Lines 8-19
Link Here
|
8 |
MASTER_SITES= SF/sshguard/sshguard/${PORTVERSION} |
8 |
MASTER_SITES= SF/sshguard/sshguard/${PORTVERSION} |
9 |
|
9 |
|
10 |
MAINTAINER= feld@FreeBSD.org |
10 |
MAINTAINER= feld@FreeBSD.org |
11 |
COMMENT?= Protect hosts from brute force attacks against ssh and other services |
11 |
COMMENT= Protect hosts from brute force attacks against ssh and other services |
12 |
|
12 |
|
13 |
LICENSE= BSD2CLAUSE |
13 |
LICENSE= BSD2CLAUSE |
14 |
|
14 |
|
15 |
CONFLICTS?= sshguard-ipfilter-1.* sshguard-ipfw-1.* sshguard-pf-1.* |
|
|
16 |
|
17 |
USES= autoreconf tar:xz |
15 |
USES= autoreconf tar:xz |
18 |
|
16 |
|
19 |
PLIST_FILES= sbin/sshguard man/man8/sshguard.8.gz |
17 |
PLIST_FILES= sbin/sshguard man/man8/sshguard.8.gz |
Lines 21-42
Link Here
|
21 |
USE_RC_SUBR= sshguard |
19 |
USE_RC_SUBR= sshguard |
22 |
MAKE_ARGS+= ACLOCAL="${TRUE}" AUTOCONF="${TRUE}" AUTOMAKE="${TRUE}" |
20 |
MAKE_ARGS+= ACLOCAL="${TRUE}" AUTOCONF="${TRUE}" AUTOMAKE="${TRUE}" |
23 |
GNU_CONFIGURE= yes |
21 |
GNU_CONFIGURE= yes |
24 |
CONFIGURE_ARGS+=--with-firewall=${SSHGUARDFW} |
|
|
25 |
|
22 |
|
26 |
SUB_LIST+= PKGMSG_FWBLOCK=${PKGMSG_FWBLOCK} |
23 |
OPTIONS_SINGLE= BACKEND |
27 |
SUB_FILES= pkg-message |
24 |
OPTIONS_SINGLE_BACKEND= HOSTS IPFILTER IPFW NULL PF |
28 |
|
25 |
|
29 |
# backend type in { hosts, ipfw, pf } |
26 |
BACKEND_DESC= Firewall backend support |
30 |
SSHGUARDFW?= hosts |
27 |
HOSTS_DESC= Build with /etc/hosts.allow support |
|
|
28 |
IPFILTER_DESC= Build with ipfilter(4) support |
29 |
IPFW_DESC= Build with ipfw(8) support |
30 |
NULL_DESC= Null backend, can be used for executing a custom process |
31 |
PF_DESC= Build with pf(4) support |
31 |
|
32 |
|
32 |
.if ${SSHGUARDFW} == pf |
33 |
OPTIONS_DEFAULT= NULL |
33 |
PKGMSG_FWBLOCK=" To activate or configure PF see http://sshguard.sf.net/doc/setup/blockingpf.html" |
34 |
|
34 |
.elif ${SSHGUARDFW} == ipfw |
35 |
.include <bsd.port.options.mk> |
35 |
PKGMSG_FWBLOCK=" Verify that IPFW is active with \"ipfw show\"." |
36 |
|
36 |
.elif ${SSHGUARDFW} == hosts |
37 |
.if ${PORT_OPTIONS:MHOSTS} |
37 |
PKGMSG_FWBLOCK=" Sshguard is going to use /etc/hosts.allow. Please remember to touch /etc/hosts.allow\!" |
38 |
CONFIGURE_ARGS+=--with-firewall=hosts |
38 |
.elif ${SSHGUARDFW} == ipfilter |
39 |
PKGMSG_FWBLOCK=" sshguard(8) will directly write to /etc/hosts.allow. See hosts_options(5)." |
39 |
PKGMSG_FWBLOCK=" Sshguard will use /etc/ipf.rules as ruleset." |
40 |
.elif ${PORT_OPTIONS:MIPFILTER} |
|
|
41 |
CONFIGURE_ARGS+=--with-firewall=ipfilter |
42 |
PKGMSG_FWBLOCK=" sshguard(8) will use /etc/ipf.rules as the ruleset." |
43 |
.elif ${PORT_OPTIONS:MIPFW} |
44 |
CONFIGURE_ARGS+=--with-firewall=ipfw |
45 |
PKGMSG_FWBLOCK=" sshguard(8) will use rules numbered from 55000 to 55050 to block offenders." |
46 |
.elif ${PORT_OPTIONS:MNULL} |
47 |
CONFIGURE_ARGS+=--with-firewall=null |
48 |
PKGMSG_FWBLOCK=" sshguard(8) will not call any firewall backend. Users can define sshguard_flags in /etc/rc.conf for executing a custom script." |
49 |
.elif ${PORT_OPTIONS:MPF} |
50 |
CONFIGURE_ARGS+=--with-firewall=pf |
51 |
PKGMSG_FWBLOCK=" sshguard(8) will use table <sshguard> to block offenders." |
40 |
.endif |
52 |
.endif |
41 |
|
53 |
|
|
|
54 |
SUB_LIST+= PKGMSG_FWBLOCK=${PKGMSG_FWBLOCK} |
55 |
SUB_FILES= pkg-message |
56 |
|
42 |
.include <bsd.port.mk> |
57 |
.include <bsd.port.mk> |