Package: fail2ban
Version: 0.7.5-2
Severity: important
Since the upgrade to 0.7, fail2ban does not ban vsftpd erroneous logins. The
severity I've chosen is important because ssh bad login attempts are correctly
stopped by fail2ban, so it is not critical.
As stated in /etc/fail2ban/jail.conf, I created a jail.local; it's just a copy
of jail.conf, but with vsftpd section enabled. Don't know if I need something
else to make it work...
I'm willing to perform any necessary test to solve the problem, don't hesitate
in contacting me about this.
Thanks
Antonio
-- System Information:
Debian Release: 4.0
APT prefers testing
APT policy: (700, 'testing'), (650, 'unstable')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-vserver-k7
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) (ignored: LC_
Versions of packages fail2ban depends on:
ii iptables 1.3.6.0debian1-5 administration tools for packet fi
ii lsb-base 3.1-22 Linux Standard Base 3.1 init scrip
ii python 2.4.4-1 An interactive high-level object-o
ii python-central 0.5.12 register and build utility for Pyt
______________________________________________
LLama Gratis a cualquier PC del Mundo.
Llamadas a fijos y móviles desde 1 céntimo por minuto.
http://es.voice.yahoo.com
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]