From ae2d2d0b04d18c1504043e8378d3b51a13493687 Mon Sep 17 00:00:00 2001 From: "Vanilla I. Shu" Date: Fri, 11 Nov 2005 06:45:58 +0000 Subject: Add denyhosts 1.1.2, script to thwart ssh attacks. PR: ports/88781 Submitted by: Janos Mohacsi --- security/denyhosts/files/patch-denyhosts.cfg-dist | 45 +++++++++++++++++++++++ 1 file changed, 45 insertions(+) create mode 100644 security/denyhosts/files/patch-denyhosts.cfg-dist (limited to 'security/denyhosts/files/patch-denyhosts.cfg-dist') diff --git a/security/denyhosts/files/patch-denyhosts.cfg-dist b/security/denyhosts/files/patch-denyhosts.cfg-dist new file mode 100644 index 000000000000..49f7b56fb701 --- /dev/null +++ b/security/denyhosts/files/patch-denyhosts.cfg-dist @@ -0,0 +1,45 @@ + +$FreeBSD$ + +--- denyhosts.cfg-dist.orig ++++ denyhosts.cfg-dist +@@ -9,10 +9,10 @@ + # argument + # + # Redhat: +-SECURE_LOG = /var/log/secure ++#SECURE_LOG = /var/log/secure + # + # Mandrake or FreeBSD: +-#SECURE_LOG = /var/log/auth.log ++SECURE_LOG = /var/log/auth.log + # + # SuSE: + #SECURE_LOG = /var/log/messages +@@ -23,10 +23,10 @@ + # HOSTS_DENY: the file which contains restricted host access information + # + # Most operating systems: +-HOSTS_DENY = /etc/hosts.deny ++#HOSTS_DENY = /etc/hosts.deny + # + # Some BSD (FreeBSD) Unixes: +-#HOSTS_DENY = /etc/hosts.allow ++HOSTS_DENY = /etc/hosts.allow + # + # Another possibility (also see the next option): + #HOSTS_DENY = /etc/hosts.evil +@@ -157,10 +157,10 @@ + # running at a time. + # + # Redhat/Fedora: +-LOCK_FILE = /var/lock/subsys/denyhosts ++#LOCK_FILE = /var/lock/subsys/denyhosts + # +-# Debian +-#LOCK_FILE = /var/run/denyhosts.pid ++# Debian (and FreeBSD) ++LOCK_FILE = /var/run/denyhosts.pid + # + # Misc + #LOCK_FILE = /tmp/denyhosts.lock -- cgit v1.2.3