1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-02-04 11:23:46 +00:00

- Development has been discontinued.

PR:		ports/148261
Submitted by:	Anderson Eduardo <anderson@secover.com.br> (maintainer)
Feature safe:	yes
This commit is contained in:
Marcelo Araujo 2010-07-01 22:54:20 +00:00
parent 685a461c00
commit 90e1b77376
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=257279
17 changed files with 1 additions and 456 deletions

1
MOVED
View File

@ -4446,3 +4446,4 @@ www/firefox3|www/firefox35|2010-06-23|Upstream support dropped
www/firefox3-i18n|www/firefox35-i18n|2010-06-23|Upstream support dropped
security/krb4||2010-06-26|security vulnerability and isn't more developed
www/linux-mozilla|www/linux-seamonkey|2010-06-27|Security vulnerabilities and abandoned upstream since 2006
security/audit||2010-07-01|development has been discontinued

View File

@ -24,7 +24,6 @@
SUBDIR += apache-xml-security-c
SUBDIR += apg
SUBDIR += arirang
SUBDIR += audit
SUBDIR += authforce
SUBDIR += autossh
SUBDIR += avcheck

View File

@ -1,86 +0,0 @@
# New ports collection makefile for: audit
# Date created: 24 March 2002
# Whom: anders
#
# $FreeBSD$
#
PORTNAME= audit
PORTVERSION= 1.0
PORTREVISION= 3
CATEGORIES= security
MASTER_SITES= http://www1.corest.com/download/audit/ \
ftp://ftp.stack.nl/pub/users/johans/audit/
DISTNAME= ${PORTNAME}-v${PORTVERSION}beta-src
MAINTAINER= anderson@secover.com.br
COMMENT= Tools for remote and centralized audit data collection
OPTIONS= MYSQL "With MySQL support" off \
PGSQL "With PostGreSQL support" off
MAKE_ARGS= CFLAGS+="-fPIC -DPIC"
WRKSRC= ${WRKDIR}/${PORTNAME}-v${PORTVERSION}
USE_GMAKE= yes
USE_LDCONFIG= ${PREFIX}/lib/alat
GNU_CONFIGURE= yes
CONFIGURE_ARGS+= --with-audit-libdir=${PREFIX}/lib/alat
MANCOMPRESSED= yes
MAN1= audit.1
MAN8= auditd.8
PORTDOCS= COPYING README TODO
FIXPREFIX_CONF= src/include/audconf.h src/auditd/auditd.8
LIBVERSION= 1
.include <bsd.port.pre.mk>
.if defined(WITH_MYSQL)
USE_MYSQL= yes
.endif
.if defined(WITH_PGSQL)
USE_PGSQL= yes
.endif
.if defined(WITH_MYSQL)
CONFIGURE_ARGS+= --with-mysql \
--with-mysql-libdir=${LOCALBASE}/lib/mysql \
--with-mysql-incdir=${LOCALBASE}/include
PLIST_SUB+= MYSQL=''
.else
PLIST_SUB+= MYSQL='@comment '
.endif
.if defined(WITH_PGSQL)
CONFIGURE_ARGS+= --with-pgsql \
--with-pgsql-libdir=${LOCALBASE}/lib \
--with-pgsql-incdir=${LOCALBASE}/include
PLIST_SUB+= PGSQL=''
.else
PLIST_SUB+= PGSQL='@comment '
.endif
post-patch:
${REINPLACE_CMD} -e "s@Linux@FreeBSD@g" ${WRKSRC}/configure
(${FIND} ${WRKSRC}/src/modules -name Makefile.in -exec \
${REINPLACE_CMD} -e \
"s!^LIB=\(.*\).{VERSION}!LIB=\1${LIBVERSION}!" {} \;)
${REINPLACE_CMD} -e "s@AUDIT_VERSION@\"${LIBVERSION}\"@g" \
${WRKSRC}/src/lib/modules.c
.for f in ${FIXPREFIX_CONF}
${REINPLACE_CMD} -e "s@/etc/auditd.conf@${PREFIX}/etc/auditd.conf@g" \
${WRKSRC}/${f}
.endfor
post-install:
${INSTALL_DATA} ${WRKSRC}/auditd.conf ${PREFIX}/etc/auditd.conf.sample
.if !defined(NOPORTDOCS)
${INSTALL} -d -o root -g wheel -m 0755 ${DOCSDIR}
.for f in ${PORTDOCS}
${INSTALL_DATA} ${WRKSRC}/${f} ${DOCSDIR}
.endfor
.endif
.include <bsd.port.post.mk>

View File

@ -1,3 +0,0 @@
MD5 (audit-v1.0beta-src.tar.gz) = 31b707fb507e139c3c465d537613a100
SHA256 (audit-v1.0beta-src.tar.gz) = 5c2370f625d6c42dc4a16c69b6422c6679c575a2dcbd9b4fc039c29cc0758b00
SIZE (audit-v1.0beta-src.tar.gz) = 129337

View File

@ -1,10 +0,0 @@
--- src/lib/buffer.c.orig Sat Mar 30 22:39:49 2002
+++ src/lib/buffer.c Sat Mar 30 22:40:08 2002
@@ -35,6 +35,7 @@
*/
#include <sys/types.h>
+#include <arpa/inet.h>
#ifndef WIN32
#include <sys/uio.h>

View File

@ -1,10 +0,0 @@
--- src/include/buffer.h.orig Sat Mar 30 22:41:58 2002
+++ src/include/buffer.h Sat Mar 30 22:42:01 2002
@@ -32,6 +32,7 @@
#ifndef BUFFER_H
#define BUFFER_H
+#include <arpa/inet.h>
#include <openssl/evp.h>
typedef struct _buffer {

View File

@ -1,13 +0,0 @@
--- src/auditd/auditd.c.orig 2001-11-01 23:22:31.000000000 +0100
+++ src/auditd/auditd.c 2007-10-17 09:41:34.000000000 +0200
@@ -55,6 +55,10 @@
#include <sysexits.h>
#include <unistd.h>
#include <openssl/evp.h>
+#include <sys/param.h>
+#if defined(__FreeBSD__) && (__FreeBSD_version >= 500035)
+#include <limits.h>
+#endif
#include "sysdep.h"
#include "packet.h"

View File

@ -1,13 +0,0 @@
--- src/auditd/ia.c.orig 2001-10-10 02:30:11.000000000 +0200
+++ src/auditd/ia.c 2007-10-17 09:41:34.000000000 +0200
@@ -54,6 +54,10 @@
#include <sysexits.h>
#include <unistd.h>
#include <openssl/evp.h>
+#include <sys/param.h>
+#if defined(__FreeBSD__) && (__FreeBSD_version >= 500035)
+#include <limits.h>
+#endif
#include "sysdep.h"
#include "packet.h"

View File

@ -1,12 +0,0 @@
--- src/modules/attr/mysql/attr_mysql.c.orig Sun Nov 24 06:01:45 2002
+++ src/modules/attr/mysql/attr_mysql.c Sun Nov 24 06:01:58 2002
@@ -35,6 +35,9 @@
*/
#include <sys/param.h>
+#if defined(__FreeBSD__) && (__FreeBSD_version >= 500035)
+#include <limits.h>
+#endif
#ifdef __linux__
#include <netinet/in.h>

View File

@ -1,12 +0,0 @@
--- src/modules/attr/pgsql/attr_pgsql.c.orig Sun Nov 24 06:02:19 2002
+++ src/modules/attr/pgsql/attr_pgsql.c Sun Nov 24 06:02:28 2002
@@ -35,6 +35,9 @@
*/
#include <sys/param.h>
+#if defined(__FreeBSD__) && (__FreeBSD_version >= 500035)
+#include <limits.h>
+#endif
#ifdef __linux__
#include <netinet/in.h>

View File

@ -1,10 +0,0 @@
--- src/audit/audit.c.orig 2001-10-06 01:14:58.000000000 +0200
+++ src/audit/audit.c 2007-10-17 09:41:34.000000000 +0200
@@ -147,6 +147,7 @@
case SIGABRT:
fatal(-1, "");
default:
+ break;
}
errno = old_errno;
}

View File

@ -1,10 +0,0 @@
--- src/auditd/audconf.c.orig Thu Nov 4 07:25:36 2004
+++ src/auditd/audconf.c Thu Nov 4 07:25:45 2004
@@ -295,6 +295,7 @@
strlcpy(options->resmodule, value, sizeof(options->resmodule));
return (0);
default:
+ break;
}
errno = EINVAL;

View File

@ -1,13 +0,0 @@
--- src/include/sysdep.h.orig 2007-10-17 09:51:14.000000000 +0200
+++ src/include/sysdep.h 2007-10-17 09:50:32.000000000 +0200
@@ -96,10 +96,6 @@ size_t strlcat (char *, const char *, si
#define _PASSWORD_LEN 128
#endif
-#if defined(__FreeBSD__)
-typedef int32_t in_addr_t;
-#endif /* __FreeBSD__ */
-
int init_socket ();
#endif /* SYSDEP */

View File

@ -1,44 +0,0 @@
--- src/lib/packet.c.orig 2001-10-06 00:04:06.000000000 +0200
+++ src/lib/packet.c 2007-10-17 09:44:32.000000000 +0200
@@ -546,19 +546,19 @@
packet_put_raw(PACKET *p, const void *_data, ssize_t size)
{
ssize_t written;
- void *data;
+ char *data;
if (p == NULL || _data == NULL || size <= 0)
return;
- data = (void *) _data;
+ data = (char *) _data;
while (size) {
written = buf_put_raw(p->pkt_wbuf, data, size);
if (written < 0)
fatal(EX_SOFTWARE, "Invalid internal packet structure. "
"Connection aborted.");
size -= written;
- (char *) data += written;
+ data += written;
if (size)
_packet_write(p);
}
@@ -607,14 +607,16 @@
packet_get_raw(PACKET *p, void *data, ssize_t size)
{
ssize_t readed;
+ char *cdata;
if (p == NULL || data == NULL || size <= 0)
return;
+ cdata = (char *)data;
while (size) {
- readed = buf_get_raw(p->pkt_rbuf, data, size);
+ readed = buf_get_raw(p->pkt_rbuf, cdata, size);
size -= readed;
- (char *) data += readed;
+ cdata += readed;
if (size)
_packet_read(p);
}

View File

@ -1,196 +0,0 @@
--- src/modules/auth/srp/auth_srp.c.orig 2001-12-12 21:35:02.000000000 +0100
+++ src/modules/auth/srp/auth_srp.c 2007-10-17 09:48:57.000000000 +0200
@@ -289,7 +289,7 @@
_get_srppass(AUTHCON *ct, BIGNUM *v, BIGNUM *s, unsigned char *bs)
{
RESOURCE *r;
- BN_CTX bnctx;
+ BN_CTX *bnctx = BN_CTX_new();
BIGNUM tmp;
if (ct->rlist != NULL) {
@@ -308,12 +308,12 @@
/* Generate fake verifier and salt (try to avoid timing attack) */
log_debug(AUTH_SRP "Generating fake verifier and salt.");
- BN_CTX_init(&bnctx);
+ BN_CTX_init(bnctx);
BN_init(&tmp);
- _rand_bn(v, &tmp, &bnctx);
- _rand_bn(s, &tmp, &bnctx);
+ _rand_bn(v, &tmp, bnctx);
+ _rand_bn(s, &tmp, bnctx);
BN_free(&tmp);
- BN_CTX_free(&bnctx);
+ BN_CTX_free(bnctx);
BN_bn2bin(s, bs);
return (-1);
}
@@ -460,7 +460,7 @@
USER_M1[SHA1_DIGESTSIZE],
bs[NBYTES];
BIGNUM A, B, S, b, u, v, s, tmp;
- BN_CTX bnctx;
+ BN_CTX *bnctx = BN_CTX_new();
void *buffer;
size_t bufsiz;
char hostname[MAXHOSTNAMELEN]; /* XXX: move to engine */
@@ -483,7 +483,7 @@
BN_init(&u);
BN_init(&v);
BN_init(&tmp);
- BN_CTX_init(&bnctx);
+ BN_CTX_init(bnctx);
clnt_st = LOGIN_FAILED;
@@ -508,10 +508,10 @@
* u = rand(); 1 < u < p - 1
* B = (g exp b + v) % p = ((g exp b) % p + v) % p
*/
- _rand_bn(&b, &tmp, &bnctx);
- _rand_bn(&u, &tmp, &bnctx);
- if (!BN_mod_exp(&B, &g, &b, &p, &bnctx) ||
- !BN_add(&tmp, &B, &v) || !BN_mod(&B, &tmp, &p, &bnctx))
+ _rand_bn(&b, &tmp, bnctx);
+ _rand_bn(&u, &tmp, bnctx);
+ if (!BN_mod_exp(&B, &g, &b, &p, bnctx) ||
+ !BN_add(&tmp, &B, &v) || !BN_mod(&B, &tmp, &p, bnctx))
_fatal_bn("srvr_auth()");
/* Receive A, send B and u */
@@ -527,9 +527,9 @@
* K = HASH(S)
* M1 = HASH(A, B, K)
*/
- if (!BN_mod_exp(&S, &v, &u, &p, &bnctx) ||
- !BN_mod_mul(&tmp, &A, &S, &p, &bnctx) ||
- !BN_mod_exp(&S, &tmp, &b, &p, &bnctx))
+ if (!BN_mod_exp(&S, &v, &u, &p, bnctx) ||
+ !BN_mod_mul(&tmp, &A, &S, &p, bnctx) ||
+ !BN_mod_exp(&S, &tmp, &b, &p, bnctx))
_fatal_bn("srvr_auth()");
_hash_bn(K, &S, &buffer, &bufsiz);
_auth_digest1(M1, &A, &B, K, &buffer, &bufsiz);
@@ -581,7 +581,7 @@
BN_clear_free(&u);
BN_clear_free(&v);
BN_clear_free(&tmp);
- BN_CTX_free(&bnctx);
+ BN_CTX_free(bnctx);
free(buffer);
/* Init encryption */
@@ -624,7 +624,7 @@
M2[SHA1_DIGESTSIZE],
SERVER_M2[SHA1_DIGESTSIZE];
BIGNUM a, u, x, A, B, S, tmp1, tmp2, tmp3;
- BN_CTX bnctx;
+ BN_CTX *bnctx = BN_CTX_new();
SHA1_CTX sha1_ctx;
void *buffer;
size_t bufsiz;
@@ -643,7 +643,7 @@
BN_init(&tmp1);
BN_init(&tmp2);
BN_init(&tmp3);
- BN_CTX_init(&bnctx);
+ BN_CTX_init(bnctx);
srvr_st = clnt_st = LOGIN_FAILED;
@@ -681,7 +681,7 @@
SHA1Final(xdigest, &sha1_ctx);
bzero(args->pass, sizeof(args->pass));
if (BN_bin2bn(xdigest, sizeof(xdigest), &tmp1) == NULL ||
- !BN_mod(&x, &tmp1, &pm1, &bnctx))
+ !BN_mod(&x, &tmp1, &pm1, bnctx))
_fatal_bn("_auth_clnt()");
/*
@@ -689,8 +689,8 @@
* a = rand(); 1 < a < n - 1
* A = (g exp a) % n
*/
- _rand_bn(&a, &tmp1, &bnctx);
- if (!BN_mod_exp(&A, &g, &a, &p, &bnctx))
+ _rand_bn(&a, &tmp1, bnctx);
+ if (!BN_mod_exp(&A, &g, &a, &p, bnctx))
_fatal_bn("_auth_clnt()");
/* Send A, receive B and u */
@@ -704,14 +704,14 @@
* = ( (B - (g exp x) % n) exp
* ((a + ((u * x) % (n - 1))) % (n - 1)) ) % n
*/
- if (!BN_mod_mul(&tmp1, &u, &x, &pm1, &bnctx) ||
+ if (!BN_mod_mul(&tmp1, &u, &x, &pm1, bnctx) ||
!BN_add(&S, &tmp1, &a) ||
- !BN_mod(&tmp1, &S, &pm1, &bnctx) ||
- !BN_mod_exp(&tmp2, &g, &x, &p, &bnctx) ||
+ !BN_mod(&tmp1, &S, &pm1, bnctx) ||
+ !BN_mod_exp(&tmp2, &g, &x, &p, bnctx) ||
!BN_add(&tmp3, &B, &p) || /* Workaround for the BN_mod() bug */
!BN_sub(&S, &tmp3, &tmp2) ||
- !BN_mod(&tmp2, &S, &p, &bnctx) ||
- !BN_mod_exp(&S, &tmp2, &tmp1, &p, &bnctx))
+ !BN_mod(&tmp2, &S, &p, bnctx) ||
+ !BN_mod_exp(&S, &tmp2, &tmp1, &p, bnctx))
_fatal_bn("_auth_clnt()");
/*
@@ -749,7 +749,7 @@
BN_clear_free(&S);
BN_clear_free(&tmp1);
BN_clear_free(&tmp2);
- BN_CTX_free(&bnctx);
+ BN_CTX_free(bnctx);
free(buffer);
/* Init encryption */
@@ -776,7 +776,7 @@
_filter_resource(AUTHCON *ct, struct autharg_filter *args)
{
SHA1_CTX sha1_ctx;
- BN_CTX bnctx;
+ BN_CTX *bnctx = BN_CTX_new();
BIGNUM salt, verifier, x, tmp;
unsigned char bsalt[NBYTES], xdigest[SHA1_DIGESTSIZE];
@@ -789,7 +789,7 @@
/* Just filter srp passwords */
if (!strcmp(args->rname, SRP_PASS_RNAME)) {
- BN_CTX_init(&bnctx);
+ BN_CTX_init(bnctx);
BN_init(&salt);
BN_init(&x);
BN_init(&verifier);
@@ -801,15 +801,15 @@
* x = HASH(salt, password); 1 < x < n - 1
* verifier = (g exp x) % n
*/
- _rand_bn(&salt, &tmp, &bnctx);
+ _rand_bn(&salt, &tmp, bnctx);
BN_bn2bin(&salt, bsalt);
SHA1Init(&sha1_ctx);
SHA1Update(&sha1_ctx, bsalt, sizeof(bsalt));
SHA1Update(&sha1_ctx, args->value, args->vsize);
SHA1Final(xdigest, &sha1_ctx);
if (BN_bin2bn(xdigest, sizeof(xdigest), &tmp) == NULL ||
- !BN_mod(&x, &tmp, &pm1, &bnctx) ||
- !BN_mod_exp(&verifier, &g, &x, &p, &bnctx))
+ !BN_mod(&x, &tmp, &pm1, bnctx) ||
+ !BN_mod_exp(&verifier, &g, &x, &p, bnctx))
_fatal_bn("_filter_resource()");
/* Get memory for the filtered value */
@@ -829,7 +829,7 @@
BN_clear_free(&verifier);
BN_clear_free(&x);
BN_clear_free(&salt);
- BN_CTX_free(&bnctx);
+ BN_CTX_free(bnctx);
if (args->fvalue == NULL)
return (-1);

View File

@ -1,9 +0,0 @@
Audit is a client/server system that allows remote system logs auditing and
centralizing. It supports standard and modular syslog output formats
(non-standard logs can be easily supported due to its modular design). The
server (auditd) runs on audited machines and the client (audit) runs on the
auditors workstations. Multiple auditors are supported and managed by one or
more 'chief' auditors. Auditors can be configured in a way that each of them
can examine specific sets of logs.
WWW: http://www.corest.com/products/corewisdom/CW02.php

View File

@ -1,14 +0,0 @@
bin/audit
etc/auditd.conf.sample
lib/alat/libattr_classic.so.1
%%MYSQL%%lib/alat/libattr_mysql.so.1
lib/alat/libattr_peo.so.1
%%PGSQL%%lib/alat/libattr_pgsql.so.1
lib/alat/libattr_regex.so.1
lib/alat/libattr_tcp.so.1
lib/alat/libauth_raw.so.1
lib/alat/libauth_srp.so.1
lib/alat/libia_syslog.so.1
lib/alat/libres_local.so.1
sbin/auditd
@dirrmtry lib/alat