From owner-freebsd-ports-bugs@FreeBSD.ORG Thu Feb 22 16:40:16 2007 Return-Path: X-Original-To: freebsd-ports-bugs@hub.freebsd.org Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 41D3E16A412 for ; Thu, 22 Feb 2007 16:40:16 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [69.147.83.40]) by mx1.freebsd.org (Postfix) with ESMTP id 260CC13C491 for ; Thu, 22 Feb 2007 16:40:16 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.13.4/8.13.4) with ESMTP id l1MGeGcL010468 for ; Thu, 22 Feb 2007 16:40:16 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.13.4/8.13.4/Submit) id l1MGeF4d010467; Thu, 22 Feb 2007 16:40:15 GMT (envelope-from gnats) Resent-Date: Thu, 22 Feb 2007 16:40:15 GMT Resent-Message-Id: <200702221640.l1MGeF4d010467@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Mij Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id B81FD16A400 for ; Thu, 22 Feb 2007 16:35:51 +0000 (UTC) (envelope-from michele@voodoo.publicshout.org) Received: from voodoo.publicshout.org (heroin.publicshout.org [81.208.58.150]) by mx1.freebsd.org (Postfix) with SMTP id 242D313C4A5 for ; Thu, 22 Feb 2007 16:35:50 +0000 (UTC) (envelope-from michele@voodoo.publicshout.org) Received: (qmail 89914 invoked by uid 1001); 22 Feb 2007 16:11:18 -0000 Message-Id: <20070222161118.89912.qmail@voodoo.publicshout.org> Date: 22 Feb 2007 16:11:18 -0000 From: Mij To: FreeBSD-gnats-submit@FreeBSD.org X-Send-Pr-Version: 3.113 Cc: Subject: ports/109439: New port: security/sshguard Protect ssh from brute force attacks X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 22 Feb 2007 16:40:16 -0000 >Number: 109439 >Category: ports >Synopsis: New port: security/sshguard Protect ssh from brute force attacks >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Thu Feb 22 16:40:14 GMT 2007 >Closed-Date: >Last-Modified: >Originator: Mij >Release: FreeBSD 6.2-STABLE i386 >Organization: >Environment: System: FreeBSD b1 6.2-STABLE FreeBSD 6.2-STABLE #0: Sun Feb 18 14:11:42 CET 2007 mij@b1:/usr/obj/usr/src/sys/voodooFeb2007 i386 >Description: port submission for http://sshguard.sourceforge.net >How-To-Repeat: >Fix: --- sshguard_port.shar begins here --- # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # sshguard # sshguard/pkg-descr # sshguard/Makefile # sshguard/distinfo # echo c - sshguard mkdir -p sshguard > /dev/null 2>&1 echo x - sshguard/pkg-descr sed 's/^X//' >sshguard/pkg-descr << 'END-of-sshguard/pkg-descr' XSshguard monitors ssh servers from their logging activity. It reacts to messages Xabout dangerous activity by blocking the source address with the local firewall. X XSshguard can operate all the major firewalling systems: X* PF (OpenBSD, FreeBSD, NetBSD, DragonFly BSD) X* netfilter/iptables (Linux) X* IPFIREWALL/ipfw (FreeBSD, Mac OS X) X XSshguard is reliable, easy to set up and demands very few resources to the Xsystem. X XWWW: http://sshguard.sourceforge.net END-of-sshguard/pkg-descr echo x - sshguard/Makefile sed 's/^X//' >sshguard/Makefile << 'END-of-sshguard/Makefile' X# New ports collection makefile for: sshguard X# Date created: 2007-02-22 X# Whom: Mij X# X# $FreeBSD$ X# X XPORTNAME= sshguard XPORTVERSION= 0.91 XCATEGORIES= security XMASTER_SITES= ${MASTER_SITE_SOURCEFORGE} XMASTER_SITE_SUBDIR= ${PORTNAME} X X XMAINTAINER= mij@bitchx.it XCOMMENT= Protect networked hosts from brute force attacks against ssh X XPLIST_FILES= sbin/sshguard X XIS_INTERACTIVE= yes XUSE_BZIP2= yes XHAS_CONFIGURE= yes X XOPTIONS= PF "Use PF as firewall backend" off \ X IPFW "Use IPFW as firewall backend" off X X.include X X X.if ! ( (defined(WITH_PF) && !defined(WITH_IPFW)) || !defined(WITH_PF)) X# some error occurred. Configure will handle this. X.endif X X.if defined(WITH_PF) X# compile with PF support XCONFIGURE_ARGS+= --with-firewall=pf X.elif defined(WITH_IPFW) X# compile with PF support XCONFIGURE_ARGS+= --with-firewall=ipfw X.endif X Xpost-install: X # spare pkg-message X ${ECHO_MSG} " Sshguard installed successfully." X ${ECHO_MSG} "Make it active by putting in /etc/syslog.conf something like:" X ${ECHO_MSG} " auth.info;authpriv.info |exec ${PREFIX}/sbin/sshguard" X ${ECHO_MSG} "Otherwise, run sshguard standalone with (as root):" X ${ECHO_MSG} " tail -n 0 -f /var/log/auth.log | ${PREFIX}/sbin/sshguard" X X.include END-of-sshguard/Makefile echo x - sshguard/distinfo sed 's/^X//' >sshguard/distinfo << 'END-of-sshguard/distinfo' XMD5 (sshguard-0.91.tar.bz2) = e6fb218fe2450f14b38ae5c5b67f0b6a XSHA256 (sshguard-0.91.tar.bz2) = c1e16d1d20ff192e0368bd8ddfe6acede5a90fef10ce0558655bacf62c29c42f XSIZE (sshguard-0.91.tar.bz2) = 63751 END-of-sshguard/distinfo exit --- sshguard_port.shar ends here --- >Release-Note: >Audit-Trail: >Unformatted: