* Solène Rapenne <[email protected]> le [18-09-2022 09:55:48 +0200]:
> Le Sat, 17 Sep 2022 20:54:38 +0200,
> prx <[email protected]> a écrit :
>
> > iblock now kill established connections after banning an IP.
> >
> > Find attached a diff to update the port to 1.1.0.
> >
> > Regards.
> >
> > prx
>
> hold on, it seems this version is buggy
>
After last changes, find a new diff to update iblock port.
* Remove do-build since CFLAGS are now respected
* fix a missing "$" in README
Tested on amd64.
Regards.
Index: net/iblock//Makefile
===================================================================
RCS file: /cvs/ports/net/iblock/Makefile,v
retrieving revision 1.1.1.1
diff -u -r1.1.1.1 Makefile
--- net/iblock//Makefile 8 Sep 2022 10:36:24 -0000 1.1.1.1
+++ net/iblock//Makefile 18 Sep 2022 13:28:28 -0000
@@ -1,5 +1,5 @@
COMMENT = inetd program to blackhole IPs connecting to it
-V = 1.0.1
+V = 1.1.2
DISTNAME = iblock-${V}
CATEGORIES = net
@@ -19,9 +19,5 @@
WRKSRC = ${WRKDIR}/iblock
MAKE_FLAGS = CC="${CC}"
-
-# XXX: until it is updated to respect CFLAGS
-do-build:
- cd ${WRKSRC} && ${CC} ${CFLAGS} -o iblock main.c
.include <bsd.port.mk>
Index: net/iblock//distinfo
===================================================================
RCS file: /cvs/ports/net/iblock/distinfo,v
retrieving revision 1.1.1.1
diff -u -r1.1.1.1 distinfo
--- net/iblock//distinfo 8 Sep 2022 10:36:24 -0000 1.1.1.1
+++ net/iblock//distinfo 18 Sep 2022 13:28:28 -0000
@@ -1,2 +1,2 @@
-SHA256 (iblock-1.0.1.tar.gz) = hOWDUMmcEWh78DUTRSbGpYFT33Bk/sTfWC8gZWChbDo=
-SIZE (iblock-1.0.1.tar.gz) = 2679
+SHA256 (iblock-1.1.2.tar.gz) = HudVCVC/KjTv8jA91ZZ7CzFkuAd8VfniszYRDlSoY/I=
+SIZE (iblock-1.1.2.tar.gz) = 2889
Index: net/iblock//pkg/README
===================================================================
RCS file: /cvs/ports/net/iblock/pkg/README,v
retrieving revision 1.1.1.1
diff -u -r1.1.1.1 README
--- net/iblock//pkg/README 8 Sep 2022 10:36:24 -0000 1.1.1.1
+++ net/iblock//pkg/README 18 Sep 2022 13:28:28 -0000
@@ -43,7 +43,7 @@
pass in quick on egress inet proto tcp to port $iblock_services \
rdr-to 127.0.0.1 port 666 label "block_$dstport"
pass in quick on egress inet6 proto tcp to port $iblock_services \
- rdr-to ::1 port 666 label "block6_dstport"
+ rdr-to ::1 port 666 label "block6_$dstport"
```
The label keyword allows displaying blocking statistics with pfctl -s labels