[27759]: ERROR Failed to execute ban jail ‘sshd’ action in fail2ban log

On my Debian 8 server, I see lots of this error in fail2ban log.

 [27759]: ERROR   Failed to execute ban jail 'sshd' action 'iptables-multiport' info 'ActionInfo({'ip': '1.1.2.2', 'fam ily': 'inet4', 'ip-rev': '2.2.1.1.', 'ip-host': '210994.cloudwaysapps.com', 'fid': '1.1.2.2', 'failures': 3, 'time': 1547974803.0, 'matches': 'Jan 20 04:00:01  chat sshd[1326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.1.2.2 \nJan 20 04:00:03 chat sshd[1326]: Failed password f or invalid user guest from 1.1.2.2 port 40633 ssh2', 'restored': 0, 'F-*': {'matches': ['Jan 20 04:00:01 chat sshd[1326]: pam_unix(sshd:auth): authentication failure;  logname= uid=0 euid=0 tty=ssh ruser= rhost=1.1.2.2 ', 'Jan 20 04:00:03 chat sshd[1326]: Failed password for invalid user guest from 1.1.2.2 port 40633 ssh2'] , 'failures': 3, 'mlfid': ' chat sshd[1326]: ', 'user': 'guest', 'ip4': '1.1.2.2'}, 'ipmatches': 'Jan 20 04:00:01 chat sshd[1326]: pam_unix(sshd:auth): authentication  failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.1.2.2 \nJan 20 04:00:03 chat sshd[1326]: Failed password for invalid user guest from 1.1.2.2 port 40633  ssh2', 'ipjailmatches': 'Jan 20 04:00:01 chat sshd[1326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.1.2.2 \nJan 20 04 :00:03 chat sshd[1326]: Failed password for invalid user guest from 1.1.2.2 port 40633 ssh2', 'ipfailures': 3, 'ipjailfailures': 3})': Error banning 1.1.2.2 2019-01-20 04:01:24,018 fail2ban.actions   

I’m wondering what this error mean and how to fix it?

Are most Linux systems that allow non-root users to execute code straightforwardly rootable?


long story short if you can execute code on a box it is usually straightforward to get root

(quote source)

The immediate implication of this quote (if it’s accurate) is that if you’re running a multi-user system and don’t try your darndest to prevent all users from creating files with x permission set, the system is as good as compromised. The corollary is that operating a multi-user system, such as ones typically found in universities, that by design allow all students to do exercises in C, C++, assembly etc, is pointless, since any student can straightforwardly root this system.

Since running computer systems intended to be used by more people than their owners is not considered pointless, and privilege limiting facilities (users’ rights management, sandboxing, etc etc) are not considered useless, I somehow doubt these kinds of comments. But what do I know?

Is it true that most Linux systems are straightforwardly rootable by anyone who can execute code on them?

How to get remote script to execute through sudo via expect script

I’ve seen a number of other posts that are so tantalizingly close to my issue; but I still can’t get this to work.

I want to be able to run ssh into a server, sudo to another account and then run complex shell scripts.

The script I’m running now actually shows it sending the command to run the actual test script but, the one line in it never runs (ie echo “Hello” > /tmp/out).

The target and client os are both AIX 7.1.00

I’m at the end of things to try.

Any suggestions would be awesome!

!/usr/bin/expect

set user roywalker11 set host sea1a2pappu248 set pass xxxxxx set suto cwowdev1

set timeout 10 exp_internal 0

spawn /usr/bin/ssh $ user@$ host expect { -glob “corp:” { send “sudo su – $ suto\r” expect { -glob “$ suto” { send “$ pass\r” expect { -glob “48:” { send “/tmp/rcwt.ksh\r” } } } } } }

Failed to execute ‘json’ on ‘Response’: body stream is locked

I am following this article and get the following error in the console.log

Uncaught (in promise) TypeError: Failed to execute 'json' on 'Response': body stream is locked     at e.json (sp-pages-assembly_en-us_5d8862cf2c0cc1538b9ce027f59ea4e9.js:1133) 

The code from the article is as below

 **this.context.aadHttpClientFactory       .getClient('https://tenant.onmicrosoft.com/6b347c27-f360-47ac-b4d4-af78d0da4223')       .then((client: AadHttpClient): void => {         client           .get('https://myfunction.azurewebsites.net/api/CurrentUser', AadHttpClient.configurations.v1)           .then((response: HttpClientResponse): Promise<JSON> => {             return response.json();           })           .then((responseJSON: JSON): void => {             //Display the JSON in a table             var claimsTable = this.domElement.getElementsByClassName("azFuncClaimsTable")[0];             for (var key in responseJSON) {               var trElement = document.createElement("tr");               trElement.innerHTML = `<td class="$  {styles.azFuncCell}">$  {key}</td><td class="$  {styles.azFuncCell}">$  {responseJSON[key]}</td>`;               claimsTable.appendChild(trElement);             }           });** 

In the second .then chain the JSON object is undefined and also the response.json() is empty.

Is there something I am missing.

Send commands to current window and execute in child window

Does exist a program that change the behaviour of window screen application like (always in top) but with the functionaliry of On screen keyboard windows ?

I want to have this functionality, set window always in top but when I digit a keyboard in the main window (always in top) run command keyboard in the child window, this funcionality I saw in On screen keyboard windows.

Is there a method to keep the url text unchanged while execute 301 redirect successfully?

Suppose my drupal site domain is www.xxx.com, and I have a 301 redirect from aaa.xxx.com to www.xxx.com/aaa. I want the address in the web browser keep unchanged even when the redirect successfully executes, which means that aaa.xxx.com behaves like the alias of www.xxx.com/aaa.

More ideal, if www.xxx.com/aaa has a subpath bbb or any other sub-sub path, navigation to the url of www.xxx.com/aaa/bbb… only shows the address of aaa.xxx.com/bbb.... In brief, I need all the accesses to www.xxx.com/aaa are hidden for the user, and “pretended” to be aaa.xxx.com.

Is there a method to do that?