mirror of
https://git.freebsd.org/ports.git
synced 2025-06-04 12:26:27 -04:00
security/sshguard: Unbreak build by making a metaport
security/sshguard no longer provides hosts/TCP Wrappers support by default as this was removed upstream. It is now a metaport which will allow you to select a backend. Further details can be found in the UPDATING entry.
This commit is contained in:
parent
1c6c8e6f88
commit
8e2c40afaa
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=421094
6 changed files with 56 additions and 15 deletions
23
UPDATING
23
UPDATING
|
@ -5,6 +5,29 @@ they are unavoidable.
|
||||||
You should get into the habit of checking this file for changes each time
|
You should get into the habit of checking this file for changes each time
|
||||||
you update your ports collection, before attempting any port upgrades.
|
you update your ports collection, before attempting any port upgrades.
|
||||||
|
|
||||||
|
20160829:
|
||||||
|
AFFECTS: users of security/sshguard
|
||||||
|
AUTHOR: feld@FreeBSD.org
|
||||||
|
|
||||||
|
Sshguard has been updated to 1.7.0. There have been several changes to
|
||||||
|
this release. Notably the hosts and ipfilter backends are no longer
|
||||||
|
supported. If you need these backends to be supported and you missed
|
||||||
|
the survey sent out by upstream I urge you to contact upstream.
|
||||||
|
|
||||||
|
The hosts backend was previously served by security/sshguard directly.
|
||||||
|
The additional backends were slave ports with package name suffixes. I
|
||||||
|
have opted to keep the master/slave port relationship but not choose a
|
||||||
|
specific backend for security/sshguard. Instead it is now a metaport
|
||||||
|
which will prompt you for which backend you prefer. If no backend is
|
||||||
|
configured it will depend on security/sshguard-ipfw, which is the
|
||||||
|
native FreeBSD firewall. This my be surprising to users who depended
|
||||||
|
on security/sshguard which only provided hosts/TCP Wrappers blocking,
|
||||||
|
but there is no replacement at this time.
|
||||||
|
|
||||||
|
If the removed backends return due to user demand they will be added
|
||||||
|
as slave ports for consistency. I apologize for any inconvenience and
|
||||||
|
lack of notice on the deprecation of these features.
|
||||||
|
|
||||||
20160815:
|
20160815:
|
||||||
AFFECTS: users of mail/rspamd*
|
AFFECTS: users of mail/rspamd*
|
||||||
AUTHOR: vsevolod@FreeBSD.org
|
AUTHOR: vsevolod@FreeBSD.org
|
||||||
|
|
|
@ -5,7 +5,7 @@ PKGNAMESUFFIX= -ipfw
|
||||||
|
|
||||||
COMMENT= Protect hosts from brute force attacks against ssh and other services using ipfw
|
COMMENT= Protect hosts from brute force attacks against ssh and other services using ipfw
|
||||||
|
|
||||||
CONFLICTS= sshguard-1.* sshguard-ipfilter-1.* sshguard-pf-1.* sshguard-null-1.*
|
CONFLICTS= sshguard-pf-1.* sshguard-null-1.*
|
||||||
|
|
||||||
SSHGUARDFW= ipfw
|
SSHGUARDFW= ipfw
|
||||||
MASTERDIR= ${.CURDIR}/../sshguard
|
MASTERDIR= ${.CURDIR}/../sshguard
|
||||||
|
|
|
@ -5,7 +5,7 @@ PKGNAMESUFFIX= -null
|
||||||
|
|
||||||
COMMENT= Protect hosts from brute force attacks against ssh and other services
|
COMMENT= Protect hosts from brute force attacks against ssh and other services
|
||||||
|
|
||||||
CONFLICTS= sshguard-1.* sshguard-ipfilter-1.* sshguard-ipfw-1.* sshguard-pf-1.*
|
CONFLICTS= sshguard-ipfw-1.* sshguard-pf-1.*
|
||||||
|
|
||||||
SSHGUARDFW= null
|
SSHGUARDFW= null
|
||||||
MASTERDIR= ${.CURDIR}/../sshguard
|
MASTERDIR= ${.CURDIR}/../sshguard
|
||||||
|
|
|
@ -5,7 +5,7 @@ PKGNAMESUFFIX= -pf
|
||||||
|
|
||||||
COMMENT= Protect hosts from brute force attacks against ssh and other services using pf
|
COMMENT= Protect hosts from brute force attacks against ssh and other services using pf
|
||||||
|
|
||||||
CONFLICTS= sshguard-1.* sshguard-ipfilter-1.* sshguard-ipfw-1.* sshguard-null-1.*
|
CONFLICTS= sshguard-ipfw-1.* sshguard-null-1.*
|
||||||
|
|
||||||
SSHGUARDFW= pf
|
SSHGUARDFW= pf
|
||||||
MASTERDIR= ${.CURDIR}/../sshguard
|
MASTERDIR= ${.CURDIR}/../sshguard
|
||||||
|
|
|
@ -3,16 +3,40 @@
|
||||||
|
|
||||||
PORTNAME= sshguard
|
PORTNAME= sshguard
|
||||||
PORTVERSION= 1.7.0
|
PORTVERSION= 1.7.0
|
||||||
PORTREVISION= 0
|
PORTREVISION= 1
|
||||||
CATEGORIES= security
|
CATEGORIES= security
|
||||||
MASTER_SITES= SF/sshguard/sshguard/${PORTVERSION}
|
MASTER_SITES= SF/sshguard/sshguard/${PORTVERSION}
|
||||||
|
|
||||||
MAINTAINER= feld@FreeBSD.org
|
MAINTAINER= feld@FreeBSD.org
|
||||||
COMMENT?= Protect hosts from brute force attacks against ssh and other services
|
COMMENT?= Protect hosts from brute force attacks against ssh and other services
|
||||||
|
|
||||||
LICENSE= BSD2CLAUSE
|
SSHGUARDFW?= none
|
||||||
|
|
||||||
CONFLICTS?= sshguard-ipfilter-1.* sshguard-ipfw-1.* sshguard-pf-1.* sshguard-null-1.*
|
# If SSHGUARDFW is not set by a slave port, then we only use the
|
||||||
|
# following which makes this a metaport to choose a backend
|
||||||
|
.if ${SSHGUARDFW} == none
|
||||||
|
NO_BUILD=YES
|
||||||
|
NO_INSTALL=YES
|
||||||
|
NO_ARCH=YES
|
||||||
|
|
||||||
|
OPTIONS_SINGLE= BACKEND
|
||||||
|
OPTIONS_SINGLE_BACKEND= IPFW NULL PF
|
||||||
|
OPTIONS_DEFAULT= IPFW
|
||||||
|
|
||||||
|
IPFW_DESC= IPFW firewall backend
|
||||||
|
NULL_DESC= null firewall backend (detection only)
|
||||||
|
PF_DESC= pf firewall backend
|
||||||
|
|
||||||
|
IPFW_RUN_DEPENDS= sshguard-ipfw>0:security/sshguard-ipfw
|
||||||
|
NULL_RUN_DEPENDS= sshguard-null>0:security/sshguard-null
|
||||||
|
PF_RUN_DEPENDS= sshguard-pf>0:security/sshguard-pf
|
||||||
|
|
||||||
|
.include <bsd.port.options.mk>
|
||||||
|
|
||||||
|
# The remaining settings are used by the slave ports
|
||||||
|
.else
|
||||||
|
|
||||||
|
LICENSE= BSD2CLAUSE
|
||||||
|
|
||||||
USES= autoreconf
|
USES= autoreconf
|
||||||
|
|
||||||
|
@ -26,20 +50,14 @@ CONFIGURE_ARGS+=--with-firewall=${SSHGUARDFW}
|
||||||
|
|
||||||
SUB_LIST+= PKGMSG_FWBLOCK=${PKGMSG_FWBLOCK}
|
SUB_LIST+= PKGMSG_FWBLOCK=${PKGMSG_FWBLOCK}
|
||||||
SUB_FILES= pkg-message
|
SUB_FILES= pkg-message
|
||||||
|
.endif
|
||||||
# backend type in { hosts, ipfw, null, pf }
|
|
||||||
SSHGUARDFW?= hosts
|
|
||||||
|
|
||||||
.if ${SSHGUARDFW} == pf
|
.if ${SSHGUARDFW} == pf
|
||||||
PKGMSG_FWBLOCK=" To activate or configure PF see http://www.sshguard.net/docs/setup/firewall/pf/"
|
PKGMSG_FWBLOCK=" To activate or configure PF see http://www.sshguard.net/docs/setup/firewall/pf/"
|
||||||
.elif ${SSHGUARDFW} == ipfw
|
.elif ${SSHGUARDFW} == ipfw
|
||||||
PKGMSG_FWBLOCK=" IPFW support has been rewritten. Sshguard will now add entries to table 22."
|
PKGMSG_FWBLOCK=" IPFW support has been rewritten. Sshguard will now add entries to table 22."
|
||||||
.elif ${SSHGUARDFW} == hosts
|
|
||||||
PKGMSG_FWBLOCK=" Sshguard is going to use /etc/hosts.allow. Please remember to touch /etc/hosts.allow\!"
|
|
||||||
.elif ${SSHGUARDFW} == ipfilter
|
|
||||||
PKGMSG_FWBLOCK=" Sshguard will use /etc/ipf.rules as ruleset."
|
|
||||||
.elif ${SSHGUARDFW} == null
|
.elif ${SSHGUARDFW} == null
|
||||||
PKGMSG_FWBLOCK=" Sshguard null backend requires you provide your own script with the \"-e\" argument."
|
PKGMSG_FWBLOCK=" Sshguard null backend does detection only. It does not take action."
|
||||||
.endif
|
.endif
|
||||||
|
|
||||||
.include <bsd.port.mk>
|
.include <bsd.port.mk>
|
||||||
|
|
|
@ -5,7 +5,7 @@ Sshguard employs a clever parser that can recognize several logging formats at
|
||||||
once transparently (syslog, syslog-ng, metalog, multilog, raw messages), and
|
once transparently (syslog, syslog-ng, metalog, multilog, raw messages), and
|
||||||
detects attacks for many services out of the box, including SSH, FreeBSD's
|
detects attacks for many services out of the box, including SSH, FreeBSD's
|
||||||
ftpd and dovecot. It can operate all the major firewalling systems, including
|
ftpd and dovecot. It can operate all the major firewalling systems, including
|
||||||
PF, netfilter/iptables, IPFIREWALL/ipfw, IPFILTER.
|
PF, netfilter/iptables, and IPFIREWALL/ipfw.
|
||||||
|
|
||||||
Sshguard has several relevant features like support for IPv6, whitelisting,
|
Sshguard has several relevant features like support for IPv6, whitelisting,
|
||||||
suspension, log message authentication. It is reliable, easy to set up and
|
suspension, log message authentication. It is reliable, easy to set up and
|
||||||
|
|
Loading…
Add table
Reference in a new issue