Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Bug] Fail2Ban lost logs after updating 1Panel! #7705

Open
ahong18s opened this issue Jan 13, 2025 · 4 comments
Open

[Bug] Fail2Ban lost logs after updating 1Panel! #7705

ahong18s opened this issue Jan 13, 2025 · 4 comments

Comments

@ahong18s
Copy link

Contact Information

[email protected]

1Panel Version

v1.10.23-lts

Problem Description

每天早上,我都会检查“SSH登录日志”,若新增了登录拦截则将IP复制到WAF黑名单里(手动减少被攻击的几率)。

但是,今天早上发现“SSH登录日志”的数量明显变少了,观察日期列,也不是最后一次的2024年12月了,而是以前的日期。

这意味着,日志丢失了一部分。最近一次查看“SSH登录日志”是在两天前的早上,更新1Panel的版本也是同样的时间,即2025-01-11 08。

详见附件的截图。

Steps to Reproduce

1.从 v1.10.22-lts 更新到 v1.10.23-lts
2.查看SSH登录日志,尤其是去年的。

The expected correct result

显示丢失的日志。

Related log output

No response

Additional Information

https://github.com/ahong18s/ISSUE/blob/master/1panel/%E6%9B%B4%E6%96%B01Panel%E7%89%88%E6%9C%AC%E5%90%8E%E4%B8%A2%E5%A4%B1%E6%97%A5%E5%BF%97%EF%BC%9F_2025-01-13_08-19-48.png

@wanghe-fit2cloud wanghe-fit2cloud changed the title [Bug] Fail2Ban 丢失日志,在更新1Panel 后! [Bug] Fail2Ban lost logs after updating 1Panel! Jan 13, 2025
@ahong18s
Copy link
Author

反向说明问题:在Fail2Ban的拦截黑名单里,是有许多的IP,但在“SSH登录日志”里没有这些IP。

@wanghe-fit2cloud
Copy link
Member

Bot detected the issue body's language is not English, translate it automatically. 👯👭🏻🧑‍🤝‍🧑👫🧑🏿‍🤝‍🧑🏻👩🏾‍🤝‍👨🏿👬🏿


Reverse explanation of the problem: There are many IPs in Fail2Ban's interception blacklist, but there are no such IPs in the "SSH login log".

@ssongliu
Copy link
Member

感谢反馈,麻烦执行下面命令看看返回信息:

cat /var/log/auth.log* | grep -aE "(Failed password for|Connection closed by authenticating user|Accepted)"

cat /var/log/secure* | grep -aE '(Failed password for|Accepted)'

@ahong18s
Copy link
Author

感谢反馈,麻烦执行下面命令看看返回信息:

cat /var/log/auth.log* | grep -aE "(Failed password for|Connection closed by authenticating user|Accepted)"

cat /var/log/secure* | grep -aE '(Failed password for|Accepted)'
root@server:~# cat /var/log/auth.log* | grep -aE "(Failed password for|Connection closed by authenticating user|Accepted)"
2025-01-13T08:33:43.848352+08:00 server sshd[162239]: Accepted password for root from 120.224.115.62 port 51272 ssh2
2025-01-13T10:44:04.770993+08:00 server sshd[168022]: Accepted password for root from 120.224.115.62 port 11067 ssh2
Oct 10 01:24:54 server sshd[1545]: Accepted password for root from 120.224.115.62 port 21176 ssh2
Oct 10 01:39:50 server sshd[928]: Accepted password for root from 120.224.115.62 port 56357 ssh2
Oct 10 02:13:44 server sshd[954]: Accepted password for root from 120.224.115.62 port 52883 ssh2
2024-10-10T02:43:44.574792+00:00 server sshd[1046]: Accepted password for root from 120.224.115.62 port 46007 ssh2
2024-10-10T03:02:16.458496+00:00 server sshd[3752]: Accepted password for root from 120.224.115.62 port 17417 ssh2
2024-10-10T03:14:06.634116+00:00 server sshd[4105]: Connection closed by authenticating user root 127.0.0.1 port 58268 [preauth]
2024-10-10T03:18:13.831049+00:00 server sshd[4906]: Accepted password for root from 120.224.115.62 port 49931 ssh2
2024-10-10T03:20:38.619957+00:00 server sshd[4992]: Accepted password for root from 120.224.115.62 port 53910 ssh2
2024-10-10T03:40:17.420849+00:00 server sshd[8249]: Connection closed by authenticating user root 127.0.0.1 port 55354 [preauth]
2024-10-10T06:19:56.763093+00:00 server sshd[59737]: Accepted password for root from 120.224.115.62 port 48119 ssh2
2024-10-10T09:16:56.746702+00:00 server sshd[60012]: Accepted password for root from 120.224.115.62 port 60263 ssh2
2024-10-10T17:21:08.209281+08:00 server sshd[60174]: Accepted password for root from 120.224.115.62 port 3820 ssh2
2024-10-10T17:41:27.055717+08:00 server sshd[1725]: Accepted password for root from 120.224.115.62 port 47178 ssh2
2024-10-11T19:37:04.539409+08:00 server sshd[30304]: Accepted password for root from 123.168.249.237 port 1148 ssh2
2024-10-11T21:29:21.512881+08:00 server sshd[39992]: Failed password for root from 141.98.10.96 port 42440 ssh2
2024-10-11T21:29:42.632539+08:00 server sshd[39994]: Failed password for invalid user test from 141.98.10.96 port 44620 ssh2
2024-10-25T20:08:49.007311+08:00 server sshd[528561]: Accepted password for root from 123.168.249.237 port 4953 ssh2
root@server:~# cat /var/log/secure* | grep -aE '(Failed password for|Accepted)'
cat: '/var/log/secure*': No such file or directory

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants