Package: fail2ban Version: 0.5.3-1 Severity: normal Fail2ban will go into an endless loop trying to ban an ip address, if the chain it is expecting to find is no longer valid (for example if a user restarts iptables). On a busy system this has the potential to quickly fill up the log or mail spool. It should instead report an error to its log or by mail and gracefully fail, or, re-create its own chain if possible.
-- System Information: Debian Release: testing/unstable APT prefers experimental APT policy: (1000, 'experimental'), (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.12-1-686 Locale: LANG=en_AU, LC_CTYPE=en_AU (charmap=ISO-8859-1) Versions of packages fail2ban depends on: ii iptables 1.3.3-2 Linux kernel 2.4+ iptables adminis ii python 2.3.5-3 An interactive high-level object-o fail2ban recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]