mirror of
https://git.FreeBSD.org/ports.git
synced 2025-02-04 11:23:46 +00:00
- Development has been discontinued.
PR: ports/148261 Submitted by: Anderson Eduardo <anderson@secover.com.br> (maintainer) Feature safe: yes
This commit is contained in:
parent
685a461c00
commit
90e1b77376
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=257279
1
MOVED
1
MOVED
@ -4446,3 +4446,4 @@ www/firefox3|www/firefox35|2010-06-23|Upstream support dropped
|
||||
www/firefox3-i18n|www/firefox35-i18n|2010-06-23|Upstream support dropped
|
||||
security/krb4||2010-06-26|security vulnerability and isn't more developed
|
||||
www/linux-mozilla|www/linux-seamonkey|2010-06-27|Security vulnerabilities and abandoned upstream since 2006
|
||||
security/audit||2010-07-01|development has been discontinued
|
||||
|
@ -24,7 +24,6 @@
|
||||
SUBDIR += apache-xml-security-c
|
||||
SUBDIR += apg
|
||||
SUBDIR += arirang
|
||||
SUBDIR += audit
|
||||
SUBDIR += authforce
|
||||
SUBDIR += autossh
|
||||
SUBDIR += avcheck
|
||||
|
@ -1,86 +0,0 @@
|
||||
# New ports collection makefile for: audit
|
||||
# Date created: 24 March 2002
|
||||
# Whom: anders
|
||||
#
|
||||
# $FreeBSD$
|
||||
#
|
||||
|
||||
PORTNAME= audit
|
||||
PORTVERSION= 1.0
|
||||
PORTREVISION= 3
|
||||
CATEGORIES= security
|
||||
MASTER_SITES= http://www1.corest.com/download/audit/ \
|
||||
ftp://ftp.stack.nl/pub/users/johans/audit/
|
||||
DISTNAME= ${PORTNAME}-v${PORTVERSION}beta-src
|
||||
|
||||
MAINTAINER= anderson@secover.com.br
|
||||
COMMENT= Tools for remote and centralized audit data collection
|
||||
|
||||
OPTIONS= MYSQL "With MySQL support" off \
|
||||
PGSQL "With PostGreSQL support" off
|
||||
|
||||
MAKE_ARGS= CFLAGS+="-fPIC -DPIC"
|
||||
|
||||
WRKSRC= ${WRKDIR}/${PORTNAME}-v${PORTVERSION}
|
||||
|
||||
USE_GMAKE= yes
|
||||
USE_LDCONFIG= ${PREFIX}/lib/alat
|
||||
|
||||
GNU_CONFIGURE= yes
|
||||
CONFIGURE_ARGS+= --with-audit-libdir=${PREFIX}/lib/alat
|
||||
MANCOMPRESSED= yes
|
||||
MAN1= audit.1
|
||||
MAN8= auditd.8
|
||||
|
||||
PORTDOCS= COPYING README TODO
|
||||
FIXPREFIX_CONF= src/include/audconf.h src/auditd/auditd.8
|
||||
LIBVERSION= 1
|
||||
|
||||
.include <bsd.port.pre.mk>
|
||||
|
||||
.if defined(WITH_MYSQL)
|
||||
USE_MYSQL= yes
|
||||
.endif
|
||||
.if defined(WITH_PGSQL)
|
||||
USE_PGSQL= yes
|
||||
.endif
|
||||
|
||||
.if defined(WITH_MYSQL)
|
||||
CONFIGURE_ARGS+= --with-mysql \
|
||||
--with-mysql-libdir=${LOCALBASE}/lib/mysql \
|
||||
--with-mysql-incdir=${LOCALBASE}/include
|
||||
PLIST_SUB+= MYSQL=''
|
||||
.else
|
||||
PLIST_SUB+= MYSQL='@comment '
|
||||
.endif
|
||||
.if defined(WITH_PGSQL)
|
||||
CONFIGURE_ARGS+= --with-pgsql \
|
||||
--with-pgsql-libdir=${LOCALBASE}/lib \
|
||||
