summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ChangeLog28
-rw-r--r--MANIFEST1
-rw-r--r--config/action.d/helpers-common.conf4
-rw-r--r--config/filter.d/apache-overflows.conf6
-rw-r--r--config/filter.d/dovecot.conf2
-rw-r--r--config/filter.d/kerio.conf8
-rw-r--r--config/paths-arch.conf32
-rw-r--r--fail2ban/client/jailreader.py1
-rw-r--r--fail2ban/server/database.py2
-rw-r--r--fail2ban/server/datedetector.py13
-rw-r--r--fail2ban/server/datetemplate.py16
-rw-r--r--fail2ban/server/filter.py27
-rw-r--r--fail2ban/server/filterpyinotify.py32
-rw-r--r--fail2ban/server/filtersystemd.py5
-rw-r--r--fail2ban/server/server.py6
-rw-r--r--fail2ban/server/strptime.py139
-rw-r--r--fail2ban/server/transmitter.py6
-rw-r--r--fail2ban/tests/clientreadertestcase.py12
-rw-r--r--fail2ban/tests/config/jail.conf4
-rw-r--r--fail2ban/tests/databasetestcase.py20
-rw-r--r--fail2ban/tests/datedetectortestcase.py49
-rw-r--r--fail2ban/tests/files/logs/kerio15
-rw-r--r--fail2ban/tests/filtertestcase.py11
-rw-r--r--fail2ban/tests/servertestcase.py4
-rw-r--r--man/jail.conf.519
25 files changed, 419 insertions, 43 deletions
diff --git a/ChangeLog b/ChangeLog
index 03adcabc..3617f0d7 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -93,16 +93,31 @@ TODO: implementing of options resp. other tasks from PR #1346
the parsing of log-entries contain new-line chars (as single entry);
- if multiline regex however expected (by single-line parsing without buffering) - prefix `(?m)`
could be used in regex to enable it;
-* implemented execution of `actionstart` on demand (conditional), if action depends on `family` (gh-1742):
+* Implemented execution of `actionstart` on demand (conditional), if action depends on `family` (gh-1742):
- new action parameter `actionstart_on_demand` (bool) can be set to prevent/allow starting action
on demand (default retrieved automatically, if some conditional parameter `param?family=...`
presents in action properties), see `action.d/pf.conf` for example;
- additionally `actionstop` will be executed only for families previously executing `actionstart`
(starting on demand only)
-* introduced new command `actionflush`: executed in order to flush all bans at once
+* Introduced new command `actionflush`: executed in order to flush all bans at once
e. g. by unban all, reload with removing action, stop, shutdown the system (gh-1743),
the actions having `actionflush` do not execute `actionunban` for each single ticket
-* add new command `actionflush` default for several iptables/iptables-ipset actions (and common include);
+* Add new command `actionflush` default for several iptables/iptables-ipset actions (and common include);
+* Add new jail option `logtimezone` to force the timezone on log lines that don't have an explicit one (gh-1773)
+* Implemented zone abbreviations (like CET, CEST, etc.) and abbr+-offset functionality (accept zones
+ like 'CET+0100'), for the list of abbreviations see strptime.TZ_STR;
+* Tokens `%z` and `%Z` are changed (more precise now);
+* Introduced new tokens `%Exz` and `%ExZ` that fully support zone abbreviations and/or offset-based
+ zones (implemented as enhancement using custom `datepattern`, because may be too dangerous for default
+ patterns and tokens like `%z`);
+ Note: the extended tokens supported zone abbreviations, but it can parse 1 or 3-5 char(s) in lowercase.
+ Don't use them in default date-patterns (if not anchored, few precise resp. optional).
+ Because python currently does not support mixing of case-sensitive with case-insensitive matching,
+ the TZ (in uppercase) cannot be combined with `%a`/`%b` etc (that are currently case-insensitive),
+ to avoid invalid date-time recognition in strings like '11-Aug-2013 03:36:11.372 error ...' with
+ wrong TZ "error".
+ Hence `%z` currently match literal Z|UTC|GMT only (and offset-based), and `%Exz` - all zone
+ abbreviations.
ver. 0.10.0-alpha-1 (2016/07/14) - ipv6-support-etc
@@ -313,11 +328,16 @@ releases.
### Fixes
+* Fix for systemd-backend: fail2ban hits the ulimit (out of file descriptors), see gh-991.
+ Partially back-ported from v.0.10.
+* filter.d/apache-overflows.conf:
+ - Fixes resources greedy expression (see gh-1790);
+ - Rewritten without end-anchor ($), because of potential vulnerability on very long URLs.
### New Features
### Enhancements
-
+* filter.d/kerio.conf - filter extended with new rules (see gh-1455)
ver. 0.9.7 (2017/05/11) - awaiting-victory
diff --git a/MANIFEST b/MANIFEST
index f3121882..d40a0aa1 100644
--- a/MANIFEST
+++ b/MANIFEST
@@ -147,6 +147,7 @@ config/filter.d/webmin-auth.conf
config/filter.d/wuftpd.conf
config/filter.d/xinetd-fail.conf
config/jail.conf
+config/paths-arch.conf
config/paths-common.conf
config/paths-debian.conf
config/paths-fedora.conf
diff --git a/config/action.d/helpers-common.conf b/config/action.d/helpers-common.conf
index b04c7f7a..5799d9d3 100644
--- a/config/action.d/helpers-common.conf
+++ b/config/action.d/helpers-common.conf
@@ -5,7 +5,7 @@
# (printf %%b "Log-excerpt contains 'test':\n"; %(_grep_logs)s; printf %%b "Log-excerpt contains 'test':\n") | mail ...
#
_grep_logs = logpath="<logpath>"; grep <grepopts> -E %(_grep_logs_args)s $logpath | <greplimit>
-_grep_logs_args = '(^|[^0-9])<ip>([^0-9]|$)'
+_grep_logs_args = "(^|[^0-9a-fA-F:])$(echo '<ip>' | sed 's/\./\\./g')([^0-9a-fA-F:]|$)"
# Used for actions, that should not by executed if ticket was restored:
_bypass_if_restored = if [ '<restored>' = '1' ]; then exit 0; fi;
@@ -13,4 +13,4 @@ _bypass_if_restored = if [ '<restored>' = '1' ]; then exit 0; fi;
[Init]
greplimit = tail -n <grepmax>
grepmax = 1000
-grepopts = -m <grepmax> \ No newline at end of file
+grepopts = -m <grepmax>
diff --git a/config/filter.d/apache-overflows.conf b/config/filter.d/apache-overflows.conf
index 74e44b8e..02a2ef20 100644
--- a/config/filter.d/apache-overflows.conf
+++ b/config/filter.d/apache-overflows.conf
@@ -8,11 +8,15 @@ before = apache-common.conf
[Definition]
-failregex = ^%(_apache_error_client)s ((AH0013[456]: )?Invalid (method|URI) in request .*( - possible attempt to establish SSL connection on non-SSL port)?|(AH00565: )?request failed: URI too long \(longer than \d+\)|request failed: erroneous characters after protocol string: .*|AH00566: request failed: invalid characters in URI)(, referer: \S+)?$
+failregex = ^%(_apache_error_client)s (?:(?:AH0013[456]: )?Invalid (method|URI) in request\b|(?:AH00565: )?request failed: URI too long \(longer than \d+\)|request failed: erroneous characters after protocol string:|(?:AH00566: )?request failed: invalid characters in URI\b)
ignoreregex =
# DEV Notes:
+#
+# [sebres] Because this apache-log could contain very long URLs (and/or referrer),
+# the parsing of it anchored way may be very vulnerable (at least as regards
+# the system resources, see gh-1790). Thus rewritten without end-anchor ($).
#
# fgrep -r 'URI too long' httpd-2.*
# httpd-2.2.25/server/protocol.c: "request failed: URI too long (longer than %d)", r->server->limit_req_line);
diff --git a/config/filter.d/dovecot.conf b/config/filter.d/dovecot.conf
index 966a7e86..8f976c81 100644
--- a/config/filter.d/dovecot.conf
+++ b/config/filter.d/dovecot.conf
@@ -13,7 +13,7 @@ _daemon = (dovecot(-auth)?|auth)
prefregex = ^%(__prefix_line)s(%(_auth_worker)s(?:\([^\)]+\))?: )?(?:%(__pam_auth)s(?:\(dovecot:auth\))?: |(?:pop3|imap)-login: )?(?:Info: )?<F-CONTENT>.+</F-CONTENT>$
failregex = ^authentication failure; logname=\S* uid=\S* euid=\S* tty=dovecot ruser=\S* rhost=<HOST>(?:\s+user=\S*)?\s*$
- ^(?:Aborted login|Disconnected)(?::(?: [^ \(]+)+)? \((?:auth failed, \d+ attempts( in \d+ secs)?|tried to use (disabled|disallowed) \S+ auth)\):( user=<[^>]+>,)?( method=\S+,)? rip=<HOST>(?:, lip=\S+)?(?:, TLS(?: handshaking(?:: SSL_accept\(\) failed: error:[\dA-F]+:SSL routines:[TLS\d]+_GET_CLIENT_HELLO:unknown protocol)?)?(: Disconnected)?)?(, session=<\S+>)?\s*$
+ ^(?:Aborted login|Disconnected)(?::(?: [^ \(]+)+)? \((?:auth failed, \d+ attempts( in \d+ secs)?|tried to use (disabled|disallowed) \S+ auth)\):( user=<[^>]*>,)?( method=\S+,)? rip=<HOST>(?:, lip=\S+)?(?:, TLS(?: handshaking(?:: SSL_accept\(\) failed: error:[\dA-F]+:SSL routines:[TLS\d]+_GET_CLIENT_HELLO:unknown protocol)?)?(: Disconnected)?)?(, session=<\S+>)?\s*$
^pam\(\S+,<HOST>\): pam_authenticate\(\) failed: (User not known to the underlying authentication module: \d+ Time\(s\)|Authentication failure \(password mismatch\?\))\s*$
^(?:pam|passwd-file)\(\S+,<HOST>\): unknown user\s*$
^ldap\(\S*,<HOST>,\S*\): invalid credentials\s*$
diff --git a/config/filter.d/kerio.conf b/config/filter.d/kerio.conf
index e0d94753..0fde0927 100644
--- a/config/filter.d/kerio.conf
+++ b/config/filter.d/kerio.conf
@@ -3,9 +3,14 @@
[Definition]
failregex = ^ SMTP Spam attack detected from <HOST>,
- ^ IP address <HOST> found in DNS blacklist \S+, mail from \S+ to \S+$
+ ^ IP address <HOST> found in DNS blacklist
^ Relay attempt from IP address <HOST>
^ Attempt to deliver to unknown recipient \S+, from \S+, IP address <HOST>$
+ ^ Failed SMTP login from <HOST>
+ ^ SMTP: User \S+ doesn't exist. Attempt from IP address <HOST>
+ ^ Client with IP address <HOST> has no reverse DNS entry, connection rejected before SMTP greeting$
+ ^ Administration login into Web Administration from <HOST> failed: IP address not allowed$
+ ^ Message from IP address <HOST>, sender \S+ rejected: sender domain does not exist$
ignoreregex =
@@ -14,5 +19,6 @@ datepattern = ^\[%%d/%%b/%%Y %%H:%%M:%%S\]
# DEV NOTES:
#
# Author: A.P. Lawrence
+# Updated by: M. Bischoff <https://github.com/herrbischoff>
#
# Based off: http://aplawrence.com/Kerio/fail2ban.html
diff --git a/config/paths-arch.conf b/config/paths-arch.conf
new file mode 100644
index 00000000..270ce65d
--- /dev/null
+++ b/config/paths-arch.conf
@@ -0,0 +1,32 @@
+# Arch
+
+[INCLUDES]
+
+before = paths-common.conf
+
+after = paths-overrides.local
+
+
+[DEFAULT]
+
+apache_error_log = /var/log/httpd/*error_log
+
+apache_access_log = /var/log/httpd/*access_log
+
+exim_main_log = /var/log/exim/main.log
+
+mysql_log = /var/log/mariadb/mariadb.log
+ /var/log/mysqld.log
+
+roundcube_errors_log = /var/log/roundcubemail/errors
+
+# These services will log to the journal via syslog, so use the journal by
+# default.
+syslog_backend = systemd
+sshd_backend = systemd
+dropbear_backend = systemd
+proftpd_backend = systemd
+pureftpd_backend = systemd
+wuftpd_backend = systemd
+postfix_backend = systemd
+dovecot_backend = systemd
diff --git a/fail2ban/client/jailreader.py b/fail2ban/client/jailreader.py
index 02c1ebc6..85a68ce4 100644
--- a/fail2ban/client/jailreader.py
+++ b/fail2ban/client/jailreader.py
@@ -101,6 +101,7 @@ class JailReader(ConfigReader):
["string", "filter", ""]]
opts = [["bool", "enabled", False],
["string", "logpath", None],
+ ["string", "logtimezone", None],
["string", "logencoding", None],
["string", "backend", "auto"],
["int", "maxretry", None],
diff --git a/fail2ban/server/database.py b/fail2ban/server/database.py
index e3fda47f..ba71210e 100644
--- a/fail2ban/server/database.py
+++ b/fail2ban/server/database.py
@@ -657,7 +657,7 @@ class Fail2BanDb(object):
queryArgs.append(ip)
query += " AND (timeofban + bantime > ? OR bantime = -1)"
queryArgs.append(fromtime)
- if forbantime is not None:
+ if forbantime not in (None, -1): # not specified or persistent (all)
query += " AND timeofban > ?"
queryArgs.append(fromtime - forbantime)
if ip is None:
diff --git a/fail2ban/server/datedetector.py b/fail2ban/server/datedetector.py
index dd5d198f..90cfe1fd 100644
--- a/fail2ban/server/datedetector.py
+++ b/fail2ban/server/datedetector.py
@@ -27,6 +27,7 @@ import time
from threading import Lock
from .datetemplate import re, DateTemplate, DatePatternRegex, DateTai64n, DateEpoch
+from .strptime import validateTimeZone
from .utils import Utils
from ..helpers import getLogger
@@ -222,6 +223,8 @@ class DateDetector(object):
self.__firstUnused = 0
# pre-match pattern:
self.__preMatch = None
+ # default TZ (if set, treat log lines without explicit time zone to be in this time zone):
+ self.__default_tz = None
def _appendTemplate(self, template, ignoreDup=False):
name = template.name
@@ -423,6 +426,14 @@ class DateDetector(object):
logSys.log(logLevel, " no template.")
return (None, None)
+ @property
+ def default_tz(self):
+ return self.__default_tz
+
+ @default_tz.setter
+ def default_tz(self, value):
+ self.__default_tz = validateTimeZone(value)
+
def getTime(self, line, timeMatch=None):
"""Attempts to return the date on a log line using templates.
@@ -449,7 +460,7 @@ class DateDetector(object):
template = timeMatch[1]
if template is not None:
try:
- date = template.getDate(line, timeMatch[0])
+ date = template.getDate(line, timeMatch[0], default_tz=self.__default_tz)
if date is not None:
if logSys.getEffectiveLevel() <= logLevel: # pragma: no cover - heavy debug
logSys.log(logLevel, " got time %f for %r using template %s",
diff --git a/fail2ban/server/datetemplate.py b/fail2ban/server/datetemplate.py
index 1d0b014b..44ea54a8 100644
--- a/fail2ban/server/datetemplate.py
+++ b/fail2ban/server/datetemplate.py
@@ -158,7 +158,7 @@ class DateTemplate(object):
return dateMatch
@abstractmethod
- def getDate(self, line, dateMatch=None):
+ def getDate(self, line, dateMatch=None, default_tz=None):
"""Abstract method, which should return the date for a log line
This should return the date for a log line, typically taking the
@@ -169,6 +169,8 @@ class DateTemplate(object):
----------
line : str
Log line, of which the date should be extracted from.
+ default_tz: if no explicit time zone is present in the line
+ passing this will interpret it as in that time zone.
Raises
------
@@ -200,13 +202,14 @@ class DateEpoch(DateTemplate):
regex = r"((?P<square>(?<=^\[))?\d{10,11}\b(?:\.\d{3,6})?)(?(square)(?=\]))"
self.setRegex(regex, wordBegin='start', wordEnd=True)
- def getDate(self, line, dateMatch=None):
+ def getDate(self, line, dateMatch=None, default_tz=None):
"""Method to return the date for a log line.
Parameters
----------
line : str
Log line, of which the date should be extracted from.
+ default_tz: ignored, Unix timestamps are time zone independent
Returns
-------
@@ -277,7 +280,7 @@ class DatePatternRegex(DateTemplate):
regex = r'(?iu)' + regex
super(DatePatternRegex, self).setRegex(regex, wordBegin, wordEnd)
- def getDate(self, line, dateMatch=None):
+ def getDate(self, line, dateMatch=None, default_tz=None):
"""Method to return the date for a log line.
This uses a custom version of strptime, using the named groups
@@ -287,6 +290,7 @@ class DatePatternRegex(DateTemplate):
----------
line : str
Log line, of which the date should be extracted from.
+ default_tz: optionally used to correct timezone
Returns
-------
@@ -297,7 +301,8 @@ class DatePatternRegex(DateTemplate):
if not dateMatch:
dateMatch = self.matchDate(line)
if dateMatch:
- return reGroupDictStrptime(dateMatch.groupdict()), dateMatch
+ return (reGroupDictStrptime(dateMatch.groupdict(), default_tz=default_tz),
+ dateMatch)
class DateTai64n(DateTemplate):
@@ -315,13 +320,14 @@ class DateTai64n(DateTemplate):
# We already know the format for TAI64N
self.setRegex("@[0-9a-f]{24}", wordBegin=wordBegin)
- def getDate(self, line, dateMatch=None):
+ def getDate(self, line, dateMatch=None, default_tz=None):
"""Method to return the date for a log line.
Parameters
----------
line : str
Log line, of which the date should be extracted from.
+ default_tz: ignored, since TAI is time zone independent
Returns
-------
diff --git a/fail2ban/server/filter.py b/fail2ban/server/filter.py
index adef2b65..4417a3e8 100644
--- a/fail2ban/server/filter.py
+++ b/fail2ban/server/filter.py
@@ -35,7 +35,7 @@ from .ipdns import DNSUtils, IPAddr
from .observer import Observers
from .ticket import FailTicket
from .jailthread import JailThread
-from .datedetector import DateDetector
+from .datedetector import DateDetector, validateTimeZone
from .mytime import MyTime
from .failregex import FailRegex, Regex, RegexException
from .action import CommandAction
@@ -88,6 +88,8 @@ class Filter(JailThread):
## Store last time stamp, applicable for multi-line
self.__lastTimeText = ""
self.__lastDate = None
+ ## if set, treat log lines without explicit time zone to be in this time zone
+ self.__logtimezone = None
## External command
self.__ignoreCommand = False
## Default or preferred encoding (to decode bytes from file or journal):
@@ -283,6 +285,7 @@ class Filter(JailThread):
return
else:
dd = DateDetector()
+ dd.default_tz = self.__logtimezone
if not isinstance(pattern, (list, tuple)):
pattern = filter(bool, map(str.strip, re.split('\n+', pattern)))
for pattern in pattern:
@@ -309,6 +312,24 @@ class Filter(JailThread):
return None
##
+ # Set the log default time zone
+ #
+ # @param tz the symbolic timezone (for now fixed offset only: UTC[+-]HHMM)
+
+ def setLogTimeZone(self, tz):
+ validateTimeZone(tz); # avoid setting of wrong value, but hold original
+ self.__logtimezone = tz
+ if self.dateDetector: self.dateDetector.default_tz = self.__logtimezone
+
+ ##
+ # Get the log default timezone
+ #
+ # @return symbolic timezone (a string)
+
+ def getLogTimeZone(self):
+ return self.__logtimezone
+
+ ##
# Set the maximum retry value.
#
# @param value the retry value
@@ -976,7 +997,9 @@ class FileFilter(Filter):
break
(timeMatch, template) = self.dateDetector.matchTime(line)
if timeMatch:
- dateTimeMatch = self.dateDetector.getTime(line[timeMatch.start():timeMatch.end()], (timeMatch, template))
+ dateTimeMatch = self.dateDetector.getTime(
+ line[timeMatch.start():timeMatch.end()],
+ (timeMatch, template))
else:
nextp = container.tell()
if nextp > maxp:
diff --git a/fail2ban/server/filterpyinotify.py b/fail2ban/server/filterpyinotify.py
index d945fc2d..41b8be7c 100644
--- a/fail2ban/server/filterpyinotify.py
+++ b/fail2ban/server/filterpyinotify.py
@@ -82,7 +82,7 @@ class FilterPyinotify(FileFilter):
self.__watchDirs = dict()
self.__pending = dict()
self.__pendingChkTime = 0
- self.__pendingNextTime = 0
+ self.__pendingMinTime = 60
logSys.debug("Created FilterPyinotify")
def callback(self, event, origin=''):
@@ -150,7 +150,7 @@ class FilterPyinotify(FileFilter):
def _addPending(self, path, reason, isDir=False):
if path not in self.__pending:
self.__pending[path] = [Utils.DEFAULT_SLEEP_INTERVAL, isDir];
- self.__pendingNextTime = 0
+ self.__pendingMinTime = 0
if isinstance(reason, pyinotify.Event):
reason = [reason.maskname, reason.pathname]
logSys.log(logging.MSG, "Log absence detected (possibly rotation) for %s, reason: %s of %s",
@@ -165,7 +165,7 @@ class FilterPyinotify(FileFilter):
if not self.__pending:
return
ntm = time.time()
- if ntm < self.__pendingNextTime:
+ if ntm < self.__pendingChkTime + self.__pendingMinTime:
return
found = {}
minTime = 60
@@ -183,7 +183,7 @@ class FilterPyinotify(FileFilter):
"directory" if isDir else "file", path)
found[path] = isDir
self.__pendingChkTime = time.time()
- self.__pendingNextTime = self.__pendingChkTime + minTime
+ self.__pendingMinTime = minTime
# process now because we've missed it in monitoring:
for path, isDir in found.iteritems():
self._delPending(path)
@@ -292,6 +292,12 @@ class FilterPyinotify(FileFilter):
self.commonError()
self.ticks += 1
+ @property
+ def __notify_maxtout(self):
+ # timeout for pyinotify must be set in milliseconds (fail2ban time values are
+ # floats contain seconds), max 0.5 sec (additionally regards pending check time)
+ return min(self.sleeptime, 0.5, self.__pendingMinTime) * 1000
+
##
# Main loop.
#
@@ -301,9 +307,8 @@ class FilterPyinotify(FileFilter):
def run(self):
prcevent = pyinotify.ProcessEvent()
prcevent.process_default = self.__process_default
- ## timeout for pyinotify must be set in milliseconds (our time values are floats contain seconds)
self.__notifier = pyinotify.Notifier(self.__monitor,
- prcevent, timeout=self.sleeptime * 1000)
+ prcevent, timeout=self.__notify_maxtout)
logSys.debug("[%s] filter started (pyinotifier)", self.jailName)
while self.active:
try:
@@ -311,13 +316,19 @@ class FilterPyinotify(FileFilter):
# slow check events while idle:
if self.idle:
if Utils.wait_for(lambda: not self.active or not self.idle,
- self.sleeptime * 10, self.sleeptime
+ min(self.sleeptime * 10, self.__pendingMinTime),
+ min(self.sleeptime, self.__pendingMinTime)
):
if not self.active: break
# default pyinotify handling using Notifier:
self.__notifier.process_events()
- if Utils.wait_for(lambda: not self.active or self.__notifier.check_events(), self.sleeptime):
+
+ # wait for events / timeout:
+ notify_maxtout = self.__notify_maxtout
+ def __check_events():
+ return not self.active or self.__notifier.check_events(timeout=notify_maxtout)
+ if Utils.wait_for(__check_events, min(self.sleeptime, self.__pendingMinTime)):
if not self.active: break
self.__notifier.read_events()
@@ -344,11 +355,10 @@ class FilterPyinotify(FileFilter):
# Call super.stop() and then stop the 'Notifier'
def stop(self):
- if self.__notifier: # stop the notifier
- self.__notifier.stop()
# stop filter thread:
super(FilterPyinotify, self).stop()
- self.join()
+ if self.__notifier: # stop the notifier
+ self.__notifier.stop()
