summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorRene Ladan <rene@FreeBSD.org>2017-01-15 09:48:22 +0000
committerRene Ladan <rene@FreeBSD.org>2017-01-15 09:48:22 +0000
commit74d31b8a6e52ab35c05047fd2c7758a2d216fede (patch)
treea07cbf63102e8f45905f8e2ab5b888ddbc6ef376 /security
parentMk/Uses/mysql.mk: Remove EoL-ed MySQL 5.1 (diff)
Remove expired ports:
2017-01-15 net/cyphesis: Does not compile on FreeBSD 10+ 2017-01-15 net/gpxe: does not build on FreeBSD 10.x and later 2017-01-15 net/openospfd: requires old CARP implementation (interface layer) 2017-01-15 security/openbsm-devel: is not needed under FreeBSD 10.x or higher 2017-01-15 security/ssh-copy-id: is already in the base system 2017-01-15 sysutils/apt: does not build on 10+ 2017-01-15 archivers/tclmkziplib: Abandonware, please use bundled zlib package [http://tcl.tk/man/tcl8.6/TclCmd/zlib.htm] 2017-01-15 x11-drivers/drm-kmod: this port is only for 9.3 systems 2017-01-15 audio/xmms-openspc: does not build on FreeBSD 10.x and later 2017-01-15 audio/aureal-kmod: does not build (and fetch) 2017-01-15 emulators/doscmd: does not build (accesses field of opaque structure)
Notes
Notes: svn path=/head/; revision=431540
Diffstat (limited to 'security')
-rw-r--r--security/Makefile2
-rw-r--r--security/openbsm-devel/Makefile53
-rw-r--r--security/openbsm-devel/distinfo2
-rw-r--r--security/openbsm-devel/files/auditdistd.in21
-rw-r--r--security/openbsm-devel/files/patch-bin__auditdistd__subr.c13
-rw-r--r--security/openbsm-devel/files/pkg-message.in74
-rw-r--r--security/openbsm-devel/pkg-descr10
-rw-r--r--security/openbsm-devel/pkg-plist179
-rw-r--r--security/ssh-copy-id/Makefile32
-rw-r--r--security/ssh-copy-id/files/ssh-copy-id54
-rw-r--r--security/ssh-copy-id/files/ssh-copy-id.175
-rw-r--r--security/ssh-copy-id/pkg-descr4
12 files changed, 0 insertions, 519 deletions
diff --git a/security/Makefile b/security/Makefile
index 54f16747f974..d02940e2f227 100644
--- a/security/Makefile
+++ b/security/Makefile
@@ -403,7 +403,6 @@
SUBDIR += oinkmaster
SUBDIR += op
SUBDIR += openbsm
- SUBDIR += openbsm-devel
SUBDIR += openca-tools-forked
SUBDIR += opencdk
SUBDIR += openconnect
@@ -1103,7 +1102,6 @@
SUBDIR += sqlninja
SUBDIR += srm
SUBDIR += ssdeep
- SUBDIR += ssh-copy-id
SUBDIR += ssh-multiadd
SUBDIR += ssh_askpass_gtk2
SUBDIR += sshblock
diff --git a/security/openbsm-devel/Makefile b/security/openbsm-devel/Makefile
deleted file mode 100644
index 766676fa8fda..000000000000
--- a/security/openbsm-devel/Makefile
+++ /dev/null
@@ -1,53 +0,0 @@
-# Created by: Ryan Steinmetz <zi@FreeBSD.org>
-# $FreeBSD$
-
-PORTNAME= openbsm
-DISTVERSION= 1.2-alpha4
-CATEGORIES= security
-MASTER_SITES= http://www.trustedbsd.org/downloads/ \
- http://mirrors.rit.edu/zi/
-PKGNAMESUFFIX= -devel
-
-MAINTAINER= zi@FreeBSD.org
-COMMENT= Open Source Basic Security Module (BSM) Audit Implementation
-
-LICENSE= BSD2CLAUSE
-LICENSE_FILE= ${WRKSRC}/LICENSE
-
-IGNORE= is not needed under FreeBSD 10.x or higher
-DEPRECATED= ${IGNORE}
-EXPIRATION_DATE= 2017-01-15
-
-CONFLICTS= openbsm-1.[0-9]*
-
-GNU_CONFIGURE= yes
-USES= libtool tar:tgz
-USE_LDCONFIG= yes
-
-USE_RC_SUBR= auditdistd
-SUB_FILES= pkg-message
-PLIST_SUB= USERS=${USERS} GROUPS=${GROUPS} NEEDVARDIRS=${NEEDVARDIRS}
