Displaying 18 results from an estimated 18 matches for "maxelem".
2011 Aug 02
3
[Bug 733] New: ipset restore won't restore from output of ipset save
http://bugzilla.netfilter.org/show_bug.cgi?id=733
Summary: ipset restore won't restore from output of ipset save
Product: ipset
Version: unspecified
Platform: All
OS/Version: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: default
AssignedTo: netfilter-buglog at
2019 Apr 26
2
faI2ban detecting and banning but nothing happens
...221 185.36.81.165 188.165.238.157 203.2.118.130 209.166.164.71 210.6.94.23 211.72.92.124 27.156.139.95 27.156.176.146 41.164.192.74 45.227.253.100 45.227.253.99 49.87.109.233 52.38.234.254
[root at ollie2 ~]# ipset list
Name: fail2ban-sshd
Type: hash:ip
Revision: 4
Header: family inet hashsize 1024 maxelem 65536 timeout 3600000
Size in memory: 120
References: 0
Number of entries: 0
Members:
Name: fail2ban-dovecot
Type: hash:ip
Revision: 4
Header: family inet hashsize 1024 maxelem 65536 timeout 3600000
Size in memory: 3768
References: 0
Number of entries: 41
Members:
185.211.245.198 timeout 4294522
[...
2013 Dec 03
8
[Bug 880] New: ipset doesn't refresh the timeout for an existing entry when the table is FULL.
...tedBy: xose.vazquez at gmail.com
Estimated Hours: 0.0
ipset doesn't refresh timeout for an existing entry when the table is FULL.
- Version-Release number of selected component:
kernel: 3.11.10-200.fc19.x86_64
ipset: v6.20.1
- Steps to Reproduce:
# ipset create http hash:ip timeout 0 maxelem 5
# ipset add http 192.168.0.1
# ipset add http 192.168.0.2
# ipset add http 192.168.0.3
# ipset add http 192.168.0.4
# ipset list
Name: http
Type: hash:ip
Revision: 1
Header: family inet hashsize 1024 maxelem 5 timeout 0
Size in memory: 16784
References: 0
Members:
192.168.0.3 timeout 0
192.168.0....
2013 May 13
2
[Bug 819] New: ipset create setname timeout 2147484 records greater timeout
https://bugzilla.netfilter.org/show_bug.cgi?id=819
Summary: ipset create setname timeout 2147484 records greater
timeout
Product: ipset
Version: unspecified
Platform: x86_64
OS/Version: Debian GNU/Linux
Status: NEW
Severity: major
Priority: P5
Component: default
AssignedTo:
2017 Jul 19
3
under some kind of attack
Hi Robert,
On 07/18/2017 11:43 PM, Robert Schetterer wrote:
> i guess not, but typical bots arent using ssl, check it
>
> however fail2ban sometimes is to slow
I have configured dovecot with
auth_failure_delay = 10 secs
I hope that before the 10 sec are over, dovecot will have logged about
the failed login attempt, and fail2ban will have blocked the ip by then.
MJ
2017 Jul 19
0
under some kind of attack
...-A INPUT -p tcp --dport 143 -m set --match-set imap-bl src -j DROP
/etc/fail2ban/jail.conf:
[imap]
...
action = ipset[name=imap-bl]
/etc/fail2ban/action.d/ipset.conf:
[Definition]
# fail2ban tracks, so we dont use ipset timeout
actionstart = /usr/sbin/ipset -exist create <name> hash:ip maxelem 131072
actionstop = /usr/sbin/ipset -exist flush <name>
actioncheck =
actionban = /usr/sbin/ipset -exist add <name> <ip>
actionunban = /usr/sbin/ipset -exist del <name> <ip>
You may have to ensure the ipset is present before referencing it in iptables,
for examp...
2013 Aug 12
2
[Bug 840] New: Specifying CIDR when adding to a hash:ip entry is silently ignored
...gnedTo: netfilter-buglog at lists.netfilter.org
ReportedBy: quentin at armitage.org.uk
Estimated Hours: 0.0
# ipset create foo hash:ip netmask 24
# ipset add foo 1.2.3.4/24
# ipset add foo 1.2.4.5/32
# ipset list foo
Name: foo
Type: hash:ip
Revision: 0
Header: family inet hashsize 1024 maxelem 65536 netmask 24
Size in memory: 16536
References: 0
Members:
1.2.4.0
1.2.3.0
--
Configure bugmail: https://bugzilla.netfilter.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.
2019 Oct 08
2
[Bug 1369] New: ipset save|list -sorted sorts alphabetically instead of naturally
...0.0.
Version-Release number of selected component (if applicable):
ipset-7.2
How reproducible:
Always
Steps to Reproduce:
1. ipset create foo hash:net
2. ipset add foo 95.0.0.0/8
3. ipset add foo 107.0.0.0/8
4. ipset save foo -sorted
Actual results:
create foo hash:net family inet hashsize 1024 maxelem 65536
add foo 107.0.0.0/8
add foo 95.0.0.0/8
Expected results:
create foo hash:net family inet hashsize 1024 maxelem 65536
add foo 95.0.0.0/8
add foo 107.0.0.0/8
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment w...
2019 Apr 19
2
faI2ban detecting and banning but nothing happens
On Friday 19 April 2019 15:19:26 Pete Biggs wrote:
> > I've added a fail regex to /etc/fail2ban/filter.d/exim.conf as suggested
> > on another page:
>
> The standard exim.conf already has a 535 filter. Was that not working
> for you?
I was following the instructions as shown on the page. I did find after
sending my post that there was already a regex in the standard
2017 Jun 16
2
[Bug 1158] New: using old session data when piping multiple commands
...dd test 1.1.1.1\nadd test_iface 2.2.2.2\nadd test 3.3.3.3\n" |
./ipset -
ipset v6.32: Syntax error: Second element is missing from 2.2.2.2.
ipset v6.32: Syntax error: Second element is missing from 3.3.3.3.
# ./ipset list
Name: test
Type: hash:net
Revision: 6
Header: family inet hashsize 1024 maxelem 65536
Size in memory: 448
References: 0
Members:
1.1.1.1
Name: test_iface
Type: hash:net,iface
Revision: 6
Header: family inet hashsize 1024 maxelem 65536
Size in memory: 416
References: 0
Members:
Printing "setname" and "typename" in types.c:adt_type_get() shows that in the...
2016 Dec 09
4
[Bug 1101] New: SET target unreliable in iptables - add does not work as expected
https://bugzilla.netfilter.org/show_bug.cgi?id=1101
Bug ID: 1101
Summary: SET target unreliable in iptables - add does not work
as expected
Product: netfilter/iptables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: major
Priority: P5
2017 Feb 08
3
[Bug 1119] New: Hash code evicting other entries upon entry deletion (v6.25.1-v6.30)
...set does not issue an error.
This is the listing of a set that's failed after all its entries have been
removed. Note the size of memory and number of entries compared to the flushed
version:
~/ipset/src # ipset list test
Name: test
Type: hash:ip
Revision: 4
Header: family inet hashsize 1024 maxelem 65536
Size in memory: 13128
References: 0
Number of entries: 3
Members:
~/ipset/src # ipset flush test
~/ipset/src # ipset list test
Name: test
Type: hash:ip
Revision: 4
Header: family inet hashsize 1024 maxelem 65536
Size in memory: 120
References: 0
Number of entries: 0
Members:
~/ipset/src #
I...
