Package: fail2ban
Version: 0.8.5-1
Severity: wishlist

Hi,

After reading through #350746, I wonder why iptables-new isn't used by
default for the ssh jail.
I understand and agree with the arguments about possible interactions
with other protocols and thus the reason for not using it per default
for all jails, but at least for ssh, where it's clear new auth attempts
will use new connections, this shouldn't have any sensible drawbacks
while decreasing the "annoyance-factor" of locking yourself out of your
own server (like I just did, while playing with the pubkeys used by
automatic backups :D).


Cheers

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (990, 'unstable'), (150, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.0.0-1-amd64 (SMP w/1 CPU core)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to