On 21/09/2020 17:36, Mike wrote:

At 11:12 AM 9/21/2020, Kenneth Porter wrote:
--On Sunday, September 20, 2020 10:23 PM -0500 Mike <[email protected]> wrote:

I updated one of my CentOS 7 servers to Fail2ban  0.11.1-9.el7.2

fail2ban-0.11.1-10.el7.noarch is working fine for me on CentOS 7.8.2003. I can list ipsets and the direct rules with your commands.

Check the XML for your rules and sets and try dumping the entire firewall to the console with "iptables -L -v -n".

I am able to reboot the server and f2b starts and doesn't seem to throw any errors, but when I run ipset list or iptables -L INPUT_direct I still get nothing.   Here's the fail2ban log:

2020-09-21 11:19:49,650 fail2ban.server         [978]: INFO    Starting Fail2ban v0.11.1 2020-09-21 11:19:49,652 fail2ban.observer       [978]: INFO    Observer start... 2020-09-21 11:19:49,684 fail2ban.database       [978]: INFO    Connected to fail2ban persistent database '/var/lib/fail2ban/fail2ban.sqlite3' 2020-09-21 11:19:49,696 fail2ban.jail           [978]: INFO    Creating new jail 'sshd' 2020-09-21 11:19:49,773 fail2ban.jail           [978]: INFO    Jail 'sshd' uses systemd {} 2020-09-21 11:19:49,774 fail2ban.jail           [978]: INFO    Initiated 'systemd' backend 2020-09-21 11:19:49,775 fail2ban.filter         [978]: INFO maxLines: 1 2020-09-21 11:19:49,776 fail2ban.filtersystemd  [978]: INFO    [sshd] Added journal match for: '_SYSTEMD_UNIT=sshd.service + _COMM=sshd' 2020-09-21 11:19:49,815 fail2ban.filter         [978]: INFO maxRetry: 3 2020-09-21 11:19:49,815 fail2ban.filter         [978]: INFO encoding: UTF-8 2020-09-21 11:19:49,816 fail2ban.filter         [978]: INFO findtime: 1200 2020-09-21 11:19:49,816 fail2ban.actions        [978]: INFO banTime: 1209600 2020-09-21 11:19:49,816 fail2ban.jail           [978]: INFO    Creating new jail 'vsftpd' 2020-09-21 11:19:49,826 fail2ban.jail           [978]: INFO    Jail 'vsftpd' uses poller {} 2020-09-21 11:19:49,827 fail2ban.jail           [978]: INFO    Initiated 'polling' backend 2020-09-21 11:19:49,832 fail2ban.filter         [978]: INFO maxRetry: 5 2020-09-21 11:19:49,832 fail2ban.filter         [978]: INFO encoding: UTF-8 2020-09-21 11:19:49,832 fail2ban.filter         [978]: INFO findtime: 1200 2020-09-21 11:19:49,833 fail2ban.actions        [978]: INFO banTime: 14400 2020-09-21 11:19:49,836 fail2ban.filter         [978]: INFO    Added logfile: '/var/log/vsftpd.log' (pos = 567, hash = fa62ff81162cd6dc23591183424fc4c2) 2020-09-21 11:19:49,836 fail2ban.jail           [978]: INFO    Creating new jail 'postfix' 2020-09-21 11:19:49,837 fail2ban.jail           [978]: INFO    Jail 'postfix' uses systemd {} 2020-09-21 11:19:49,837 fail2ban.jail           [978]: INFO    Initiated 'systemd' backend 2020-09-21 11:19:49,838 fail2ban.filtersystemd  [978]: INFO    [postfix] Added journal match for: '_SYSTEMD_UNIT=postfix.service' 2020-09-21 11:19:49,846 fail2ban.filter         [978]: INFO maxRetry: 5 2020-09-21 11:19:49,846 fail2ban.filter         [978]: INFO encoding: UTF-8 2020-09-21 11:19:49,846 fail2ban.filter         [978]: INFO findtime: 600 2020-09-21 11:19:49,847 fail2ban.actions        [978]: INFO banTime: 1200 2020-09-21 11:19:49,847 fail2ban.jail           [978]: INFO    