aboutsummaryrefslogtreecommitdiffstats
path: root/security/sshguard/Makefile
blob: 06098e7daebd96443270636cd7839846a4cd6b2f (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
# Created by: Mij <mij@bitchx.it>
# $FreeBSD$

PORTNAME=   sshguard
PORTVERSION=    1.5
PORTREVISION=   12
CATEGORIES= security
MASTER_SITES=   SF/sshguard/sshguard/sshguard-${PORTVERSION}

MAINTAINER= feld@FreeBSD.org
COMMENT?=   Protect hosts from brute force attacks against ssh and other services

LICENSE=    BSD2CLAUSE

CONFLICTS?= sshguard-ipfilter-1.* sshguard-ipfw-1.* sshguard-pf-1.*

USES=       tar:bzip2

PLIST_FILES=    sbin/sshguard man/man8/sshguard.8.gz

USE_RC_SUBR=    sshguard
MAKE_ARGS+= ACLOCAL="${TRUE}" AUTOCONF="${TRUE}" AUTOMAKE="${TRUE}"
GNU_CONFIGURE=  yes
CONFIGURE_ARGS+=--with-firewall=${SSHGUARDFW}

SUB_LIST+=  PKGMSG_FWBLOCK=${PKGMSG_FWBLOCK}
SUB_FILES=  pkg-message

# backend type in { hosts, ipfw, pf }
SSHGUARDFW?=    hosts

.if ${SSHGUARDFW} == pf
PKGMSG_FWBLOCK="  To activate or configure PF see http://sshguard.sf.net/doc/setup/blockingpf.html"
.elif ${SSHGUARDFW} == ipfw
PKGMSG_FWBLOCK="  Verify that IPFW is active with \"ipfw show\"."
.elif ${SSHGUARDFW} == hosts
PKGMSG_FWBLOCK="  Sshguard is going to use /etc/hosts.allow. Please remember to touch /etc/hosts.allow\!"
.elif ${SSHGUARDFW} == ipfilter
PKGMSG_FWBLOCK="  Sshguard will use /etc/ipf.rules as ruleset."
.endif

.include <bsd.port.mk>