Date: Sat, 24 May 2008 00:28:09 -0500 (CDT) From: Paul Schmehl <pauls@utdallas.edu> To: FreeBSD-gnats-submit@FreeBSD.org Subject: ports/123945: New port, security/spybye Message-ID: <20080524052809.A167034781C@utd65257.utdallas.edu> Resent-Message-ID: <200805240530.m4O5U7Yh025428@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 123945 >Category: ports >Synopsis: New port, security/spybye >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Sat May 24 05:30:07 UTC 2008 >Closed-Date: >Last-Modified: >Originator: Paul Schmehl >Release: FreeBSD 7.0-STABLE i386 >Organization: The University of Texas at Dallas >Environment: System: FreeBSD hostname.utdallas.edu 7.0-STABLE FreeBSD 7.0-STABLE #6: Wed Apr 16 17:14:28 CDT 2008 root@hostname.utdallas.edu:/usr/obj/usr/src/sys/GENERIC i386 >Description: New port submission, security/spybye, a lightweight web proxy for identifying malicious webpages >How-To-Repeat: >Fix: --- spybye.shar begins here --- # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # /usr/ports/security/spybye/ # /usr/ports/security/spybye/distinfo # /usr/ports/security/spybye/pkg-descr # /usr/ports/security/spybye/files # /usr/ports/security/spybye/files/spybye.sh.in # /usr/ports/security/spybye/pkg-plist # /usr/ports/security/spybye/Makefile # echo c - /usr/ports/security/spybye/ mkdir -p /usr/ports/security/spybye/ > /dev/null 2>&1 echo x - /usr/ports/security/spybye/distinfo sed 's/^X//' >/usr/ports/security/spybye/distinfo << 'END-of-/usr/ports/security/spybye/distinfo' XMD5 (spybye-0.3.tar.gz) = 1cc6b8c5ef244e38fd05d02b02f55d5d XSHA256 (spybye-0.3.tar.gz) = 00dd7df03c9a37e80854fa27e44eeaaa4a8c49fa3b0597b5e3b1b2a128669432 XSIZE (spybye-0.3.tar.gz) = 160014 END-of-/usr/ports/security/spybye/distinfo echo x - /usr/ports/security/spybye/pkg-descr sed 's/^X//' >/usr/ports/security/spybye/pkg-descr << 'END-of-/usr/ports/security/spybye/pkg-descr' XSpyBye is a tool to help web masters determine if their web pages Xare hosting browser exploits that can infect visiting users with Xmalware. It functions as an HTTP proxy server and intercepts all Xbrowser requests. SpyBye uses a few simple rules to determine if Xembedded links on your web page are harmlesss, unknown or maybe Xeven dangerous. X XSpyBye analyzes all downloads in the background and provides you Xwith a warning notification whenever it encounters content that Xis potentially malicious. At that point, you can click on the link Xin the notification and receive a more detailed analysis of the web page. X XWWW: http://www.spybye.org/ END-of-/usr/ports/security/spybye/pkg-descr echo c - /usr/ports/security/spybye/files mkdir -p /usr/ports/security/spybye/files > /dev/null 2>&1 echo x - /usr/ports/security/spybye/files/spybye.sh.in sed 's/^X//' >/usr/ports/security/spybye/files/spybye.sh.in << 'END-of-/usr/ports/security/spybye/files/spybye.sh.in' X#!/bin/sh X# X X# PROVIDE: spybye X# REQUIRE: DAEMON X# BEFORE: LOGIN X# KEYWORD: shutdown X X# Add the following lines to /etc/rc.conf to enable spybye: X# spybye_enable (bool): Set to YES to enable spybye X# Default: NO X# spybye_flags (str): Extra flags passed to spybye X# Default: -x -p 8080 -l /var/log/spybye.log X# X# spybye command arguments X# spybye: [-P] [-p port] [-g good] [-b bad] [-l logfile] [-S shareurl] [-x] X# -P disable private IP check; allows the proxy to fetch 127/8 X# -p port port number to create proxy server on X# -g good_patterns a file or url containing the good patterns X# -b bad_patterns a file or url containing the danger patterns X# -l logfile a file to log dangerous site interactions to X# -S shareurl host to log dangerous site interactions to X# -x enable proxy mode X X. %%RC_SUBR%% X Xname="spybye" Xload_rc_config ${name} Xrcvar=`set_rcvar` X# set the defaults X: ${spybye_enable="NO"} X: ${spybye_flags="-x -p 8080 -l /var/log/spybye.log"} X Xcommand=%%PREFIX%%/bin/${name} Xcommand_args="${spybye_flags} &" X Xrun_rc_command "$1" END-of-/usr/ports/security/spybye/files/spybye.sh.in echo x - /usr/ports/security/spybye/pkg-plist sed 's/^X//' >/usr/ports/security/spybye/pkg-plist << 'END-of-/usr/ports/security/spybye/pkg-plist' Xbin/spybye Xbin/spybye2html Xshare/spybye/bad_patterns Xshare/spybye/good_patterns X@dirrm share/spybye END-of-/usr/ports/security/spybye/pkg-plist echo x - /usr/ports/security/spybye/Makefile sed 's/^X//' >/usr/ports/security/spybye/Makefile << 'END-of-/usr/ports/security/spybye/Makefile' X# New ports collection makefile for: spybye X# Date created: 23 May 2008 X# Whom: pauls X# X# $FreeBSD$ X# X XPORTNAME= spybye XPORTVERSION= 0.3 XCATEGORIES= security, www XMASTER_SITES= http://www.monkey.org/~provos/ X XMAINTAINER= pauls@utdallas.edu XCOMMENT= A web proxy to detect malware X XBUILD_DEPENDS= event_rpcgen.py:${PORTSDIR}/devel/libevent X XOPTIONS= CLAMAV "Enable CLAMAV support" off X XUSE_RC_SUBR= spybye.sh XGNU_CONFIGURE= yes XCONFIGURE_ENV= LDFLAGS="${LDFLAGS}" XCONFIGURE_TARGET= --build=${MACHINE_ARCH}-portbld-freebsd${OSREL} X XMAN1= spybye.1 X X.include <bsd.port.pre.mk> X X.if defined(WITH_CLAMAV) XLIB_DEPENDS+= clamav:${PORTSDIR}/security/clamav XCONFIGURE_ARGS+= --with-libclamav=${PREFIX}/bin X.endif X X.include <bsd.port.post.mk> END-of-/usr/ports/security/spybye/Makefile exit --- spybye.shar ends here --- >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080524052809.A167034781C>