Update sshguard to 1.5.
ok aja@ millert@.
This commit is contained in:
parent
1617bb1387
commit
005d735a4a
@ -1,12 +1,10 @@
|
||||
# $OpenBSD: Makefile,v 1.3 2010/10/18 21:41:47 espie Exp $
|
||||
# $OpenBSD: Makefile,v 1.4 2011/03/07 17:44:16 rpointel Exp $
|
||||
|
||||
COMMENT= protect against brute force attacks on sshd and others
|
||||
|
||||
DISTNAME= sshguard-1.5rc4
|
||||
DISTNAME= sshguard-1.5
|
||||
CATEGORIES= security
|
||||
|
||||
REVISION= 0
|
||||
|
||||
# BSD
|
||||
PERMIT_PACKAGE_CDROM= Yes
|
||||
PERMIT_PACKAGE_FTP= Yes
|
||||
@ -20,9 +18,16 @@ MASTER_SITES= ${MASTER_SITE_SOURCEFORGE:=sshguard/}
|
||||
EXTRACT_SUFX= .tar.bz2
|
||||
|
||||
CONFIGURE_STYLE=gnu
|
||||
CONFIGURE_ARGS= --with-firewall=pf
|
||||
USE_GROFF = Yes
|
||||
|
||||
NO_REGRESS= Yes
|
||||
|
||||
FLAVORS = tcpd
|
||||
FLAVOR?=
|
||||
|
||||
.if ${FLAVOR:L:Mtcpd}
|
||||
CONFIGURE_ARGS = --with-firewall=hosts
|
||||
.else
|
||||
CONFIGURE_ARGS = --with-firewall=pf
|
||||
.endif
|
||||
|
||||
.include <bsd.port.mk>
|
||||
|
@ -1,5 +1,5 @@
|
||||
MD5 (sshguard-1.5rc4.tar.bz2) = sl2kawJUh5YJ+qmEGhReug==
|
||||
RMD160 (sshguard-1.5rc4.tar.bz2) = 0aHYO8dZEDWQywBzPC0z6S9siIM=
|
||||
SHA1 (sshguard-1.5rc4.tar.bz2) = AFhTvNIEVmqr4zwXkybjFF+NQsA=
|
||||
SHA256 (sshguard-1.5rc4.tar.bz2) = opAocT5cc54BYa91AXq11GvX2kkFaw7aiTwP/tP9bTU=
|
||||
SIZE (sshguard-1.5rc4.tar.bz2) = 296447
|
||||
MD5 (sshguard-1.5.tar.bz2) = Ebn0f5BR4lvf6Eo2XJYewQ==
|
||||
RMD160 (sshguard-1.5.tar.bz2) = e0Yls7Lgz5dLyTXYaLib0NjBieg=
|
||||
SHA1 (sshguard-1.5.tar.bz2) = +PcTv7P1yYd7NPaCFCaiKn7sjfM=
|
||||
SHA256 (sshguard-1.5.tar.bz2) = tTf4dlRV/fhCT4fUvWleW2dbiOXRZIZUUhN5Rwk+fhk=
|
||||
SIZE (sshguard-1.5.tar.bz2) = 303767
|
||||
|
@ -1,6 +1,6 @@
|
||||
$OpenBSD: patch-src_sshguard_logsuck_c,v 1.1.1.1 2010/09/07 12:23:43 millert Exp $
|
||||
--- src/sshguard_logsuck.c.orig Mon Aug 9 02:44:15 2010
|
||||
+++ src/sshguard_logsuck.c Mon Aug 30 13:06:02 2010
|
||||
$OpenBSD: patch-src_sshguard_logsuck_c,v 1.2 2011/03/07 17:44:16 rpointel Exp $
|
||||
--- src/sshguard_logsuck.c.orig Wed Feb 9 13:01:47 2011
|
||||
+++ src/sshguard_logsuck.c Sat Mar 5 19:27:53 2011
|
||||
@@ -242,7 +242,7 @@ int logsuck_getline(char *restrict buf, size_t buflen,
|
||||
if (ret > 0) {
|
||||
if (kevs[0].filter == EVFILT_READ) {
|
||||
|
@ -1,13 +1,14 @@
|
||||
To use sshguard you must add the following to /etc/pf.conf:
|
||||
To use sshguard with:
|
||||
|
||||
* pf:
|
||||
|
||||
you must add the following to /etc/pf.conf:
|
||||
|
||||
table <sshguard> persist
|
||||
|
||||
block in quick on egress proto tcp from <sshguard> \
|
||||
to any port ssh label "ssh bruteforce"
|
||||
|
||||
To start sshguard automatically at boot time, add these lines to /etc/rc.local:
|
||||
* tcpd:
|
||||
|
||||
if [ -x ${PREFIX}/sbin/sshguard ]; then
|
||||
echo -n ' sshguard'
|
||||
${PREFIX}/sbin/sshguard -l /var/log/authlog >/dev/null 2>&1 &
|
||||
fi
|
||||
hosts.allow(5) must be present under /etc.
|
||||
|
@ -1,3 +1,4 @@
|
||||
@comment $OpenBSD: PLIST,v 1.1.1.1 2010/09/07 12:23:43 millert Exp $
|
||||
@comment $OpenBSD: PLIST,v 1.2 2011/03/07 17:44:16 rpointel Exp $
|
||||
@man man/man8/sshguard.8
|
||||
@bin sbin/sshguard
|
||||
@rcscript ${RCDIR}/sshguard
|
||||
|
13
security/sshguard/pkg/sshguard.rc
Normal file
13
security/sshguard/pkg/sshguard.rc
Normal file
@ -0,0 +1,13 @@
|
||||
#!/bin/sh
|
||||
#
|
||||
# $OpenBSD: sshguard.rc,v 1.1 2011/03/07 17:44:16 rpointel Exp $
|
||||
|
||||
daemon="${TRUEPREFIX}/sbin/sshguard"
|
||||
daemon_flags="-l /var/log/authlog"
|
||||
|
||||
. /etc/rc.d/rc.subr
|
||||
|
||||
rc_bg=YES
|
||||
rc_reload=NO
|
||||
|
||||
rc_cmd $1
|
Loading…
Reference in New Issue
Block a user