ELF>8@@HH H VH=(1H=1H ^H=1H EH IH OH DH5 H ]HUSHHHHxHH(Hމaw3$H=tHH=1H[]H=11 'pH VH=( 13H=.<HEH=E11H /H AH=11 HH{H OH=11 HH,H Kw_H=!HHHH=1H=HxH=HH1tH5H=J98H=1s1@1FH Q4HH=1% : ; I$ > $ >   I : ;  : ;I8 &I : ; : ; I8 I !I/  : ; .: ; ' @.? : ;' I : ;I.: ; ' .? : ; ' I@: ; I4: ; I1X Y 11X Y 1X Y 4: ; I? < 4: ; I?  8intiiis. b##### #(#0#8#@#H#P#X#`!#h#b#p'b#t)p#x-F#.T#/#3#<{#E#F#G#H#I-#Kb#M#y  # # b#  ~   Mk0 # # M# M# # #  b#(!OiMsMMb-b-b-.bV_VM;&k  /usr/include/usr/include/bits/usr/lib/gcc/x86_64-redhat-linux/4.1.2/includesshguard_options.cstdlib.hstdio.hlibio.htypes.hstddef.hgetopt.hsshguard_options.htime.h KuuuYI~u t~J-gj" J=%~J;ug}J;ug5@.qKs Xyt!/gJJ*t'$Usage: sshguard [-b ] [-w ]{0,n} [-a num] [-p sec] [-s sec] [-l ] [-f ]{0,n} [-i ] [-v] -b Blacklist: thr = number of abuses before blacklisting, file = blacklist filename. -a Number of hits after which blocking an address (%d) -p Seconds after which unblocking a blocked address (%d) -w Whitelisting of addr/host/block, or take from file if starts with "/" or "." (repeatable) -s Seconds after which forgetting about a cracker candidate (%d) -l Add the given log source to Log Sucker's monitored sources (off) -f "authenticate" service's logs through its process pid, as in pidfile -i When started, save PID in the given file; useful for startup scripts (off) -v Dump version message to stderr, supply this when reporting bugs The SSHGUARD_DEBUG environment variable enables debugging mode (verbosity + interactivity). Doesn't make sense to have a blacklist threshold lower than one abuse (%u). Terminating. Debugging mode now uses environment variable. Run: env SSHGUARD_DEBUG="" %s ... Doesn't make sense to have a pardon time lower than 1 second. Terminating. Doesn't make sense to have a stale threshold lower than 1 second. Terminating. Doesn't make sense to have an abuse threshold lower than 1 attempt. Terminating. Warning! Sshguard now uses *attack dangerousness*, not occurrences, to gauge threats. Default dangerousness per attack is %u, default threshold is %d. Could not handle whitelisting for %s. Could not parse service pid configuration '%s'. Copyright (c) 2007,2008 Mij This is free software; see the source for conditions on copying. %u:%sUnable to poll from '%s'! sshguard %d.%d.%d b:p:s:a:w:f:l:i:vdhx 9D$ACG zRx 9D4ACG w9w@AwADwDKwKw @UVV@TSSPP/ get_options_cmdlineopts,get_options_cmdline_shortbufshort int_IO_lock_tstderr_IO_buf_end_IO_write_endunsigned intargc_flags__nptrblacklist_filename_markerstime_targv/var/www/vhosts/sel.or.jp/zone_users/designer/sshguard-1.5/srcmy_pidfilestrtolsshguard_options.c_pos_IO_backup_base_offset_fileno__pad2__pad3size_t_vtable_offset_IO_read_base_IO_save_endsshg_optshas_polled_filesGNU C 4.1.2 20080704 (Red Hat 4.1.2-44)char_mode_IO_write_base_IO_read_ptr_IO_markeroptchlong long int_IO_save_base__basestdout__pad1__pad4__pad5__endptr_IO_read_endoptslong intusageabuse_thresholdpardon_threshold_locklong unsigned int_old_offsetstdin_IO_FILEblacklist_thresholdunsigned char_sbuf_IO_write_ptr__time_toptargversion__off_tsigned charshort unsigned int_chain_flags2stale_threshold_cur_column_next__off64_t_unused2_IO_buf_baseGCC: (GNU) 4.1.2 20080704 (Red Hat 4.1.2-44).symtab.strtab.shstrtab.rela.text.data.bss.debug_abbrev.rela.debug_info.rela.debug_line.rodata.str1.8.rodata.str1.1.rela.rodata.rela.debug_frame.rela.eh_frame.debug_loc.rela.debug_pubnames.rela.debug_aranges.debug_str.comment.note.GNU-stack @'( &<,<1<xD ?30 U P@<a2h p2*IxX<( 0`>`P>0`@3?s0(?00b.33x# ' 9  !(06@J 0OV]qsshguard_options.cusagestderrfwritefprintffputcget_options_cmdlineoptsgetoptoptargprocauth_addprocess__strtol_internalwhitelist_addlogsuck_add_logsourcestrlenmallocsscanfstrcpylogsuck_initwhitelist_file "1 6=G NU_ (fm| h   X   , @NYc ny  5    (7 P<CR Yex  ! P , 1GU_l{ X$   ! % *"6=B#M S`e l$%  5   % ) . 39 o@ G N TU \ j 9q | B o    f  ' I   F U, :; J Y Wh w     0 :  i    %# ,3 C S c L (  <      X  % H3 A O t] nl dw B~9   m    @ 8 a     ' *4<[cv~ DY   3  4 (08@HPX`hpxDb < @@ 8 @