From owner-freebsd-ports-bugs@FreeBSD.ORG Sun Jun 5 14:00:18 2005 Return-Path: X-Original-To: freebsd-ports-bugs@hub.freebsd.org Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 82A5A16A41C for ; Sun, 5 Jun 2005 14:00:18 +0000 (GMT) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id 4245743D4C for ; Sun, 5 Jun 2005 14:00:18 +0000 (GMT) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.13.3/8.13.3) with ESMTP id j55E0IBe063568 for ; Sun, 5 Jun 2005 14:00:18 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.13.3/8.13.1/Submit) id j55E0Ib6063567; Sun, 5 Jun 2005 14:00:18 GMT (envelope-from gnats) Resent-Date: Sun, 5 Jun 2005 14:00:18 GMT Resent-Message-Id: <200506051400.j55E0Ib6063567@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Krzysztof Pawlowski Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 5773116A41C for ; Sun, 5 Jun 2005 13:53:00 +0000 (GMT) (envelope-from msciciel@darkzone.ma.cx) Received: from darkzone.ma.cx (darkzone.ma.cx [83.142.115.94]) by mx1.FreeBSD.org (Postfix) with SMTP id 9A5EC43D49 for ; Sun, 5 Jun 2005 13:52:59 +0000 (GMT) (envelope-from msciciel@darkzone.ma.cx) Received: (qmail 65622 invoked by uid 1001); 5 Jun 2005 13:51:45 -0000 Message-Id: <20050605135145.65621.qmail@darkzone.ma.cx> Date: 5 Jun 2005 13:51:45 -0000 From: Krzysztof Pawlowski To: FreeBSD-gnats-submit@FreeBSD.org X-Send-Pr-Version: 3.113 Cc: Subject: ports/81917: X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Krzysztof Pawlowski List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 05 Jun 2005 14:00:18 -0000 >Number: 81917 >Category: ports >Synopsis: >Confidential: no >Severity: non-critical >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Sun Jun 05 14:00:15 GMT 2005 >Closed-Date: >Last-Modified: >Originator: Krzysztof Pawlowski >Release: FreeBSD 4.11-RELEASE-p8 i386 >Organization: >Environment: System: FreeBSD darkzone.ma.cx 4.11-RELEASE-p8 FreeBSD 4.11-RELEASE-p8 #4: Mon May 9 11:12:53 CEST 2005 msciciel@darkzone.ma.cx:/usr/src/sys/compile/DARKZONE i386 >Description: New port: net/dosdetector DoSDetector analyze and detect suspicious traffic from IP and alert about it --- dosdetector.port begins here --- # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # dosdetector # dosdetector/Makefile # dosdetector/pkg-descr # dosdetector/distinfo # dosdetector/pkg-plist # echo c - dosdetector mkdir -p dosdetector > /dev/null 2>&1 echo x - dosdetector/Makefile sed 's/^X//' >dosdetector/Makefile << 'END-of-dosdetector/Makefile' X# New ports collection makefile for: dosdetector X# Date created: 5 June 2005 X# Whom: msciciel X# X# $FreeBSD$ X# X XPORTNAME= dosdetector XPORTVERSION= 0.1 XCATEGORIES= net XMASTER_SITES= http://darkzone.ma.cx/resources/unix/dosdetector/ XDISTNAME= dosdetector-current X XMAINTAINER= msciciel@darkzone.ma.cx XCOMMENT= Detect suspicious traffic X XMAN1= dosdetector.1 X XIGNOREFILES= dosdetector-current.tar.gz X XHAS_CONFIGURE= yes XUSE_AUTOHEADER_VER= 259 X X.include END-of-dosdetector/Makefile echo x - dosdetector/pkg-descr sed 's/^X//' >dosdetector/pkg-descr << 'END-of-dosdetector/pkg-descr' XDoSDetector analyze and detect suspicious traffic from IP and alert about it. XIt can detect worm traffic, SYN flood, icmp flood, udp flood etc... XIt's configurable via set of rules which have some points assigned to IP by Xmatching rule. When IP exceed points limit, dosdotector print warning. X XWWW: http://darkzone.ma.cx/resources/unix/dosdetector/ X X- msciciel Xmsciciel@darkzone.ma.cx END-of-dosdetector/pkg-descr echo x - dosdetector/distinfo sed 's/^X//' >dosdetector/distinfo << 'END-of-dosdetector/distinfo' XMD5 (dosdetector-current.tar.gz) = IGNORE END-of-dosdetector/distinfo echo x - dosdetector/pkg-plist sed 's/^X//' >dosdetector/pkg-plist << 'END-of-dosdetector/pkg-plist' Xbin/dosdetector END-of-dosdetector/pkg-plist exit --- dosdetector.port ends here --- >How-To-Repeat: >Fix: >Release-Note: >Audit-Trail: >Unformatted: