Displaying 20 results from an estimated 200 matches similar to: "Fail2Ban Centos 7 is there a trick to making it work?"
2015 Mar 10
0
Fail2Ban Centos 7 is there a trick to making it work?
> On 10 Mar 2015, at 14:30, James B. Byrne <byrnejb at harte-lyne.ca> wrote:
>
>
> On Mon, March 9, 2015 13:11, John Plemons wrote:
>> Been working on fail2ban, and trying to make it work with plain Jane
>> install of Centos 7
>>
>> Machine is a HP running 2 Quad core Xeons, 16 gig or ram and 1 plus TB
>> of disk space. Very generic and vanilla.
2017 Jul 19
0
under some kind of attack
On 19/07/2017 11:23, mj wrote:
> Hi Robert,
>
> On 07/18/2017 11:43 PM, Robert Schetterer wrote:
>> i guess not, but typical bots arent using ssl, check it
>>
>> however fail2ban sometimes is to slow
>
> I have configured dovecot with
> auth_failure_delay = 10 secs
>
> I hope that before the 10 sec are over, dovecot will have logged about the
>
2015 Mar 30
1
Fail2Ban Centos 7 is there a trick to making it work?
On Tue, 2015-03-10 at 14:43 +0100, Andrea Dell'Amico wrote:
>
> #============= logrotate_t ==============
> allow logrotate_t fail2ban_client_exec_t:file { ioctl read execute
> execute_no_trans open };
>
Looks like this was already fixed in 'selinux-policy'. See
https://bugzilla.redhat.com/show_bug.cgi?id=1114821
John.
--
John Horne Tel: +44
2019 Apr 29
0
faI2ban detecting and banning but nothing happens
On 4/26/19 3:50 AM, Gary Stainburn wrote:
> I can't remember the other one. I have removed all of the manual amendments so am now basically set up as initially installed.
This is my process for fail2ban:
1: "yum install fail2ban"? This installs fail2ban and fail2ban-firewalld.
2: install /etc/fail2ban/jail.local.? This file enables the matching
rules in
2015 Mar 09
1
Fail2Ban Centos 7 is there a trick to making it work?
Been working on fail2ban, and trying to make it work with plain Jane
install of Centos 7
Machine is a HP running 2 Quad core Xeons, 16 gig or ram and 1 plus TB
of disk space. Very generic and vanilla.
Current available epel repo version is fail2ban-0.9.1
Looking at the log file, fail2ban starts and stops fine, there isn't
output though showing any login attempts being restricted.
2015 Jan 19
2
CentOS-6.6 Fail2Ban and Postfix Selinux AVCs
I am seeing these in the log of one of our off-site NX hosts running
CentOS-6.6.
type=AVC msg=audit(1421683972.786:4372): avc: denied { create } for
pid=22788 comm="iptables" scontext=system_u:system_r:fail2ban_t:s0
tcontext=system_u:system_r:fail2ban_t:s0 tclass=rawip_socket
Was caused by:
Missing type enforcement (TE) allow rule.
You can use
2020 Apr 17
2
[SOLVED] fail2ban firewalld problems with current CentOS 7
On 13/04/20 1:30 pm, Orion Poplawski wrote:
> On 4/9/20 6:31 AM, Andreas Haumer wrote:
> ...
>> I'm neither a fail2ban nor a SELinux expert, but it seems the
>> standard fail2ban SELinux policy as provided by CentOS 7 is not
>> sufficient anymore and the recent updates did not correctly
>> update the required SELinux policies.
>>
>> I could report this
2020 Feb 26
3
CentOS 7 : SELinux trouble with Fail2ban
On Feb 26, 2020, at 08:52, Nicolas Kovacs <info at microlinux.fr> wrote:
>
>> Le 26/02/2020 ? 11:51, Nicolas Kovacs a ?crit :
>> SELinux is preventing /usr/bin/python2.7 from read access on the file disable.
>> ***** Plugin catchall (100. confidence) suggests *****
>> If you believe that python2.7 should be allowed read access on the disable file by default.
2009 Jul 16
0
how to group the output of aov by a variable?
Hi there,
I am new to R and have what seems to be a simple question. I put together
the following commands in order to run an anova on multiple different
variables at once:
for(i in 10:20)
{subj <- mydata[ which(lupi2$subject=='mas'),]
cat("****************ANOVA for variable:", names(subj[i]))
2010 Nov 24
1
how to make R overlook string character
I am really new to R and would appreciate some help to sort out a problem
with data extraction from a large file.
I have entered the following command to filter data from a large data set
called "upanddown" such that those records in upanddown corresponding to
blockType=3'UTR are transferred to a new file called "new":
new<-sqldf("select * from upanddown where
2020 Apr 09
2
fail2ban firewalld problems with current CentOS 7
Hi!
Am 09.04.20 um 10:07 schrieb Rob Kampen:
[...]
> I too had fail2ban fail after an otherwise successful yum update. Mine occurred in Feb when my versions of firewalld etc were updated to the versions you show. Thus far I have not had the opportunity to sort the problem. Lockdown has been quite busy so far, hopefully some slower times coming next week.
Yeah, those pesky real-life biological
2020 Apr 09
2
fail2ban firewalld problems with current CentOS 7
Hi!
I have a server running CentOS 7.7 (1908) with all current patches installed.
I think this server should be a quite standard installation with no specialities
On this server I have fail2ban with an apache and openvpn configuration.
I'm using firewalld to manage the firewall rules.
Fail2an is configured to use firewalld:
[root at server ~]# ll /etc/fail2ban/jail.d/
insgesamt 12
2020 Feb 26
5
CentOS 7 : SELinux trouble with Fail2ban
Hi,
Some time ago I had SELinux problems with Fail2ban. One of the users on this
list suggested that it might be due to the fact that I'm using a bone-headed
iptables script instead of FirewallD.
I've spent the past few weeks getting up to date with doing things in a more
orthodox manner. So currently my internet-facing CentOS server has a nicely
configured NetworkManager, and
2015 Oct 09
2
CentOS-6 SSHD chroot SELinux problem
I run a sshd host solely to allow employees to tunnel secure
connections to our internal hosts. Some of which do not support
encrypted protocols. These connections are chroot'ed via the
following in /etc/ssh/sshd_config
Match Group !wheel,!xxxxxx,yyyyy
AllowTcpForwarding yes
ChrootDirectory /home/yyyyy
X11Forwarding yes
Where external users belong to group yyyyy (primary).
We
2003 Dec 11
5
Yuck! Error in buffer handling
Hello.
Is this normal. Or does it mean there is a problem ?
-------------------------
stop now
Beginning asterisk shutdown....
Executing last minute cleanups
== Destroying any remaining musiconhold processes
Yuck! Error in buffer handling...: Connection reset by peer
Yuck! Error in buffer handling...: Broken pipe
Yuck! Error in buffer handling...: Broken pipe
Asterisk cleanly ending (0).
2001 Nov 16
0
Data Structures
Hi all,
Thanks to everyone who replied to my change of case question... I doubt I
would have ever randomly guessed 'toupper' or 'tolower'.
I am trying to be cleaver[1] and make a flexible data structure in R. I
have a relatively large quantity of data that can be broadly grouped into
blocks/chunks which are identical in their form:
blockid = numeric
blocktype = string
2019 Jun 26
4
iptables - how to block established connections with fail2ban?
I am working to a CentOS 6 server with nonstandard iptables system
without rule for ACCEPT ESTABLISHED connections. All tables and chains
empty (flush by legacy custom script) so only filter/INPUT chain has
rules (also fail2ban chain):
Chain INPUT (policy ACCEPT)
target prot opt source destination
f2b-postfix tcp -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all --
2017 Feb 06
3
libvorbis without encapulsation
Using libvorbis (1.3.5) I wish to extract the raw vorbis packets.
I've built some simple code on the excellent libvorbis API overview on
the xiph.org site, but the example relies on the ogg_packet struct for
final output and input to decoder, and shows now examples on how to do
without it.
Taking a look at the vorbis_bitstream_flush() function, which in the
overview is the last step before
2015 Jan 19
0
CentOS-6.6 Fail2Ban and Postfix Selinux AVCs
On Mon, January 19, 2015 11:50, James B. Byrne wrote:
> I am seeing these in the log of one of our off-site NX hosts running
> CentOS-6.6.
>
> type=AVC msg=audit(1421683972.786:4372): avc: denied { create } for
> pid=22788 comm="iptables" scontext=system_u:system_r:fail2ban_t:s0
> tcontext=system_u:system_r:fail2ban_t:s0 tclass=rawip_socket
> Was caused by:
2017 Dec 17
0
Centos 7: avc: denied { reload } for auid=0 uid=0 gid=0 cmdline="/usr/bin/systemctl reload named-chroot.service" ....
How to resolve this SElinux problem?
type=USER_AVC msg=audit(1513478641.700:1920): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: denied { reload } for auid=0 uid=0 gid=0 cmdline="/usr/bin/systemctl reload named-chroot.service" scontext=system_u:system_r:logrotate_t:s0-s0:c0.c1023 tcontext=system_u:system_r:init_t:s0 tclass=service