Summary: Script to help thwart SSH server attacks Summary(pl): Skrypt do blokowania ataków na serwery SSH Name: DenyHosts Version: 2.1 Release: 1 License: GPL v2 Group: Applications/System Source0: http://dl.sourceforge.net/denyhosts/%{name}-%{version}.tar.gz # Source0-md5: 1c40bda86884901f125bfbce3d8c35cb Source1: %{name}.cron Source2: %{name}.cfg Source3: %{name}.init URL: http://www.denyhosts.net/ BuildRequires: python-devel BuildRequires: python-modules BuildRequires: rpm-pythonprov Requires: python BuildRoot: %{tmpdir}/%{name}-%{version}-root-%(id -u -n) %description DenyHosts is a script intended to be run by Linux system administrators to help thwart SSH server attacks. If you've ever looked at your SSH log (/var/log/secure on Redhat, /var/log/auth.log on Mandrake, etc...) you may be alarmed to see how many hackers attempted to gain access to your server. Hopefully, none of them were successful (but then again, how would you know?). Wouldn't it be better to automatically prevent that attacker from continuing to gain entry into your system? %description -l pl DenyHosts jest skryptem dla administratorów systemów Linux, którego zadaniem jest odparcie ataków na serwery SSH. W logach SSH można znaleĽć wiele informacji o próbach uzyskania dostępu do serwera poprzez usługę SSH. Dobrze jest zapobiec kolejnym próbom włamania przez odcięcie włamywaczom dostępu do serwera. %prep %setup -q %build echo 'VERSION="%{version}"' > version.py python setup.py build %install rm -rf $RPM_BUILD_ROOT install -d $RPM_BUILD_ROOT{%{_sysconfdir},/etc/cron.d,/etc/rc.d/init.d,%{_sbindir},/var/lib/%{name}} python setup.py install \ --root=$RPM_BUILD_ROOT \ --optimize=2 install %{SOURCE1} $RPM_BUILD_ROOT/etc/cron.d/%{name} install %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir} install %{SOURCE3} $RPM_BUILD_ROOT/etc/rc.d/init.d/%{name} mv $RPM_BUILD_ROOT%{_datadir}/denyhosts/daemon-control-dist $RPM_BUILD_ROOT%{_sbindir}/%{name}ctl rm $RPM_BUILD_ROOT%{py_sitescriptdir}/%{name}/*.py rm -r $RPM_BUILD_ROOT%{_datadir}/denyhosts echo "127.0.0.1" > $RPM_BUILD_ROOT/var/lib/%{name}/allowed-hosts %clean rm -rf $RPM_BUILD_ROOT %post /sbin/chkconfig --add %{name} if [ -r /var/lock/subsys/DenyHosts ]; then /etc/rc.d/init.d/DenyHosts restart >&2 else echo "Run \"/etc/rc.d/init.d/DenyHosts start\" to start DenyHosts." fi %preun if [ "$1" = "0" ]; then if [ -r /var/lock/subsys/DenyHosts ]; then /etc/rc.d/init.d/DenyHosts stop >&2 fi /sbin/chkconfig --del %{name} fi %files %defattr(644,root,root,755) %doc README.txt CHANGELOG.txt %config(noreplace) %verify(not md5 mtime size) %{_sysconfdir}/%{name}.cfg %config(noreplace) %verify(not md5 mtime size) /etc/cron.d/%{name} %attr(755,root,root) %{_bindir}/* %attr(755,root,root) %{_sbindir}/* %attr(754,root,root) /etc/rc.d/init.d/%{name} %dir /var/lib/%{name} %config(noreplace) %verify(not md5 mtime size) /var/lib/%{name}/allowed-hosts %dir %{py_sitescriptdir}/%{name} %{py_sitescriptdir}/%{name}/*.py[co]