Port details |
- bruteforceblocker Checks for SSH bruteforce and blocks given IPs
- 1.2.6_2 security
=6 1.2.6_2Version of this port present on the latest quarterly branch.
- DEPRECATED: Abandonware, please consider using security/sshguard
This port expired on: 2022-03-31
- Maintainer: danger@FreeBSD.org
- Port Added: 2005-05-26 21:15:27
- Last Update: 2022-03-31 20:31:14
- Commit Hash: 97cf09b
- People watching this port, also watch:: sudo, unzip, xorg-libraries, mplayer
- License: NONE
- WWW:
- http://danger.rulez.sk/index.php/bruteforceblocker/
- Description:
- BruteForceBlocker is a Perl script that works along with pf - OpenBSD's
firewall (which is also available on FreeBSD since version 5.2 is out).
Its main purpose is to block SSH bruteforce attacks via firewall.
When this script is running, it checks sshd logs from syslog and looks
for failed login attempts - mostly some annoying script attacks, and
counts number of such attempts. When given IP reaches configured limit
of fails, script puts this IP to the pf's table and blocks any further
traffic to the that box from given IP (this also depends on
configuration done in pf.conf).
WWW: http://danger.rulez.sk/index.php/bruteforceblocker/
- ¦ ¦ ¦ ¦
- Manual pages:
- FreshPorts has no man page information for this port.
- pkg-plist: as obtained via:
make generate-plist - Dependency lines:
-
- bruteforceblocker>0:security/bruteforceblocker
- No installation instructions:
- This port has been deleted.
- PKGNAME: there is no package for this port: _LICENSE_RESTRICTED = delete-package delete-distfiles
- Flavors: there is no flavor information for this port.
- distinfo:
- TIMESTAMP = 1541358471
SHA256 (dgerzo-bruteforceblocker-1.2.6_GH0.tar.gz) = 965f608cb2c2ba6f36f74c9d27dfa3f0c0089841e8121b70c1b741e988f1465b
SIZE (dgerzo-bruteforceblocker-1.2.6_GH0.tar.gz) = 5301
No package information for this port in our database- Sometimes this happens. Not all ports have packages. Perhaps there is a build error. Check the fallout link:
- Dependencies
- NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
- Runtime dependencies:
-
- p5-Unix-Syslog>=0 : sysutils/p5-Unix-Syslog
- p5-Sys-Hostname-Long>=0 : sysutils/p5-Sys-Hostname-Long
- p5-libwww>=0 : www/p5-libwww
- p5-Net-DNS>=0 : dns/p5-Net-DNS
- perl5>=5.32.r0<5.33 : lang/perl5.32
- There are no ports dependent upon this port
Configuration Options:
- ===> The following configuration options are available for bruteforceblocker-1.2.6_2:
DOCS=on: Build and/or install documentation
===> Use 'make config' to modify these settings
- Options name:
- security_bruteforceblocker
- USES:
- perl5 shebangfix
- pkg-message:
- For install:
- Configuration of BruteForceBlocker is done via main configuration file
located at /usr/local/etc/bruteforceblocker.conf
- Master Sites:
|
Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
1.2.6_2 31 Mar 2022 20:31:14 |
Rene Ladan (rene) |
cleanup: Remove expired ports:
2022-03-31 security/revealrk: Deprecate, marked BROKEN on 12+ in 2018
2022-03-31 devel/apache-commons-modeler: Abandoned upstream, last release in
2013
2022-03-31 security/afl: Abandoned upstream, no new release since 2017. Please
consider using security/afl++ instead
2022-03-31 www/mod_line_edit: Abandoned upstream, last release in 2006, Apache
includes mod_sed
2022-03-31 www/myfaces: Unsupported by upstream, released in 2005
2022-03-31 www/mod_backtrace: Abandoned upstream in 2012 (version 2.0)
2022-03-31 security/base: Broken with PHP 7+, forked here
https://github.com/NathanGibbs3/BASE/
2022-03-31 security/find-zlib: Deprecated, no longer relevant
2022-03-31 security/razorback-clamavNugget: Abandonware, last release in 2012
and listed as alpha quality by upstream
2022-03-31 security/shimmer: Abandonware, last release in 2008
2022-03-31 security/kripp: Abandonware, upstream returns 404 and last release
was back in 2007
2022-03-31 security/ipfilter2dshield: Abandonware, no word of it on upstream web
site
2022-03-31 security/sha: Obsolete, we have tools in base (Only the first 15 lines of the commit message are shown above ) |
1.2.6_2 24 Nov 2021 13:50:00 |
Daniel Engberg (diizzy) |
security/*: Deprecate and mark ports BROKEN that are dead upstream and/or
abandonware
security/afl - Migrate to security/afl++
security/amap - Abandoned upstream, last release 10+ years ago
security/amavis-stats - Upstream is dead and last release was back in 2005
security/arirang - Abandoned (website also refers to Ruby 1.9) and a 9+ year
old webserver security scanner isn't useful today
security/axTLS - Very outdated and abandoned, current version in tree was
released in 2013 and last by upstream in 2019
security/base - Broken with PHP 7+, forked here
https://github.com/NathanGibbs3/BASE/
security/bruteforceblocker - Abandonware, please consider using
security/sshguard
security/cfs - Deprecated upstream, reference:
https://www.bayofrum.net/cgi-bin/fossil/cfs/index
security/cisco-torch - Unfetchable, dead upstream
security/cp2fwb - Used with deprecated software Firewall Builder
security/dcetest - Targets deprecated protocol by Microsoft in favour of .NET
security/doscan - Abandonware, last release in 2014. Please consider using
security/masscan or sysutils/pnscan
security/find-zlib - Deprecated, no longer relevant (Only the first 15 lines of the commit message are shown above ) |
1.2.6_2 06 Apr 2021 14:31:07 |
Mathieu Arnold (mat) |
Remove # $FreeBSD$ from Makefiles. |
1.2.6_2 14 Aug 2019 12:16:13 |
mat |
Convert to UCL & cleanup pkg-message (categories s) |
1.2.6_2 12 Feb 2019 18:26:20 |
pi |
security/bruteforceblocker: re-add LICENSE=NONE
PR: 234137
Submitted by: Yasuhiro KIMURA <yasu@utahime.org> |
1.2.6_1 12 Feb 2019 04:24:46 |
pi |
security/bruteforceblocker: update patterns
- Update patterns to make them match with log messages from recent
version of OpenSSH
- Remove LICENSE=NONE
PR: 234137
Submitted by: Yasuhiro KIMURA <yasu@utahime.org>
Approved by: danger (maintainer timeout) |
1.2.6 04 Nov 2018 19:09:42 |
danger |
- update to 1.2.6 |
1.2.4_1 23 Mar 2018 19:45:58 |
pi |
security/bruteforceblocker: update WWW, add fix
- Add patch to handle "fatal: Unable to negotiate with" message.
- update WWW
PR: 225570
Submitted by: Yasuhiro KIMURA <yasu@utahime.org>
Approved by: danger (maintainer timeout) |
1.2.4 06 Nov 2017 14:24:39 |
mat |
Fix USE_GITHUB usage.
Sponsored by: Absolight |
1.2.4 21 Oct 2017 13:00:20 |
pi |
security/bruteforceblocker: Add license information and fix portlint warning
PR: 222334
Submitted by: Yasuhiro KIMURA <yasu@utahime.org>
Approved by: danger (maintainer timeout) |
1.2.4 10 Sep 2017 18:51:46 |
olgeni |
Some typo fixes and whitespace cleanup for pkg-descr files. |
1.2.4 03 Sep 2017 08:31:45 |
pi |
security/bruteforceblocker: unbreak build by fixing WRKSRC
Submitted by: Michael Butler <imb@protected-networks.net> |
1.2.4 02 Sep 2017 18:13:37 |
danger |
- update to 1.2.4 |
1.2.3_2 25 Aug 2017 21:08:52 |
fjoe |
Handle "error: maximum authentication attempts exceeded for ... from ..." log
messages.
Approved by: MAINTAINER timeout (8d) |
1.2.3_1 01 Apr 2016 14:25:18 |
mat |
Remove ${PORTSDIR}/ from dependencies, categories r, s, t, and u.
With hat: portmgr
Sponsored by: Absolight |
1.2.3_1 14 May 2015 10:15:09 |
mat |
MASTER_SITES cleanup.
- Replace ${MASTER_SITE_FOO} with FOO.
- Merge MASTER_SITE_SUBDIR into MASTER_SITES when possible. (This means 99.9%
of the time.)
- Remove occurrences of MASTER_SITE_LOCAL when no subdirectory was present and
no hint of what it should be was present.
- Fix some logic.
- And generally, make things more simple and easy to understand.
While there, add magic values to the FESTIVAL, GENTOO, GIMP, GNUPG, QT and
SAMBA macros.
Also, replace some EXTRACT_SUFX occurences with USES=tar:*.
Checked by: make fetch-urlall-list
With hat: portmgr
Sponsored by: Absolight |
1.2.3_1 13 Nov 2014 09:02:57 |
antoine |
Cleanup plist |
1.2.3_1 02 May 2014 12:10:20 |
danger |
- add shebangfix support
PR: 186064
Submitted by: Yasuhiro KIMURA <yasu@utahime.org>
Approved by: mat |
1.2.3_1 01 May 2014 02:33:07 |
adamw |
I experienced catastrophic brain failure and put
PORT_OPTIONS= instead of OPTIONS_DEFINE=. Oops. |
1.2.3_1 01 May 2014 01:42:38 |
adamw |
STAGE support, and general cleanups. Some of the changes are a
bit more aggressive, but at this point, if I'm staging your port,
you've likely stopped caring what's done to it. |
1.2.3 20 Sep 2013 22:55:26 |
bapt |
Add NO_STAGE all over the place in preparation for the staging support (cat:
security) |
1.2.3 11 Sep 2013 17:17:47 |
az |
- convert to the new perl5 framework
- trim Makefile header
Approved by: portmgr (bapt@, blanket) |
1.2.3 05 Jun 2012 15:49:49 |
danger |
- cleanup RUN_DEPENDS
Submitted by: az |
1.2.3 24 Oct 2011 04:17:38 |
dougb |
Remove more tags from pkg-descr files fo the form:
- Name
em@i.l
or variations thereof. While I'm here also fix some whitespace and other
formatting errors, including moving WWW: to the last line in the file. |
1.2.3 03 Jul 2011 14:03:52 |
ohauer |
-remove MD5 |
1.2.3 06 Jan 2009 17:59:31 |
pav |
- Remove conditional checks for FreeBSD 5.x and older |
1.2.3 08 Sep 2007 01:04:03 |
linimon |
Welcome bsd.perl.mk. Add support for constructs such as USE_PERL5=5.8.0+.
Drop support for antique perl.
Work done by: gabor
Sponsored by: Google Summer of Code 2007
Hat: portmgr |
1.2.3 15 Sep 2006 09:39:43 |
danger |
Change my e-mail address to the @FreeBSD.org one.
Approved by: linimon |
1.2.3 12 Apr 2006 23:31:39 |
edwin |
On request of maintianer, also remove the dependency on p5-File-Tail |
1.2.3 12 Apr 2006 22:41:32 |
edwin |
Reinstate maintainer, seems it was his secondary MX host which complained. |
1.2.3 11 Apr 2006 22:07:31 |
edwin |
Also fix IGNORE to follow style. |
1.2.3 11 Apr 2006 22:06:45 |
edwin |
bruteforceblocker needs p5-File-Tail
reset maintainer: <danger@rulez.sk>: host mailhub.cia.sk[72.21.48.70] said: 554
<danger@rulez.sk>: Relay access denied (in reply to RCPT TO command)
PR: ports/95633
Submitted by: Joe Horn <joehorn@mi.chu.edu.tw> |
1.2.3 02 Apr 2006 00:14:58 |
pav |
- Update to 1.2.3
PR: ports/94077
Submitted by: Daniel Gerzo <danger@rulez.sk> (maintainer) |
1.2.1 01 Jan 2006 19:30:59 |
pav |
- Update to 1.2.1
PR: ports/91167
Submitted by: Daniel Gerzo <danger@rulez.sk> (maintainer) |
1.2 12 Nov 2005 19:30:21 |
pav |
- Update to 1.2
Submitted by: Daniel Gerzo (maintainer) over EFnet |
1.1 04 Sep 2005 18:21:00 |
sem |
- Update to 1.1
PR: ports/85585
Submitted by: maintainer |
1.0 26 May 2005 21:14:58 |
pav |
bruteforceblocker is a script that checks sshd's auth.log for Failed
login attemtps and cooperates with pf firewall. When given IP gains
specific number of fails, bruteforceblocker adds this IP to the pf's
table. This is useful for people who are getting large number of
these attempts.
PR: ports/80211
Submitted by: Daniel Gerzo <danger@rulez.sk> |