014-12-05 10:39:18,498 fail2ban.actions[1362]: INFO Set banTime = 600
- 2014-12-05 10:39:18,498 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?(auth|dovecot(-auth)?|auth-worker)(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?(auth|dovecot(-auth)?|auth-worker)(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*(pam_unix(\\(dovecot:auth\\))?:)?\\s+authentication failure; logname=\\S* uid=\\S* euid=\\S* tty=dovecot ruser=\\S* rhost=<HOST>(\\s+user=\\S*)?\\s*$']
- 2014-12-05 10:39:18,499 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?(auth|dovecot(-auth)?|auth-worker)(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?(auth|dovecot(-auth)?|auth-worker)(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*(pop3|imap)-login: (Info: )?(Aborted login|Disconnected)(: Inactivity)? \\(((auth failed, \\d+ attempts)( in \\d+ secs)?|tried to use (disabled|disallowed) \\S+ auth)\\):( user=<\\S*>,)?( method=\\S+,)? rip=<HOST>(, lip=(\\d{1,3}\\.){3}\\d{1,3})?(, TLS( handshaking(: SSL_accept\\(\\) failed: error:[\\dA-F]+:SSL routines:[TLS\\d]+_GET_CLIENT_HELLO:unknown protocol)?)?(: Disconnected)?)?(, session=<\\S+>)?\\s*$']
- 2014-12-05 10:39:18,501 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?(auth|dovecot(-auth)?|auth-worker)(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?(auth|dovecot(-auth)?|auth-worker)(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*(Info|dovecot: auth\\(default\\)): pam\\(\\S+,<HOST>\\): pam_authenticate\\(\\) failed: (User not known to the underlying authentication module: \\d+ Time\\(s\\)|Authentication failure \\(password mismatch\\?\\))\\s*$']
- 2014-12-05 10:39:18,505 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot', 'addaction', 'iptables-multiport']
- 2014-12-05 10:39:18,505 fail2ban.actions.action[1362]: DEBUG Created Action
- 2014-12-05 10:39:18,506 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot', 'actionban', 'iptables-multiport', 'iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>']
- 2014-12-05 10:39:18,506 fail2ban.actions.action[1362]: DEBUG Set actionBan = iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>
- 2014-12-05 10:39:18,506 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot', 'actionstop', 'iptables-multiport', 'iptables -D <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>\niptables -F fail2ban-<name>\niptables -X fail2ban-<name>']
- 2014-12-05 10:39:18,506 fail2ban.actions.action[1362]: DEBUG Set actionStop = iptables -D <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>
- iptables -F fail2ban-<name>
- iptables -X fail2ban-<name>
- 2014-12-05 10:39:18,507 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot', 'actionstart', 'iptables-multiport', 'iptables -N fail2ban-<name>\niptables -A fail2ban-<name> -j RETURN\niptables -I <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>']
- 2014-12-05 10:39:18,507 fail2ban.actions.action[1362]: DEBUG Set actionStart = iptables -N fail2ban-<name>
- iptables -A fail2ban-<name> -j RETURN
- iptables -I <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>
- 2014-12-05 10:39:18,508 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot', 'actionunban', 'iptables-multiport', 'iptables -D fail2ban-<name> -s <ip> -j <blocktype>']
- 2014-12-05 10:39:18,508 fail2ban.actions.action[1362]: DEBUG Set actionUnban = iptables -D fail2ban-<name> -s <ip> -j <blocktype>
- 2014-12-05 10:39:18,508 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot', 'actioncheck', 'iptables-multiport', "iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \\t]'"]
- 2014-12-05 10:39:18,509 fail2ban.actions.action[1362]: DEBUG Set actionCheck = iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \t]'
- 2014-12-05 10:39:18,509 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot', 'setcinfo', 'iptables-multiport', 'blocktype', 'REJECT --reject-with icmp-port-unreachable']
- 2014-12-05 10:39:18,510 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot', 'setcinfo', 'iptables-multiport', 'protocol', 'tcp']
- 2014-12-05 10:39:18,510 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot', 'setcinfo', 'iptables-multiport', 'name', 'dovecot']
- 2014-12-05 10:39:18,510 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot', 'setcinfo', 'iptables-multiport', 'chain', 'INPUT']
- 2014-12-05 10:39:18,511 fail2ban.comm [1362]: DEBUG Command: ['set', 'dovecot', 'setcinfo', 'iptables-multiport', 'port', 'pop3,pop3s,imap,imaps,submission,465,sieve']
- 2014-12-05 10:39:18,511 fail2ban.comm [1362]: DEBUG Command: ['add', 'apache-overflows', 'auto']
- 2014-12-05 10:39:18,511 fail2ban.jail [1362]: INFO Creating new jail 'apache-overflows'
- 2014-12-05 10:39:18,512 fail2ban.jail [1362]: INFO Jail 'apache-overflows' uses pyinotify
- 2014-12-05 10:39:18,512 fail2ban.filter [1362]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('apache-overflows'))
- 2014-12-05 10:39:18,512 fail2ban.filter [1362]: DEBUG Created FilterPyinotify(Jail('apache-overflows'))
- 2014-12-05 10:39:18,512 fail2ban.filter [1362]: DEBUG Created FilterPyinotify
- 2014-12-05 10:39:18,512 fail2ban.jail [1362]: INFO Initiated 'pyinotify' backend
- 2014-12-05 10:39:18,513 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-overflows', 'usedns', 'warn']
- 2014-12-05 10:39:18,513 fail2ban.filter [1362]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('apache-overflows'))
- 2014-12-05 10:39:18,513 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-overflows', 'addlogpath', '/usr/local/apache/logs/error_log']
- 2014-12-05 10:39:18,514 fail2ban.filter [1362]: INFO Added logfile = /usr/local/apache/logs/error_log
- 2014-12-05 10:39:18,514 fail2ban.filter [1362]: DEBUG Added monitor for the parent directory /usr/local/apache/logs
- 2014-12-05 10:39:18,514 fail2ban.filter [1362]: DEBUG Added file watcher for /usr/local/apache/logs/error_log
- 2014-12-05 10:39:18,515 fail2ban.filter.datedetector[1362]: DEBUG Sorting the template list
- 2014-12-05 10:39:18,515 fail2ban.filter.datedetector[1362]: DEBUG Winning template: WEEKDAY MONTH Day Hour:Minute:Second[.subsecond] Year with 0 hits
- 2014-12-05 10:39:18,515 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-overflows', 'maxretry', '2']
- 2014-12-05 10:39:18,515 fail2ban.filter [1362]: INFO Set maxRetry = 2
- 2014-12-05 10:39:18,516 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-overflows', 'addignoreip', '127.0.0.1/8']
- 2014-12-05 10:39:18,516 fail2ban.filter [1362]: DEBUG Add 127.0.0.1/8 to ignore list
- 2014-12-05 10:39:18,517 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-overflows', 'ignorecommand', '']
- 2014-12-05 10:39:18,517 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-overflows', 'findtime', '600']
- 2014-12-05 10:39:18,517 fail2ban.filter [1362]: INFO Set findtime = 600
- 2014-12-05 10:39:18,518 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-overflows', 'bantime', '600']
- 2014-12-05 10:39:18,518 fail2ban.actions[1362]: INFO Set banTime = 600
- 2014-12-05 10:39:18,518 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-overflows', 'addfailregex', '^\\[[^]]*\\] \\[(:?error|\\S+:\\S+)\\]( \\[pid \\d+(:\\S+ \\d+)?\\])? \\[client <HOST>(:\\d{1,5})?\\] ((AH0013[456]: )?Invalid (method|URI) in request .*( - possible attempt to establish SSL connection on non-SSL port)?|(AH00565: )?request failed: URI too long \\(longer than \\d+\\)|request failed: erroneous characters after protocol string: .*|AH00566: request failed: invalid characters in URI)(, referer: \\S+)?$']
- 2014-12-05 10:39:18,523 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-overflows', 'addaction', 'iptables-multiport']
- 2014-12-05 10:39:18,523 fail2ban.actions.action[1362]: DEBUG Created Action
- 2014-12-05 10:39:18,523 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-overflows', 'actionban', 'iptables-multiport', 'iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>']
- 2014-12-05 10:39:18,524 fail2ban.actions.action[1362]: DEBUG Set actionBan = iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>
- 2014-12-05 10:39:18,524 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-overflows', 'actionstop', 'iptables-multiport', 'iptables -D <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>\niptables -F fail2ban-<name>\niptables -X fail2ban-<name>']
- 2014-12-05 10:39:18,524 fail2ban.actions.action[1362]: DEBUG Set actionStop = iptables -D <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>
- iptables -F fail2ban-<name>
- iptables -X fail2ban-<name>
- 2014-12-05 10:39:18,525 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-overflows', 'actionstart', 'iptables-multiport', 'iptables -N fail2ban-<name>\niptables -A fail2ban-<name> -j RETURN\niptables -I <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>']
- 2014-12-05 10:39:18,525 fail2ban.actions.action[1362]: DEBUG Set actionStart = iptables -N fail2ban-<name>
- iptables -A fail2ban-<name> -j RETURN
- iptables -I <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>
- 2014-12-05 10:39:18,525 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-overflows', 'actionunban', 'iptables-multiport', 'iptables -D fail2ban-<name> -s <ip> -j <blocktype>']
- 2014-12-05 10:39:18,526 fail2ban.actions.action[1362]: DEBUG Set actionUnban = iptables -D fail2ban-<name> -s <ip> -j <blocktype>
- 2014-12-05 10:39:18,526 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-overflows', 'actioncheck', 'iptables-multiport', "iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \\t]'"]
- 2014-12-05 10:39:18,526 fail2ban.actions.action[1362]: DEBUG Set actionCheck = iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \t]'
- 2014-12-05 10:39:18,527 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-overflows', 'setcinfo', 'iptables-multiport', 'blocktype', 'REJECT --reject-with icmp-port-unreachable']
- 2014-12-05 10:39:18,527 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-overflows', 'setcinfo', 'iptables-multiport', 'protocol', 'tcp']
- 2014-12-05 10:39:18,528 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-overflows', 'setcinfo', 'iptables-multiport', 'name', 'apache-overflows']
- 2014-12-05 10:39:18,528 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-overflows', 'setcinfo', 'iptables-multiport', 'chain', 'INPUT']
- 2014-12-05 10:39:18,529 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-overflows', 'setcinfo', 'iptables-multiport', 'port', '80,443']
- 2014-12-05 10:39:18,529 fail2ban.comm [1362]: DEBUG Command: ['add', 'apache-nohome', 'auto']
- 2014-12-05 10:39:18,529 fail2ban.jail [1362]: INFO Creating new jail 'apache-nohome'
- 2014-12-05 10:39:18,529 fail2ban.jail [1362]: INFO Jail 'apache-nohome' uses pyinotify
- 2014-12-05 10:39:18,529 fail2ban.filter [1362]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('apache-nohome'))
- 2014-12-05 10:39:18,530 fail2ban.filter [1362]: DEBUG Created FilterPyinotify(Jail('apache-nohome'))
- 2014-12-05 10:39:18,530 fail2ban.filter [1362]: DEBUG Created FilterPyinotify
- 2014-12-05 10:39:18,530 fail2ban.jail [1362]: INFO Initiated 'pyinotify' backend
- 2014-12-05 10:39:18,531 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-nohome', 'usedns', 'warn']
- 2014-12-05 10:39:18,531 fail2ban.filter [1362]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('apache-nohome'))
- 2014-12-05 10:39:18,531 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-nohome', 'addlogpath', '/usr/local/apache/logs/error_log']
- 2014-12-05 10:39:18,531 fail2ban.filter [1362]: INFO Added logfile = /usr/local/apache/logs/error_log
- 2014-12-05 10:39:18,531 fail2ban.filter [1362]: DEBUG Added monitor for the parent directory /usr/local/apache/logs
- 2014-12-05 10:39:18,532 fail2ban.filter [1362]: DEBUG Added file watcher for /usr/local/apache/logs/error_log
- 2014-12-05 10:39:18,532 fail2ban.filter.datedetector[1362]: DEBUG Sorting the template list
- 2014-12-05 10:39:18,532 fail2ban.filter.datedetector[1362]: DEBUG Winning template: WEEKDAY MONTH Day Hour:Minute:Second[.subsecond] Year with 0 hits
- 2014-12-05 10:39:18,533 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-nohome', 'maxretry', '2']
- 2014-12-05 10:39:18,533 fail2ban.filter [1362]: INFO Set maxRetry = 2
- 2014-12-05 10:39:18,533 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-nohome', 'addignoreip', '127.0.0.1/8']
- 2014-12-05 10:39:18,533 fail2ban.filter [1362]: DEBUG Add 127.0.0.1/8 to ignore list
- 2014-12-05 10:39:18,534 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-nohome', 'ignorecommand', '']
- 2014-12-05 10:39:18,534 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-nohome', 'findtime', '600']
- 2014-12-05 10:39:18,534 fail2ban.filter [1362]: INFO Set findtime = 600
- 2014-12-05 10:39:18,535 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-nohome', 'bantime', '600']
- 2014-12-05 10:39:18,535 fail2ban.actions[1362]: INFO Set banTime = 600
- 2014-12-05 10:39:18,536 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-nohome', 'addfailregex', '^\\[[^]]*\\] \\[(:?error|\\S+:\\S+)\\]( \\[pid \\d+(:\\S+ \\d+)?\\])? \\[client <HOST>(:\\d{1,5})?\\] (AH00128: )?File does not exist: .*/~.*']
- 2014-12-05 10:39:18,538 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-nohome', 'addaction', 'iptables-multiport']
- 2014-12-05 10:39:18,538 fail2ban.actions.action[1362]: DEBUG Created Action
- 2014-12-05 10:39:18,538 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-nohome', 'actionban', 'iptables-multiport', 'iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>']
- 2014-12-05 10:39:18,538 fail2ban.actions.action[1362]: DEBUG Set actionBan = iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>
- 2014-12-05 10:39:18,539 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-nohome', 'actionstop', 'iptables-multiport', 'iptables -D <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>\niptables -F fail2ban-<name>\niptables -X fail2ban-<name>']
- 2014-12-05 10:39:18,539 fail2ban.actions.action[1362]: DEBUG Set actionStop = iptables -D <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>
- iptables -F fail2ban-<name>
- iptables -X fail2ban-<name>
- 2014-12-05 10:39:18,539 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-nohome', 'actionstart', 'iptables-multiport', 'iptables -N fail2ban-<name>\niptables -A fail2ban-<name> -j RETURN\niptables -I <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>']
- 2014-12-05 10:39:18,539 fail2ban.actions.action[1362]: DEBUG Set actionStart = iptables -N fail2ban-<name>
- iptables -A fail2ban-<name> -j RETURN
- iptables -I <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>
- 2014-12-05 10:39:18,540 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-nohome', 'actionunban', 'iptables-multiport', 'iptables -D fail2ban-<name> -s <ip> -j <blocktype>']
- 2014-12-05 10:39:18,540 fail2ban.actions.action[1362]: DEBUG Set actionUnban = iptables -D fail2ban-<name> -s <ip> -j <blocktype>
- 2014-12-05 10:39:18,541 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-nohome', 'actioncheck', 'iptables-multiport', "iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \\t]'"]
- 2014-12-05 10:39:18,541 fail2ban.actions.action[1362]: DEBUG Set actionCheck = iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \t]'
- 2014-12-05 10:39:18,541 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-nohome', 'setcinfo', 'iptables-multiport', 'blocktype', 'REJECT --reject-with icmp-port-unreachable']
- 2014-12-05 10:39:18,542 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-nohome', 'setcinfo', 'iptables-multiport', 'protocol', 'tcp']
- 2014-12-05 10:39:18,543 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-nohome', 'setcinfo', 'iptables-multiport', 'name', 'apache-nohome']
- 2014-12-05 10:39:18,543 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-nohome', 'setcinfo', 'iptables-multiport', 'chain', 'INPUT']
- 2014-12-05 10:39:18,544 fail2ban.comm [1362]: DEBUG Command: ['set', 'apache-nohome', 'setcinfo', 'iptables-multiport', 'port', '80,443']
- 2014-12-05 10:39:18,544 fail2ban.comm [1362]: DEBUG Command: ['add', 'ssh-ddos', 'auto']
- 2014-12-05 10:39:18,544 fail2ban.jail [1362]: INFO Creating new jail 'ssh-ddos'
- 2014-12-05 10:39:18,544 fail2ban.jail [1362]: INFO Jail 'ssh-ddos' uses pyinotify
- 2014-12-05 10:39:18,544 fail2ban.filter [1362]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('ssh-ddos'))
- 2014-12-05 10:39:18,545 fail2ban.filter [1362]: DEBUG Created FilterPyinotify(Jail('ssh-ddos'))
- 2014-12-05 10:39:18,545 fail2ban.filter [1362]: DEBUG Created FilterPyinotify
- 2014-12-05 10:39:18,545 fail2ban.jail [1362]: INFO Initiated 'pyinotify' backend
- 2014-12-05 10:39:18,546 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-ddos', 'usedns', 'warn']
- 2014-12-05 10:39:18,546 fail2ban.filter [1362]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('ssh-ddos'))
- 2014-12-05 10:39:18,546 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-ddos', 'addlogpath', '/var/log/secure']
- 2014-12-05 10:39:18,546 fail2ban.filter [1362]: INFO Added logfile = /var/log/secure
- 2014-12-05 10:39:18,547 fail2ban.filter [1362]: DEBUG Added monitor for the parent directory /var/log
- 2014-12-05 10:39:18,547 fail2ban.filter [1362]: DEBUG Added file watcher for /var/log/secure
- 2014-12-05 10:39:18,547 fail2ban.filter.datedetector[1362]: DEBUG Sorting the template list
- 2014-12-05 10:39:18,547 fail2ban.filter.datedetector[1362]: DEBUG Winning template: WEEKDAY MONTH Day Hour:Minute:Second[.subsecond] Year with 0 hits
- 2014-12-05 10:39:18,548 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-ddos', 'maxretry', '2']
- 2014-12-05 10:39:18,548 fail2ban.filter [1362]: INFO Set maxRetry = 2
- 2014-12-05 10:39:18,548 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-ddos', 'addignoreip', '127.0.0.1/8']
- 2014-12-05 10:39:18,549 fail2ban.filter [1362]: DEBUG Add 127.0.0.1/8 to ignore list
- 2014-12-05 10:39:18,549 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-ddos', 'ignorecommand', '']
- 2014-12-05 10:39:18,549 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-ddos', 'findtime', '600']
- 2014-12-05 10:39:18,550 fail2ban.filter [1362]: INFO Set findtime = 600
- 2014-12-05 10:39:18,550 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-ddos', 'bantime', '600']
- 2014-12-05 10:39:18,550 fail2ban.actions[1362]: INFO Set banTime = 600
- 2014-12-05 10:39:18,551 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-ddos', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*Did not receive identification string from <HOST>\\s*$']
- 2014-12-05 10:39:18,554 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-ddos', 'addaction', 'iptables']
- 2014-12-05 10:39:18,554 fail2ban.actions.action[1362]: DEBUG Created Action
- 2014-12-05 10:39:18,555 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-ddos', 'actionban', 'iptables', 'iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>']
- 2014-12-05 10:39:18,555 fail2ban.actions.action[1362]: DEBUG Set actionBan = iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>
- 2014-12-05 10:39:18,556 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-ddos', 'actionstop', 'iptables', 'iptables -D <chain> -p <protocol> --dport <port> -j fail2ban-<name>\niptables -F fail2ban-<name>\niptables -X fail2ban-<name>']
- 2014-12-05 10:39:18,556 fail2ban.actions.action[1362]: DEBUG Set actionStop = iptables -D <chain> -p <protocol> --dport <port> -j fail2ban-<name>
- iptables -F fail2ban-<name>
- iptables -X fail2ban-<name>
- 2014-12-05 10:39:18,556 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-ddos', 'actionstart', 'iptables', 'iptables -N fail2ban-<name>\niptables -A fail2ban-<name> -j RETURN\niptables -I <chain> -p <protocol> --dport <port> -j fail2ban-<name>']
- 2014-12-05 10:39:18,556 fail2ban.actions.action[1362]: DEBUG Set actionStart = iptables -N fail2ban-<name>
- iptables -A fail2ban-<name> -j RETURN
- iptables -I <chain> -p <protocol> --dport <port> -j fail2ban-<name>
- 2014-12-05 10:39:18,557 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-ddos', 'actionunban', 'iptables', 'iptables -D fail2ban-<name> -s <ip> -j <blocktype>']
- 2014-12-05 10:39:18,557 fail2ban.actions.action[1362]: DEBUG Set actionUnban = iptables -D fail2ban-<name> -s <ip> -j <blocktype>
- 2014-12-05 10:39:18,558 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-ddos', 'actioncheck', 'iptables', "iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \\t]'"]
- 2014-12-05 10:39:18,558 fail2ban.actions.action[1362]: DEBUG Set actionCheck = iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \t]'
- 2014-12-05 10:39:18,558 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-ddos', 'setcinfo', 'iptables', 'blocktype', 'REJECT --reject-with icmp-port-unreachable']
- 2014-12-05 10:39:18,559 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-ddos', 'setcinfo', 'iptables', 'protocol', 'tcp']
- 2014-12-05 10:39:18,559 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-ddos', 'setcinfo', 'iptables', 'name', 'SSHDDOS']
- 2014-12-05 10:39:18,560 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-ddos', 'setcinfo', 'iptables', 'chain', 'INPUT']
- 2014-12-05 10:39:18,560 fail2ban.comm [1362]: DEBUG Command: ['set', 'ssh-ddos', 'setcinfo', 'iptables', 'port', 'ssh']
- 2014-12-05 10:39:18,561 fail2ban.comm [1362]: DEBUG Command: ['start', 'dovecot-auth']
- 2014-12-05 10:39:18,563 fail2ban.filter [1362]: DEBUG pyinotifier started for dovecot-auth.
- 2014-12-05 10:39:18,564 fail2ban.actions.action[1362]: DEBUG iptables -N fail2ban-dovecot-auth
- iptables -A fail2ban-dovecot-auth -j RETURN
- iptables -I INPUT -p tcp -m multiport --dports pop3,pop3s,imap,imaps,submission,465,sieve -j fail2ban-dovecot-auth
- 2014-12-05 10:39:18,564 fail2ban.jail [1362]: INFO Jail 'dovecot-auth' started
- 2014-12-05 10:39:18,568 fail2ban.comm [1362]: DEBUG Command: ['start', 'selinux-ssh']
- 2014-12-05 10:39:18,569 fail2ban.jail [1362]: INFO Jail 'selinux-ssh' started
- 2014-12-05 10:39:18,570 fail2ban.actions.action[1362]: DEBUG iptables -N fail2ban-SELINUX-SSH
- iptables -A fail2ban-SELINUX-SSH -j RETURN
- iptables -I INPUT -p tcp --dport ssh -j fail2ban-SELINUX-SSH
- 2014-12-05 10:39:18,571 fail2ban.filter [1362]: DEBUG pyinotifier started for selinux-ssh.
- 2014-12-05 10:39:18,571 fail2ban.comm [1362]: DEBUG Command: ['start', 'ssh-iptables']
- 2014-12-05 10:39:18,573 fail2ban.jail [1362]: INFO Jail 'ssh-iptables' started
- 2014-12-05 10:39:18,573 fail2ban.actions.action[1362]: DEBUG iptables -N fail2ban-SSH
- iptables -A fail2ban-SSH -j RETURN
- iptables -I INPUT -p tcp --dport ssh -j fail2ban-SSH
- 2014-12-05 10:39:18,573 fail2ban.filter [1362]: DEBUG pyinotifier started for ssh-iptables.
- 2014-12-05 10:39:18,575 fail2ban.filter [1362]: DEBUG Default Callback for Event: <Event dir=False mask=0x2 maskname=IN_MODIFY name='' path=/var/log/audit/audit.log pathname=/var/log/audit/audit.log wd=2 >
- 2014-12-05 10:39:18,576 fail2ban.comm [1362]: DEBUG Command: ['start', 'exim']
- 2014-12-05 10:39:18,579 fail2ban.filter [1362]: DEBUG pyinotifier started for exim.
- 2014-12-05 10:39:18,579 fail2ban.jail [1362]: INFO Jail 'exim' started
- 2014-12-05 10:39:18,580 fail2ban.actions.action[1362]: DEBUG iptables -N fail2ban-exim
- iptables -A fail2ban-exim -j RETURN
- iptables -I INPUT -p tcp -m multiport --dports 25,465,587 -j fail2ban-exim
- 2014-12-05 10:39:18,581 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,583 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,583 fail2ban.comm [1362]: DEBUG Command: ['start', 'ssh-blocklist']
- 2014-12-05 10:39:18,584 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,586 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,586 fail2ban.filter [1362]: DEBUG pyinotifier started for ssh-blocklist.
- 2014-12-05 10:39:18,587 fail2ban.jail [1362]: INFO Jail 'ssh-blocklist' started
- 2014-12-05 10:39:18,588 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,588 fail2ban.actions.action[1362]: DEBUG iptables -N fail2ban-SSH
- iptables -A fail2ban-SSH -j RETURN
- iptables -I INPUT -p tcp --dport ssh -j fail2ban-SSH
- 2014-12-05 10:39:18,590 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,591 fail2ban.comm [1362]: DEBUG Command: ['start', 'sendmail-auth']
- 2014-12-05 10:39:18,592 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,593 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,595 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,595 fail2ban.actions.action[1362]: DEBUG iptables -N fail2ban-dovecot-auth
- iptables -A fail2ban-dovecot-auth -j RETURN
- iptables -I INPUT -p tcp -m multiport --dports pop3,pop3s,imap,imaps,submission,465,sieve -j fail2ban-dovecot-auth returned successfully
- 2014-12-05 10:39:18,596 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,596 fail2ban.filter [1362]: DEBUG pyinotifier started for sendmail-auth.
- 2014-12-05 10:39:18,597 fail2ban.jail [1362]: INFO Jail 'sendmail-auth' started
- 2014-12-05 10:39:18,597 fail2ban.actions.action[1362]: DEBUG iptables -N fail2ban-sendmail-auth
- iptables -A fail2ban-sendmail-auth -j RETURN
- iptables -I INPUT -p tcp -m multiport --dports submission,465,smtp -j fail2ban-sendmail-auth
- 2014-12-05 10:39:18,603 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,604 fail2ban.comm [1362]: DEBUG Command: ['start', 'dovecot']
- 2014-12-05 10:39:18,604 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,606 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,607 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,609 fail2ban.filter [1362]: DEBUG pyinotifier started for dovecot.
- 2014-12-05 10:39:18,610 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,610 fail2ban.jail [1362]: INFO Jail 'dovecot' started
- 2014-12-05 10:39:18,611 fail2ban.actions.action[1362]: DEBUG iptables -N fail2ban-dovecot
- iptables -A fail2ban-dovecot -j RETURN
- iptables -I INPUT -p tcp -m multiport --dports pop3,pop3s,imap,imaps,submission,465,sieve -j fail2ban-dovecot
- 2014-12-05 10:39:18,611 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,613 fail2ban.comm [1362]: DEBUG Command: ['start', 'apache-overflows']
- 2014-12-05 10:39:18,614 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,616 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,617 fail2ban.filter [1362]: DEBUG pyinotifier started for apache-overflows.
