From owner-freebsd-ports-bugs@FreeBSD.ORG Sun May 27 12:40:02 2007 Return-Path: X-Original-To: freebsd-ports-bugs@hub.freebsd.org Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id B606B16A468 for ; Sun, 27 May 2007 12:40:02 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [69.147.83.40]) by mx1.freebsd.org (Postfix) with ESMTP id 8E97B13C465 for ; Sun, 27 May 2007 12:40:02 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.13.4/8.13.4) with ESMTP id l4RCe2uE002840 for ; Sun, 27 May 2007 12:40:02 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.13.4/8.13.4/Submit) id l4RCe2J9002839; Sun, 27 May 2007 12:40:02 GMT (envelope-from gnats) Resent-Date: Sun, 27 May 2007 12:40:02 GMT Resent-Message-Id: <200705271240.l4RCe2J9002839@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Gea-Suan Lin Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id AE32D16A473 for ; Sun, 27 May 2007 12:31:50 +0000 (UTC) (envelope-from gslin@netnews.NCTU.edu.tw) Received: from netnews.NCTU.edu.tw (ccreader.nctu.edu.tw [140.113.54.119]) by mx1.freebsd.org (Postfix) with ESMTP id 53D2913C45E for ; Sun, 27 May 2007 12:31:50 +0000 (UTC) (envelope-from gslin@netnews.NCTU.edu.tw) Received: by netnews.NCTU.edu.tw (Postfix, from userid 1000) id 569681061; Sun, 27 May 2007 20:31:49 +0800 (CST) Message-Id: <20070527123149.569681061@netnews.NCTU.edu.tw> Date: Sun, 27 May 2007 20:31:49 +0800 (CST) From: Gea-Suan Lin To: FreeBSD-gnats-submit@FreeBSD.org X-Send-Pr-Version: 3.113 Cc: gslin@gslin.org Subject: ports/113056: [NEW PORT] security/p5-Sudo: Perl extension for running a command line sudo X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 27 May 2007 12:40:02 -0000 >Number: 113056 >Category: ports >Synopsis: [NEW PORT] security/p5-Sudo: Perl extension for running a command line sudo >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Sun May 27 12:40:01 GMT 2007 >Closed-Date: >Last-Modified: >Originator: Gea-Suan Lin >Release: FreeBSD 6.2-RELEASE-p4 i386 >Organization: >Environment: System: FreeBSD netnews.NCTU.edu.tw 6.2-RELEASE-p4 FreeBSD 6.2-RELEASE-p4 #0: Sat Apr 28 00:53:10 CST 2007 >Description: Sudo runs commands as another user, provided the system sudo implementation is setup to enable this. This does not allow running applications securely, simply it allows the programmer to run a program as another user (suid) using the sudo tools rather than suidperl. Suidperl is not generally recommended for secure operation as another user. While sudo itself is a single point tool to enable one user to execute commands as another sudo does not itself make you any more or less secure. WWW: http://search.cpan.org/dist/Sudo Generated with FreeBSD Port Tools 0.77 >How-To-Repeat: >Fix: --- p5-Sudo-0.31.shar begins here --- # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # p5-Sudo # p5-Sudo/pkg-descr # p5-Sudo/Makefile # p5-Sudo/pkg-plist # p5-Sudo/distinfo # echo c - p5-Sudo mkdir -p p5-Sudo > /dev/null 2>&1 echo x - p5-Sudo/pkg-descr sed 's/^X//' >p5-Sudo/pkg-descr << 'END-of-p5-Sudo/pkg-descr' XSudo runs commands as another user, provided the system sudo Ximplementation is setup to enable this. This does not allow running Xapplications securely, simply it allows the programmer to run a Xprogram as another user (suid) using the sudo tools rather than Xsuidperl. Suidperl is not generally recommended for secure operation Xas another user. While sudo itself is a single point tool to enable Xone user to execute commands as another sudo does not itself make you Xany more or less secure. X XWWW: http://search.cpan.org/dist/Sudo END-of-p5-Sudo/pkg-descr echo x - p5-Sudo/Makefile sed 's/^X//' >p5-Sudo/Makefile << 'END-of-p5-Sudo/Makefile' X# New ports collection makefile for: p5-Sudo X# Date created: 2007-05-27 X# Whom: Gea-Suan Lin X# X# $FreeBSD$ X# X XPORTNAME= Sudo XPORTVERSION= 0.31 XCATEGORIES= security perl5 XMASTER_SITES= CPAN XMASTER_SITE_SUBDIR= ../../authors/id/L/LA/LANDMAN XPKGNAMEPREFIX= p5- X XMAINTAINER= gslin@gslin.org XCOMMENT= Perl extension for running a command line sudo X XPERL_CONFIGURE= yes X XRUN_DEPENDS= ${SITE_PERL}/Term/ReadPassword.pm:${PORTSDIR}/devel/p5-Term-ReadPassword \ X ${SITE_PERL}/Class/Accessor.pm:${PORTSDIR}/devel/p5-Class-Accessor \ X ${SITE_PERL}/IPC/Run.pm:${PORTSDIR}/devel/p5-IPC-Run XBUILD_DEPENDS= ${RUN_DEPENDS} X XMAN3= Sudo.3 X X.include X X.if ${PERL_LEVEL} < 500801 XIGNORE= requires Perl >= 5.8.1. Install lang/perl5.8 and try again X.endif X X.include END-of-p5-Sudo/Makefile echo x - p5-Sudo/pkg-plist sed 's/^X//' >p5-Sudo/pkg-plist << 'END-of-p5-Sudo/pkg-plist' X@comment $FreeBSD$ X%%SITE_PERL%%/%%PERL_ARCH%%/auto/Sudo/.packlist X%%SITE_PERL%%/Sudo.pm X@dirrmtry %%SITE_PERL%%/%%PERL_ARCH%%/auto/Sudo END-of-p5-Sudo/pkg-plist echo x - p5-Sudo/distinfo sed 's/^X//' >p5-Sudo/distinfo << 'END-of-p5-Sudo/distinfo' XMD5 (Sudo-0.31.tar.gz) = 34474b59f70a266ca6060e0d3ffa6a9a XSHA256 (Sudo-0.31.tar.gz) = 8450e60999a17137c7d52a1d2fe72fd51b320345f861e26ea4f0aa530359b205 XSIZE (Sudo-0.31.tar.gz) = 6822 END-of-p5-Sudo/distinfo exit --- p5-Sudo-0.31.shar ends here --- >Release-Note: >Audit-Trail: >Unformatted: