Displaying 19 results from an estimated 19 matches for "unban".
2003 Apr 24
1
Unban from #vorbis?
...er, because I'm still banned. I seemed to be Emmett's favorite person to pick on. He told me to "eat a bag of dick" in his Ogg internet radio station thing, and generally ruined my reputation as a self-respecting programmer in #vorbis. Blah...anyway. Is there any way I can get unbanned?
--- >8 ----
List archives: http://www.xiph.org/archives/
Ogg project homepage: http://www.xiph.org/ogg/
To unsubscribe from this list, send a message to 'vorbis-request@xiph.org'
containing only the word 'unsubscribe' in the body. No subject is needed.
Unsubscribe messages...
2009 Mar 22
4
Requesting unban from irc channel
man_in_shack banned me during a casual conversation where i was explaining my dual x server wine setup, saying I was contradicting myself. I obviously wasn't trying to contradict myself, if I did, and I don't see how this is ban-worthy under any circumstance.
2019 Apr 19
4
faI2ban detecting and banning but nothing happens
...[dovecot] Ban
45.227.253.99
2019-04-19 13:06:32,954 fail2ban.filter [21954]: INFO [dovecot]
Found 45.227.253.99
2019-04-19 13:06:36,664 fail2ban.filter [21954]: INFO [dovecot]
Found 185.222.209.71
2019-04-19 13:07:16,973 fail2ban.actions [21954]: NOTICE [dovecot]
Unban 185.211.245.198
2019-04-19 13:07:42,108 fail2ban.actions [21954]: NOTICE [dovecot]
Unban 185.234.217.221
2019-04-19 13:08:06,475 fail2ban.filter [21954]: INFO [dovecot]
Found 141.98.80.32
2019-04-19 13:08:11,299 fail2ban.filter [21954]: INFO [dovecot]
Found 185.234....
2019 Apr 19
0
faI2ban detecting and banning but nothing happens
...> 2019-04-19 13:06:32,954 fail2ban.filter [21954]: INFO [dovecot]
> Found 45.227.253.99
> 2019-04-19 13:06:36,664 fail2ban.filter [21954]: INFO [dovecot]
> Found 185.222.209.71
> 2019-04-19 13:07:16,973 fail2ban.actions [21954]: NOTICE [dovecot]
> Unban 185.211.245.198
> 2019-04-19 13:07:42,108 fail2ban.actions [21954]: NOTICE [dovecot]
> Unban 185.234.217.221
> 2019-04-19 13:08:06,475 fail2ban.filter [21954]: INFO [dovecot]
> Found 141.98.80.32
> 2019-04-19 13:08:11,299 fail2ban.filter [21954]: INFO...
2012 Apr 27
1
fail2ban logrotate failure
...er riding its fail2ban.log.
took a while, but I use /var/log/fail2ban now, that finally worked
through logrotates and logwatch.
Problem with centos variant of fail2ban:
logrotate causes all 'ban' actions to stop happening. I am pretty sure
it stops reading the logs but still functions.
Unban actions still keep showing up in the log, but the 'ban' actions
just stop. Program is running, but no longer working.
Long searches online show a million others with the same issue. Only way
to prevent it seems to be to add a reload or restart in the syslog file.
This is undesired due t...
2019 Apr 19
2
faI2ban detecting and banning but nothing happens
...:32,954 fail2ban.filter [21954]: INFO
> > [dovecot] Found 45.227.253.99
> > 2019-04-19 13:06:36,664 fail2ban.filter [21954]: INFO
> > [dovecot] Found 185.222.209.71
> > 2019-04-19 13:07:16,973 fail2ban.actions [21954]: NOTICE
> > [dovecot] Unban 185.211.245.198
> > 2019-04-19 13:07:42,108 fail2ban.actions [21954]: NOTICE
> > [dovecot] Unban 185.234.217.221
> > 2019-04-19 13:08:06,475 fail2ban.filter [21954]: INFO
> > [dovecot] Found 141.98.80.32
> > 2019-04-19 13:08:11,299 fail2ban.filter...
2019 Apr 26
2
faI2ban detecting and banning but nothing happens
...the iptables rules to see
> what is actually being applied.
Hi Pete,
I did wonder that myself. I have now amended to Dovecot definition in jail.conf to:
[dovecot]
port = pop3,pop3s,imap,imaps,submission,sieve,25,1025,465,587
logpath = %(dovecot_log)s
backend = %(dovecot_backend)s
I then unbanned and banned each IP address manually with
for F in 46.232.112.21 106.226.231.159 [snip] 52.38.234.254 ; do
fail2ban-client set dovecot unbanip $F
fail2ban-client set dovecot banip $F
done
which worked. However, having done this, the connections are still getting through to EXIM.
[root at olli...
2019 Apr 19
0
faI2ban detecting and banning but nothing happens
...253.99
>2019-04-19 13:06:32,954 fail2ban.filter [21954]: INFO [dovecot]
>Found 45.227.253.99
>2019-04-19 13:06:36,664 fail2ban.filter [21954]: INFO [dovecot]
>Found 185.222.209.71
>2019-04-19 13:07:16,973 fail2ban.actions [21954]: NOTICE [dovecot]
>Unban 185.211.245.198
>2019-04-19 13:07:42,108 fail2ban.actions [21954]: NOTICE [dovecot]
>Unban 185.234.217.221
>2019-04-19 13:08:06,475 fail2ban.filter [21954]: INFO [dovecot]
>Found 141.98.80.32
>2019-04-19 13:08:11,299 fail2ban.filter [21954]: INFO [dove...
2019 Aug 05
4
[OT] odd network question
On Sat, Aug 03, 2019 at 04:50:05PM +0100, Giles Coochey wrote:
>
> On 02/08/2019 19:38, Jon LaBadie wrote:
> > On Fri, Aug 02, 2019 at 10:19:49AM -0400, mark wrote:
> > > Fred Smith wrote:
> > > > On Fri, Aug 02, 2019 at 09:28:23AM -0400, mark wrote:
> > > <MVNCH>
>
> I've been using fail2ban for some time, I have a number of ports open
2019 Apr 26
0
faI2ban detecting and banning but nothing happens
>
> I did wonder that myself. I have now amended to Dovecot definition in jail.conf to:
>
> [dovecot]
>
> port = pop3,pop3s,imap,imaps,submission,sieve,25,1025,465,587
> logpath = %(dovecot_log)s
> backend = %(dovecot_backend)s
>
> I then unbanned and banned each IP address manually with
Did you reload the configuration? ("fail2ban-client reload")
What action are you using - you mention ipset, are you using iptables-
ipset-proto4? I don't know anything about ipset, but can you see what
ports are being blocked in the fail2...
2019 Aug 05
0
[OT] odd network question
...of fail2ban. After the
> second 10min ban, the attacker is blocked for 1 week.
>
Interesting, didn't know about that feature, but, oh, I just generally
ban for a whole week regardless, yes, I realise that a typo might? set
it off for a actual user, but I have other methods of entry to unban if
that happens, and we have a number of whitelisted IPs that cover most
things like that for most use cases, and a VPN within the whitelist that
can be used if the public services get locked out.
2012 Mar 27
0
ctdb_recovery_lock: Failed to get recovery lock
...aemons (nmbd, smbd and winbind) and kills itself,
node 1 claims :
ctdb_recovery_lock: Failed to get recovery lock on '/ctdb/.ctdb.lock'
(This directory is clvm + gfs2 shared, writable and correctly accessible
from both nodes)
This leads node 1 to get banned.
Then, (I guess), when being unbanned, reelection occurs, but I get :
Recmaster node 1 no longer available. Force reelection
I suppose that node 1 can't become recmaster as it can not get the
recovery lock. But there's no way I see why this node claims it can take
this lock.
I don't know if this may help, but :
- I...
2001 Aug 27
0
A reminder if your posts are disappearing
Hello folks,
Recently more and more messages are being killed by xiph.org's postfix
anti-spam filter, followed by pleading messages from the author to
'unban' them :-) There's no banning on the group, but the anti-spam
filter doesn't take prisoners.
Remember these tips:
Mail in HTML format is unceremoniously dropped on the floor. You will
not be informed it has been dropped, and I will not be informed it was
dropped. This alone eliminate...
2001 Aug 27
0
A reminder if your posts are disappearing
Hello folks,
Recently more and more messages are being killed by xiph.org's postfix
anti-spam filter, followed by pleading messages from the author to
'unban' them :-) There's no banning on the group, but the anti-spam
filter doesn't take prisoners.
Remember these tips:
Mail in HTML format is unceremoniously dropped on the floor. You will
not be informed it has been dropped, and I will not be informed it was
dropped. This alone eliminate...
2013 May 30
0
[Announce] CTDB 2.2 available for download
...uns as root via sudo.
* "ctdb delip" no longer fails if it is unable to move the IP.
* A race in the ctdb tool's ipreallocate code was fixed. This fixes
potential bugs in the "disable", "enable", "stop", "continue",
"ban", "unban", "ipreallocate" and "sync" commands.
* The monitor cancellation code could sometimes hang indefinitely.
This could cause "ctdb stop" and "ctdb shutdown" to fail.
Important internal changes
--------------------------
* The socket I/O handling has be...
2013 Oct 30
0
[Announce] CTDB 2.5 available for download
...(1) for details.
* "ctdb rebalancenode" is now a debugging command and should not be
used in normal operation. See ctdb(1) for details.
* "ctdb ban 0" is now invalid.
This was documented as causing a permanent ban. However, this was
not implemented and caused an "unban" instead. To avoid confusion,
0 is now an invalid ban duration. To administratively "ban" a node
use "ctdb stop" instead.
* The systemd configuration now puts the PID file in /run/ctdb (rather
than /run/ctdbd) for consistency with the initscript and other uses
of...
2012 Jun 15
1
Update on spam, postfix, fail2ban, centos 6
...of the illegitimate sites
that were coming from the UCE's I had blocked.
It is quite interesting to watch this process. More interesting that no
matter how strict or lax I make the system there will be the same
number of attempted mails sent to my server. (give or take a few hundred).
If I unban all the ips, which I did once, there was a one day bump up,
then it leveled off to the same amount of individual attemtps
(not counting the same attempt being tried again).
I have 35,000 ips blocked right now and nothing changed...except yahoo spam.
Spamassassin I use, but only for level 10 or m...
2015 Mar 10
2
Fail2Ban Centos 7 is there a trick to making it work?
...Option: actionban
# Notes.: command executed when banning an IP. Take care that the
# command is executed with Fail2Ban user rights.
# Tags: See jail.conf(5) man page
# Values: CMD
#
actionban = iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>
# Option: actionunban
# Notes.: command executed when unbanning an IP. Take care that the
# command is executed with Fail2Ban user rights.
# Tags: See jail.conf(5) man page
# Values: CMD
#
actionunban = iptables -D fail2ban-<name> -s <ip> -j <blocktype>
[Init]
# Default name of the chai...
2010 Mar 19
6
(no subject)
Hello,
I'm looking for some advice on securing Asterisk.
Recently my servers been under several brute-force SIP attacks.
I have several remote sites, as well as many roaming users, who may have
PC softclients and/or SIP based hardphones.
My first step will be to strengthen the passwords in use, and for the
hardphones to restrict by IP address, but that still leaves the
softphone