2012 Sep 30
12
shorewall dynamic zones confusion
...tcpflags,dhcp,nosmurfs,blacklist
I know it differs from the documentation by specifying non-default
options, but I would like to keep at least blacklist for now until the
dynamic zones get fully tested. The ipsets are generated as:
Name: nocom_lanif_3
Type: hash:ip
Header: family inet hashsize 1024 maxelem 65536
Size in memory: 16504
References: 24
Members:
Name: nonet_lanif_3
Type: hash:ip
Header: family inet hashsize 1024 maxelem 65536
Size in memory: 16504
References: 12
Members:
I''ve observed two strange/misunderstood behaviors/errors:
1. shorewall show dynamic nonet
returns nothing and...
2023 Oct 25
4
[Bug 1719] New: ipset wrongly blocking undefined ranges and not blocking ranges that are defined
...g/attachment.cgi?id=727&action=edit
ipset blacklist (1881 entries)
As used version is not available in above version list: ipset v6.29, protocol
version: 6. OS is CentOS (RHEL).
$ ipset -L -n
blacklist
$ ipset -L -t
Name: blacklist
Type: hash:net
Revision: 6
Header: family inet hashsize 1024 maxelem 65536
Size in memory: 57600
References: 1
Number of entries: 1881
$ ipset test blacklist 108.174.0.158
108.174.0.158 is in set blacklist.
$ ipset test blacklist 108.174.1.10
108.174.1.10 is in set blacklist.
$ ipset test blacklist 108.174.8.95
108.174.8.95 is in set blacklist.
Above tested IP a...
2020 Apr 09
2
fail2ban firewalld problems with current CentOS 7
...vc is allowed in the current policy
allow fail2ban_t sysfs_t:file { getattr open read };
When I load this new module I can restart fail2ban and
it finally is able to create a working ipset:
[root at camus ~]# ipset list
Name: f2b-apache
Type: hash:ip
Revision: 4
Header: family inet hashsize 1024 maxelem 65536 timeout 10800
Size in memory: 408
References: 1
Number of entries: 3
Members:
223.167.32.161 timeout 10149
93.174.93.143 timeout 10149
5.164.24.192 timeout 10149
I'm neither a fail2ban nor a SELinux expert, but it seems the
standard fail2ban SELinux policy as provided by CentOS 7 is not...
2013 Aug 13
3
[Bug 844] New: Can set apparently invalid netmask for hash:ip
...reate foo hash:ip family ipv6 netmask 1
ipset v6.19: Syntax error: '1' is out of range 4-124
However, the following does not fail:
# ipset create foo hash:ip netmask 1 family ipv6
# ipset add foo ffff::
# ipset list foo
Name: foo
Type: hash:ip
Revision: 0
Header: family inet6 hashsize 1024 maxelem 65536 netmask 1
Size in memory: 16504
References: 0
Members:
8000::
Is there a reason why a netmask of 32 cannot be specified for ipv4 hash:ip
sets, and also netmasks of 1,2,3,125,126,127 and 128 can't be specified for
ipv6 sets?
It would be very helpful for me if an ipv4 netmask of 32 and an...
2023 Dec 05
3
[Bug 1726] New: invalid json generated by ipset list -output json
...et add test 1.2.3.4
root at gir:~# ipset list --output json
[
{
"name" : "test",
"type" : "hash:ip",
"revision" : 6,
"header" : {
"family" : "inet",
"hashsize" : 1024,
"maxelem" : 65536,
"bucketsize" : 12,
"initval" : 0xdcadf93b,
---
This is the point where parsing fails. The "0x" prefix is not part of the JSON
grammar [1]. Popular JSON parsers fail on this:
---
root at gir:~# ipset list -output json | jq .
jq: parse erro...
2020 Apr 09
2
fail2ban firewalld problems with current CentOS 7
Hi!
I have a server running CentOS 7.7 (1908) with all current patches installed.
I think this server should be a quite standard installation with no specialities
On this server I have fail2ban with an apache and openvpn configuration.
I'm using firewalld to manage the firewall rules.
Fail2an is configured to use firewalld:
[root at server ~]# ll /etc/fail2ban/jail.d/
insgesamt 12