- 2014-12-05 10:39:18,617 fail2ban.actions.action[1362]: DEBUG iptables -N fail2ban-apache-overflows
- iptables -A fail2ban-apache-overflows -j RETURN
- iptables -I INPUT -p tcp -m multiport --dports 80,443 -j fail2ban-apache-overflows
- 2014-12-05 10:39:18,617 fail2ban.jail [1362]: INFO Jail 'apache-overflows' started
- 2014-12-05 10:39:18,618 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,619 fail2ban.actions.action[1362]: DEBUG iptables -N fail2ban-SELINUX-SSH
- iptables -A fail2ban-SELINUX-SSH -j RETURN
- iptables -I INPUT -p tcp --dport ssh -j fail2ban-SELINUX-SSH returned successfully
- 2014-12-05 10:39:18,620 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,621 fail2ban.comm [1362]: DEBUG Command: ['start', 'apache-nohome']
- 2014-12-05 10:39:18,625 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,627 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,628 fail2ban.jail [1362]: INFO Jail 'apache-nohome' started
- 2014-12-05 10:39:18,629 fail2ban.actions.action[1362]: DEBUG iptables -N fail2ban-apache-nohome
- iptables -A fail2ban-apache-nohome -j RETURN
- iptables -I INPUT -p tcp -m multiport --dports 80,443 -j fail2ban-apache-nohome
- 2014-12-05 10:39:18,631 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,631 fail2ban.filter [1362]: DEBUG pyinotifier started for apache-nohome.
- 2014-12-05 10:39:18,632 fail2ban.comm [1362]: DEBUG Command: ['start', 'ssh-ddos']
- 2014-12-05 10:39:18,633 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,635 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,636 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,637 fail2ban.actions.action[1362]: DEBUG iptables -N fail2ban-SSHDDOS
- iptables -A fail2ban-SSHDDOS -j RETURN
- iptables -I INPUT -p tcp --dport ssh -j fail2ban-SSHDDOS
- 2014-12-05 10:39:18,637 fail2ban.jail [1362]: INFO Jail 'ssh-ddos' started
- 2014-12-05 10:39:18,638 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,639 fail2ban.filter [1362]: DEBUG pyinotifier started for ssh-ddos.
- 2014-12-05 10:39:18,640 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,641 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,641 fail2ban.actions.action[1362]: DEBUG iptables -N fail2ban-SSH
- iptables -A fail2ban-SSH -j RETURN
- iptables -I INPUT -p tcp --dport ssh -j fail2ban-SSH returned successfully
- 2014-12-05 10:39:18,642 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,642 fail2ban.actions.action[1362]: DEBUG printf %b "Subject: [Fail2Ban] SSH: started on `uname -n`
- Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
- From: Fail2Ban <[email protected]>
- To: [email protected]\n
- Hi,\n
- The jail SSH has been started successfully.\n
- Regards,\n
- Fail2Ban" | /usr/sbin/sendmail -f [email protected] [email protected]
- 2014-12-05 10:39:18,647 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,661 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,661 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,662 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,663 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,663 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,664 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,664 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,665 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,666 fail2ban.actions.action[1362]: DEBUG iptables -N fail2ban-exim
- iptables -A fail2ban-exim -j RETURN
- iptables -I INPUT -p tcp -m multiport --dports 25,465,587 -j fail2ban-exim returned successfully
- 2014-12-05 10:39:18,666 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,670 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,671 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,672 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,672 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,673 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,673 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,674 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,674 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,675 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,675 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,676 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,677 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,677 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,677 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,678 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,678 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,678 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,678 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,679 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,679 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,679 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,680 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,680 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,680 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,681 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,681 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,681 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,681 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,682 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,682 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,683 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,683 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,683 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,683 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,684 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,684 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,684 fail2ban.actions.action[1362]: DEBUG iptables -N fail2ban-SSH
- iptables -A fail2ban-SSH -j RETURN
- iptables -I INPUT -p tcp --dport ssh -j fail2ban-SSH returned successfully
- 2014-12-05 10:39:18,685 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,686 fail2ban.actions.action[1362]: DEBUG printf %b "Subject: [Fail2Ban] SSH: started on `uname -n`
- Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
- From: Fail2Ban <[email protected]>
- To: [email protected]\n
- Hi,\n
- The jail SSH has been started successfully.\n
- Regards,\n
- Fail2Ban" | /usr/sbin/sendmail -f [email protected] [email protected]
- 2014-12-05 10:39:18,688 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,689 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,689 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,690 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,690 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,691 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,691 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,691 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,691 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,692 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,692 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,692 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,693 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,693 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,693 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,694 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,694 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,694 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,694 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,695 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,695 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,695 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,696 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,696 fail2ban.filter [1362]: DEBUG Processing line with time:1417786155.0 and ip:60.173.12.226
- 2014-12-05 10:39:18,696 fail2ban.filter [1362]: DEBUG Ignore line since time 1417786155.0 < 1417793958.7 - 600
- 2014-12-05 10:39:18,696 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,697 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,697 fail2ban.filter [1362]: DEBUG Processing line with time:1417786155.0 and ip:60.173.12.226
- 2014-12-05 10:39:18,697 fail2ban.filter [1362]: DEBUG Ignore line since time 1417786155.0 < 1417793958.7 - 600
- 2014-12-05 10:39:18,697 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,698 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,698 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,698 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,699 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,699 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,699 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,700 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,700 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,700 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,701 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,701 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,701 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,702 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,702 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,702 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,703 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,703 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,703 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,703 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,704 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,704 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,704 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,704 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,705 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,705 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,705 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,706 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,706 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,706 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,707 fail2ban.actions.action[1362]: DEBUG iptables -N fail2ban-sendmail-auth
- iptables -A fail2ban-sendmail-auth -j RETURN
- iptables -I INPUT -p tcp -m multiport --dports submission,465,smtp -j fail2ban-sendmail-auth returned successfully
