On 02/12/2015 12:06 PM, Michael Fox wrote:
> ???
>
> I tried the filter below but I get an error about recursion.
>
> Is there a way to append to what's already defined in *.conf?
I haven't tested it, but another syntax is , which might work?
failregex =
additional-regex
On 02/12/2015 03:51 PM, Anthony Griffiths wrote:
> I'm running centos 6 server (command line only) with
> fail2ban-0.8.14-1.el6.noarch.
> This error keeps coming up in my fail2ban log after all the jails have
> started:
> "fail2ban.filter []: ERROR Error in FilterPyinotify callback:
> _strp
On 02/12/2015 12:02 PM, Jens Viisauksena wrote:
> Hello
>
> I actually have a attack on my server where i have a iptable list of
> some hundred ips from korea and china to a tor -exit Node.
>
> i wonder if there is some nice way around of blocking whole address
> spaces like /24 or more restrictly
I'm running centos 6 server (command line only) with
fail2ban-0.8.14-1.el6.noarch.
This error keeps coming up in my fail2ban log after all the jails have started:
"fail2ban.filter []: ERROR Error in FilterPyinotify callback:
_strptime_time"
I haven't got a clue how to fix this and I see this
???
I tried the filter below but I get an error about recursion.
Is there a way to append to what's already defined in *.conf?
Michael
-Original Message-
From: Michael Fox [mailto:n...@mefox.org]
Sent: Wednesday, February 11, 2015 9:50 AM
To: 'Fail2Ban-Users Distribution List'
Subject
Hello
I actually have a attack on my server where i have a iptable list of
some hundred ips from korea and china to a tor -exit Node.
i wonder if there is some nice way around of blocking whole address
spaces like /24 or more restrictly /16 if there is a certain amount of
succesfully blocked IPs.