Merge pull request #397 from yarikoptic/_enh/unify_default_strings

DOC: enh/unify "Default:" strings
pull/404/head
Daniel Black 2013-10-22 04:36:41 -07:00
commit c2b76d1fd0
4 changed files with 31 additions and 31 deletions

View File

@ -78,7 +78,7 @@ logpath = /dev/null
# Option: mailcmd # Option: mailcmd
# Notes.: Your system mail command. Is passed 2 args: subject and recipient # Notes.: Your system mail command. Is passed 2 args: subject and recipient
# Values: CMD Default: mail -s # Values: CMD
# #
mailcmd = mail -s mailcmd = mail -s
@ -89,7 +89,7 @@ mailcmd = mail -s
# Appear to come from a different address - the '--' indicates # Appear to come from a different address - the '--' indicates
# arguments to be passed to Sendmail: # arguments to be passed to Sendmail:
# -- -f me@example.com # -- -f me@example.com
# Values: [ STRING ] Default: (empty) # Values: [ STRING ]
# #
mailargs = mailargs =

View File

@ -106,7 +106,7 @@ actionunban = if [ -f <tmpfile>.first ]; then
# Option: port # Option: port
# Notes.: The target port for the attack (numerical). MUST be provided in the # Notes.: The target port for the attack (numerical). MUST be provided in the
# jail config, as it cannot be detected here. # jail config, as it cannot be detected here.
# Values: [ NUM ] Default: ??? # Values: [ NUM ]
# #
port = ??? port = ???
@ -114,7 +114,7 @@ port = ???
# Notes.: Your DShield user ID. Should be provided either in the jail config or # Notes.: Your DShield user ID. Should be provided either in the jail config or
# in a .local file. # in a .local file.
# Register at https://secure.dshield.org/register.html # Register at https://secure.dshield.org/register.html
# Values: [ NUM ] Default: 0 # Values: [ NUM ]
# #
userid = 0 userid = 0
@ -137,7 +137,7 @@ protocol = tcp
# Notes.: How many lines to buffer before making a report. Regardless of this, # Notes.: How many lines to buffer before making a report. Regardless of this,
# reports are sent a minimum of <minreportinterval> apart, or if the # reports are sent a minimum of <minreportinterval> apart, or if the
# buffer contains an event over <maxbufferage> old, or on shutdown # buffer contains an event over <maxbufferage> old, or on shutdown
# Values: [ NUM ] Default: 50 # Values: [ NUM ]
# #
lines = 50 lines = 50
@ -145,7 +145,7 @@ lines = 50
# Notes.: Minimum period (in seconds) that must elapse before we submit another # Notes.: Minimum period (in seconds) that must elapse before we submit another
# batch of reports. DShield request a minimum of 1 hour (3600 secs) # batch of reports. DShield request a minimum of 1 hour (3600 secs)
# between reports. # between reports.
# Values: [ NUM ] Default: 3600 # Values: [ NUM ]
# #
minreportinterval = 3600 minreportinterval = 3600
@ -154,27 +154,27 @@ minreportinterval = 3600
# submit the batch, even if we haven't reached <lines> yet. Note that # submit the batch, even if we haven't reached <lines> yet. Note that
# this is only checked on each ban/unban, and that we always send # this is only checked on each ban/unban, and that we always send
# anything in the buffer on shutdown. Must be greater than # anything in the buffer on shutdown. Must be greater than
# Values: [ NUM ] Default: 21600 (6 hours) # Values: [ NUM ]
# #
maxbufferage = 21600 maxbufferage = 21600
# Option: srcport # Option: srcport
# Notes.: The source port of the attack. You're unlikely to have this info, so # Notes.: The source port of the attack. You're unlikely to have this info, so
# you can leave the default # you can leave the default
# Values: [ NUM ] Default: ??? # Values: [ NUM ]
# #
srcport = ??? srcport = ???
# Option: tcpflags # Option: tcpflags
# Notes.: TCP flags on attack. You're unlikely to have this info, so you can # Notes.: TCP flags on attack. You're unlikely to have this info, so you can
# leave empty # leave empty
# Values: [ STRING ] Default: (empty) # Values: [ STRING ]
# #
tcpflags = tcpflags =
# Option: mailcmd # Option: mailcmd
# Notes.: Your system mail command. Is passed 2 args: subject and recipient # Notes.: Your system mail command. Is passed 2 args: subject and recipient
# Values: CMD Default: mail -s # Values: CMD
# #
mailcmd = mail -s mailcmd = mail -s
@ -186,19 +186,19 @@ mailcmd = mail -s
# the one configured at DShield - the '--' indicates arguments to be # the one configured at DShield - the '--' indicates arguments to be
# passed to Sendmail): # passed to Sendmail):
# -- -f me@example.com # -- -f me@example.com
# Values: [ STRING ] Default: (empty) # Values: [ STRING ]
# #
mailargs = mailargs =
# Option: dest # Option: dest
# Notes.: Destination e-mail address for reports # Notes.: Destination e-mail address for reports
# Values: [ STRING ] Default: reports@dshield.org # Values: [ STRING ]
# #
dest = reports@dshield.org dest = reports@dshield.org
# Option: tmpfile # Option: tmpfile
# Notes.: Base name of temporary files used for buffering # Notes.: Base name of temporary files used for buffering
# Values: [ STRING ] Default: /var/run/fail2ban/tmp-dshield # Values: [ STRING ]
# #
tmpfile = /var/run/fail2ban/tmp-dshield tmpfile = /var/run/fail2ban/tmp-dshield

View File

@ -56,7 +56,7 @@ actionunban = /sbin/pfctl -t <tablename> -T delete <ip>/32
[Init] [Init]
# Option: tablename # Option: tablename
# Notes.: The pf table name. # Notes.: The pf table name.
# Values: [ STRING ] Default: fail2ban # Values: [ STRING ]
# #
tablename = fail2ban tablename = fail2ban

View File

@ -11,24 +11,24 @@
[Definition] [Definition]
# Option: loglevel # Option: loglevel
# Notes.: Set the log level output. # Notes.: Set the log level output.
# 1 = ERROR # 1 = ERROR
# 2 = WARN # 2 = WARN
# 3 = INFO # 3 = INFO
# 4 = DEBUG # 4 = DEBUG
# Values: NUM Default: 3 # Values: [ NUM ] Default: 1
# #
loglevel = 3 loglevel = 3
# Option: logtarget # Option: logtarget
# Notes.: Set the log target. This could be a file, SYSLOG, STDERR or STDOUT. # Notes.: Set the log target. This could be a file, SYSLOG, STDERR or STDOUT.
# Only one log target can be specified. # Only one log target can be specified.
# If you change logtarget from the default value and you are # If you change logtarget from the default value and you are
# using logrotate -- also adjust or disable rotation in the # using logrotate -- also adjust or disable rotation in the
# corresponding configuration file # corresponding configuration file
# (e.g. /etc/logrotate.d/fail2ban on Debian systems) # (e.g. /etc/logrotate.d/fail2ban on Debian systems)
# Values: STDOUT STDERR SYSLOG file Default: /var/log/fail2ban.log # Values: [ STDOUT | STDERR | SYSLOG | FILE ] Default: STDERR
# #
logtarget = /var/log/fail2ban.log logtarget = /var/log/fail2ban.log
@ -36,14 +36,14 @@ logtarget = /var/log/fail2ban.log
# Notes.: Set the socket file. This is used to communicate with the daemon. Do # Notes.: Set the socket file. This is used to communicate with the daemon. Do
# not remove this file when Fail2ban runs. It will not be possible to # not remove this file when Fail2ban runs. It will not be possible to
# communicate with the server afterwards. # communicate with the server afterwards.
# Values: FILE Default: /var/run/fail2ban/fail2ban.sock # Values: [ FILE ] Default: /var/run/fail2ban/fail2ban.sock
# #
socket = /var/run/fail2ban/fail2ban.sock socket = /var/run/fail2ban/fail2ban.sock
# Option: pidfile # Option: pidfile
# Notes.: Set the PID file. This is used to store the process ID of the # Notes.: Set the PID file. This is used to store the process ID of the
# fail2ban server. # fail2ban server.
# Values: FILE Default: /var/run/fail2ban/fail2ban.pid # Values: [ FILE ] Default: /var/run/fail2ban/fail2ban.pid
# #
pidfile = /var/run/fail2ban/fail2ban.pid pidfile = /var/run/fail2ban/fail2ban.pid