|
From: Georg L. <jor...@ma...> - 2016-07-27 00:05:01
|
On 26/07/16 17:27, li...@la... wrote: > You should probably state your OS and rev. I only got the strcpy warning. That was on freebsd 10.2 with the ipfw option. > Sorry, here comes uname -a Debian 8.5: Linux pwx 3.16.0-4-686-pae #1 SMP Debian 3.16.7-ckt25-2 (2016-04-08) i686 GNU/Linux Debian 7.11 Linux thummim 3.2.0-4-686-pae #1 SMP Debian 3.2.68-1+deb7u3 i686 GNU/Linux Using Bison and GCC Will check fixes later. Best Regards, Georg Lehner > Original Message > From: Georg Lehner > Sent: Tuesday, July 26, 2016 3:59 PM > To: ssh...@li... > Subject: Re: [SSHGuard-users] Call for testing: SSHGuard 1.7.0 > > On 12/07/16 19:05, Kevin Zheng wrote: >> Hi there, >> >> Some non-trivial firewall backend changes have landed in the 'master' >> branch of SSHGuard. I've been able to test the pf and ipfw backends, but >> the iptables backend needs testing! >> >> Briefly, SSHGuard now controls the firewall using a script, 'sshg-fw' >> that reads commands from standard input (e.g. 'block 1.2.3.4') and runs >> the appropriate firewall commands. This should make adding new backends >> as well as custom hooks easier. >> >> If you're able and willing to test, your feedback is appreciated! >> >> Best, >> Kevin >> > Hello, > > I tried to step forward with iptables testing, but am unable to compile > sshguard. After following > http://www.sshguard.net/docs/setup/compile-install/ I get the below errors. > > Note: this has not been an issue about two weeks before. > > Best Regards, > > Georg Lehner > > - - - > Making all in src > make[1]: Entering directory '/home/jorge/progs/sshguard/src' > make all-am > make[2]: Entering directory '/home/jorge/progs/sshguard/src' > CC parser/attack_parser.o > parser/attack_parser.y: In function ‘yyparse’: > parser/attack_parser.y:192:25: warning: implicit declaration of function > ‘strcpy’ [-Wimplicit-function-declaration] > strcpy(attack->address.value, $1); > ^ > parser/attack_parser.y:192:25: warning: incompatible implicit > declaration of built-in function ‘strcpy’ > parser/attack_parser.y:196:25: warning: incompatible implicit > declaration of built-in function ‘strcpy’ > strcpy(attack->address.value, $1); > ^ > parser/attack_parser.y: In function ‘yyerror’: > parser/attack_parser.y:299:1: error: number of arguments doesn’t match > prototype > static void yyerror() { /* do nothing */ } > ^ > parser/attack_parser.y:34:13: error: prototype declaration > static void yyerror(attack_t *attack, const char *msg); > ^ > Makefile:606: recipe for target 'parser/attack_parser.o' failed > make[2]: *** [parser/attack_parser.o] Error 1 > make[2]: Leaving directory '/home/jorge/progs/sshguard/src' > Makefile:342: recipe for target 'all' failed > make[1]: *** [all] Error 2 > make[1]: Leaving directory '/home/jorge/progs/sshguard/src' > Makefile:335: recipe for target 'all-recursive' failed > make: *** [all-recursive] Error 1 > > > ------------------------------------------------------------------------------ > What NetFlow Analyzer can do for you? Monitors network bandwidth and traffic > patterns at an interface-level. Reveals which users, apps, and protocols are > consuming the most bandwidth. Provides multi-vendor support for NetFlow, > J-Flow, sFlow and other flows. Make informed decisions using capacity planning > reports.http://sdm.link/zohodev2dev > _______________________________________________ > sshguard-users mailing list > ssh...@li... > https://lists.sourceforge.net/lists/listinfo/sshguard-users > |