Package: fail2ban Version: 0.6.0-7 Severity: wishlist Instead of hardcoding INPUT in fw{end,start,check,...}, please consider adding a new configuration option for it, which is set to INPUT by default.
I have a chain in-all and I want to process fail2ban rules only from within that chain. Instead of s/INPUT/in-all/, I could then just change that one configuration item. It would be best if it could be set for each section, i.e. for SSH and HTTP separately. Thanks, -- System Information: Debian Release: testing/unstable APT prefers stable APT policy: (700, 'stable'), (600, 'testing'), (98, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.15-1-686 Locale: LANG=en_GB, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Versions of packages fail2ban depends on: ii iptables 1.3.3-2 Linux kernel 2.4+ iptables adminis ii python 2.3.5-5 An interactive high-level object-o fail2ban recommends no packages. -- no debconf information -- .''`. martin f. krafft <[EMAIL PROTECTED]> : :' : proud Debian developer and author: http://debiansystem.info `. `'` `- Debian - when you have better things to do than fixing a system Invalid/expired PGP (sub)keys? Use subkeys.pgp.net as keyserver! when everything is coming your way, you're in the wrong lane.
signature.asc
Description: Digital signature (GPG/PGP)