Date: Tue, 20 May 2014 19:18:40 GMT From: Jesse <jessefrgsmith@yahoo.ca> To: freebsd-gnats-submit@FreeBSD.org Subject: ports/190034: port update: security/denyhosts Message-ID: <201405201918.s4KJIePL050046@cgiserv.freebsd.org> Resent-Message-ID: <201405201920.s4KJK0q9025948@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 190034 >Category: ports >Synopsis: port update: security/denyhosts >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: update >Submitter-Id: current-users >Arrival-Date: Tue May 20 19:20:00 UTC 2014 >Closed-Date: >Last-Modified: >Originator: Jesse >Release: FreeBSD-10.0 >Organization: RM >Environment: >Description: Attached is a patch which brings the DenyHosts port up to date with the upstream project. DenyHosts has been worked after upstream was no longer being maintained. The new fork, DenyHost, offers an updated, drop-in replacement for the package. This updated fork includes security patches from Debian, Ubuntu and FreeBSD. >How-To-Repeat: >Fix: Patch attached with submission follows: diff -ruN /usr/ports/security/denyhosts/Makefile denyhosts/Makefile --- /usr/ports/security/denyhosts/Makefile 2014-03-13 08:38:39.000000000 -0300 +++ denyhosts/Makefile 2014-05-20 15:40:52.381269794 -0300 @@ -1,15 +1,15 @@ # Created by: Janos Mohacsi <janos.mohacsi@bsd.hu> -# $FreeBSD$ +# $FreeBSD: head/security/denyhosts/Makefile 327769 2013-09-20 22:55:24Z bapt $ PORTNAME= denyhosts -PORTVERSION= 2.6 -PORTREVISION= 4 +PORTVERSION= 2.7 +PORTREVISION= 1 CATEGORIES= security -MASTER_SITES= SF -DISTNAME= DenyHosts-${PORTVERSION} +MASTER_SITES= SF/denyhost/denyhost-${PORTVERSION} +DISTNAME= denyhosts-${PORTVERSION} MAINTAINER= jmohacsi@bsd.hu -COMMENT= Script to thwart ssh attacks +COMMENT= Pythom script to thwart ssh attacks USE_PYTHON= yes USE_PYDISTUTILS= yes @@ -22,17 +22,15 @@ PORTDOCS= CHANGELOG.txt LICENSE.txt README.txt NO_STAGE= yes +WRKSRC=${WRKDIR}/DenyHosts-${PORTVERSION} post-patch: @${REINPLACE_CMD} -e 's,%%PREFIX%%,${PREFIX},' \ ${WRKSRC}/daemon-control-dist \ - ${WRKSRC}/denyhosts.cfg-dist \ + ${WRKSRC}/denyhosts.conf \ ${WRKSRC}/setup.py - @${RM} ${WRKSRC}/scripts/restricted_from_passwd.py.orig post-install: - ${INSTALL_DATA} ${WRKSRC}/denyhosts.cfg-dist ${PREFIX}/etc/denyhosts.conf-dist - [ -f ${PREFIX}/etc/denyhosts.conf ] || \ - ${INSTALL_DATA} ${WRKSRC}/denyhosts.cfg-dist ${PREFIX}/etc/denyhosts.conf + ${INSTALL_DATA} ${WRKSRC}/denyhosts.conf ${PREFIX}/etc/denyhosts.conf .if !defined(NOPORTDOCS) @${MKDIR} ${DOCSDIR} . for f in ${PORTDOCS} diff -ruN /usr/ports/security/denyhosts/distinfo denyhosts/distinfo --- /usr/ports/security/denyhosts/distinfo 2014-03-13 08:38:39.000000000 -0300 +++ denyhosts/distinfo 1969-12-31 20:00:00.000000000 -0400 @@ -1,2 +0,0 @@ -SHA256 (DenyHosts-2.6.tar.gz) = 5190ead13a7238e3ccf328cb3b71b16716e1c73939909a4f3fa6904ba58ddf7d -SIZE (DenyHosts-2.6.tar.gz) = 42667 diff -ruN /usr/ports/security/denyhosts/files/denyhosts.in denyhosts/files/denyhosts.in --- /usr/ports/security/denyhosts/files/denyhosts.in 2014-03-13 08:38:39.000000000 -0300 +++ denyhosts/files/denyhosts.in 2014-05-20 15:40:52.467268912 -0300 @@ -1,6 +1,6 @@ #!/bin/sh # -# $FreeBSD$ +# $FreeBSD: head/security/denyhosts/files/denyhosts.in 340872 2014-01-24 00:14:07Z mat $ # # PROVIDE: denyhosts # REQUIRE: DAEMON diff -ruN /usr/ports/security/denyhosts/files/patch-DenyHosts_regex.py denyhosts/files/patch-DenyHosts_regex.py --- /usr/ports/security/denyhosts/files/patch-DenyHosts_regex.py 2014-03-13 08:38:39.000000000 -0300 +++ denyhosts/files/patch-DenyHosts_regex.py 1969-12-31 20:00:00.000000000 -0400 @@ -1,11 +0,0 @@ ---- DenyHosts/regex.py.orig Sat Jun 23 14:32:34 2007 -+++ DenyHosts/regex.py Sat Jun 23 14:32:58 2007 -@@ -17,7 +17,7 @@ - - FAILED_ENTRY_REGEX4 = re.compile(r"""Authentication failure for (?P<user>.