From servangle@servangle.servangle.net  Tue May 24 06:20:08 2005
Return-Path: <servangle@servangle.servangle.net>
Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125])
	by hub.freebsd.org (Postfix) with ESMTP id CC99F16A41C
	for <FreeBSD-gnats-submit@freebsd.org>; Tue, 24 May 2005 06:20:08 +0000 (GMT)
	(envelope-from servangle@servangle.servangle.net)
Received: from servangle.servangle.net (atm-251-24.pixi.com [206.127.251.24])
	by mx1.FreeBSD.org (Postfix) with ESMTP id A335443D48
	for <FreeBSD-gnats-submit@freebsd.org>; Tue, 24 May 2005 06:20:07 +0000 (GMT)
	(envelope-from servangle@servangle.servangle.net)
Received: from servangle.servangle.net (smmsp@localhost.servangle.net [127.0.0.1])
	by servangle.servangle.net (8.13.1/8.13.1) with ESMTP id j4O6IHlK066280;
	Mon, 23 May 2005 20:18:17 -1000 (HST)
	(envelope-from servangle@servangle.servangle.net)
Received: (from root@localhost)
	by servangle.servangle.net (8.13.1/8.13.1/Submit) id j4O6IH6S066279;
	Mon, 23 May 2005 20:18:17 -1000 (HST)
	(envelope-from servangle)
Message-Id: <200505240618.j4O6IH6S066279@servangle.servangle.net>
Date: Mon, 23 May 2005 20:18:17 -1000 (HST)
From: snortsms@servangle.net
Reply-To: snortsms@servangle.net
To: FreeBSD-gnats-submit@freebsd.org
Cc: snortsms@servangle.net
Subject: New port: security/snortsms A Snort Sensor Management System web interface and monitoring console.
X-Send-Pr-Version: 3.113
X-GNATS-Notify:

>Number:         81425
>Category:       ports
>Synopsis:       New port: security/snortsms A Snort Sensor Management System web interface and monitoring console.
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    thierry
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Tue May 24 06:30:02 GMT 2005
>Closed-Date:    Wed Jun 01 20:06:27 GMT 2005
>Last-Modified:  Wed Jun 01 20:06:27 GMT 2005
>Originator:     J Randolph
>Release:        FreeBSD 5.4-RC1 i386
>Organization:
servAngle
>Environment:
System: FreeBSD mangle.servangle.net 5.4-RC1 FreeBSD 5.4-RC1 #0: Thu Apr 14 11:22:09 HST 2005 root@mangle:/usr/obj/usr/src/sys/MANGLE05 i386


>Description:
        New port for inclusion into ports tree.
>How-To-Repeat:
        
>Fix:


# This is a shell archive.  Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file".  Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
#       /usr/ports/security/snortsms
#       /usr/ports/security/snortsms/pkg-message
#       /usr/ports/security/snortsms/pkg-descr
#       /usr/ports/security/snortsms/distinfo
#       /usr/ports/security/snortsms/Makefile
#       /usr/ports/security/snortsms/pkg-plist
#
echo c - /usr/ports/security/snortsms
mkdir -p /usr/ports/security/snortsms > /dev/null 2>&1
echo x - /usr/ports/security/snortsms/pkg-message
sed 's/^X//' >/usr/ports/security/snortsms/pkg-message << 'END-of-/usr/ports/security/snortsms/pkg-message'
X************************************************************
X
XFirst time installations:
X-You must configure SnortSMS.
X
XPlease browse to the SnortSMS web console and edit the
X"Global Settings" in the SnortSMS Settings menu.
XSnortSMS uses the following configuration file:
X%%PREFIX%%/www/snortsms/conf/conf.php
Xwhich (if missing) will automatically be created - do not
Xedit this file directly.
X
X
X* NOTE:  SnortSMS requires a local or remote database (MySQL
Xrecommended) connection.
X
X
XFor how to configure SnortSMS, please read the setup guide
Xlocated at:
Xhttp://<SnortSMS_webroot>/contrib/install_snortsms.html
X-or-
X%%PREFIX%%/www/snortsms/contrib/install_snortsms.html
X
X
XThank you for using SnortSMS!
X
X
X************************************************************
END-of-/usr/ports/security/snortsms/pkg-message
echo x - /usr/ports/security/snortsms/pkg-descr
sed 's/^X//' >/usr/ports/security/snortsms/pkg-descr << 'END-of-/usr/ports/security/snortsms/pkg-descr'
XSnortSMS is a highly configurable sensor management system that
Xprovides the ability to remotely manage Snort [and Barnyard] based
Xintrusion detection systems, push configuration files, and monitor
Xsystem health and statistics all from a simple Web console.
X
XWWW: http://snortsms.servangle.net/
END-of-/usr/ports/security/snortsms/pkg-descr
echo x - /usr/ports/security/snortsms/distinfo
sed 's/^X//' >/usr/ports/security/snortsms/distinfo << 'END-of-/usr/ports/security/snortsms/distinfo'
XMD5 (snortsms-0.11.2.tgz) = 004a28ff6fe4e2a4fbead01156e18210
XSIZE (snortsms-0.11.2.tgz) = 290219
END-of-/usr/ports/security/snortsms/distinfo
echo x - /usr/ports/security/snortsms/Makefile
sed 's/^X//' >/usr/ports/security/snortsms/Makefile << 'END-of-/usr/ports/security/snortsms/Makefile'
X# New ports collection makefile for:   snortsms
X# Date created:                Mon Sep 25 16:05:01 CST 2000
X# Whom:                        J Randolph <snortsms@servangle.net>
X#
X# $FreeBSD$
X#
X
XPORTNAME=              snortsms
XPORTVERSION=   0.11.2
XCATEGORIES=            security
XMASTER_SITES=  http://snortsms.servangle.net/dnloads/
XEXTRACT_SUFX=  .tgz
X
XMAINTAINER=    snortsms@servangle.net
XCOMMENT=       A Snort Sensor Management System web interface and monitoring console
X
XRUN_DEPENDS=   ${LOCALBASE}/share/pear/DB.php:${PORTSDIR}/databases/pear-DB \
X                               ${LOCALBASE}/bin/curl:${PORTSDIR}/ftp/curl \
X                               ${LOCALBASE}/bin/php:${PORTSDIR}/lang/php4 \
X                               ${LOCALBASE}/include/php/ext/pcre/php_pcre.h:${PORTSDIR}/devel/php4-pcre
X
XWRKSRC=                ${WRKDIR}/${PORTNAME}-${PORTVERSION}
XUSE_PHP=       yes
XNO_BUILD=      yes
X
Xdo-install:
X# Create directory structure
X       @${MKDIR} ${PREFIX}/www/snortsms
X# copy files
X       ${CP} -pr ${WRKSRC}/* ${PREFIX}/www/snortsms
X# correct permissions
X       ${CHMOD} 775 ${PREFIX}/www/snortsms/conf
X       ${CHOWN} :${WWWGRP} ${PREFIX}/www/snortsms/conf
X
Xpost-install:
X       @${SED} 's|%%PREFIX%%|${PREFIX}|' ${PKGMESSAGE}
X
X.include <bsd.port.mk>
END-of-/usr/ports/security/snortsms/Makefile
echo x - /usr/ports/security/snortsms/pkg-plist
sed 's/^X//' >/usr/ports/security/snortsms/pkg-plist << 'END-of-/usr/ports/security/snortsms/pkg-plist'
Xwww/snortsms/COPYING
Xwww/snortsms/DefaultLayout.php
Xwww/snortsms/barnctrl/act_Save-Update.php
Xwww/snortsms/barnctrl/act_action.php
Xwww/snortsms/barnctrl/dsp_AddEdit.php
Xwww/snortsms/barnctrl/dsp_home.php
Xwww/snortsms/barnctrl/fbx_Switch.php
Xwww/snortsms/barnctrl/index.php
Xwww/snortsms/barnctrl/qry_barnctrl.php
Xwww/snortsms/barnctrl/qry_barnctrls.php
Xwww/snortsms/barnyard/act_AddRemove.php
Xwww/snortsms/barnyard/act_Save-Update.php
Xwww/snortsms/barnyard/act_action.php
Xwww/snortsms/barnyard/dsp_AddEdit.php
Xwww/snortsms/barnyard/dsp_home.php
Xwww/snortsms/barnyard/dsp_import.php
Xwww/snortsms/barnyard/dsp_selected.php
Xwww/snortsms/barnyard/fbx_Switch.php
Xwww/snortsms/barnyard/index.php
Xwww/snortsms/barnyard/qry_barnyard.php
Xwww/snortsms/barnyard/qry_barnyards.php
Xwww/snortsms/barnyard/qry_selected.php
Xwww/snortsms/classifications/act_AddRemove.php
Xwww/snortsms/classifications/act_Save-Update.php
Xwww/snortsms/classifications/act_action.php
Xwww/snortsms/classifications/dsp_AddEdit.php
Xwww/snortsms/classifications/dsp_home.php
Xwww/snortsms/classifications/dsp_import.php
Xwww/snortsms/classifications/dsp_selected.php
Xwww/snortsms/classifications/fbx_Switch.php
Xwww/snortsms/classifications/index.php
Xwww/snortsms/classifications/qry_classification.php
Xwww/snortsms/classifications/qry_classifications.php
Xwww/snortsms/classifications/qry_selected.php
Xwww/snortsms/conf/act_init_vars.php
Xwww/snortsms/conf/act_read_conf.php
Xwww/snortsms/conf/act_save_conf.php
Xwww/snortsms/conf/act_verify_install.php
Xwww/snortsms/conf/dsp_conf.php
Xwww/snortsms/conf/dsp_save_conf.php
Xwww/snortsms/conf/fbx_Switch.php
Xwww/snortsms/conf/index.php
Xwww/snortsms/contib/SNORTSMS.mysql
Xwww/snortsms/contib/snortsms-agent-0.7.0.tgz.gz
Xwww/snortsms/css/default.css
Xwww/snortsms/docs/snortsms_install.html
Xwww/snortsms/dsp_main.php
Xwww/snortsms/dsp_menu.php
Xwww/snortsms/fbx_Circuits.php
Xwww/snortsms/fbx_Fusebox3.0_PHP4.0.6.php
Xwww/snortsms/fbx_Fusebox3.0_PHP4.1.x.php
Xwww/snortsms/fbx_Layouts.php
Xwww/snortsms/fbx_ListFunctions.php
Xwww/snortsms/fbx_SaveContent.php
Xwww/snortsms/fbx_Settings.php
Xwww/snortsms/fbx_Switch.php
Xwww/snortsms/images/btn_add.gif
Xwww/snortsms/images/btn_delete.gif
Xwww/snortsms/images/btn_preview.gif
Xwww/snortsms/images/btn_save.gif
Xwww/snortsms/images/btn_submit.gif
Xwww/snortsms/images/btn_update.gif
Xwww/snortsms/images/check-0.png
Xwww/snortsms/images/check-1.png
Xwww/snortsms/images/check-2.png
Xwww/snortsms/images/conf-0.png
Xwww/snortsms/images/conf-1.png
Xwww/snortsms/images/conf-3.png
Xwww/snortsms/images/db-0.png
Xwww/snortsms/images/db-1.png
Xwww/snortsms/images/db-2.png
Xwww/snortsms/images/draft-1.png
Xwww/snortsms/images/hdd-1.gif
Xwww/snortsms/images/hdd-2.gif
Xwww/snortsms/images/hdd-3.gif
Xwww/snortsms/images/led-0.gif
Xwww/snortsms/images/led-1.gif
Xwww/snortsms/images/led-2.gif
Xwww/snortsms/images/led-3.gif
Xwww/snortsms/images/led2-0.gif
Xwww/snortsms/images/led2-1.gif
Xwww/snortsms/images/led2-2.gif
Xwww/snortsms/images/led2-3.gif
Xwww/snortsms/images/logo_1.png
Xwww/snortsms/images/note-1.gif
Xwww/snortsms/images/snortpanel.gif
Xwww/snortsms/images/snortpanel2.gif
Xwww/snortsms/images/trash-1.gif
Xwww/snortsms/images/view.png
Xwww/snortsms/import/act_extract_process.php
Xwww/snortsms/import/act_process_rawtext.php
Xwww/snortsms/import/act_receive_rulefile.php
Xwww/snortsms/import/act_receive_snapshot.php
Xwww/snortsms/import/dsp_home.php
Xwww/snortsms/import/fbx_Switch.php
Xwww/snortsms/import/index.php
Xwww/snortsms/index.php
Xwww/snortsms/java/cssmenu.js
Xwww/snortsms/lib/func_DrawRepHeader.php
Xwww/snortsms/lib/func_GenBarnConf.php
Xwww/snortsms/lib/func_GenSnortConf.php
Xwww/snortsms/lib/func_GenToken.php
Xwww/snortsms/lib/func_Log.php
Xwww/snortsms/lib/func_ReserveNextID.php
Xwww/snortsms/lib/func_Rules.php
Xwww/snortsms/lib/func_curl_error.php
Xwww/snortsms/lib/func_date.php
Xwww/snortsms/lib/func_gen_sid-msg.php
Xwww/snortsms/lib/obj_Rule.php
Xwww/snortsms/main/dsp_home.php
Xwww/snortsms/main/fbx_Switch.php
Xwww/snortsms/main/index.php
Xwww/snortsms/monitor/act_stats.php
Xwww/snortsms/monitor/fbx_Switch.php
Xwww/snortsms/monitor/index.php
Xwww/snortsms/monitor/query_sensor.php
Xwww/snortsms/outputs/act_AddRemove.php
Xwww/snortsms/outputs/act_Save-Update.php
Xwww/snortsms/outputs/act_action.php
Xwww/snortsms/outputs/dsp_AddEdit.php
Xwww/snortsms/outputs/dsp_home.php
Xwww/snortsms/outputs/dsp_selected.php
Xwww/snortsms/outputs/fbx_Switch.php
Xwww/snortsms/outputs/index.php
Xwww/snortsms/outputs/qry_output.php
Xwww/snortsms/outputs/qry_outputs.php
Xwww/snortsms/outputs/qry_selected.php
Xwww/snortsms/policies/act_AddRemove.php
Xwww/snortsms/policies/act_Save-Update.php
Xwww/snortsms/policies/act_action.php
Xwww/snortsms/policies/act_delete.php
Xwww/snortsms/policies/dsp_AddEdit.php
Xwww/snortsms/policies/dsp_home.php
Xwww/snortsms/policies/dsp_pagenate.php
Xwww/snortsms/policies/dsp_policy.php
Xwww/snortsms/policies/dsp_rulecats.php
Xwww/snortsms/policies/dsp_select.php
Xwww/snortsms/policies/dsp_selected.php
Xwww/snortsms/policies/fbx_Switch.php
Xwww/snortsms/policies/index.php
Xwww/snortsms/policies/qry_policies.php
Xwww/snortsms/policies/qry_policy.php
Xwww/snortsms/policies/qry_rulecats.php
Xwww/snortsms/policies/qry_rules.php
Xwww/snortsms/policies/qry_selected.php
Xwww/snortsms/preprocessors/act_AddRemove.php
Xwww/snortsms/preprocessors/act_Save-Update.php
Xwww/snortsms/preprocessors/act_action.php
Xwww/snortsms/preprocessors/dsp_AddEdit.php
Xwww/snortsms/preprocessors/dsp_home.php
Xwww/snortsms/preprocessors/dsp_import.php
Xwww/snortsms/preprocessors/dsp_selected.php
Xwww/snortsms/preprocessors/fbx_Switch.php
Xwww/snortsms/preprocessors/index.php
Xwww/snortsms/preprocessors/qry_preprocessor.php
Xwww/snortsms/preprocessors/qry_preprocessors.php
Xwww/snortsms/preprocessors/qry_selected.php
Xwww/snortsms/references/act_AddRemove.php
Xwww/snortsms/references/act_Save-Update.php
Xwww/snortsms/references/act_action.php
Xwww/snortsms/references/dsp_AddEdit.php
Xwww/snortsms/references/dsp_home.php
Xwww/snortsms/references/dsp_import.php
Xwww/snortsms/references/dsp_selected.php
Xwww/snortsms/references/fbx_Switch.php
Xwww/snortsms/references/index.php
Xwww/snortsms/references/qry_reference.php
Xwww/snortsms/references/qry_references.php
Xwww/snortsms/references/qry_selected.php
Xwww/snortsms/rules/act_Save-Update.php
Xwww/snortsms/rules/act_action.php
Xwww/snortsms/rules/dsp_edit.php
Xwww/snortsms/rules/dsp_home.php
Xwww/snortsms/rules/dsp_import.php
Xwww/snortsms/rules/dsp_pagenate.php
Xwww/snortsms/rules/dsp_queryform.php
Xwww/snortsms/rules/dsp_recycle.php
Xwww/snortsms/rules/dsp_results.php
Xwww/snortsms/rules/dsp_view.php
Xwww/snortsms/rules/fbx_Switch.php
Xwww/snortsms/rules/index.php
Xwww/snortsms/rules/qry_rule.php
Xwww/snortsms/rules/qry_rulecats.php
Xwww/snortsms/rules/qry_rules.php
Xwww/snortsms/ruletypes/act_AddRemove.php
Xwww/snortsms/ruletypes/act_Save-Update.php
Xwww/snortsms/ruletypes/act_delete.php
Xwww/snortsms/ruletypes/dsp_AddEdit.php
Xwww/snortsms/ruletypes/dsp_home.php
Xwww/snortsms/ruletypes/dsp_selected.php
Xwww/snortsms/ruletypes/fbx_Switch.php
Xwww/snortsms/ruletypes/index.php
Xwww/snortsms/ruletypes/qry_ruletype.php
Xwww/snortsms/ruletypes/qry_ruletypes.php
Xwww/snortsms/ruletypes/qry_selected.php
Xwww/snortsms/ruletypes/qry_selectedouts.php
Xwww/snortsms/sensorconf/act_clone.php
Xwww/snortsms/sensorconf/act_delete_sensor.php
Xwww/snortsms/sensorconf/act_getstats.php
Xwww/snortsms/sensorconf/act_pushbarnconf.php
Xwww/snortsms/sensorconf/act_pushsnortconf.php
Xwww/snortsms/sensorconf/act_save_update.php
Xwww/snortsms/sensorconf/act_sensor_control.php
Xwww/snortsms/sensorconf/control_sensor.php
Xwww/snortsms/sensorconf/dsp_clone.php
Xwww/snortsms/sensorconf/dsp_genbarnconf.php
Xwww/snortsms/sensorconf/dsp_gensnortconf.php
Xwww/snortsms/sensorconf/dsp_header.php
Xwww/snortsms/sensorconf/dsp_tab_agent.php
Xwww/snortsms/sensorconf/dsp_tab_barn.php
Xwww/snortsms/sensorconf/dsp_tab_main.php
Xwww/snortsms/sensorconf/dsp_tab_sensor.php
Xwww/snortsms/sensorconf/dsp_tab_snort.php
Xwww/snortsms/sensorconf/dsp_tab_status.php
Xwww/snortsms/sensorconf/fbx_Switch.php
Xwww/snortsms/sensorconf/index.php
Xwww/snortsms/sensorconf/qry_assignments.php
Xwww/snortsms/sensorconf/qry_barn_ctrls.php
Xwww/snortsms/sensorconf/qry_sensor.php
Xwww/snortsms/sensorconf/qry_sensor_ctrls.php
Xwww/snortsms/sensorconf/qry_sensor_lite.php
Xwww/snortsms/sensorconf/qry_sensors.php
Xwww/snortsms/sensorconf/qry_snort_ctrls.php
Xwww/snortsms/sensors/act_delete.php
Xwww/snortsms/sensors/dsp_home.php
Xwww/snortsms/sensors/dsp_monitor.php
Xwww/snortsms/sensors/fbx_Switch.php
Xwww/snortsms/sensors/index.php
Xwww/snortsms/sensors/qry_barn_ctrls.php
Xwww/snortsms/sensors/qry_sensor.php
Xwww/snortsms/sensors/qry_sensors_active.php
Xwww/snortsms/sensors/qry_snort_ctrl.php
Xwww/snortsms/snortctrl/act_Save-Update.php
Xwww/snortsms/snortctrl/act_action.php
Xwww/snortsms/snortctrl/dsp_AddEdit.php
Xwww/snortsms/snortctrl/dsp_home.php
Xwww/snortsms/snortctrl/fbx_Switch.php
Xwww/snortsms/snortctrl/index.php
Xwww/snortsms/snortctrl/qry_snortctrl.php
Xwww/snortsms/snortctrl/qry_snortctrls.php
Xwww/snortsms/variables/act_AddRemove.php
Xwww/snortsms/variables/act_Save-Update.php
Xwww/snortsms/variables/act_action.php
Xwww/snortsms/variables/dsp_AddEdit.php
Xwww/snortsms/variables/dsp_home.php
Xwww/snortsms/variables/dsp_selected.php
Xwww/snortsms/variables/fbx_Switch.php
Xwww/snortsms/variables/index.php
Xwww/snortsms/variables/qry_selected.php
Xwww/snortsms/variables/qry_variable.php
Xwww/snortsms/variables/qry_variables.php
X@dirrm www/snortsms/variables
X@dirrm www/snortsms/snortctrl
X@dirrm www/snortsms/sensors
X@dirrm www/snortsms/sensorconf
X@dirrm www/snortsms/ruletypes
X@dirrm www/snortsms/rules
X@dirrm www/snortsms/references
X@dirrm www/snortsms/preprocessors
X@dirrm www/snortsms/policies
X@dirrm www/snortsms/outputs
X@dirrm www/snortsms/monitor
X@dirrm www/snortsms/main
X@dirrm www/snortsms/lib
X@dirrm www/snortsms/java
X@dirrm www/snortsms/import
X@dirrm www/snortsms/images
X@dirrm www/snortsms/docs
X@dirrm www/snortsms/css
X@dirrm www/snortsms/contib
X@dirrm www/snortsms/conf
X@dirrm www/snortsms/classifications
X@dirrm www/snortsms/barnyard
X@dirrm www/snortsms/barnctrl
X@dirrm www/snortsms
END-of-/usr/ports/security/snortsms/pkg-plist
exit

>Release-Note:
>Audit-Trail:
State-Changed-From-To: open->feedback 
State-Changed-By: thierry 
State-Changed-When: Fri May 27 21:38:33 GMT 2005 
State-Changed-Why:  

- I suggest the following patch to polish the port and make `portlint -A' 
happy; could you please review it? 

--- snortsms.diff begins here --- 
diff -urN security/snortsms.orig/Makefile security/snortsms/Makefile 
--- security/snortsms.orig/Makefile	Fri May 27 22:41:31 2005 
+++ security/snortsms/Makefile	Fri May 27 23:09:58 2005 
@@ -5,34 +5,34 @@ 
# $FreeBSD$ 
# 

-PORTNAME=              snortsms 
-PORTVERSION=   0.11.2 
-CATEGORIES=            security 
-MASTER_SITES=  http://snortsms.servangle.net/dnloads/ 
-EXTRACT_SUFX=  .tgz 
- 
-MAINTAINER=    snortsms@servangle.net 
-COMMENT=       A Snort Sensor Management System web interface and monitoring console 
- 
-RUN_DEPENDS=   ${LOCALBASE}/share/pear/DB.php:${PORTSDIR}/databases/pear-DB  
-                               ${LOCALBASE}/bin/curl:${PORTSDIR}/ftp/curl  
-                               ${LOCALBASE}/bin/php:${PORTSDIR}/lang/php4  
-                               ${LOCALBASE}/include/php/ext/pcre/php_pcre.h:${PORTSDIR}/devel/php4-pcre 
- 
-WRKSRC=                ${WRKDIR}/${PORTNAME}-${PORTVERSION} 
-USE_PHP=       yes 
-NO_BUILD=      yes 
+PORTNAME=	snortsms 
+PORTVERSION=	0.11.2 
+CATEGORIES=	security www 
+MASTER_SITES=	http://snortsms.servangle.net/dnloads/ 
+EXTRACT_SUFX=	.tgz 
+ 
+MAINTAINER=	snortsms@servangle.net 
+COMMENT=	A Snort Sensor Management System web interface and monitoring console 
+ 
+RUN_DEPENDS=	${LOCALBASE}/share/pear/DB.php:${PORTSDIR}/databases/pear-DB  
+		${LOCALBASE}/bin/curl:${PORTSDIR}/ftp/curl 
+ 
+USE_PHP=	mysql pcre pcntl 
+NO_BUILD=	yes 
+ 
+PKGMESSAGE=	${WRKDIR}/pkg-message 
+SUB_FILES=	pkg-message 

do-install: 
# Create directory structure 
-       @${MKDIR} ${PREFIX}/www/snortsms 
+	@${MKDIR} ${PREFIX}/www/snortsms 
# copy files 
-       ${CP} -pr ${WRKSRC}/* ${PREFIX}/www/snortsms 
+	${CP} -R ${WRKSRC}/* ${PREFIX}/www/snortsms 
# correct permissions 
-       ${CHMOD} 775 ${PREFIX}/www/snortsms/conf 
-       ${CHOWN} :${WWWGRP} ${PREFIX}/www/snortsms/conf 
+	${CHMOD} 775 ${PREFIX}/www/snortsms/conf 
+	${CHOWN} -R ${WWWOWN}:${WWWGRP} ${PREFIX}/www/snortsms 

post-install: 
-       @${SED} 's|%%PREFIX%%|${PREFIX}|' ${PKGMESSAGE} 
+	@${CAT} ${PKGMESSAGE} 

.include <bsd.port.mk> 
diff -urN security/snortsms.orig/files/pkg-message.in security/snortsms/files/pkg-message.in 
--- security/snortsms.orig/files/pkg-message.in	Thu Jan  1 01:00:00 1970 
+++ security/snortsms/files/pkg-message.in	Fri May 27 22:49:08 2005 
@@ -0,0 +1,24 @@ 
+************************************************************ 
+ 
+First time installations: 
+-You must configure SnortSMS. 
+ 
+Please browse to the SnortSMS web console and edit the 
+"Global Settings" in the SnortSMS Settings menu. 
+SnortSMS uses the following configuration file: 
+%%PREFIX%%/www/snortsms/conf/conf.php 
+which (if missing) will automatically be created - do not 
+edit this file directly. 
+ 
+* NOTE:  SnortSMS requires a local or remote database (MySQL 
+recommended) connection. 
+ 
+For how to configure SnortSMS, please read the setup guide 
+located at: 
+http://<SnortSMS_webroot>/contrib/install_snortsms.html 
+-or- 
+%%PREFIX%%/www/snortsms/contrib/install_snortsms.html 
+ 
+Thank you for using SnortSMS! 
+ 
+************************************************************ 
diff -urN security/snortsms.orig/pkg-message security/snortsms/pkg-message 
--- security/snortsms.orig/pkg-message	Fri May 27 22:41:31 2005 
+++ security/snortsms/pkg-message	Thu Jan  1 01:00:00 1970 
@@ -1,28 +0,0 @@ 
-************************************************************ 
- 
-First time installations: 
--You must configure SnortSMS. 
- 
-Please browse to the SnortSMS web console and edit the 
-"Global Settings" in the SnortSMS Settings menu. 
-SnortSMS uses the following configuration file: 
-%%PREFIX%%/www/snortsms/conf/conf.php 
-which (if missing) will automatically be created - do not 
-edit this file directly. 
- 
- 
-* NOTE:  SnortSMS requires a local or remote database (MySQL 
-recommended) connection. 
- 
- 
-For how to configure SnortSMS, please read the setup guide 
-located at: 
-http://<SnortSMS_webroot>/contrib/install_snortsms.html 
--or- 
-%%PREFIX%%/www/snortsms/contrib/install_snortsms.html 
- 
- 
-Thank you for using SnortSMS! 
- 
- 
-************************************************************ 
diff -urN security/snortsms.orig/pkg-plist security/snortsms/pkg-plist 
--- security/snortsms.orig/pkg-plist	Fri May 27 22:41:31 2005 
+++ security/snortsms/pkg-plist	Fri May 27 23:11:39 2005 
@@ -20,6 +20,7 @@ 
www/snortsms/barnyard/qry_barnyard.php 
www/snortsms/barnyard/qry_barnyards.php 
www/snortsms/barnyard/qry_selected.php 
+www/snortsms/changelog 
www/snortsms/classifications/act_AddRemove.php 
www/snortsms/classifications/act_Save-Update.php 
www/snortsms/classifications/act_action.php 
@@ -197,8 +198,6 @@ 
www/snortsms/sensorconf/act_clone.php 
www/snortsms/sensorconf/act_delete_sensor.php 
www/snortsms/sensorconf/act_getstats.php 
-www/snortsms/sensorconf/act_pushbarnconf.php 
-www/snortsms/sensorconf/act_pushsnortconf.php 
www/snortsms/sensorconf/act_save_update.php 
www/snortsms/sensorconf/act_sensor_control.php 
www/snortsms/sensorconf/control_sensor.php 
--- snortsms.diff ends here --- 

- there is no /usr/local/www/snortsms/contrib/install_snortsms.html 
(referenced by PKGMESSAGE). 

- it would be safer either to install .htaccess or to add entries to 
httpd.conf; could you please provide one of these methods? 



Responsible-Changed-From-To: freebsd-ports-bugs->thierry 
Responsible-Changed-By: thierry 
Responsible-Changed-When: Fri May 27 21:38:33 GMT 2005 
Responsible-Changed-Why:  

Take it. 


http://www.freebsd.org/cgi/query-pr.cgi?pr=81425 

From: J Randolph <snortsms@servangle.net>
To: bug-followup@FreeBSD.org
Cc: snortsms@servangle.net
Subject: Re: ports/81425: New port: security/snortsms A Snort Sensor Management
 System web interface and monitoring console.
Date: Sat, 28 May 2005 23:18:07 -1000

 Several changes:
 - Fixed missing files.
 - Bumped port version to from 0.11.2 to 0.11.3
 - Removed the recursive flag on chown operation
 - Merged your recommended deltas (except noted below).
 
 In 'Makefile', reverted the following section back as intended action is 
 to give 'www' group read/write permissions to 'www/snortsms/conf' 
 directory which is needed for auto-creation of user config file during 
 run time. Mainly, I don't want to expose *all* the files in this 
 directory as read/write.
 
 # correct permissions
        ${CHMOD} 775 ${PREFIX}/www/snortsms/conf
        ${CHOWN} :${WWWGRP} ${PREFIX}/www/snortsms/conf
 
 Tested port several times (good install, deinstall, reinstall, package), 
 and 'portlint -A' looks fine. Please consider revised port submission 
 below and we should be good.
 
 Thanks,
 J Randolph
 
 ---------Re-subittion of port follows----------
 
 
 # This is a shell archive.  Save it in a file, remove anything before
 # this line, and then unpack it by entering "sh file".  Note, it may
 # create directories; files and directories will be owned by you and
 # have default permissions.
 #
 # This archive contains:
 #
 #       /usr/ports/security/snortsms/
 #       /usr/ports/security/snortsms/pkg-message
 #       /usr/ports/security/snortsms/pkg-descr
 #       /usr/ports/security/snortsms/distinfo
 #       /usr/ports/security/snortsms/Makefile
 #       /usr/ports/security/snortsms/pkg-plist
 #
 echo c - /usr/ports/security/snortsms/
 mkdir -p /usr/ports/security/snortsms/ > /dev/null 2>&1
 echo x - /usr/ports/security/snortsms/pkg-message
 sed 's/^X//' >/usr/ports/security/snortsms/pkg-message << 
 'END-of-/usr/ports/security/snortsms/pkg-message'
 X************************************************************
 X
 XFirst time installations:
 X-You must configure SnortSMS.
 X
 XPlease browse to the SnortSMS web console and edit the
 X"Global Settings" in the SnortSMS Settings menu.
 XSnortSMS uses the following configuration file:
 X%%PREFIX%%/www/snortsms/conf/conf.php
 Xwhich (if missing) will automatically be created - do not
 Xedit this file directly.
 X
 X
 X* NOTE:  SnortSMS requires a local or remote database (MySQL
 Xrecommended) connection.
 X
 X
 XFor how to configure SnortSMS, please read the setup guide
 Xlocated at:
 Xhttp://<SnortSMS_webroot>/contrib/install_snortsms.html
 X-or-
 X%%PREFIX%%/www/snortsms/contrib/install_snortsms.html
 X
 X
 XThank you for using SnortSMS!
 X
 X
 X************************************************************
 END-of-/usr/ports/security/snortsms/pkg-message
 echo x - /usr/ports/security/snortsms/pkg-descr
 sed 's/^X//' >/usr/ports/security/snortsms/pkg-descr << 
 'END-of-/usr/ports/security/snortsms/pkg-descr'
 XSnortSMS is a highly configurable sensor management system that
 Xprovides the ability to remotely manage Snort [and Barnyard] based
 Xintrusion detection systems, push configuration files, and monitor
 Xsystem health and statistics all from a simple Web console.
 X
 XWWW: http://snortsms.servangle.net/
 END-of-/usr/ports/security/snortsms/pkg-descr
 echo x - /usr/ports/security/snortsms/distinfo
 sed 's/^X//' >/usr/ports/security/snortsms/distinfo << 
 'END-of-/usr/ports/security/snortsms/distinfo'
 XMD5 (snortsms-0.11.3.tgz) = 1e9eac271e447283f6a7290ed884fb36
 XSIZE (snortsms-0.11.3.tgz) = 292834
 END-of-/usr/ports/security/snortsms/distinfo
 echo x - /usr/ports/security/snortsms/Makefile
 sed 's/^X//' >/usr/ports/security/snortsms/Makefile << 
 'END-of-/usr/ports/security/snortsms/Makefile'
 X# New ports collection makefile for:   snortsms
 X# Date created:                Mon May 28 16:05:01 CST 2005
 X# Whom:                        J Randolph <snortsms@servangle.net>
 X#
 X# $FreeBSD$
 X#
 X
 XPORTNAME=    snortsms
 XPORTVERSION=    0.11.3
 XCATEGORIES=    security www
 XMASTER_SITES=  http://snortsms.servangle.net/dnloads/
 XEXTRACT_SUFX=  .tgz
 X
 XMAINTAINER=    snortsms@servangle.net
 XCOMMENT=    A Snort Sensor Management System web interface and 
 monitoring console
 X
 XRUN_DEPENDS=    
 ${LOCALBASE}/share/pear/DB.php:${PORTSDIR}/databases/pear-DB \
 X               ${LOCALBASE}/bin/curl:${PORTSDIR}/ftp/curl
 X
 XUSE_PHP=       mysql pcre pcntl
 XNO_BUILD=      yes
 X
 Xdo-install:
 X# Create directory structure
 X        @${MKDIR} ${PREFIX}/www/snortsms
 X# copy files
 X        ${CP} -R ${WRKSRC}/* ${PREFIX}/www/snortsms
 X# correct permissions
 X        ${CHMOD} 775 ${PREFIX}/www/snortsms/conf
 X        ${CHOWN} :${WWWGRP} ${PREFIX}/www/snortsms/conf
 X
 Xpost-install:
 X       @${CAT} ${PKGMESSAGE}
 X
 X.include <bsd.port.mk>
 END-of-/usr/ports/security/snortsms/Makefile
 echo x - /usr/ports/security/snortsms/pkg-plist
 sed 's/^X//' >/usr/ports/security/snortsms/pkg-plist << 
 'END-of-/usr/ports/security/snortsms/pkg-plist'
 Xwww/snortsms/COPYING
 Xwww/snortsms/DefaultLayout.php
 Xwww/snortsms/barnctrl/act_Save-Update.php
 Xwww/snortsms/barnctrl/act_action.php
 Xwww/snortsms/barnctrl/dsp_AddEdit.php
 Xwww/snortsms/barnctrl/dsp_home.php
 Xwww/snortsms/barnctrl/fbx_Switch.php
 Xwww/snortsms/barnctrl/index.php
 Xwww/snortsms/barnctrl/qry_barnctrl.php
 Xwww/snortsms/barnctrl/qry_barnctrls.php
 Xwww/snortsms/barnyard/act_AddRemove.php
 Xwww/snortsms/barnyard/act_Save-Update.php
 Xwww/snortsms/barnyard/act_action.php
 Xwww/snortsms/barnyard/dsp_AddEdit.php
 Xwww/snortsms/barnyard/dsp_home.php
 Xwww/snortsms/barnyard/dsp_import.php
 Xwww/snortsms/barnyard/dsp_selected.php
 Xwww/snortsms/barnyard/fbx_Switch.php
 Xwww/snortsms/barnyard/index.php
 Xwww/snortsms/barnyard/qry_barnyard.php
 Xwww/snortsms/barnyard/qry_barnyards.php
 Xwww/snortsms/barnyard/qry_selected.php
 Xwww/snortsms/changelog
 Xwww/snortsms/classifications/act_AddRemove.php
 Xwww/snortsms/classifications/act_Save-Update.php
 Xwww/snortsms/classifications/act_action.php
 Xwww/snortsms/classifications/dsp_AddEdit.php
 Xwww/snortsms/classifications/dsp_home.php
 Xwww/snortsms/classifications/dsp_import.php
 Xwww/snortsms/classifications/dsp_selected.php
 Xwww/snortsms/classifications/fbx_Switch.php
 Xwww/snortsms/classifications/index.php
 Xwww/snortsms/classifications/qry_classification.php
 Xwww/snortsms/classifications/qry_classifications.php
 Xwww/snortsms/classifications/qry_selected.php
 Xwww/snortsms/conf/act_init_vars.php
 Xwww/snortsms/conf/act_read_conf.php
 Xwww/snortsms/conf/act_save_conf.php
 Xwww/snortsms/conf/act_verify_install.php
 Xwww/snortsms/conf/dsp_conf.php
 Xwww/snortsms/conf/dsp_save_conf.php
 Xwww/snortsms/conf/fbx_Switch.php
 Xwww/snortsms/conf/index.php
 Xwww/snortsms/contrib/snortsms_install.html
 Xwww/snortsms/contrib/SNORTSMS.mysql
 Xwww/snortsms/contrib/snortsms-agent-0.7.0.tgz.gz
 Xwww/snortsms/css/default.css
 Xwww/snortsms/docs/snortsms_install.html
 Xwww/snortsms/dsp_main.php
 Xwww/snortsms/dsp_menu.php
 Xwww/snortsms/fbx_Circuits.php
 Xwww/snortsms/fbx_Fusebox3.0_PHP4.0.6.php
 Xwww/snortsms/fbx_Fusebox3.0_PHP4.1.x.php
 Xwww/snortsms/fbx_Layouts.php
 Xwww/snortsms/fbx_ListFunctions.php
 Xwww/snortsms/fbx_SaveContent.php
 Xwww/snortsms/fbx_Settings.php
 Xwww/snortsms/fbx_Switch.php
 Xwww/snortsms/images/btn_add.gif
 Xwww/snortsms/images/btn_delete.gif
 Xwww/snortsms/images/btn_preview.gif
 Xwww/snortsms/images/btn_save.gif
 Xwww/snortsms/images/btn_submit.gif
 Xwww/snortsms/images/btn_update.gif
 Xwww/snortsms/images/check-0.png
 Xwww/snortsms/images/check-1.png
 Xwww/snortsms/images/check-2.png
 Xwww/snortsms/images/conf-0.png
 Xwww/snortsms/images/conf-1.png
 Xwww/snortsms/images/conf-3.png
 Xwww/snortsms/images/db-0.png
 Xwww/snortsms/images/db-1.png
 Xwww/snortsms/images/db-2.png
 Xwww/snortsms/images/draft-1.png
 Xwww/snortsms/images/hdd-1.gif
 Xwww/snortsms/images/hdd-2.gif
 Xwww/snortsms/images/hdd-3.gif
 Xwww/snortsms/images/led-0.gif
 Xwww/snortsms/images/led-1.gif
 Xwww/snortsms/images/led-2.gif
 Xwww/snortsms/images/led-3.gif
 Xwww/snortsms/images/led2-0.gif
 Xwww/snortsms/images/led2-1.gif
 Xwww/snortsms/images/led2-2.gif
 Xwww/snortsms/images/led2-3.gif
 Xwww/snortsms/images/logo_1.png
 Xwww/snortsms/images/note-1.gif
 Xwww/snortsms/images/snortpanel.gif
 Xwww/snortsms/images/snortpanel2.gif
 Xwww/snortsms/images/trash-1.gif
 Xwww/snortsms/images/view.png
 Xwww/snortsms/import/act_extract_process.php
 Xwww/snortsms/import/act_process_rawtext.php
 Xwww/snortsms/import/act_receive_rulefile.php
 Xwww/snortsms/import/act_receive_snapshot.php
 Xwww/snortsms/import/dsp_home.php
 Xwww/snortsms/import/fbx_Switch.php
 Xwww/snortsms/import/index.php
 Xwww/snortsms/index.php
 Xwww/snortsms/java/cssmenu.js
 Xwww/snortsms/lib/func_DrawRepHeader.php
 Xwww/snortsms/lib/func_GenBarnConf.php
 Xwww/snortsms/lib/func_GenSnortConf.php
 Xwww/snortsms/lib/func_GenToken.php
 Xwww/snortsms/lib/func_Log.php
 Xwww/snortsms/lib/func_ReserveNextID.php
 Xwww/snortsms/lib/func_Rules.php
 Xwww/snortsms/lib/func_curl_error.php
 Xwww/snortsms/lib/func_date.php
 Xwww/snortsms/lib/func_gen_sid-msg.php
 Xwww/snortsms/lib/obj_Rule.php
 Xwww/snortsms/main/dsp_home.php
 Xwww/snortsms/main/fbx_Switch.php
 Xwww/snortsms/main/index.php
 Xwww/snortsms/monitor/act_stats.php
 Xwww/snortsms/monitor/fbx_Switch.php
 Xwww/snortsms/monitor/index.php
 Xwww/snortsms/monitor/query_sensor.php
 Xwww/snortsms/outputs/act_AddRemove.php
 Xwww/snortsms/outputs/act_Save-Update.php
 Xwww/snortsms/outputs/act_action.php
 Xwww/snortsms/outputs/dsp_AddEdit.php
 Xwww/snortsms/outputs/dsp_home.php
 Xwww/snortsms/outputs/dsp_selected.php
 Xwww/snortsms/outputs/fbx_Switch.php
 Xwww/snortsms/outputs/index.php
 Xwww/snortsms/outputs/qry_output.php
 Xwww/snortsms/outputs/qry_outputs.php
 Xwww/snortsms/outputs/qry_selected.php
 Xwww/snortsms/policies/act_AddRemove.php
 Xwww/snortsms/policies/act_Save-Update.php
 Xwww/snortsms/policies/act_action.php
 Xwww/snortsms/policies/act_delete.php
 Xwww/snortsms/policies/dsp_AddEdit.php
 Xwww/snortsms/policies/dsp_home.php
 Xwww/snortsms/policies/dsp_pagenate.php
 Xwww/snortsms/policies/dsp_policy.php
 Xwww/snortsms/policies/dsp_rulecats.php
 Xwww/snortsms/policies/dsp_select.php
 Xwww/snortsms/policies/dsp_selected.php
 Xwww/snortsms/policies/fbx_Switch.php
 Xwww/snortsms/policies/index.php
 Xwww/snortsms/policies/qry_policies.php
 Xwww/snortsms/policies/qry_policy.php
 Xwww/snortsms/policies/qry_rulecats.php
 Xwww/snortsms/policies/qry_rules.php
 Xwww/snortsms/policies/qry_selected.php
 Xwww/snortsms/preprocessors/act_AddRemove.php
 Xwww/snortsms/preprocessors/act_Save-Update.php
 Xwww/snortsms/preprocessors/act_action.php
 Xwww/snortsms/preprocessors/dsp_AddEdit.php
 Xwww/snortsms/preprocessors/dsp_home.php
 Xwww/snortsms/preprocessors/dsp_import.php
 Xwww/snortsms/preprocessors/dsp_selected.php
 Xwww/snortsms/preprocessors/fbx_Switch.php
 Xwww/snortsms/preprocessors/index.php
 Xwww/snortsms/preprocessors/qry_preprocessor.php
 Xwww/snortsms/preprocessors/qry_preprocessors.php
 Xwww/snortsms/preprocessors/qry_selected.php
 Xwww/snortsms/references/act_AddRemove.php
 Xwww/snortsms/references/act_Save-Update.php
 Xwww/snortsms/references/act_action.php
 Xwww/snortsms/references/dsp_AddEdit.php
 Xwww/snortsms/references/dsp_home.php
 Xwww/snortsms/references/dsp_import.php
 Xwww/snortsms/references/dsp_selected.php
 Xwww/snortsms/references/fbx_Switch.php
 Xwww/snortsms/references/index.php
 Xwww/snortsms/references/qry_reference.php
 Xwww/snortsms/references/qry_references.php
 Xwww/snortsms/references/qry_selected.php
 Xwww/snortsms/rules/act_Save-Update.php
 Xwww/snortsms/rules/act_action.php
 Xwww/snortsms/rules/dsp_edit.php
 Xwww/snortsms/rules/dsp_home.php
 Xwww/snortsms/rules/dsp_import.php
 Xwww/snortsms/rules/dsp_pagenate.php
 Xwww/snortsms/rules/dsp_queryform.php
 Xwww/snortsms/rules/dsp_recycle.php
 Xwww/snortsms/rules/dsp_results.php
 Xwww/snortsms/rules/dsp_view.php
 Xwww/snortsms/rules/fbx_Switch.php
 Xwww/snortsms/rules/index.php
 Xwww/snortsms/rules/qry_rule.php
 Xwww/snortsms/rules/qry_rulecats.php
 Xwww/snortsms/rules/qry_rules.php
 Xwww/snortsms/ruletypes/act_AddRemove.php
 Xwww/snortsms/ruletypes/act_Save-Update.php
 Xwww/snortsms/ruletypes/act_delete.php
 Xwww/snortsms/ruletypes/dsp_AddEdit.php
 Xwww/snortsms/ruletypes/dsp_home.php
 Xwww/snortsms/ruletypes/dsp_selected.php
 Xwww/snortsms/ruletypes/fbx_Switch.php
 Xwww/snortsms/ruletypes/index.php
 Xwww/snortsms/ruletypes/qry_ruletype.php
 Xwww/snortsms/ruletypes/qry_ruletypes.php
 Xwww/snortsms/ruletypes/qry_selected.php
 Xwww/snortsms/ruletypes/qry_selectedouts.php
 Xwww/snortsms/sensorconf/act_clone.php
 Xwww/snortsms/sensorconf/act_delete_sensor.php
 Xwww/snortsms/sensorconf/act_getstats.php
 Xwww/snortsms/sensorconf/act_save_update.php
 Xwww/snortsms/sensorconf/act_sensor_control.php
 Xwww/snortsms/sensorconf/control_sensor.php
 Xwww/snortsms/sensorconf/dsp_clone.php
 Xwww/snortsms/sensorconf/dsp_genbarnconf.php
 Xwww/snortsms/sensorconf/dsp_gensnortconf.php
 Xwww/snortsms/sensorconf/dsp_header.php
 Xwww/snortsms/sensorconf/dsp_tab_agent.php
 Xwww/snortsms/sensorconf/dsp_tab_barn.php
 Xwww/snortsms/sensorconf/dsp_tab_main.php
 Xwww/snortsms/sensorconf/dsp_tab_sensor.php
 Xwww/snortsms/sensorconf/dsp_tab_snort.php
 Xwww/snortsms/sensorconf/dsp_tab_status.php
 Xwww/snortsms/sensorconf/fbx_Switch.php
 Xwww/snortsms/sensorconf/index.php
 Xwww/snortsms/sensorconf/qry_assignments.php
 Xwww/snortsms/sensorconf/qry_barn_ctrls.php
 Xwww/snortsms/sensorconf/qry_sensor.php
 Xwww/snortsms/sensorconf/qry_sensor_ctrls.php
 Xwww/snortsms/sensorconf/qry_sensor_lite.php
 Xwww/snortsms/sensorconf/qry_sensors.php
 Xwww/snortsms/sensorconf/qry_snort_ctrls.php
 Xwww/snortsms/sensors/act_delete.php
 Xwww/snortsms/sensors/dsp_home.php
 Xwww/snortsms/sensors/dsp_monitor.php
 Xwww/snortsms/sensors/fbx_Switch.php
 Xwww/snortsms/sensors/index.php
 Xwww/snortsms/sensors/qry_barn_ctrls.php
 Xwww/snortsms/sensors/qry_sensor.php
 Xwww/snortsms/sensors/qry_sensors_active.php
 Xwww/snortsms/sensors/qry_snort_ctrl.php
 Xwww/snortsms/snortctrl/act_Save-Update.php
 Xwww/snortsms/snortctrl/act_action.php
 Xwww/snortsms/snortctrl/dsp_AddEdit.php
 Xwww/snortsms/snortctrl/dsp_home.php
 Xwww/snortsms/snortctrl/fbx_Switch.php
 Xwww/snortsms/snortctrl/index.php
 Xwww/snortsms/snortctrl/qry_snortctrl.php
 Xwww/snortsms/snortctrl/qry_snortctrls.php
 Xwww/snortsms/variables/act_AddRemove.php
 Xwww/snortsms/variables/act_Save-Update.php
 Xwww/snortsms/variables/act_action.php
 Xwww/snortsms/variables/dsp_AddEdit.php
 Xwww/snortsms/variables/dsp_home.php
 Xwww/snortsms/variables/dsp_selected.php
 Xwww/snortsms/variables/fbx_Switch.php
 Xwww/snortsms/variables/index.php
 Xwww/snortsms/variables/qry_selected.php
 Xwww/snortsms/variables/qry_variable.php
 Xwww/snortsms/variables/qry_variables.php
 X@dirrm www/snortsms/variables
 X@dirrm www/snortsms/snortctrl
 X@dirrm www/snortsms/sensors
 X@dirrm www/snortsms/sensorconf
 X@dirrm www/snortsms/ruletypes
 X@dirrm www/snortsms/rules
 X@dirrm www/snortsms/references
 X@dirrm www/snortsms/preprocessors
 X@dirrm www/snortsms/policies
 X@dirrm www/snortsms/outputs
 X@dirrm www/snortsms/monitor
 X@dirrm www/snortsms/main
 X@dirrm www/snortsms/lib
 X@dirrm www/snortsms/java
 X@dirrm www/snortsms/import
 X@dirrm www/snortsms/images
 X@dirrm www/snortsms/docs
 X@dirrm www/snortsms/css
 X@dirrm www/snortsms/contrib
 X@dirrm www/snortsms/conf
 X@dirrm www/snortsms/classifications
 X@dirrm www/snortsms/barnyard
 X@dirrm www/snortsms/barnctrl
 X@dirrm www/snortsms
 END-of-/usr/ports/security/snortsms/pkg-plist
 exit
 
 

From: Thierry Thomas <thierry@FreeBSD.org>
To: J Randolph <snortsms@servangle.net>
Cc: FreeBSD-gnats-submit@FreeBSD.org
Subject: Re: ports/81425: New port: security/snortsms A Snort Sensor Management System web interface and monitoring console.
Date: Sun, 29 May 2005 15:08:43 +0200

 Le Dim 29 mai 05  11:20:15 +0200, J Randolph <snortsms@servangle.net>
  crivait:
 > The following reply was made to PR ports/81425; it has been noted by GNATS.
 > 
 > From: J Randolph <snortsms@servangle.net>
 > To: bug-followup@FreeBSD.org
 > Cc: snortsms@servangle.net
 > Subject: Re: ports/81425: New port: security/snortsms A Snort Sensor Management
 >  System web interface and monitoring console.
 > Date: Sat, 28 May 2005 23:18:07 -1000
 > 
 >  Several changes:
 >  - Fixed missing files.
 >  - Bumped port version to from 0.11.2 to 0.11.3
 >  - Removed the recursive flag on chown operation
 >  - Merged your recommended deltas (except noted below).
 >  
 >  In 'Makefile', reverted the following section back as intended action is 
 >  to give 'www' group read/write permissions to 'www/snortsms/conf' 
 >  directory which is needed for auto-creation of user config file during 
 >  run time. Mainly, I don't want to expose *all* the files in this 
 >  directory as read/write.
 >  
 >  # correct permissions
 >         ${CHMOD} 775 ${PREFIX}/www/snortsms/conf
 >         ${CHOWN} :${WWWGRP} ${PREFIX}/www/snortsms/conf
 
 OK for CHMOD, but why don't you chown everything to www:www?
 
 Also, don't you need a .htaccess in this directory?
 
 And when the operator will upgrade this port to a newer version, these
 files will be erased; is it not a problem?
 
 >  Tested port several times (good install, deinstall, reinstall, package), 
 >  and 'portlint -A' looks fine. Please consider revised port submission 
 >  below and we should be good.
 
 Could you please check if you have send the right file? porlint -A still
 reports many problems here:
 
 "Makefile", line 25: Need an operator
 "Makefile", line 27: Need an operator
 "Makefile", line 29: Need an operator
 "Makefile", line 33: Missing dependency operator
 make: fatal errors encountered -- cannot continue
 FATAL: Makefile [8]: use a tab (not space) after a variable name
 FATAL: Makefile [9]: use a tab (not space) after a variable name
 FATAL: Makefile [10]: use a tab (not space) after a variable name
 FATAL: Makefile [11]: use a tab (not space) after a variable name
 FATAL: Makefile [12]: use a tab (not space) after a variable name
 FATAL: Makefile [14]: use a tab (not space) after a variable name
 FATAL: Makefile [15]: use a tab (not space) after a variable name
 FATAL: Makefile [17]: use a tab (not space) after a variable name
 WARN: Makefile [18]: use tab (not space) to make indentation
 FATAL: Makefile [20]: use a tab (not space) after a variable name
 FATAL: Makefile [21]: use a tab (not space) after a variable name
 WARN: Makefile [25]: use tab (not space) to make indentation
 WARN: Makefile [27]: use tab (not space) to make indentation
 WARN: Makefile [29]: use tab (not space) to make indentation
 WARN: Makefile [30]: use tab (not space) to make indentation
 FATAL: Makefile: CATEGORIES left blank. set it to "misc" if nothing seems apropriate.
 FATAL: Makefile: either PORTVERSION or DISTVERSION must be specified
 Syntax error: Unterminated quoted string
 WARN: Makefile: COMMENT should begin with a capital, and end without a period
 FATAL: breaks INDEX ("Makefile", line 25: Need an operator "Makefile", line 27: Need an operator "Makefile", line 29: Need an operator "Makefile", line 33: Missing dependency operator make: fatal errors encountered -- cannot continue).
 13 fatal errors and 6 warnings found.
 
 Note: it might be due to your mailer which could replace tabs by spaces.
 If this is a case, consider using uuencode or send a tar.gz.
 
 Best regards,
 -- 
 Th. Thomas.

From: J Randolph <snortsms@servangle.net>
To: Thierry Thomas <thierry@FreeBSD.org>
Cc: FreeBSD-gnats-submit@FreeBSD.org
Subject: Re: ports/81425: New port: security/snortsms A Snort Sensor Management
 System web interface and monitoring console.
Date: Sun, 29 May 2005 11:22:55 -1000

 This is a multi-part message in MIME format.
 --------------000306030700060202030209
 Content-Type: text/plain; charset=ISO-8859-1; format=flowed
 Content-Transfer-Encoding: 7bit
 
 -snip-
 
 >> 
 >> In 'Makefile', reverted the following section back as intended action is 
 >> to give 'www' group read/write permissions to 'www/snortsms/conf' 
 >> directory which is needed for auto-creation of user config file during 
 >> run time. Mainly, I don't want to expose *all* the files in this 
 >> directory as read/write.
 >> 
 >> # correct permissions
 >>        ${CHMOD} 775 ${PREFIX}/www/snortsms/conf
 >>        ${CHOWN} :${WWWGRP} ${PREFIX}/www/snortsms/conf
 >>    
 >>
 >
 >OK for CHMOD, but why don't you chown everything to www:www?
 >
 >Also, don't you need a .htaccess in this directory?
 >
 >And when the operator will upgrade this port to a newer version, these
 >files will be erased; is it not a problem?
 >
 >  
 >
 The 'conf' dir also contains some application files we don't want 
 writable by the web server for security reasons. Consider the following 
 scenario...
 Here's a directory listing for 'www/snortsms/conf' after the user saves 
 their initial configuration settings via running the application:
 2 drwxrwxr-x   2 root  www     512 May 29 10:10 ./
  2 drwxr-xr-x  25 root  wheel  1024 May 29 10:09 ../
  6 -rw-r--r--   1 root  wheel  4470 May 29 10:09 act_init_vars.php
  2 -rw-r--r--   1 root  wheel  1926 May 29 10:09 act_read_conf.php
  4 -rw-r--r--   1 root  wheel  2819 May 29 10:09 act_save_conf.php
  4 -rw-r--r--   1 root  wheel  4011 May 29 10:09 act_verify_install.php
  2 -rw-r--r--   1 www   www     758 May 29 10:10 conf.php
  4 -rw-r--r--   1 root  wheel  2584 May 29 10:09 dsp_conf.php
  2 -rw-r--r--   1 root  wheel  1858 May 29 10:09 dsp_save_conf.php
  2 -rw-r--r--   1 root  wheel   851 May 29 10:09 fbx_Switch.php
  2 -rw-r--r--   1 root  wheel   103 May 29 10:09 index.php
 
 Note the new file generated => 'conf.php' which is the actual config 
 file. The worst damage user 'www' can do is trash the config file and/or 
 create new files. True, .htaccess can be done, but I prefer the file 
 permissions method, especially if we were dealing with an potential web 
 exploit. So the resulting effect is that all application system files 
 are still protected. I hope this is acceptable for now, but I will still 
 consider .htaccess - just let me know.
 
 As far a upgrading the port, user settings are preserved because the 
 config file 'conf.php' will get abandoned, while all other system files 
 can blow in fresh.
 
 >Could you please check if you have send the right file? porlint -A still
 >reports many problems here:
 >
 >"Makefile", line 25: Need an operator
 >"Makefile", line 27: Need an operator
 >"Makefile", line 29: Need an operator
 >"Makefile", line 33: Missing dependency operator
 >make: fatal errors encountered -- cannot continue
 >FATAL: Makefile [8]: use a tab (not space) after a variable name
 >FATAL: Makefile [9]: use a tab (not space) after a variable name
 >FATAL: Makefile [10]: use a tab (not space) after a variable name
 >FATAL: Makefile [11]: use a tab (not space) after a variable name
 >FATAL: Makefile [12]: use a tab (not space) after a variable name
 >FATAL: Makefile [14]: use a tab (not space) after a variable name
 >FATAL: Makefile [15]: use a tab (not space) after a variable name
 >FATAL: Makefile [17]: use a tab (not space) after a variable name
 >WARN: Makefile [18]: use tab (not space) to make indentation
 >FATAL: Makefile [20]: use a tab (not space) after a variable name
 >FATAL: Makefile [21]: use a tab (not space) after a variable name
 >WARN: Makefile [25]: use tab (not space) to make indentation
 >WARN: Makefile [27]: use tab (not space) to make indentation
 >WARN: Makefile [29]: use tab (not space) to make indentation
 >WARN: Makefile [30]: use tab (not space) to make indentation
 >FATAL: Makefile: CATEGORIES left blank. set it to "misc" if nothing seems apropriate.
 >FATAL: Makefile: either PORTVERSION or DISTVERSION must be specified
 >Syntax error: Unterminated quoted string
 >WARN: Makefile: COMMENT should begin with a capital, and end without a period
 >FATAL: breaks INDEX ("Makefile", line 25: Need an operator "Makefile", line 27: Need an operator "Makefile", line 29: Need an operator "Makefile", line 33: Missing dependency operator make: fatal errors encountered -- cannot continue).
 >13 fatal errors and 6 warnings found.
 >
 >Note: it might be due to your mailer which could replace tabs by spaces.
 >If this is a case, consider using uuencode or send a tar.gz.
 >
 >  
 >
 Hummm....you're right... looks like all the tabs got hosed. My 
 apologies, let me try another method. Give this attached tarball a try.
 
 V/R,
 
 J Randolph
 
 
 --------------000306030700060202030209
 Content-Type: application/octet-stream;
  name="snortsms-port-0.11.3.tar.gz"
 Content-Transfer-Encoding: base64
 Content-Disposition: attachment;
  filename="snortsms-port-0.11.3.tar.gz"
 
 H4sIABCKmUIAA+2be3PbNhLA+6/5KXBtMpN2Tu+HU0/cqWPJri+W7BOdc3qP0VAkJLHhKwBo
 Rdfxd78F+JAoASB79eVyOWEmccj94bW7WCxAh2I7Ji5bN2gQEkZ9+tXTl2azedzrIf4Tyu7P
 5KHVbHf77WNeULPV7febX6Hef2AseyWmzCIwFBKGTMetlhh7Gvnu5P5HCt21fyN6v6j5mFJr
 gZ+oD9BHv9tV2r/VOe4I+zePu61Wk9v/uNltf4WaT9S/tvyf2/+731EM48IllCHm+hi5ASjS
 8yzmhgE9MWo/hzHyQbnIDoO5u4gJRiZ3MXNk1g3j1sMWxWhGwhX8YCFiy40crfCMV6Ohh5EV
 OAg7LuOE8fWlF84sD5mYMTdY0K+h22LVTIJ8HMR1I38fU0wFOQ89L1wBkg9MDBnNXQ+fGM+f
 306GF1fvnj9vrFarzaLgrPirHi0jY7V07SV64c6R71IKbX2LVq7nIStmoQ/N2aCINZphZBNs
 MeygGnJCFITMSGfiUtEfclyCbeatQSPGd2h8czc8QZu5EPwhBoAiC3khtIlCAu/8kEFFi1kz
 rsEXo7X552sDmgl9mLKDnW/5xAJoFmbF272AWstwxZW8b4o/oiixBAzUEfqhmMURWsSugw3e
 Kx++xU6MJWPRSaPxKqs5BSPxNfMDVwsj7qyResA0U1p9yXzPqIWkplOrpqph3C2t4D1agyvN
 YRYxV3U+9D9wnf0e7/1vL73Posjjv4OpTZ6sj5L43+z22kn877X7vX4X4n+/1+4c4v+nKHmw
 cXmYWbqLJUSuPDLOPB4QIBAT5FsBZAQQYhiia8qwD9HCYsiISPgAsSIJrtbM9cCZeKxJAhU0
 llRMli36Gw/nry0SrC3i/APxEOYgw4UoAIsborCDWRK50k4oBKiYLiWxGiS8LT8MXAbDM9JB
 LbHlsaUQgWGZSyEaw8wgOM9J6MMUqetDyEP3my0GguT9/f0JSiNcHoMoJg9WsAAgwKzxhYaL
 /fXvcJ0F8/Dp+ihb/61uK83/+51Ot8fXf7d3fFj/n6KMBj30IrN9rVlvteqdOlv881t0ilr4
 e2zZ7eMW7naP2y8787513P6+iZ2XL7vzWadvmFd/HSprt7+HKt0vdNl8MWV//Y+s95gH2Kfr
 o+z81+v18/N/GwSw/jv9w/7/Sco3aIxXKOK2h/3Q89Ld10+dgOfdJ0eZbxjfoAEcCLJjzcnR
 0QjYkbVG7Zeo1T9p9k6aLXRu3iEwYw/o+2XoA3X0JzSBHTn0oiV6lTX2Y2F//cH4BvhnFwTj
 1+bgGTwZtzeTu/HZaHi66Z+/+stwYl7djE+PknBjnJ/dDS9vJldDE8DUmxGcMozRmXk3nEzN
 qzsu0u/uTuCFlkMbxvDd3eTs/G5qvr14d3rEY5kBDV2N7+DPcLIZSnH0xvnNaDQc350enaWJ
 jplkTaNN1mQmCQo/20K+g8ncsvF2CpMeSXlGYhiTt+PpYHg7HA9g6M9+vb45P7t+fWYOHxt0
 aRHciLBFGoPX/DR68uxXrhZzcDV5bGTnQiqI2uA1+rtxVGxg5gYN0JJXqDdnkXhpGG/N4fT2
 p9vTI39NP3goAlvDXwHzjPHN9PXbq+vB6dEaU8Nwwlp6bDsBy50Ll0gPtCFZQ/ZFYpvBWdM4
 +vHZr6M3vBsEXYpz4GPhGAjV7TBaJ2mdAaM9v31EtQnQ95M35uT8sfGdribhXaIIE3EYBw2K
 Jn4a3Qwe0fFxT1FVnOYT8uZ+/IhAHZAFXk5uVaNMKhhRSNlm4nxu4ICizpvL0dA0zy6Hj4ZR
 dwPbix2MXs2oU+fLq+6//+Ez3Azl57/IgyTwyfrQx/92Jzv/QfzvdtLzX/+Q/32SUvDw85vb
 n6/Gl0bh5QDPrdhj19Y6jFly/bUtnsFhzmbEa1g2m5rWA669jSAK4RLSSu6n1JBDo+mZ4wwd
 V9cpp2CP0fU2n32cmiuX2UsN5AYO/qiRfyDrafZQEaNyjh98hQZgchM4Iz8oxp5zpTrNSZ1O
 BVSq05xS6zRH4BzNw5oeophnFNjRYGX2EZDGPkKeKZ4/VMR09uGceuj2EjZ+7IWLndeeBfvP
 3LWTO/AyI8twra1lFVQm32W1lpfBcgeQkSo/kLEane7QOq/YZRXOsYtxoxbf/Tt1JG4jq6SZ
 Kf+UwG3nQto3fbCIrMWM4dfy0813BylDwWnKmAdM3Pl6muYtCpBbSNOOMGBJX1qzcUBlq/RD
 QPYiH6n4ECBFzTHPXkdmXSSq+uZqkIQHrNasH9ebPKevQ1pfrEDBQZONrg7/Lgqd0KZVRsYV
 5FuuxK2EhH+Q2pNwhZ27xI5dJvEDLr2IKZ6FHzv1Js/LuzCBfjWwVZcomoPJVq7o7hoyv4s4
 sBW+LgwMTnAOGgaVKoD0I5xCqvAP1wcrQRBmwdRynPrCnSvlDqwuCJE6JCL4wcUrLcO9WQ/E
 Mx8ipg6Jk2itQuwltt+D40XBQiNvlcjbajksKl3zXKxpnYs7SrEz0zQNQnXDIFSP2SHWnGkq
 Lx0HpCqNcmlbK+0opR52YEY6qbpfLlX3y6Xaftv6jtv6ntv6rtu6vsNFOFUrOwgZ1vQtniMr
 wF4FRD1GRiy61HQjlqpkiDy1EBsY/ghNwM+IhDamksiyxabMlFgrBvW0LME2dmFPI7EnLrwq
 wTSwIroM1S2rM6gU0MdBgSh2SsXrX6wHi+9iYpf5ZWcD82ArnENMnw5AJRMc/QRZBSb7jeTc
 JQ74R7pz6Ua/TYnLrnLsLnyPJdtijlyHC410gvllGx6DLa8GOg5sKPGMXM4vuKaYkFA3dXnu
 nYshj5hS16n5VDHicPaLGMi+lKcGGs8QYp1fCEBh/vQOMckHmSXb3DNE20XKlPTyIcYixeVX
 nPsU5BYRpBdl559tTHvu2QZV552M0Z5ztiG5DbYJdQafUTpNZoxCk5mYHxWSf1dhJFbdhtQj
 jkLPtV1capMCpzVKgVRZpQClOZsa0tquQMmNV0AinvHrRy4w/rAugfjeYEvXVAFL1F8J0tpI
 51Y5pPCrXM79IXuogul0wKEKOsiwMkajAoLTvTsk5b66B+sddg9Xem2B1HvlHqpwzT1OdWuy
 T1ZVl9ZtCqTKdwqQ8IytN7+Vl3nBXgX13AieY4IDuzxm7ZBaJ9hhVR6whWnNv8PJbb8DqQy/
 g1XSjM7kW5jC3luEWLrZY3VSYuMdVDMNHikqWCzHlMYSBNcZlhsplyvsk8uVpskJ9a6yYURy
 NA+Jr4PgJLG2ZUniNkJjTxZwN0hyapLLtb4hCJVbCGEWzMvk8j2hyCgAto4qrO4CWOoqG1SV
 bmwo/dIuYGrP2TB6V0+4MqMklMYwCZAplj9V5bRGKF+q+5z8CjE5FOT3zrYXBpIh7lCJrZQH
 ih16gZniiLMDisvqWOEtu6x4nIqL41ByQb6Fp0yV4Yob9VIVcAriivhwKD1K77NCVAleKs76
 OxizZlNxSV6J5EOtBMqvwyVgRWUKNJBGaRkJbhLr/US3IrcwxZLcIvjS4J+BFgH/bR99p9ln
 yKniO/EOWkE3G+w3tTn13JK1sWErtMnf6/vXx+aMUYfcbSK9jVBD5bZVxtpMXM1StIKZthkq
 khnZdldgc3VKOLH+K/3aRRFVZVEbSrstFjGFjXJGa4CcUpkgB3JllOmiAEqs9WARl/+fhtKs
 owhq1VtEVerdUFr1FjG5eouMetfecDozbCiFGTaAPkkoctlTVS4x1o+OS4iP5LxUmltbLk1W
 k0YmfqdPJs5zHqVUIcnPP1Jx4QgsJ9KrEqkwve2TytJwKJfBNiwVeO5M+p5/TpAKkjOSQsQ/
 5UhF/Au6VMC/tUvfJx/wVTK5zXZ+D0PKZL/ioxSqnOkz/N3NQzmUQzmUQzmUQzmUQzmUQzmU
 QzmUQzmUKuVfqVALKwBQAAA=
 --------------000306030700060202030209--

From: Thierry Thomas <thierry@FreeBSD.org>
To: J Randolph <snortsms@servangle.net>
Cc: FreeBSD-gnats-submit@FreeBSD.org
Subject: Re: ports/81425: New port: security/snortsms A Snort Sensor Management System web interface and monitoring console.
Date: Mon, 30 May 2005 21:32:51 +0200

 --dDRMvlgZJXvWKvBx
 Content-Type: text/plain; charset=iso-8859-1
 Content-Disposition: inline
 Content-Transfer-Encoding: 8bit
 
 Le Dim 29 mai 05  23:22:55 +0200, J Randolph <snortsms@servangle.net>
  crivait:
 
 > Note the new file generated => 'conf.php' which is the actual config 
 > file. The worst damage user 'www' can do is trash the config file and/or 
 > create new files. True, .htaccess can be done, but I prefer the file 
 > permissions method, especially if we were dealing with an potential web 
 > exploit. So the resulting effect is that all application system files 
 > are still protected. I hope this is acceptable for now, but I will still 
 > consider .htaccess - just let me know.
 
 OK, thanks for the explanation. Without .htaccess, anybody could run any
 php script directly if he knows its name; but perhaps is there no risk
 in this case?
 
 And I still don't understand why you don't want to
 ${CHOWN} -R ${WWWOWN}:${WWWGRP} ${PREFIX}/www/snortsms
 
 Anyway, there is still a problem locally: everybody can read
 /usr/local/www/snortsms/conf/conf.php, and it contains an unencrypted
 password.
 
 > As far a upgrading the port, user settings are preserved because the 
 > config file 'conf.php' will get abandoned, while all other system files 
 > can blow in fresh.
 
 OK, fine! Hereunder is a patch removing a warning during deinstallation
 if this file exists.
 
 This patch also removes the GPL, and uses pkg-message.in to expand
 %%PREFIX%%.
 
 Best regards,
 -- 
 Th. Thomas.
 
 --dDRMvlgZJXvWKvBx
 Content-Type: text/plain; charset=us-ascii
 Content-Disposition: attachment; filename="snortsms.diff"
 
 diff -urN security/snortsms.orig/Makefile security/snortsms/Makefile
 --- security/snortsms.orig/Makefile	Sun May 29 10:34:08 2005
 +++ security/snortsms/Makefile	Mon May 30 21:08:15 2005
 @@ -20,11 +20,15 @@
  USE_PHP=	mysql pcre pcntl
  NO_BUILD=	yes
  
 +SUB_FILES=	pkg-message
 +PKGMESSAGE=	${WRKDIR}/pkg-message
 +
  do-install:
  # Create directory structure
  	@${MKDIR} ${PREFIX}/www/snortsms
  # copy files
  	${CP} -R ${WRKSRC}/* ${PREFIX}/www/snortsms
 +	${RM} ${PREFIX}/www/snortsms/COPYING
  # correct permissions
  	${CHMOD} 775 ${PREFIX}/www/snortsms/conf
  	${CHOWN} :${WWWGRP} ${PREFIX}/www/snortsms/conf
 diff -urN security/snortsms.orig/files/pkg-message.in security/snortsms/files/pkg-message.in
 --- security/snortsms.orig/files/pkg-message.in	Thu Jan  1 01:00:00 1970
 +++ security/snortsms/files/pkg-message.in	Mon May 30 21:05:53 2005
 @@ -0,0 +1,28 @@
 +************************************************************
 +
 +First time installations:
 +-You must configure SnortSMS.
 +
 +Please browse to the SnortSMS web console and edit the
 +"Global Settings" in the SnortSMS Settings menu.
 +SnortSMS uses the following configuration file:
 +%%PREFIX%%/www/snortsms/conf/conf.php
 +which (if missing) will automatically be created - do not
 +edit this file directly.
 +
 +
 +* NOTE:  SnortSMS requires a local or remote database (MySQL
 +recommended) connection.
 +
 +
 +For how to configure SnortSMS, please read the setup guide
 +located at:
 +http://<SnortSMS_webroot>/contrib/snortsms_install.html
 +-or-
 +%%PREFIX%%/www/snortsms/contrib/snortsms_install.html
 +
 +
 +Thank you for using SnortSMS!
 +
 +
 +************************************************************
 diff -urN security/snortsms.orig/pkg-message security/snortsms/pkg-message
 --- security/snortsms.orig/pkg-message	Thu May 12 22:53:27 2005
 +++ security/snortsms/pkg-message	Thu Jan  1 01:00:00 1970
 @@ -1,28 +0,0 @@
 -************************************************************
 -
 -First time installations:
 --You must configure SnortSMS.
 -
 -Please browse to the SnortSMS web console and edit the
 -"Global Settings" in the SnortSMS Settings menu.
 -SnortSMS uses the following configuration file:
 -%%PREFIX%%/www/snortsms/conf/conf.php
 -which (if missing) will automatically be created - do not
 -edit this file directly.
 -
 -
 -* NOTE:  SnortSMS requires a local or remote database (MySQL
 -recommended) connection.
 -
 -
 -For how to configure SnortSMS, please read the setup guide
 -located at:
 -http://<SnortSMS_webroot>/contrib/install_snortsms.html
 --or-
 -%%PREFIX%%/www/snortsms/contrib/install_snortsms.html
 -
 -
 -Thank you for using SnortSMS!
 -
 -
 -************************************************************
 diff -urN security/snortsms.orig/pkg-plist security/snortsms/pkg-plist
 --- security/snortsms.orig/pkg-plist	Sun May 29 10:10:28 2005
 +++ security/snortsms/pkg-plist	Mon May 30 21:04:32 2005
 @@ -1,4 +1,3 @@
 -www/snortsms/COPYING
  www/snortsms/DefaultLayout.php
  www/snortsms/barnctrl/act_Save-Update.php
  www/snortsms/barnctrl/act_action.php
 @@ -268,8 +267,8 @@
  @dirrm www/snortsms/docs
  @dirrm www/snortsms/css
  @dirrm www/snortsms/contrib
 -@dirrm www/snortsms/conf
 +@unexec rmdir %D/www/snortsms/conf 2>/dev/null || true
  @dirrm www/snortsms/classifications
  @dirrm www/snortsms/barnyard
  @dirrm www/snortsms/barnctrl
 -@dirrm www/snortsms
 +@unexec rmdir %D/www/snortsms 2>/dev/null || true
 
 --dDRMvlgZJXvWKvBx--

From: J Randolph <snortsms@servangle.net>
To: Thierry Thomas <thierry@FreeBSD.org>
Cc: FreeBSD-gnats-submit@FreeBSD.org
Subject: Re: ports/81425: New port: security/snortsms A Snort Sensor Management
 System web interface and monitoring console.
Date: Mon, 30 May 2005 11:38:52 -1000

 This is a multi-part message in MIME format.
 --------------010209010000090403030300
 Content-Type: text/plain; charset=us-ascii; format=flowed
 Content-Transfer-Encoding: 7bit
 
 
 Thanks for your assistance on this. Perhaps I can provide additional 
 explanations below.
 
 >OK, thanks for the explanation. Without .htaccess, anybody could run any
 >php script directly if he knows its name; but perhaps is there no risk
 >in this case?
 >  
 >
 Good catch, but no risk remotely, because php interprets the 'conf.php' 
 file as a valid script rather than displaying the contents given it were 
 directly accessed.
 
 >And I still don't understand why you don't want to
 >${CHOWN} -R ${WWWOWN}:${WWWGRP} ${PREFIX}/www/snortsms
 >  
 >
 We're just not comfortable with the php scripts being writable by 
 user/group 'www' in the event something nasty goes wrong with the web 
 server. We had an incident last year when a phpbb site was exploited and 
 anything that was writable by www got defaced, including other virtual 
 sites on the same box. For this reason we prefer keeping the web 
 application files read only.
 
 >Anyway, there is still a problem locally: everybody can read
 >/usr/local/www/snortsms/conf/conf.php, and it contains an unencrypted
 >password.
 >
 >  
 >
 This is true. For that matter, the same password is also viewable via 
 the application itself via the settings web page to whomever can access 
 to the URI. The SnortSMS application lacks security mechanisms itself 
 because its an administration tool, therefore it's assumed to run in an 
 already secured administrative environment, which includes limited local 
 users on the box, limited privileges on the mysql account, and access 
 restrictions (ACL's) on the url. Might be worthy to note this in our 
 documentation?
 
 I merged your patches, all looks good on this end. Attached is the 
 revised port. Thank you again for your help and time.
 
 V/R,
 
 J Randolph
 
 
 --------------010209010000090403030300
 Content-Type: application/octet-stream;
  name="snortsms-port-0.11.3.tar.gz"
 Content-Transfer-Encoding: base64
 Content-Disposition: attachment;
  filename="snortsms-port-0.11.3.tar.gz"
 
 H4sIAD6Hm0IAA+2be3PbNhLA+6/5KXBtMtN2Tu9X6qkzsS3Z9dWyfaJzbu8xGoqEJCZ8BQCt
 6Fp/91uAD4kSALKtJ73rCTOxRO4PD+4uFgtQodiOicvWDRqEhFGfNj579tJsNge9HuKfUHY/
 k4tWs93t9wedLnxvtrqDVv8z1Hv+oeyXmDKLwFBIGDIdt1pi7Gnkuw/3P1Lonv3nrofps/bx
 C+zf7rb7YP/eoNc82P9TFIX9G9H7Rc3HlFoLXHeD39YH6KPf7Srt3+oMWkX7t5u9fvcz1Hye
 R9SX/3P7f/0bimFcuIQyxFwfIzcARXqexdwwoMdG7ccwRj4oF9lhMHcXMcHI5C5mjs26Ydx5
 2KIYzUi4gg8WIrbcyNEKz3g1GnoYWYGDsOMyThifX3rhzPKQiRlzgwX9HLotVs0kyMdBXDfy
 +zHFVJDz0PPCFSD5wMSQEXf7Y+Pl3WR0cfXDy5eN1Wq1mRMcFX/q0TIyVkvXXqIv3TnyXUqh
 qa/QyvU8NIPRxiz0oUEbVLFGNsEWww6qoQA/YmKkz+FS0RtyXIJt5q1BH8bX6Ob2fnSMNk9C
 8IcYAIos5IXQHgoJ3PNDBhUtZs24/r4cr82/XhvQTOjDAzvY+Yo/VgDNwjPxdi+g1jJccRXv
 G+LPKErsAON0hHYoZnGEFrHrYIP3ykdvsWNjyVh03Gh8m9Wcgon4jHnNtcKIO8t1NU0dob5k
 vmfUQlIzXqq1qqlqGPdLK3iP1uBIc3iKmGs6H/qfuM5+i+/+3hPvv6Tsx38e+R1MbfJsfZTE
 /2a31xbxv9lr9yHww/rf77U7h/j/KUoeblweaJbuYsnjVhYZZx4PCRCICfKtAHIBCDIM0TVl
 2Id4YTFkRCR8hGiRBFdr5nrgTDzaJKEKGksqJhMX/YOH8zOLBGuLOP9CPIg5yHAhDsD0hijs
 YJbErrQTCiEqpktJrAYJb8sPA5fB8Ix0UEtseWwpRGBY5lKIxfBkEJ3nJPThEanrQ9BDD5sl
 BsLkw8PDMUpjXDYR6hSTRytYABBg1viDBoz9+e9wnQXz8Pn6KJv/rW6a/7X7nU63x+d/tzc4
 zP9PUcbDHvoys32tWW+16p06W/z7K3SCWvgbbNntQQt3u4P2q868bw3a3zSx8+pVdz7r9A3z
 6u8jZe32N1Cl+wedNn+Ysj//x9Z7zAPs8/VRtv8btPr5/q85aPP53+kf5v8nKV+gG7xCEbc9
 rIeel66+fuoEPPM+Psp8w/gCDWFLkO1rjo+OxsCOrTVqv0Kt/nGzd9xsoXPzHrWbzR7QD8vQ
 B+roL2gCK3LoRUv0bdbYm8L6+tr4AvgXFwTjM3P4Aq6Mu9vJ/c3peHSy6Z/f+ttoYl7d3pwc
 JeHGOD+9H13eTq5GJoCpNyPYZxjjU/N+NJmaV/dcpF/dncALLYc2jNEP95PT8/up+fbih5Mj
 HssMaOjq5h7+jSaboRRHb5zfjsejm/uTo9M00TGTrGm8yZrMJEHhe1vIdzCZWzbeTmHSLSnP
 SAxj8vZmOhzdjW6GMPQXP13fnp9en52ao6cGXVoENyJskcbwjG9Hj1/8xNViDq8mT41sZ0gF
 URueoX8aR8UGZm7QAC15hXpzFombhvHWHE3vvrs7OfLX9IOHIrA1/AmYZ9zcTs/eXl0PT47W
 mBqG+fZsenF1zXW7dVhk3H1/OR6Z5unliA/8YfK9aH+bMJywlu70jsHm58KZ0s1wSNaQt5HY
 ZrBPNY7evPhpLBpAMFixh3wqbCGhuh1G6yQhNKC/87snVJsg0bE5OX9qfK2qCfBkrGq3cX57
 9+PVzaVon/CBoQgTsdsHC4mOvhvfDp/QYNBTNcFT1oS8fbh5QqBuyDIvJ3fKPkUFIwop26iH
 awAcXNTJFftkGHU3sL3YwejbGXXqfPrW/fevf8ViK9//RR4kgc8WY/Txv93ptTfnf/10/zdo
 HeL/pygFDxziuRV77NpahzFLjrq2xTPYt9mMeA3LZlPTesS1txEEHFxCWslhlBpyaDQ9dZyR
 4+o65RQsJ7re5rOPU3PlMnupgdzAwR818g9kPc0uKmJUzvE9rtAAPNwEtsOPirHnXKlOc1Kn
 UwGV6jSn1DrNEdgy8wijhyjmyQN2NFiZfQSksY+QZ4rnFxUxnX04px66vYQ1HnvhYue2Z8FS
 MHft5Li7zMgyXGtrWQWVyXdZreVlsNwBZKTKD2SsRqc7tM4rdlmFc+xi3KjFe7+mjsRtZJU0
 T8pfG3DbuZDhTR8tImsxY/gZ/HTzjkHKUHCaMuYRE3e+zs/S5SC3kKYdYcCSvrRm44DKVtpT
 fylq3vBEdWzWRU6qb64GKWbAas36oN7k6XsdMvhiBQoOmix0dfheFDqhTauMjCvIt1yJWwkJ
 f/e0J+EKO3eJHbtM4gdcehFTPAs/dupNnoJ34QH61cBWXaJoDiZLuaK7a0jyLuLAVvi6MDA4
 wTloGFSqANL3bQqpwj9cH6wEQZgFU8tx6gt3rpQ7MLsgROqQiOBHF6+0DPdmPRDPfIiYOiRO
 orUKsZfYfg+OFwULjbxVIm+r5TCpdM1zsaZ1Lu4oxc5M0zQI1Q2DUD1mh1hzpqm8dByQqjTK
 pW2ttKOUetiBJ9JJ1f1yqbpfLtX229Z33Nb33NZ33db1HS7CqVrZQciwpm9xHVkB9iog6jEy
 YtGlphsxVSVD5KmFWMDwR2gCPiMS2phKIssWmzJTYq0Y1NOysI3HLqxpJPbE2VYlmAZWRJeh
 umV1BpUC+jgoEMVKqbj9znq0+ComVpl3OwuYB0vhHGL6dAgqmeDoO8gqMNlvJOcuccDfx51L
 F/ptSpxrlWP34XssWRZz5DpcaKQTzM/V8A3Y8mqo48CGEs/I5fwsa4oJCXWPLs+9czHkEVPq
 OjWfKkYczt6JgexLeWqg8Qwh1vmFABTmT48Lk3yQWbLFPUO0XaRMSS8fYixSXH6auU9BbhFB
 elG2/9nGtPuebVC138kY7T5nG5LbYJtQZ/AZpdNkxig0mYn5ViH5XoWRWHUbUo84Cj3XdnGp
 TQqc1igFUmWVApTmbGpIa7sCJTdeAYl4xq8fucD4xboE4muDLZ1TBSxRfyVIayOdW+WQwq9y
 OfeH7KIKptMBhyroIMPKGI0KCE7X7pCU++oerHfYPVzptQVS75V7qMI19zjVqck+WVVdWrcp
 kCrfKUDCM7bu/FJe5gV7FdTPRvAcExzY5TFrh9Q6wQ6r8oAtTGv+HU5u+x1IZfgdrJJmdCbf
 whT23iLE1M0uq5MSG++gmsfgkaKCxXJMaSxBcJ1huZFyucI+uVxpmpxQryobRiRH85D4Ogh2
 EmtbliRuIzT2ZAF3gyS7Jrlc6xuCULmFEGbBvEwuXxOKjAJg66jC7C6Apa6yQVXpxobST+0C
 pvacDaN39YQrM0pCaQyTAJli+VVVTmuE8qm6z8mPEJNNQX7ubHthIBniDpXYSrmh2KEXmCm2
 ODugOKyOFd6yy4rLqTg4DiUH5Ft4ylQZrjhRL1UBpyCuiBeH0q30PitEleClYq+/gzFrNhWH
 5JVIPtRKoPw4XAJWVKZAA2mUlpHgJrHeT3QzcgtTTMktgk8N/hpoEfAf9ug7zV5DThXviXfQ
 CrrZYL+ozannlsyNDVuhTX5f378+NmeMOuRuE+lphBoqt60y1mbiapaiFcy0zVCRzMiWuwKb
 q1PCiflf6WcXRVSVRW0o7bJYxBQ2yhmtAXJKZYIcyJVRposCKLHWo0Vc/t8XSrOOIqhVbxFV
 qXdDadVbxOTqLTLqVXvD6cywoRRm2AD6JKHIZVdVucRYbxyXEB/Jeak0t7ZcmswmjUz8vE4m
 znMepVQhyfc/UnFhCywn0qMSqTA97ZPK0nAol8EyLBV47kx6n79OkAqSPZJCxF/lSEX8DbpU
 wN+1S+8nL/CNN3GAP2IbER8g9HK4/+NI1H7dcPBjI4g9D/38M2IkxvImi7/SkDLZD4CUwsTV
 dIOSjuf3/kHfoRzKoRzKoRzKoRzKoRzKoRzKoRyKpPwHRjku1gBQAAA=
 --------------010209010000090403030300--
State-Changed-From-To: feedback->closed 
State-Changed-By: thierry 
State-Changed-When: Wed Jun 1 20:05:57 GMT 2005 
State-Changed-Why:  

New port added, thanks! 


http://www.freebsd.org/cgi/query-pr.cgi?pr=81425 
>Unformatted:
