fail2ban 0.8.11-1 source package in Ubuntu
Changelog
fail2ban (0.8.11-1) unstable; urgency=low * Fresh upstream release - this release tightens all shipped filters to preclude possible injections leading to targetted DoS attacks. - omitted entry for ~pre release changelog: - asterisk filter was fixed (Closes: #719662), - nginx filter/jail added (Closes: #668064) - better detection of log rotation in polling backend (Closes: #696087) - includes sever name (uname -n) into subject of sendmail actions (Closes: #709196) * debian/jail.conf - dropbear jail: use dropbear filter (instead of ssh) and monitor auth.log instead of non-existing /var/log/dropbear (Closes: #620760) * debian/NEWS - information for change of default iptables action to REJECT now (Closes: #711463) * debian/patches - changeset_d4f6ca4f8531f332bcb7ce3a89102f60afaaa08e.diff post-release change to support native proftpd date format which includes milliseconds (Closes: #648276) - changeset_ac061155f093464fb6cd2329d3d513b15c68e256.diff absorbed upstream -- Yaroslav Halchenko <email address hidden> Sun, 17 Nov 2013 17:29:06 -0500
Upload details
- Uploaded by:
- Yaroslav Halchenko
- Uploaded to:
- Sid
- Original maintainer:
- Yaroslav Halchenko
- Architectures:
- all
- Section:
- net
- Urgency:
- Low Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Trusty | release | universe | net |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
fail2ban_0.8.11-1.dsc | 1.2 KiB | a081a806a4f224361e8d8bc1f5383864e422f75fb6c419bb6b8e47c536309343 |
fail2ban_0.8.11.orig.tar.gz | 200.0 KiB | e7573583c979222c7461df8c875e8328a6cd0e431e86d3cc4d80b2af3447190f |
fail2ban_0.8.11-1.debian.tar.gz | 32.5 KiB | 578a5cee9c5cc871e50d1055e837fc9dedd680d1c4bb2f790e0d1e552e48000f |
Available diffs
No changes file available.
Binary packages built by this source
- fail2ban: ban hosts that cause multiple authentication errors
Fail2ban monitors log files (e.g. /var/log/auth.log,
/var/log/apache/ access. log) and temporarily or persistently bans
failure-prone addresses by updating existing firewall rules. Fail2ban allows
easy specification of different actions to be taken such as to ban an
IP using iptables or hostsdeny rules, or simply to send a
notification email.
.
By default, it comes with filter expressions for various services
(sshd, apache, qmail, proftpd, sasl etc.) but configuration can be
easily extended for monitoring any other text file. All filters and
actions are given in the config files, thus fail2ban can be adopted
to be used with a variety of files and firewalls.