[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted fail2ban 0.6.0-4 (source all)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 16 Jan 2006 04:05:19 -0500
Source: fail2ban
Binary: fail2ban
Architecture: source all
Version: 0.6.0-4
Distribution: unstable
Urgency: low
Maintainer: bap@debian.org
Changed-By: Yaroslav Halchenko <debian@onerussian.com>
Description: 
 fail2ban   - bans IPs that cause multiple authentication errors
Closes: 352053
Changes: 
 fail2ban (0.6.0-4) unstable; urgency=low
 .
   * Modifications in README.Debian to reflect a "finding" on
     not-AllowedUsers banning which requires default Debian configuration
     of "ChallengeResponseAuthentication no" and "PasswordAuthentication
     yes"
   * Fixed Apache timeregex and timepattern to confirm
     the fomat of time stamp used in Debian's acccess.log (error.log uses
     RFC 2822 format)
   * Added section ApacheAttacks to specify some common patterns of attacks on
     a webserver (awstats.pl as a try). This section stays split from Apache
     since it is of different nature and might be not appropriate for some
     users
   * Forced owner/permissions of log file to be root:adm/640 in postinst and
     logrotate (closes: #352053)
Files: 
 cf0cee1c71e0323868a6e4d611afef8c 611 net optional fail2ban_0.6.0-4.dsc
 7038554c4e8801d07a2816c20894d0b0 15521 net optional fail2ban_0.6.0-4.diff.gz
 8b6e2842e2e09f5b26527b3dbf89064e 35744 net optional fail2ban_0.6.0-4_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFD937oLz4Gnv7CP7IRAnQNAJ9ij9D0+mT2mG65ujURXe6pnAvfWACdG42s
FpUUqxVVAD1xETheJrvsjMY=
=99Iu
-----END PGP SIGNATURE-----


Accepted:
fail2ban_0.6.0-4.diff.gz
  to pool/main/f/fail2ban/fail2ban_0.6.0-4.diff.gz
fail2ban_0.6.0-4.dsc
  to pool/main/f/fail2ban/fail2ban_0.6.0-4.dsc
fail2ban_0.6.0-4_all.deb
  to pool/main/f/fail2ban/fail2ban_0.6.0-4_all.deb



Reply to: