head	1.17;
access;
symbols
	RELEASE_8_3_0:1.15
	RELEASE_9_0_0:1.15
	RELEASE_7_4_0:1.13
	RELEASE_8_2_0:1.13
	RELEASE_6_EOL:1.13
	RELEASE_8_1_0:1.13
	RELEASE_7_3_0:1.13
	RELEASE_8_0_0:1.12
	RELEASE_7_2_0:1.11
	RELEASE_7_1_0:1.9
	RELEASE_6_4_0:1.9
	RELEASE_5_EOL:1.7
	RELEASE_7_0_0:1.6
	RELEASE_6_3_0:1.6
	PRE_XORG_7:1.2;
locks; strict;
comment	@# @;


1.17
date	2012.11.17.06.01.20;	author svnexp;	state Exp;
branches;
next	1.16;

1.16
date	2012.06.27.00.22.55;	author delphij;	state Exp;
branches;
next	1.15;

1.15
date	2011.07.24.18.16.29;	author arved;	state Exp;
branches;
next	1.14;

1.14
date	2011.06.12.02.35.49;	author miwi;	state Exp;
branches;
next	1.13;

1.13
date	2010.01.10.00.36.33;	author danger;	state Exp;
branches;
next	1.12;

1.12
date	2009.08.22.00.35.06;	author amdmi3;	state Exp;
branches;
next	1.11;

1.11
date	2008.10.03.14.28.11;	author amdmi3;	state Exp;
branches;
next	1.10;

1.10
date	2008.09.23.18.58.35;	author amdmi3;	state Exp;
branches;
next	1.9;

1.9
date	2008.07.28.07.35.02;	author lwhsu;	state Exp;
branches;
next	1.8;

1.8
date	2008.07.26.13.49.02;	author lwhsu;	state Exp;
branches;
next	1.7;

1.7
date	2008.01.04.20.35.08;	author arved;	state Exp;
branches;
next	1.6;

1.6
date	2007.06.17.21.55.21;	author itetcu;	state Exp;
branches;
next	1.5;

1.5
date	2007.06.12.22.13.32;	author itetcu;	state Exp;
branches;
next	1.4;

1.4
date	2007.06.12.22.09.47;	author itetcu;	state Exp;
branches;
next	1.3;

1.3
date	2007.06.12.20.05.41;	author itetcu;	state Exp;
branches;
next	1.2;

1.2
date	2007.03.01.10.06.13;	author clsung;	state Exp;
branches;
next	1.1;

1.1
date	2007.03.01.01.36.56;	author clsung;	state Exp;
branches;
next	;


desc
@@


1.17
log
@Switch exporter over
@
text
@# New ports collection makefile for:	sshguard
# Date created:		2007-02-22
# Whom:			Mij <mij@@bitchx.it>
#
# $FreeBSD: head/security/sshguard/Makefile 300897 2012-07-14 14:29:18Z beat $
#

PORTNAME=	sshguard
PORTVERSION=	1.5
PORTREVISION=	2
CATEGORIES=	security
MASTER_SITES=	SF/sshguard/sshguard/sshguard-${PORTVERSION}

MAINTAINER=	mij@@bitchx.it
COMMENT?=	Protect hosts from brute force attacks against ssh and other services

CONFLICTS?=	sshguard-ipfilter-1.* sshguard-ipfw-1.* sshguard-pf-1.*

PLIST_FILES=	sbin/sshguard

MAN8=		sshguard.8
MANCOMPRESSED=	no
USE_BZIP2=	yes
USE_RC_SUBR=	sshguard
MAKE_ARGS+=	ACLOCAL="${TRUE}" AUTOCONF="${TRUE}" AUTOMAKE="${TRUE}"
HAS_CONFIGURE=	yes

# sublist will be set afterward
SUB_FILES=	pkg-message

# backend type in { hosts, ipfw, pf }
SSHGUARDFW?=	hosts

.include <bsd.port.pre.mk>

.if defined(PREFIX)
CONFIGURE_ARGS+=	--prefix=${PREFIX}
.endif

# set path for manpages
CONFIGURE_ARGS+=	--mandir=${MANPREFIX}/man

.if ${SSHGUARDFW} == pf
PKGMSG_FWBLOCK="  To activate or configure PF see http://sshguard.sf.net/doc/setup/blockingpf.html"
.elif ${SSHGUARDFW} == ipfw
PKGMSG_FWBLOCK="  Verify that IPFW is active with \"ipfw show\"."
.elif ${SSHGUARDFW} == hosts
PKGMSG_FWBLOCK="  Sshguard is going to use /etc/hosts.allow, I have touched it for you."
.elif ${SSHGUARDFW} == ipfilter
PKGMSG_FWBLOCK="  Sshguard will use /etc/ipf.rules as ruleset."
.endif

# for substitution in subfiles
SUB_LIST+=	PKGMSG_FWBLOCK=${PKGMSG_FWBLOCK}

CONFIGURE_ARGS+=	--with-firewall=${SSHGUARDFW}

post-install:
	@@PKG_PREFIX=${PREFIX} ${SH} ${PKGINSTALL} ${PKGNAME} POST-INSTALL
	@@${CAT}	${PKGMESSAGE}

pre-deinstall:
	@@PKG_PREFIX=${PREFIX} ${SH} ${PKGDEINSTALL} ${PKGNAME} DEINSTALL

.include <bsd.port.post.mk>
@


1.16
log
@Add a rc.d script to daemonize sshguard.

Submitted by:	delphij
PR:		ports/166471
Approved by:	maintainer timeout (~3 months)
@
text
@d5 1
a5 1
# $FreeBSD$
@


1.15
log
@Fix sshguared-ipfw -b option

PR:		157807
Submitted by:	Dmitry <smallcms@@gmail.com>
Approved by:	maintainer timeout
@
text
@d10 1
a10 1
PORTREVISION=	1
d24 1
@


1.14
log
@- Update to 1.5

PR:		155607
Submitted by:	Matthias Fechner <idefix@@fechner.net>
@
text
@d10 1
@


1.13
log
@- update to 1.4

PR:		ports/142469
Approved by:	gabor, Maintainer
@
text
@d9 1
a9 1
PORTVERSION=	1.4
@


1.12
log
@- Switch SourceForge ports to the new File Release System: categories starting with P,R,S
@
text
@d9 1
a9 1
PORTVERSION=	1.3
@


1.11
log
@- Update to 1.3, which also fixes build problem with autoconf

PR:		127599
Submitted by:	Jeremy Johnston <jeremy at smart-serv dot net>
Suggested by:	Mij <mij at bitchx dot it> (maintainer)
@
text
@d11 1
a11 1
MASTER_SITES=	SF
@


1.10
log
@- Update to 1.2. Changes:
  - support for Cyrus IMAP
  - support for SSH "possible break-in attempt" messages
  - updated support for dovecot to include logging format of new versions
  - fix of IPF backend causing sshguard not to update /etc/ipf.rules (disallow IPv6)
  - fix detection of password when sshd doesn't log anything more than PAM
- While here, use SF macro

PR:		127456
Submitted by:	Mij <mij at bitchx dot it> (maintainer)
@
text
@d9 1
a9 1
PORTVERSION=	1.2
@


1.9
log
@- Install man page to ${MANPREFIX}/man .  Thanks to pav@@ for notification
- Update description reflecting additions of version 1.1

PR:		ports/126001
Submitted by:	Mij <mij AT bitchx.it> (maintainer)
@
text
@d9 1
a9 2
PORTVERSION=	1.1
PORTREVISION=	1
d11 1
a11 2
MASTER_SITES=	${MASTER_SITE_SOURCEFORGE}
MASTER_SITE_SUBDIR=	${PORTNAME}
@


1.8
log
@- Update to 1.1

PR:		ports/125973
Submitted by:	Mij <mij AT bitchx.it> (maintainer)
@
text
@d10 1
a21 1
MANPREFIX=	${PREFIX}/share
d40 3
@


1.7
log
@Prevent the port from running automake if it is installed

PR:		118065
Submitted by:	Mij <mij@@bitchx.it>
@
text
@d9 1
a9 2
DISTVERSION=	1.0
PORTREVISION=	1
d15 1
a15 1
COMMENT?=	Protect hosts from brute force attacks against ssh
d17 1
a17 1
CONFLICTS?=	sshguard-ipfw-1.0* sshguard-pf-1.0*
d21 1
d25 1
a25 1
MAKE_ARGS+=     ACLOCAL="${TRUE}" AUTOCONF="${TRUE}" AUTOMAKE="${TRUE}"
a29 1
#SUB_LIST=
d46 2
@


1.6
log
@- add patch for:
The regex used to recognize IPv6 addresses in security/sshguard{,-ipfw,-pf}
doesn't catch all IPv6 addresses. The author (and port maintainer) is aware of
this issue and supplied the patch, which fixes the issue. The patch will be
part of sshguard-1.1, which is due soonish.
- bump PORTREVISION

PR:		113800
Submitted by:	Henrik Brix Andersen
Approved by:	Mij (maintainer)
@
text
@d25 1
@


1.5
log
@Shorten COMMENT

Submitted by:	sat@@
@
text
@d10 1
@


1.4
log
@Allow slave ports to overwrite the COMMENT.

Submitted by:	sat@@
@
text
@d15 1
a15 1
COMMENT?=	Protect networked hosts from brute force attacks against ssh
@


1.3
log
@- upgrade to version 1.0
- the port is no longer interactive, it uses the default blocking backend (hosts)
- for pf and ipfw see the new ports sshguard-[pf|ipfw]

PR:		ports/112749
Submitted by:	Mij (maintainer)
Reviewed by:	leeym@@
@
text
@d15 1
a15 1
COMMENT=	Protect networked hosts from brute force attacks against ssh
@


1.2
log
@- respect maintainer's insist on interactive part,
  even IS_INTERACTIVE is discouraged
- PORTREVISION is thus bumped.

Approved by:	maintainer (implicit)
@
text
@d9 1
a9 2
PORTVERSION=	0.91
PORTREVISION=	1
d17 2
d21 2
a22 1
IS_INTERACTIVE=	yes
d26 6
a31 2
OPTIONS=	PF	"Use PF as firewall backend"	off \
		IPFW	"Use IPFW as firewall backend"	off
d35 2
a36 2
.if ! ( (defined(WITH_PF) && !defined(WITH_IPFW)) || !defined(WITH_PF))
# some error occurred. Configure will handle this.
d39 6
a44 6
.if defined(WITH_PF)
# compile with PF support
CONFIGURE_ARGS+=	--with-firewall=pf
.elif defined(WITH_IPFW)
# compile with IPFW support
CONFIGURE_ARGS+=	--with-firewall=ipfw
d47 5
d53 5
a57 6
	# spare pkg-message
	${ECHO_MSG} "		Sshguard installed successfully."
	${ECHO_MSG} "Make it active by putting in /etc/syslog.conf something like:"
	${ECHO_MSG} "	auth.info;authpriv.info     |exec ${PREFIX}/sbin/sshguard"
	${ECHO_MSG} "Otherwise, run sshguard standalone with (as root):"
	${ECHO_MSG} "	tail -n 0 -f /var/log/auth.log | ${PREFIX}/sbin/sshguard"
@


1.1
log
@Add sshguard 0.91, protect networked hosts from brute force attacks
against ssh.

PR:		ports/109439
Submitted by:	Mij <mij at bitchx.it>
@
text
@d10 1
d20 1
d22 1
a22 1
GNU_CONFIGURE=	yes
d24 1
a24 1
OPTIONS=	PF	"Use PF as firewall backend"	on \
d29 8
a36 1
.if !defined(WITH_PF) && defined(WITH_IPFW)
a38 3
.else
# compile with PF support
CONFIGURE_ARGS+=	--with-firewall=pf
@

