Nethserver-fail2ban needs testers

In fact the question is still how to have a sustainable way of development…and I have ever never found the answer.

all following answers have been already tested, but these not satisfy me.

  • collaborate with nethforge, I did it plenty of time in smecontribs.
  • open a free personal repository, I have one for SME Server.

The only way never tested is to open a repository with subscriptions but not sure that the people wants it.

1 Like

I really understand your point of view.
I (we, everybody) want free software.
But somebody works hard to do that software. And of course, must be rewarded!
How? Sometimes the applause and nice words are not enough.

1 Like

What if fail2ban would have been developed through a bounty (it’s a feature that a lot of people requested)?
I imagine that @stephdl would have spent time on code after the bounty guaranteed enough reward.
I’d say: let’s try to do things as if there’s been a bounty.
Let’s file a bounty and see how much we can raise and how much @stephdl would like to raise.
I’ll put my money on it for sure.
This is the first real trial for bountysource, what do you think?

3 Likes

Indeed, we have already a bounty active thanks to @Hunv

@stephdl would you mind creating a new issue?

3 Likes

Hi, @stephdl !

Great job by the way! Fail2ban was the first extension I added on my fresh installed Nethserver. And few seconds later I had first banned IPs :slight_smile:

I just added the e-mail notifications and find out, that Whois info is not included. So I do some search and find the info, to install jwhois

yum --enablerepo=epel install jwhois

May be it make sense to add it in package by default?

1 Like

Ehi @MartinsZB thanks for your tests, you’re definitely making happy @stephdl :slight_smile:

As requested the Bounty is Open! :roller_coaster:


Bountysource

Looking to you: @Nas @GG_jr @jackyes @bwdjames @MartinsZB @jgjimenezs @Adam

@stephdl please let me know if it needs to modify the issue description

More info in this post

5 Likes

I’m the first backer! :smiley:

2 Likes

I’m the second! :slight_smile: I really want this package
Everybody needs a bounty! :gift:

Hi Alessio,

You’ve just created a $5 bounty on Fail2ban package [$5]. Thanks for the support, now go spread the word!

If you have any questions, please check out our FAQs or contact us at any of the ways below.

Thanks,
The Bountysource Team

2 Likes

ok i will add it as a dependency

EDIT : after reading this → 929450 – fail2ban has missing dependency on 'whois' and a huge email

Hi,

The IP 183.3.202.103 has just been banned by Fail2Ban after
5 attempts against recidive.


Here is more information about 183.3.202.103:

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '183.0.0.0 - 183.63.255.255'

inetnum:        183.0.0.0 - 183.63.255.255
netname:        CHINANET-GD
descr:          CHINANET Guangdong province network
descr:          Data Communication Division
descr:          China Telecom
country:        CN
admin-c:        IC83-AP
tech-c:         IC83-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
remarks:        To report network abuse, please contact the IRT
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        For assistance, please contact the APNIC Helpdesk
remarks:        -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-GD
source:         APNIC
mnt-irt:        IRT-CHINANET-CN
changed:        hm-changed@apnic.net 20091009

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@ns.chinanet.cn.net
abuse-mailbox:  anti-spam@ns.chinanet.cn.net
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
mnt-by:         MAINT-CHINANET
changed:        anti-spam@ns.chinanet.cn.net 20101115
source:         APNIC

person:         IPMASTER CHINANET-GD
nic-hdl:        IC83-AP
e-mail:         gdnoc_HLWI@189.cn
address:        NO.18,RO. ZHONGSHANER,YUEXIU DISTRIC,GUANGZHOU
phone:          +86-20-87189274
fax-no:         +86-20-87189274
country:        CN
changed:        ipadm@189.cn 20110418
changed:        zhengzm@gsta.com 20140922
mnt-by:         MAINT-CHINANET-GD
remarks:        IPMASTER is not for spam complaint,please send spam complaint to abuse_gdnoc@189.cn
abuse-mailbox:  antispam_gdnoc@189.cn
source:         APNIC

maybe we can simply add a note in the howto on jwhois for those who want to install it, it doesn’t add a lot of values.

3 Likes

Hi, @stephdl. Yes, the e-mail is quite long. Normally I just check, to find, that it come from some Internet provider network in China or in Ukraine. But sometimes the information is worth reporting.
Like tho one I get tonight. :slight_smile:

Hi,

The IP 13.92.197.252 has just been banned by Fail2Ban after
3 attempts against sshd.


Here is more information about 13.92.197.252 :

[Querying whois.arin.net]
[whois.arin.net]

#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/whois_tou.html
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/public/whoisinaccuracy/index.xhtml
#


#
# Query terms are ambiguous.  The query is assumed to be:
#     "n 13.92.197.252"
#
# Use "?" to get help.
#

#
# The following results may also be obtained via:
# https://whois.arin.net/rest/nets;q=13.92.197.252?showDetails=true&showARIN=false&showNonArinTopLevelNet=false&ext=netref2
#

NetRange:       13.64.0.0 - 13.107.255.255
CIDR:           13.104.0.0/14, 13.64.0.0/11, 13.96.0.0/13
NetName:        MSFT
NetHandle:      NET-13-64-0-0-1
Parent:         NET13 (NET-13-0-0-0-0)
NetType:        Direct Assignment
OriginAS:
Organization:   Microsoft Corporation (MSFT)
RegDate:        2015-03-26
Updated:        2015-03-26
Ref:            https://whois.arin.net/rest/net/NET-13-64-0-0-1



OrgName:        Microsoft Corporation
OrgId:          MSFT
Address:        One Microsoft Way
City:           Redmond
StateProv:      WA
PostalCode:     98052
Country:        US
RegDate:        1998-07-10
Updated:        2015-10-28
Comment:        To report suspected security issues specific to traffic emanating from Microsoft online services, including the distribution of malicious content or other illicit or illegal material through a Microsoft online service, please submit reports to:
Comment:        * https://cert.microsoft.com.
Comment:
Comment:        For SPAM and other abuse issues, such as Microsoft Accounts, please contact:
Comment:        * abuse@microsoft.com.
Comment:
Comment:        To report security vulnerabilities in Microsoft products and services, please contact:
Comment:        * secure@microsoft.com.
Comment:
Comment:        For legal and law enforcement-related requests, please contact:
Comment:        * msndcc@microsoft.com
Comment:
Comment:        For routing, peering or DNS issues, please
Comment:        contact:
Comment:        * IOC@microsoft.com
Ref:            https://whois.arin.net/rest/org/MSFT


OrgTechHandle: MRPD-ARIN
OrgTechName:   Microsoft Routing, Peering, and DNS
OrgTechPhone:  +1-425-882-8080
OrgTechEmail:  IOC@microsoft.com
OrgTechRef:    https://whois.arin.net/rest/poc/MRPD-ARIN

OrgAbuseHandle: MAC74-ARIN
OrgAbuseName:   Microsoft Abuse Contact
OrgAbusePhone:  +1-425-882-8080
OrgAbuseEmail:  abuse@microsoft.com
OrgAbuseRef:    https://whois.arin.net/rest/poc/MAC74-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/whois_tou.html
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/public/whoisinaccuracy/index.xhtml
#

Regards,

Fail2Ban`
3 Likes

could you check why bounty source show only 1 active bounty (moodle) on first page and also in bounties?

i think it should display 3 active bounty and $25
tnx :slight_smile:

1 Like

I added a note in the wiki page

3 Likes

That’s a good question, sincerely I don’t know :slight_smile: i will try to figure something out

1 Like

@alefattorini any news on this?

Waiting for the bountysoruce team’s answer, I’ll keep you posted
Bountysource

2 Likes

Oh yes!

The bounty on “Fail2ban package [$20]” has increased to $20: @WillZen increased the bounty by $5. The bounty will be awarded to the developer who successfully closes out this issue.

2 Likes

there is already some jails for openvpn?

like this:


https://blogs.fsfe.org/stefan.a/2014/03/30/monitor-block-openvpn-logins-fail2ban/

1 Like

Not yet

Nextcloud guys are discussing this feature here

1 Like

@dnutan posted a $15 bounty 2 days ago on this module. Who else wants to contribute?
@stephdl would you like to set a goal in case the bounty is too low for you?

Bountysource

2 Likes