Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 24 May 2008 00:28:09 -0500 (CDT)
From:      Paul Schmehl <pauls@utdallas.edu>
To:        FreeBSD-gnats-submit@FreeBSD.org
Subject:   ports/123945: New port, security/spybye
Message-ID:  <20080524052809.A167034781C@utd65257.utdallas.edu>
Resent-Message-ID: <200805240530.m4O5U7Yh025428@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         123945
>Category:       ports
>Synopsis:       New port, security/spybye
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Sat May 24 05:30:07 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator:     Paul Schmehl
>Release:        FreeBSD 7.0-STABLE i386
>Organization:
The University of Texas at Dallas
>Environment:
System: FreeBSD hostname.utdallas.edu 7.0-STABLE FreeBSD 7.0-STABLE #6: Wed Apr 16 17:14:28 CDT 2008 root@hostname.utdallas.edu:/usr/obj/usr/src/sys/GENERIC i386


	
>Description:
	New port submission, security/spybye, a lightweight web proxy
	for identifying malicious webpages
>How-To-Repeat:
	
>Fix:

	

--- spybye.shar begins here ---
# This is a shell archive.  Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file".  Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
#	/usr/ports/security/spybye/
#	/usr/ports/security/spybye/distinfo
#	/usr/ports/security/spybye/pkg-descr
#	/usr/ports/security/spybye/files
#	/usr/ports/security/spybye/files/spybye.sh.in
#	/usr/ports/security/spybye/pkg-plist
#	/usr/ports/security/spybye/Makefile
#
echo c - /usr/ports/security/spybye/
mkdir -p /usr/ports/security/spybye/ > /dev/null 2>&1
echo x - /usr/ports/security/spybye/distinfo
sed 's/^X//' >/usr/ports/security/spybye/distinfo << 'END-of-/usr/ports/security/spybye/distinfo'
XMD5 (spybye-0.3.tar.gz) = 1cc6b8c5ef244e38fd05d02b02f55d5d
XSHA256 (spybye-0.3.tar.gz) = 00dd7df03c9a37e80854fa27e44eeaaa4a8c49fa3b0597b5e3b1b2a128669432
XSIZE (spybye-0.3.tar.gz) = 160014
END-of-/usr/ports/security/spybye/distinfo
echo x - /usr/ports/security/spybye/pkg-descr
sed 's/^X//' >/usr/ports/security/spybye/pkg-descr << 'END-of-/usr/ports/security/spybye/pkg-descr'
XSpyBye is a tool to help web masters determine if their web pages
Xare hosting browser exploits that can infect visiting users with
Xmalware. It functions as an HTTP proxy server and intercepts all
Xbrowser requests. SpyBye uses a few simple rules to determine if
Xembedded links on your web page are harmlesss, unknown or maybe
Xeven dangerous.
X
XSpyBye analyzes all downloads in the background and provides you
Xwith a warning notification whenever it encounters content that
Xis potentially malicious. At that point, you can click on the link
Xin the notification and receive a more detailed analysis of the web page.
X
XWWW: http://www.spybye.org/
END-of-/usr/ports/security/spybye/pkg-descr
echo c - /usr/ports/security/spybye/files
mkdir -p /usr/ports/security/spybye/files > /dev/null 2>&1
echo x - /usr/ports/security/spybye/files/spybye.sh.in
sed 's/^X//' >/usr/ports/security/spybye/files/spybye.sh.in << 'END-of-/usr/ports/security/spybye/files/spybye.sh.in'
X#!/bin/sh
X#
X
X# PROVIDE: spybye
X# REQUIRE: DAEMON
X# BEFORE: LOGIN
X# KEYWORD: shutdown
X
X# Add the following lines to /etc/rc.conf to enable spybye:
X# spybye_enable (bool):       Set to YES to enable spybye
X#                               Default: NO
X# spybye_flags (str):         Extra flags passed to spybye
X#                               Default: -x -p 8080 -l /var/log/spybye.log
X#       
X# spybye command arguments
X# spybye: [-P] [-p port] [-g good] [-b bad] [-l logfile] [-S shareurl] [-x]
X#	 -P disable private IP check; allows the proxy to fetch 127/8
X#	 -p port port number to create proxy server on
X#	 -g good_patterns a file or url containing the good patterns
X#	 -b bad_patterns a file or url containing the danger patterns
X#	 -l logfile a file to log dangerous site interactions to
X#	 -S shareurl host to log dangerous site interactions to
X#	 -x enable proxy mode
X
X. %%RC_SUBR%%
X
Xname="spybye"
Xload_rc_config ${name}
Xrcvar=`set_rcvar`
X# set the defaults
X: ${spybye_enable="NO"}
X: ${spybye_flags="-x -p 8080 -l /var/log/spybye.log"}
X
Xcommand=%%PREFIX%%/bin/${name}
Xcommand_args="${spybye_flags} &"
X
Xrun_rc_command "$1"
END-of-/usr/ports/security/spybye/files/spybye.sh.in
echo x - /usr/ports/security/spybye/pkg-plist
sed 's/^X//' >/usr/ports/security/spybye/pkg-plist << 'END-of-/usr/ports/security/spybye/pkg-plist'
Xbin/spybye
Xbin/spybye2html
Xshare/spybye/bad_patterns
Xshare/spybye/good_patterns
X@dirrm share/spybye
END-of-/usr/ports/security/spybye/pkg-plist
echo x - /usr/ports/security/spybye/Makefile
sed 's/^X//' >/usr/ports/security/spybye/Makefile << 'END-of-/usr/ports/security/spybye/Makefile'
X# New ports collection makefile for:	spybye
X# Date created:				23 May 2008
X# Whom:					pauls
X#
X# $FreeBSD$
X#
X
XPORTNAME=	spybye
XPORTVERSION=	0.3
XCATEGORIES=	security, www
XMASTER_SITES=	http://www.monkey.org/~provos/
X
XMAINTAINER=	pauls@utdallas.edu
XCOMMENT=	A web proxy to detect malware
X
XBUILD_DEPENDS=	event_rpcgen.py:${PORTSDIR}/devel/libevent
X
XOPTIONS=	CLAMAV "Enable CLAMAV support" off
X
XUSE_RC_SUBR=	spybye.sh
XGNU_CONFIGURE=	yes
XCONFIGURE_ENV=	LDFLAGS="${LDFLAGS}"
XCONFIGURE_TARGET=	--build=${MACHINE_ARCH}-portbld-freebsd${OSREL}
X
XMAN1=		spybye.1
X
X.include <bsd.port.pre.mk>
X
X.if defined(WITH_CLAMAV)
XLIB_DEPENDS+=	clamav:${PORTSDIR}/security/clamav
XCONFIGURE_ARGS+=	--with-libclamav=${PREFIX}/bin
X.endif
X
X.include <bsd.port.post.mk>
END-of-/usr/ports/security/spybye/Makefile
exit
--- spybye.shar ends here ---


>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080524052809.A167034781C>