aboutsummaryrefslogtreecommitdiffstats
path: root/security/sshguard
diff options
context:
space:
mode:
authorfeld <feld@FreeBSD.org>2016-05-03 00:49:08 +0800
committerfeld <feld@FreeBSD.org>2016-05-03 00:49:08 +0800
commit6d5a28245ce7f63e79147defd358ec00da69ffa7 (patch)
treec2313aa128abeb92e6298227decd0166916b6767 /security/sshguard
parent4a9145f076815221b85a3620b6f7d2992e528603 (diff)
downloadfreebsd-ports-gnome-6d5a28245ce7f63e79147defd358ec00da69ffa7.tar.gz
freebsd-ports-gnome-6d5a28245ce7f63e79147defd358ec00da69ffa7.tar.zst
freebsd-ports-gnome-6d5a28245ce7f63e79147defd358ec00da69ffa7.zip
security/sshguard: Update man page, fix sshguard_reset_interval default
Upstream responded to my submitted man page patch and indicated that sshguard_reset_interval (-s) has been changed to 1800 (30 mins) as well.
Diffstat (limited to 'security/sshguard')
-rw-r--r--security/sshguard/Makefile2
-rw-r--r--security/sshguard/files/patch-man_sshguard.811
-rw-r--r--security/sshguard/files/sshguard.in4
3 files changed, 12 insertions, 5 deletions
diff --git a/security/sshguard/Makefile b/security/sshguard/Makefile
index 495332c4c549..e9b689d71356 100644
--- a/security/sshguard/Makefile
+++ b/security/sshguard/Makefile
@@ -3,7 +3,7 @@
PORTNAME= sshguard
PORTVERSION= 1.6.4
-PORTREVISION= 0
+PORTREVISION= 1
CATEGORIES= security
MASTER_SITES= SF/sshguard/sshguard/${PORTVERSION}
diff --git a/security/sshguard/files/patch-man_sshguard.8 b/security/sshguard/files/patch-man_sshguard.8
index 5987e2e6f07e..d4dd54b45430 100644
--- a/security/sshguard/files/patch-man_sshguard.8
+++ b/security/sshguard/files/patch-man_sshguard.8
@@ -1,4 +1,4 @@
---- man/sshguard.8.orig 2016-05-02 15:44:01 UTC
+--- man/sshguard.8.orig 2016-03-17 08:01:48 UTC
+++ man/sshguard.8
@@ -84,7 +84,7 @@ at \fI\%http://www.sshguard.net/\fP\&.
.SH OPTIONS
@@ -9,7 +9,7 @@
Block an attacker when its dangerousness exceeds \fIthresh\fP\&. Each attack
pattern that is matched contributes a fixed dangerousness of 10.
.TP
-@@ -112,7 +112,7 @@ monitor instead. \fBsshguard\fP transpar
+@@ -112,13 +112,13 @@ monitor instead. \fBsshguard\fP transpar
using this option, standard input is ignored, but can be re\-added by
giving \(aq\fB\-l\fP \-\(aq.
.TP
@@ -18,3 +18,10 @@
Wait at least \fIinterval\fP seconds before releasing a blocked address.
Repeat attackers are blocked for 1.5 times longer after each attack.
Because \fBsshguard\fP unblocks attackers only at infrequent intervals,
+ this parameter is inexact (actual blocks will be longer).
+ .TP
+-.B \fB\-s\fP \fIinterval\fP (default 1200 secs, or 20 minutes)
++.B \fB\-s\fP \fIinterval\fP (default 1800 secs, or 30 minutes)
+ Forget about an attacker \fIinterval\fP seconds after its last attempt. Its
+ dangerousness will be reset to zero.
+ .TP
diff --git a/security/sshguard/files/sshguard.in b/security/sshguard/files/sshguard.in
index 90c5bb03d5df..6f54496c39a9 100644
--- a/security/sshguard/files/sshguard.in
+++ b/security/sshguard/files/sshguard.in
@@ -54,7 +54,7 @@
# sshguard_reset_interval (int):
# Interval before a suspected attack is
# forgotten and danger is reset to 0.
-# Set to "1200" by default.
+# Set to "1800" by default.
# sshguard_whitelistfile (str): Path to the whitelist.
# Set to "%%PREFIX%%/etc/sshguard.whitelist"
# by default.
@@ -73,7 +73,7 @@ load_rc_config sshguard
: ${sshguard_blacklist=30:/var/db/sshguard/blacklist.db}
: ${sshguard_danger_thresh=30}
: ${sshguard_release_interval=120}
-: ${sshguard_reset_interval=1200}
+: ${sshguard_reset_interval=1800}
: ${sshguard_whitelistfile="%%PREFIX%%/etc/sshguard.whitelist"}
: ${sshguard_watch_logs=/var/log/auth.log:/var/log/maillog}