From owner-freebsd-doc@FreeBSD.ORG Thu Nov 18 18:42:03 2004 Return-Path: Delivered-To: freebsd-doc@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 7DF9316A4CE; Thu, 18 Nov 2004 18:42:03 +0000 (GMT) Received: from zaphod.nitro.dk (port324.ds1-khk.adsl.cybercity.dk [212.242.113.79]) by mx1.FreeBSD.org (Postfix) with ESMTP id EBAC343D1F; Thu, 18 Nov 2004 18:42:02 +0000 (GMT) (envelope-from simon@zaphod.nitro.dk) Received: by zaphod.nitro.dk (Postfix, from userid 3000) id 43F59119B9; Thu, 18 Nov 2004 19:42:01 +0100 (CET) Date: Thu, 18 Nov 2004 19:42:01 +0100 From: "Simon L. Nielsen" To: "Kevin D. Kinsey, DaleCo, S.P." Message-ID: <20041118184200.GC753@zaphod.nitro.dk> References: <20041117150247.Q16295@prime.gushi.org> <419CE99A.40404@daleco.biz> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="QRj9sO5tAVLaXnSD" Content-Disposition: inline In-Reply-To: <419CE99A.40404@daleco.biz> User-Agent: Mutt/1.5.6i cc: "Dan Mahoney, System Admin" cc: doc@freebsd.org cc: questions@freebsd.org Subject: Re: ports vulnerabilities X-BeenThere: freebsd-doc@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Documentation project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 18 Nov 2004 18:42:03 -0000 --QRj9sO5tAVLaXnSD Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On 2004.11.18 12:27:38 -0600, Kevin D. Kinsey, DaleCo, S.P. wrote: > Dan Mahoney, System Admin wrote: >=20 > >I tried to install a port which had a conflict (ImageMagick) > >but I didn't feel the vulnerability was significant enough to > >warrant waiting for a new port to be created. I looked in > >the ports man page for an override environment variable, > >but "vulnerability check" isn't even mentioned there.=20 > >Could this please get stuck into the manpages? First, the knob you are looking for is DISABLE_VULNERABILITIES, which is not as nice at it sounds, since it just disables the check ;-). > I'm cc-ing to doc@ ... we'll see if anyone wants to comment. > [ Umm, yeah ... they're great guys, but busy. We'll see....] Good call, it's much more likely we will notice something when doc@ gets poked :-). > You might also check with ports@ ... or just file a PR and > see what comes of it. >=20 > It'l also quite possible that spending some time in the ports@ > list archives might turn up some of the info your're looking > for.... >=20 > Also, what manpage would you *expect* to see this information > in? You mention ports(7), but someone already thinks "this > manpage is too long" ;-) To start with the last part, see rc.conf(5) and you will see a long manual page :-). I think this belongs in ports(7). Anyway, I actually added info about the DISABLE_VULNERABILITIES knob to my local WIP tree a few weeks ago, I just haven't gotten around to cleaning it up and committing it. I will bump it a bit up on my TODO list. --=20 Simon L. Nielsen FreeBSD Documentation Team --QRj9sO5tAVLaXnSD Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (FreeBSD) iD8DBQFBnOz4h9pcDSc1mlERAl31AJ93A1+hJnWTBTlD5u9t2G+TTGOvxgCcCoZE ajwFz0a7rzhRqkvDINR5n20= =MKeL -----END PGP SIGNATURE----- --QRj9sO5tAVLaXnSD--