Creating new jail 'dovecot' 2020-09-21 11:19:49,847 fail2ban.jail           [978]: INFO    Jail 'dovecot' uses systemd {} 2020-09-21 11:19:49,847 fail2ban.jail           [978]: INFO    Initiated 'systemd' backend 2020-09-21 11:19:49,854 fail2ban.datedetector   [978]: INFO      date pattern `''`: `{^LN-BEG}TAI64N` 2020-09-21 11:19:49,854 fail2ban.filtersystemd  [978]: INFO    [dovecot] Added journal match for: '_SYSTEMD_UNIT=dovecot.service' 2020-09-21 11:19:49,854 fail2ban.filter         [978]: INFO maxRetry: 2 2020-09-21 11:19:49,855 fail2ban.filter         [978]: INFO encoding: UTF-8 2020-09-21 11:19:49,855 fail2ban.filter         [978]: INFO findtime: 43200 2020-09-21 11:19:49,855 fail2ban.actions        [978]: INFO banTime: 1036800 2020-09-21 11:19:49,855 fail2ban.jail           [978]: INFO    Creating new jail 'pam-generic' 2020-09-21 11:19:49,855 fail2ban.jail           [978]: INFO    Jail 'pam-generic' uses systemd {} 2020-09-21 11:19:49,856 fail2ban.jail           [978]: INFO    Initiated 'systemd' backend 2020-09-21 11:19:49,856 fail2ban.jail           [978]: INFO    Initiated 'systemd' backend 2020-09-21 11:19:49,861 fail2ban.filter         [978]: INFO maxRetry: 4 2020-09-21 11:19:49,861 fail2ban.filter         [978]: INFO encoding: UTF-8 2020-09-21 11:19:49,861 fail2ban.filter         [978]: INFO findtime: 43200 2020-09-21 11:19:49,862 fail2ban.actions        [978]: INFO banTime: 1036800 2020-09-21 11:19:49,930 fail2ban.jail           [978]: INFO    Creating new jail 'manban' 2020-09-21 11:19:49,930 fail2ban.jail           [978]: INFO    Jail 'manban' uses poller {} 2020-09-21 11:19:49,931 fail2ban.jail           [978]: INFO    Initiated 'polling' backend 2020-09-21 11:19:49,932 fail2ban.filter         [978]: INFO maxRetry: 1 2020-09-21 11:19:49,932 fail2ban.filter         [978]: INFO encoding: UTF-8 2020-09-21 11:19:49,933 fail2ban.filter         [978]: INFO findtime: 3600 2020-09-21 11:19:49,933 fail2ban.actions        [978]: INFO banTime: 2147000 2020-09-21 11:19:49,936 fail2ban.filter         [978]: INFO    Added logfile: '/var/log/manban.log' (pos = 167, hash = e0e7cee99a910096ae1616a07e6ba4f3) 2020-09-21 11:19:49,949 fail2ban.jail           [978]: INFO    Jail 'sshd' started 2020-09-21 11:19:49,965 fail2ban.jail           [978]: INFO    Jail 'vsftpd' started 2020-09-21 11:19:49,972 fail2ban.jail           [978]: INFO    Jail 'postfix' started 2020-09-21 11:19:49,974 fail2ban.jail           [978]: INFO    Jail 'dovecot' started 2020-09-21 11:19:49,974 fail2ban.filtersystemd  [978]: NOTICE  Jail started without 'journalmatch' set. Jail regexs will be checked against all journal entries, which is not advised for performance reasons. 2020-09-21 11:19:50,012 fail2ban.jail           [978]: INFO    Jail 'pam-generic' started 2020-09-21 11:19:50,067 fail2ban.jail           [978]: INFO    Jail 'manban' started 2020-09-21 11:19:50,393 fail2ban.actions        [978]: NOTICE  [manban] Restore Ban 184.95.34.146 2020-09-21 11:19:56,064 fail2ban.actions        [978]: NOTICE  [manban] Restore Ban 83.97.20.35

when I dump all the firewall rules it does show those two "manban" IPs, but I don't see an ipset list or any fail2ban rules in the firewall like I do on my other servers:

# iptables -L -v -n

Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source destination  3247  399K ACCEPT     all  --  *      *       0.0.0.0/0 0.0.0.0/0        ctstate RELATED,ESTABLISHED   114  7691 ACCEPT     all  --  lo     *       0.0.0.0/0 0.0.0.0/0   137 24521 INPUT_direct  all  --  *      *       0.0.0.0/0 0.0.0.0/0   137 24521 INPUT_ZONES_SOURCE  all  --  *      * 0.0.0.0/0            0.0.0.0/0   137 24521 INPUT_ZONES  all  --  *      *       0.0.0.0/0 0.0.0.0/0     0     0 DROP       all  --  *      *       0.0.0.0/0 0.0.0.0/0        ctstate INVALID   118 23393 REJECT     all  --  *      *       0.0.0.0/0 0.0.0.0/0        reject-with icmp-host-prohibited

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source destination     0     0 ACCEPT     all  --  *      *       0.0.0.0/0 0.0.0.0/0        ctstate RELATED,ESTABLISHED     0     0 ACCEPT     all  --  lo     *       0.0.0.0/0 0.0.0.0/0     0     0 FORWARD_direct  all  --  *      * 0.0.0.0/0            0.0.0.0/0     0     0 FORWARD_IN_ZONES_SOURCE  all  --  *      * 0.0.0.0/0            0.0.0.0/0     0     0 FORWARD_IN_ZONES  all  --  *      * 0.0.0.0/0            0.0.0.0/0     0     0 FORWARD_OUT_ZONES_SOURCE  all  --  *      *       0.0.0.0/0  0.0.0.0/0     0     0 FORWARD_OUT_ZONES  all  --  *      * 0.0.0.0/0            0.0.0.0/0     0     0 DROP       all  --  *      *       0.0.0.0/0 0.0.0.0/0        ctstate INVALID     0     0 REJECT     all  --  *      *       0.0.0.0/0 0.0.0.0/0        reject-with icmp-host-prohibited

Chain OUTPUT (policy ACCEPT 2714 packets, 4318K bytes)
 pkts bytes target     prot opt in     out     source destination   236 33637 ACCEPT     all  --  *      lo      0.0.0.0/0 0.0.0.0/0  3876 4438K OUTPUT_direct  all  --  *      *       0.0.0.0/0 0.0.0.0/0

Chain FORWARD_IN_ZONES (1 references)
 pkts bytes target     prot opt in     out     source destination     0     0 FWDI_public  all  --  eth0   *       0.0.0.0/0 0.0.0.0/0         [goto]     0     0 FWDI_public  all  --  +      *       0.0.0.0/0 0.0.0.0/0         [goto]

Chain FORWARD_IN_ZONES_SOURCE (1 references)
 pkts bytes target     prot opt in     out     source destination

Chain FORWARD_OUT_ZONES (1 references)
 pkts bytes target     prot opt in     out     source destination     0     0 FWDO_public  all  --  *      eth0    0.0.0.0/0 0.0.0.0/0         [goto]     0     0 FWDO_public  all  --  *      +       0.0.0.0/0 0.0.0.0/0         [goto]

Chain FORWARD_OUT_ZONES_SOURCE (1 references)
 pkts bytes target     prot opt in     out     source destination

Chain FORWARD_direct (1 references)
 pkts bytes target     prot opt in     out     source destination