##
# Wait for exit with cleanup.
diff --git a/fail2ban/server/filtersystemd.py b/fail2ban/server/filtersystemd.py
index d858142b..f83e7264 100644
--- a/fail2ban/server/filtersystemd.py
+++ b/fail2ban/server/filtersystemd.py
@@ -315,6 +315,7 @@ class FilterSystemd(JournalFilter): # pragma: systemd no cover
self.commonError()
logSys.debug("[%s] filter terminated", self.jailName)
+
# close journal:
try:
if self.__journal:
@@ -322,8 +323,8 @@ class FilterSystemd(JournalFilter): # pragma: systemd no cover
except Exception as e: # pragma: no cover
logSys.error("Close journal failed: %r", e,
exc_info=logSys.getEffectiveLevel()<=logging.DEBUG)
- logSys.debug((self.jail is not None and self.jail.name
- or "jailless") +" filter terminated")
+
+ logSys.debug("[%s] filter exited (systemd)", self.jailName)
return True
def status(self, flavor="basic"):
diff --git a/fail2ban/server/server.py b/fail2ban/server/server.py
index 8293bc0b..abe6ed61 100644
--- a/fail2ban/server/server.py
+++ b/fail2ban/server/server.py
@@ -402,6 +402,12 @@ class Server:
def getDatePattern(self, name):
return self.__jails[name].filter.getDatePattern()
+ def setLogTimeZone(self, name, tz):
+ self.__jails[name].filter.setLogTimeZone(tz)
+
+ def getLogTimeZone(self, name):
+ return self.__jails[name].filter.getLogTimeZone()
+
def setIgnoreCommand(self, name, value):
self.__jails[name].filter.setIgnoreCommand(value)
diff --git a/fail2ban/server/strptime.py b/fail2ban/server/strptime.py
index 55bdcc8c..dbf75d21 100644
--- a/fail2ban/server/strptime.py
+++ b/fail2ban/server/strptime.py
@@ -17,6 +17,7 @@
# along with Fail2Ban; if not, write to the Free Software
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
+import re
import time
import calendar
import datetime
@@ -25,7 +26,9 @@ from _strptime import LocaleTime, TimeRE, _calc_julian_from_U_or_W
from .mytime import MyTime
locale_time = LocaleTime()
-timeRE = TimeRE()
+
+TZ_ABBR_RE = r"[A-Z](?:[A-Z]{2,4})?"
+FIXED_OFFSET_TZ_RE = re.compile(r"(%s)?([+-][01]\d(?::?\d{2})?)?$" % (TZ_ABBR_RE,))
def _getYearCentRE(cent=(0,3), distance=3, now=(MyTime.now(), MyTime.alternateNow)):
""" Build century regex for last year and the next years (distance).
@@ -38,10 +41,20 @@ def _getYearCentRE(cent=(0,3), distance=3, now=(MyTime.now(), MyTime.alternateNo
exprset |= set( cent(now[1].year + i) for i in (-1, distance) )
return "(?:%s)" % "|".join(exprset) if len(exprset) > 1 else "".join(exprset)
-#todo: implement literal time zone support like CET, PST, PDT, etc (via pytz):
-#timeRE['z'] = r"%s?(?P<z>Z|[+-]\d{2}(?::?[0-5]\d)?|[A-Z]{3})?" % timeRE['Z']
-timeRE['Z'] = r"(?P<Z>[A-Z]{3,5})"
-timeRE['z'] = r"(?P<z>Z|UTC|GMT|[+-]\d{2}(?::?[0-5]\d)?)"
+timeRE = TimeRE()
+
+# TODO: because python currently does not support mixing of case-sensitive with case-insensitive matching,
+# check how TZ (in uppercase) can be combined with %a/%b etc. (that are currently case-insensitive),
+# to avoid invalid date-time recognition in strings like '11-Aug-2013 03:36:11.372 error ...'
+# with wrong TZ "error", which is at least not backwards compatible.
+# Hence %z currently match literal Z|UTC|GMT only (and offset-based), and %Exz - all zone abbreviations.
+timeRE['Z'] = r"(?P<Z>Z|[A-Z]{3,5})"
+timeRE['z'] = r"(?P<z>Z|UTC|GMT|[+-][01]\d(?::?\d{2})?)"
+
+# Note: this extended tokens supported zone abbreviations, but it can parse 1 or 3-5 char(s) in lowercase,
+# see todo above. Don't use them in default date-patterns (if not anchored, few precise resp. optional).
+timeRE['ExZ'] = r"(?P<Z>%s)" % (TZ_ABBR_RE,)
+timeRE['Exz'] = r"(?P<z>(?:%s)?[+-][01]\d(?::?\d{2})?|%s)" % (TZ_ABBR_RE, TZ_ABBR_RE)
# Extend build-in TimeRE with some exact patterns
# exact two-digit patterns:
@@ -78,7 +91,56 @@ def getTimePatternRE():
names[key] = "%%%s" % key
return (patt, names)
-def reGroupDictStrptime(found_dict, msec=False):
+
+def validateTimeZone(tz):
+ """Validate a timezone and convert it to offset if it can (offset-based TZ).
+
+ For now this accepts the UTC[+-]hhmm format (UTC has aliases GMT/Z and optional).
+ Additionally it accepts all zone abbreviations mentioned below in TZ_STR.
+ Note that currently this zone abbreviations are offset-based and used fixed
+ offset without automatically DST-switch (if CET used then no automatically CEST-switch).
+
+ In the future, it may be extended for named time zones (such as Europe/Paris)
+ present on the system, if a suitable tz library is present (pytz).
+ """
+ if tz is None:
+ return None
+ m = FIXED_OFFSET_TZ_RE.match(tz)
+ if m is None:
+ raise ValueError("Unknown or unsupported time zone: %r" % tz)
+ tz = m.groups()
+ return zone2offset(tz, 0)
+
+def zone2offset(tz, dt):
+ """Return the proper offset, in minutes according to given timezone at a given time.
+
+ Parameters
+ ----------
+ tz: symbolic timezone or offset (for now only TZA?([+-]hh:?mm?)? is supported,
+ as value are accepted:
+ int offset;
+ string in form like 'CET+0100' or 'UTC' or '-0400';
+ tuple (or list) in form (zone name, zone offset);
+ dt: datetime instance for offset computation (currently unused)
+ """
+ if isinstance(tz, int):
+ return tz
+ if isinstance(tz, basestring):
+ return validateTimeZone(tz)
+ tz, tzo = tz
+ if tzo is None or tzo == '': # without offset
+ return TZ_ABBR_OFFS[tz]
+ if len(tzo) <= 3: # short tzo (hh only)
+ # [+-]hh --> [+-]hh*60
+ return TZ_ABBR_OFFS[tz] + int(tzo)*60
+ if tzo[3] != ':':
+ # [+-]hhmm --> [+-]1 * (hh*60 + mm)
+ return TZ_ABBR_OFFS[tz] + (-1 if tzo[0] == '-' else 1) * (int(tzo[1:3])*60 + int(tzo[3:5]))
+ else:
+ # [+-]hh:mm --> [+-]1 * (hh*60 + mm)
+ return TZ_ABBR_OFFS[tz] + (-1 if tzo[0] == '-' else 1) * (int(tzo[1:3])*60 + int(tzo[4:6]))
+
+def reGroupDictStrptime(found_dict, msec=False, default_tz=None):
"""Return time from dictionary of strptime fields
This is tweaked from python built-in _strptime.
@@ -88,7 +150,8 @@ def reGroupDictStrptime(found_dict, msec=False):
found_dict : dict
Dictionary where keys represent the strptime fields, and values the
respective value.
-
+ default_tz : default timezone to apply if nothing relevant is in found_dict
+ (may be a non-fixed one in the future)
Returns
-------
float
@@ -167,11 +230,7 @@ def reGroupDictStrptime(found_dict, msec=False):
if z in ("Z", "UTC", "GMT"):
tzoffset = 0
else:
- tzoffset = int(z[1:3]) * 60 # Hours...
- if len(z)>3:
- tzoffset += int(z[-2:]) # ...and minutes
- if z.startswith("-"):
- tzoffset = -tzoffset
+ tzoffset = zone2offset(z, 0); # currently offset-based only
elif key == 'Z':
z = val
if z in ("UTC", "GMT"):
@@ -209,6 +268,9 @@ def reGroupDictStrptime(found_dict, msec=False):
# Actully create date
date_result = datetime.datetime(
year, month, day, hour, minute, second, fraction)
+ # Correct timezone if not supplied in the log linge
+ if tzoffset is None and default_tz is not None:
+ tzoffset = zone2offset(default_tz, date_result)
# Add timezone info
if tzoffset is not None:
date_result -= datetime.timedelta(seconds=tzoffset * 60)
@@ -234,3 +296,56 @@ def reGroupDictStrptime(found_dict, msec=False):
if msec: # pragma: no cover - currently unused
tm += fraction/1000000.0
return tm
+
+
+TZ_ABBR_OFFS = {'':0, None:0}
+TZ_STR = '''
+ -12 Y
+ -11 X NUT SST
+ -10 W CKT HAST HST TAHT TKT
+ -9 V AKST GAMT GIT HADT HNY
+ -8 U AKDT CIST HAY HNP PST PT
+ -7 T HAP HNR MST PDT
+ -6 S CST EAST GALT HAR HNC MDT
+ -5 R CDT COT EASST ECT EST ET HAC HNE PET
+ -4 Q AST BOT CLT COST EDT FKT GYT HAE HNA PYT
+ -3 P ADT ART BRT CLST FKST GFT HAA PMST PYST SRT UYT WGT
+ -2 O BRST FNT PMDT UYST WGST
+ -1 N AZOT CVT EGT
+ 0 Z EGST GMT UTC WET WT
+ 1 A CET DFT WAT WEDT WEST
+ 2 B CAT CEDT CEST EET SAST WAST
+ 3 C EAT EEDT EEST IDT MSK
+ 4 D AMT AZT GET GST KUYT MSD MUT RET SAMT SCT
+ 5 E AMST AQTT AZST HMT MAWT MVT PKT TFT TJT TMT UZT YEKT
+ 6 F ALMT BIOT BTT IOT KGT NOVT OMST YEKST
+ 7 G CXT DAVT HOVT ICT KRAT NOVST OMSST THA WIB
+ 8 H ACT AWST BDT BNT CAST HKT IRKT KRAST MYT PHT SGT ULAT WITA WST
+ 9 I AWDT IRKST JST KST PWT TLT WDT WIT YAKT
+ 10 K AEST ChST PGT VLAT YAKST YAPT
+ 11 L AEDT LHDT MAGT NCT PONT SBT VLAST VUT
+ 12 M ANAST ANAT FJT GILT MAGST MHT NZST PETST PETT TVT WFT
+ 13 FJST NZDT
+ 11.5 NFT
+ 10.5 ACDT LHST
+ 9.5 ACST
+ 6.5 CCT MMT
+ 5.75 NPT
+ 5.5 SLT
+ 4.5 AFT IRDT
+ 3.5 IRST
+ -2.5 HAT NDT
+ -3.5 HNT NST NT
+ -4.5 HLV VET
+ -9.5 MART MIT
+'''
+
+def _init_TZ_ABBR():
+ """Initialized TZ_ABBR_OFFS dictionary (TZ -> offset in minutes)"""
+ for tzline in map(str.split, TZ_STR.split('\n')):
+ if not len(tzline): continue
+ tzoffset = int(float(tzline[0]) * 60)
+ for tz in tzline[1:]:
+ TZ_ABBR_OFFS[tz] = tzoffset
+
+_init_TZ_ABBR()
diff --git a/fail2ban/server/transmitter.py b/fail2ban/server/transmitter.py
index a140df4b..ecdc6fad 100644
--- a/fail2ban/server/transmitter.py
+++ b/fail2ban/server/transmitter.py
@@ -261,6 +261,10 @@ class Transmitter:
value = command[2]
self.__server.setDatePattern(name, value)
return self.__server.getDatePattern(name)
+ elif command[1] == "logtimezone":
+ value = command[2]
+ self.__server.setLogTimeZone(name, value)
+ return self.__server.getLogTimeZone(name)
elif command[1] == "maxretry":
value = command[2]
self.__server.setMaxRetry(name, int(value))
@@ -368,6 +372,8 @@ class Transmitter:
return self.__server.getFindTime(name)
elif command[1] == "datepattern":
return self.__server.getDatePattern(name)
+ elif command[1] == "logtimezone":
+ return self.__server.getLogTimeZone(name)
elif command[1] == "maxretry":
return self.__server.getMaxRetry(name)
elif command[1] == "maxlines":
diff --git a/fail2ban/tests/clientreadertestcase.py b/fail2ban/tests/clientreadertestcase.py
index b974a6f5..a4ed9620 100644
--- a/fail2ban/tests/clientreadertestcase.py
+++ b/fail2ban/tests/clientreadertestcase.py
@@ -196,6 +196,14 @@ class JailReaderTest(LogCaptureTestCase):
self.assertTrue(jail.isEnabled())
self.assertLogged("Invalid action definition 'joho[foo'")
+ def testJailLogTimeZone(self):
+ jail = JailReader('tz_correct', basedir=IMPERFECT_CONFIG,
+ share_config=IMPERFECT_CONFIG_SHARE_CFG)
+ self.assertTrue(jail.read())
+ self.assertTrue(jail.getOptions())
+ self.assertTrue(jail.isEnabled())
+ self.assertEqual(jail.options['logtimezone'], 'UTC+0200')
+
def testJailFilterBrokenDef(self):
jail = JailReader('brokenfilterdef', basedir=IMPERFECT_CONFIG,
share_config=IMPERFECT_CONFIG_SHARE_CFG)
@@ -533,10 +541,14 @@ class JailsReaderTest(LogCaptureTestCase):
]],
['add', 'parse_to_end_of_jail.conf', 'auto'],
['set', 'parse_to_end_of_jail.conf', 'addfailregex', '<IP>'],
+ ['set', 'tz_correct', 'addfailregex', '<IP>'],
+ ['set', 'tz_correct', 'logtimezone', 'UTC+0200'],
['start', 'emptyaction'],
['start', 'missinglogfiles'],
['start', 'brokenaction'],
['start', 'parse_to_end_of_jail.conf'],
+ ['add', 'tz_correct', 'auto'],
+ ['start', 'tz_correct'],
['config-error',
"Jail 'brokenactiondef' skipped, because of wrong configuration: Invalid action definition 'joho[foo'"],
['config-error',
diff --git a/fail2ban/tests/config/jail.conf b/fail2ban/tests/config/jail.conf
index 64c1b830..3dcbf634 100644
