diff options
author | Rene Ladan <rene@FreeBSD.org> | 2017-01-15 09:48:22 +0000 |
---|---|---|
committer | Rene Ladan <rene@FreeBSD.org> | 2017-01-15 09:48:22 +0000 |
commit | 74d31b8a6e52ab35c05047fd2c7758a2d216fede (patch) | |
tree | a07cbf63102e8f45905f8e2ab5b888ddbc6ef376 /security | |
parent | Mk/Uses/mysql.mk: Remove EoL-ed MySQL 5.1 (diff) |
Remove expired ports:
2017-01-15 net/cyphesis: Does not compile on FreeBSD 10+
2017-01-15 net/gpxe: does not build on FreeBSD 10.x and later
2017-01-15 net/openospfd: requires old CARP implementation (interface layer)
2017-01-15 security/openbsm-devel: is not needed under FreeBSD 10.x or higher
2017-01-15 security/ssh-copy-id: is already in the base system
2017-01-15 sysutils/apt: does not build on 10+
2017-01-15 archivers/tclmkziplib: Abandonware, please use bundled zlib package [http://tcl.tk/man/tcl8.6/TclCmd/zlib.htm]
2017-01-15 x11-drivers/drm-kmod: this port is only for 9.3 systems
2017-01-15 audio/xmms-openspc: does not build on FreeBSD 10.x and later
2017-01-15 audio/aureal-kmod: does not build (and fetch)
2017-01-15 emulators/doscmd: does not build (accesses field of opaque structure)
Notes
Notes:
svn path=/head/; revision=431540
Diffstat (limited to 'security')
-rw-r--r-- | security/Makefile | 2 | ||||
-rw-r--r-- | security/openbsm-devel/Makefile | 53 | ||||
-rw-r--r-- | security/openbsm-devel/distinfo | 2 | ||||
-rw-r--r-- | security/openbsm-devel/files/auditdistd.in | 21 | ||||
-rw-r--r-- | security/openbsm-devel/files/patch-bin__auditdistd__subr.c | 13 | ||||
-rw-r--r-- | security/openbsm-devel/files/pkg-message.in | 74 | ||||
-rw-r--r-- | security/openbsm-devel/pkg-descr | 10 | ||||
-rw-r--r-- | security/openbsm-devel/pkg-plist | 179 | ||||
-rw-r--r-- | security/ssh-copy-id/Makefile | 32 | ||||
-rw-r--r-- | security/ssh-copy-id/files/ssh-copy-id | 54 | ||||
-rw-r--r-- | security/ssh-copy-id/files/ssh-copy-id.1 | 75 | ||||
-rw-r--r-- | security/ssh-copy-id/pkg-descr | 4 |
12 files changed, 0 insertions, 519 deletions
diff --git a/security/Makefile b/security/Makefile index 54f16747f974..d02940e2f227 100644 --- a/security/Makefile +++ b/security/Makefile @@ -403,7 +403,6 @@ SUBDIR += oinkmaster SUBDIR += op SUBDIR += openbsm - SUBDIR += openbsm-devel SUBDIR += openca-tools-forked SUBDIR += opencdk SUBDIR += openconnect @@ -1103,7 +1102,6 @@ SUBDIR += sqlninja SUBDIR += srm SUBDIR += ssdeep - SUBDIR += ssh-copy-id SUBDIR += ssh-multiadd SUBDIR += ssh_askpass_gtk2 SUBDIR += sshblock diff --git a/security/openbsm-devel/Makefile b/security/openbsm-devel/Makefile deleted file mode 100644 index 766676fa8fda..000000000000 --- a/security/openbsm-devel/Makefile +++ /dev/null @@ -1,53 +0,0 @@ -# Created by: Ryan Steinmetz <zi@FreeBSD.org> -# $FreeBSD$ - -PORTNAME= openbsm -DISTVERSION= 1.2-alpha4 -CATEGORIES= security -MASTER_SITES= http://www.trustedbsd.org/downloads/ \ - http://mirrors.rit.edu/zi/ -PKGNAMESUFFIX= -devel - -MAINTAINER= zi@FreeBSD.org -COMMENT= Open Source Basic Security Module (BSM) Audit Implementation - -LICENSE= BSD2CLAUSE -LICENSE_FILE= ${WRKSRC}/LICENSE - -IGNORE= is not needed under FreeBSD 10.x or higher -DEPRECATED= ${IGNORE} -EXPIRATION_DATE= 2017-01-15 - -CONFLICTS= openbsm-1.[0-9]* - -GNU_CONFIGURE= yes -USES= libtool tar:tgz -USE_LDCONFIG= yes - -USE_RC_SUBR= auditdistd -SUB_FILES= pkg-message -PLIST_SUB= USERS=${USERS} GROUPS=${GROUPS} NEEDVARDIRS=${NEEDVARDIRS} - -USERS= auditdistd -GROUPS= audit - -VARAUDIT= /var/audit - -.include <bsd.port.pre.mk> - -.if ${OSVERSION} < 902000 -NEEDVARDIRS= "" -.else -NEEDVARDIRS= "@comment " -.endif - -post-install: - @${STRIP_CMD} ${STAGEDIR}${PREFIX}/lib/libauditd.so.0.0.0 - @${STRIP_CMD} ${STAGEDIR}${PREFIX}/lib/libbsm.so.0.0.0 - @${STRIP_CMD} ${STAGEDIR}${PREFIX}/lib/auditfilter_noop.so.0.0.0 -.if ${OSVERSION} < 902000 - @${MKDIR} -m 0770 \ - ${STAGEDIR}${VARAUDIT}/dist ${STAGEDIR}${VARAUDIT}/remote -.endif - -.include <bsd.port.post.mk> diff --git a/security/openbsm-devel/distinfo b/security/openbsm-devel/distinfo deleted file mode 100644 index e3213bba772f..000000000000 --- a/security/openbsm-devel/distinfo +++ /dev/null @@ -1,2 +0,0 @@ -SHA256 (openbsm-1.2-alpha4.tgz) = 35b0370d19a742a387f10aaae187a38abee536d8a7b57c0e9d997d3ceaf02429 -SIZE (openbsm-1.2-alpha4.tgz) = 699451 diff --git a/security/openbsm-devel/files/auditdistd.in b/security/openbsm-devel/files/auditdistd.in deleted file mode 100644 index c8c56f7a6114..000000000000 --- a/security/openbsm-devel/files/auditdistd.in +++ /dev/null @@ -1,21 +0,0 @@ -#!/bin/sh -# -# $FreeBSD$ -# - -# PROVIDE: auditdistd -# REQUIRE: auditd -# BEFORE: DAEMON -# KEYWORD: nojail shutdown - -. /etc/rc.subr - -name="auditdistd" -rcvar="${name}_enable" -pidfile="/var/run/${name}.pid" -command="%%PREFIX%%/sbin/${name}" -required_files="/etc/security/${name}.conf" -extra_commands="reload" - -load_rc_config $name -run_rc_command "$1" diff --git a/security/openbsm-devel/files/patch-bin__auditdistd__subr.c b/security/openbsm-devel/files/patch-bin__auditdistd__subr.c deleted file mode 100644 index cee5f9cd3865..000000000000 --- a/security/openbsm-devel/files/patch-bin__auditdistd__subr.c +++ /dev/null @@ -1,13 +0,0 @@ ---- ./bin/auditdistd/subr.c.orig 2014-08-25 09:03:45.000000000 -0400 -+++ ./bin/auditdistd/subr.c 2014-08-25 09:05:35.000000000 -0400 -@@ -228,6 +228,10 @@ - PJDLOG_ASSERT(fd != -1); - - #ifdef HAVE_KQUEUE -+ if (wait_for_file_kq != -1) { -+ close(wait_for_file_kq); -+ wait_for_file_kq = -1; -+ } - kq = kqueue(); - if (kq == -1) { - pjdlog_errno(LOG_WARNING, "kqueue() failed"); diff --git a/security/openbsm-devel/files/pkg-message.in b/security/openbsm-devel/files/pkg-message.in deleted file mode 100644 index 39cd289f9ccd..000000000000 --- a/security/openbsm-devel/files/pkg-message.in +++ /dev/null @@ -1,74 +0,0 @@ -=============================================================================== - -Additional configuration is required if you wish to use auditdistd: - -On the receiver, perform the following: - -1. Generate a certificate: -# openssl req -x509 -nodes -newkey rsa:4096 -days 1825 -batch \ - -out /etc/security/auditdistd.cert.pem \ - -keyout /etc/security/auditdistd.key.pem -# chmod 0600 /etc/security/auditdistd.key.pem /etc/security/auditdistd.cert.pem -# chown root:wheel /etc/security/auditdistd.key.pem /etc/security/auditdistd.cert.pem - -2. Print out the public key's fingerprint: -# openssl x509 -in /etc/security/auditdistd.cert.pem -noout -fingerprint -sha256 | \ - awk -F '[ =]' '{printf("%s=%s\n", $1, $3)}' -SHA256=8F:0A:FC:8A:3D:09:80:AF:D9:AA:38:CC:8A:86:53:E6:8F:B6:1C:55:30... - -3. Generate a password used to authenticate both hosts against eachother: -# dd if=/dev/urandom bs=32 count=1 | openssl base64 | cut -b -32 -YjwbK69H5cEBlhcT+eJpJgJTFn5B2SrG - -4. Create /etc/security/auditdistd.conf configuration file: -receiver { - host "<enter hostname of sender here> { - remote "tls://<enter IP of sender here>" - password "<enter password generated above here>" - } -} - -5. Update permissions on the auditdistd configuration file and create directory: -# chmod 600 /etc/security/auditdistd.conf -# chown root:wheel /etc/security/auditdistd.conf -# mkdir -m 700 /var/audit/remote ; chown auditdistd:wheel /var/audit/remote - -6. Add the following to /etc/rc.conf: -auditdistd_enable="YES" - -7. Start auditdistd: -service auditdistd start - -=============================================================================== - -On the sender, perform the following: - -1. Ensure your kernel is compiled with: -options AUDIT - -2. Add the following to /etc/rc.conf: -auditd_enable="YES" -auditd_program="%%PREFIX%%/sbin/auditd" -auditdistd_enable="YES" - -3. Add the following to /etc/security/audit_control: -dist:on - -4. Create /etc/security/auditdistd.conf configuration file: -sender { - host "<enter hostname of receiver here>" { - remote "tls://<enter IP of the receiver here>" - fingerprint "SHA256=8F:0A:FC:8A:3D:09:80:AF:D9:AA:38:CC:8A:86:..." - password "<enter password generated above here>" - } -} - -5. Create the required directories: -# mkdir -m 0770 /var/audit/dist ; chown auditdistd:audit /var/audit/dist - -6. Start the required daemons: -service auditd start && service auditdistd start - -Additional information regarding auditdistd may be found on the OpenBSM wiki: -https://wiki.freebsd.org/auditdistd -=============================================================================== diff --git a/security/openbsm-devel/pkg-descr b/security/openbsm-devel/pkg-descr deleted file mode 100644 index a915207564c7..000000000000 --- a/security/openbsm-devel/pkg-descr +++ /dev/null @@ -1,10 +0,0 @@ -OpenBSM is an open source implementation of Sun's Basic Security Module (BSM) -Audit API and file format. BSM, the de facto industry standard for Audit, -describes a set of system call and library interfaces for managing audit -records, as well as a token stream file format that permits extensible and -generalized audit trail processing. OpenBSM extends the BSM API and file -format in a number of ways to support features present in the Mac OS X and -FreeBSD operating systems, such as Mach task interfaces, sendfile(), and -Linux system calls present in the FreeBSD Linux emulation layer. - -WWW: http://www.trustedbsd.org/openbsm.html diff --git a/security/openbsm-devel/pkg-plist b/security/openbsm-devel/pkg-plist deleted file mode 100644 index e42e6c705314..000000000000 --- a/security/openbsm-devel/pkg-plist +++ /dev/null @@ -1,179 +0,0 @@ -include/bsm/audit.h -include/bsm/audit_domain.h -include/bsm/audit_errno.h -include/bsm/audit_fcntl.h -include/bsm/audit_filter.h -include/bsm/audit_internal.h -include/bsm/audit_kevents.h -include/bsm/audit_record.h -include/bsm/audit_socket_type.h -include/bsm/audit_uevents.h -include/bsm/auditd_lib.h -include/bsm/libbsm.h -lib/auditfilter_noop.a -lib/auditfilter_noop.so -lib/auditfilter_noop.so.0 -lib/auditfilter_noop.so.0.0.0 -lib/libauditd.a -lib/libauditd.so -lib/libauditd.so.0 -lib/libauditd.so.0.0.0 -lib/libbsm.a -lib/libbsm.so -lib/libbsm.so.0 -lib/libbsm.so.0.0.0 -man/ac_strtopol.3.gz -man/au_bsm_to_domain.3.gz -man/au_bsm_to_errno.3.gz -man/au_bsm_to_fcntl_cmd.3.gz -man/au_bsm_to_socket_type.3.gz -man/au_close.3.gz -man/au_close_buffer.3.gz -man/au_close_token.3.gz -man/au_domain_to_bsm.3.gz -man/au_errno_to_bsm.3.gz -man/au_fcntl_cmd_to_bsm.3.gz -man/au_fetch_tok.3.gz -man/au_get_state.3.gz -man/au_notify_initialize.3.gz -man/au_notify_terminate.3.gz -man/au_open.3.gz -man/au_poltostr.3.gz -man/au_preselect.3.gz -man/au_print_flags_tok.3.gz -man/au_print_tok.3.gz -man/au_read_rec.3.gz -man/au_socket_type_to_bsm.3.gz -man/au_strerror.3.gz -man/au_to_arg.3.gz -man/au_to_arg32.3.gz -man/au_to_arg64.3.gz -man/au_to_attr64.3.gz -man/au_to_data.3.gz -man/au_to_exec_args.3.gz -man/au_to_exec_env.3.gz -man/au_to_exit.3.gz -man/au_to_file.3.gz -man/au_to_groups.3.gz -man/au_to_header.3.gz -man/au_to_header32.3.gz -man/au_to_header32_ex.3.gz -man/au_to_header64.3.gz -man/au_to_header_ex.3.gz -man/au_to_in_addr.3.gz -man/au_to_in_addr_ex.3.gz -man/au_to_ip.3.gz -man/au_to_ipc.3.gz -man/au_to_ipc_perm.3.gz -man/au_to_iport.3.gz -man/au_to_me.3.gz -man/au_to_newgroups.3.gz -man/au_to_opaque.3.gz -man/au_to_path.3.gz -man/au_to_process.3.gz -man/au_to_process32.3.gz -man/au_to_process32_ex.3.gz -man/au_to_process64.3.gz -man/au_to_process64_ex.3.gz -man/au_to_process_ex.3.gz -man/au_to_return.3.gz -man/au_to_return32.3.gz -man/au_to_return64.3.gz -man/au_to_seq.3.gz -man/au_to_sock_inet.3.gz -man/au_to_sock_inet128.3.gz -man/au_to_sock_inet32.3.gz -man/au_to_socket_ex.3.gz -man/au_to_subject.3.gz -man/au_to_subject32.3.gz -man/au_to_subject32_ex.3.gz -man/au_to_subject64.3.gz -man/au_to_subject64_ex.3.gz -man/au_to_subject_ex.3.gz -man/au_to_text.3.gz -man/au_to_trailer.3.gz -man/au_to_zonename.3.gz -man/au_user_mask.3.gz -man/au_write.3.gz -man/endac.3.gz -man/endauclass.3.gz -man/endauevent.3.gz -man/endauuser.3.gz -man/getacdir.3.gz -man/getacdist.3.gz -man/getacexpire.3.gz -man/getacfilesz.3.gz -man/getacflg.3.gz -man/getachost.3.gz -man/getacmin.3.gz -man/getacna.3.gz -man/getacpol.3.gz -man/getauclassent.3.gz -man/getauclassent_r.3.gz -man/getauclassnam.3.gz -man/getauclassnam_r.3.gz -man/getaudit_addr.2.gz -man/getauditflagsbin.3.gz -man/getauditflagschar.3.gz -man/getauevent.3.gz -man/getauevent_r.3.gz -man/getauevnam.3.gz -man/getauevnam_r.3.gz -man/getauevnonam.3.gz -man/getauevnonam_r.3.gz -man/getauevnum.3.gz -man/getauevnum_r.3.gz -man/getauuserent.3.gz -man/getauuserent_r.3.gz -man/getauusernam.3.gz -man/getauusernam_r.3.gz -man/getfauditflags.3.gz -man/man1/auditreduce.1.gz -man/man1/praudit.1.gz -man/man2/audit.2.gz -man/man2/auditctl.2.gz -man/man2/auditon.2.gz -man/man2/getaudit.2.gz -man/man2/getauid.2.gz -man/man2/setaudit.2.gz -man/man2/setauid.2.gz -man/man3/au_class.3.gz -man/man3/au_control.3.gz -man/man3/au_domain.3.gz -man/man3/au_errno.3.gz -man/man3/au_event.3.gz -man/man3/au_fcntl_cmd.3.gz -man/man3/au_free_token.3.gz -man/man3/au_io.3.gz -man/man3/au_mask.3.gz -man/man3/au_notify.3.gz -man/man3/au_open.3.gz -man/man3/au_socket_type.3.gz -man/man3/au_token.3.gz -man/man3/au_user.3.gz -man/man3/libauditd.3.gz -man/man3/libbsm.3.gz -man/man5/audit.log.5.gz -man/man5/audit_class.5.gz -man/man5/audit_control.5.gz -man/man5/audit_event.5.gz -man/man5/audit_user.5.gz -man/man5/audit_warn.5.gz -man/man5/auditdistd.conf.5.gz -man/man8/audit.8.gz -man/man8/auditd.8.gz -man/man8/auditdistd.8.gz -man/man8/auditfilterd.8.gz -man/setac.3.gz -man/setauclass.3.gz -man/setaudit_addr.2.gz -man/setauevent.3.gz -man/setauuser.3.gz -sbin/audit -sbin/auditd -sbin/auditdistd -sbin/auditfilterd -sbin/auditreduce -sbin/praudit -%%NEEDVARDIRS%%@dir(%%USERS%%,%%GROUPS%%,770) /var/audit/dist -%%NEEDVARDIRS%%@dir(%%USERS%%,%%GROUPS%%,700) /var/audit/remote diff --git a/security/ssh-copy-id/Makefile b/security/ssh-copy-id/Makefile deleted file mode 100644 index ddbc4db2e728..000000000000 --- a/security/ssh-copy-id/Makefile +++ /dev/null @@ -1,32 +0,0 @@ -# Created by: Emanuel Haupt <ehaupt@FreeBSD.org> -# $FreeBSD$ - -PORTNAME= ssh-copy-id -PORTVERSION= 5.6p1 -CATEGORIES= security -MASTER_SITES= # none -DISTFILES= # none - -MAINTAINER= ehaupt@FreeBSD.org -COMMENT= Small script which copies your ssh public-key to a remote host - -IGNORE= is already in the base system -DEPRECATED= ${IGNORE} -EXPIRATION_DATE= 2017-01-15 - -NO_BUILD= yes - -PLIST_FILES= bin/ssh-copy-id man/man1/ssh-copy-id.1.gz - -.include <bsd.port.pre.mk> - -pre-patch: -.for f in ssh-copy-id ssh-copy-id.1 - @${CP} ${FILESDIR}/${f} ${WRKDIR} -.endfor - -do-install: - ${INSTALL_SCRIPT} ${WRKDIR}/${PORTNAME} ${STAGEDIR}${PREFIX}/bin - ${INSTALL_MAN} ${WRKDIR}/${PORTNAME}.1 ${STAGEDIR}${MANPREFIX}/man/man1 - -.include <bsd.port.post.mk> diff --git a/security/ssh-copy-id/files/ssh-copy-id b/security/ssh-copy-id/files/ssh-copy-id deleted file mode 100644 index 368645cb4fc7..000000000000 --- a/security/ssh-copy-id/files/ssh-copy-id +++ /dev/null @@ -1,54 +0,0 @@ -#!/bin/sh - -# Shell script to install your public key on a remote machine -# Takes the remote machine name as an argument. -# Obviously, the remote machine must accept password authentication, -# or one of the other keys in your ssh-agent, for this to work. - -ID_FILE="${HOME}/.ssh/id_rsa.pub" - -if [ "-i" = "$1" ]; then - shift - # check if we have 2 parameters left, if so the first is the new ID file - if [ -n "$2" ]; then - if expr "$1" : ".*\.pub" > /dev/null ; then - ID_FILE="$1" - else - ID_FILE="$1.pub" - fi - shift # and this should leave $1 as the target name - fi -else - if [ x$SSH_AUTH_SOCK != x ] && ssh-add -L >/dev/null 2>&1; then - GET_ID="$GET_ID ssh-add -L" - fi -fi - -if [ -z "`eval $GET_ID`" ] && [ -r "${ID_FILE}" ] ; then - GET_ID="cat ${ID_FILE}" -fi - -if [ -z "`eval $GET_ID`" ]; then - echo "$0: ERROR: No identities found" >&2 - exit 1 -fi - -if [ "$#" -lt 1 ] || [ "$1" = "-h" ] || [ "$1" = "--help" ]; then - echo "Usage: $0 [-i [identity_file]] [user@]machine" >&2 - exit 1 -fi - -# strip any trailing colon -host=`echo $1 | sed 