Date: Fri, 13 Jun 2003 06:20:06 -0400 (EDT) From: Paul Chvostek <paul+fbsd@it.ca> To: FreeBSD-gnats-submit@FreeBSD.org Cc: Paul Chvostek <paul+fbsd@it.ca> Subject: ports/53275: New port: security/pxytest - Perl script to test for open proxies Message-ID: <200306131020.h5DAK6TT059670@foo.it.ca> Resent-Message-ID: <200306131020.h5DAKFlk040777@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 53275 >Category: ports >Synopsis: New port: security/pxytest - Perl script to test for open proxies >Confidential: no >Severity: non-critical >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Fri Jun 13 03:20:15 PDT 2003 >Closed-Date: >Last-Modified: >Originator: Paul Chvostek >Release: FreeBSD 4.7-STABLE i386 >Organization: >Environment: System: FreeBSD foo.it.ca 4.7-STABLE FreeBSD 4.7-STABLE #1: Sun Nov 10 01:01:32 EST 2002 paul@foo.it.ca:/usr/src/sys/compile/foo i386 >Description: Perl script to test for open proxies, by Chip Rosenthal. >How-To-Repeat: n/a >Fix: # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # pxytest/ # pxytest/pkg-plist # pxytest/pkg-descr # pxytest/distinfo # pxytest/Makefile # echo c - pxytest/ mkdir -p pxytest/ > /dev/null 2>&1 echo x - pxytest/pkg-plist sed 's/^X//' >pxytest/pkg-plist << 'END-of-pxytest/pkg-plist' Xbin/pxytest END-of-pxytest/pkg-plist echo x - pxytest/pkg-descr sed 's/^X//' >pxytest/pkg-descr << 'END-of-pxytest/pkg-descr' Xpxytest is a command line utility to test a host for open proxies Xthat are vulnerable to spammer abuse. It is written in perl. X XUnsecured proxies currently are the most significant conduit of junk email. This is a particularly vexing problem, because open proxies, unlike open mail relays, hide the origin of the spam, making it impossible to trace. This utility tests a host to see if it is vulnerable to such abuse. X XSee http://www.unicom.com/sw/pxytest for more information. X Xpxytest was written by Chip Rosenthal. X X- Paul Chvostek <paul+ports@it.ca> X XWWW: http://www.unicom.com/sw/pxytest END-of-pxytest/pkg-descr echo x - pxytest/distinfo sed 's/^X//' >pxytest/distinfo << 'END-of-pxytest/distinfo' XMD5 (pxytest) = 0c973e64c0566e8e616b8703fff46448 END-of-pxytest/distinfo echo x - pxytest/Makefile sed 's/^X//' >pxytest/Makefile << 'END-of-pxytest/Makefile' X# New ports collection makefile for: pxytest X# Date created: Fri Jun 13 05:57:43 EDT 2003 X# Whom: Paul Chvostek <paul@it.ca> X# X# $FreeBSD$ X# X XPORTNAME= pxytest XPORTVERSION= 1.36 XCATEGORIES= security XMASTER_SITES= http://www.unicom.com/sw/pxytest/ XDISTNAME= ${PORTNAME} XEXTRACT_SUFX= XEXTRACT_ONLY= # defined X XMAINTAINER= paul+ports@it.ca XCOMMENT= test remote system for unsecured mail proxies X XUSE_PERL5= yes X XNO_WRKSUBDIR= yes X XMAN1= pxytest.1 X Xpre-patch: X @${SED} '1s:^#!/usr/bin/perl:#!${PERL}:' < ${_DISTDIR}${DISTFILES} > ${WRKSRC}/pxytest X Xdo-build: X @pod2man ${WRKSRC}/pxytest > ${WRKSRC}/pxytest.1 X Xdo-install: X @${INSTALL_SCRIPT} ${WRKSRC}/pxytest ${PREFIX}/bin/ X @${INSTALL_MAN} ${WRKSRC}/pxytest.1 ${PREFIX}/man/man1/ X X.include <bsd.port.mk> END-of-pxytest/Makefile exit >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200306131020.h5DAK6TT059670>