Package: fail2ban
Version: 0.7.5-2
Severity: important

Since the upgrade to 0.7, fail2ban does not ban vsftpd erroneous logins. The 
severity I've chosen is important because ssh bad login attempts are correctly 
stopped by fail2ban, so it is not critical.
As stated in /etc/fail2ban/jail.conf, I created a jail.local; it's just a copy 
of jail.conf, but with vsftpd section enabled. Don't know if I need something 
else to make it work...
I'm willing to perform any necessary test to solve the problem, don't hesitate 
in contacting me about this.
Thanks
Antonio


-- System Information:
Debian Release: 4.0
  APT prefers testing
  APT policy: (700, 'testing'), (650, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-vserver-k7
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) (ignored: LC_

Versions of packages fail2ban depends on:
ii  iptables                1.3.6.0debian1-5 administration tools for packet fi
ii  lsb-base                3.1-22           Linux Standard Base 3.1 init scrip
ii  python                  2.4.4-1          An interactive high-level object-o
ii  python-central          0.5.12           register and build utility for Pyt

                
______________________________________________ 
LLama Gratis a cualquier PC del Mundo. 
Llamadas a fijos y móviles desde 1 céntimo por minuto. 
http://es.voice.yahoo.com



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to