non port: security/sshguard/Makefile |
Number of commits found: 63 |
Sunday, 25 Feb 2024
|
13:24 Muhammad Moinur Rahman (bofh)
security/sshguard: Moved man to share/man
Approved by: portmgr (blanket)
644a7d9 |
Monday, 13 Nov 2023
|
11:34 Renato Botelho (garga) Author: Kevin Zheng
security/sshguard: Fix build on FreeBSD 12
PR: 274985
Reported by: Yani Karydis <yani@pi-greece.eu>
2eca5c8 |
Monday, 6 Nov 2023
|
11:36 Fernando Apesteguía (fernape) Author: Chris Moerz
security/sshguard: fix logging of entries with hostnames
With work from martin@lispworks.com
PR: 272249
Reported by: martin@lispworks.com
Approved by: kevinz5000@gmail.com (maintainer)
efda5c5 |
Wednesday, 7 Sep 2022
|
21:10 Stefan Eßer (se)
Add WWW entries to port Makefiles
It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.
Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.
There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
This commit implements such a proposal and moves one of the WWW: entries
of each pkg-descr file into the respective port's Makefile. A heuristic
attempts to identify the most relevant URL in case there is more than
one WWW: entry in some pkg-descr file. URLs that are not moved into the
Makefile are prefixed with "See also:" instead of "WWW:" in the pkg-descr
files in order to preserve them.
There are 1256 ports that had no WWW: entries in pkg-descr files. These
ports will not be touched in this commit.
The portlint port has been adjusted to expect a WWW entry in each port
Makefile, and to flag any remaining "WWW:" lines in pkg-descr files as
deprecated.
Approved by: portmgr (tcberner)
b7f0544 |
Wednesday, 20 Jul 2022
|
14:22 Tobias C. Berner (tcberner)
security: remove 'Created by' lines
A big Thank You to the original contributors of these ports:
* <ports@c0decafe.net>
* Aaron Dalton <aaron@FreeBSD.org>
* Adam Weinberger <adamw@FreeBSD.org>
* Ade Lovett <ade@FreeBSD.org>
* Aldis Berjoza <aldis@bsdroot.lv>
* Alex Dupre <ale@FreeBSD.org>
* Alex Kapranoff <kappa@rambler-co.ru>
* Alex Samorukov <samm@freebsd.org>
* Alexander Botero-Lowry <alex@foxybanana.com>
* Alexander Kriventsov <avk@vl.ru>
* Alexander Leidinger <netchild@FreeBSD.org>
* Alexander Logvinov <ports@logvinov.com>
* Alexander Y. Grigoryev <alexander.4mail@gmail.com>
* Alexey Dokuchaev <danfe@FreeBSD.org>
* Alfred Perlstein
* Alfred Perlstein <alfred@FreeBSD.org>
* Anders Nordby <anders@FreeBSD.org>
* Anders Nordby <anders@fix.no>
* Andreas Klemm <andreas@klemm.gtn.com>
* Andrew Lewis <freeghb@gmail.com>
* Andrew Pantyukhin <infofarmer@FreeBSD.org>
* Andrew St. Jean <andrew@arda.homeunix.net>
* Anes Mukhametov <anes@anes.su>
* Antoine Brodin <antoine@FreeBSD.org>
* Anton Berezin <tobez@FreeBSD.org>
* Antonio Carlos Venancio Junior (<antonio@inf.ufsc.br>)
* Antonio Carlos Venancio Junior <antonio@inf.ufsc.br>
* Ashish SHUKLA <ashish@FreeBSD.org>
* Attila Nagy <bra@fsn.hu>
* Autrijus Tang <autrijus@autrijus.org>
* Axel Rau <axel.rau@chaos1.de>
* Babak Farrokhi <farrokhi@FreeBSD.org>
* Ben Woods <woodsb02@FreeBSD.org>
* Bernard Spil <brnrd@FreeBSD.org>
* Bernard Spil <brnrd@freebsd.org>
* Blaz Zupan <blaz@si.FreeBSD.org>
* Bob Hockney <zeus@ix.netcom.com>
* Boris Kochergin <spawk@acm.poly.edu>
* Brendan Molloy <brendan+freebsd@bbqsrc.net>
* Bruce M Simpson
* Bruce M Simpson <bms@FreeBSD.org>
* Bruce M. Simpson <bms@FreeBSD.org>
* Carlo Strub
* Carlo Strub <cs@FreeBSD.org>
* Carlos J Puga Medina <cpm@FreeBSD.org>
* Carlos J Puga Medina <cpm@fbsd.es>
* Charlie Root <se@FreeBSD.org>
* Cheng-Lung Sung <clsung@FreeBSD.org>
* Cheng-Lung Sung <clsung@dragon2.net>
* Chie Taguchi <taguchi.ch@gmail.com>
* Chris Cowart <ccowart@rescomp.berkeley.edu>
* Chris D. Faulhaber <jedgar@FreeBSD.org>
* Christer Edwards <christer.edwards@gmail.com>
* Christian Lackas
* Christopher Hall <hsw@bitmark.com>
* Clement Laforet <sheepkiller@cultdeadsheep.org>
* Clive Lin <clive@CirX.ORG>
* Colin Percival
* Cory McIntire (loon@noncensored.com)
* Craig Leres <leres@FreeBSD.org>
* Cristiano Deana <cris@gufi.org>
* Cy Schubert (Cy.Schubert@uumail.gov.bc.ca)
* Cy Schubert <Cy.Schubert@uumail.gov.bc.ca>
* Cy Schubert <cy@FreeBSD.org>
* Damian Gerow <dgerow@afflictions.org>
* Damien Bobillot
* Dan Langille
* Dan Langille <dan@freebsddiary.org>
* Dan Langille <dvl@FreeBSD.org>
* Dan Langille <dvl@freebsd.org>
* Dan Langille <dvl@sourcefire.com>
* Daniel Kahn Gillmor <dkg@fifthhorseman.net>
* Daniel Roethlisberger <daniel@roe.ch>
* Danilo Egea Gondolfo <danilo@FreeBSD.org>
* Danton Dorati <urisso@bsd.com.br>
* Dave McKay <dave@mu.org>
* David E. Thiel <lx@FreeBSD.org>
* David O'Brien (obrien@NUXI.com)
* David O'Brien <obrien@FreeBSD.org>
* David Thiel <lx@redundancy.redundancy.org>
* Dean Hollister <dean@odyssey.apana.org.au>
* Denis Shaposhnikov <dsh@vlink.ru>
* Dereckson <dereckson@gmail.com>
* Dirk Froemberg <dirk@FreeBSD.org>
* Ditesh Shashikant Gathani <ditesh@gathani.org>
* Dom Mitchell <dom@happygiraffe.net>
* Dominic Marks <dominic.marks@btinternet.com>
* Don Croyle <croyle@gelemna.org>
* Douglas Thrift <douglas@douglasthrift.net>
* Edson Brandi <ebrandi@fugspbr.org>
* Edwin Groothuis <edwin@mavetju.org>
* Ekkehard 'Ekki' Gehm <gehm@physik.tu-berlin.de>
* Emanuel Haupt <ehaupt@FreeBSD.org>
* Emanuel Haupt <ehaupt@critical.ch>
* Eric Crist <ecrist@secure-computing.net>
* Erwin Lansing <erwin@FreeBSD.org>
* Eugene Grosbein <eugen@FreeBSD.org>
* Fabian Keil <fk@fabiankeil.de>
* Felix Palmen <felix@palmen-it.de>
* Florent Thoumie <flz@xbsd.org>
* Foxfair Hu <foxfair@FreeBSD.org>
* Frank Laszlo <laszlof@vonostingroup.com>
* Frank Wall <fw@moov.de>
* Franz Bettag <franz@bett.ag>
* Gabor Kovesdan
* Gabor Kovesdan <gabor@FreeBSD.org>
* Gabriel M. Dutra <0xdutra@gmail.com>
* Gary Hayers <Gary@Hayers.net>
* Gasol Wu <gasol.wu@gmail.com>
* Gea-Suan Lin <gslin@gslin.org>
* George Reid <greid@ukug.uk.freebsd.org>
* George Reid <services@nevernet.net>
* Greg Larkin <glarkin@FreeBSD.org>
* Greg V <greg@unrelenting.technology>
* Gregory Neil Shapiro <gshapiro@FreeBSD.org>
* Grzegorz Blach <gblach@FreeBSD.org>
* Guangyuan Yang <ygy@FreeBSD.org>
* Hakisho Nukama <nukama@gmail.com>
* Hammurabi Mendes <hmendes@brturbo.com>
* Henk van Oers <hvo.pm@xs4all.nl>
* Horia Racoviceanu <horia@racoviceanu.com>
* Hung-Yi Chen <gaod@hychen.org>
* Jaap Akkerhuis <jaap@NLnetLabs.nl>
* Jaap Boender <jaapb@kerguelen.org>
* Jacek Serwatynski <tutus@trynet.eu.org>
* James FitzGibbon <jfitz@FreeBSD.org>
* James Thomason <james@divide.org>
* Jan-Peter Koopmann <Jan-Peter.Koopmann@seceidos.de>
* Janky Jay <ek@purplehat.org>
* Janos Mohacsi
* Janos Mohacsi <janos.mohacsi@bsd.hu>
* Jean-Yves Lefort <jylefort@brutele.be>
* Jim Geovedi <jim@corebsd.or.id>
* Jim Ohlstein <jim@ohlste.in>
* Joe Clarke <marcus@marcuscom.com>
* Joe Marcus Clarke <marcus@FreeBSD.org>
* Johann Visagie <johann@egenetics.com>
* Johann Visagie <wjv@FreeBSD.org>
* John Ferrell <jdferrell3@yahoo.com>
* John Hixson <jhixson@gmail.com>
* John Polstra <jdp@polstra.com>
* John W. O'Brien <john@saltant.com>
* John-Mark Gurney <jmg@FreeBSD.org>
* Jose Alonso Cardenas Marquez <acardenas@bsd.org.pe>
* Joseph Benden <joe@thrallingpenguin.com>
* Joshua D. Abraham <jabra@ccs.neu.edu>
* Jov <amutu@amutu.com>
* Jui-Nan Lin <jnlin@freebsd.cs.nctu.edu.tw>
* Ka Ho Ng <khng300@gmail.com>
* Kay Lehmann <kay_lehmann@web.de>
* Keith J. Jones <kjones@antihackertoolkit.com>
* Kevin Zheng <kevinz5000@gmail.com>
* Kimura Fuyuki <fuyuki@hadaly.org>
* Kimura Fuyuki <fuyuki@mj.0038.net>
* Klayton Monroe <klm@uidzero.org>
* Konstantin Menshikov <kostjnspb@yandex.ru>
* Koop Mast <kwm@FreeBSD.org>
* Kris Kennaway <kris@FreeBSD.org>
* Kubilay Kocak <koobs@FreeBSD.org>
* Kurt Jaeger <fbsd-ports@opsec.eu>
* LEVAI Daniel <leva@ecentrum.hu>
* Lars Engels <lme@FreeBSD.org>
* Lars Thegler <lth@FreeBSD.org>
* Laurent LEVIER <llevier@argosnet.com>
* Luiz Eduardo R. Cordeiro
* Lukas Slebodnik <lukas.slebodnik@intrak.sk>
* Lukasz Komsta
* Mageirias Anastasios <anastmag@gmail.com>
* Marcel Prisi <marcel.prisi@virtua.ch>
* Marcello Coutinho
* Mario Sergio Fujikawa Ferreira <lioux@FreeBSD.org>
* Mark Felder <feld@FreeBSD.org>
* Mark Hannon <markhannon@optusnet.com.au>
* Mark Murray <markm@FreeBSD.org>
* Mark Pulford <mark@kyne.com.au>
* Marko Njezic <sf@maxempire.com>
* Martin Matuska <martin@tradex.sk>
* Martin Matuska <mm@FreeBSD.org>
* Martin Mersberger
* Martin Wilke <miwi@FreeBSD.org>
* Martti Kuparinen <martti.kuparinen@ericsson.com>
* Mateusz Piotrowski <0mp@FreeBSD.org>
* Matt <matt@xtaz.net>
* Matt Behrens <matt@zigg.com>
* Matthias Andree <mandree@FreeBSD.org>
* Matthias Fechner <mfechner@FreeBSD.org>
* Matthieu BOUTHORS <matthieu@labs.fr>
* Maxim Sobolev <sobomax@FreeBSD.org>
* Meno Abels <meno.abels@adviser.com>
* Michael Haro <mharo@FreeBSD.org>
* Michael Johnson <ahze@FreeBSD.org>
* Michael Nottebrock <lofi@FreeBSD.org>
* Michael Reifenberger <mr@FreeBSD.org>
* Michael Schout <mschout@gkg.net>
* Michal Bielicki <m.bielicki@llizardfs.com>
* Michiel van Baak <michiel@vanbaak.eu
* Mij <mij@bitchx.it>
* Mike Heffner <mheffner@vt.edu>
* Mikhail T. <m.tsatsenko@gmail.com>
* Mikhail Teterin <mi@aldan.algebra.com>
* Milan Obuch
* Mosconi <mosconi.rmg@gmail.com>
* Muhammad Moinur Rahman <5u623l20@gmail.com>
* Mustafa Arif <ma499@doc.ic.ac.uk>
* Neil Booth
* Neil Booth <kyuupichan@gmail.com>
* Nick Barkas <snb@threerings.net>
* Nicola Vitale <nivit@FreeBSD.org>
* Niels Heinen
* Nikola Kolev <koue@chaosophia.net>
* Nobutaka Mantani <nobutaka@FreeBSD.org>
* Oliver Lehmann
* Oliver Lehmann <oliver@FreeBSD.org>
* Olivier Duchateau
* Olivier Duchateau <duchateau.olivier@gmail.com>
