This packages has been broken for a while, and now revives.
GNU binutils now supports MingGw natively, so making this package
is very simple now.
Thanks,
Ratproxy is a semi-automated, largely passive web application security
audit tool. It is meant to complement active crawlers and manual proxies
more commonly used for this task, and is optimized specifically for an
accurate and sensitive detection, and automatic annotation, of potential
problems and security-relevant design patterns based on the observation
of existing, user-initiated traffic in complex web 2.0 environments.
The approach taken with ratproxy offers several important advantages over
more traditional methods; please consult ratproxy's home page or the
installed README file for more information.
[HOMEPAGE:http://code.google.com/p/ratproxy]
Changelog:
o Major bugfixes:
- If you have more than one bridge but don't know their keys,
you would only launch a request for the descriptor of the first one
on your list. (Tor considered launching requests for the others, but
found that it already had a connection on the way for $0000...0000
so it didn't open another.) Bugfix on 0.2.0.x.
- If you have more than one bridge but don't know their keys, and the
connection to one of the bridges failed, you would cancel all
pending bridge connections. (After all, they all have the same
digest.) Bugfix on 0.2.0.x.
- When a hidden service was trying to establish an introduction point,
and Tor had built circuits preemptively for such purposes, we
were ignoring all the preemptive circuits and launching a new one
instead. Bugfix on 0.2.0.14-alpha.
- When a hidden service was trying to establish an introduction point,
and Tor *did* manage to reuse one of the preemptively built
circuits, it didn't correctly remember which one it used,
so it asked for another one soon after, until there were no
more preemptive circuits, at which point it launched one from
scratch. Bugfix on 0.0.9.x.
- Make directory servers include the X-Your-Address-Is: http header in
their responses even for begin_dir conns. Now clients who only
ever use begin_dir connections still have a way to learn their IP
address. Fixes bug 737; bugfix on 0.2.0.22-rc. Reported by goldy.
o Minor bugfixes:
- Fix a macro/CPP interactions that was confusing some compilers:
some GCCs don't like #if/#endif pairs inside macro arguments.
Fix for bug 707.
- Fix macro collision between OpenSSL 0.9.8h and Windows headers.
Fixes bug 704; fix from Steven Murdoch.
- When opening /dev/null in finish_daemonize(), do not pass the
O_CREAT flag. Fortify was complaining, and correctly so. Fixes
bug 742; fix from Michael Scherer. Bugfix on 0.0.2pre19.
- Correctly detect transparent proxy support on Linux hosts that
require in.h to be included before netfilter_ipv4.h. Patch
from coderman.
- Disallow session resumption attempts during the renegotiation
stage of the v2 handshake protocol. Clients should never be
trying session resumption at this point, but apparently some
did, in ways that caused the handshake to fail. Bugfix on
0.2.0.20-rc. Bug found by Geoff Goodell.
Initial check-in of work-in-progress (does not build to completion yet).
MARSYAS is a software framework that was created as part of my
research in Princeton University as a Phd graduate student. It is a
collection of classes written in C++ and JAVA for various sound
analysis and synthesis tasks. It started my first year in graduate school
(1998) when I rewrote various tools that I had been using in order to
make my life easier and also to code them the way I wanted them to be.
This library is made by me for my own research purposes. Anyone who
finds anything useful is welcome to use it, but I have no
responsibility whatsoever. I will be happy to answer any questions and
I will try to keep developing the library/toolkit. Until now
development is guided by what my research needs and whenever I find
some free time other stuff.
The basic goal for MARSYAS has been to design a flexible and easily
extensible system that allows rapid prototyping of audio
applications. MARSYAS is released as free software under the GNU
public licence hoping that people will actively contribute to its
development. Please send bugs, comments, additions, problems and
anything else to gtzan@@cs.cmu.edu. This version 0.2 is the third
major rewrite of Marsyas and is still in experimental stage. Feedback
is more than welcome.
(This is the software behind MoodLogic and similar technologies/services)
on pkgsrc-users@. Thanks!
Also, add CONFIGURE_ARGS+=--enable-builtin-fonts so that the server
is usable even if you haven't installed any fonts [yet].
Bump PKGREVISION.
This is the start of a reworking of zsh-current to be more pkgsrc-
and user- friendly.
goals: - provide coherent terminal type selection facility
- provide facility (using PRINT_PLIST_AWK, etc) to ease installation
of completion scripts.
- Set site function-dir and others in accordance with pkgsrc
policy (?).
- Support as many platforms as possible, consdering the recommended
options, e.g. using zsh's own memory allocator, etc.
- test
I don't have much time to work on this, so others are most welcome!
Move install to sbin
Update COMMENT and DESCR
Add -u to download the system-vulnerabilities file only
Add sample audit-system.conf
Add logic for SYSVULNDIR creation
Use PKG_SYSCONFDIR correctly
Check we can write to SYSVULNDIR
An ERROR in the script gets an exit
Expose FETCH_TOOL* but warn that changing them is unsupported
kernel with the system-vulnerabilities file and reports any known security
issues to standard output. This output contains the name and version of
the vulnerable component, the type of vulnerability, and a URL for further
information for each vulnerability.
NOTE: NetBSD ONLY