Package: fail2ban
Version: 0.6.0-2
Severity: normal

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

IMHO the option 'ignoreip' in /etc/fail2ban.conf should be empty by default
(now it is '192.168.0.0/16'). There is no reason why private networks should
be excluded from banning.

Since private networks are nowadays generally on 100Mbit or better, the risk
of being brute-forced from a (hacked?) machine in the same private network is
much higher than being brute forced from the internet.

Greetings,
Aaron

- -- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/dash
Kernel: Linux 2.6.14-2-k7
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages fail2ban depends on:
ii  iptables                      1.3.3-2    Linux kernel 2.4+ iptables adminis
ii  python                        2.3.5-3    An interactive high-level object-o

fail2ban recommends no packages.

- -- no debconf information

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDxmlDm2HPKfVbHyoRAv0HAJ9uSipZj/UTRsjNqE1FxJsiZVCL4gCfQK1A
FsDJMgL3yuKEE9ke4wxrpys=
=m0eY
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to