Public bug reported:

auth.log shows entries like this:


2026-03-23T15:45:55.515566+00:00 hostname sshd[2265]: Connection closed by 
authenticating user sysadmin 94.16.111.51 port 32964 [preauth]

but does not catch those.

login probes for non-existing usernames are found by fail2ban like:

2026-03-23T15:51:28.603417+00:00 hostname sshd[2443]: Invalid user php
from 94.16.111.51 port 46396

therefore detection-evasion is possible in the current package release
by using existing usernames...

ProblemType: Bug
DistroRelease: Ubuntu 24.04
Package: fail2ban 1.0.2-3ubuntu0.1
ProcVersionSignature: Ubuntu 6.8.0-106.106-generic 6.8.12
Uname: Linux 6.8.0-106-generic x86_64
ApportVersion: 2.28.1-0ubuntu3.8
Architecture: amd64
CasperMD5CheckResult: unknown
CloudArchitecture: x86_64
CloudBuildName: server
CloudID: nocloud
CloudName: unknown
CloudPlatform: nocloud
CloudSerial: 20240601
CloudSubPlatform: config-disk (/dev/sr0)
Date: Mon Mar 23 15:58:41 2026
PackageArchitecture: all
ProcEnviron:
 LANG=C.UTF-8
 PATH=(custom, no user)
 SHELL=/bin/bash
 TERM=xterm
 XDG_RUNTIME_DIR=<set>
SourcePackage: fail2ban
UpgradeStatus: Upgraded to noble on 2026-03-23 (0 days ago)

** Affects: fail2ban (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: amd64 apport-bug cloud-image noble

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2145542

Title:
  fail2ban does not catch login probes for existing user accounts

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/fail2ban/+bug/2145542/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to