-
-USERS= auditdistd
-GROUPS= audit
-
-VARAUDIT= /var/audit
-
-.include <bsd.port.pre.mk>
-
-.if ${OSVERSION} < 902000
-NEEDVARDIRS= ""
-.else
-NEEDVARDIRS= "@comment "
-.endif
-
-post-install:
- @${STRIP_CMD} ${STAGEDIR}${PREFIX}/lib/libauditd.so.0.0.0
- @${STRIP_CMD} ${STAGEDIR}${PREFIX}/lib/libbsm.so.0.0.0
- @${STRIP_CMD} ${STAGEDIR}${PREFIX}/lib/auditfilter_noop.so.0.0.0
-.if ${OSVERSION} < 902000
- @${MKDIR} -m 0770 \
- ${STAGEDIR}${VARAUDIT}/dist ${STAGEDIR}${VARAUDIT}/remote
-.endif
-
-.include <bsd.port.post.mk>
diff --git a/security/openbsm-devel/distinfo b/security/openbsm-devel/distinfo
deleted file mode 100644
index e3213bba772f..000000000000
--- a/security/openbsm-devel/distinfo
+++ /dev/null
@@ -1,2 +0,0 @@
-SHA256 (openbsm-1.2-alpha4.tgz) = 35b0370d19a742a387f10aaae187a38abee536d8a7b57c0e9d997d3ceaf02429
-SIZE (openbsm-1.2-alpha4.tgz) = 699451
diff --git a/security/openbsm-devel/files/auditdistd.in b/security/openbsm-devel/files/auditdistd.in
deleted file mode 100644
index c8c56f7a6114..000000000000
--- a/security/openbsm-devel/files/auditdistd.in
+++ /dev/null
@@ -1,21 +0,0 @@
-#!/bin/sh
-#
-# $FreeBSD$
-#
-
-# PROVIDE: auditdistd
-# REQUIRE: auditd
-# BEFORE: DAEMON
-# KEYWORD: nojail shutdown
-
-. /etc/rc.subr
-
-name="auditdistd"
-rcvar="${name}_enable"
-pidfile="/var/run/${name}.pid"
-command="%%PREFIX%%/sbin/${name}"
-required_files="/etc/security/${name}.conf"
-extra_commands="reload"
-
-load_rc_config $name
-run_rc_command "$1"
diff --git a/security/openbsm-devel/files/patch-bin__auditdistd__subr.c b/security/openbsm-devel/files/patch-bin__auditdistd__subr.c
deleted file mode 100644
index cee5f9cd3865..000000000000
--- a/security/openbsm-devel/files/patch-bin__auditdistd__subr.c
+++ /dev/null
@@ -1,13 +0,0 @@
---- ./bin/auditdistd/subr.c.orig 2014-08-25 09:03:45.000000000 -0400
-+++ ./bin/auditdistd/subr.c 2014-08-25 09:05:35.000000000 -0400
-@@ -228,6 +228,10 @@
- PJDLOG_ASSERT(fd != -1);
-
- #ifdef HAVE_KQUEUE
-+ if (wait_for_file_kq != -1) {
-+ close(wait_for_file_kq);
-+ wait_for_file_kq = -1;
-+ }
- kq = kqueue();
- if (kq == -1) {
- pjdlog_errno(LOG_WARNING, "kqueue() failed");
diff --git a/security/openbsm-devel/files/pkg-message.in b/security/openbsm-devel/files/pkg-message.in
deleted file mode 100644
index 39cd289f9ccd..000000000000
--- a/security/openbsm-devel/files/pkg-message.in
+++ /dev/null
@@ -1,74 +0,0 @@
-===============================================================================
-
-Additional configuration is required if you wish to use auditdistd:
-
-On the receiver, perform the following:
-
-1. Generate a certificate:
-# openssl req -x509 -nodes -newkey rsa:4096 -days 1825 -batch \
- -out /etc/security/auditdistd.cert.pem \
- -keyout /etc/security/auditdistd.key.pem
-# chmod 0600 /etc/security/auditdistd.key.pem /etc/security/auditdistd.cert.pem
-# chown root:wheel /etc/security/auditdistd.key.pem /etc/security/auditdistd.cert.pem
-
-2. Print out the public key's fingerprint:
-# openssl x509 -in /etc/security/auditdistd.cert.pem -noout -fingerprint -sha256 | \
- awk -F '[ =]' '{printf("%s=%s\n", $1, $3)}'
-SHA256=8F:0A:FC:8A:3D:09:80:AF:D9:AA:38:CC:8A:86:53:E6:8F:B6:1C:55:30...
