summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorYaroslav Halchenko <debian@onerussian.com>2015-07-31 21:50:00 -0400
committerYaroslav Halchenko <debian@onerussian.com>2015-07-31 22:16:25 -0400
commitdce6e1cd3ab8c909b3935d42e69374ba7ac7fbf9 (patch)
tree7a5d2833f5c098f0a583979aac70d9eb84c2199b
parentbceb35ab34e7d4cbee499826dd7827b2e603d431 (diff)
downloadfail2ban-dce6e1cd3ab8c909b3935d42e69374ba7ac7fbf9.tar.gz
Changelog and adjusted debian/control description to describe recommends
-rw-r--r--debian/changelog8
-rw-r--r--debian/control20
2 files changed, 22 insertions, 6 deletions
diff --git a/debian/changelog b/debian/changelog
index 9431b707..8d2bd2a6 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+fail2ban (0.9.3-1) unstable; urgency=medium
+
+ * Fresh upstream release
+ * debian/control -- adjusted description to mention what Recommends
+ and Suggests are good for (Closes: #767114)
+
+ -- Yaroslav Halchenko <debian@onerussian.com> Fri, 31 Jul 2015 21:34:10 -0400
+
fail2ban (0.9.2-1) unstable; urgency=medium
* Fresh release to celebrate jessie release and upload to unstable
diff --git a/debian/control b/debian/control
index 65b7276c..26f2d516 100644
--- a/debian/control
+++ b/debian/control
@@ -17,14 +17,22 @@ Suggests: mailx, system-log-daemon, monit
Description: ban hosts that cause multiple authentication errors
Fail2ban monitors log files (e.g. /var/log/auth.log,
/var/log/apache/access.log) and temporarily or persistently bans
- failure-prone addresses by updating existing firewall rules. Fail2ban allows
- easy specification of different actions to be taken such as to ban an
- IP using iptables or hostsdeny rules, or simply to send a
- notification email.
+ failure-prone addresses by updating existing firewall rules. Fail2ban
+ allows easy specification of different actions to be taken such as to ban
+ an IP using iptables or hostsdeny rules, or simply to send a notification
+ email.
.
By default, it comes with filter expressions for various services
(sshd, apache, qmail, proftpd, sasl etc.) but configuration can be
easily extended for monitoring any other text file. All filters and
actions are given in the config files, thus fail2ban can be adopted
- to be used with a variety of files and firewalls.
-
+ to be used with a variety of files and firewalls. Following recommends
+ are listed:
+ .
+ - iptables -- default installation uses iptables for banning. You most
+ probably need it
+ - whois -- used by a number of *mail-whois* actions to send notification
+ emails with whois information about attacker hosts. Unless you will use
+ those you don't need whois
+ - python3-pyinotify -- unless you monitor services logs via systemd, you
+ need pyinotify for efficient monitoring for log files changes