Package: fail2ban
Version: 0.5.2-4
Severity: grave

fail2ban's approach to identifying an IP address in a login failure line
is to scan the line for all IP addresses.

Since it is possible to generate false logins from accounts such as
10.2.28.2, it is possible to force fail2ban to block access to addresses
which are not attempting to connect to the system.  For each IP address
available to the attacker, a desired ip address may be blocked.

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (990, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.10-jsr
Locale: LANG=C, LC_CTYPE=C (charmap=ISO-8859-1) (ignored: LC_ALL set to 
en_US.iso88591)

Versions of packages fail2ban depends on:
ii  iptables                      1.3.3-2    Linux kernel 2.4+ iptables adminis
ii  python                        2.3.5-3    An interactive high-level object-o

fail2ban recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to