From owner-svn-ports-all@freebsd.org Wed Jul 5 18:13:28 2017 Return-Path: Delivered-To: svn-ports-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4FCEFD8C988; Wed, 5 Jul 2017 18:13:28 +0000 (UTC) (envelope-from ultima1252@gmail.com) Received: from mail-yw0-x22b.google.com (mail-yw0-x22b.google.com [IPv6:2607:f8b0:4002:c05::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 0BA33665A7; Wed, 5 Jul 2017 18:13:28 +0000 (UTC) (envelope-from ultima1252@gmail.com) Received: by mail-yw0-x22b.google.com with SMTP id l21so87415075ywb.1; Wed, 05 Jul 2017 11:13:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=HGGIXbaSgj6GM5nqgMPKiEpCGHw8NsQ0aWCnlKBRpGE=; b=ME4fKWU+Z0FSl4WfSYfE9tCNStHGLqU9oNDvsy2cqTMptkWF4KDlZUfYnKIihQfBW/ yecY1IzpQGv0mxeF629ntA50Xw4KL2fTo9/x15nzh4HklQ/q63DQbgTyNYzB8qynvl9V wtezzB5Smu4pT1kUUgTG0mIRRykcpFNzLF0mG6hW5SoTRyKbJSpHnvNQg6prCq7cusGn jdwn/nReUR5HsCenjoYOws8aGMoS5iGDRjBNXc9FuBUGyZ0XTPK1Pz7e1nqtBIhr0PDn CtwU9o7AlQEAYxtj2uMFDyCSF+tFplgJWMhdCU/ySMuWaLaVamlmlewem0IyCexXZDqR dfhQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=HGGIXbaSgj6GM5nqgMPKiEpCGHw8NsQ0aWCnlKBRpGE=; b=cEfCjbmDt8Xwpj7I9MwOgVWklKNZPZPva3bxKdpu3nVxXGl61JNR1Z8x6YFC5X5laT W8IM2PgKZrHcV2m3UQjS/A6sVxffi9cVDJPX41FRG0Ebnfm+vlsk6nRgkQJx80/3jD3g Bf3+mEzC8BzOwQl5TVFFVEs1+aoyr9lSsuUbZCnb+a1d/ClU+84HyDbsh3EoTKLCrh9u m9SgSr9rbOKEmDBHBcORpMBy5Q3+cOiqEJzKJj5zWNpkDbjwV6isAC7pbYqaEGcSg73W aRRxDntpZmYkOPmaTjPBG8xd3zCGzORGFZFlYDl8yzrCgCDhlj/Y/2vlYW1ORR/PsTcA 1Smw== X-Gm-Message-State: AKS2vOyFd/ofQ/xRhrYG/m10Tf+2vMHXYwaTHvQBARiiT4WgeObqVmSh I1ex4pZGW6puoeMa27+Qa3tk3kLQjSxxSSY= X-Received: by 10.129.65.67 with SMTP id f3mr34518372ywk.84.1499278406120; Wed, 05 Jul 2017 11:13:26 -0700 (PDT) MIME-Version: 1.0 Received: by 10.13.236.76 with HTTP; Wed, 5 Jul 2017 11:13:25 -0700 (PDT) In-Reply-To: <201707051802.v65I232R029892@repo.freebsd.org> References: <201707051802.v65I232R029892@repo.freebsd.org> From: Ultima Date: Wed, 5 Jul 2017 11:13:25 -0700 Message-ID: Subject: Re: svn commit: r445088 - in head/security: . hardening-check To: Kurt Jaeger , amutu@amutu.com Cc: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.23 X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 05 Jul 2017 18:13:28 -0000 The MASTER_SITES should be changed to the DEBIAN pool. On Wed, Jul 5, 2017 at 11:02 AM, Kurt Jaeger wrote: > Author: pi > Date: Wed Jul 5 18:02:02 2017 > New Revision: 445088 > URL: https://svnweb.freebsd.org/changeset/ports/445088 > > Log: > New port: security/hardening-check > > Check binaries for security hardening features > > Hardening-check is a perl script to verify that the resulting binary > does, in fact, have hardening features enabled, you can use it to > test each ELF binary and the output will show if the binary has > position independent executable, stack protected, fortify source > functions(not supported on FreeBSD now), read only relocations or > immediate binding supported. > > WWW: https://wiki.debian.org/Hardening > > PR: 220245 > Submitted by: amutu@amutu.com > > Added: > head/security/hardening-check/ > head/security/hardening-check/Makefile (contents, props changed) > head/security/hardening-check/distinfo (contents, props changed) > head/security/hardening-check/pkg-descr (contents, props changed) > Modified: > head/security/Makefile > > Modified: head/security/Makefile > ============================================================ > ================== > --- head/security/Makefile Wed Jul 5 17:20:56 2017 (r445087) > +++ head/security/Makefile Wed Jul 5 18:02:02 2017 (r445088) > @@ -201,6 +201,7 @@ > SUBDIR += gwee > SUBDIR += hackbot > SUBDIR += hamachi > + SUBDIR += hardening-check > SUBDIR += hashcat > SUBDIR += hashcat-legacy > SUBDIR += heimdal > > Added: head/security/hardening-check/Makefile > ============================================================ > ================== > --- /dev/null 00:00:00 1970 (empty, because file is newly added) > +++ head/security/hardening-check/Makefile Wed Jul 5 18:02:02 2017 > (r445088) > @@ -0,0 +1,34 @@ > +# Created by: Jov > +# $FreeBSD$ > + > +PORTNAME= hardening-check > +PORTVERSION= 2.6 > +CATEGORIES= security > +MASTER_SITES= http://http.debian.net/debian/ > pool/main/h/hardening-wrapper/ > +DISTNAME= hardening-wrapper_${PORTVERSION} > + > +MAINTAINER= amutu@amutu.com > +COMMENT= Check binaries for security hardening features > + > +LICENSE= GPLv2+ > + > +USES= tar:xz shebangfix perl5 > + > +SHEBANG_LANG= perl > +SHEBANG_FILES= ${PORTNAME} > + > +NO_BUILD= yes > +PLIST_FILES= bin/${PORTNAME} > + > +WRKSRC= ${WRKDIR}/hardening-wrapper > + > +post-patch: > + ${REINPLACE_CMD} -e 's/die "List of libc functions not > defined/#&/' \ > + -e 's/^libc./& Not supported on FreeBSD now./' \ > + -e 's/against glibc)./& This function is currently Not > supported on FreeBSD./' \ > + ${WRKSRC}/${PORTNAME} > + > +do-install: > + ${INSTALL_SCRIPT} ${WRKSRC}/${PORTNAME} ${STAGEDIR}${PREFIX}/bin/ > + > +.include > > Added: head/security/hardening-check/distinfo > ============================================================ > ================== > --- /dev/null 00:00:00 1970 (empty, because file is newly added) > +++ head/security/hardening-check/distinfo Wed Jul 5 18:02:02 2017 > (r445088) > @@ -0,0 +1,3 @@ > +TIMESTAMP = 1498272039 > +SHA256 (hardening-wrapper_2.6.tar.xz) = c5fc46439646d0929a0605e4f3db67 > e57eefbbf5ceec5a2888440dbdf4450224 > +SIZE (hardening-wrapper_2.6.tar.xz) = 19436 > > Added: head/security/hardening-check/pkg-descr > ============================================================ > ================== > --- /dev/null 00:00:00 1970 (empty, because file is newly added) > +++ head/security/hardening-check/pkg-descr Wed Jul 5 18:02:02 2017 > (r445088) > @@ -0,0 +1,8 @@ > +Hardening-check is a perl script to verify that the resulting binary > +does, in fact, have hardening features enabled, you can use it to > +test each ELF binary and the output will show if the binary has > +position independent executable, stack protected, fortify source > +functions(not supported on FreeBSD now), read only relocations or > +immediate binding supported. > + > +WWW: https://wiki.debian.org/Hardening > >