*) .*from (?P<host>.*)""") - --FAILED_ENTRY_REGEX5 = re.compile(r"""User (?P<user>.*) .*from (?P<host>.*) not allowed because none of user's groups are listed in AllowGroups""") -+FAILED_ENTRY_REGEX5 = re.compile(r"""User (?P<user>.*) .*from (?P<host>.*) not allowed because none of user's groups are listed in AllowGroups$""") - - FAILED_ENTRY_REGEX6 = re.compile(r"""Did not receive identification string .*from (::ffff:)?(?P<host>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})""") - diff -ruN /usr/ports/security/denyhosts/files/patch-daemon-control-dist denyhosts/files/patch-daemon-control-dist --- /usr/ports/security/denyhosts/files/patch-daemon-control-dist 2014-03-13 08:38:39.000000000 -0300 +++ denyhosts/files/patch-daemon-control-dist 2014-05-20 16:11:13.908240851 -0300 @@ -1,18 +1,15 @@ - -$FreeBSD$ - ---- daemon-control-dist.orig -+++ daemon-control-dist +--- ./daemon-control-dist.orig 2014-05-16 21:23:56.000000000 -0300 ++++ ./daemon-control-dist 2014-05-20 16:10:29.066444772 -0300 @@ -11,9 +11,9 @@ #### Edit these to suit your configuration #### ############################################### --DENYHOSTS_BIN = "/usr/bin/denyhosts.py" --DENYHOSTS_LOCK = "/var/lock/subsys/denyhosts" --DENYHOSTS_CFG = "/usr/share/denyhosts/denyhosts.cfg" -+DENYHOSTS_BIN = "%%PREFIX%%/bin/denyhosts.py" -+DENYHOSTS_LOCK = "/var/run/denyhosts" -+DENYHOSTS_CFG = "%%PREFIX%%/share/denyhosts/denyhosts.cfg" +-DENYHOSTS_BIN = "/usr/sbin/denyhosts" +-DENYHOSTS_LOCK = "/run/denyhosts.pid" +-DENYHOSTS_CFG = "/etc/denyhosts.conf" ++DENYHOSTS_BIN = "/usr/local/bin/denyhosts" ++DENYHOSTS_LOCK = "/var/run/denyhostS" ++DENYHOSTS_CFG = "/usr/local/etc/denyhosts.conf" + PYTHON_BIN = "/usr/bin/env python" - ############################################### diff -ruN /usr/ports/security/denyhosts/files/patch-denyhosts.cfg-dist denyhosts/files/patch-denyhosts.cfg-dist --- /usr/ports/security/denyhosts/files/patch-denyhosts.cfg-dist 2014-03-13 08:38:39.000000000 -0300 +++ denyhosts/files/patch-denyhosts.cfg-dist 1969-12-31 20:00:00.000000000 -0400 @@ -1,79 +0,0 @@ - -$FreeBSD$ - ---- denyhosts.cfg-dist.orig -+++ denyhosts.cfg-dist -@@ -9,10 +9,10 @@ - # argument - # - # Redhat or Fedora Core: --SECURE_LOG = /var/log/secure -+#SECURE_LOG = /var/log/secure - # - # Mandrake, FreeBSD or OpenBSD: --#SECURE_LOG = /var/log/auth.log -+SECURE_LOG = /var/log/auth.log - # - # SuSE: - #SECURE_LOG = /var/log/messages -@@ -31,7 +31,7 @@ - # HOSTS_DENY: the file which contains restricted host access information - # - # Most operating systems: --HOSTS_DENY = /etc/hosts.deny -+HOSTS_DENY = /etc/hosts.deniedssh - # - # Some BSD (FreeBSD) Unixes: - #HOSTS_DENY = /etc/hosts.allow -@@ -90,7 +90,7 @@ - # To block all services for the offending host: - #BLOCK_SERVICE = ALL - # To block only sshd: --BLOCK_SERVICE = sshd -+#BLOCK_SERVICE = sshd - # To only record the offending host and nothing else (if using - # an auxilary file to list the hosts). Refer to: - # http://denyhosts.sourceforge.net/faq.html#aux -@@ -150,7 +150,7 @@ - # Note: it is recommended that you use an absolute pathname - # for this value (eg. /home/foo/denyhosts/data) - # --WORK_DIR = /usr/share/denyhosts/data -+WORK_DIR = %%PREFIX%%/share/denyhosts/data - # - ####################################################################### - -@@ -176,7 +176,7 @@ - # the corresponding hostname will be looked up and reported as well - # (if available). - # --HOSTNAME_LOOKUP=YES -+HOSTNAME_LOOKUP=NO - # - ###################################################################### - -@@ -192,10 +192,10 @@ - # running at a time. - # - # Redhat/Fedora: --LOCK_FILE = /var/lock/subsys/denyhosts -+#LOCK_FILE = /var/lock/subsys/denyhosts - # --# Debian --#LOCK_FILE = /var/run/denyhosts.pid -+# Debian (and FreeBSD) -+LOCK_FILE = /var/run/denyhosts.pid - # - # Misc - #LOCK_FILE = /tmp/denyhosts.lock -@@ -414,7 +414,9 @@ - # See this faq entry for more details: - # http://denyhosts.sf.net/faq.html#userdef_regex - # --#USERDEF_FAILED_ENTRY_REGEX= -+USERDEF_FAILED_ENTRY_REGEX=[a|A]uthentication error for (?P<invalid>invalid user |illegal user )?(?P<user>.*?) from (::ffff:)?(?P<host>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}) -+USERDEF_FAILED_ENTRY_REGEX=[a|A]uthentication error for (?P<invalid>invalid user |illegal user )?(?P<user>.*?) from (?P<host>.*) -+# sorry no entries for IPv6 address yet :( - # - # - ###################################################################### diff -ruN /usr/ports/security/denyhosts/files/patch-denyhosts.conf denyhosts/files/patch-denyhosts.conf --- /usr/ports/security/denyhosts/files/patch-denyhosts.conf 1969-12-31 20:00:00.000000000 -0400 +++ denyhosts/files/patch-denyhosts.conf 2014-05-20 16:11:13.929231518 -0300 @@ -0,0 +1,67 @@ +--- ./denyhosts.conf.orig 2014-05-17 16:04:14.000000000 -0300 ++++ ./denyhosts.conf 2014-05-20 16:11:04.932200769 -0300 +@@ -12,7 +12,7 @@ + #SECURE_LOG = /var/log/secure + # + # Mandrake, FreeBSD or OpenBSD: +-#SECURE_LOG = /var/log/auth.log ++SECURE_LOG = /var/log/auth.log + # + # SuSE: + #SECURE_LOG = /var/log/messages +@@ -25,7 +25,7 @@ + #SECURE_LOG=/private/var/log/system.log + # + # Debian and Ubuntu +-SECURE_LOG = /var/log/auth.log ++#SECURE_LOG = /var/log/auth.log + ######################################################################## + + ######################################################################## +@@ -33,7 +33,7 @@ + # HOSTS_DENY: the file which contains restricted host access information + # + # Most operating systems: +-HOSTS_DENY = /etc/hosts.deny ++HOSTS_DENY = /etc/hosts.deniedssh + # + # Some BSD (FreeBSD) Unixes: + #HOSTS_DENY = /etc/hosts.allow +@@ -152,7 +152,7 @@ + # Note: it is recommended that you use an absolute pathname + # for this value (eg. /home/foo/denyhosts/data) + # +-WORK_DIR = /var/lib/denyhosts ++WORK_DIR = /usr/local/share/denyhosts/data + # + ####################################################################### + +@@ -164,7 +164,7 @@ + # Note: it is recommended that you use an absolute pathname + # for this value (eg. /etc or /usr/local/etc) + # +-ETC_DIR = /etc ++ETC_DIR = /usr/local/etc + # + ####################################################################### + +@@ -210,7 +210,7 @@ + # Redhat/Fedora: + #LOCK_FILE = /var/lock/subsys/denyhosts + # +-# Debian ++# Debian and FreeBSD + LOCK_FILE = /var/run/denyhosts.pid + # + # Misc +@@ -430,7 +430,9 @@ + # See this faq entry for more details: + # http://denyhosts.sf.net/faq.html#userdef_regex + # +-#USERDEF_FAILED_ENTRY_REGEX= ++USERDEF_FAILED_ENTRY_REGEX=[a|A]uthentication error for (?P<invalid>invalid user |illegal user )?(?P<user>.*?) from (::ffff:)?(?P<host>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}) ++USERDEF_FAILED_ENTRY_REGEX=[a|A]uthentication error for (?P<invalid>invalid user |illegal user )?(?P<user>.*?) from (?P<host>.