Performing substitutions during post-patch breaks tools such as mkpatches,
making it very difficult to regenerate correct patches after making changes,
and often leading to substituted string replacements being committed.
Problems found locating distfiles:
Package f-prot-antivirus6-fs-bin: missing distfile fp-NetBSD.x86.32-fs-6.2.3.tar.gz
Package f-prot-antivirus6-ws-bin: missing distfile fp-NetBSD.x86.32-ws-6.2.3.tar.gz
Package libidea: missing distfile libidea-0.8.2b.tar.gz
Package openssh: missing distfile openssh-7.1p1-hpn-20150822.diff.bz2
Package uvscan: missing distfile vlp4510e.tar.Z
Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden). All existing
SHA1 digests retained for now as an audit trail.
Do it for all packages that
* mention perl, or
* have a directory name starting with p5-*, or
* depend on a package starting with p5-
like last time, for 5.18, where this didn't lead to complaints.
Let me know if you have any this time.
a) refer 'perl' in their Makefile, or
b) have a directory name of p5-*, or
c) have any dependency on any p5-* package
Like last time, where this caused no complaints.
around at either build-time or at run-time is:
USE_TOOLS+= perl # build-time
USE_TOOLS+= perl:run # run-time
Also remove some places where perl5/buildlink3.mk was being included
by a package Makefile, but all that the package wanted was the Perl
executable.
- Grab maintainership
- Use SUBST_SED framework replacing patch-aa
- Change HOMEPAGE for project
- Origional update submitted by Dave Tyson in PR# 29753, thanks !
> * Changed hard coded reference links to the Snort.org SID database to
> reflect changes to snort.org - MFR
Based on a patch sent by Hiramatsu Yoshifumi via PR pkg/21540.
Changes:
- fix all installed scripts
- simplify installation
- DESCR has 80 columns
- style nits
20021111.1:
===========
- alerts with original packet included now have both sets of ports and first
set of IPs as links
- added -obfuscateip option to change the IP addresses in alerts to randomly
(but consistently) chosen alternates (not presently available for database
input)
- Updated parsing for Snort 1.9.0 full alert files
- new-style Spade reports now processed (Spade version 021008.1 and on)
- spp_portscan2 log files now processed (these entries are displayed somewhat
prettified)
- updated linking to ICMP log files; this involved updates for new ICMP header
format in Snort 1.9.0
- more robust recognition of non-packet alerts in different formats(these get
ignored)
- clarified warning about unknown ICMP type text and added repeat warning
suppression (you'll now only get a warning about a particular string twice)
- SnortSnarf will now ignore lines beginning with '#' between alerts, so you
can use that to begin a comment
Collection.
Provided in PR 17580 by Hiramatsu Yoshifumi (hiramatu@boreas.dti.ne.jp), with
minor changes by me.
SnortSnarf is a Perl program to take files of alerts from the free
Snort Intrusion Detection System , and produce HTML output intended
for diagnostic inspection and tracking down problems.