fail2ban/debian/control

31 lines
1.2 KiB
Plaintext
Raw Normal View History

Source: fail2ban
Section: net
Priority: optional
2005-07-07 01:52:07 +00:00
Maintainer: Yaroslav Halchenko <debian@onerussian.com>
2014-09-12 05:08:56 +00:00
Build-Depends: debhelper (>= 9), python3, python3-pyinotify, dh-systemd
Homepage: http://www.fail2ban.org
2012-01-07 23:54:34 +00:00
Vcs-Git: git://github.com/fail2ban/fail2ban.git
Vcs-Browser: http://github.com/fail2ban/fail2ban
2014-10-28 02:02:23 +00:00
Standards-Version: 3.9.6
Package: fail2ban
Architecture: all
2014-09-12 05:08:56 +00:00
Depends: ${python3:Depends}, ${misc:Depends}, lsb-base (>=2.0-7)
Recommends: iptables, whois, python3-pyinotify
Suggests: mailx, system-log-daemon, python3-systemd
Description: ban hosts that cause multiple authentication errors
Fail2ban monitors log files (e.g. /var/log/auth.log,
/var/log/apache/access.log) and temporarily or persistently bans
failure-prone addresses by updating existing firewall rules. Fail2ban allows
easy specification of different actions to be taken such as to ban an
IP using iptables or hostsdeny rules, or simply to send a
notification email.
.
By default, it comes with filter expressions for various services
(sshd, apache, qmail, proftpd, sasl etc.) but configuration can be
easily extended for monitoring any other text file. All filters and
actions are given in the config files, thus fail2ban can be adopted
to be used with a variety of files and firewalls.