*) ++ + # + # + ###################################################################### diff -ruN /usr/ports/security/denyhosts/files/patch-scripts_restrited-from-passwd.py denyhosts/files/patch-scripts_restrited-from-passwd.py --- /usr/ports/security/denyhosts/files/patch-scripts_restrited-from-passwd.py 2014-03-13 08:38:39.000000000 -0300 +++ denyhosts/files/patch-scripts_restrited-from-passwd.py 1969-12-31 20:00:00.000000000 -0400 @@ -1,11 +0,0 @@ ---- scripts/restricted_from_passwd.py.orig 2008-11-26 12:06:31.231726279 -0500 -+++ scripts/restricted_from_passwd.py 2008-11-26 12:06:36.696728675 -0500 -@@ -11,7 +11,7 @@ - # - ############################################################################ - --RESTRICTED_SHELLS = ("/sbin/nologin", -+RESTRICTED_SHELLS = ("/usr/sbin/nologin", - "/sbin/shutdown", - "/sbin/halt") - diff -ruN /usr/ports/security/denyhosts/files/patch-setup.py denyhosts/files/patch-setup.py --- /usr/ports/security/denyhosts/files/patch-setup.py 2014-03-13 08:38:39.000000000 -0300 +++ denyhosts/files/patch-setup.py 1969-12-31 20:00:00.000000000 -0400 @@ -1,27 +0,0 @@ - -$FreeBSD$ - ---- setup.py.orig -+++ setup.py -@@ -8,7 +8,7 @@ - from glob import glob - - --libpath = "/usr/share/denyhosts" -+libpath = "%%PREFIX%%/share/denyhosts" - scriptspath = "%s/scripts" % libpath - pluginspath = "%s/plugins" % libpath - -@@ -26,11 +26,8 @@ - data_files=[(libpath, glob("denyhosts.cfg-dist")), - (libpath, glob("setup.py")), - (libpath, glob("daemon-control-dist")), -- (libpath, glob("CHANGELOG.txt")), -- (libpath, glob("README.txt")), - (scriptspath, glob("scripts/*")), -- (pluginspath, glob("plugins/*")), -- (libpath, glob("LICENSE.txt"))], -+ (pluginspath, glob("plugins/*"))], - license="GPL v2", - ##extra_path='denyhosts', - long_description=""" diff -ruN /usr/ports/security/denyhosts/pkg-descr denyhosts/pkg-descr --- /usr/ports/security/denyhosts/pkg-descr 2014-03-13 08:38:39.000000000 -0300 +++ denyhosts/pkg-descr 2014-05-20 15:40:52.490263817 -0300 @@ -14,8 +14,8 @@ - Keeps track of suspicious logins - Keeps track of the file offset, so that you can reparse the same file - When the log file is rotated, the script will detect it -- Appends /etc/hosts.allow +- Appends /etc/hosts.deny - Optionally sends an email of newly banned hosts and suspicious logins. - Resolves IP addresses to hostnames, if you want -WWW: http://denyhosts.sourceforge.net/ +WWW: http://denyhost.sourceforge.net/ diff -ruN /usr/ports/security/denyhosts/pkg-plist denyhosts/pkg-plist --- /usr/ports/security/denyhosts/pkg-plist 2014-03-13 08:38:39.000000000 -0300 +++ denyhosts/pkg-plist 2014-05-20 16:08:11.632233690 -0300 @@ -1,16 +1,5 @@ bin/denyhosts.py -@unexec if cmp -s %D/etc/denyhosts.conf %D/etc/denyhosts.conf-dist; then rm -f %D/etc/denyhosts.conf; fi -etc/denyhosts.conf-dist -@exec [ -f %B/denyhosts.conf ] || cp -f %B/%f %B/denyhosts.conf -%%DATADIR%%/daemon-control-dist -%%DATADIR%%/denyhosts.cfg-dist -%%DATADIR%%/setup.py -%%DATADIR%%/scripts/restricted_from_invalid.py -%%DATADIR%%/scripts/restricted_from_passwd.py -%%DATADIR%%/plugins/README.contrib -%%DATADIR%%/plugins/shorewall_allow.sh -%%DATADIR%%/plugins/shorewall_deny.sh -%%DATADIR%%/plugins/test_deny.py +etc/denyhosts.conf %%PYTHON_SITELIBDIR%%/DenyHosts/loginattempt.py %%PYTHON_SITELIBDIR%%/DenyHosts/loginattempt.pyc %%PYTHON_SITELIBDIR%%/DenyHosts/loginattempt.pyo @@ -75,6 +64,3 @@ %%PYTHON_SITELIBDIR%%/DenyHosts/restricted.pyc %%PYTHON_SITELIBDIR%%/DenyHosts/restricted.pyo @dirrm %%PYTHON_SITELIBDIR%%/DenyHosts -@dirrm %%DATADIR%%/scripts -@dirrm %%DATADIR%%/plugins -@dirrm %%DATADIR%% >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201405201918.s4KJIePL050046>