Package: fail2ban
Version: 0.5.3-1
Severity: normal

Fail2ban will go into an endless loop trying to ban an ip address,
if the chain it is expecting to find is no longer valid (for example if a user 
restarts iptables).
On a busy system this has the potential to quickly fill up the log or mail 
spool.
It should instead report an error to its log or by mail and gracefully fail, 
or, re-create its own chain if possible.


-- System Information:
Debian Release: testing/unstable
  APT prefers experimental
  APT policy: (1000, 'experimental'), (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-1-686
Locale: LANG=en_AU, LC_CTYPE=en_AU (charmap=ISO-8859-1)

Versions of packages fail2ban depends on:
ii  iptables                      1.3.3-2    Linux kernel 2.4+ iptables adminis
ii  python                        2.3.5-3    An interactive high-level object-o

fail2ban recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to