You can subscribe to this list here.
| 2007 |
Jan
|
Feb
|
Mar
(10) |
Apr
(7) |
May
(6) |
Jun
(13) |
Jul
(4) |
Aug
|
Sep
|
Oct
(17) |
Nov
(5) |
Dec
(4) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2008 |
Jan
(2) |
Feb
|
Mar
|
Apr
(4) |
May
(2) |
Jun
(7) |
Jul
(10) |
Aug
(4) |
Sep
(14) |
Oct
|
Nov
(1) |
Dec
(7) |
| 2009 |
Jan
(17) |
Feb
(20) |
Mar
(11) |
Apr
(14) |
May
(8) |
Jun
(3) |
Jul
(22) |
Aug
(9) |
Sep
(8) |
Oct
(6) |
Nov
(4) |
Dec
(8) |
| 2010 |
Jan
(17) |
Feb
(9) |
Mar
(15) |
Apr
(24) |
May
(14) |
Jun
(1) |
Jul
(21) |
Aug
(6) |
Sep
(2) |
Oct
(2) |
Nov
(6) |
Dec
(9) |
| 2011 |
Jan
(11) |
Feb
(1) |
Mar
(3) |
Apr
(4) |
May
|
Jun
|
Jul
(2) |
Aug
(3) |
Sep
(2) |
Oct
(29) |
Nov
(1) |
Dec
(1) |
| 2012 |
Jan
(1) |
Feb
(1) |
Mar
|
Apr
(13) |
May
(4) |
Jun
(9) |
Jul
(2) |
Aug
(2) |
Sep
(1) |
Oct
(2) |
Nov
(11) |
Dec
(4) |
| 2013 |
Jan
(2) |
Feb
(2) |
Mar
(4) |
Apr
(13) |
May
(4) |
Jun
|
Jul
|
Aug
(1) |
Sep
(5) |
Oct
(3) |
Nov
(1) |
Dec
(3) |
| 2014 |
Jan
|
Feb
(3) |
Mar
(3) |
Apr
(6) |
May
(8) |
Jun
|
Jul
|
Aug
(1) |
Sep
(1) |
Oct
(3) |
Nov
(14) |
Dec
(8) |
| 2015 |
Jan
(16) |
Feb
(30) |
Mar
(20) |
Apr
(5) |
May
(33) |
Jun
(11) |
Jul
(15) |
Aug
(91) |
Sep
(23) |
Oct
(10) |
Nov
(7) |
Dec
(9) |
| 2016 |
Jan
(22) |
Feb
(8) |
Mar
(6) |
Apr
(23) |
May
(38) |
Jun
(29) |
Jul
(43) |
Aug
(43) |
Sep
(18) |
Oct
(8) |
Nov
(2) |
Dec
(25) |
| 2017 |
Jan
(38) |
Feb
(3) |
Mar
(1) |
Apr
|
May
(18) |
Jun
(2) |
Jul
(16) |
Aug
(2) |
Sep
|
Oct
(1) |
Nov
(4) |
Dec
(14) |
| 2018 |
Jan
(15) |
Feb
(2) |
Mar
(3) |
Apr
(5) |
May
(8) |
Jun
(12) |
Jul
(19) |
Aug
(16) |
Sep
(8) |
Oct
(13) |
Nov
(15) |
Dec
(10) |
| 2019 |
Jan
(9) |
Feb
(3) |
Mar
|
Apr
(2) |
May
|
Jun
(1) |
Jul
|
Aug
(5) |
Sep
(5) |
Oct
(12) |
Nov
(4) |
Dec
|
| 2020 |
Jan
(2) |
Feb
(6) |
Mar
|
Apr
|
May
(11) |
Jun
(1) |
Jul
(3) |
Aug
(22) |
Sep
(8) |
Oct
|
Nov
(2) |
Dec
|
| 2021 |
Jan
(7) |
Feb
|
Mar
(19) |
Apr
|
May
(10) |
Jun
(5) |
Jul
(7) |
Aug
(3) |
Sep
(1) |
Oct
|
Nov
(10) |
Dec
(4) |
| 2022 |
Jan
(17) |
Feb
|
Mar
(7) |
Apr
(3) |
May
|
Jun
(1) |
Jul
(3) |
Aug
|
Sep
|
Oct
(6) |
Nov
|
Dec
|
| 2023 |
Jan
|
Feb
(5) |
Mar
(1) |
Apr
(3) |
May
|
Jun
(3) |
Jul
(2) |
Aug
|
Sep
|
Oct
|
Nov
(6) |
Dec
|
| 2024 |
Jan
|
Feb
|
Mar
|
Apr
|
May
(3) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
| 2025 |
Jan
|
Feb
|
Mar
(15) |
Apr
(8) |
May
(10) |
Jun
|
Jul
|
Aug
|
Sep
(6) |
Oct
|
Nov
|
Dec
|
|
From: Jos C. <ssh...@cl...> - 2016-08-01 19:24:51
|
In een bericht van 1-8-2016 20:50: > I'll hazard a guess that SSHGuard is being started before the firewall > has been brought up. > > Can you try adding 'ipfw' to the REQUIRE line in > /usr/local/etc/rc.d/sshguard and testing again? I will and let you know, thanks. BR, Jos |
|
From: Kevin Z. <kev...@gm...> - 2016-08-01 18:50:46
|
On 08/01/2016 11:08, Jos Chrispijn wrote: >> Ahh, so you're running 1.6.4 from ports? How are you starting SSHGuard? >> Via the rc.d script or syslog? > > sshguard_enable="YES" > sshguard_blacklist="40:/var/db/sshguard/blacklist.db" > sshguard_whitelistfile="/usr/local/etc/sshguard.whitelist" > >> Does this message only appear when the machine is starting up? > Yes that is correct. Only then (not on the system prompt after) > > Does it show up when you restart SSHGuard without restarting the system? > Nope I'll hazard a guess that SSHGuard is being started before the firewall has been brought up. Can you try adding 'ipfw' to the REQUIRE line in /usr/local/etc/rc.d/sshguard and testing again? Best, Kevin -- Kevin Zheng kev...@gm... | ke...@be... | PGP: 0xC22E1090 |
