[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted fail2ban 0.8.1-1~bpo40+1 (source all)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 24 Aug 2007 15:25:58 +0200
Source: fail2ban
Binary: fail2ban
Architecture: source all
Version: 0.8.1-1~bpo40+1
Distribution: etch-backports
Urgency: low
Maintainer: Yaroslav Halchenko <debian@onerussian.com>
Changed-By: Jan Wagner <waja@cyconet.org>
Description: 
 fail2ban   - bans IPs that cause multiple authentication errors
Closes: 425746 426050 429263
Changes: 
 fail2ban (0.8.1-1~bpo40+1) etch-backports; urgency=low
 .
   * rebuild for etch
 .
 fail2ban (0.8.1-1) unstable; urgency=low
 .
   * New upstream release.
      Patches absorbed upstream:
       00_daemon_pids.dpatch
       00_iptables_allports.dpatch
       00_vsftp_filter_spaces.dpatch
       00_resolve_all_names.dpatch
       00_HOST_ignoreregex.dpatch
      Patches which needed some tune-up:
       00_ssh_strong_re.dpatch
       00_mail-whois-lines.dpatch
       00_named_refused.dpatch
 .
 fail2ban (0.8.0-5~pre1) UNRELEASED; urgency=low
 .
   * Added optional spaces at the end of failregex for vsftpd.
   * Resolve all "names" which became a part of <HOST>. Previousely only fqdn's
     were resolved
 .
 fail2ban (0.8.0-4) unstable; urgency=low
 .
   * Moved <HOST> expansion into regex.py (closes: #429263). Thanks James
     Andrewartha.
   * Added optional regexp entry for process PID in some entries (closes:
     #426050). Thanks Roderick Schertler.
   * Added a filter pam_generic to catch any login errors.
   * Added iptables-allports.
   * Use /var/run to keep socket file (closes: #425746)
   * Added a filter for named to catch refused/denied queries
   * Added new time template matching named log entries
   * jail.conf has specification of protocol (default to tcp) to be provided to
     banaction
   * Adjusted failregex for sshd filter:
     - anchored properly at the end of line, and source code has .examples
       files to perform testing of the rules.
     - added new explicit rule for users not in the AllowUsers lists
Files: 
 bf0b5229ed954f22ef8837bd3b55cac3 729 net optional fail2ban_0.8.1-1~bpo40+1.dsc
 f0aec78cd5194636174a99c8f26cb8b7 68402 net optional fail2ban_0.8.1.orig.tar.gz
 31cda41c7b54f19448f80b7aef174fc9 24061 net optional fail2ban_0.8.1-1~bpo40+1.diff.gz
 124d35e26d182d20dc420a872362926a 77258 net optional fail2ban_0.8.1-1~bpo40+1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGzuBx9u6Dud+QFyQRApv+AJwMGS3LRzcZJ1aIwiqsSy1O7O3WRwCg09dY
hAGmNWbzpVQPlbaeQhsbY1o=
=Jlt+
-----END PGP SIGNATURE-----


Accepted:
fail2ban_0.8.1-1~bpo40+1.diff.gz
  to pool/main/f/fail2ban/fail2ban_0.8.1-1~bpo40+1.diff.gz
fail2ban_0.8.1-1~bpo40+1.dsc
  to pool/main/f/fail2ban/fail2ban_0.8.1-1~bpo40+1.dsc
fail2ban_0.8.1-1~bpo40+1_all.deb
  to pool/main/f/fail2ban/fail2ban_0.8.1-1~bpo40+1_all.deb
fail2ban_0.8.1.orig.tar.gz
  to pool/main/f/fail2ban/fail2ban_0.8.1.orig.tar.gz


Reply to: