• Willkommen im Linux Club - dem deutschsprachigen Supportforum für GNU/Linux. Registriere dich kostenlos, um alle Inhalte zu sehen und Fragen zu stellen.

Braucht fail2ban boot.shm (fail2ban funktioniert nicht)

siouxie

Member
Wenn ich im Runlevel-Editor unter OS 11.1 fail2ban-0.8.4-0.pm.1.1 aktiviere, dann kommt die Meldung, dass boot.shm fehlt. Ist das ein Grund, dass fail2ban nicht funktioniert?

Code:
/etc/ssh/sshd_config
Protocol 2
LogLevel INFO
LoginGraceTime 15
MaxAuthTries 1
PubkeyAuthentication yes
PasswordAuthentication no
ChallengeResponseAuthentication no
KerberosAuthentication no
UsePAM no
X11Forwarding no
ClientAliveCountMax 2
MaxStartups 5:80:6
Subsystem       sftp    /usr/lib/ssh/sftp-server
AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES
AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
AcceptEnv LC_IDENTIFICATION LC_ALL

Code:
/etc/fail2ban/fail2ban.conf
[Definition]
loglevel = 3
logtarget = /var/log/fail2ban.log
socket = /var/run/fail2ban/fail2ban.sock

Code:
/etc/fail2ban/jail.conf                                      
[DEFAULT]                                                                         
ignoreip = 127.0.0.1                                                              
bantime  = 86400                                                                  
findtime  = 30                                                                    
maxretry = 1                                                                      
backend = auto                                                                    
[ssh-iptables]                                                                    
enabled  = true                                                                   
filter   = sshd                                                                   
action   = iptables[name=SSH, port=ssh, protocol=tcp]                             
           sendmail-whois[name=SSH, dest=root@localhost, sender=fail2ban@localhost]                                                                                 
logpath  = /var/log/sshd.log                                                      
maxretry = 3                                                                      
[proftpd-iptables]                                                                
enabled  = false                                                                  
filter   = proftpd                                                                
action   = iptables[name=ProFTPD, port=ftp, protocol=tcp]                         
           sendmail-whois[name=ProFTPD, dest=you@mail.com]                        
logpath  = /var/log/proftpd/proftpd.log                                           
maxretry = 6                                                                      
[sasl-iptables]                                                                   
enabled  = false                                                                  
filter   = sasl                                                                   
backend  = polling                                                                
action   = iptables[name=sasl, port=smtp, protocol=tcp]                           
           sendmail-whois[name=sasl, dest=you@mail.com]                           
logpath  = /var/log/mail.log                                                      
[ssh-tcpwrapper]                                                                  
enabled     = false                                                               
filter      = sshd                                                                
action      = hostsdeny                                                           
              sendmail-whois[name=SSH, dest=you@mail.com]                         
ignoreregex = for myuser from                                                     
logpath     = /var/log/sshd.log                                                   
[apache-tcpwrapper]                                                               
enabled  = false                                                                  
filter   = apache-auth                                                            
action   = hostsdeny                                                              
logpath  = /var/log/apache*/*error.log                                            
           /home/www/myhomepage/error.log                                         
maxretry = 6                                                                      
[postfix-tcpwrapper]                                                              
enabled  = false                                                                  
filter   = postfix                                                                
action   = hostsdeny[file=/not/a/standard/path/hosts.deny]                        
           sendmail[name=Postfix, dest=you@mail.com]                              
logpath  = /var/log/postfix.log                                                   
bantime  = 300                                                                    
[vsftpd-notification]                                                             
enabled  = false                                                                  
filter   = vsftpd                                                                 
action   = sendmail-whois[name=VSFTPD, dest=you@mail.com]                         
logpath  = /var/log/vsftpd.log                                                    
maxretry = 5                                                                      
bantime  = 1800                                                                   
[vsftpd-iptables]                                                                 
enabled  = false                                                                  
filter   = vsftpd                                                                 
action   = iptables[name=VSFTPD, port=ftp, protocol=tcp]                          
           sendmail-whois[name=VSFTPD, dest=you@mail.com]                         
logpath  = /var/log/vsftpd.log                                                    
maxretry = 5                                                                      
bantime  = 1800                                                                   
[apache-badbots]                                                                  
enabled  = false                                                                  
filter   = apache-badbots                                                         
action   = iptables-multiport[name=BadBots, port="http,https"]                    
           sendmail-buffered[name=BadBots, lines=5, dest=you@mail.com]            
logpath  = /var/www/*/logs/access_log                                             
bantime  = 172800                                                                 
maxretry = 1                                                                      
[apache-shorewall]                                                                
enabled  = false                                                                  
filter   = apache-noscript                                                        
action   = shorewall                                                              
           sendmail[name=Postfix, dest=you@mail.com]                              
logpath  = /var/log/apache2/error_log                                             
[php-url-fopen]                                                                   
enabled = false                                                                   
port    = http,https                                                              
filter  = php-url-fopen                                                           
logpath = /var/www/*/logs/access_log                                              
maxretry = 1                                                                      
[lighttpd-fastcgi]                                                                
enabled = false                                                                   
port    = http,https                                                              
filter  = lighttpd-fastcgi
logpath = /var/log/lighttpd/error.log
maxretry = 2
[ssh-ipfw]
enabled  = false
filter   = sshd
action   = ipfw[localhost=192.168.0.1]
           sendmail-whois[name="SSH,IPFW", dest=you@mail.com]
logpath  = /var/log/auth.log
ignoreip = 168.192.0.1
[named-refused-udp]
enabled  = false
filter   = named-refused
action   = iptables-multiport[name=Named, port="domain,953", protocol=udp]
           sendmail-whois[name=Named, dest=you@mail.com]
logpath  = /var/log/named/security.log
ignoreip = 168.192.0.1
[named-refused-tcp]
enabled  = false
filter   = named-refused
action   = iptables-multiport[name=Named, port="domain,953", protocol=tcp]
           sendmail-whois[name=Named, dest=you@mail.com]
logpath  = /var/log/named/security.log
ignoreip = 168.192.0.1

Code:
/etc/init.d/fail2ban status
Checking for service Fail2ban                                          running

Sollte da nicht ein Angreifer maximal nach 30 Sekunden gesperrt sein?

cat messages | grep "66.236.248.143" | wc -l
92
Das ging von 9 08:03:43 bis 9 08:05:25, ca. 1x pro Sekunde.
 
Oben