Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/MHSanaei/3x-ui.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorpwnnex <eternxles@gmail.com>2026-04-22 18:50:42 +0300
committerpwnnex <eternxles@gmail.com>2026-04-22 18:50:42 +0300
commit71ac92043681318153cec6d82062cf79d53ef280 (patch)
tree2eb4684ec032c76817bdd168df0c0d4bc9900898
parente6d0c33937f5776911e5fc1e9d8015d8a9323450 (diff)
x-ui.sh: install nftables alongside fail2ban in install_iplimit
On fresh Debian 12+, Ubuntu 24+ and recent RHEL-family minimal images the fail2ban package ships with `banaction = nftables-multiport` as the default in /etc/fail2ban/jail.conf but does not pull in the `nftables` package as a dependency. The first SSH brute-force attempt hits the default sshd jail and fail2ban logs stderr: /bin/sh: 1: nft: not found returned 127 -- HINT on 127: "Command not found" repeatedly, which users mistake for a 3x-ui regression (see the discussion on #4083). The 3x-ipl jail itself is unaffected — it uses an iptables-based action configured in create_iplimit_jails — so this is only stray noise, but noisy enough to look like a real failure on first install. Add `nftables` to the package list in every branch of install_iplimit so new installs end up with a working default sshd jail out of the box. Existing installs where `nftables` is already present are a no-op.
-rw-r--r--x-ui.sh25
1 files changed, 16 insertions, 9 deletions
diff --git a/x-ui.sh b/x-ui.sh
index 9ce7a066..d061ff84 100644
--- a/x-ui.sh
+++ b/x-ui.sh
@@ -1802,7 +1802,14 @@ install_iplimit() {
if ! command -v fail2ban-client &>/dev/null; then
echo -e "${green}Fail2ban is not installed. Installing now...!${plain}\n"
- # Check the OS and install necessary packages
+ # Install fail2ban together with nftables. Recent fail2ban packages
+ # default to `banaction = nftables-multiport` in /etc/fail2ban/jail.conf,
+ # but the `nftables` package isn't pulled in as a dependency on most
+ # minimal server images (Debian 12+, Ubuntu 24+, fresh RHEL-family).
+ # Without `nft` in PATH the default sshd jail fails to ban with
+ # stderr: '/bin/sh: 1: nft: not found'
+ # even though our own 3x-ipl jail uses iptables. Bundling the binary
+ # at install time prevents that confusing log spam for new installs.
case "${release}" in
ubuntu)
apt-get update
@@ -1810,34 +1817,34 @@ install_iplimit() {
apt-get install python3-pip -y
python3 -m pip install pyasynchat --break-system-packages
fi
- apt-get install fail2ban -y
+ apt-get install fail2ban nftables -y
;;
debian)
apt-get update
if [ "$os_version" -ge 12 ]; then
apt-get install -y python3-systemd
fi
- apt-get install -y fail2ban
+ apt-get install -y fail2ban nftables
;;
armbian)
- apt-get update && apt-get install fail2ban -y
+ apt-get update && apt-get install fail2ban nftables -y
;;
fedora | amzn | virtuozzo | rhel | almalinux | rocky | ol)
- dnf -y update && dnf -y install fail2ban
+ dnf -y update && dnf -y install fail2ban nftables
;;
centos)
if [[ "${VERSION_ID}" =~ ^7 ]]; then
yum update -y && yum install epel-release -y
- yum -y install fail2ban
+ yum -y install fail2ban nftables
else
- dnf -y update && dnf -y install fail2ban
+ dnf -y update && dnf -y install fail2ban nftables
fi
;;
arch | manjaro | parch)
- pacman -Syu --noconfirm fail2ban
+ pacman -Syu --noconfirm fail2ban nftables
;;
alpine)
- apk add fail2ban
+ apk add fail2ban nftables
;;
*)
echo -e "${red}Unsupported operating system. Please check the script and install the necessary packages manually.${plain}\n"