--- a/fail2ban/tests/config/jail.conf
+++ b/fail2ban/tests/config/jail.conf
@@ -47,3 +47,7 @@ action = thefunkychickendance
[parse_to_end_of_jail.conf]
enabled = true
action =
+
+[tz_correct]
+enabled = true
+logtimezone = UTC+0200
diff --git a/fail2ban/tests/databasetestcase.py b/fail2ban/tests/databasetestcase.py
index fcd239dd..11ee661e 100644
--- a/fail2ban/tests/databasetestcase.py
+++ b/fail2ban/tests/databasetestcase.py
@@ -385,6 +385,26 @@ class DatabaseTest(LogCaptureTestCase):
self.assertEqual(len(tickets), 2)
ticket = self.db.getCurrentBans(jail=None, ip="127.0.0.1");
self.assertEqual(ticket.getIP(), "127.0.0.1")
+
+ # positive case (1 ticket not yet expired):
+ tickets = self.db.getCurrentBans(jail=self.jail, forbantime=15,
+ fromtime=MyTime.time())
+ self.assertEqual(len(tickets), 1)
+ # negative case (all are expired in 1year):
+ tickets = self.db.getCurrentBans(jail=self.jail, forbantime=15,
+ fromtime=MyTime.time() + MyTime.str2seconds("1year"))
+ self.assertEqual(len(tickets), 0)
+ # persistent bantime (-1), so never expired (but no persistent tickets):
+ tickets = self.db.getCurrentBans(jail=self.jail, forbantime=-1,
+ fromtime=MyTime.time() + MyTime.str2seconds("1year"))
+ self.assertEqual(len(tickets), 0)
+ # add persistent one:
+ ticket.setBanTime(-1)
+ self.db.addBan(self.jail, ticket)
+ # persistent bantime (-1), so never expired (1 persistent ticket):
+ tickets = self.db.getCurrentBans(jail=self.jail, forbantime=-1,
+ fromtime=MyTime.time() + MyTime.str2seconds("1year"))
+ self.assertEqual(len(tickets), 1)
def testActionWithDB(self):
# test action together with database functionality
diff --git a/fail2ban/tests/datedetectortestcase.py b/fail2ban/tests/datedetectortestcase.py
index 39ab7173..02facf30 100644
--- a/fail2ban/tests/datedetectortestcase.py
+++ b/fail2ban/tests/datedetectortestcase.py
@@ -89,6 +89,55 @@ class DateDetectorTest(LogCaptureTestCase):
self.assertEqual(datelog, dateUnix)
self.assertEqual(matchlog.group(1), 'Jan 23 21:59:59')
+ def testDefaultTimeZone(self):
+ # use special date-pattern (with %Exz), because %z currently does not supported
+ # zone abbreviations except Z|UTC|GMT.
+ dd = DateDetector()
+ dd.appendTemplate('^%ExY-%Exm-%Exd %H:%M:%S(?: ?%Exz)?')
+ dt = datetime.datetime
+ logdt = "2017-01-23 15:00:00"
+ dtUTC = dt(2017, 1, 23, 15, 0)
+ for tz, log, desired in (
+ # no TZ in input-string:
+ ('UTC+0300', logdt, dt(2017, 1, 23, 12, 0)), # so in UTC, it was noon
+ ('UTC', logdt, dtUTC), # UTC
+ ('UTC-0430', logdt, dt(2017, 1, 23, 19, 30)),
+ ('GMT+12', logdt, dt(2017, 1, 23, 3, 0)),
+ (None, logdt, dt(2017, 1, 23, 14, 0)), # default CET in our test-framework
+ # CET:
+ ('CET', logdt, dt(2017, 1, 23, 14, 0)),
+ ('+0100', logdt, dt(2017, 1, 23, 14, 0)),
+ ('CEST-01', logdt, dt(2017, 1, 23, 14, 0)),
+ # CEST:
+ ('CEST', logdt, dt(2017, 1, 23, 13, 0)),
+ ('+0200', logdt, dt(2017, 1, 23, 13, 0)),
+ ('CET+01', logdt, dt(2017, 1, 23, 13, 0)),
+ ('CET+0100', logdt, dt(2017, 1, 23, 13, 0)),
+ # check offset in minutes:
+ ('CET+0130', logdt, dt(2017, 1, 23, 12, 30)),
+ # TZ in input-string have precedence:
+ ('UTC+0300', logdt+' GMT', dtUTC), # GMT wins
+ ('UTC', logdt+' GMT', dtUTC), # GMT wins
+ ('UTC-0430', logdt+' GMT', dtUTC), # GMT wins
+ (None, logdt+' GMT', dtUTC), # GMT wins
+ ('UTC', logdt+' -1045', dt(2017, 1, 24, 1, 45)), # -1045 wins
+ (None, logdt+' -10:45', dt(2017, 1, 24, 1, 45)), # -1045 wins
+ ('UTC', logdt+' +0945', dt(2017, 1, 23, 5, 15)), # +0945 wins
+ (None, logdt+' +09:45', dt(2017, 1, 23, 5, 15)), # +0945 wins
+ ('UTC+0300', logdt+' Z', dtUTC), # Z wins (UTC)
+ ('GMT+12', logdt+' CET', dt(2017, 1, 23, 14, 0)), # CET wins
+ ('GMT+12', logdt+' CEST', dt(2017, 1, 23, 13, 0)), # CEST wins
+ ('GMT+12', logdt+' CET+0130', dt(2017, 1, 23, 12, 30)), # CET+0130 wins
+ ):
+ logSys.debug('== test %r with TZ %r', log, tz)
+ dd.default_tz=tz; datelog, _ = dd.getTime(log)
+ val = dt.utcfromtimestamp(datelog)
+ self.assertEqual(val, desired,
+ "wrong offset %r != %r by %r with default TZ %r (%r)" % (val, desired, log, tz, dd.default_tz))
+
+ self.assertRaises(ValueError, setattr, dd, 'default_tz', 'WRONG-TZ')
+ dd.default_tz = None
+
def testVariousTimes(self):
"""Test detection of various common date/time formats f2b should understand
"""
diff --git a/fail2ban/tests/files/logs/kerio b/fail2ban/tests/files/logs/kerio
index c9368c22..f7aa0eb7 100644
--- a/fail2ban/tests/files/logs/kerio
+++ b/fail2ban/tests/files/logs/kerio
@@ -25,5 +25,20 @@
# failJSON: { "time": "2013-12-13T01:11:04", "match": true, "host": "218.85.253.185" }
[13/Dec/2013 01:11:04] Attempt to deliver to unknown recipient <marge@aplawrence.com>, from <yu@rrd.com>, IP address 218.85.253.185
+# failJSON: { "time": "2017-05-29T17:29:29", "match": true, "host": "185.140.108.56" }
+[29/May/2017 17:29:29] IP address 185.140.108.56 found in DNS blacklist SpamCop, mail from <noreply-tjgqNffcgPfpbZtpDzasm@oakspaversusa.com> to <info@verinion.com> rejected
+# failJSON: { "time": "2017-05-17T19:43:42", "match": true, "host": "185.140.108.26" }
+[17/May/2017 19:43:42] SMTP: User printer@verinion.com doesn't exist. Attempt from IP address 185.140.108.26.
+# failJSON: { "time": "2017-05-17T19:44:25", "match": true, "host": "184.171.168.211" }
+[17/May/2017 19:44:25] Client with IP address 184.171.168.211 has no reverse DNS entry, connection rejected before SMTP greeting
+
+# failJSON: { "time": "2017-05-17T19:45:27", "match": true, "host": "170.178.167.136" }
+[17/May/2017 19:45:27] Administration login into Web Administration from 170.178.167.136 failed: IP address not allowed
+
+# failJSON: { "time": "2017-05-17T22:14:57", "match": true, "host": "67.211.219.82" }
+[17/May/2017 22:14:57] Message from IP address 67.211.219.82, sender <promo123@goodresponse.site> rejected: sender domain does not exist
+
+# failJSON: { "time": "2017-05-18T07:25:15", "match": true, "host": "212.92.127.112" }
+[18/May/2017 07:25:15] Failed SMTP login from 212.92.127.112 with SASL method CRAM-MD5.
diff --git a/fail2ban/tests/filtertestcase.py b/fail2ban/tests/filtertestcase.py
index 2bb64132..cb0edb06 100644
--- a/fail2ban/tests/filtertestcase.py
+++ b/fail2ban/tests/filtertestcase.py
@@ -289,6 +289,16 @@ class BasicFilter(unittest.TestCase):
("^%Y-%m-%d-%H%M%S.%f %z **",
"^Year-Month-Day-24hourMinuteSecond.Microseconds Zone offset **"))
+ def testGetSetLogTimeZone(self):
+ self.assertEqual(self.filter.getLogTimeZone(), None)
+ self.filter.setLogTimeZone('UTC')
+ self.assertEqual(self.filter.getLogTimeZone(), 'UTC')
+ self.filter.setLogTimeZone('UTC-0400')
+ self.assertEqual(self.filter.getLogTimeZone(), 'UTC-0400')
+ self.filter.setLogTimeZone('UTC+0200')
+ self.assertEqual(self.filter.getLogTimeZone(), 'UTC+0200')
+ self.assertRaises(ValueError, self.filter.setLogTimeZone, 'not-a-time-zone')
+
def testAssertWrongTime(self):
self.assertRaises(AssertionError,
lambda: _assert_equal_entries(self,
@@ -1009,6 +1019,7 @@ def get_monitor_failures_testcase(Filter_):
# stop before tmpdir deleted (just prevents many monitor events)
self.filter.stop()
+ self.filter.join()
def _test_move_into_file(self, interim_kill=False):
diff --git a/fail2ban/tests/servertestcase.py b/fail2ban/tests/servertestcase.py
index becf939c..26096797 100644
--- a/fail2ban/tests/servertestcase.py
+++ b/fail2ban/tests/servertestcase.py
@@ -311,6 +311,10 @@ class Transmitter(TransmitterBase):
"datepattern", "TAI64N", (None, "TAI64N"), jail=self.jailName)
self.setGetTestNOK("datepattern", "%Cat%a%%%g", jail=self.jailName)
+ def testLogTimeZone(self):
+ self.setGetTest("logtimezone", "UTC+0400", "UTC+0400", jail=self.jailName)
+ self.setGetTestNOK("logtimezone", "not-a-time-zone", jail=self.jailName)
+
def testJailUseDNS(self):
self.setGetTest("usedns", "yes", jail=self.jailName)
self.setGetTest("usedns", "warn", jail=self.jailName)
diff --git a/man/jail.conf.5 b/man/jail.conf.5
index 5a75369c..a43346e1 100644
--- a/man/jail.conf.5
+++ b/man/jail.conf.5
@@ -178,6 +178,25 @@ Ensure syslog or the program that generates the log file isn't configured to com
.B logencoding
encoding of log files used for decoding. Default value of "auto" uses current system locale.
.TP
+.B logtimezone
+Force the time zone for log lines that don't have one.
+
+If this option is not specified, log lines from which no explicit time zone has been found are interpreted by fail2ban in its own system time zone, and that may turn to be inappropriate. While the best practice is to configure the monitored applications to include explicit offsets, this option is meant to handle cases where that is not possible.
+
+The supported time zones in this option are those with fixed offset: Z, UTC[+-]hhmm (you can also use GMT as an alias to UTC).
+
+This option has no effect on log lines on which an explicit time zone has been found.
+Examples:
+
+.RS
+.nf
+ logtimezone = UTC
+ logtimezone = UTC+0200
+ logtimezone = GMT-0100
+.fi
+.RE
+
+.TP
.B banaction
banning action (default iptables-multiport) typically specified in the \fI[DEFAULT]\fR section for all jails.
.br