~ubuntu-branches/ubuntu/vivid/fail2ban/vivid

« back to all changes in this revision

Viewing changes to .pc/deb_manpages_reportbug/man/fail2ban-client.1

  • Committer: Package Import Robot
  • Author(s): Yaroslav Halchenko
  • Date: 2013-11-17 17:29:06 UTC
  • mfrom: (1.2.9)
  • Revision ID: package-import@ubuntu.com-20131117172906-buaklkz2i416bh04
Tags: 0.8.11-1
* Fresh upstream release
  - this release tightens all shipped filters to preclude
    possible injections leading to targetted DoS attacks.
  - omitted entry for ~pre release changelog:
    - asterisk filter was fixed (Closes: #719662),
    - nginx filter/jail added (Closes: #668064)
    - better detection of log rotation in polling backend (Closes: #696087)
    - includes sever name (uname -n) into subject of sendmail actions
      (Closes: #709196)
* debian/jail.conf
  - dropbear jail: use dropbear filter (instead of ssh) and monitor
    auth.log instead of non-existing /var/log/dropbear (Closes: #620760)
* debian/NEWS
  - information for change of default iptables action to REJECT now
    (Closes: #711463)
* debian/patches
  - changeset_d4f6ca4f8531f332bcb7ce3a89102f60afaaa08e.diff
    post-release change to support native proftpd date format which
    includes milliseconds (Closes: #648276)
  - changeset_ac061155f093464fb6cd2329d3d513b15c68e256.diff
    absorbed upstream

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
.\" DO NOT MODIFY THIS FILE!  It was generated by help2man 1.40.12.
2
 
.TH FAIL2BAN-CLIENT "1" "October 2013" "fail2ban-client v0.8.11.pre1" "User Commands"
 
1
.\" DO NOT MODIFY THIS FILE!  It was generated by help2man 1.40.4.
 
2
.TH FAIL2BAN-CLIENT "1" "November 2013" "fail2ban-client v0.8.11" "User Commands"
3
3
.SH NAME
4
4
fail2ban-client \- configure and control the server
5
5
.SH SYNOPSIS
6
6
.B fail2ban-client
7
7
[\fIOPTIONS\fR] \fI<COMMAND>\fR
8
8
.SH DESCRIPTION
9
 
Fail2Ban v0.8.11.pre1 reads log file that contains password failure report
 
9
Fail2Ban v0.8.11 reads log file that contains password failure report
10
10
and bans the corresponding IP addresses using firewall rules.
11
11
.SH OPTIONS
12
12
.TP