Sponsor-Board.de

Normale Version: Iptables und Fail2ban
Du siehst gerade eine vereinfachte Darstellung unserer Inhalte. Normale Ansicht mit richtiger Formatierung.
Moin ihr lieben,

ich hab folgendes Problemchen :

Derzeit habe ich einige ips via IPtables gesperrt, versuche ich nun weitere hinzuzufügen mault er rum vonwegen "iptables: Memory allocation problem."

"iptables-export", dann "iptables --flush" hilft, aber wenn ich die alten Regeln dann wieder importiere und versuche die neuen hinzuzufügen mag er wieder nicht.

Weiteres Problem macht mein fail2ban:
Ich will, dass er den Mailserver mitprüft, gerade weil ich dort vermehrt Bruteforce attacken vernommen habe.
Das macht er auch ohne Probleme, doch beim Versuch eine neue Regel zu erstellen scheitert er dennoch wieder ...

Code:
2015-01-15 23:18:32,759 fail2ban.server : INFO   Changed logging target to /var/log/fail2ban.log for Fail2ban v0.8.6
2015-01-15 23:18:32,760 fail2ban.jail   : INFO   Creating new jail 'ssh'
2015-01-15 23:18:32,760 fail2ban.jail   : INFO   Jail 'ssh' uses Gamin
2015-01-15 23:18:32,868 fail2ban.filter : INFO   Added logfile = /var/log/auth.log
2015-01-15 23:18:32,868 fail2ban.filter : INFO   Set maxRetry = 6
2015-01-15 23:18:32,869 fail2ban.filter : INFO   Set findtime = 600
2015-01-15 23:18:32,869 fail2ban.actions: INFO   Set banTime = 600
2015-01-15 23:18:32,887 fail2ban.jail   : INFO   Creating new jail 'proftpd'
2015-01-15 23:18:32,887 fail2ban.jail   : INFO   Jail 'proftpd' uses Gamin
2015-01-15 23:18:32,888 fail2ban.filter : INFO   Added logfile = /var/log/proftpd/proftpd.log
2015-01-15 23:18:32,888 fail2ban.filter : INFO   Set maxRetry = 6
2015-01-15 23:18:32,888 fail2ban.filter : INFO   Set findtime = 600
2015-01-15 23:18:32,889 fail2ban.actions: INFO   Set banTime = 600
2015-01-15 23:18:32,893 fail2ban.jail   : INFO   Creating new jail 'sasl'
2015-01-15 23:18:32,893 fail2ban.jail   : INFO   Jail 'sasl' uses Gamin
2015-01-15 23:18:32,894 fail2ban.filter : INFO   Added logfile = /var/log/mail.warn
2015-01-15 23:18:32,894 fail2ban.filter : INFO   Set maxRetry = 3
2015-01-15 23:18:32,894 fail2ban.filter : INFO   Set findtime = 600
2015-01-15 23:18:32,894 fail2ban.actions: INFO   Set banTime = 600
2015-01-15 23:18:32,898 fail2ban.jail   : INFO   Jail 'ssh' started
2015-01-15 23:18:32,900 fail2ban.jail   : INFO   Jail 'proftpd' started
2015-01-15 23:18:32,901 fail2ban.jail   : INFO   Jail 'sasl' started
2015-01-15 23:18:32,906 fail2ban.actions.action: ERROR  iptables -N fail2ban-ssh
iptables -A fail2ban-ssh -j RETURN
iptables -I INPUT -p tcp -m multiport --dports ssh -j fail2ban-ssh returned 200
2015-01-15 23:18:32,911 fail2ban.actions.action: ERROR  iptables -N fail2ban-proftpd
iptables -A fail2ban-proftpd -j RETURN
iptables -I INPUT -p tcp -m multiport --dports ftp,ftp-data,ftps,ftps-data -j fail2ban-proftpd returned 200
2015-01-15 23:18:32,916 fail2ban.actions.action: ERROR  iptables -N fail2ban-sasl
iptables -A fail2ban-sasl -j RETURN
iptables -I INPUT -p tcp -m multiport --dports smtp,ssmtp,imap2,imap3,imaps,pop3,pop3s -j fail2ban-sasl returned 200


iptables export Auszug:

Code:
-A INPUT -s 120.37.251.146/32 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 121.205.200.8/32 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 110.85.125.122/32 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 27.153.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 175.44.4.160/32 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 27.159.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 175.44.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 27.159.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 110.85.124.0/24 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 110.85.126.0/24 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 110.82.173.0/24 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 222.77.202.0/24 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 117.26.198.0/24 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 171.34.73.0/24 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 121.205.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 222.77.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 120.33.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 120.43.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 62.210.122.209/32 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 110.88.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 110.89.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 110.90.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 110.91.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 112.111.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 46.151.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 27.148.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 27.149.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 27.150.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 27.151.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 152.163.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 112.112.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 112.113.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 112.114.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 112.115.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 58.23.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 110.80.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 110.87.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 110.86.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 110.85.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 110.84.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 110.83.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 110.82.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 110.81.0.0/16 -p tcp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -s 37.187.252.194/32 -p tcp -j REJECT --reject-with icmp-port-unreachable
COMMIT
# Completed on Thu Jan 15 23:10:20 2015


Ips findet er und will er bannen, aber er trägt sie nicht in fail2ban ein ... fehlt mir eine Erweiterung für Iptables bzw fail2ban ?

Ist halt ein OVZ VPS ... daher ist halt nichts mit Kernelpatchen.

Danke schonmal =)

Referenz-URLs