Package: fail2ban
Version: 0.6.0-7
Severity: wishlist

Instead of hardcoding INPUT in fw{end,start,check,...}, please
consider adding a new configuration option for it, which is set to
INPUT by default.

I have a chain in-all and I want to process fail2ban rules only from
within that chain. Instead of s/INPUT/in-all/, I could then just
change that one configuration item.

It would be best if it could be set for each section, i.e. for SSH
and HTTP separately.

Thanks,

-- System Information:
Debian Release: testing/unstable
  APT prefers stable
  APT policy: (700, 'stable'), (600, 'testing'), (98, 'unstable'), (1, 
'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15-1-686
Locale: LANG=en_GB, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)

Versions of packages fail2ban depends on:
ii  iptables                      1.3.3-2    Linux kernel 2.4+ iptables adminis
ii  python                        2.3.5-5    An interactive high-level object-o

fail2ban recommends no packages.

-- no debconf information

-- 
 .''`.     martin f. krafft <[EMAIL PROTECTED]>
: :'  :    proud Debian developer and author: http://debiansystem.info
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
Invalid/expired PGP (sub)keys? Use subkeys.pgp.net as keyserver!
 
when everything is coming your way, you're in the wrong lane.

Attachment: signature.asc
Description: Digital signature (GPG/PGP)

Reply via email to