|
From: Jos C. <ssh...@cl...> - 2016-08-01 18:08:54
|
In een bericht van 1-8-2016 20:00: > Ahh, so you're running 1.6.4 from ports? How are you starting SSHGuard? > Via the rc.d script or syslog? sshguard_enable="YES" sshguard_blacklist="40:/var/db/sshguard/blacklist.db" sshguard_whitelistfile="/usr/local/etc/sshguard.whitelist" > Does this message only appear when the machine is starting up? Yes that is correct. Only then (not on the system prompt after) Does it show up when you restart SSHGuard without restarting the system? Nope Best regards, Jos |
|
From: Kevin Z. <kev...@gm...> - 2016-08-01 18:00:45
|
On 08/01/2016 10:56, Jos Chrispijn wrote: > What is displayed in dmesg is the text that is display during a system > restart - no address blocking required as the server is in its startup > phase. Ahh, so you're running 1.6.4 from ports? How are you starting SSHGuard? Via the rc.d script or syslog? Does this message only appear when the machine is starting up? Does it show up when you restart SSHGuard without restarting the system? Best, Kevin -- Kevin Zheng kev...@gm... | ke...@be... | PGP: 0xC22E1090 |
|
From: Jos C. <ssh...@cl...> - 2016-08-01 17:56:23
|
Hello Kevin, In een bericht van 1-8-2016 17:46: > On 08/01/2016 02:42, Jos Chrispijn wrote: >> After restarting my server for maintenance, I saw this in dmesg file: >> >> /Jul 31 18:08:39 ares sshguard[720]: fw: failed to block (-1)/ >> >> Can you tell me what this means? > > SSHGuard failed to flush its pipe to sshg-fw when trying to block an > address. Did you run `make install`? > > Some more information like 'configure' command line would be useful for > figuring out what went wrong. What is displayed in dmesg is the text that is display during a system restart - no address blocking required as the server is in its startup phase. How do I use the configure sshguard? I did install it running make config first (resulting in "No options to configure") and then running make install clean. I have sshguard-ipfw-1.6.4_1 up-and-running currently. Best regards, Jos |
|
From: Kevin Z. <kev...@gm...> - 2016-08-01 15:46:27
|
On 08/01/2016 02:42, Jos Chrispijn wrote: > After restarting my server for maintenance, I saw this in dmesg file: > > /Jul 31 18:08:39 ares sshguard[720]: fw: failed to block (-1)/ > > Can you tell me what this means? SSHGuard failed to flush its pipe to sshg-fw when trying to block an address. Did you run `make install`? Some more information like 'configure' command line would be useful for figuring out what went wrong. Thanks, Kevin -- Kevin Zheng kev...@gm... | ke...@be... | PGP: 0xC22E1090 |
|
From: Jos C. <ssh...@cl...> - 2016-08-01 09:43:00
|
After restarting my server for maintenance, I saw this in dmesg file: /Jul 31 18:08:39 ares sshguard[720]: fw: failed to block (-1)/ Can you tell me what this means? Thanks, Jos |
|
From: Kevin Z. <kev...@gm...> - 2016-07-31 23:03:16
|
On 07/31/2016 12:09, li...@la... wrote: > Other than doing portsnap fetch portsnap update I assume we are at > the mercy of the port maintainers. The FreeBSD port is usually updated pretty quickly. The version in ports is currently the latest version (1.6.4). If you're looking for upgrade instructions, check the Handbook: https://www.freebsd.org/doc/en/books/handbook/ports-using.html > Sshguard does eventually get updated in ports. Even though I run > sshguard as beta often, when the ports release the new code, I go > back and bold it from ports just to verify the ports work. It's tricky getting the release process right. Generally, you should track 'master' if you want to run the latest code or if you're interested in participating with the project (like discussing new features on mailing lists, submitting attack signatures, or even just testing the latest code). Releases are intended for people who want to run SSHGuard but want minimal involvement in the project. I tend to fall into this category for most of the software I use. So, if you want to contribute to SSHGuard, simply running 'master' and being loud when something breaks is well appreciated! Best, Kevin -- Kevin Zheng kev...@gm... | ke...@be... | PGP: 0xC22E1090 |
|
From: <li...@la...> - 2016-07-31 19:09:09
|
Other than doing portsnap fetch portsnap update I assume we are at the mercy of the port maintainers. Sshguard does eventually get updated in ports. Even though I run sshguard as beta often, when the ports release the new code, I go back and bold it from ports just to verify the ports work. As an aside, I run pkg version -v | grep needs after doing the portsnap update to highlight the programs that need updating. Original Message From: Jos Chrispijn Sent: Sunday, July 31, 2016 12:00 PM To: ssh...@li... Subject: [SSHGuard-users] Port updates |
|
From: Jos C. <ssh...@cl...> - 2016-07-31 19:00:29
|
Dear team, Just for my information- see that SSHGuard is updated on a regular scheme. Since I used this great program I though never ran into a port update of it. Can you advise how/where to obtain the port update of SSHGuard? Thanks, Jos Chrispijn |
|
From: Kevin Z. <kev...@gm...> - 2016-07-31 17:55:03
|
Hi Jos, On 07/31/2016 09:21, Jos Chrispijn wrote: > As you see the ip address has been blocked @ (1), but in the same run I > get twice another display line, saying the the ip should have been > blocked (as it was in (1)). > Can you explain how we should interprer the (2) lines or is it a display > bug? The attacker was blacklisted (and blocked) in (1), so the attacker was disconnected by the firewall. Disconnects also cause sshd to log the message you saw, which SSHGuard saw and warned that an attack was recognized, even though it assumed the attacker was already blocked. You can safely disregard this message. The purpose of this message was to warn when the firewall failed to block, in which case lots of these messages would appear. Best, Kevin -- Kevin Zheng kev...@gm... | ke...@be... | PGP: 0xC22E1090 |
|
From: Jos C. <ssh...@cl...> - 2016-07-31 16:34:09
|
Dearteam, Just saw following in my all.log file: -- cut -- Jul 31 18:12:56 ares sshguard[720]: blacklist: added 98.174.187.19 Jul 31 18:12:56 ares kernel: Jul 31 18:12:56 ares sshguard[720]: blacklist: added 98.174.187.19 (1) Jul 31 18:12:56 ares sshguard[720]: 98.174.187.19: blocking forever (3 attacks in 256 secs, after 1 abuses over 256 secs) (1) Jul 31 18:12:56 ares kernel: Jul 31 18:12:56 ares sshguard[720]: 98.174.187.19: blocking forever (3 attacks in 256 secs, after 1 abuses over 256 secs) Jul 31 18:12:56 ares postfix/smtpd[2492]: lost connection after AUTH from wsip-98-174-187-19.ok.ok.cox.net[98.174.187.19] Jul 31 18:12:56 ares postfix/smtpd[2492]: disconnect from wsip-98-174-187-19.ok.ok.cox.net[98.174.187.19] ehlo=1 auth=0/1 commands=1/2 (2) --> Jul 31 18:12:56 ares sshguard[720]: 98.174.187.19: should already have been blocked (2) --> Jul 31 18:12:56 ares kernel: Jul 31 18:12:56 ares sshguard[720]: 98.174.187.19: should already have been blocked -- cut -- As you see the ip address has been blocked @ (1), but in the same run I get twice another display line, saying the the ip should have been blocked (as it was in (1)). Can you explain how we should interprer the (2) lines or is it a display bug? Keep up the good work, Jos Chrispijn |
|
From: Georg L. <jor...@ma...> - 2016-07-29 03:32:47
|
On 28/07/16 19:08, Kevin Zheng wrote: > On 07/28/2016 10:27, Georg Lehner wrote: >> - The sshg-fw script stops with syntax error, a patch with some >> improvements (hopefully) is attached. > > Thanks for the patch. Just to make sure, what does 'iptables -w -v' do? > I can't seem to tell from the man page [1] what the default action is. > > [1] http://linuxmanpages.net/manpages/fedora21/man8/iptables.8.html > Hello Kevin, It should be `-V` (--version), instead of `-v`. I'm sure you remember, that I have a system with an old `iptables` which does not understand the `-w` switch. Since I have a system with a new `iptables`too, I was able to find a way, to detect non-intrusively if `-w` is supported. `iptables -w -V` will exit with an error and a message on stderr if it is an old `iptables`. If it is a new `iptables` it will show its version on stdout and exit with success. I proposed: `if $cmd -w -v 2>/dev/null; then ...` in my patch, however it better be: `if $cmd -w -V 2>&1 >/dev/null; then ...` to suppress the version string too. Best Regards, Georg Lehner |
|
From: Kevin Z. <kev...@gm...> - 2016-07-29 01:08:25
|
On 07/28/2016 10:27, Georg Lehner wrote: > - The sshg-fw script stops with syntax error, a patch with some > improvements (hopefully) is attached. Thanks for the patch. Just to make sure, what does 'iptables -w -v' do? I can't seem to tell from the man page [1] what the default action is. [1] http://linuxmanpages.net/manpages/fedora21/man8/iptables.8.html -- Kevin Zheng kev...@gm... | ke...@be... | PGP: 0xC22E1090 |
|
From: Jef P. <je...@ma...> - 2016-07-28 22:50:38
|
>What's the purpose of the 'x' in lines like these? > >if [ "x$2" = "x6" ]; then > >Since the string literals are provided, there shouldn't be an error when >the provided strings are empty. Isn't the 'x' there to guard against an >empty string? That's a common idiom in shell script programming. It's to guard against the string being check having a flag argument that the [ command, a.k.a. test, would interpret. This is really due to test having poorly thought out argument syntax but what are you gonna do. Another common idiom is to merely reverse the order of the strings being checked: if [ "6" = "$2" ]; then Putting the variable second means test won't try to interpret it as a flag. |
|
From: Georg L. <jor...@ma...> - 2016-07-28 22:34:40
|
On 28/07/16 16:19, Kevin Zheng wrote:
> On 07/28/2016 10:27, Georg Lehner wrote:
>> - The sshg-fw script stops with syntax error, a patch with some
>> improvements (hopefully) is attached.
>
> What's the purpose of the 'x' in lines like these?
>
> if [ "x$2" = "x6" ]; then
>
> Since the string literals are provided, there shouldn't be an error when
> the provided strings are empty. Isn't the 'x' there to guard against an
> empty string?
Force of habit. Consider somebody calling the function without the
second parameter, you'd get a syntax error and the script dies or
behaves erratically.
...
>> I noticed, that the sshg-fw script is wrapped together by './configure'
>> and not by 'make'. To rebuild it, you need to 'make distclean' and than
>> './configure' again. I propose either to build the script with make, or
>> document the procedure.
>
> I agree. I'll see what I can do. The main issue is that the Makefiles
> don't know what firewall backend you chose.
...
Well, my auto{conf,make}-fu is very weak, but I guess that there is a
Makefile.in which can be mangled by ./configure in a way, that the
--with-iptables parameter slips in at the right place in the respective
Makefile.
Best Regards,
Georg Lehner
|
|
From: Kevin Z. <kev...@gm...> - 2016-07-28 22:28:57
|
On 07/28/2016 15:24, Jef Poskanzer wrote: >> What's the purpose of the 'x' in lines like these? >> >> if [ "x$2" = "x6" ]; then >> >> Since the string literals are provided, there shouldn't be an error when >> the provided strings are empty. Isn't the 'x' there to guard against an >> empty string? > > That's a common idiom in shell script programming. It's to > guard against the string being check having a flag argument > that the [ command, a.k.a. test, would interpret. This > is really due to test having poorly thought out argument > syntax but what are you gonna do. Ahh, I see. I'm glad someone is looking over my shell scripts. > Another common idiom is to merely reverse the order of > the strings being checked: > > if [ "6" = "$2" ]; then > > Putting the variable second means test won't try to interpret > it as a flag. I think I like this better. Thanks, Kevin -- Kevin Zheng kev...@gm... | ke...@be... | PGP: 0xC22E1090 |
|
From: Kevin Z. <kev...@gm...> - 2016-07-28 22:19:15
|
On 07/28/2016 10:27, Georg Lehner wrote: > - The sshg-fw script stops with syntax error, a patch with some > improvements (hopefully) is attached. What's the purpose of the 'x' in lines like these? if [ "x$2" = "x6" ]; then Since the string literals are provided, there shouldn't be an error when the provided strings are empty. Isn't the 'x' there to guard against an empty string? > - Shortly after startup the following error message is shown, > processing continues > > sh: 1: exec: NONE/libexec/sshg-fw: not found Working on this one. > - After some processing sshguard stops because of a broken pipe. > See the attached sshguard.log for the error messages. > > My guess: sshg-fw is not run (first error), and when the first attacker > should be added the half-open pipe breaks. Should be fixed in 'master' now. > I noticed, that the sshg-fw script is wrapped together by './configure' > and not by 'make'. To rebuild it, you need to 'make distclean' and than > './configure' again. I propose either to build the script with make, or > document the procedure. I agree. I'll see what I can do. The main issue is that the Makefiles don't know what firewall backend you chose. Best, Kevin -- Kevin Zheng kev...@gm... | ke...@be... | PGP: 0xC22E1090 |
|
From: Kevin Z. <kev...@gm...> - 2016-07-28 20:31:37
|
On 07/28/2016 13:21, Georg Lehner wrote: > If I had a wish, I would like to be able to specify the coefficient for > the (exponential?) back-off time. Currently it seems to be set fixed to > 1.5 (man page, -p option). I can do that. > Another idea: sshg-parse could be used for creating time series of the > attacks, which can then be analyzed by statistical tools. Eventually we > end up with an adaptive Kalman Filter or so ... The intent of splitting up the parser into a separate binary was to make it possible to plug it into other tools :) I actually have some data I collected. It's a bit limited in usefulness because SSHGuard blocks the attacker after 3 attempts. I've attached it here in case anyone wants to play with the data. Briefly, each line represents the attacks from an attacker. Each entry is the time of an attack (Unix time). -1 represents a block by SSHGuard. I've also included a script that breaks this data up into groups of 3 attacks that you can import into IPython. Have fun, Kevin -- Kevin Zheng kev...@gm... | ke...@be... | PGP: 0xC22E1090 |
|
From: Georg L. <jor...@ma...> - 2016-07-28 20:23:05
|
On 28/07/16 13:34, Kevin Zheng wrote: > On 07/28/2016 00:20, li...@la... wrote: >> Looking at the log, 162.144.102.19 is worthy of blocking, but it wasn't >> blocked. ... > Attackers are purged 30 minutes after their *first* attack, not their > most recent attack. The first attack was at 04:48:34, and so by the time > the third attack that would have triggered a block rolled around > (05:31:03), the attacker's earlier attacks were already forgotten. > > This latter issue is something worth fixing. Suggestions? Perhaps it's > better to change the policy to purge 30 minutes after the most *recent* > attack. > > Best, > Kevin > Hello, Attacks as I observer them typically are spread over time. I guess, that attackers already know, that they get more attention if they blindly hammer on the same host, so they distribute the attacks and better come back later to give it a try. I have set the -s option to 70 minutes instead of 30 and consider setting -p to 5 minutes to take care of this. Using the most recent attack time instead of the first, only shifts the time window, so in the next corner case the attacker gets forgotten. If I had a wish, I would like to be able to specify the coefficient for the (exponential?) back-off time. Currently it seems to be set fixed to 1.5 (man page, -p option). - - - Another idea: sshg-parse could be used for creating time series of the attacks, which can then be analyzed by statistical tools. Eventually we end up with an adaptive Kalman Filter or so ... - - - Best Regards, Georg Lehner |
|
From: <li...@la...> - 2016-07-28 19:57:16
|
I think you have a "number of attacks" per some time period criteria. I think a simple lockout after the most recent attack is fine. But you must of had a reason for the more complicated criteria. I suppose if some IP attacked every 30 minutes until the end of time, it would be wrong to allow that behavior. How about the release time is based from the last attack, but if there is a trigger prior to release, the timer gets increased by say 15 minutes. Well no, that won't work because the attacker would just wait 30 minutes between attacks and never increase the time period. How about a simple 30 minute lockout, no fancy time increase, but the program makes a log for suggested blacklisting based on persistent attacks. Original Message From: Kevin Zheng Sent: Thursday, July 28, 2016 12:35 PM To: ssh...@li... Subject: Re: [SSHGuard-users] rev 1.7.0 not blocking all worthy of blocking On 07/28/2016 00:20, li...@la... wrote: > Looking at the log, 162.144.102.19 is worthy of blocking, but it wasn't > blocked. This is not technically a bug because the code is behaving as written. I think the bug is in the policy itself. Here's what's going on: The "POSSIBLE BREAK-IN ATTEMPT" is not considered an attack. This message shows up when a reverse DNS lookup doesn't match, but the actual attack is the "Connection closed" line. They're not two separate attacks. Attackers are purged 30 minutes after their *first* attack, not their most recent attack. The first attack was at 04:48:34, and so by the time the third attack that would have triggered a block rolled around (05:31:03), the attacker's earlier attacks were already forgotten. This latter issue is something worth fixing. Suggestions? Perhaps it's better to change the policy to purge 30 minutes after the most *recent* attack. Best, Kevin -- Kevin Zheng kev...@gm... | ke...@be... | PGP: 0xC22E1090 ------------------------------------------------------------------------------ _______________________________________________ sshguard-users mailing list ssh...@li... https://lists.sourceforge.net/lists/listinfo/sshguard-users |
|
From: Kevin Z. <kev...@gm...> - 2016-07-28 19:34:50
|
On 07/28/2016 00:20, li...@la... wrote: > Looking at the log, 162.144.102.19 is worthy of blocking, but it wasn't > blocked. This is not technically a bug because the code is behaving as written. I think the bug is in the policy itself. Here's what's going on: The "POSSIBLE BREAK-IN ATTEMPT" is not considered an attack. This message shows up when a reverse DNS lookup doesn't match, but the actual attack is the "Connection closed" line. They're not two separate attacks. Attackers are purged 30 minutes after their *first* attack, not their most recent attack. The first attack was at 04:48:34, and so by the time the third attack that would have triggered a block rolled around (05:31:03), the attacker's earlier attacks were already forgotten. This latter issue is something worth fixing. Suggestions? Perhaps it's better to change the policy to purge 30 minutes after the most *recent* attack. Best, Kevin -- Kevin Zheng kev...@gm... | ke...@be... | PGP: 0xC22E1090 |
|
From: Kevin Z. <kev...@gm...> - 2016-07-28 19:18:11
|
On 07/28/2016 11:41, li...@la... wrote: > > http://www.sshguard.net/docs/setup/compile-install/ > > The prefix requirement is in the instructions above. IIRC, Kevin > added a lot of verbiage on the page for me because I kept screwing it > up. ;-) Although the documentation suggests that you should use '--prefix', I consider the breakage without a '--prefix' a bug. -- Kevin Zheng kev...@gm... | ke...@be... | PGP: 0xC22E1090 |
|
From: Georg L. <jor...@ma...> - 2016-07-28 18:52:10
|
On 28/07/16 12:41, li...@la... wrote: > > http://www.sshguard.net/docs/setup/compile-install/ > > The prefix requirement is in the instructions above. IIRC, Kevin added a lot of verbiage on the page for me because I kept screwing it up. ;-) > ... You are right, I did not rtfm. To my excuse: ./configure --help told me, that the default prefix was /usr/local. Please Kevin, add --prefix=/your-location to the examples in the section on "COMPILING AND INSTALLING" lower down the page too. Regards, Georg Lehner |
|
From: <li...@la...> - 2016-07-28 18:41:36
|
http://www.sshguard.net/docs/setup/compile-install/ The prefix requirement is in the instructions above. IIRC, Kevin added a lot of verbiage on the page for me because I kept screwing it up. ;-) Original Message From: Georg Lehner Sent: Thursday, July 28, 2016 11:28 AM To: ssh...@li... Subject: Re: [SSHGuard-users] Call for testing: SSHGuard 1.7.0 On 28/07/16 11:27, Georg Lehner wrote: ... > > sh: 1: exec: NONE/libexec/sshg-fw: not found > > - After some processing sshguard stops because of a broken pipe. > See the attached sshguard.log for the error messages. > > My guess: sshg-fw is not run (first error), and when the first attacker > should be added the half-open pipe breaks. > ... In fact, the auto{make,configure} machinery does not supply a default prefix. After doing: ./configure --prefix=/usr/local --with-firewall=iptables I got a working sshguard. Running now in production, any findings will be reported. Best Regards, Georg Lehner ------------------------------------------------------------------------------ _______________________________________________ sshguard-users mailing list ssh...@li... https://lists.sourceforge.net/lists/listinfo/sshguard-users |