diff options
author | feld <feld@FreeBSD.org> | 2015-10-13 22:54:55 +0800 |
---|---|---|
committer | feld <feld@FreeBSD.org> | 2015-10-13 22:54:55 +0800 |
commit | 4d7d1f4ab0c1e52acfe915c373b09513f74e41c4 (patch) | |
tree | 9e175e87b73ad253cf56d8dcde675efd1d2d4573 /UPDATING | |
parent | 21b43c41f0b51f437e28e2a4136fab1f92579933 (diff) | |
download | freebsd-ports-gnome-4d7d1f4ab0c1e52acfe915c373b09513f74e41c4.tar.gz freebsd-ports-gnome-4d7d1f4ab0c1e52acfe915c373b09513f74e41c4.tar.zst freebsd-ports-gnome-4d7d1f4ab0c1e52acfe915c373b09513f74e41c4.zip |
Document security/sshguard-ipfw 1.6.2 changes
Diffstat (limited to 'UPDATING')
-rw-r--r-- | UPDATING | 19 |
1 files changed, 19 insertions, 0 deletions
@@ -5,6 +5,25 @@ they are unavoidable. You should get into the habit of checking this file for changes each time you update your ports collection, before attempting any port upgrades. +20151013: + AFFECTS: users of security/sshguard-ipfw + AUTHOR: feld@FreeBSD.org + + The sshguard update to 1.6.2 introduces a rewritten IPFW backend. The + previous approach was to insert individual block rules with a + predefined numbered range. This does not scale well and is not + flexible so the design was scrapped. The new approach utilizes IPFW + tables. The sshguard IPFW backend now inserts offenders into hardcoded + table 22. + + To continue blocking the attackers effectively you will need to add a + block rule like the following: + + ipfw add deny all from 'table(22)' to any + + The release announcement can be found here: + http://sourceforge.net/p/sshguard/mailman/message/34534861/ + 20151011: AFFECTS: users of emulators/qemu-sbruno, emulators/qemu-user-static AUTHOR: sbruno@FreeBSD.org |