- 2014-12-05 10:39:18,707 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,711 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,712 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,712 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,712 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,719 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,719 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,720 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,720 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,721 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,721 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,722 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,722 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,723 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,724 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,724 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,725 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,725 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,726 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,726 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,727 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,727 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,727 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,727 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,728 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,728 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,728 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,729 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,729 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,729 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,730 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,730 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,730 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,730 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,731 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,731 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,731 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,732 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,732 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,732 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,733 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,733 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,733 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,734 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,734 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,734 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,735 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,735 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,735 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,735 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,736 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,736 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,736 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,737 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,737 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,737 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,738 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,738 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,738 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,739 fail2ban.actions.action[1362]: DEBUG iptables -N fail2ban-dovecot
- iptables -A fail2ban-dovecot -j RETURN
- iptables -I INPUT -p tcp -m multiport --dports pop3,pop3s,imap,imaps,submission,465,sieve -j fail2ban-dovecot returned successfully
- 2014-12-05 10:39:18,739 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,742 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,743 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,743 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,743 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,744 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,744 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,744 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,744 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,745 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,745 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,745 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,746 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,746 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,746 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,747 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,747 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,747 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,747 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,748 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,748 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,748 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,749 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,749 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,749 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,750 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,750 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,750 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,750 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,751 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,751 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,752 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,752 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,752 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,752 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,753 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,753 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,753 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,754 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,754 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,754 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,755 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,755 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,755 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,755 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,756 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,756 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,757 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,757 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,757 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,757 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,758 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,758 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,758 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,759 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,759 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,759 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,760 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,760 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,760 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,760 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,761 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,761 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,761 fail2ban.actions.action[1362]: DEBUG iptables -N fail2ban-apache-overflows
- iptables -A fail2ban-apache-overflows -j RETURN
- iptables -I INPUT -p tcp -m multiport --dports 80,443 -j fail2ban-apache-overflows returned successfully
- 2014-12-05 10:39:18,762 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,765 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,766 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,766 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,766 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,766 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,767 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,767 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,767 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,768 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,768 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,768 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,769 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,769 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,769 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,770 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,770 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,770 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,770 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,771 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,771 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,771 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,772 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,772 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,772 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,773 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,773 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,773 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,774 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,774 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,774 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,774 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,775 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,775 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,775 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,776 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,776 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,776 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,776 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,777 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,777 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,777 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,778 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,778 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,778 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,778 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,779 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,779 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,779 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,780 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,780 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,780 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,781 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,781 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,781 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,782 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,782 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,782 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,783 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,783 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,783 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,784 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,784 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,784 fail2ban.actions.action[1362]: DEBUG iptables -N fail2ban-apache-nohome
- iptables -A fail2ban-apache-nohome -j RETURN
- iptables -I INPUT -p tcp -m multiport --dports 80,443 -j fail2ban-apache-nohome returned successfully
- 2014-12-05 10:39:18,785 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,788 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,789 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,789 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,789 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
- 2014-12-05 10:39:18,790 fail2ban.filter.datedetector[1362]: DEBUG Matched time template Epoch
- 2014-12-05 10:39:18,790 fail2ban.filter.datedetector[1362]: DEBUG Got time using template Epoch
Advertisement
Add Comment
Please, Sign In to add comment