Commit graph

10 commits

Author SHA1 Message Date
adam
f66cb4f2e3 Switch sphinx to versioned deps. 2019-10-21 21:55:03 +00:00
maya
f34a8c24a3 PKGREVISION bump for anything using python without a PYPKGPREFIX.
This is a semi-manual PKGREVISION bump.
2019-04-25 07:32:34 +00:00
adam
6697b78088 Removed commented-out PKGREVISIONs 2018-12-09 21:05:32 +00:00
maya
c0e33c920c fail2ban: fix build on linux and others
having an empty SUBST_SED returns usage and a non-zero exit value and
the build doesn't continue.
2017-03-16 21:08:35 +00:00
nils
91f85f8fa9 Updated security/fail2ban to 0.9.6.
Upstream changelog :
* Misleading add resp. enable of (already available) jail in database, that
  induced a subsequent error: last position of log file will be never retrieved (gh-795)
* Fixed a distribution related bug within testReadStockJailConfForceEnabled
  (e.g. test-cases faults on Fedora, see gh-1353)
* Fixed pythonic filters and test scripts (running via wrong python version,
  uses "fail2ban-python" now);
* Fixed test case "testSetupInstallRoot" for not default python version (also
  using direct call, out of virtualenv);
* Fixed ambiguous wrong recognized date pattern resp. its optional parts (see gh-1512);
* FIPS compliant, use sha1 instead of md5 if it not allowed (see gh-1540)
* Monit config: scripting is not supported in path (gh-1556)
* `filter.d/apache-modsecurity.conf`
    - Fixed for newer version (one space, gh-1626), optimized: non-greedy catch-all
      replaced for safer match, unneeded catch-all anchoring removed, non-capturing
* `filter.d/asterisk.conf`
    - Fixed to match different asterisk log prefix (source file: method:)
* `filter.d/dovecot.conf`
    - Fixed failregex ignores failures through some not relevant info (gh-1623)
* `filter.d/ignorecommands/apache-fakegooglebot`
    - Fixed error within apache-fakegooglebot, that will be called
      with wrong python version (gh-1506)
* `filter.d/assp.conf`
    - Extended failregex and test cases to handle ASSP V1 and V2 (gh-1494)
* `filter.d/postfix-sasl.conf`
    - Allow for having no trailing space after 'failed:' (gh-1497)
* `filter.d/vsftpd.conf`
    - Optional reason part in message after FAIL LOGIN (gh-1543)
* `filter.d/sendmail-reject.conf`
    - removed mandatory double space (if dns-host available, gh-1579)
* filter.d/sshd.conf
    - recognized "Failed publickey for" (gh-1477);
    - optimized failregex to match all of "Failed any-method for ... from <HOST>" (gh-1479)
    - eliminated possible complex injections (on user-name resp. auth-info, see gh-1479)
    - optional port part after host (see gh-1533, gh-1581)

* New Actions:
    - `action.d/npf.conf` for NPF, the latest packet filter for NetBSD
* New Filters:
    - `filter.d/mongodb-auth.conf` for MongoDB (document-oriented NoSQL database engine)
      (gh-1586, gh-1606 and gh-1607)

* DateTemplate regexp extended with the word-end boundary, additionally to
  word-start boundary
* Introduces new command "fail2ban-python", as automatically created symlink to
  python executable, where fail2ban currently installed (resp. its modules are located):
    - allows to use the same version, fail2ban currently running, e.g. in
      external scripts just via replace python with fail2ban-python:
      ```diff
      -#!/usr/bin/env python
      +#!/usr/bin/env fail2ban-python
      ```
    - always the same pickle protocol
    - the same (and also guaranteed available) fail2ban modules
    - simplified stand-alone install, resp. stand-alone installation possibility
      via setup (like gh-1487) is getting closer
* Several test cases rewritten using new methods assertIn, assertNotIn
* New forward compatibility method assertRaisesRegexp (normally python >= 2.7).
  Methods assertIn, assertNotIn, assertRaisesRegexp, assertLogged, assertNotLogged
  are test covered now
* Jail configuration extended with new syntax to pass options to the backend (see gh-1408),
  examples:
    - `backend = systemd[journalpath=/run/log/journal/machine-1]`
    - `backend = systemd[journalfiles="/run/log/journal/machine-1/system.journal, /run/log/journal/machine-1/user.journal"]`
    - `backend = systemd[journalflags=2]`
2017-02-02 18:35:56 +00:00
nils
ef918bb78f Updated security/fail2ban to 0.9.5.
Changelog from 0.9.3 and 0.9.4 is quite long. Expect new and improved
jails, actions and filter. Details are here :
- https://github.com/fail2ban/fail2ban/releases/tag/0.9.4
- https://github.com/fail2ban/fail2ban/releases/tag/0.9.5

Pkgsrc changes are :
- added man pages (fail2ban-testcases.1 fail2ban.1)
- added and reorderd filters, actions, and documentation files
- minor edits to please pkglint
2016-12-04 21:02:55 +00:00
nils
3ca42c3cc8 Updated to 0.9.3.
Some of the upstream changes for 0.9.2 :
- various typo in config files
- filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to
  ignore system authentication issues
- some fixes for EL7
New features :
- New filters:
  - postfix-rbl
  - apache-fakegooglebot.conf
  - nginx-botsearch
  - drupal-auth
- New actions:
  - action.d/firewallcmd-multiport and action.d/firewallcmd-allports
  - action.d/sendmail-geoip-lines.conf
  - action.d/nsupdate to update DNSBL
- New status argument for fail2ban-client
Some of the upstream changes for 0.9.3 :
- IMPORTANT incompatible changes:
* filter.d/roundcube-auth.conf
     - Changed logpath to 'errors' log (was 'userlogins')
   * action.d/iptables-common.conf
     - All calls to iptables command now use -w switch introduced in
       iptables 1.4.20 (some distribution could have patched their
       earlier base version as well) to provide this locking mechanism
       useful under heavy load to avoid contesting on iptables calls.
       If you need to disable, define 'action.d/iptables-common.local'
       with empty value for 'lockingopt' in `[Init]` section.
   * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines
     actions now include by default only the first 1000 log lines in
     the emails.  Adjust <grepopts> to augment the behavior.
- New Features:
* New filters:
     - froxlor-auth - Thanks Joern Muehlencord
     - apache-pass - filter Apache access log for successful authentication
* New actions:
     - shorewall-ipset-proto6 - using proto feature of the Shorewall.
       Still requires manual pre-configuration of the shorewall.
       See the action file for detail.
* New jails:
     - pass2allow-ftp - allows FTP traffic after successful
       HTTP authentication
2015-11-27 15:41:47 +00:00
gdt
14a78abc09 Demote docs tools to BUILD_DEPENDS.
sphinx and numpy-doc are not needed at runtime.
2015-04-14 21:09:48 +00:00
nils
7b4e4adddf Corrected a build problem with py-sphinx-1.2.3nb1 because sphinx-build has
been replaced with sphinx-build${PYVERSSUFFIX} (therefore it depends on at
least this version).

Corrected maintainer's email address.
2015-03-11 20:45:52 +00:00
nils
08431a1378 Initial import of security/fail2ban, version 0.9.1, into the NetBSD Packages Collection.
Fail2Ban scans log files like /var/log/pwdfail and bans IP
that makes too many password failures. It updates firewall
rules to reject the IP address. Theses rules can be defined by
the user. Fail2Ban can read multiple log files such as sshd
or Apache web server ones.
2015-02-09 10:05:25 +00:00