From vsjcfm@gmail.com  Wed Jun 12 14:07:08 2013
Return-Path: <vsjcfm@gmail.com>
Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1])
	by hub.freebsd.org (Postfix) with ESMTP id 1289A3D1
	for <bug-followup@freebsd.org>; Wed, 12 Jun 2013 14:07:08 +0000 (UTC)
	(envelope-from vsjcfm@gmail.com)
Received: from mail-vb0-x22a.google.com (mail-vb0-x22a.google.com [IPv6:2607:f8b0:400c:c02::22a])
	by mx1.freebsd.org (Postfix) with ESMTP id CA31E1E8A
	for <bug-followup@freebsd.org>; Wed, 12 Jun 2013 14:07:07 +0000 (UTC)
Received: by mail-vb0-f42.google.com with SMTP id i3so5883221vbh.29
        for <bug-followup@freebsd.org>; Wed, 12 Jun 2013 07:07:07 -0700 (PDT)
Received: by 10.58.254.138 with HTTP; Wed, 12 Jun 2013 07:06:47 -0700 (PDT)
Message-Id: <CAFG2KCJqbygbNnMMahdDVZbOOSPjrfqTF8m-U5+=VmCyFwn+6w@mail.gmail.com>
Date: Wed, 12 Jun 2013 17:06:47 +0300
From: Sayetsky Anton <vsjcfm@gmail.com>
To: bug-followup@freebsd.org
In-Reply-To: <CAFG2KCJPeChacYbn5Bc3Wb1jD8393OKNRm+Ttb+vbkPGtKe1Sg@mail.gmail.com>
Subject: Fwd: [Fail2ban-users] Fwd: ports/179512: [patch] security/py-fail2ban:
 remove PF config patch, clean-up IPFW config patch
References: <201306121253.r5CCraRm081407@jw.lds.net.ua> <201306121300.r5CD00XB008328@freefall.freebsd.org>
 <CAFG2KCKUji6EZ5tnm8-o0sJ1TYLCenqSTeujwXhAjiSNSmRFRA@mail.gmail.com>
 <CAFG2KCLc-12NfWQFSUudO08iPovzpGRNRppBydPeRE0cTcW39A@mail.gmail.com>
 <51B87982.2060705@wenks.ch> <CAFG2KCJPeChacYbn5Bc3Wb1jD8393OKNRm+Ttb+vbkPGtKe1Sg@mail.gmail.com>

>Number:         179514
>Category:       ports
>Synopsis:       Re: ports/179512: [patch] security/py-fail2ban: remove PF config patch, clean-up IPFW config patch
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    freebsd-ports-bugs
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Wed Jun 12 14:10:00 UTC 2013
>Closed-Date:    Mon Jun 17 00:22:12 UTC 2013
>Last-Modified:  Mon Jun 17 00:22:12 UTC 2013
>Originator:     
>Release:        
>Organization:
>Environment:
>Description:
 ---------- Forwarded message ----------
 From: Sayetsky Anton <vsjcfm@gmail.com>
 Date: 2013/6/12
 Subject: Re: [Fail2ban-users] Fwd: ports/179512: [patch]
 security/py-fail2ban: remove PF config patch, clean-up IPFW config
 patch
 To: Fabian Wenk <fabian@wenks.ch>, fail2ban-users@lists.sourceforge.net
 
 
 2013/6/12 Fabian Wenk <fabian@wenks.ch>:
 > Hello Sayetsky
 >
 >
 > On 12.06.2013 15:10, Sayetsky Anton wrote:
 >> Hello!
 >> Action file for IPFW now contains "actionstart" (creating blocking
 >> rule) & "actionstop" (deleting blocking rule). I think that's
 >> incorrect because in this setup number of blocking rule is determined
 >> by fail2bam itself. I think that blocking rule must add firewall
 >> administrator only.
 >
 > Please see the thread "bsd ipfw" [1], this was discussed and
 > tested here.
 >
 >    [1] http://sourceforge.net/mailarchive/message.php?msg_id=30737604
 >
 >>> http://www.freebsd.org/cgi/query-pr.cgi?pr=179512
 >
 > I have also posted an followup to this bugreport.
 Ok, I agree with this.
 Also I've read thread but don't figured out how to fix the following errors:
 root@vpn5:/var/log# grep fail2ban messages
 Jun 12 14:01:43 vpn5 fail2ban.actions.action: ERROR [ -f
 /var/run/fail2ban/ipfw-started-table_1 ] && ( read num <
 "/var/run/fail2ban/ipfw-started-table_1" ipfw -q delete $num rm
 "/var/run/fail2ban/ipfw-started-table_1" ) returned 100
 Jun 12 14:54:42 vpn5 fail2ban.actions.action: ERROR [ -f
 /var/run/fail2ban/ipfw-started-table_1 ] && ( read num <
 "/var/run/fail2ban/ipfw-started-table_1" ipfw -q delete $num rm
 "/var/run/fail2ban/ipfw-started-table_1" ) returned 100
 Jun 12 15:20:01 vpn5 fail2ban.actions.action: ERROR [ -f
 /var/run/fail2ban/ipfw-started-table_1 ] && ( read num <
 "/var/run/fail2ban/ipfw-started-table_1" ipfw -q delete $num rm
 "/var/run/fail2ban/ipfw-started-table_1" ) returned 100
 Jun 12 16:31:11 vpn5 fail2ban.actions.action: ERROR [ -f
 /var/run/fail2ban/ipfw-started-table_1 ] && ( read num <
 "/var/run/fail2ban/ipfw-started-table_1" ipfw -q delete $num rm
 "/var/run/fail2ban/ipfw-started-table_1" ) returned 100
 
 That file wasn't created on fail2ban startup.
>How-To-Repeat:
>Fix:
>Release-Note:
>Audit-Trail:
State-Changed-From-To: open->closed 
State-Changed-By: linimon 
State-Changed-When: Mon Jun 17 00:18:20 UTC 2013 
State-Changed-Why:  
Misfiled followup to ports/179512; content migrated. 


Responsible-Changed-From-To: gnats-admin->freebsd-ports-bugs 
Responsible-Changed-By: linimon 
Responsible-Changed-When: Mon Jun 17 00:18:20 UTC 2013 
Responsible-Changed-Why:  

http://www.freebsd.org/cgi/query-pr.cgi?pr=179514 
>Unformatted:
