Releases: DigitalRuby/IPBan
Releases · DigitalRuby/IPBan
IPBan 1.6.1
- User name whitelist edit distance was not working correctly
- When log file config other than path/mask was changed, the changes did not force a config reload
- Add additional delimiters to ignore text for firewall uri rules
- Fix a bug where some rdp successful logins were not recognized
IPBan 1.6.0
- Call process to run on unban when service starts and clear ip addresses is true
- Fix uninstall script on Windows when folder does not exist
- Log version upon startup
- Add
FailedLoginLogLevel
andSuccessfulLoginLogLevel
option for log file entries andLogLevel
option event viewer entries. This log level will be used when writing the event to the log file. Default isWarning
if not specified. - Fix issue when starting regex with a
\n
for log file parsing. - Don't fail or ban internal ip addresses
- Handle bad auth types for ms exchange
- Add option to process internal ip addresses
IPBan 1.5.9
- Add process to run on unban option
- Fix null reference exception merging override config if some elements were deleted or comments were added
IPBan 1.5.8
- Upgrade to .NET 5
- Single file executable
- Code sign the binaries
- Massive regex performance increase
- Improve Linux firewall performance by only filtering tcp syn packets
IPBan 1.5.7
- Add
ClearFailedLoginsOnSuccessfulLogin
config property to clear failed logins upon successful login for an ip address - Add SVN failed logins
- Cleanup parsing of
ipaddress_exact
group - Add retry for dns lookups in case of blips
- Create rule pro-actively for any ip addresses or ip address ranges in the whitelist or blacklist
- Rename DigitalRuby.IPBan.dll.config file to ipban.config. Upon service update, the old file will be copied to the new file (if it exists) and then the old file will be removed.
IPBan 1.5.6
- Use .NET core service framework instead of custom built service framework
- Add RRAS failed and successful logins to default configuration
IPBan 1.5.5
- IMPORTANT: Please update your config file with this update, the regex performance alone is well worth it!
- Allow
FailedLoginRegexTimestampFormat
andSuccessfulLoginRegexTimestampFormat
in configuration for log files. - Add support for glob syntax for
PathAndMask
for log files. - Remove
Recursive
property for log files. Glob syntax/**/
can be used instead for recursion. - Fix bug with recursive directories in log file parsing forgetting log files.
- Add more precise MS Exchange log file parsing path/mask.
- Greatly improve regular expression performance.
- Modify log file regex parsing to parse all the upcoming lines as a single text blob. This should make multi-line matching much easier.
- Update Windows install script to add restart logic for the service.
- Attempt to fix an issue where a WMI query after a Windows reboot with updates would cause the service to fail to start.
IPBan 1.5.4
- Throw exception on Windows if the Windows firewall is disabled
- Add Postgres failed logins for Windows
- Rename config item
FirewallUriSources
toFirewallUriRules
- Allow
timestamp
regex group for logfile entries - Null ref and stackoverflow fix
- Additional process check for successful logins
IPBan 1.5.3.0
- Fix whitelist and blacklist regex to work properly in all cases
IPBan 1.5.2.0
- New config option 'FirewallUriSources' which can plug into file or web uri's to get shared ban lists and auto-generate firewall rules. Defaults to https://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt.
- Add source and user name to the sqlite db.
- Fix blacklisting of user names.
- Add user name whitelist regex property to config.
- Better catch-all for provider check for failed SQL Server logins.
- Move to .net core 3.