-
-3. Generate a password used to authenticate both hosts against eachother:
-# dd if=/dev/urandom bs=32 count=1 | openssl base64 | cut -b -32
-YjwbK69H5cEBlhcT+eJpJgJTFn5B2SrG
-
-4. Create /etc/security/auditdistd.conf configuration file:
-receiver {
- host "<enter hostname of sender here> {
- remote "tls://<enter IP of sender here>"
- password "<enter password generated above here>"
- }
-}
-
-5. Update permissions on the auditdistd configuration file and create directory:
-# chmod 600 /etc/security/auditdistd.conf
-# chown root:wheel /etc/security/auditdistd.conf
-# mkdir -m 700 /var/audit/remote ; chown auditdistd:wheel /var/audit/remote
-
-6. Add the following to /etc/rc.conf:
-auditdistd_enable="YES"
-
-7. Start auditdistd:
-service auditdistd start
-
-===============================================================================
-
-On the sender, perform the following:
-
-1. Ensure your kernel is compiled with:
-options AUDIT
-
-2. Add the following to /etc/rc.conf:
-auditd_enable="YES"
-auditd_program="%%PREFIX%%/sbin/auditd"
-auditdistd_enable="YES"
-
-3. Add the following to /etc/security/audit_control:
-dist:on
-
-4. Create /etc/security/auditdistd.conf configuration file:
-sender {
- host "<enter hostname of receiver here>" {
- remote "tls://<enter IP of the receiver here>"
- fingerprint "SHA256=8F:0A:FC:8A:3D:09:80:AF:D9:AA:38:CC:8A:86:..."
- password "<enter password generated above here>"
- }
-}
-
-5. Create the required directories:
-# mkdir -m 0770 /var/audit/dist ; chown auditdistd:audit /var/audit/dist
-
-6. Start the required daemons:
-service auditd start && service auditdistd start
-
-Additional information regarding auditdistd may be found on the OpenBSM wiki:
-https://wiki.freebsd.org/auditdistd
-===============================================================================
diff --git a/security/openbsm-devel/pkg-descr b/security/openbsm-devel/pkg-descr
deleted file mode 100644
index a915207564c7..000000000000
--- a/security/openbsm-devel/pkg-descr
+++ /dev/null
@@ -1,10 +0,0 @@
-OpenBSM is an open source implementation of Sun's Basic Security Module (BSM)
-Audit API and file format. BSM, the de facto industry standard for Audit,
-describes a set of system call and library interfaces for managing audit
-records, as well as a token stream file format that permits extensible and
-generalized audit trail processing. OpenBSM extends the BSM API and file
-format in a number of ways to support features present in the Mac OS X and
-FreeBSD operating systems, such as Mach task interfaces, sendfile(), and
-Linux system calls present in the FreeBSD Linux emulation layer.
-
-WWW: http://www.trustedbsd.org/openbsm.html
diff --git a/security/openbsm-devel/pkg-plist b/security/openbsm-devel/pkg-plist
deleted file mode 100644
index e42e6c705314..000000000000
--- a/security/openbsm-devel/pkg-plist
+++ /dev/null
@@ -1,179 +0,0 @@
-include/bsm/audit.h
-include/bsm/audit_domain.h
-include/bsm/audit_errno.h
-include/bsm/audit_fcntl.h
-include/bsm/audit_filter.h
-include/bsm/audit_internal.h
-include/bsm/audit_kevents.h
-include/bsm/audit_record.h
-include/bsm/audit_socket_type.h
-include/bsm/audit_uevents.h
-include/bsm/auditd_lib.h
-include/bsm/libbsm.h
-lib/auditfilter_noop.a
-lib/auditfilter_noop.so
-lib/auditfilter_noop.so.0
-lib/auditfilter_noop.so.0.0.0
-lib/libauditd.a
-lib/libauditd.so
-lib/libauditd.so.0
-lib/libauditd.so.0.0.0
-lib/libbsm.a
-lib/libbsm.so
-lib/libbsm.so.0
-lib/libbsm.so.0.0.0
-man/ac_strtopol.3.gz
-man/au_bsm_to_domain.3.gz
-man/au_bsm_to_errno.3.gz
-man/au_bsm_to_fcntl_cmd.3.gz
-man/au_bsm_to_socket_type.3.gz
-man/au_close.3.gz
-man/au_close_buffer.3.gz
-man/au_close_token.3.gz
-man/au_domain_to_bsm.3.gz
-man/au_errno_to_bsm.3.gz
-man/au_fcntl_cmd_to_bsm.3.gz
-man/au_fetch_tok.3.gz
-man/au_get_state.3.gz
-man/au_notify_initialize.3.gz
-man/au_notify_terminate.3.gz
-man/au_open.3.gz
-man/au_poltostr.3.gz
-man/au_preselect.3.gz
-man/au_print_flags_tok.3.gz
-man/au_print_tok.3.gz
-man/au_read_rec.3.gz
-man/au_socket_type_to_bsm.3.gz
-man/au_strerror.3.gz
-man/au_to_arg.3.gz
-man/au_to_arg32.3.gz
-man/au_to_arg64.3.gz
-man/au_to_attr64.3.gz
-man/au_to_data.3.gz
-man/au_to_exec_args.3.gz
-man/au_to_exec_env.3.gz
-man/au_to_exit.3.gz
-man/au_to_file.3.gz
-man/au_to_groups.3.gz
-man/au_to_header.3.gz
-man/au_to_header32.3.gz
-man/au_to_header32_ex.3.gz
-man/au_to_header64.3.gz
-man/au_to_header_ex.3.gz
-man/au_to_in_addr.3.gz
-man/au_to_in_addr_ex.3.gz
-man/au_to_ip.3.gz
-man/au_to_ipc.3.gz
-man/au_to_ipc_perm.3.gz
-man/au_to_iport.3.gz
-man/au_to_me.3.gz
-man/au_to_newgroups.3.gz
-man/au_to_opaque.3.gz
-man/au_to_path.3.gz
-man/au_to_process.3.gz
-man/au_to_process32.3.gz
-man/au_to_process32_ex.3.gz
-man/au_to_process64.3.gz
-man/au_to_process64_ex.3.gz
-man/au_to_process_ex.3.gz
-man/au_to_return.3.gz
-man/au_to_return32.3.gz
-man/au_to_return64.3.gz
-man/au_to_seq.3.gz
-man/au_to_sock_inet.3.gz
-man/au_to_sock_inet128.3.gz
-man/au_to_sock_inet32.3.gz
-man/au_to_socket_ex.3.gz
-man/au_to_subject.3.gz
-man/au_to_subject32.3.gz
-man/au_to_subject32_ex.3.gz
-man/au_to_subject64.3.gz
-man/au_to_subject64_ex.3.gz
-man/au_to_subject_ex.3.gz
-man/au_to_text.3.gz
-man/au_to_trailer.3.gz
-man/au_to_zonename.3.gz
-man/au_user_mask.3.gz
-man/au_write.3.gz
-man/endac.3.gz
-man/endauclass.3.gz
-man/endauevent.3.gz
-man/endauuser.3.gz
-man/getacdir.3.gz
-man/getacdist.3.gz
-man/getacexpire.3.gz
-man/getacfilesz.3.gz
-man/getacflg.3.gz
-man/getachost.3.gz
-man/getacmin.3.gz
-man/getacna.3.gz
-man/getacpol.3.gz
-man/getauclassent.3.gz
-man/getauclassent_r.3.gz
-man/getauclassnam.3.gz
-man/getauclassnam_r.3.gz
-man/getaudit_addr.2.gz
-man/getauditflagsbin.3.gz
-man/getauditflagschar.3.gz
-man/getauevent.3.gz
-man/getauevent_r.3.gz
-man/getauevnam.3.gz
-man/getauevnam_r.3.gz
-man/getauevnonam.3.gz
-man/getauevnonam_r.3.gz
-man/getauevnum.3.gz
-man/getauevnum_r.3.gz
-man/getauuserent.3.gz
-man/getauuserent_r.3.gz
-man/getauusernam.3.gz
-man/getauusernam_r.3.gz
-man/getfauditflags.3.gz
-man/man1/auditreduce.1.gz
-man/man1/praudit.1.gz
-man/man2/audit.2.gz
-man/man2/auditctl.2.gz
-man/man2/auditon.2.gz
-man/man2/getaudit.2.gz
-man/man2/getauid.2.gz
-man/man2/setaudit.2.gz
-man/man2/setauid.2.gz
-man/man3/au_class.3.gz
-man/man3/au_control.3.gz
-man/man3/au_domain.3.gz
-man/man3/au_errno.3.gz
-man/man3/au_event.3.gz
-man/man3/au_fcntl_cmd.3.gz
-man/man3/au_free_token.3.gz
-man/man3/au_io.3.gz
-man/man3/au_mask.3.gz
-man/man3/au_notify.3.gz
-man/man3/au_open.3.gz
-man/man3/au_socket_type.3.gz
-man/man3/au_token.3.gz
-man/man3/au_user.3.gz
-man/man3/libauditd.3.gz
-man/man3/libbsm.3.gz
-man/man5/audit.log.5.gz
-man/man5/audit_class.5.gz
-man/man5/audit_control.5.gz
-man/man5/audit_event.5.gz
-man/man5/audit_user.5.gz
-man/man5/audit_warn.5.gz
-man/man5/auditdistd.conf.5.gz
-man/man8/audit.8.gz
-man/man8/auditd.8.gz
-man/man8/auditdistd.8.gz
-man/man8/auditfilterd.8.gz
-man/setac.3.gz
-man/setauclass.3.gz
-man/setaudit_addr.2.gz
-man/setauevent.3.gz
-man/setauuser.3.gz
-sbin/audit
-sbin/auditd
-sbin/auditdistd
-sbin/auditfilterd
-sbin/auditreduce
-sbin/praudit
-%%NEEDVARDIRS%%@dir(%%USERS%%,%%GROUPS%%,770) /var/audit/dist
-%%NEEDVARDIRS%%@dir(%%USERS%%,%%GROUPS%%,700) /var/audit/remote
diff --git a/security/ssh-copy-id/Makefile b/security/ssh-copy-id/Makefile
deleted file mode 100644
index ddbc4db2e728..000000000000
--- a/security/ssh-copy-id/Makefile
+++ /dev/null
@@ -1,32 +0,0 @@
-# Created by: Emanuel Haupt <ehaupt@FreeBSD.org>
-# $FreeBSD$
-
-PORTNAME= ssh-copy-id
-PORTVERSION= 5.6p1
-CATEGORIES= security
-MASTER_SITES= # none
-DISTFILES= # none
-
-MAINTAINER= ehaupt@FreeBSD.org
-COMMENT= Small script which copies your ssh public-key to a remote host
-
-IGNORE= is already in the base system
-DEPRECATED= ${IGNORE}
-EXPIRATION_DATE= 2017-01-15
-
-NO_BUILD= yes
-
-PLIST_FILES= bin/ssh-copy-id man/man1/ssh-copy-id.1.gz
-
-.include <bsd.port.pre.mk>
-
-pre-patch:
-.for f in ssh-copy-id ssh-copy-id.1
- @${CP} ${FILESDIR}/${f} ${WRKDIR}
-.endfor
-
-do-install:
- ${INSTALL_SCRIPT} ${WRKDIR}/${PORTNAME} ${STAGEDIR}${PREFIX}/bin
- ${INSTALL_MAN} ${WRKDIR}/${PORTNAME}.1 ${STAGEDIR}${MANPREFIX}/man/man1
-
-.include <bsd.port.post.mk>
diff --git a/security/ssh-copy-id/files/ssh-copy-id b/security/ssh-copy-id/files/ssh-copy-id
deleted file mode 100644
index 368645cb4fc7..000000000000
--- a/security/ssh-copy-id/files/ssh-copy-id
+++ /dev/null
@@ -1,54 +0,0 @@
-#!/bin/sh
-
-# Shell script to install your public key on a remote machine
-# Takes the remote machine name as an argument.
-# Obviously, the remote machine must accept password authentication,
-# or one of the other keys in your ssh-agent, for this to work.
-
-ID_FILE="${HOME}/.ssh/id_rsa.pub"
-
-if [ "-i" = "$1" ]; then
- shift
- # check if we have 2 parameters left, if so the first is the new ID file
- if [ -n "$2" ]; then
- if expr "$1" : ".*\.pub" > /dev/null ; then
- ID_FILE="$1"
- else
- ID_FILE="$1.pub"
- fi
- shift # and this should leave $1 as the target name
- fi
-else
- if [ x$SSH_AUTH_SOCK != x ] && ssh-add -L >/dev/null 2>&1; then
- GET_ID="$GET_ID ssh-add -L"
- fi
-fi
-
-if [ -z "`eval $GET_ID`" ] && [ -r "${ID_FILE}" ] ; then
- GET_ID="cat ${ID_FILE}"
-fi
-
-if [ -z "`eval $GET_ID`" ]; then
- echo "$0: ERROR: No identities found" >&2
- exit 1
-fi
-
-if [ "$#" -lt 1 ] || [ "$1" = "-h" ] || [ "$1" = "--help" ]; then
- echo "Usage: $0 [-i [identity_file]] [user@]machine" >&2
- exit 1
-fi
-
-# strip any trailing colon
-host=`echo $1 | sed 's/:$//'`
-
-{ eval "$GET_ID" ; } | ssh $host "umask 077; test -d ~/.ssh || mkdir ~/.ssh ; cat >> ~/.ssh/authorized_keys" || exit 1
-
-cat <<EOF
-Now try logging into the machine, with "ssh '$host'", and check in:
-
- ~/.ssh/authorized_keys
-
-to make sure we haven't added extra keys that you weren't expecting.
-
-EOF
-
diff --git a/security/ssh-copy-id/files/ssh-copy-id.1 b/security/ssh-copy-id/files/ssh-copy-id.1
deleted file mode 100644
index cb15ab24dbc4..000000000000
--- a/security/ssh-copy-id/files/ssh-copy-id.1
+++ /dev/null
@@ -1,75 +0,0 @@
-.ig \" -*- nroff -*-
-Copyright (c) 1999 Philip Hands Computing <http://www.hands.com/>
-
-Permission is granted to make and distribute verbatim copies of
-this manual provided the copyright notice and this permission notice
-are preserved on all copies.
-
-Permission is granted to copy and distribute modified versions of this
-manual under the conditions for verbatim copying, provided that the
-entire resulting derived work is distributed under the terms of a
-permission notice identical to this one.
-
-Permission is granted to copy and distribute translations of this
-manual into another language, under the above conditions for modified
-versions, except that this permission notice may be included in
-translations approved by the Free Software Foundation instead of in
-the original English.
-..
-.TH SSH-COPY-ID 1 "14 November 1999" "OpenSSH"
-.SH NAME
-ssh-copy-id \- install your public key in a remote machine's authorized_keys
-.SH SYNOPSIS
-.B ssh-copy-id [-i [identity_file]]
-.I "[user@]machine"
-.br
-.SH DESCRIPTION
-.BR ssh-copy-id
-is a script that uses ssh to log into a remote machine and
-append the indicated identity file to that machine's
-.B ~/.ssh/authorized_keys
-file.
-.PP
-If the
-.B -i
-option is given then the identity file (defaults to
-.BR ~/.ssh/id_rsa.pub )
-is used, regardless of whether there are any keys in your
-.BR ssh-agent .
-Otherwise, if this:
-.PP
-.B " ssh-add -L"
-.PP
-provides any output, it uses that in preference to the identity file.
-.PP
-If the
-.B -i
-option is used, or the
-.B ssh-add
-produced no output, then it uses the contents of the identity
-file. Once it has one or more fingerprints (by whatever means) it
-uses ssh to append them to
-.B ~/.ssh/authorized_keys
-on the remote machine (creating the file, and directory, if necessary.)
-
-.SH NOTES
-This program does not modify the permissions of any
-pre-existing files or directories. Therefore, if the remote
-.B sshd
-has
-.B StrictModes
-set in its
-configuration, then the user's home,
-.B ~/.ssh
-folder, and
-.B ~/.ssh/authorized_keys
-file may need to have group writability disabled manually, e.g. via
-
-.B " chmod go-w ~ ~/.ssh ~/.ssh/authorized_keys"
-
-on the remote machine.
-
-.SH "SEE ALSO"
-.BR ssh (1),
-.BR ssh-agent (1),
-.BR sshd (8)
diff --git a/security/ssh-copy-id/pkg-descr b/security/ssh-copy-id/pkg-descr
deleted file mode 100644
index ba4e65b56682..000000000000
--- a/security/ssh-copy-id/pkg-descr
+++ /dev/null
@@ -1,4 +0,0 @@
-ssh-copy-id is a small script which copies your ssh public-key to a remote host;
-appending it to your remote authorized_keys.
-
-WWW: http://www.openssh.com/portable.html