Your message dated Tue, 19 Aug 2014 16:07:23 -0400
with message-id <[email protected]>
and subject line Re: Bug#758664: fail2ban: no starts after section name enabled
has caused the Debian Bug report #758664,
regarding fail2ban: no starts after section name enabled
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
758664: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=758664
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: fail2ban
Version: 0.8.6-3wheezy3
Severity: important

Hello,

After  install  fail2ban  by the official  debian  repository,  I enabled  ssh  
and  apache  and others in  the  first  jail.conf  fail2ban  not start  with  
ssh  or  any other  section  enabled.

# /etc/init.d/fail2ban status
[FAIL] Status of authentication failure monitor:[....] fail2ban is not running 
... failed!


#/etc/init.d/fail2ban start
[....] Starting authentication failure monitor: fail2banTraceback (most recent 
call last):
  File "/usr/bin/fail2ban-client", line 404, in <module>
    if client.start(sys.argv):
  File "/usr/bin/fail2ban-client", line 373, in start
    return self.__processCommand(args)
  File "/usr/bin/fail2ban-client", line 183, in __processCommand
    ret = self.__readConfig()
  File "/usr/bin/fail2ban-client", line 378, in __readConfig
    ret = self.__configurator.getOptions()
  File "/usr/share/fail2ban/client/configurator.py", line 68, in getOptions
    return self.__jails.getOptions(jail)
  File "/usr/share/fail2ban/client/jailsreader.py", line 67, in getOptions
    ret = jail.getOptions()
  File "/usr/share/fail2ban/client/jailreader.py", line 73, in getOptions
    self.__opts = ConfigReader.getOptions(self, self.__name, opts)
  File "/usr/share/fail2ban/client/configreader.py", line 87, in getOptions
    v = self.get(sec, option[1])
  File "/usr/lib/python2.7/ConfigParser.py", line 623, in get
    return self._interpolate(section, option, value, d)
  File "/usr/lib/python2.7/ConfigParser.py", line 691, in _interpolate
    self._interpolate_some(option, L, rawval, section, vars, 1)
  File "/usr/lib/python2.7/ConfigParser.py", line 726, in _interpolate_some
    section, map, depth + 1)
  File "/usr/lib/python2.7/ConfigParser.py", line 723, in _interpolate_some
    option, section, rest, var)
ConfigParser.InterpolationMissingOptionError: Bad value substitution:
        section: [SECTION_NAME]
        option : action
        key    : port
        rawval : ", protocol="%(protocol)s", chain="%(chain)s"]

-- System Information:
Debian Release: 7.6
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)

Kernel: 3.2.0-4-amd64 #1 SMP Debian 3.2.60-1+deb7u3 x86_64 GNU/Linux
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash


Versions of packages fail2ban depends on:
ii  lsb-base            4.1+Debian8+deb7u1
ii  python              2.7.3-4+deb7u1
ii  python-central      0.6.17

Versions of packages fail2ban recommends:
ii  iptables            1.4.14-3.1
ii  whois               5.1.1~deb7u1


Versions of packages fail2ban suggests:
ii  python-gamin        0.1.10-4.1

-- no debconf information

--- End Message ---
--- Begin Message ---
as far as I see it you have done incorrect modifications to the
jail.conf file (which you should have not touched at all, and just
enabled jails in jail.local), see e.g.
https://github.com/fail2ban/fail2ban/blob/0.8/man/jail.conf.5#L36

thus closing since it seems to be not a bug... reopen if you have
information to prove otherwise

On Tue, 19 Aug 2014, Anthony Smith wrote:

> Package: fail2ban
> Version: 0.8.6-3wheezy3
> Severity: important

> Hello,

> After  install  fail2ban  by the official  debian  repository,  I enabled  
> ssh  and  apache  and others in  the  first  jail.conf  fail2ban  not start  
> with  ssh  or  any other  section  enabled.

> # /etc/init.d/fail2ban status
> [FAIL] Status of authentication failure monitor:[....] fail2ban is not 
> running ... failed!


> #/etc/init.d/fail2ban start
> [....] Starting authentication failure monitor: fail2banTraceback (most 
> recent call last):
>   File "/usr/bin/fail2ban-client", line 404, in <module>
>     if client.start(sys.argv):
>   File "/usr/bin/fail2ban-client", line 373, in start
>     return self.__processCommand(args)
>   File "/usr/bin/fail2ban-client", line 183, in __processCommand
>     ret = self.__readConfig()
>   File "/usr/bin/fail2ban-client", line 378, in __readConfig
>     ret = self.__configurator.getOptions()
>   File "/usr/share/fail2ban/client/configurator.py", line 68, in getOptions
>     return self.__jails.getOptions(jail)
>   File "/usr/share/fail2ban/client/jailsreader.py", line 67, in getOptions
>     ret = jail.getOptions()
>   File "/usr/share/fail2ban/client/jailreader.py", line 73, in getOptions
>     self.__opts = ConfigReader.getOptions(self, self.__name, opts)
>   File "/usr/share/fail2ban/client/configreader.py", line 87, in getOptions
>     v = self.get(sec, option[1])
>   File "/usr/lib/python2.7/ConfigParser.py", line 623, in get
>     return self._interpolate(section, option, value, d)
>   File "/usr/lib/python2.7/ConfigParser.py", line 691, in _interpolate
>     self._interpolate_some(option, L, rawval, section, vars, 1)
>   File "/usr/lib/python2.7/ConfigParser.py", line 726, in _interpolate_some
>     section, map, depth + 1)
>   File "/usr/lib/python2.7/ConfigParser.py", line 723, in _interpolate_some
>     option, section, rest, var)
> ConfigParser.InterpolationMissingOptionError: Bad value substitution:
>         section: [SECTION_NAME]
>         option : action
>         key    : port
>         rawval : ", protocol="%(protocol)s", chain="%(chain)s"]

> -- System Information:
> Debian Release: 7.6
>   APT prefers stable
>   APT policy: (500, 'stable')
> Architecture: i386 (i686)

> Kernel: 3.2.0-4-amd64 #1 SMP Debian 3.2.60-1+deb7u3 x86_64 GNU/Linux
> Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
> Shell: /bin/sh linked to /bin/bash


> Versions of packages fail2ban depends on:
> ii  lsb-base          4.1+Debian8+deb7u1
> ii  python            2.7.3-4+deb7u1
> ii  python-central    0.6.17

> Versions of packages fail2ban recommends:
> ii  iptables          1.4.14-3.1
> ii  whois             5.1.1~deb7u1


> Versions of packages fail2ban suggests:
> ii  python-gamin      0.1.10-4.1

> -- no debconf information


-- 
Yaroslav O. Halchenko, Ph.D.
http://neuro.debian.net http://www.pymvpa.org http://www.fail2ban.org
Research Scientist,            Psychological and Brain Sciences Dept.
Dartmouth College, 419 Moore Hall, Hinman Box 6207, Hanover, NH 03755
Phone: +1 (603) 646-9834                       Fax: +1 (603) 646-1419
WWW:   http://www.linkedin.com/in/yarik        

--- End Message ---

Reply via email to