From owner-freebsd-ports-bugs@FreeBSD.ORG Wed Jun 12 13:00:01 2013 Return-Path: Delivered-To: freebsd-ports-bugs@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id 9FC8AF53 for ; Wed, 12 Jun 2013 13:00:01 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id 81FDB1A52 for ; Wed, 12 Jun 2013 13:00:01 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id r5CD01pR008335 for ; Wed, 12 Jun 2013 13:00:01 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id r5CD01Jd008334; Wed, 12 Jun 2013 13:00:01 GMT (envelope-from gnats) Resent-Date: Wed, 12 Jun 2013 13:00:01 GMT Resent-Message-Id: <201306121300.r5CD01Jd008334@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Sayetsky Anton Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) by hub.freebsd.org (Postfix) with ESMTP id 35E03E76 for ; Wed, 12 Jun 2013 12:53:49 +0000 (UTC) (envelope-from jason@jw.lds.net.ua) Received: from jw.lds.net.ua (jw.lds.net.ua [193.192.37.74]) by mx1.freebsd.org (Postfix) with ESMTP id 8EA6C19F3 for ; Wed, 12 Jun 2013 12:53:47 +0000 (UTC) Received: from jw.lds.net.ua (localhost [127.0.0.1]) by jw.lds.net.ua (8.14.5/8.14.5) with ESMTP id r5CCrf6f081408 for ; Wed, 12 Jun 2013 15:53:41 +0300 (EEST) (envelope-from jason@jw.lds.net.ua) Received: (from jason@localhost) by jw.lds.net.ua (8.14.5/8.14.5/Submit) id r5CCraRm081407; Wed, 12 Jun 2013 15:53:36 +0300 (EEST) (envelope-from jason) Message-Id: <201306121253.r5CCraRm081407@jw.lds.net.ua> Date: Wed, 12 Jun 2013 15:53:36 +0300 (EEST) From: Sayetsky Anton To: FreeBSD-gnats-submit@freebsd.org X-Send-Pr-Version: 3.113 Subject: ports/179512: [patch] security/py-fail2ban: remove PF config patch, clean-up IPFW config patch X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list Reply-To: Sayetsky Anton List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 12 Jun 2013 13:00:01 -0000 >Number: 179512 >Category: ports >Synopsis: [patch] security/py-fail2ban: remove PF config patch, clean-up IPFW config patch >Confidential: no >Severity: non-critical >Priority: high >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Wed Jun 12 13:00:00 UTC 2013 >Closed-Date: >Last-Modified: >Originator: Sayetsky Anton >Release: FreeBSD 9.1-RELEASE-p3 amd64 >Organization: >Environment: System: FreeBSD jw.local 9.1-RELEASE-p3 FreeBSD 9.1-RELEASE-p3 #0 r250095: Tue Apr 30 12:25:23 EEST 2013 root@jw.local:/usr/obj/media/dvlfiles/build/src/sys/JASONW amd64 >Description: After updating fail2ban to latest version, I've found two things: 1. Action file for PF already present in dist, so we don't need it anymore in ports tree. 2. Action file for IPFW now contains "actionstart" (creating blocking rule) & "actionstop" (deleting blocking rule). I think that's incorrect because in this setup number of blocking rule is determined by fail2bam itself. I think that blocking rule must add firewall administrator only. >How-To-Repeat: >Fix: Patch attached with submission follows: --- patch.txt begins here --- Index: Makefile =================================================================== --- Makefile (revision 320663) +++ Makefile (working copy) @@ -3,6 +3,7 @@ PORTNAME= fail2ban PORTVERSION= 0.8.9 +PORTREVISION= 1 CATEGORIES= security python MASTER_SITES= https://github.com/${PORTNAME}/${PORTNAME}/tarball/${PORTVERSION}/ PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} Index: files/patch-bsd-ipfw.conf =================================================================== --- files/patch-bsd-ipfw.conf (revision 320663) +++ files/patch-bsd-ipfw.conf (working copy) @@ -1,75 +1,46 @@ ---- /dev/null 2012-11-27 18:04:17.000000000 +0100 -+++ config/action.d/bsd-ipfw.conf 2012-11-27 18:06:29.000000000 +0100 -@@ -0,0 +1,72 @@ -+# Fail2Ban configuration file -+# -+# Author: Nick Munger -+# Modified by: Ken Menzel -+# -+ -+[Definition] -+ -+# Option: actionstart -+# Notes.: command executed once at the start of Fail2Ban. -+# Values: CMD -+# -+actionstart = -+ -+ -+# Option: actionstop -+# Notes.: command executed once at the end of Fail2Ban -+# Values: CMD -+# -+actionstop = -+ -+ -+# Option: actioncheck -+# Notes.: command executed once before each actionban command -+# Values: CMD -+# -+actioncheck = -+ -+ -+# Option: actionban -+# Notes.: command executed when banning an IP. Take care that the -+# command is executed with Fail2Ban user rights. -+# Tags: IP address -+# number of failures -+#