mirror of https://github.com/fail2ban/fail2ban
d/control: add nftables references
The nftables framework replaces iptables. The fail2ban software already includes support for nftables, so reflect that in the packaging. Also, no need to `Recommends: iptables`, since is installed by default in every Debian system. Instead, do `Recommends: nftables`. Signed-off-by: Arturo Borrero Gonzalez <arturo@debian.org>pull/2221/head
parent
400b260a32
commit
b67dc5e908
|
@ -17,7 +17,7 @@ Standards-Version: 4.1.3
|
||||||
Package: fail2ban
|
Package: fail2ban
|
||||||
Architecture: all
|
Architecture: all
|
||||||
Depends: ${python3:Depends}, ${misc:Depends}, lsb-base (>=2.0-7)
|
Depends: ${python3:Depends}, ${misc:Depends}, lsb-base (>=2.0-7)
|
||||||
Recommends: python, iptables, whois, python3-pyinotify, python3-systemd
|
Recommends: python, nftables, whois, python3-pyinotify, python3-systemd
|
||||||
Suggests: mailx, system-log-daemon, monit, sqlite3
|
Suggests: mailx, system-log-daemon, monit, sqlite3
|
||||||
Description: ban hosts that cause multiple authentication errors
|
Description: ban hosts that cause multiple authentication errors
|
||||||
Fail2ban monitors log files (e.g. /var/log/auth.log,
|
Fail2ban monitors log files (e.g. /var/log/auth.log,
|
||||||
|
@ -34,8 +34,8 @@ Description: ban hosts that cause multiple authentication errors
|
||||||
to be used with a variety of files and firewalls. Following recommends
|
to be used with a variety of files and firewalls. Following recommends
|
||||||
are listed:
|
are listed:
|
||||||
.
|
.
|
||||||
- iptables -- default installation uses iptables for banning. You most
|
- iptables/nftables -- default installation uses iptables for banning.
|
||||||
probably need it
|
nftables is also suported. You most probably need it
|
||||||
- whois -- used by a number of *mail-whois* actions to send notification
|
- whois -- used by a number of *mail-whois* actions to send notification
|
||||||
emails with whois information about attacker hosts. Unless you will use
|
emails with whois information about attacker hosts. Unless you will use
|
||||||
those you don't need whois
|
those you don't need whois
|
||||||
|
|
Loading…
Reference in New Issue