Package: fail2ban
Version: 0.5.4-5.5
Severity: wishlist

It would be nice if fail2ban did a reverse DNS lookup, i.e. a PTR lookup,
when logging/emailing/etc, to show the domain name, or part thereof,
of the culprit. This is often the first thing a sysadmin might do when
they see the info, so we could save them the bother.

Since this consumes resources, and perhaps some systems might not have
DNS configured, this could be optional and default to off.

Of course, often a system doesn't have a PTR record; we could show just
the SOA in that case, like dig -x does, perhaps?

thanks much for considering,
calum.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.13
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)

Versions of packages fail2ban depends on:
ii  iptables                      1.3.3-2    Linux kernel 2.4+ iptables adminis
ii  python                        2.3.5-3    An interactive high-level object-o

fail2ban recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to