* tuned description to satisfy lintian

* went to a new Stadards-Version
* adjusted shipped config to ignore all private nets of 
  class A, so mask is /16, not /24
debian-releases/etch
Yaroslav Halchenko 2005-07-13 10:19:20 +00:00
parent ce98955f34
commit 8c17f3180f
2 changed files with 6 additions and 4 deletions

View File

@ -47,7 +47,7 @@ bantime = 600
# Example: ignoreip = 192.168.0.1/24 123.45.235.65 # Example: ignoreip = 192.168.0.1/24 123.45.235.65
# Values: IP Default: 192.168.0.0/24 # Values: IP Default: 192.168.0.0/24
# #
ignoreip = 192.168.0.0/24 ignoreip = 192.168.0.0/16
# Option: cmdstart # Option: cmdstart
# Notes.: command executed once at the start of Fail2Ban # Notes.: command executed once at the start of Fail2Ban

8
debian/control vendored
View File

@ -3,16 +3,18 @@ Section: net
Priority: optional Priority: optional
Maintainer: Yaroslav Halchenko <debian@onerussian.com> Maintainer: Yaroslav Halchenko <debian@onerussian.com>
Build-Depends-Indep: debhelper (>= 4.1.67), python, python2.3-dev, help2man Build-Depends-Indep: debhelper (>= 4.1.67), python, python2.3-dev, help2man
Standards-Version: 3.6.1 Standards-Version: 3.6.2
Package: fail2ban Package: fail2ban
Architecture: all Architecture: all
Depends: python, iptables Depends: python, iptables
Description: Fail2ban bans IPs that cause multiple authentication errors Description: bans IPs that cause multiple authentication errors for ssh/apache
Fail2ban monitors log files (e.g. /var/log/auth.log, Monitors (in daemon mode) or just scans log files (e.g. /var/log/auth.log,
/var/log/apache/access.log) and temporarily bans failure-prone /var/log/apache/access.log) and temporarily bans failure-prone
addresses by updating existing firewall rules. Currently, iptables, addresses by updating existing firewall rules. Currently, iptables,
ipfwadm and ipfw are supported. ipfwadm and ipfw are supported.
. .
Fail2ban is written in python.
.
Homepage: http://www.sourceforge.net/projects/fail2ban Homepage: http://www.sourceforge.net/projects/fail2ban