--with-pgsql-incdir=${LOCALBASE}/include
|
||||
PLIST_SUB+= PGSQL=''
|
||||
.else
|
||||
PLIST_SUB+= PGSQL='@comment '
|
||||
.endif
|
||||
|
||||
post-patch:
|
||||
${REINPLACE_CMD} -e "s@Linux@FreeBSD@g" ${WRKSRC}/configure
|
||||
(${FIND} ${WRKSRC}/src/modules -name Makefile.in -exec \
|
||||
${REINPLACE_CMD} -e \
|
||||
"s!^LIB=\(.*\).{VERSION}!LIB=\1${LIBVERSION}!" {} \;)
|
||||
${REINPLACE_CMD} -e "s@AUDIT_VERSION@\"${LIBVERSION}\"@g" \
|
||||
${WRKSRC}/src/lib/modules.c
|
||||
.for f in ${FIXPREFIX_CONF}
|
||||
${REINPLACE_CMD} -e "s@/etc/auditd.conf@${PREFIX}/etc/auditd.conf@g" \
|
||||
${WRKSRC}/${f}
|
||||
.endfor
|
||||
|
||||
post-install:
|
||||
${INSTALL_DATA} ${WRKSRC}/auditd.conf ${PREFIX}/etc/auditd.conf.sample
|
||||
.if !defined(NOPORTDOCS)
|
||||
${INSTALL} -d -o root -g wheel -m 0755 ${DOCSDIR}
|
||||
.for f in ${PORTDOCS}
|
||||
${INSTALL_DATA} ${WRKSRC}/${f} ${DOCSDIR}
|
||||
.endfor
|
||||
.endif
|
||||
|
||||
.include <bsd.port.post.mk>
|
@ -1,3 +0,0 @@
|
||||
MD5 (audit-v1.0beta-src.tar.gz) = 31b707fb507e139c3c465d537613a100
|
||||
SHA256 (audit-v1.0beta-src.tar.gz) = 5c2370f625d6c42dc4a16c69b6422c6679c575a2dcbd9b4fc039c29cc0758b00
|
||||
SIZE (audit-v1.0beta-src.tar.gz) = 129337
|
@ -1,10 +0,0 @@
|
||||
--- src/lib/buffer.c.orig Sat Mar 30 22:39:49 2002
|
||||
+++ src/lib/buffer.c Sat Mar 30 22:40:08 2002
|
||||
@@ -35,6 +35,7 @@
|
||||
*/
|
||||
|
||||
#include <sys/types.h>
|
||||
+#include <arpa/inet.h>
|
||||
|
||||
#ifndef WIN32
|
||||
#include <sys/uio.h>
|
@ -1,10 +0,0 @@
|
||||
--- src/include/buffer.h.orig Sat Mar 30 22:41:58 2002
|
||||
+++ src/include/buffer.h Sat Mar 30 22:42:01 2002
|
||||
@@ -32,6 +32,7 @@
|
||||
#ifndef BUFFER_H
|
||||
#define BUFFER_H
|
||||
|
||||
+#include <arpa/inet.h>
|
||||
#include <openssl/evp.h>
|
||||
|
||||
typedef struct _buffer {
|
@ -1,13 +0,0 @@
|
||||
--- src/auditd/auditd.c.orig 2001-11-01 23:22:31.000000000 +0100
|
||||
+++ src/auditd/auditd.c 2007-10-17 09:41:34.000000000 +0200
|
||||
@@ -55,6 +55,10 @@
|
||||
#include <sysexits.h>
|
||||
#include <unistd.h>
|
||||
#include <openssl/evp.h>
|
||||
+#include <sys/param.h>
|
||||
+#if defined(__FreeBSD__) && (__FreeBSD_version >= 500035)
|
||||
+#include <limits.h>
|
||||
+#endif
|
||||
|
||||
#include "sysdep.h"
|
||||
#include "packet.h"
|
@ -1,13 +0,0 @@
|
||||
--- src/auditd/ia.c.orig 2001-10-10 02:30:11.000000000 +0200
|
||||
+++ src/auditd/ia.c 2007-10-17 09:41:34.000000000 +0200
|
||||
@@ -54,6 +54,10 @@
|
||||
#include <sysexits.h>
|
||||
#include <unistd.h>
|
||||
#include <openssl/evp.h>
|
||||
+#include <sys/param.h>
|
||||
+#if defined(__FreeBSD__) && (__FreeBSD_version >= 500035)
|
||||
+#include <limits.h>
|
||||
+#endif
|
||||
|
||||
#include "sysdep.h"
|
||||
#include "packet.h"
|
@ -1,12 +0,0 @@
|
||||
--- src/modules/attr/mysql/attr_mysql.c.orig Sun Nov 24 06:01:45 2002
|
||||
+++ src/modules/attr/mysql/attr_mysql.c Sun Nov 24 06:01:58 2002
|
||||
@@ -35,6 +35,9 @@
|
||||
*/
|
||||
|
||||
#include <sys/param.h>
|
||||
+#if defined(__FreeBSD__) && (__FreeBSD_version >= 500035)
|
||||
+#include <limits.h>
|
||||
+#endif
|
||||
|
||||
#ifdef __linux__
|
||||
#include <netinet/in.h>
|
@ -1,12 +0,0 @@
|
||||
--- src/modules/attr/pgsql/attr_pgsql.c.orig Sun Nov 24 06:02:19 2002
|
||||
+++ src/modules/attr/pgsql/attr_pgsql.c Sun Nov 24 06:02:28 2002
|
||||
@@ -35,6 +35,9 @@
|
||||
*/
|
||||
|
||||
#include <sys/param.h>
|
||||
+#if defined(__FreeBSD__) && (__FreeBSD_version >= 500035)
|
||||
+#include <limits.h>
|
||||
+#endif
|
||||
|
||||
#ifdef __linux__
|
||||
#include <netinet/in.h>
|
@ -1,10 +0,0 @@
|
||||
--- src/audit/audit.c.orig 2001-10-06 01:14:58.000000000 +0200
|
||||
+++ src/audit/audit.c 2007-10-17 09:41:34.000000000 +0200
|
||||
@@ -147,6 +147,7 @@
|
||||
case SIGABRT:
|
||||
fatal(-1, "");
|
||||
default:
|
||||
+ break;
|
||||
}
|
||||
errno = old_errno;
|
||||
}
|
@ -1,10 +0,0 @@
|
||||
--- src/auditd/audconf.c.orig Thu Nov 4 07:25:36 2004
|
||||
+++ src/auditd/audconf.c Thu Nov 4 07:25:45 2004
|
||||
@@ -295,6 +295,7 @@
|
||||
strlcpy(options->resmodule, value, sizeof(options->resmodule));
|
||||
return (0);
|
||||
default:
|
||||
+ break;
|
||||
}
|
||||
|
||||
errno = EINVAL;
|
@ -1,13 +0,0 @@
|
||||
--- src/include/sysdep.h.orig 2007-10-17 09:51:14.000000000 +0200
|
||||
+++ src/include/sysdep.h 2007-10-17 09:50:32.000000000 +0200
|
||||
@@ -96,10 +96,6 @@ size_t strlcat (char *, const char *, si
|
||||
#define _PASSWORD_LEN 128
|
||||
#endif
|
||||
|
||||
-#if defined(__FreeBSD__)
|
||||
-typedef int32_t in_addr_t;
|
||||
-#endif /* __FreeBSD__ */
|
||||
-
|
||||
int init_socket ();
|
||||
|
||||
#endif /* SYSDEP */
|
@ -1,44 +0,0 @@
|
||||
--- src/lib/packet.c.orig 2001-10-06 00:04:06.000000000 +0200
|
||||
+++ src/lib/packet.c 2007-10-17 09:44:32.000000000 +0200
|
||||
@@ -546,19 +546,19 @@
|
||||
packet_put_raw(PACKET *p, const void *_data, ssize_t size)
|
||||
{
|
||||
ssize_t written;
|
||||
- void *data;
|
||||
+ char *data;
|
||||
|
||||
if (p == NULL || _data == NULL || size <= 0)
|
||||
return;
|
||||
|
||||
- data = (void *) _data;
|
||||
+ data = (char *) _data;
|
||||
while (size) {
|
||||
written = buf_put_raw(p->pkt_wbuf, data, size);
|
||||
if (written < 0)
|
||||
fatal(EX_SOFTWARE, "Invalid internal packet structure. "
|
||||
"Connection aborted.");
|
||||
size -= written;
|
||||
- (char *) data += written;
|
||||
+ data += written;
|
||||
if (size)
|
||||
_packet_write(p);
|
||||
}
|
||||
@@ -607,14 +607,16 @@
|
||||
packet_get_raw(PACKET *p, void *data, ssize_t size)
|
||||
{
|
||||
ssize_t readed;
|
||||
+ char *cdata;
|
||||
|
||||
if (p == NULL || data == NULL || size <= 0)
|
||||
return;
|
||||
|
||||
+ cdata = (char *)data;
|
||||
while (size) {
|
||||
- readed = buf_get_raw(p->pkt_rbuf, data, size);
|
||||
+ readed = buf_get_raw(p->pkt_rbuf, cdata, size);
|
||||
size -= readed;
|
||||
- (char *) data += readed;
|
||||
+ cdata += readed;
|
||||
if (size)
|
||||
_packet_read(p);
|
||||
}
|
@ -1,196 +0,0 @@
|
||||
--- src/modules/auth/srp/auth_srp.c.orig 2001-12-12 21:35:02.000000000 +0100
|
||||
+++ src/modules/auth/srp/auth_srp.c 2007-10-17 09:48:57.000000000 +0200
|
||||
@@ -289,7 +289,7 @@
|
||||
_get_srppass(AUTHCON *ct, BIGNUM *v, BIGNUM *s, unsigned char *bs)
|
||||
{
|
||||
RESOURCE *r;
|
||||
- BN_CTX bnctx;
|
||||
+ BN_CTX *bnctx = BN_CTX_new();
|
||||
BIGNUM tmp;
|
||||
|
||||
if (ct->rlist != NULL) {
|
||||
@@ -308,12 +308,12 @@
|
||||
|
||||
/* Generate fake verifier and salt (try to avoid timing attack) */
|
||||
log_debug(AUTH_SRP "Generating fake verifier and salt.");
|
||||
- BN_CTX_init(&bnctx);
|
||||
+ BN_CTX_init(bnctx);
|
||||
BN_init(&tmp);
|
||||
- _rand_bn(v, &tmp, &bnctx);
|
||||
- _rand_bn(s, &tmp, &bnctx);
|
||||
+ _rand_bn(v, &tmp, bnctx);
|
||||
+ _rand_bn(s, &tmp, bnctx);
|
||||
BN_free(&tmp);
|
||||
- BN_CTX_free(&bnctx);
|
||||
+ BN_CTX_free(bnctx);
|
||||
BN_bn2bin(s, bs);
|
||||
return (-1);
|
||||
}
|
||||
@@ -460,7 +460,7 @@
|
||||
USER_M1[SHA1_DIGESTSIZE],
|
||||
bs[NBYTES];
|
||||
BIGNUM A, B, S, b, u, v, s, tmp;
|
||||
- BN_CTX bnctx;
|
||||
+ BN_CTX *bnctx = BN_CTX_new();
|
||||
void *buffer;
|
||||
size_t bufsiz;
|
||||
char hostname[MAXHOSTNAMELEN]; /* XXX: move to engine */
|
||||
@@ -483,7 +483,7 @@
|
||||
BN_init(&u);
|
||||
BN_init(&v);
|
||||
BN_init(&tmp);
|
||||
- BN_CTX_init(&bnctx);
|
||||
+ BN_CTX_init(bnctx);
|
||||
|
||||
clnt_st = LOGIN_FAILED;
|
||||
|
||||
@@ -508,10 +508,10 @@
|
||||
* u = rand(); 1 < u < p - 1
|
||||
* B = (g exp b + v) % p = ((g exp b) % p + v) % p
|
||||
*/
|
||||
- _rand_bn(&b, &tmp, &bnctx);
|
||||
- _rand_bn(&u, &tmp, &bnctx);
|
||||
- if (!BN_mod_exp(&B, &g, &b, &p, &bnctx) ||
|
||||
- !BN_add(&tmp, &B, &v) || !BN_mod(&B, &tmp, &p, &bnctx))
|
||||
+ _rand_bn(&b, &tmp, bnctx);
|
||||
+ _rand_bn(&u, &tmp, bnctx);
|
||||
+ if (!BN_mod_exp(&B, &g, &b, &p, bnctx) ||
|
||||
+ !BN_add(&tmp, &B, &v) || !BN_mod(&B, &tmp, &p, bnctx))
|
||||
_fatal_bn("srvr_auth()");
|
||||
|
||||
/* Receive A, send B and u */
|
||||
@@ -527,9 +527,9 @@
|
||||
* K = HASH(S)
|
||||
* M1 = HASH(A, B, K)
|
||||
*/
|
||||
- if (!BN_mod_exp(&S, &v, &u, &p, &bnctx) ||
|
||||
- !BN_mod_mul(&tmp, &A, &S, &p, &bnctx) ||
|
||||
- !BN_mod_exp(&S, &tmp, &b, &p, &bnctx))
|
||||
+ if (!BN_mod_exp(&S, &v, &u, &p, bnctx) ||
|
||||
+ !BN_mod_mul(&tmp, &A, &S, &p, bnctx) ||
|
||||
+ !BN_mod_exp(&S, &tmp, &b, &p, bnctx))
|
||||
_fatal_bn("srvr_auth()");
|
||||
_hash_bn(K, &S, &buffer, &bufsiz);
|
||||
_auth_digest1(M1, &A, &B, K, &buffer, &bufsiz);
|
||||
@@ -581,7 +581,7 @@
|
||||
BN_clear_free(&u);
|
||||
BN_clear_free(&v);
|
||||
BN_clear_free(&tmp);
|
||||
- BN_CTX_free(&bnctx);
|
||||
+ BN_CTX_free(bnctx);
|
||||
free(buffer);
|
||||
|
||||
/* Init encryption */
|
||||
@@ -624,7 +624,7 @@
|
||||
M2[SHA1_DIGESTSIZE],
|
||||
SERVER_M2[SHA1_DIGESTSIZE];
|
||||
BIGNUM a, u, x, A, B, S, tmp1, tmp2, tmp3;
|
||||
- BN_CTX bnctx;
|
||||
+ BN_CTX *bnctx = BN_CTX_new();
|
||||
SHA1_CTX sha1_ctx;
|
||||
void *buffer;
|
||||
size_t bufsiz;
|
||||
@@ -643,7 +643,7 @@
|
||||
BN_init(&tmp1);
|
||||
BN_init(&tmp2);
|
||||
BN_init(&tmp3);
|
||||
- BN_CTX_init(&bnctx);
|
||||
+ BN_CTX_init(bnctx);
|
||||
|
||||
srvr_st = clnt_st = LOGIN_FAILED;
|
||||
|
||||
@@ -681,7 +681,7 @@
|
||||
SHA1Final(xdigest, &sha1_ctx);
|
||||
bzero(args->pass, sizeof(args->pass));
|
||||
if (BN_bin2bn(xdigest, sizeof(xdigest), &tmp1) == NULL ||
|
||||
- !BN_mod(&x, &tmp1, &pm1, &bnctx))
|
||||
+ !BN_mod(&x, &tmp1, &pm1, bnctx))
|
||||
_fatal_bn("_auth_clnt()");
|
||||
|
||||
/*
|
||||
@@ -689,8 +689,8 @@
|
||||
* a = rand(); 1 < a < n - 1
|
||||
* A = (g exp a) % n
|
||||
*/
|
||||
- _rand_bn(&a, &tmp1, &bnctx);
|
||||
- if (!BN_mod_exp(&A, &g, &a, &p, &bnctx))
|
||||
+ _rand_bn(&a, &tmp1, bnctx);
|
||||
+ if (!BN_mod_exp(&A, &g, &a, &p, bnctx))
|
||||
_fatal_bn("_auth_clnt()");
|
||||
|
||||
/* Send A, receive B and u */
|
||||
@@ -704,14 +704,14 @@
|
||||
* = ( (B - (g exp x) % n) exp
|
||||
* ((a + ((u * x) % (n - 1))) % (n - 1)) ) % n
|
||||
*/
|
||||
- if (!BN_mod_mul(&tmp1, &u, &x, &pm1, &bnctx) ||
|
||||
+ if (!BN_mod_mul(&tmp1, &u, &x, &pm1, bnctx) ||
|
||||
!BN_add(&S, &tmp1, &a) ||
|
||||
- !BN_mod(&tmp1, &S, &pm1, &bnctx) ||
|
||||
- !BN_mod_exp(&tmp2, &g, &x, &p, &bnctx) ||
|
||||
+ !BN_mod(&tmp1, &S, &pm1, bnctx) ||
|
||||
+ !BN_mod_exp(&tmp2, &g, &x, &p, bnctx) ||
|
||||
!BN_add(&tmp3, &B, &p) || /* Workaround for the BN_mod() bug */
|
||||
!BN_sub(&S, &tmp3, &tmp2) ||
|
||||
- !BN_mod(&tmp2, &S, &p, &bnctx) ||
|
||||
- !BN_mod_exp(&S, &tmp2, &tmp1, &p, &bnctx))
|
||||
+ !BN_mod(&tmp2, &S, &p, bnctx) ||
|
||||
+ !BN_mod_exp(&S, &tmp2, &tmp1, &p, bnctx))
|
||||
_fatal_bn("_auth_clnt()");
|
||||
|
||||
/*
|
||||
@@ -749,7 +749,7 @@
|
||||
BN_clear_free(&S);
|
||||
BN_clear_free(&tmp1);
|
||||
BN_clear_free(&tmp2);
|
||||
- BN_CTX_free(&bnctx);
|
||||
+ BN_CTX_free(bnctx);
|
||||
free(buffer);
