Re: [Fail2ban-users] FW: newbie setup question

2015-02-12 Thread Lee Clemens
On 02/12/2015 12:06 PM, Michael Fox wrote: > ??? > > I tried the filter below but I get an error about recursion. > > Is there a way to append to what's already defined in *.conf? I haven't tested it, but another syntax is , which might work? failregex = additional-regex

Re: [Fail2ban-users] Error in FilterPyinotify callback: _strptime_time

2015-02-12 Thread Lee Clemens
On 02/12/2015 03:51 PM, Anthony Griffiths wrote: > I'm running centos 6 server (command line only) with > fail2ban-0.8.14-1.el6.noarch. > This error keeps coming up in my fail2ban log after all the jails have > started: > "fail2ban.filter []: ERROR Error in FilterPyinotify callback: > _strp

Re: [Fail2ban-users] after some blocks - block whole IP-Block spaces

2015-02-12 Thread Lee Clemens
On 02/12/2015 12:02 PM, Jens Viisauksena wrote: > Hello > > I actually have a attack on my server where i have a iptable list of > some hundred ips from korea and china to a tor -exit Node. > > i wonder if there is some nice way around of blocking whole address > spaces like /24 or more restrictly

[Fail2ban-users] Error in FilterPyinotify callback: _strptime_time

2015-02-12 Thread Anthony Griffiths
I'm running centos 6 server (command line only) with fail2ban-0.8.14-1.el6.noarch. This error keeps coming up in my fail2ban log after all the jails have started: "fail2ban.filter []: ERROR Error in FilterPyinotify callback: _strptime_time" I haven't got a clue how to fix this and I see this

[Fail2ban-users] FW: newbie setup question

2015-02-12 Thread Michael Fox
??? I tried the filter below but I get an error about recursion. Is there a way to append to what's already defined in *.conf? Michael -Original Message- From: Michael Fox [mailto:n...@mefox.org] Sent: Wednesday, February 11, 2015 9:50 AM To: 'Fail2Ban-Users Distribution List' Subject

[Fail2ban-users] after some blocks - block whole IP-Block spaces

2015-02-12 Thread Jens Viisauksena
Hello I actually have a attack on my server where i have a iptable list of some hundred ips from korea and china to a tor -exit Node. i wonder if there is some nice way around of blocking whole address spaces like /24 or more restrictly /16 if there is a certain amount of succesfully blocked IPs.