Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

sshguard-1.7.1-lp152.3.2 RPM for armv7hl

From OpenSuSE Ports Leap 15.2 for armv7hl

Name: sshguard Distribution: openSUSE Leap 15.2
Version: 1.7.1 Vendor: openSUSE
Release: lp152.3.2 Build date: Sat Nov 9 10:26:20 2019
Group: Productivity/Networking/Security Build host: obs-arm-5
Size: 2465991 Source RPM: sshguard-1.7.1-lp152.3.2.src.rpm
Packager: https://bugs.opensuse.org
Url: http://www.sshguard.net
Summary: Protect hosts from brute force attacks against ssh
Sshguard protects networked hosts from brute force attacks
against ssh servers. It detects such attacks and blocks the
attacker's address with a firewall rule.

Provides

Requires

License

ISC

Changelog

* Thu Nov 23 2017 rbrown@suse.com
  - Replace references to /var/adm/fillup-templates with new
    %_fillupdir macro (boo#1069468)
* Wed Mar 01 2017 joop.boonen@opensuse.org
  - Add a systemd journal tail so sshguard can parse this file
* Thu Dec 29 2016 joop.boonen@opensuse.org
  - Build version 1.7.1
    - Add sample Mac OS X 10.12 style launchd.plist
    - Allow multiple forward slashes in process name
    - Log released addresses only when debugging
    - Process validation (``-f`` option) is deprecated
    - Adjust TIMESTAMP_ISO8601 for Mac OS X 10.12
    - Fix build error in hosts backend
    - Fix empty functions in firewall scripts causing errors with Bash
    - Flush stdout after every line in sshg-parser
    - Add *sshg-logtail*
    - Add *sshg-parser*
    - Control firewall using *sshg-fw*
    - Match "no matching key exchange method" for SSH
    - Hosts backend is deprecated
    - Logsuck (``-l`` option) is deprecated, use *sshg-logtail* instead
    - Process validation (``-f`` option) is deprecated
    - Remove external hooks (``-e`` option)
    - Remove support for genfilt and ipfilter backends
    - Accept socklog messages without a timestamp
    - Fix excessive logging causing endless looping in logsuck
    - Fix undefined assignment of initial inode number
    - Match Postfix pre-authentication disconnects
    - Fix bashisms in iptables backend
    - Fix size argument in inet_ntop() call
    - Remove excessive logging when polling from files
    - Keep looking for unreadable files while polling
    - Update Dovecot signature for POP3
    - Match "Connection reset" message for SSH
    - Resurrect PID file option by popular demand
    - Adjust default abuse threshold
* Fri Feb 19 2016 joop.boonen@opensuse.org
  - Added a corrected attack treshold value (40 default)
* Thu Feb 18 2016 eshmarnev@suse.com
  - Build version 1.6.3
    - Disable blacklisting by default
    - Implement logging as wrappers around syslog(2)
    - Improve log and error messages
    - Match sendmail authentication failures
    - Remove PID file option
    - Remove SIGTSTP and SIGCONT handler
    - Remove reverse mapping attack signature
    - Remove safe_fgets() and exit on interrupt
    - Terminate state entries for hosts blocked with pf
    - Update and shorten command-line usage
    - Use 'configure' to set feature-test macros
  - Updated patch file for new version of sshguard
* Mon Jan 11 2016 joop.boonen@opensuse.org
  - Added ip6tables support handles via init and service files
* Fri Oct 16 2015 joop.boonen@opensuse.org
  - Corrected a iptables error, that prevented sshguard
    from functioning correctly
* Thu Oct 15 2015 joop.boonen@opensuse.org
  - Moved blacklist.db to /var/lib/sshguard/db/blacklist.db analog
    most SUSE packages
* Thu Oct 15 2015 joop.boonen@opensuse.org
  - Corrected the blacklist as it's auto generated
  - Improved sysconfig
* Wed Oct 14 2015 joop.boonen@opensuse.org
  - Build version 1.6.2
    + Make '-w' option backwards-compatible for iptables (James Harris)
    + Remove support for ip6fw and 'ipfw-range' option
    + Rewrite ipfw backend using command framework
  - The white and black list now initially reside in files
    /etc/sshguard/whitelist|blacklist
* Mon Sep 28 2015 joop.boonen@opensuse.org
  - Build version 1.6.1
  - Added sshguard-gcc5.patch so it also builds via gcc5
  - Created a sshguard.service file so it'll run on systemd
    systems

Files

/etc/sshguard
/etc/sshguard/whitelist
/usr/lib/sshg-fw
/usr/lib/sshg-logtail
/usr/lib/sshg-parser
/usr/lib/systemd/system/sshguard-journal.service
/usr/lib/systemd/system/sshguard.service
/usr/sbin/rcsshguard
/usr/sbin/rcsshguard-journal
/usr/sbin/sshguard
/usr/sbin/sshguard-journal-tail
/usr/share/doc/packages/sshguard
/usr/share/doc/packages/sshguard/CHANGELOG.rst
/usr/share/doc/packages/sshguard/COPYING
/usr/share/doc/packages/sshguard/README.rst
/usr/share/doc/packages/sshguard/doc
/usr/share/doc/packages/sshguard/doc/developers.rst
/usr/share/doc/packages/sshguard/doc/setup.rst
/usr/share/doc/packages/sshguard/doc/sshguard.8
/usr/share/doc/packages/sshguard/doc/sshguard.8.rst
/usr/share/doc/packages/sshguard/examples
/usr/share/doc/packages/sshguard/examples/net.sshguard.plist
/usr/share/doc/packages/sshguard/examples/sshguard.service
/usr/share/doc/packages/sshguard/examples/whitelistfile.example
/usr/share/fillup-templates/sysconfig.sshguard
/usr/share/man/man8/sshguard.8.gz
/var/lib/sshguard
/var/lib/sshguard/db


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Jul 9 12:19:47 2024