's/:$//'` - -{ eval "$GET_ID" ; } | ssh $host "umask 077; test -d ~/.ssh || mkdir ~/.ssh ; cat >> ~/.ssh/authorized_keys" || exit 1 - -cat <<EOF -Now try logging into the machine, with "ssh '$host'", and check in: - - ~/.ssh/authorized_keys - -to make sure we haven't added extra keys that you weren't expecting. - -EOF - diff --git a/security/ssh-copy-id/files/ssh-copy-id.1 b/security/ssh-copy-id/files/ssh-copy-id.1 deleted file mode 100644 index cb15ab24dbc4..000000000000 --- a/security/ssh-copy-id/files/ssh-copy-id.1 +++ /dev/null @@ -1,75 +0,0 @@ -.ig \" -*- nroff -*- -Copyright (c) 1999 Philip Hands Computing <http://www.hands.com/> - -Permission is granted to make and distribute verbatim copies of -this manual provided the copyright notice and this permission notice -are preserved on all copies. - -Permission is granted to copy and distribute modified versions of this -manual under the conditions for verbatim copying, provided that the -entire resulting derived work is distributed under the terms of a -permission notice identical to this one. - -Permission is granted to copy and distribute translations of this -manual into another language, under the above conditions for modified -versions, except that this permission notice may be included in -translations approved by the Free Software Foundation instead of in -the original English. -.. -.TH SSH-COPY-ID 1 "14 November 1999" "OpenSSH" -.SH NAME -ssh-copy-id \- install your public key in a remote machine's authorized_keys -.SH SYNOPSIS -.B ssh-copy-id [-i [identity_file]] -.I "[user@]machine" -.br -.SH DESCRIPTION -.BR ssh-copy-id -is a script that uses ssh to log into a remote machine and -append the indicated identity file to that machine's -.B ~/.ssh/authorized_keys -file. -.PP -If the -.B -i -option is given then the identity file (defaults to -.BR ~/.ssh/id_rsa.pub ) -is used, regardless of whether there are any keys in your -.BR ssh-agent . -Otherwise, if this: -.PP -.B " ssh-add -L" -.PP -provides any output, it uses that in preference to the identity file. -.PP -If the -.B -i -option is used, or the -.B ssh-add -produced no output, then it uses the contents of the identity -file. Once it has one or more fingerprints (by whatever means) it -uses ssh to append them to -.B ~/.ssh/authorized_keys -on the remote machine (creating the file, and directory, if necessary.) - -.SH NOTES -This program does not modify the permissions of any -pre-existing files or directories. Therefore, if the remote -.B sshd -has -.B StrictModes -set in its -configuration, then the user's home, -.B ~/.ssh -folder, and -.B ~/.ssh/authorized_keys -file may need to have group writability disabled manually, e.g. via - -.B " chmod go-w ~ ~/.ssh ~/.ssh/authorized_keys" - -on the remote machine. - -.SH "SEE ALSO" -.BR ssh (1), -.BR ssh-agent (1), -.BR sshd (8) diff --git a/security/ssh-copy-id/pkg-descr b/security/ssh-copy-id/pkg-descr deleted file mode 100644 index ba4e65b56682..000000000000 --- a/security/ssh-copy-id/pkg-descr +++ /dev/null @@ -1,4 +0,0 @@ -ssh-copy-id is a small script which copies your ssh public-key to a remote host; -appending it to your remote authorized_keys. - -WWW: http://www.openssh.com/portable.html |