* Olli Hauer
* Patrick Li <pat@databits.net>
* Paul Chvostek <paul@it.ca>
* Paul Schmehl <pauls@utdallas.edu>
* Pavel I Volkov <pavelivolkov@googlemail.com>
* Pete Fritchman <petef@databits.net>
* Peter Ankerstal <peter@pean.org>
* Peter Haight <peterh@sapros.com>
* Peter Johnson <johnson.peter@gmail.com>
* Peter Pentchev <roam@FreeBSD.org>
* Petr Rehor <rx@rx.cz>
* Philippe Audeoud <jadawin@tuxaco.net>
* Philippe Rocques <phil@teaser.fr>
* Piotr Kubaj <pkubaj@FreeBSD.org>
* Piotr Kubaj <pkubaj@anongoth.pl>
* Po-Chuan Hsieh <sunpoet@FreeBSD.org>
* RaRa Rasputin <rasputin@submonkey.net>
* Radim Kolar
* Ralf Meister
* Remington Lang <MrL0Lz@gmail.com>
* Renaud Chaput <renchap@cocoa-x.com>
* Roderick van Domburg <r.s.a.vandomburg@student.utwente.nl>
* Roland van Laar <roland@micite.net>
* Romain Tartiere <romain@blogreen.org>
* Roman Bogorodskiy
* Roman Bogorodskiy <novel@FreeBSD.org>
* Roman Shterenzon <roman@xpert.com>
* Rong-En Fan <rafan@FreeBSD.org>
* Ryan Steinmetz <zi@FreeBSD.org>
* Sahil Tandon <sahil@tandon.net>
* Sascha Holzleiter <sascha@root-login.org>
* SeaD
* Seamus Venasse <svenasse@polaris.ca>
* Sean Greven <sean.greven@gmail.com>
* Sebastian Schuetz <sschuetz@fhm.edu>
* Sergei Kolobov <sergei@FreeBSD.org>
* Sergei Kolobov <sergei@kolobov.com>
* Sergei Vyshenski
* Sergei Vyshenski <svysh.fbsd@gmail.com>
* Sergey Skvortsov <skv@protey.ru>
* Seth Kingsley <sethk@meowfishies.com>
* Shaun Amott <shaun@inerd.com>
* Simeon Simeonov <sgs@pichove.org>
* Simon Dick <simond@irrelevant.org>
* Sofian Brabez <sbrabez@gmail.com>
* Stanislav Sedov <ssedov@mbsd.msk.ru>
* Stefan Esser <se@FreeBSD.org>
* Stefan Grundmann
* Stefan Walter <sw@gegenunendlich.de>
* Stephon Chen <stephon@gmail.com>
* Steve Wills <steve@mouf.net>
* Steve Wills <swills@FreeBSD.org>
* Steven Kreuzer
* Steven Kreuzer <skreuzer@exit2shell.com>
* Sunpoet Po-Chuan Hsieh <sunpoet@FreeBSD.org>
* TAKAHASHI Kaoru <kaoru@kaisei.org>
* TAKATSU Tomonari <tota@FreeBSD.org>
* Tatsuki Makino <tatsuki_makino@hotmail.com>
* Thibault Payet <monwarez@mailoo.org>
* Thierry Thomas (<thierry@pompo.net>)
* Thierry Thomas <thierry@pompo.net>
* Thomas Hurst <tom@hur.st>
* Thomas Quinot <thomas@cuivre.fr.eu.org>
* Thomas Zander <riggs@FreeBSD.org>
* Thomas von Dein <freebsd@daemon.de>
* Tilman Linneweh <arved@FreeBSD.org>
* Tim Bishop <tim@bishnet.net>
* Tom Judge <tom@tomjudge.com>
* Tomoyuki Sakurai <cherry@trombik.org>
* Toni Viemerö <toni.viemero@iki.fi>
* Tony Maher
* Torsten Zuhlsdorff <ports@toco-domains.de>
* Travis Campbell <hcoyote@ghostar.org>
* Tsung-Han Yeh <snowfly@yuntech.edu.tw>
* Ulf Lilleengen
* Vaida Bogdan <vaida.bogdan@gmail.com>
* Valentin Zahariev <curly@e-card.bg>
* Valerio Daelli <valerio.daelli@gmail.com>
* Veniamin Gvozdikov <vg@FreeBSD.org>
* Victor Popov
* Victor Popov <v.a.popov@gmail.com>
* Vsevolod Stakhov
* Vsevolod Stakhov <vsevolod@FreeBSD.org>
* Wen Heping <wen@FreeBSD.org>
* Wen Heping <wenheping@gmail.com>
* Yarodin <yarodin@gmail.com>
* Yen-Ming Lee <leeym@FreeBSD.org>
* Yen-Ming Lee <leeym@cae.ce.ntu.edu.tw>
* Yen-Ming Lee <leeym@leeym.com>
* Ying-Chieh Liao <ijliao@FreeBSD.org>
* Yonatan <Yonatan@Xpert.com>
* Yonatan <onatan@gmail.com>
* Yoshisato YANAGISAWA
* Yuri Victorovich
* Yuri Victorovich <yuri@rawbw.com>
* Zach Thompson <hideo@lastamericanempire.com>
* Zane C. Bowers <vvelox@vvelox.net>
* Zeus Panchenko <zeus@gnu.org.ua>
* ache
* adamw
* ajk@iu.edu
* alex@FreeBSD.org
* allan@saddi.com
* alm
* andrej@ebert.su
* andrew@scoop.co.nz
* andy@fud.org.nz
* antoine@FreeBSD.org
* arved
* barner
* brix@FreeBSD.org
* buganini@gmail.com
* chinsan
* chris@still.whet.org
* clement
* clsung
* crow
* cy@FreeBSD.org
* dominik karczmarski <dominik@karczmarski.com>
* dwcjr@inethouston.net
* eivind
* erich@rrnet.com
* erwin@FreeBSD.org
* girgen@FreeBSD.org
* glen.j.barber@gmail.com
* hbo@egbok.com
* ijliao
* jesper
* jfitz
* johans
* joris
* kftseng@iyard.org
* kris@FreeBSD.org
* lx
* markm
* mharo@FreeBSD.org
* michaelnottebrock@gmx.net
* mnag@FreeBSD.org
* mp39590@gmail.com
* nbm
* nectar@FreeBSD.org
* nork@FreeBSD.org
* nork@cityfujisawa.ne.jp
* nsayer@FreeBSD.org
* nsayer@quack.kfu.com
* ntarmos@cs.uoi.gr
* oly
* onatan@gmail.com
* pandzilla
* patrick@mindstep.com
* pauls
* perl@FreeBSD.org
* petef@FreeBSD.org
* peter.thoenen@yahoo.com
* ports@c0decafe.net
* ports@rbt.ca
* roam@FreeBSD.org
* rokaz
* sada@FreeBSD.org
* scrappy
* se
* shane@freebsdhackers.net aka modsix@gmail.com
* snb@threerings.net
* sumikawa
* sviat
* teramoto@comm.eng.osaka-u.ac.jp
* thierry@pompo.net
* tobez@FreeBSD.org
* torstenb@FreeBSD.org
* trasz <trasz@pin.if.uz.zgora.pl>
* trevor
* truckman
* vanhu
* vanilla@
* wen@FreeBSD.org
* will
With hat: portmgr
857c05f |
Friday, 1 Apr 2022
|
15:09 Dmitry Marakasov (amdmi3)
security/sshguard: disable blacklisting by default
Blacklisting is now disabled by default to avoid overriding the setting in
sshguard.conf. To enable blacklisting, uncomment the BLACKLIST_FILE line in
sshguard.conf.
PR: 221602
Reported by: bahlgren@beah.se
Submitted by: kevinz5000@gmail.com
dc24d94 |
Monday, 4 Oct 2021
|
04:15 Philip Paeps (philip) Author: Kevin Zheng
security/sshguard: Fix memset() off-by-one
This bug causes a stack overflow (and crash due to failed stack check)
when certain IPv6 addresses are whitelisted on i386.
PR: 258179
Reported by: John Marshall <john@jmarshall.id.au>
MFH: 2021Q4
c3381bf |
Monday, 14 Jun 2021
|
21:20 Rodrigo Osorio (rodrigo)
security/sshguard: Upgrade to 2.4.2
Major changes:
* Recognize rejections from Postfix's postscreen daemon
* The parser can now be changed using the PARSER and POST_PARSER options
* Remove some false positive attack signatures for SSH and Cyrus
* Adjust log verbosity of some log messages
* The firewalld backend now uses firewall-cmd instead of iptables to flush
block lists
Full changelog :
https://bitbucket.org/sshguard/sshguard/src/v2.4.2/CHANGELOG.rst
PR: 256575
Reported by: <sirdice@gmail.com>
Approved by: Kevin Zheng <kevinz5000@gmail.com> (maintainer)
5d22a66 |
Tuesday, 6 Apr 2021
|
14:31 Mathieu Arnold (mat)
Remove # $FreeBSD$ from Makefiles.
305f148 |
Saturday, 15 Aug 2020
|
19:31 swills
security/sshguard: Update to 2.4.1
PR: 248404
Submitted by: Kevin Zheng <kevinz5000@gmail.com>
Approved by: maintainer timeout (dan.mcgregor@usask.ca, multiple timeouts)
|
Sunday, 10 Nov 2019
|
18:34 delphij
Remove redundant pidfile check.
This fixes an issue that SSHguard won't start after an incompelete
shutdown.
PR: ports/241751
Approved by: portmgr (bugfix blanket)
MFH: 2019Q4
|
Friday, 19 Jul 2019
|
02:09 adamw
sshguard: Fix rc(8) script, broken in update and then broken further in followup
commits
Also clean up some comments while here.
PR: 238458
Submitted by: Kevin Zheng
|
Saturday, 6 Jul 2019
|
15:33 adamw
sshguard: Update to 2.4.0 and fix rc(8) script
There is some strange new behaviour on the rc script in 2.4.0. It
would either hang on start, or hang on stop. A custom stop function
seemed the easiest way to achieve both.
PR: 238458
|
Monday, 1 Jul 2019
|
17:56 adamw
Back out r505456. sshguard 2.4.0 misbehaves
SSHGuard has always exited cleanly on FreeBSD. In 2.4.0, sshguard fixed that.
It is impossible to terminate sshguard without manually killing each process.
So, apologies to everyone who's already updated, but you'll have to manually
kill all the processes:
pkill -f sshguard
pkill -f sshg-
pkill -f tail
rm /var/run/sshguard.pid
So, back this out while awaiting upstream fix.
PR: 238458
|
00:57 adamw
Fix rc(8) script process detection
The pidfile points to a process named sh, not sshg-blocker
PR: 238458
|
Sunday, 30 Jun 2019
|
19:50 swills
security/sshguard: update to 2.4.0
PR: 238458
Submitted by: Kevin Zheng <kevinz5000@gmail.com>
Approved by: maintainer timeout (dan.mcgregor@usask.ca, >2 weeks)
|
Friday, 29 Mar 2019
|
12:24 garga
security/sshguard: Update to 2.3.1
PR: 236496
Approved by: maintainer timeout (> 2 weeks)
Sponsored by: Rubicon Communications, LLC (Netgate)
|
Friday, 28 Sep 2018
|
11:20 garga
Update security/sshguard to 2.2.0
While here, break some long lines, Use INSTALL_DATA to install sample config
file since it's not supposed to be changed and re-generate patches using
`make makepatch`
PR: 230861
Approved by: maintainer timeout (> 1 month)
Obtained from: pfSense
Sponsored by: Rubicon Communications, LLC (Netgate)
|
Monday, 28 May 2018
|
01:30 adamw
Increase the default blacklist threshold from 30 to 120, which is the upstream
default. 30 makes it far too easy to get locked out of your own server. 120 is
simply a safer starting point.
PR: 227016
Submitted by: Dan McGregor (maintainer)
MFH: 2018Q2
|
Thursday, 18 Jan 2018
|
01:15 dbaio
security/sshguard: Update to 2.1.0
Improve descriptions, pkg-message and update WWW.
Changes: https://sourceforge.net/p/sshguard/mailman/message/36109171/
PR: 224153
Submitted by: Kevin Zheng <kevinz5000@gmail.com>
Approved by: maintainer timeout (dan.mcgregor@usask.ca, > 2 weeks)
|
Monday, 24 Jul 2017
|
10:56 woodsb02
security/sshguard: Fix rc script, add UPDATING entry
sshguard usually looks at sshguard.conf for a list of files to monitor,
but lets you override it via the command line using -l arguments.
This change fixes an issue with the previous rc script which was
*always* setting the '-l' arguments even if sshguard_watch_logs wasn't
set in rc.conf.
This change also sets the defaults in the config file to match the
former defaults in the rc script, and adds an UPDATING entry to warn
of the change from default configuration via rc.conf the config file.
PR: 220906
Submitted by: Dan McGregor (maintainer)
Reported by: chris@cretaforce.gr
|
Thursday, 20 Jul 2017
|
15:34 feld
security/sshguard: Update to 2.0.0
PR: 219409
|
13:53 feld
security/sshguard: reset MAINTAINER
|
Monday, 9 Jan 2017
|
21:50 feld
security/sshguard: Update to 1.7.1
|
Monday, 29 Aug 2016
|
19:55 feld
security/sshguard: Unbreak build by making a metaport
security/sshguard no longer provides hosts/TCP Wrappers support by
default as this was removed upstream. It is now a metaport which will
allow you to select a backend. Further details can be found in the
UPDATING entry.
|
Friday, 26 Aug 2016
|
21:07 feld
security/sshguard: Update to 1.7.0
Changelog:
Added
Add sshg-logtail
Add sshg-parser
Control firewall using sshg-fw
Match "no matching key exchange method" for SSH
Deprecated
Hosts backend is deprecated
Logsuck (-l option) is deprecated, use sshg-logtail instead
Process validation (-f option) is deprecated
Removed
Remove external hooks (-e option)
Remove support for genfilt and ipfilter backends
Fixed
Accept socklog messages without a timestamp
Fix excessive logging causing endless looping in logsuck
Fix undefined assignment of initial inode number
Note on deprecation: Deprecated features will be removed in the next
non-bugfix release. If you would like to nominate a feature to be
un-deprecated, contact the project mailing list.
|
Monday, 2 May 2016
|
16:49 feld
security/sshguard: Update man page, fix sshguard_reset_interval default
Upstream responded to my submitted man page patch and indicated that
sshguard_reset_interval (-s) has been changed to 1800 (30 mins) as well.
|
16:26 feld
security/sshguard: Update to 1.6.4
- Add PID file support back to rc script
- Rename some rc script parameters to better align with sshguard(8)
sshguard_safety_thresh -> sshguard_danger_thresh
sshguard_pardon_min_interval -> sshguard_release_interval
sshguard_prescribe_interval -> sshguard_reset_interval
Release notes:
This release brings updated signatures, usability improvements, and bug
fixes. Highlights in this release include:
- Match Postfix pre-authentication disconnects
- Fix bashisms in iptables backend
- Fix size argument in inet_ntop() call
- Remove excessive logging when polling from files
- Keep looking for unreadable files while polling
- Update Dovecot signature for POP3
- Match "Connection reset" message for SSH
- Resurrect PID file option by popular demand
- Adjust default abuse threshold
Most notably, some default options have changed. The abuse threshold has
been reduced to 30 (3 attacks) and the initial block time has been
lowered to 2 minutes (from 7). These settings can be overridden from the
command line. Package maintainers should check their scripts.
The PID file option (-p) has been resurrected.
|
Saturday, 19 Mar 2016
|
13:04 feld
security/sshguard: Add patch to prevent log flooding with error messages
PR: 208133
|
Tuesday, 8 Mar 2016
|
16:20 feld
security/sshguard: Update to 1.6.3
Changelog: https://sourceforge.net/p/sshguard/mailman/message/34733464/
PR: 207511
Submitted by: <dcarmich@dcarmichael.net>
|
Tuesday, 15 Dec 2015
|
21:18 feld
security/sshguard-pf Fix documentation URL in pkg-message
Submitted by: Johan <johan jails se>
|
Tuesday, 13 Oct 2015
|
01:14 feld
security/sshgaurd: Update to 1.6.2
* Remove recommendation of using syslog pipes
* IPFW support has been rewritten and entries now are added to table 22
PR: 203452
|
Saturday, 1 Aug 2015
|
23:24 feld
security/sshguard: update to 1.6.1
|
Sunday, 26 Jul 2015
|
15:04 feld
security/sshguard-null
portable do-nothing backend for applying detection but not prevention
PR: 201323
|
Sunday, 17 May 2015
|
13:47 feld
Add patch to support syslog in verbose mode
This was previously a patch in the FreeBSD ports tree and was sent
upstream but did not make it into 1.6.0
Submitted by: gregp@n0qds.org
|
Tuesday, 5 May 2015
|
01:59 feld
Update to 1.6.0
|
Tuesday, 24 Mar 2015
|
02:23 feld
Restore lost changes to patch-src-parser-attack_scanner.l
PR: 197854
|
02:11 feld
Enable matching of syslog entries with <facility.level>
PR: 197854
|
Friday, 23 Jan 2015
|
20:15 feld
Patch parser to fix matching for Cyrus IMAP login attempts which are not
plaintext.
PR: 196943
Submitted by: jakob.alvermark@bsdlabs.com
|
Thursday, 8 Jan 2015
|
13:42 feld
Add ability to pass additional custom arguments to sshguard daemon via
sshguard_flags in rc.conf
Declare LICENSE while here
Submitted by: wjw@digiware.nl
|
Wednesday, 10 Dec 2014
|
14:04 feld
Update "BSD" license in security category
|
Monday, 3 Nov 2014
|
21:56 feld
Make it possible to run sshguard without blacklist database by setting
in rc.conf:
sshguard_blacklist=""
This may fix reliability for some users.
PR: 174018
|
Thursday, 2 Oct 2014
|
12:28 feld
The default pardon and prescribe settings in the rc script were swapped
and did not match the documentation. Users should tune to their needs
instead of relying on the defaults, but if they are this will be an
improvement.
Submitted by: John Vinopal
|
Thursday, 22 May 2014
|
13:17 feld
Adopting security/sshguard
rc script passes rclint
Removed clever built-in sysadmin countermeasure:
Previously sshguard would automatically add a line to your
/etc/syslog.conf file. You could activate sshguard by uncommenting this
line. However, every time you reinstall/update sshguard this line will
also be automatically removed rendering the program inactive and your
system unprotected.
