Package: fail2ban
Version: 0.10.2-2.1
Followup-For: Bug #888711

Dear Maintainer,

fail2ban 0.10.2-2.1 still ships the incorrect sshd-ddos.conf and
sshd-aggressive.conf files. Neither ddos nor aggressive are defined
parameters so these files should be rewritten as shown in the
attachements, that is by simply setting mode to the desired value:

mode = ddos

and

mode = aggressive

respectively.


-- System Information:
Debian Release: 10.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-5-amd64 (SMP w/8 CPU cores)
Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), 
LANGUAGE=fr:en_US (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages fail2ban depends on:
ii  lsb-base  10.2019051400
ii  python3   3.7.3-1

Versions of packages fail2ban recommends:
ii  iptables           1.8.2-4
ii  nftables           0.9.0-2
ii  python             2.7.16-1
ii  python3-pyinotify  0.9.6-1
ii  python3-systemd    234-2+b1
ii  whois              5.4.3

Versions of packages fail2ban suggests:
ii  bsd-mailx [mailx]            8.1.2-0.20180807cvs-1
ii  mailutils [mailx]            1:3.5-3
pn  monit                        <none>
ii  rsyslog [system-log-daemon]  8.1901.0-1
ii  sqlite3                      3.27.2-3

-- Configuration Files:
/etc/fail2ban/filter.d/sshd-aggressive.conf changed:
[INCLUDES]
before = sshd.conf
[Definition]
mode = aggressive

/etc/fail2ban/filter.d/sshd-ddos.conf changed:
[INCLUDES]
before = sshd.conf
[Definition]
mode = ddos

-- no debconf information

Reply via email to