From hsn@netmag.cz  Sat May 15 04:23:35 2004
Return-Path: <hsn@netmag.cz>
Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125])
	by hub.freebsd.org (Postfix) with ESMTP id 8F72016A4CE
	for <FreeBSD-gnats-submit@freebsd.org>; Sat, 15 May 2004 04:23:35 -0700 (PDT)
Received: from mail.tiscali.cz (stateless2.tiscali.cz [213.235.135.71])
	by mx1.FreeBSD.org (Postfix) with ESMTP id BC16843D54
	for <FreeBSD-gnats-submit@freebsd.org>; Sat, 15 May 2004 04:23:34 -0700 (PDT)
	(envelope-from hsn@netmag.cz)
Received: from asura.bsd (212.11.115.177) by mail.tiscali.cz (6.7.021)
        id 4095DDA4003EB0CF for FreeBSD-gnats-submit@freebsd.org; Sat, 15 May 2004 13:23:34 +0200
Received: from hsn@localhost
	by asura.bsd (Exim 4.33_1 FreeBSD) id 1BOid8-000Ow2-AV
	for <FreeBSD-gnats-submit@freebsd.org>; Fri, 14 May 2004 21:46:02 +0200
Message-Id: <E1BOid8-000Ow2-AV@asura.bsd>
Date: Fri, 14 May 2004 21:46:02 +0200
From: Radim Kolar <hsn@netmag.cz>
Reply-To: Radim Kolar <hsn@netmag.cz>
To: FreeBSD-gnats-submit@freebsd.org
Cc:
Subject: NEW PORT: rkhunter
X-Send-Pr-Version: 3.113
X-GNATS-Notify:

>Number:         66660
>Category:       ports
>Synopsis:       NEW PORT: rkhunter
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          update
>Submitter-Id:   current-users
>Arrival-Date:   Sat May 15 04:30:35 PDT 2004
>Closed-Date:    Sat May 15 07:01:31 PDT 2004
>Last-Modified:  Sat May 15 07:01:31 PDT 2004
>Originator:     Radim Kolar
>Release:        FreeBSD 5.2.1-RELEASE-p6 i386
>Organization:
Sanatana Dharma
>Environment:
System: FreeBSD asura.bsd 5.2.1-RELEASE-p6 FreeBSD 5.2.1-RELEASE-p6 #7: Mon May 10 17:15:51 CEST 2004 root@asura.bsd:/usr/src/sys/i386/compile/UP i386
>Description:
Here comes a port of Rootkit detector http://www.rootkit.nl/.
I have not checked ports tree for about a week, it may be ported by somebody else.
>How-To-Repeat:
>Fix:
# This is a shell archive.  Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file".  Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
#	rkhunter/
#	rkhunter/Makefile
#	rkhunter/pkg-descr
#	rkhunter/distinfo
#
echo c - rkhunter/
mkdir -p rkhunter/ > /dev/null 2>&1
echo x - rkhunter/Makefile
sed 's/^X//' >rkhunter/Makefile << 'END-of-rkhunter/Makefile'
X# New ports collection makefile for:	rkhunter
X# Date created:		14 May 2004
X# Whom:			Radim Kolar
X#
X# $FreeBSD$
X#
X
XPORTNAME=	rkhunter
XPORTVERSION=	1.0.8
XCATEGORIES=	security
XMASTER_SITES=	http://downloads.rootkit.nl/
X
XMAINTAINER=	ports@freebsd.org
XCOMMENT=	Rootkit detection tool
X
XRUN_DEPENDS=${SITE_PERL}/${PERL_ARCH}/Digest/SHA1.pm:${PORTSDIR}/security/p5-Digest-SHA1
X
XWRKSRC=		${WRKDIR}/${PORTNAME}
XUSE_PERL5=	yes
XNO_BUILD=	yes
X
XPLIST_DIRS=	rkhunter/scripts rkhunter/db rkhunter/docs rkhunter/tmp rkhunter
XPLIST_FILES=	rkhunter/scripts/check_modules.pl \
X		rkhunter/scripts/check_port.pl \
X		rkhunter/scripts/filehashmd5.pl \
X		rkhunter/scripts/filehashsha1.pl \
X		bin/rkhunter \
X		etc/rkhunter.conf \
X		rkhunter/scripts/showfiles.pl \
X		rkhunter/db/backdoorports.dat \
X		rkhunter/db/mirrors.dat \
X		rkhunter/db/os.dat \
X		rkhunter/db/defaulthashes.dat \
X		rkhunter/db/md5blacklist.dat \
X		rkhunter/docs/CHANGELOG \
X		rkhunter/docs/README \
X		rkhunter/docs/WISHLIST
X
XMAN8=		rkhunter.8
XMANCOMPRESSED=	no
X
Xdo-install:
X		cd ${WRKSRC} && ./installer.sh
X		${INSTALL_MAN} ${WRKSRC}/files/development/rkhunter.8 ${MAN8PREFIX}/man/man8
X
X.include <bsd.port.mk>
END-of-rkhunter/Makefile
echo x - rkhunter/pkg-descr
sed 's/^X//' >rkhunter/pkg-descr << 'END-of-rkhunter/pkg-descr'
XRootkit Hunter is scanning tool to ensure you for about 99.9% you're
Xclean of nasty tools. 
X
XThis tool scans for rootkits, backdoors and local exploits by running
Xtests like:
X
X- MD5/SHA1 hash compare
X- Look for default files used by rootkits
X- Wrong file permissions for binaries
X- Look for suspected strings in LKM and KLD modules
X- Look for hidden files
X- Optional scan within plaintext and binary files
X
XWWW: http://www.rootkit.nl/ 
END-of-rkhunter/pkg-descr
echo x - rkhunter/distinfo
sed 's/^X//' >rkhunter/distinfo << 'END-of-rkhunter/distinfo'
XMD5 (rkhunter-1.0.8.tar.gz) = bc1006d36e5b2674985c9396b5c46c95
XSIZE (rkhunter-1.0.8.tar.gz) = 77582
END-of-rkhunter/distinfo
exit

>Release-Note:
>Audit-Trail:
State-Changed-From-To: open->feedback 
State-Changed-By: krion 
State-Changed-When: Sat May 15 04:38:38 PDT 2004 
State-Changed-Why:  
It doesn't respect PREFIX 

http://www.freebsd.org/cgi/query-pr.cgi?pr=66660 

From: Radim Kolar <hsn@netmag.cz>
To: Kirill Ponomarew <krion@FreeBSD.org>,
	FreeBSD BUG followup <bug-followup@freebsd.org>
Cc:  
Subject: Re: ports/66660: NEW PORT: rkhunter
Date: Sat, 15 May 2004 14:56:59 +0200

 # This is a shell archive.  Save it in a file, remove anything before
 # this line, and then unpack it by entering "sh file".  Note, it may
 # create directories; files and directories will be owned by you and
 # have default permissions.
 #
 # This archive contains:
 #
 #	rkhunter/
 #	rkhunter/Makefile
 #	rkhunter/pkg-descr
 #	rkhunter/distinfo
 #
 echo c - rkhunter/
 mkdir -p rkhunter/ > /dev/null 2>&1
 echo x - rkhunter/Makefile
 sed 's/^X//' >rkhunter/Makefile << 'END-of-rkhunter/Makefile'
 X# New ports collection makefile for:	rkhunter
 X# Date created:		15 May 2004
 X# Whom:			Radim Kolar
 X#
 X# $FreeBSD$
 X#
 X
 XPORTNAME=	rkhunter
 XPORTVERSION=	1.0.8
 XCATEGORIES=	security
 XMASTER_SITES=	http://downloads.rootkit.nl/
 X
 XMAINTAINER=	ports@freebsd.org
 XCOMMENT=	Rootkit detection tool
 X
 XRUN_DEPENDS=${SITE_PERL}/${PERL_ARCH}/Digest/SHA1.pm:${PORTSDIR}/security/p5-Digest-SHA1
 X
 XWRKSRC=		${WRKDIR}/${PORTNAME}
 XUSE_PERL5=	yes
 XNO_BUILD=	yes
 XUSE_REINPLACE=	yes
 X
 XPLIST_DIRS=	rkhunter/scripts rkhunter/db rkhunter/docs rkhunter/tmp rkhunter
 XPLIST_FILES=	rkhunter/scripts/check_modules.pl \
 X		rkhunter/scripts/check_port.pl \
 X		rkhunter/scripts/filehashmd5.pl \
 X		rkhunter/scripts/filehashsha1.pl \
 X		bin/rkhunter \
 X		etc/rkhunter.conf \
 X		rkhunter/scripts/showfiles.pl \
 X		rkhunter/db/backdoorports.dat \
 X		rkhunter/db/mirrors.dat \
 X		rkhunter/db/os.dat \
 X		rkhunter/db/defaulthashes.dat \
 X		rkhunter/db/md5blacklist.dat \
 X		rkhunter/docs/CHANGELOG \
 X		rkhunter/docs/README \
 X		rkhunter/docs/WISHLIST
 X
 XMAN8=		rkhunter.8
 XMANCOMPRESSED=	no
 X
 Xpre-install:
 X		${REINPLACE_CMD} -e "s,/usr/local,${PREFIX},g" ${WRKSRC}/installer.sh
 Xdo-install:
 X		cd ${WRKSRC} && ./installer.sh
 X		${INSTALL_MAN} ${WRKSRC}/files/development/rkhunter.8 ${MAN8PREFIX}/man/man8
 X
 X.include <bsd.port.mk>
 END-of-rkhunter/Makefile
 echo x - rkhunter/pkg-descr
 sed 's/^X//' >rkhunter/pkg-descr << 'END-of-rkhunter/pkg-descr'
 XRootkit Hunter is scanning tool to ensure you for about 99.9% you're
 Xclean of nasty tools. 
 X
 XThis tool scans for rootkits, backdoors and local exploits by running
 Xtests like:
 X
 X- MD5/SHA1 hash compare
 X- Look for default files used by rootkits
 X- Wrong file permissions for binaries
 X- Look for suspected strings in LKM and KLD modules
 X- Look for hidden files
 X- Optional scan within plaintext and binary files
 X
 XWWW: http://www.rootkit.nl/ 
 END-of-rkhunter/pkg-descr
 echo x - rkhunter/distinfo
 sed 's/^X//' >rkhunter/distinfo << 'END-of-rkhunter/distinfo'
 XMD5 (rkhunter-1.0.8.tar.gz) = bc1006d36e5b2674985c9396b5c46c95
 XSIZE (rkhunter-1.0.8.tar.gz) = 77582
 END-of-rkhunter/distinfo
 exit
 
State-Changed-From-To: feedback->closed 
State-Changed-By: krion 
State-Changed-When: Sat May 15 07:01:25 PDT 2004 
State-Changed-Why:  
New port added, thanks! 

http://www.freebsd.org/cgi/query-pr.cgi?pr=66660 
>Unformatted:
