From: David H. <dho...@gm...> - 2009-05-09 15:20:39
|
Anyone on this list have access to a OSX 10.5 dev environment that is willing to test some patches ? I have a patch for ipfw firewall and ipv6 that I have tested on FreeBSD 7, and OSX (ppc) 10.4, but I would prefer someone test with OSX 10.5 or even snow leopard (intel or ppc) as well. 1) Get base code here: svn co https://sshguard.svn.sourceforge.net/svnroot/sshguard sshguard 2) Get the patches (both) of them from here: (save to the sshguard/trunk directory from step 1) https://sourceforge.net/tracker/?func=detail&aid=2777559&group_id=188282&atid=924687 3) Apply patches and configure/build su root cd sshguard/trunk patch <osx_configure_ac_patch.txt pushd src/fwalls patch <../../ipfw_ipv6_patch_2.txt popd autoreconf ./configure --with-firewall=ipfw make clean && make 4) If all builds well, try running sshguard with the "-d" parameter and paste the following attack example: e.g. src/sshguard -d Attack Example: (if your email client wraps the string to multiple lines, make sure it is one line before you paste into the sshguard debug terminal) Apr 30 12:19:08 minimac sshd[7097]: Failed keyboard-interactive/pam for invalid user asdf from 2001:db8::1 port 57453 ssh2 Paste the attack example into the terminal 4 times and you should see the following at the end: Running command: '/sbin/ip6fw add 55045 drop ipv6 from 2001:db8::1 to any'. 55045 deny ipv6 from 2001:db8::1 to any Command exited 0. First sight of offender '2001:db8::1:6', adding to offenders list. If you see any other exit code than "Command exited 0.", please paste the entire output buffer in a response email. --Thanks! -_Dave H |