From owner-freebsd-ports Mon Oct 4 8:40:15 1999 Delivered-To: freebsd-ports@freebsd.org Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (Postfix) with ESMTP id EE0BC15474 for ; Mon, 4 Oct 1999 08:40:01 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.9.3/8.9.2) id IAA87588; Mon, 4 Oct 1999 08:40:01 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: from mail2.netcologne.de (mail2.netcologne.de [194.8.194.103]) by hub.freebsd.org (Postfix) with ESMTP id B48B615169 for ; Mon, 4 Oct 1999 08:34:55 -0700 (PDT) (envelope-from dr@domix.de) Received: from lamest.domix.de (dial-ra-nc3-83.netcologne.de [195.14.251.83]) by mail2.netcologne.de (8.9.3/8.9.3) with ESMTP id RAA25838 for ; Mon, 4 Oct 1999 17:22:08 +0200 (MET DST) Received: from domix.de (speed.localnet.lan [192.168.1.2]) by lamest.domix.de (8.9.3/8.9.3) with ESMTP id RAA07104 for ; Mon, 4 Oct 1999 17:13:32 +0200 (CEST) (envelope-from dr@domix.de) Received: (from dr@localhost) by domix.de (8.9.3/8.9.3) id RAA02716; Mon, 4 Oct 1999 17:20:34 +0200 (CEST) (envelope-from dr) Message-Id: <199910041520.RAA02716@domix.de> Date: Mon, 4 Oct 1999 17:20:34 +0200 (CEST) From: Dominik Rothert Reply-To: Dominik Rothert To: FreeBSD-gnats-submit@freebsd.org X-Send-Pr-Version: 3.2 Subject: ports/14119: new port: security/iplog Sender: owner-freebsd-ports@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 14119 >Category: ports >Synopsis: new port: security/iplog >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Mon Oct 4 08:40:00 PDT 1999 >Closed-Date: >Last-Modified: >Originator: Dominik Rothert >Release: FreeBSD 4.0-CURRENT i386 >Organization: Am I organized? >Environment: >Description: iplog is a TCP/IP traffic logger. Currently, it is capable of logging TCP, UDP and ICMP traffic, though adding support for other protocols should be relatively easy. iplog contains a built-in packet filter, allowing for logging or excluding packets that fit a given set of criteria. >How-To-Repeat: >Fix: # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # iplog/ # iplog/files # iplog/files/md5 # iplog/pkg # iplog/pkg/PLIST # iplog/pkg/DESCR # iplog/pkg/COMMENT # iplog/Makefile # echo c - iplog/ mkdir -p iplog/ > /dev/null 2>&1 echo c - iplog/files mkdir -p iplog/files > /dev/null 2>&1 echo x - iplog/files/md5 sed 's/^X//' >iplog/files/md5 << 'END-of-iplog/files/md5' XMD5 (iplog-2.0-1002.tar.gz) = 89eaf85ab7552d33968741257b00dbaf END-of-iplog/files/md5 echo c - iplog/pkg mkdir -p iplog/pkg > /dev/null 2>&1 echo x - iplog/pkg/PLIST sed 's/^X//' >iplog/pkg/PLIST << 'END-of-iplog/pkg/PLIST' Xsbin/iplog Xetc/iplog.rules.sample END-of-iplog/pkg/PLIST echo x - iplog/pkg/DESCR sed 's/^X//' >iplog/pkg/DESCR << 'END-of-iplog/pkg/DESCR' Xiplog is a TCP/IP traffic logger. Currently, it is capable of logging XTCP, UDP and ICMP traffic, though adding support for other protocols Xshould be relatively easy. iplog contains a built-in packet filter, Xallowing for logging or excluding packets that fit a given set of Xcriteria. END-of-iplog/pkg/DESCR echo x - iplog/pkg/COMMENT sed 's/^X//' >iplog/pkg/COMMENT << 'END-of-iplog/pkg/COMMENT' XTCP/IP traffic logging tool END-of-iplog/pkg/COMMENT echo x - iplog/Makefile sed 's/^X//' >iplog/Makefile << 'END-of-iplog/Makefile' X# New ports collection makefile for: iplog X# Version required: 1.2 X# Date created: 4 Oct 1999 X# Whom: Dominik Rothert X# X# $FreeBSD$ X# X XDISTNAME= iplog-2.0-1002 XCATEGORIES= security XMASTER_SITES= http://www.numb.org/~odin/stuff/ X XMAINTAINER= dr@domix.de X XGNU_CONFIGURE= yes XMAKE_FLAGS= CONF_ARGS="--prefix=${PREFIX}" XUSE_GMAKE= yes X XMAN8= iplog.8 X Xpost-install: X strip ${PREFIX}/sbin/iplog X ${CP} ${WRKSRC}/example-iplog.rules ${PREFIX}/etc/iplog.rules.sample X ${CP} ${WRKSRC}/example-iplog.rules ${PREFIX}/etc/iplog.rules X X.include END-of-iplog/Makefile exit >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message