Sponsored by: SupraNet Communications, Inc
|
Friday, 25 Apr 2014
|
13:08 crees
Fix rc script, which I made a bit of a mess of. Really sorry :(
Submitted by: se
While here, add error checking in pkg-install before replacing
syslog.conf with an unknown file!
|
Tuesday, 8 Apr 2014
|
19:03 crees
Fix old sshguard bug; does not detect ssh invalid users logins
PR: ports/174571
Submitted by: Francois Charlier <fcharlier@ploup.net>
Reset maintainer after 16 month timeout
While here, stage, remove some insanity and fixup rc script
|
Friday, 20 Sep 2013
|
22:55 bapt
Add NO_STAGE all over the place in preparation for the staging support (cat:
security)
|
Wednesday, 27 Jun 2012
|
00:22 delphij
Add a rc.d script to daemonize sshguard.
Submitted by: delphij
PR: ports/166471
Approved by: maintainer timeout (~3 months)
|
Sunday, 24 Jul 2011
|
18:16 arved
Fix sshguared-ipfw -b option
PR: 157807
Submitted by: Dmitry <smallcms@gmail.com>
Approved by: maintainer timeout
|
Sunday, 12 Jun 2011
|
02:35 miwi
- Update to 1.5
PR: 155607
Submitted by: Matthias Fechner <idefix@fechner.net>
|
Sunday, 10 Jan 2010
|
00:36 danger
- update to 1.4
PR: ports/142469
Approved by: gabor, Maintainer
|
Saturday, 22 Aug 2009
|
00:35 amdmi3
- Switch SourceForge ports to the new File Release System: categories starting
with P,R,S
|
Friday, 3 Oct 2008
|
14:28 amdmi3
- Update to 1.3, which also fixes build problem with autoconf
PR: 127599
Submitted by: Jeremy Johnston <jeremy at smart-serv dot net>
Suggested by: Mij <mij at bitchx dot it> (maintainer)
|
Tuesday, 23 Sep 2008
|
18:58 amdmi3
- Update to 1.2. Changes:
- support for Cyrus IMAP
- support for SSH "possible break-in attempt" messages
- updated support for dovecot to include logging format of new versions
- fix of IPF backend causing sshguard not to update /etc/ipf.rules (disallow
IPv6)
- fix detection of password when sshd doesn't log anything more than PAM
- While here, use SF macro
PR: 127456
Submitted by: Mij <mij at bitchx dot it> (maintainer)
|
Monday, 28 Jul 2008
|
07:35 lwhsu
- Install man page to ${MANPREFIX}/man . Thanks to pav@ for notification
- Update description reflecting additions of version 1.1
PR: ports/126001
Submitted by: Mij <mij AT bitchx.it> (maintainer)
|
Saturday, 26 Jul 2008
|
13:49 lwhsu
- Update to 1.1
PR: ports/125973
Submitted by: Mij <mij AT bitchx.it> (maintainer)
|
Friday, 4 Jan 2008
|
20:35 arved
Prevent the port from running automake if it is installed
PR: 118065
Submitted by: Mij <mij@bitchx.it>
|
Sunday, 17 Jun 2007
|
21:55 itetcu
- add patch for:
The regex used to recognize IPv6 addresses in security/sshguard{,-ipfw,-pf}
doesn't catch all IPv6 addresses. The author (and port maintainer) is aware of
this issue and supplied the patch, which fixes the issue. The patch will be
part of sshguard-1.1, which is due soonish.
- bump PORTREVISION
PR: 113800
Submitted by: Henrik Brix Andersen
Approved by: Mij (maintainer)
|
Tuesday, 12 Jun 2007
|
22:13 itetcu
Shorten COMMENT
Submitted by: sat@
|
22:09 itetcu
Allow slave ports to overwrite the COMMENT.
Submitted by: sat@
|
20:05 itetcu
- upgrade to version 1.0
- the port is no longer interactive, it uses the default blocking backend
(hosts)
- for pf and ipfw see the new ports sshguard-[pf|ipfw]
PR: ports/112749
Submitted by: Mij (maintainer)
Reviewed by: leeym@
|
Thursday, 1 Mar 2007
|
10:06 clsung
- respect maintainer's insist on interactive part,
even IS_INTERACTIVE is discouraged
- PORTREVISION is thus bumped.
Approved by: maintainer (implicit)
|
01:36 clsung
Add sshguard 0.91, protect networked hosts from brute force attacks
against ssh.
PR: ports/109439
Submitted by: Mij <mij at bitchx.it>
|
Number of commits found: 63 |