2021-01-11 07:54:33 +00:00
|
|
|
{ lib, stdenv, fetchurl, autoreconfHook, yacc, flex}:
|
2017-03-07 15:50:33 +00:00
|
|
|
|
|
|
|
stdenv.mkDerivation rec {
|
2020-08-31 05:47:35 +01:00
|
|
|
version = "2.4.1";
|
2019-08-15 13:41:18 +01:00
|
|
|
pname = "sshguard";
|
2017-03-07 15:50:33 +00:00
|
|
|
|
|
|
|
src = fetchurl {
|
2019-08-15 13:41:18 +01:00
|
|
|
url = "mirror://sourceforge/sshguard/${pname}-${version}.tar.gz";
|
2020-08-31 05:47:35 +01:00
|
|
|
sha256 = "0rrwmx91ifvc61wkld8gjkmfsq0ixxmf7m8fg4addkkxwvk04pc7";
|
2017-03-07 15:50:33 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
doCheck = true;
|
|
|
|
|
|
|
|
nativeBuildInputs = [ autoreconfHook yacc flex ];
|
|
|
|
|
|
|
|
configureFlags = [ "--sysconfdir=/etc" ];
|
|
|
|
|
2021-01-11 07:54:33 +00:00
|
|
|
meta = with lib; {
|
2020-10-26 04:08:40 +00:00
|
|
|
description = "Protects hosts from brute-force attacks";
|
2017-03-07 15:50:33 +00:00
|
|
|
longDescription = ''
|
|
|
|
SSHGuard can read log messages from various input sources. Log messages are parsed, line-by-line, for recognized patterns.
|
|
|
|
If an attack, such as several login failures within a few seconds, is detected, the offending IP is blocked.
|
|
|
|
'';
|
2020-04-01 02:11:51 +01:00
|
|
|
homepage = "https://sshguard.net";
|
2017-03-07 15:50:33 +00:00
|
|
|
license = licenses.bsd3;
|
|
|
|
maintainers = with maintainers; [ sargon ];
|
|
|
|
platforms = with platforms; linux ++ darwin ++ freebsd ++ netbsd ++ openbsd;
|
|
|
|
};
|
|
|
|
}
|