From owner-freebsd-questions@FreeBSD.ORG Mon Jul 21 19:06:09 2014 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 94C781EC for ; Mon, 21 Jul 2014 19:06:09 +0000 (UTC) Received: from nqhost.drenet.net (nqhost.drenet.net [184.95.47.164]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 7907C2878 for ; Mon, 21 Jul 2014 19:06:08 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by nqhost.drenet.net (Postfix) with ESMTP id B4EB93AE86 for ; Mon, 21 Jul 2014 14:56:10 -0400 (EDT) Received: from nqhost.drenet.net ([127.0.0.1]) by localhost (nqhost.drenet.net [127.0.0.1]) (maiad, port 10024) with ESMTP id 92705-10 for ; Mon, 21 Jul 2014 14:56:10 -0400 (EDT) Received: by nqhost.drenet.net (Postfix, from userid 80) id 83BBC3AE52; Mon, 21 Jul 2014 14:56:10 -0400 (EDT) To: FreeBSD Questions Subject: Installing a vulnerable port on FreeBSD 10 X-PHP-Originating-Script: 80:rcmail.php MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Date: Mon, 21 Jul 2014 14:56:10 -0400 From: Andre Goree Message-ID: <9211b34bf23968bf4ca9a33c9bab6163@drenet.net> X-Sender: andre@drenet.net User-Agent: Roundcube Webmail/0.9.5 X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 21 Jul 2014 19:06:09 -0000 On FreeBSD 10, I can't seem to use the same method I've always used when trying to install a vulnerable port. Has anything changed with this version? I'm trying to install linux-flashplugin, however am (expectedly) running into some vulnerable ports that (unexpectedly) refuse to install no matter what I do. --- root@dlaptop:/usr/ports/security/linux-f10-openssl # make -DDISABLE_VULNERABILITIES ===> linux-f10-openssl-0.9.8g is forbidden: http://www.freshports.org/vuxml.php?vid=2ecb7b20-d97e-11e0-b2e2-00215c6a37bb|82b55df8-4d5a-11de-8811-0030843d3802. *** Error code 1 Stop. make: stopped in /usr/ports/security/linux-f10-openssl --- root@dlaptop:/usr/ports/security/linux-f10-openssl # make -DDISABLE_VULNERABILITIES install clean ===> linux-f10-openssl-0.9.8g is forbidden: http://www.freshports.org/vuxml.php?vid=2ecb7b20-d97e-11e0-b2e2-00215c6a37bb|82b55df8-4d5a-11de-8811-0030843d3802. *** Error code 1 Stop. make: stopped in /usr/ports/security/linux-f10-openssl --- root@dlaptop:/usr/ports/security/linux-f10-openssl # portinstall -m DISABLE_VULNERABILITIES=yes security/linux-f10-openssl [Reading data from pkg(8) ... - 793 packages found - done] [Gathering depends for security/linux-f10-openssl . done] ** Port marked as IGNORE: security/linux-f10-openssl: is forbidden: http://www.freshports.org/vuxml.php?vid=2ecb7b20-d97e-11e0-b2e2-00215c6a37bb|82b55df8-4d5a-11de-8811-0030843d3802 ** Listing the failed packages (-:ignored / *:skipped / !:failed) - security/linux-f10-openssl --- Any ideas? -- Andre Goree -=-=-=-=-=- Email - andre at drenet.net Website - http://www.drenet.net PGP key - http://www.drenet.net/pubkey.txt -=-=-=-=-=-