On Mon, 2011-05-23 at 20:16 -0500, Kyle Willmon wrote:
> On Mon, May 23, 2011 at 01:51:59PM +0200, Jérôme Warnier wrote:
> > There does not seem to be any development ongoing at all. It seems dead
> > upstream.
> > I'm considering moving to a more powerful alternative (fail2ban).
> 
> I have spoken with Phil Schwartz, the upstream maintainer, in attempt to
> introduce some more transparency and agility in the development process.
> It appears that the next release of denyhosts has been held up by a few
> technical issues which I am hoping to help resolve. While I would not
> blame you for using fail2ban, I did want to inform you that denyhosts
> should be seeing some activity in the near future.

Good to know.

> As for this particular bug, the current issue is simply that Dropbear
> does not use TCP Wrapper as OpenSSH does. This means that denyhost's
> current method of using /etc/hosts.deny would not work for Dropbear. I
> believe this is enough reason to tag this bug wontfix, but because it is
> an upstream bug, I will let Phil make the final call.

Allright, I clearly didn't look so far.
Feel free to tag it as wontfix.

And thanks for caring.

> Thanks
> -
> Kyle Willmon





--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to