diff options
author | feld <feld@FreeBSD.org> | 2016-05-03 00:49:08 +0800 |
---|---|---|
committer | feld <feld@FreeBSD.org> | 2016-05-03 00:49:08 +0800 |
commit | 6d5a28245ce7f63e79147defd358ec00da69ffa7 (patch) | |
tree | c2313aa128abeb92e6298227decd0166916b6767 /security/sshguard | |
parent | 4a9145f076815221b85a3620b6f7d2992e528603 (diff) | |
download | freebsd-ports-gnome-6d5a28245ce7f63e79147defd358ec00da69ffa7.tar.gz freebsd-ports-gnome-6d5a28245ce7f63e79147defd358ec00da69ffa7.tar.zst freebsd-ports-gnome-6d5a28245ce7f63e79147defd358ec00da69ffa7.zip |
security/sshguard: Update man page, fix sshguard_reset_interval default
Upstream responded to my submitted man page patch and indicated that
sshguard_reset_interval (-s) has been changed to 1800 (30 mins) as well.
Diffstat (limited to 'security/sshguard')
-rw-r--r-- | security/sshguard/Makefile | 2 | ||||
-rw-r--r-- | security/sshguard/files/patch-man_sshguard.8 | 11 | ||||
-rw-r--r-- | security/sshguard/files/sshguard.in | 4 |
3 files changed, 12 insertions, 5 deletions
diff --git a/security/sshguard/Makefile b/security/sshguard/Makefile index 495332c4c549..e9b689d71356 100644 --- a/security/sshguard/Makefile +++ b/security/sshguard/Makefile @@ -3,7 +3,7 @@ PORTNAME= sshguard PORTVERSION= 1.6.4 -PORTREVISION= 0 +PORTREVISION= 1 CATEGORIES= security MASTER_SITES= SF/sshguard/sshguard/${PORTVERSION} diff --git a/security/sshguard/files/patch-man_sshguard.8 b/security/sshguard/files/patch-man_sshguard.8 index 5987e2e6f07e..d4dd54b45430 100644 --- a/security/sshguard/files/patch-man_sshguard.8 +++ b/security/sshguard/files/patch-man_sshguard.8 @@ -1,4 +1,4 @@ ---- man/sshguard.8.orig 2016-05-02 15:44:01 UTC +--- man/sshguard.8.orig 2016-03-17 08:01:48 UTC +++ man/sshguard.8 @@ -84,7 +84,7 @@ at \fI\%http://www.sshguard.net/\fP\&. .SH OPTIONS @@ -9,7 +9,7 @@ Block an attacker when its dangerousness exceeds \fIthresh\fP\&. Each attack pattern that is matched contributes a fixed dangerousness of 10. .TP -@@ -112,7 +112,7 @@ monitor instead. \fBsshguard\fP transpar +@@ -112,13 +112,13 @@ monitor instead. \fBsshguard\fP transpar using this option, standard input is ignored, but can be re\-added by giving \(aq\fB\-l\fP \-\(aq. .TP @@ -18,3 +18,10 @@ Wait at least \fIinterval\fP seconds before releasing a blocked address. Repeat attackers are blocked for 1.5 times longer after each attack. Because \fBsshguard\fP unblocks attackers only at infrequent intervals, + this parameter is inexact (actual blocks will be longer). + .TP +-.B \fB\-s\fP \fIinterval\fP (default 1200 secs, or 20 minutes) ++.B \fB\-s\fP \fIinterval\fP (default 1800 secs, or 30 minutes) + Forget about an attacker \fIinterval\fP seconds after its last attempt. Its + dangerousness will be reset to zero. + .TP diff --git a/security/sshguard/files/sshguard.in b/security/sshguard/files/sshguard.in index 90c5bb03d5df..6f54496c39a9 100644 --- a/security/sshguard/files/sshguard.in +++ b/security/sshguard/files/sshguard.in @@ -54,7 +54,7 @@ # sshguard_reset_interval (int): # Interval before a suspected attack is # forgotten and danger is reset to 0. -# Set to "1200" by default. +# Set to "1800" by default. # sshguard_whitelistfile (str): Path to the whitelist. # Set to "%%PREFIX%%/etc/sshguard.whitelist" # by default. @@ -73,7 +73,7 @@ load_rc_config sshguard : ${sshguard_blacklist=30:/var/db/sshguard/blacklist.db} : ${sshguard_danger_thresh=30} : ${sshguard_release_interval=120} -: ${sshguard_reset_interval=1200} +: ${sshguard_reset_interval=1800} : ${sshguard_whitelistfile="%%PREFIX%%/etc/sshguard.whitelist"} : ${sshguard_watch_logs=/var/log/auth.log:/var/log/maillog} |