fail2ban 0.11.2-4 source package in Ubuntu
Changelog
fail2ban (0.11.2-4) unstable; urgency=medium * Cherry pick 5ac303df8a171f748330d4c645ccbf1c2c7f3497 to address the 2to3 issue. Thanks to Paul Wise for digging (Closes: #997601) -- Sylvestre Ledru <email address hidden> Tue, 11 Jan 2022 09:12:57 +0100
Upload details
- Uploaded by:
- Debian Python Team
- Uploaded to:
- Sid
- Original maintainer:
- Debian Python Team
- Architectures:
- all
- Section:
- net
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
fail2ban_0.11.2-4.dsc | 2.0 KiB | 1d3898f52f9aa86ede6883bff4c7b9a40709131112fb53de41d0208cb3d66c56 |
fail2ban_0.11.2.orig.tar.gz | 546.4 KiB | 383108e5f8644cefb288537950923b7520f642e7e114efb843f6e7ea9268b1e0 |
fail2ban_0.11.2-4.debian.tar.xz | 31.4 KiB | 65618352f061923b4246907ee429dd0f218e51abbe3df416babca5308b9fdc42 |
Available diffs
- diff from 0.11.2-2 to 0.11.2-4 (5.1 KiB)
- diff from 0.11.2-3 to 0.11.2-4 (1.5 KiB)
No changes file available.
Binary packages built by this source
- fail2ban: ban hosts that cause multiple authentication errors
Fail2ban monitors log files (e.g. /var/log/auth.log,
/var/log/apache/ access. log) and temporarily or persistently bans
failure-prone addresses by updating existing firewall rules. Fail2ban
allows easy specification of different actions to be taken such as to ban
an IP using iptables or hostsdeny rules, or simply to send a notification
email.
.
By default, it comes with filter expressions for various services
(sshd, Apache, proftpd, sasl, etc.) but configuration can be
easily extended for monitoring any other text file. All filters and
actions are given in the config files, thus fail2ban can be adopted
to be used with a variety of files and firewalls. Following recommends
are listed:
.
- iptables/nftables -- default installation uses iptables for banning.
nftables is also supported. You most probably need it
- whois -- used by a number of *mail-whois* actions to send notification
emails with whois information about attacker hosts. Unless you will use
those you don't need whois
- python3-pyinotify -- unless you monitor services logs via systemd, you
need pyinotify for efficient monitoring for log files changes