Package: fail2ban Version: 0.8.6-3~nd+1 Architecture: all Maintainer: NeuroDebian Maintainers Installed-Size: 339 Depends: neurodebian-popularity-contest, python (>= 2.4), python-central (>= 0.6.11), lsb-base (>= 2.0-7) Recommends: iptables, whois, python-gamin Suggests: mailx Homepage: http://www.fail2ban.org Priority: optional Section: net Filename: pool/main/f/fail2ban/fail2ban_0.8.6-3~nd+1_all.deb Size: 103466 SHA256: 29d8077c99805470e6a7d0196cd44707905e159e564f70a5f83300364c85b4a0 SHA1: 9ae59643b846517bc94a88724a18c7f12b9ac5b6 MD5sum: 37b3ab7b9c3a6ffea223927df59411a8 Description: ban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Python-Version: current, >= 2.4