|
||||
|
||||
/* Init encryption */
|
||||
@@ -776,7 +776,7 @@
|
||||
_filter_resource(AUTHCON *ct, struct autharg_filter *args)
|
||||
{
|
||||
SHA1_CTX sha1_ctx;
|
||||
- BN_CTX bnctx;
|
||||
+ BN_CTX *bnctx = BN_CTX_new();
|
||||
BIGNUM salt, verifier, x, tmp;
|
||||
unsigned char bsalt[NBYTES], xdigest[SHA1_DIGESTSIZE];
|
||||
|
||||
@@ -789,7 +789,7 @@
|
||||
/* Just filter srp passwords */
|
||||
if (!strcmp(args->rname, SRP_PASS_RNAME)) {
|
||||
|
||||
- BN_CTX_init(&bnctx);
|
||||
+ BN_CTX_init(bnctx);
|
||||
BN_init(&salt);
|
||||
BN_init(&x);
|
||||
BN_init(&verifier);
|
||||
@@ -801,15 +801,15 @@
|
||||
* x = HASH(salt, password); 1 < x < n - 1
|
||||
* verifier = (g exp x) % n
|
||||
*/
|
||||
- _rand_bn(&salt, &tmp, &bnctx);
|
||||
+ _rand_bn(&salt, &tmp, bnctx);
|
||||
BN_bn2bin(&salt, bsalt);
|
||||
SHA1Init(&sha1_ctx);
|
||||
SHA1Update(&sha1_ctx, bsalt, sizeof(bsalt));
|
||||
SHA1Update(&sha1_ctx, args->value, args->vsize);
|
||||
SHA1Final(xdigest, &sha1_ctx);
|
||||
if (BN_bin2bn(xdigest, sizeof(xdigest), &tmp) == NULL ||
|
||||
- !BN_mod(&x, &tmp, &pm1, &bnctx) ||
|
||||
- !BN_mod_exp(&verifier, &g, &x, &p, &bnctx))
|
||||
+ !BN_mod(&x, &tmp, &pm1, bnctx) ||
|
||||
+ !BN_mod_exp(&verifier, &g, &x, &p, bnctx))
|
||||
_fatal_bn("_filter_resource()");
|
||||
|
||||
/* Get memory for the filtered value */
|
||||
@@ -829,7 +829,7 @@
|
||||
BN_clear_free(&verifier);
|
||||
BN_clear_free(&x);
|
||||
BN_clear_free(&salt);
|
||||
- BN_CTX_free(&bnctx);
|
||||
+ BN_CTX_free(bnctx);
|
||||
|
||||
if (args->fvalue == NULL)
|
||||
return (-1);
|
@ -1,9 +0,0 @@
|
||||
Audit is a client/server system that allows remote system logs auditing and
|
||||
centralizing. It supports standard and modular syslog output formats
|
||||
(non-standard logs can be easily supported due to its modular design). The
|
||||
server (auditd) runs on audited machines and the client (audit) runs on the
|
||||
auditors workstations. Multiple auditors are supported and managed by one or
|
||||
more 'chief' auditors. Auditors can be configured in a way that each of them
|
||||
can examine specific sets of logs.
|
||||
|
||||
WWW: http://www.corest.com/products/corewisdom/CW02.php
|
@ -1,14 +0,0 @@
|
||||
bin/audit
|
||||
etc/auditd.conf.sample
|
||||
lib/alat/libattr_classic.so.1
|
||||
%%MYSQL%%lib/alat/libattr_mysql.so.1
|
||||
lib/alat/libattr_peo.so.1
|
||||
%%PGSQL%%lib/alat/libattr_pgsql.so.1
|
||||
lib/alat/libattr_regex.so.1
|
||||
lib/alat/libattr_tcp.so.1
|
||||
lib/alat/libauth_raw.so.1
|
||||
lib/alat/libauth_srp.so.1
|
||||
lib/alat/libia_syslog.so.1
|
||||
lib/alat/libres_local.so.1
|
||||
sbin/auditd
|
||||
@dirrmtry lib/alat
|
Loading…
x
Reference in New Issue
Block a user