From owner-freebsd-questions@FreeBSD.ORG Mon Feb 5 23:14:40 2007 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 40D3F16A400 for ; Mon, 5 Feb 2007 23:14:38 +0000 (UTC) (envelope-from ceo@l-i-e.com) Received: from o2.hostbaby.com (o2.hostbaby.com [67.139.134.202]) by mx1.freebsd.org (Postfix) with SMTP id 152BE13C474 for ; Mon, 5 Feb 2007 23:14:37 +0000 (UTC) (envelope-from ceo@l-i-e.com) Received: (qmail 12676 invoked by uid 98); 5 Feb 2007 23:14:41 -0000 Received: from 127.0.0.1 by o2.hostbaby.com (envelope-from , uid 1013) with qmail-scanner-1.25 (clamdscan: 0.88.7/2523. Clear:RC:1(127.0.0.1):. Processed in 0.271822 secs); 05 Feb 2007 23:14:41 -0000 X-Qmail-Scanner-Mail-From: ceo@l-i-e.com via o2.hostbaby.com X-Qmail-Scanner: 1.25 (Clear:RC:1(127.0.0.1):. Processed in 0.271822 secs) Received: from localhost (HELO l-i-e.com) (127.0.0.1) by localhost with SMTP; 5 Feb 2007 23:14:41 -0000 Received: from 216.230.84.67 (SquirrelMail authenticated user ceo@l-i-e.com) by www.l-i-e.com with HTTP; Mon, 5 Feb 2007 17:14:41 -0600 (CST) Message-ID: <33808.216.230.84.67.1170717281.squirrel@www.l-i-e.com> Date: Mon, 5 Feb 2007 17:14:41 -0600 (CST) From: "Richard Lynch" To: freebsd-questions@freebsd.org User-Agent: Hostbaby Webmail MIME-Version: 1.0 Content-Type: text/plain;charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Priority: 3 (Normal) Importance: Normal Subject: port: security/denyhosts X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: ceo@l-i-e.com List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 05 Feb 2007 23:14:40 -0000 I thought the security/denyhosts port looked good, even if just to slim down that report I get every day about the hundreds of SSH attempts... And, hey, reporting back to denyhosts HQ and letting them notify the sysadmins of hacked boxen is a lot better than me doing it by hand. Only problem is, I'm stuck at Step 1: cd /usr/ports/security/denyhosts root@audio1# make clean ===> Cleaning for python-2.4.1_3 ===> Cleaning for denyhosts-2.6 root@audio1# make ===> Vulnerability check disabled, database not found ===> Extracting for denyhosts-2.6 => Checksum OK for DenyHosts-2.6.tar.gz. ===> Patching for denyhosts-2.6 ===> Applying FreeBSD patches for denyhosts-2.6 -e:No such file or directory *** Error code 1 Stop in /usr/ports/security/denyhosts. I thought maybe I was missing Python, but I went and installed that, and it's in pkg_info Actually, I should also point out that I had to do portsnap fetch and portsnap extract just to get security/denyhosts to show up... Maybe I wasn't supposed to do that?... Or is there another package it relies on that I'm missing? I tried reading the Makefile and there's a PYDISTUTILS requirement... Couldn't find anything obvious with 'locate' and variations on that theme, nor with ports make search key=pydistutils I also tried looking at the work/DenyHosts-2.6/daemon-control-dist.* files, as a second attempt to make (without a make clean) complained: ===> Applying FreeBSD patches for denyhosts-2.6 Ignoring previously applied (or reversed) patch. 1 out of 1 hunks ignored--saving rejects to daemon-control-dist.rej => Patch patch-daemon-control-dist failed to apply cleanly. *** Error code 1 But make clean "fixed" that, so it's probably a red herring. Nothing in the files I looked at seemed horribly wrong, but I can't claim to know what should be there in the first place. I've Googled some for this, but mostly find tutorials the seem to think the "make" is just gonna work. I guess I could just compile from source, but I do prefer to use ports whenever possible. So is this port just borked, or is it just me, or...? -- Some people have a "gift" link here. Know what I want? I want you to buy a CD from some starving artist. http://cdbaby.com/browse/from/lynch Yeah, I get a buck. So?