Package: fail2ban Version: 0.5.4-5.5 Severity: wishlist It would be nice if fail2ban did a reverse DNS lookup, i.e. a PTR lookup, when logging/emailing/etc, to show the domain name, or part thereof, of the culprit. This is often the first thing a sysadmin might do when they see the info, so we could save them the bother.
Since this consumes resources, and perhaps some systems might not have DNS configured, this could be optional and default to off. Of course, often a system doesn't have a PTR record; we could show just the SOA in that case, like dig -x does, perhaps? thanks much for considering, calum. -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.13 Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Versions of packages fail2ban depends on: ii iptables 1.3.3-2 Linux kernel 2.4+ iptables adminis ii python 2.3.5-3 An interactive high-level object-o fail2ban recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]