fail2ban 0.8.11-1 source package in Ubuntu

Changelog

fail2ban (0.8.11-1) unstable; urgency=low


  * Fresh upstream release
    - this release tightens all shipped filters to preclude
      possible injections leading to targetted DoS attacks.
    - omitted entry for ~pre release changelog:
      - asterisk filter was fixed (Closes: #719662),
      - nginx filter/jail added (Closes: #668064)
      - better detection of log rotation in polling backend (Closes: #696087)
      - includes sever name (uname -n) into subject of sendmail actions
        (Closes: #709196)
  * debian/jail.conf
    - dropbear jail: use dropbear filter (instead of ssh) and monitor
      auth.log instead of non-existing /var/log/dropbear (Closes: #620760)
  * debian/NEWS
    - information for change of default iptables action to REJECT now
      (Closes: #711463)
  * debian/patches
    - changeset_d4f6ca4f8531f332bcb7ce3a89102f60afaaa08e.diff
      post-release change to support native proftpd date format which
      includes milliseconds (Closes: #648276)
    - changeset_ac061155f093464fb6cd2329d3d513b15c68e256.diff
      absorbed upstream

 -- Yaroslav Halchenko <email address hidden>  Sun, 17 Nov 2013 17:29:06 -0500

Upload details

Uploaded by:
Yaroslav Halchenko
Uploaded to:
Sid
Original maintainer:
Yaroslav Halchenko
Architectures:
all
Section:
net
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Trusty release universe net

Builds

Trusty: [FULLYBUILT] i386

Downloads

File Size SHA-256 Checksum
fail2ban_0.8.11-1.dsc 1.2 KiB a081a806a4f224361e8d8bc1f5383864e422f75fb6c419bb6b8e47c536309343
fail2ban_0.8.11.orig.tar.gz 200.0 KiB e7573583c979222c7461df8c875e8328a6cd0e431e86d3cc4d80b2af3447190f
fail2ban_0.8.11-1.debian.tar.gz 32.5 KiB 578a5cee9c5cc871e50d1055e837fc9dedd680d1c4bb2f790e0d1e552e48000f

No changes file available.

Binary packages built by this source

fail2ban: ban hosts that cause multiple authentication errors

 Fail2ban monitors log files (e.g. /var/log/auth.log,
 /var/log/apache/access.log) and temporarily or persistently bans
 failure-prone addresses by updating existing firewall rules. Fail2ban allows
 easy specification of different actions to be taken such as to ban an
 IP using iptables or hostsdeny rules, or simply to send a
 notification email.
 .
 By default, it comes with filter expressions for various services
 (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be
 easily extended for monitoring any other text file. All filters and
 actions are given in the config files, thus fail2ban can be adopted
 to be used with a variety of files and firewalls.