From owner-freebsd-ports-bugs@FreeBSD.ORG Tue Mar 28 14:50:16 2006 Return-Path: X-Original-To: freebsd-ports-bugs@hub.freebsd.org Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 4BAB316A420 for ; Tue, 28 Mar 2006 14:50:16 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id B765B43D49 for ; Tue, 28 Mar 2006 14:50:15 +0000 (GMT) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.13.4/8.13.4) with ESMTP id k2SEoFNq094261 for ; Tue, 28 Mar 2006 14:50:15 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.13.4/8.13.4/Submit) id k2SEoFuV094254; Tue, 28 Mar 2006 14:50:15 GMT (envelope-from gnats) Resent-Date: Tue, 28 Mar 2006 14:50:15 GMT Resent-Message-Id: <200603281450.k2SEoFuV094254@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Janos Mohacsi Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id E524B16A400 for ; Tue, 28 Mar 2006 14:41:30 +0000 (UTC) (envelope-from mohacsi@scone.ki.iif.hu) Received: from scone.ki.iif.hu (scone.ki.iif.hu [193.6.222.31]) by mx1.FreeBSD.org (Postfix) with ESMTP id 5873143D48 for ; Tue, 28 Mar 2006 14:41:30 +0000 (GMT) (envelope-from mohacsi@scone.ki.iif.hu) Received: (from mohacsi@localhost) by scone.ki.iif.hu (8.13.4/8.13.4) id k2SEelxP068307; Tue, 28 Mar 2006 16:40:47 +0200 (CEST) (envelope-from mohacsi) Message-Id: <200603281440.k2SEelxP068307@scone.ki.iif.hu> Date: Tue, 28 Mar 2006 16:40:47 +0200 (CEST) From: Janos Mohacsi To: FreeBSD-gnats-submit@FreeBSD.org X-Send-Pr-Version: 3.113 Cc: Subject: ports/95044: [MAINTAINER] security/denyhosts: update to 2.2 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 28 Mar 2006 14:50:16 -0000 >Number: 95044 >Category: ports >Synopsis: [MAINTAINER] security/denyhosts: update to 2.2 >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: maintainer-update >Submitter-Id: current-users >Arrival-Date: Tue Mar 28 14:50:14 GMT 2006 >Closed-Date: >Last-Modified: >Originator: Janos Mohacsi >Release: FreeBSD 6.1-PRERELEASE i386 >Organization: NIIF/HUNGARNET >Environment: System: FreeBSD scone.ki.iif.hu 6.1-PRERELEASE FreeBSD 6.1-PRERELEASE #11: Fri Mar 24 09:10:25 CET 2006 >Description: Maintainer Update to security/denyhosts to version 2.2 most important original package changes: - Added synchronization mode capability which allows all DenyHosts daemons the ability to seemlessly share denied host data. Added file(s): - pkg-message - containing additional installation instruction Generated with FreeBSD Port Tools 0.63 >How-To-Repeat: >Fix: --- denyhosts-2.2.patch begins here --- diff -ruN --exclude=CVS /usr/ports/security/denyhosts.orig/Makefile /usr/ports/security/denyhosts/Makefile --- /usr/ports/security/denyhosts.orig/Makefile Fri Nov 11 07:45:58 2005 +++ /usr/ports/security/denyhosts/Makefile Tue Mar 28 16:33:00 2006 @@ -6,7 +6,7 @@ # PORTNAME= denyhosts -PORTVERSION= 1.1.2 +PORTVERSION= 2.2 CATEGORIES= security MASTER_SITES= ${MASTER_SITE_SOURCEFORGE} MASTER_SITE_SUBDIR= ${PORTNAME} @@ -34,5 +34,6 @@ @${INSTALL_DATA} ${WRKSRC}/${file} ${DOCSDIR} .endfor .endif + @${CAT} ${PKGMESSAGE} .include diff -ruN --exclude=CVS /usr/ports/security/denyhosts.orig/distinfo /usr/ports/security/denyhosts/distinfo --- /usr/ports/security/denyhosts.orig/distinfo Fri Nov 11 07:45:58 2005 +++ /usr/ports/security/denyhosts/distinfo Tue Mar 28 13:19:04 2006 @@ -1,3 +1,3 @@ -MD5 (DenyHosts-1.1.2.tar.gz) = d2c6f00243c0fcd0f4498c3c71a1074e -SHA256 (DenyHosts-1.1.2.tar.gz) = e570af443d87a1b6cc4262c2e4f769e07ba5de7d75f9980f8f914160ed9c1a04 -SIZE (DenyHosts-1.1.2.tar.gz) = 31000 +MD5 (DenyHosts-2.2.tar.gz) = feba0e9a48dbf1fa9cbd2b5b8907f349 +SHA256 (DenyHosts-2.2.tar.gz) = 369d37528287550ae152b2cd553549c021dab3c5a6b15fea93656749e7559bfd +SIZE (DenyHosts-2.2.tar.gz) = 40972 diff -ruN --exclude=CVS /usr/ports/security/denyhosts.orig/files/patch-denyhosts.cfg-dist /usr/ports/security/denyhosts/files/patch-denyhosts.cfg-dist --- /usr/ports/security/denyhosts.orig/files/patch-denyhosts.cfg-dist Fri Nov 11 07:45:58 2005 +++ /usr/ports/security/denyhosts/files/patch-denyhosts.cfg-dist Tue Mar 28 16:14:26 2006 @@ -1,35 +1,58 @@ -$FreeBSD: ports/security/denyhosts/files/patch-denyhosts.cfg-dist,v 1.1 2005/11/11 06:45:58 vanilla Exp $ +$FreeBSD$ --- denyhosts.cfg-dist.orig +++ denyhosts.cfg-dist @@ -9,10 +9,10 @@ # argument # - # Redhat: + # Redhat or Fedora Core: -SECURE_LOG = /var/log/secure +#SECURE_LOG = /var/log/secure # - # Mandrake or FreeBSD: + # Mandrake, FreeBSD or OpenBSD: -#SECURE_LOG = /var/log/auth.log +SECURE_LOG = /var/log/auth.log # # SuSE: #SECURE_LOG = /var/log/messages -@@ -23,10 +23,10 @@ +@@ -23,7 +23,7 @@ # HOSTS_DENY: the file which contains restricted host access information # # Most operating systems: -HOSTS_DENY = /etc/hosts.deny -+#HOSTS_DENY = /etc/hosts.deny ++HOSTS_DENY = /etc/hosts.deniedssh # # Some BSD (FreeBSD) Unixes: --#HOSTS_DENY = /etc/hosts.allow -+HOSTS_DENY = /etc/hosts.allow - # - # Another possibility (also see the next option): - #HOSTS_DENY = /etc/hosts.evil -@@ -157,10 +157,10 @@ + #HOSTS_DENY = /etc/hosts.allow +@@ -66,7 +66,7 @@ + # To block all services for the offending host: + #BLOCK_SERVICE = ALL + # To block only sshd: +-BLOCK_SERVICE = sshd ++#BLOCK_SERVICE = sshd + # To only record the offending host and nothing else (if using + # an auxilary file to list the hosts). Refer to: + # http://denyhosts.sourceforge.net/faq.html#aux +@@ -126,7 +126,7 @@ + # Note: it is recommended that you use an absolute pathname + # for this value (eg. /home/foo/denyhosts/data) + # +-WORK_DIR = /usr/share/denyhosts/data ++WORK_DIR = %%PREFIX%%/share/denyhosts/data + # + ####################################################################### + +@@ -152,7 +152,7 @@ + # the corresponding hostname will be looked up and reported as well + # (if available). + # +-HOSTNAME_LOOKUP=YES ++HOSTNAME_LOOKUP=NO + # + ###################################################################### + +@@ -168,10 +168,10 @@ # running at a time. # # Redhat/Fedora: diff -ruN --exclude=CVS /usr/ports/security/denyhosts.orig/files/patch-setup.py /usr/ports/security/denyhosts/files/patch-setup.py --- /usr/ports/security/denyhosts.orig/files/patch-setup.py Fri Nov 11 07:45:58 2005 +++ /usr/ports/security/denyhosts/files/patch-setup.py Tue Mar 28 16:18:36 2006 @@ -1,26 +1,27 @@ -$FreeBSD: ports/security/denyhosts/files/patch-setup.py,v 1.1 2005/11/11 06:45:58 vanilla Exp $ +$FreeBSD$ --- setup.py.orig +++ setup.py -@@ -7,7 +7,7 @@ +@@ -8,7 +8,7 @@ from glob import glob -libpath = "/usr/share/denyhosts" +libpath = "%%PREFIX%%/share/denyhosts" + scriptspath = "%s/scripts" % libpath + pluginspath = "%s/plugins" % libpath - ######################################################################### - -@@ -24,10 +24,7 @@ +@@ -26,11 +26,8 @@ data_files=[(libpath, glob("denyhosts.cfg-dist")), - (libpath, glob("denyhosts-daemon-initscript")), (libpath, glob("setup.py")), -- (libpath, glob("daemon-control-dist")), + (libpath, glob("daemon-control-dist")), - (libpath, glob("CHANGELOG.txt")), - (libpath, glob("README.txt")), + (scriptspath, glob("scripts/*")), +- (pluginspath, glob("plugins/*")), - (libpath, glob("LICENSE.txt"))], -+ (libpath, glob("daemon-control-dist"))], - license="GPL", ++ (pluginspath, glob("plugins/*"))], + license="GPL v2", ##extra_path='denyhosts', long_description=""" diff -ruN --exclude=CVS /usr/ports/security/denyhosts.orig/pkg-message /usr/ports/security/denyhosts/pkg-message --- /usr/ports/security/denyhosts.orig/pkg-message Thu Jan 1 01:00:00 1970 +++ /usr/ports/security/denyhosts/pkg-message Tue Mar 28 16:34:25 2006 @@ -0,0 +1,8 @@ +------------------------------------------------------------------------------- +In order to proper working of denyhosts +1. edit your /etc/hosts.allow file and add: +sshd : /etc/hosts.deniedssh : deny +sshd : ALL : allow +2. issue the following command if /etc/hosts.deniedssh does not exist yet +touch /etc/hosts.deniedssh +------------------------------------------------------------------------------- diff -ruN --exclude=CVS /usr/ports/security/denyhosts.orig/pkg-plist /usr/ports/security/denyhosts/pkg-plist --- /usr/ports/security/denyhosts.orig/pkg-plist Fri Nov 11 07:45:58 2005 +++ /usr/ports/security/denyhosts/pkg-plist Tue Mar 28 16:28:01 2006 @@ -2,6 +2,12 @@ %%DATADIR%%/denyhosts.cfg-dist %%DATADIR%%/setup.py %%DATADIR%%/daemon-control-dist +%%DATADIR%%/scripts/restricted_from_invalid.py +%%DATADIR%%/scripts/restricted_from_passwd.py +%%DATADIR%%/plugins/README.contrib +%%DATADIR%%/plugins/shorewall_allow.sh +%%DATADIR%%/plugins/shorewall_deny.sh +%%DATADIR%%/plugins/test_deny.py %%PYTHON_SITELIBDIR%%/DenyHosts/loginattempt.py %%PYTHON_SITELIBDIR%%/DenyHosts/loginattempt.pyc %%PYTHON_SITELIBDIR%%/DenyHosts/loginattempt.pyo @@ -56,9 +62,17 @@ %%PYTHON_SITELIBDIR%%/DenyHosts/regex.py %%PYTHON_SITELIBDIR%%/DenyHosts/regex.pyc %%PYTHON_SITELIBDIR%%/DenyHosts/regex.pyo +%%PYTHON_SITELIBDIR%%/DenyHosts/sync.py +%%PYTHON_SITELIBDIR%%/DenyHosts/sync.pyc +%%PYTHON_SITELIBDIR%%/DenyHosts/sync.pyo +%%PYTHON_SITELIBDIR%%/DenyHosts/restricted.py +%%PYTHON_SITELIBDIR%%/DenyHosts/restricted.pyc +%%PYTHON_SITELIBDIR%%/DenyHosts/restricted.pyo %%PORTDOCS%%%%DOCSDIR%%/CHANGELOG.txt %%PORTDOCS%%%%DOCSDIR%%/LICENSE.txt %%PORTDOCS%%%%DOCSDIR%%/README.txt %%PORTDOCS%%@dirrm %%DOCSDIR%% @dirrm %%PYTHON_SITELIBDIR%%/DenyHosts +@dirrm %%DATADIR%%/scripts +@dirrm %%DATADIR%%/plugins @dirrm %%DATADIR%% --- denyhosts-2.2.patch ends here --- >Release-Note: >Audit-Trail: >Unformatted: