config root man

Current Path : /usr/share/fail2ban/common/

FreeBSD hs32.drive.ne.jp 9.1-RELEASE FreeBSD 9.1-RELEASE #1: Wed Jan 14 12:18:08 JST 2015 root@hs32.drive.ne.jp:/sys/amd64/compile/hs32 amd64
Upload File :
Current File : //usr/share/fail2ban/common/protocol.pyc

³ò
E²óSc@@s€dZdZdZddkZdddgddgd	d
gddgd
dgddgddgddgdddgddgddgddgddgddgdd dgd!d"gd#d$gd%d&gd'd(gdd)dgd*d+gd,d-gd.d/gd0d1gd2d3gd4d5gd6d7gd8d9gd:d;gd<d=gd>d?gd@dAgdBdCgdDdEgdFdGgdHdIgdJdKgdLdMgdNdOgdPdQgdRdSgdTdUgdVdWgdXdYgdZd[gdd\dgd]d^gd_d`gdadbgdcddgdedfgdgdhgdidjgdkdlgdmdngdodpgdqdrgdsdtgdudvgdwdxgdydzgd{d|gg>Zd}„Zd~„Zd„ZdS(€s
Cyril Jaquiers Copyright (c) 2004 Cyril JaquiertGPLiÿÿÿÿNttBASICtstartsstarts the server and the jailstreloadsreloads the configurations
reload <JAIL>sreloads the jail <JAIL>tstops(stops all jails and terminate the servertstatuss%gets the current status of the servertpingstests if the server is alivethelpsreturn this outputtLOGGINGsset loglevel <LEVEL>s7sets logging level to <LEVEL>. 0 is minimal, 4 is debugsget loglevelsgets the logging levelsset logtarget <TARGET>sHsets logging target to <TARGET>. Can be STDOUT, STDERR, SYSLOG or a files
get logtargetsgets logging targett	flushlogssAflushes the logtarget if a file and reopens it. For log rotation.sJAIL CONTROLsadd <JAIL> <BACKEND>screates <JAIL> using <BACKEND>sstart <JAIL>sstarts the jail <JAIL>sstop <JAIL>s*stops the jail <JAIL>. The jail is removeds
status <JAIL>s!gets the current status of <JAIL>sJAIL CONFIGURATIONsset <JAIL> idle on|offssets the idle state of <JAIL>sset <JAIL> addignoreip <IP>s&adds <IP> to the ignore list of <JAIL>sset <JAIL> delignoreip <IP>s+removes <IP> from the ignore list of <JAIL>sset <JAIL> addlogpath <FILE>s,adds <FILE> to the monitoring list of <JAIL>sset <JAIL> dellogpath <FILE>s1removes <FILE> from the monitoring list of <JAIL>sset <JAIL> addfailregex <REGEX>sHadds the regular expression <REGEX> which must match failures for <JAIL>sset <JAIL> delfailregex <INDEX>s7removes the regular expression at <INDEX> for failregexs set <JAIL> ignorecommand <VALUE>ssets ignorecommand of <JAIL>s!set <JAIL> addignoreregex <REGEX>sTadds the regular expression <REGEX> which should match pattern to exclude for <JAIL>s!set <JAIL> delignoreregex <INDEX>s9removes the regular expression at <INDEX> for ignoreregexsset <JAIL> findtime <TIME>sPsets the number of seconds <TIME> for which the filter will look back for <JAIL>sset <JAIL> bantime <TIME>sBsets the number of seconds <TIME> a host will be banned for <JAIL>sset <JAIL> usedns <VALUE>ssets the usedns mode for <JAIL>sset <JAIL> banip <IP>smanually Ban <IP> for <JAIL>sset <JAIL> unbanip <IP>smanually Unban <IP> in <JAIL>sset <JAIL> maxretry <RETRY>sFsets the number of failures <RETRY> before banning the host for <JAIL>sset <JAIL> addaction <ACT>s)adds a new action named <NAME> for <JAIL>sset <JAIL> delaction <ACT>s%removes the action <NAME> from <JAIL>s'set <JAIL> setcinfo <ACT> <KEY> <VALUE>s6sets <VALUE> for <KEY> of the action <NAME> for <JAIL>sset <JAIL> delcinfo <ACT> <KEY>s.removes <KEY> for the action <NAME> for <JAIL>s"set <JAIL> actionstart <ACT> <CMD>s;sets the start command <CMD> of the action <ACT> for <JAIL>s!set <JAIL> actionstop <ACT> <CMD>s:sets the stop command <CMD> of the action <ACT> for <JAIL>s"set <JAIL> actioncheck <ACT> <CMD>s;sets the check command <CMD> of the action <ACT> for <JAIL>s set <JAIL> actionban <ACT> <CMD>s9sets the ban command <CMD> of the action <ACT> for <JAIL>s"set <JAIL> actionunban <ACT> <CMD>s;sets the unban command <CMD> of the action <ACT> for <JAIL>sJAIL INFORMATIONsget <JAIL> logpaths/gets the list of the monitored files for <JAIL>sget <JAIL> ignoreips0gets the list of ignored IP addresses for <JAIL>sget <JAIL> ignorecommandsgets ignorecommand of <JAIL>sget <JAIL> failregexsJgets the list of regular expressions which matches the failures for <JAIL>sget <JAIL> ignoreregexsPgets the list of regular expressions which matches patterns to ignore for <JAIL>sget <JAIL> findtimesIgets the time for which the filter will look back for failures for <JAIL>sget <JAIL> bantimes)gets the time a host is banned for <JAIL>sget <JAIL> usednss"gets the usedns setting for <JAIL>sget <JAIL> maxretrys.gets the number of failures allowed for <JAIL>sget <JAIL> addactions4gets the last action which has been added for <JAIL>sget <JAIL> actionstart <ACT>s6gets the start command for the action <ACT> for <JAIL>sget <JAIL> actionstop <ACT>s5gets the stop command for the action <ACT> for <JAIL>sget <JAIL> actioncheck <ACT>s6gets the check command for the action <ACT> for <JAIL>sget <JAIL> actionban <ACT>s4gets the ban command for the action <ACT> for <JAIL>sget <JAIL> actionunban <ACT>s6gets the unban command for the action <ACT> for <JAIL>sget <JAIL> cinfo <ACT> <KEY>s8gets the value for <KEY> for the action <ACT> for <JAIL>cCsËd}d}d}t}x¬tD]¤}|ddjo|oHnt}t}xrti|d|ƒD]Z}|o6d||dd|t|dƒ|}t}nd|||}|GHqeWqWdS(Nii)i"iRit (tFalsetprotocoltTruettextwraptwraptlen(tINDENTtMARGINtWIDTHtfirstHeadingtmtfirsttntline((s&/usr/share/fail2ban/common/protocol.pytprintFormattedes",
cCs~t}xltD]d}|ddjo/|o	dGHnt|d|dƒt}q
dGHd|dd|dGHq
WdGHdS(	NiRs|}iis|-s(| <span style="white-space:nowrap;"><tt>s</tt></span> || || (RR
t__printWikiHeaderR(RR((s&/usr/share/fail2ban/common/protocol.pyt	printWikizs	
cCs#Hd|dGHH|GHHdGHdGHdS(Ns=== s ===s{|s'| '''Command''' || || '''Description'''((tsectiontdesc((s&/usr/share/fail2ban/common/protocol.pyR‡s
(t
__author__t
__copyright__t__license__RR
RRR(((s&/usr/share/fail2ban/common/protocol.pys<module>sˆ																																																										

Man Man