Hi Harri, At first you've confused me with the direction of the patch -- from a new file to old one, so I started to think that you suggest to remove -m state --state NEW :-)
This ideas seems viable indeed. But I am afraid that there might
be side effects and for that we need either just to give it a try or to
ask protocol experts and upstream author on what he thinks about it :-)
1. In a single connection session SSH via PAM allows to try multiple
passwords (by default it seems to be 3 or so). So if somebody
opportunistically decided to set maxfailures < 3, your version will have
no effect before the point when session is reestablished thus violating
user-requested behavior.
It might become even worse: Looking from ssh attack patterns: they
all follow each other very rapidly: I am not sure if they all separate
sessions or also mixed in the batches of 3 attempts... if in batches in
3, than doing simple math you can get 3*maxfailures attempts through the
fail2ban, which would be very undesired behavior.
2. I am even less sure how apache authentication is done - via separate
http connections or within one? If separate - good. If one -- then this
patch shouldn't be applied.
Please comment on and lets see what Cyril thinks about it and if
we decide to not include it in the released version, I think it is worth
mentioning in the README or smth.
Thank you Harri,
Cheers
Yarik
On Tue, Jan 31, 2006 at 04:22:11PM +0200, Harri Haataja wrote:
> Package: fail2ban
> Version: 0.6.0-3
> Severity: minor
> If two users access a host with fail2ban from the same originating ip,
> login failures from one of them will also lock the other one out.
> I've been using a small change in the rules that, I believe, will block
> only new connects instead of already established one. This way, at
> least, another users' already running ssh sessions will not be suddenly
> frozen by someone/something other tripping fail2ban. New connects will
> still be blocked from/to any source/user as the approach is based on ip
> address blocking.
> I changed the INPU rules in the config to say:
> @@ -134,13 +134,13 @@
> fwstart = iptables -N fail2ban-%(__name__)s
> iptables -A fail2ban-%(__name__)s -j RETURN
> - iptables -I INPUT -m state --state NEW -p %(protocol)s --dport
> %(port)s -j fail2ban-%(__name__)s
> + iptables -I INPUT -p %(protocol)s --dport %(port)s -j
> fail2ban-%(__name__)s
> # Option: fwend
> # Notes.: command executed once at the end of Fail2Ban
> # Values: CMD Default:
> -fwend = iptables -D INPUT -m state --state NEW -p %(protocol)s --dport
> %(port)s -j fail2ban-%(__name__)s
> +fwend = iptables -D INPUT -p %(protocol)s --dport %(port)s -j
> fail2ban-%(__name__)s
> iptables -F fail2ban-%(__name__)s
> iptables -X fail2ban-%(__name__)s
> -- System Information:
> Debian Release: testing/unstable
> APT prefers testing
> APT policy: (990, 'testing'), (900, 'stable'), (400, 'unstable'), (1,
> 'experimental')
> Architecture: i386 (i686)
> Shell: /bin/sh linked to /bin/bash
> Kernel: Linux 2.6.10-1-686
> Locale: LANG=en_GB, [EMAIL PROTECTED] (charmap=ISO-8859-15)
> Versions of packages fail2ban depends on:
> ii iptables 1.3.3-2 Linux kernel 2.4+ iptables
> adminis
> ii python 2.3.5-5 An interactive high-level
> object-o
> fail2ban recommends no packages.
> -- no debconf information
--
.-.
=------------------------------ /v\ ----------------------------=
Keep in touch // \\ (yoh@|www.)onerussian.com
Yaroslav Halchenko /( )\ ICQ#: 60653192
Linux User ^^-^^ [175555]
pgpuSF10ytzZc.pgp
Description: PGP signature

