mirror of https://github.com/fail2ban/fail2ban
DOC: some typos, fixes from Vincent Lefevre
parent
5bd8ba0c6f
commit
9a8b449086
|
@ -2,7 +2,7 @@
|
||||||
#
|
#
|
||||||
# Author: Cyril Jaquier
|
# Author: Cyril Jaquier
|
||||||
# Copied from iptables.conf and modified by Yaroslav Halchenko
|
# Copied from iptables.conf and modified by Yaroslav Halchenko
|
||||||
# to fullfill the needs of bugreporter dbts#350746.
|
# to fulfill the needs of bugreporter dbts#350746.
|
||||||
#
|
#
|
||||||
#
|
#
|
||||||
|
|
||||||
|
|
|
@ -79,7 +79,7 @@ blocktype = unreach port
|
||||||
setnum = 10
|
setnum = 10
|
||||||
|
|
||||||
# Option: number for ipfw rule
|
# Option: number for ipfw rule
|
||||||
# Notes: This is meant to be automaticly generated and not overwritten
|
# Notes: This is meant to be automatically generated and not overwritten
|
||||||
# Values: Random value between 10000 and 12000
|
# Values: Random value between 10000 and 12000
|
||||||
rulenum="`echo $((RANDOM%%2000+10000))`"
|
rulenum="`echo $((RANDOM%%2000+10000))`"
|
||||||
|
|
||||||
|
|
|
@ -23,7 +23,7 @@ ignoreregex =
|
||||||
#
|
#
|
||||||
# Assume that the user can inject "from <HOST>" into the imap response
|
# Assume that the user can inject "from <HOST>" into the imap response
|
||||||
# somehow. Write test cases around this to ensure that the combination of
|
# somehow. Write test cases around this to ensure that the combination of
|
||||||
# arbitary user input and IMAP response doesn't inject the wrong IP for
|
# arbitrary user input and IMAP response doesn't inject the wrong IP for
|
||||||
# fail2ban
|
# fail2ban
|
||||||
#
|
#
|
||||||
# Author: Teodor Micu & Yaroslav Halchenko & terence namusonge & Daniel Black
|
# Author: Teodor Micu & Yaroslav Halchenko & terence namusonge & Daniel Black
|
||||||
|
|
Loading…
Reference in New Issue