Chain FWDI_public (2 references)
 pkts bytes target     prot opt in     out     source destination     0     0 FWDI_public_log  all  --  *      * 0.0.0.0/0            0.0.0.0/0     0     0 FWDI_public_deny  all  --  *      * 0.0.0.0/0            0.0.0.0/0     0     0 FWDI_public_allow  all  --  *      * 0.0.0.0/0            0.0.0.0/0     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0 0.0.0.0/0

Chain FWDI_public_allow (1 references)
 pkts bytes target     prot opt in     out     source destination

Chain FWDI_public_deny (1 references)
 pkts bytes target     prot opt in     out     source destination

Chain FWDI_public_log (1 references)
 pkts bytes target     prot opt in     out     source destination

Chain FWDO_public (2 references)
 pkts bytes target     prot opt in     out     source destination     0     0 FWDO_public_log  all  --  *      * 0.0.0.0/0            0.0.0.0/0     0     0 FWDO_public_deny  all  --  *      * 0.0.0.0/0            0.0.0.0/0     0     0 FWDO_public_allow  all  --  *      * 0.0.0.0/0            0.0.0.0/0

Chain FWDO_public_allow (1 references)
 pkts bytes target     prot opt in     out     source destination

Chain FWDO_public_deny (1 references)
 pkts bytes target     prot opt in     out     source destination

Chain FWDO_public_log (1 references)
 pkts bytes target     prot opt in     out     source destination

Chain INPUT_ZONES (1 references)
 pkts bytes target     prot opt in     out     source destination   137 24521 IN_public  all  --  eth0   *       0.0.0.0/0 0.0.0.0/0       [goto]     0     0 IN_public  all  --  +      *       0.0.0.0/0 0.0.0.0/0       [goto]

Chain INPUT_ZONES_SOURCE (1 references)
 pkts bytes target     prot opt in     out     source destination

Chain INPUT_direct (1 references)
 pkts bytes target     prot opt in     out     source destination

Chain IN_public (2 references)
 pkts bytes target     prot opt in     out     source destination   137 24521 IN_public_log  all  --  *      *       0.0.0.0/0 0.0.0.0/0   137 24521 IN_public_deny  all  --  *      * 0.0.0.0/0            0.0.0.0/0   137 24521 IN_public_allow  all  --  *      * 0.0.0.0/0            0.0.0.0/0     1    84 ACCEPT     icmp --  *      *       0.0.0.0/0 0.0.0.0/0

Chain IN_public_allow (1 references)
 pkts bytes target     prot opt in     out     source destination     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0        tcp dpt:21 ctstate NEW,UNTRACKED    13   760 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0        tcp dpt:80 ctstate NEW,UNTRACKED     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0        tcp dpt:995 ctstate NEW,UNTRACKED    3   180 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0        tcp dpt:25 ctstate NEW,UNTRACKED     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0        tcp dpt:993 ctstate NEW,UNTRACKED     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0        tcp dpt:22 ctstate NEW,UNTRACKED     1    52 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0        tcp dpt:443 ctstate NEW,UNTRACKED     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0        tcp dpt:110 ctstate NEW,UNTRACKED     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0        tcp dpt:465 ctstate NEW,UNTRACKED     1    52 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0        tcp dpt:922 ctstate NEW,UNTRACKED     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0        tcp dpt:587 ctstate NEW,UNTRACKED     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0        tcp dpt:143 ctstate NEW,UNTRACKED     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0        tcp dpt:21 ctstate NEW,UNTRACKED     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0        tcp dpt:53 ctstate NEW,UNTRACKED     0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0        udp dpt:53 ctstate NEW,UNTRACKED

Chain IN_public_deny (1 references)
 pkts bytes target     prot opt in     out     source destination     0     0 REJECT     tcp  --  *      *       184.95.34.146 0.0.0.0/0        tcp dpt:25 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       184.95.34.146 0.0.0.0/0        tcp dpt:465 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       184.95.34.146 0.0.0.0/0        tcp dpt:587 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       184.95.34.146 0.0.0.0/0        tcp dpt:143 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       184.95.34.146 0.0.0.0/0        tcp dpt:220 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       184.95.34.146 0.0.0.0/0        tcp dpt:993 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       184.95.34.146 0.0.0.0/0        tcp dpt:110 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       184.95.34.146 0.0.0.0/0        tcp dpt:995 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       184.95.34.146 0.0.0.0/0        tcp dpt:80 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       184.95.34.146 0.0.0.0/0        tcp dpt:443 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       184.95.34.146 0.0.0.0/0        tcp dpt:1080 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       184.95.34.146 0.0.0.0/0        tcp dpt:21 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       184.95.34.146 0.0.0.0/0        tcp dpt:22 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       83.97.20.35 0.0.0.0/0        tcp dpt:25 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       83.97.20.35 0.0.0.0/0        tcp dpt:465 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       83.97.20.35 0.0.0.0/0        tcp dpt:587 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       83.97.20.35 0.0.0.0/0        tcp dpt:143 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       83.97.20.35 0.0.0.0/0        tcp dpt:220 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       83.97.20.35 0.0.0.0/0        tcp dpt:993 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       83.97.20.35 0.0.0.0/0        tcp dpt:110 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       83.97.20.35 0.0.0.0/0        tcp dpt:995 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       83.97.20.35 0.0.0.0/0        tcp dpt:80 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       83.97.20.35 0.0.0.0/0        tcp dpt:443 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       83.97.20.35 0.0.0.0/0        tcp dpt:1080 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       83.97.20.35 0.0.0.0/0        tcp dpt:21 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable     0     0 REJECT     tcp  --  *      *       83.97.20.35 0.0.0.0/0        tcp dpt:22 ctstate NEW,UNTRACKED reject-with icmp-port-unreachable


Chain IN_public_log (1 references)
 pkts bytes target     prot opt in     out     source destination

Chain OUTPUT_direct (1 references)
 pkts bytes target     prot opt in     out     source destination


On my other server that hasn't been patched, here's what I get:

# iptables -L INPUT_direct
Chain INPUT_direct (1 references)
target     prot opt source               destination
REJECT     tcp  --  anywhere             anywhere multiport dports smtp,urd,submission match-set f2b-postfix src reject-with icmp-port-unreachable REJECT     tcp  --  anywhere             anywhere multiport dports ssh,ftp,ftp-data,ftps,ftps-data,http,https,922,smtp,saft match-set f2b-sshd src reject-with icmp-port-unreachable REJECT     tcp  --  anywhere             anywhere multiport dports pop3,pop3s,smtp,imap,imaps,submission,urd,sieve,http,https match-set f2b-dovecot src reject-with icmp-port-unreachable REJECT     tcp  --  anywhere             anywhere multiport dports smtp,submission,imap,imap3,imaps,pop3,pop3s,http,https,ftp,922 match-set f2b-manban src reject-with icmp-port-unreachable REJECT     tcp  --  anywhere             anywhere multiport dports ftp,ftp-data,ftps,ftps-data match-set f2b-vsftpd src reject-with icmp-port-unreachable REJECT     tcp  --  anywhere             anywhere match-set f2b-pam-generic src reject-with icmp-port-unreachable

Boths servers are basically identically configured but one was recently patched with yum update and updated f2b.


Any ideas.   fail2ban appears to be running but there are no ipset lists on the new server.

On the patched server:

# ipset list
# ipset list f2b-manban
ipset v7.1: The set with the given name does not exist

I don't get it.

I don't think you get any firewall rules or ipset sets until you have a ban. Try using fail2ban-client to manually ban an IP and see if the corresponding firewall items then appear.

Nick



_______________________________________________
Fail2ban-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/fail2ban-users

Reply via email to