Package: fail2ban Version: 0.8.6-3~nd10.10+1 Architecture: all Maintainer: NeuroDebian Maintainers Installed-Size: 612 Depends: neurodebian-popularity-contest, python (>= 2.4), python-central (>= 0.6.11), lsb-base (>= 2.0-7) Recommends: iptables, whois, python-gamin Suggests: mailx Homepage: http://www.fail2ban.org Priority: optional Section: net Filename: pool/main/f/fail2ban/fail2ban_0.8.6-3~nd10.10+1_all.deb Size: 103504 SHA256: ae0b516a040b14b559b6d3b48a2f9a5593925bbde88946034733f844c74d0e32 SHA1: d689d048a4ea9f8cd35e9401f450079ba0ab5bee MD5sum: 2729dc868a77d6d0afae0d6cf8b63704 Description: ban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Python-Version: current, >= 2.4