Name: | fail2ban |
---|---|
Version: | 0.10.5 |
Release: | 2.el7 |
Architecture: | noarch |
Group: | Unspecified |
Size: | 0 |
License: | GPLv2+ |
RPM: | fail2ban-0.10.5-2.el7.noarch.rpm |
Source RPM: | fail2ban-0.10.5-2.el7.src.rpm |
Build Date: | Thu Feb 06 2020 |
Build Host: | x86-ol7-builder-03.us.oracle.com |
Vendor: | Oracle America |
URL: | http://fail2ban.sourceforge.net/ |
Summary: | Daemon to ban hosts that cause multiple authentication errors |
Description: | Fail2Ban scans log files and bans IP addresses that makes too many password failures. It updates firewall rules to reject the IP address. These rules can be defined by the user. Fail2Ban can read multiple log files such as sshd or Apache web server ones. Fail2Ban is able to reduce the rate of incorrect authentications attempts however it cannot eliminate the risk that weak authentication presents. Configure services to use only two factor or public/private authentication mechanisms if you really want to protect services. This is a meta-package that will install the default configuration. Other sub-packages are available to install support for other actions and configurations. |
- Move action.d/mail-whois-common.conf into fail2ban-server
- Update to 0.10.5
- Update to 0.10.4 - Define banaction_allports for firewalld, update banaction (bz#1775175) - Update sendmail-reject with TLSMTA & MSA port IDs (bz#1722625) - Remove config files for other distros (bz#1533113)
- Update to 0.9.7
- Properly handle /run/fail2ban (bug #1422500)
- Add upstream patch to fix fail2ban-regex with journal
- Update to 0.9.6 - Fix sendmail-auth filter (bug #1329919)
- Rebuild for Python 3.6
- %ghost /run/fail2ban - Fix typo in shorewall description - Move tests to -tests sub-package
- Add journalmatch entries for sendmail (bug #1329919)