summaryrefslogtreecommitdiffstats
path: root/security/slush
diff options
context:
space:
mode:
authorsteve <steve@FreeBSD.org>1999-05-09 17:50:07 +0000
committersteve <steve@FreeBSD.org>1999-05-09 17:50:07 +0000
commit88c25861ab4228c7341842e8979547e06bcf1292 (patch)
treee9e2e1ffd3a10ab57edc9c607a0cbc70343d0265 /security/slush
parente9d0c9e7e5423402bb37e17711c1417425e4c464 (diff)
downloadFreeBSD-ports-88c25861ab4228c7341842e8979547e06bcf1292.zip
FreeBSD-ports-88c25861ab4228c7341842e8979547e06bcf1292.tar.gz
Initial import of slush version 0.1.0.
A telnet-like application which uses a secure SSL channel. PR: 11557 Submitted by: Peter Shipley <shipley@dis.org>
Diffstat (limited to 'security/slush')
-rw-r--r--security/slush/Makefile48
-rw-r--r--security/slush/distinfo1
-rw-r--r--security/slush/files/patch-aa60
-rw-r--r--security/slush/files/patch-ab19
-rw-r--r--security/slush/files/patch-ac120
-rw-r--r--security/slush/pkg-comment1
-rw-r--r--security/slush/pkg-descr7
-rw-r--r--security/slush/pkg-plist8
8 files changed, 264 insertions, 0 deletions
diff --git a/security/slush/Makefile b/security/slush/Makefile
new file mode 100644
index 0000000..5cbfdfa
--- /dev/null
+++ b/security/slush/Makefile
@@ -0,0 +1,48 @@
+# Ports collection makefile for: slush
+# Version required: 0.1.0
+# Date created: Sun May 3, 1999
+# Whom: shipley@dis.org
+#
+# $Id$
+#
+#DISTDIR= /var/tmp/ # for debuging
+
+DISTNAME= slush-0_1_0_tar
+PKGNAME= slush-0.1.0
+CATEGORIES= security net
+MASTER_SITES= ftp://www.dis.org/pub/Security/
+EXTRACT_SUFX= .gz
+
+MAINTAINER= shipley@dis.org
+
+BUILD_DEPENDS= openssl:${PORTSDIR}/security/openssl
+
+#MAN= slush.1
+
+GNU_CONFIGURE= yes
+
+#NOPROFILE= true
+
+.include <bsd.port.pre.mk>
+.if ${OSVERSION} <= 300000
+BROKEN= does not build
+.endif
+
+WRKSRC= ${WRKDIR}/slush-0.1.0
+.if defined(USA_RESIDENT) && ${USA_RESIDENT} == YES
+MAKE_ENV+= EXTRA_SSL_LIBS="-lRSAglue -lrsaref"
+.endif
+
+do-install:
+.if !defined(NOPORTDOCS)
+ @${MKDIR} ${PREFIX}/share/doc/slush
+ ${INSTALL_MAN} ${WRKSRC}/control.txt ${PREFIX}/share/doc/slush
+ ${INSTALL_MAN} ${WRKSRC}/INSTALL ${PREFIX}/share/doc/slush
+ ${INSTALL_MAN} ${WRKSRC}/HISTORY ${PREFIX}/share/doc/slush
+ ${INSTALL_MAN} ${WRKSRC}/README ${PREFIX}/share/doc/slush
+ ${INSTALL_MAN} ${WRKSRC}/COPYING ${PREFIX}/share/doc/slush
+.endif
+ ${INSTALL_PROGRAM} ${WRKSRC}/slush ${PREFIX}/bin/slush
+ ${INSTALL_PROGRAM} ${WRKSRC}/slushd ${PREFIX}/sbin/slushd
+
+.include <bsd.port.post.mk>
diff --git a/security/slush/distinfo b/security/slush/distinfo
new file mode 100644
index 0000000..c50ad5b
--- /dev/null
+++ b/security/slush/distinfo
@@ -0,0 +1 @@
+MD5 (slush-0_1_0_tar.gz) = a2a83e760632e2a0c12a7fdb29603ec3
diff --git a/security/slush/files/patch-aa b/security/slush/files/patch-aa
new file mode 100644
index 0000000..b7a70d5
--- /dev/null
+++ b/security/slush/files/patch-aa
@@ -0,0 +1,60 @@
+*** Makefile.in.orig Tue Apr 6 03:05:04 1999
+--- Makefile.in Sun May 9 00:05:44 1999
+***************
+*** 9,27 ****
+
+ CC=@CC@
+ INSTALL=@INSTALL@
+! CFLAGS=@CFLAGS@ -Wall -DVERSION=\"$(VERSION)\" -I/usr/local/ssl/include -I/usr/include/ssl
+! LIBS=@LIBS@ -L/usr/local/ssl/lib -lssl -lcrypto
+
+ all: slush slushd
+
+ slushd: slushd.o common.o
+! $(CC) $(LDFLAGS) -s -o $@ slushd.o common.o $(LIBS)
+
+ slushd.o: slushd.c common.o
+ $(CC) -c $(CFLAGS) slushd.c
+
+ slush: slush.o common.o
+! $(CC) $(LDFLAGS) -s -o $@ slush.o common.o $(LIBS)
+
+ slush.o: slush.c common.o
+ $(CC) -c $(CFLAGS) slush.c
+--- 9,27 ----
+
+ CC=@CC@
+ INSTALL=@INSTALL@
+! CFLAGS=@CFLAGS@ -Wall -DVERSION=\"$(VERSION)\" -I/usr/local/include
+! LIBS=@LIBS@ -L/usr/local/lib -lssl -lcrypto $(EXTRA_SSL_LIBS) -lutil
+
+ all: slush slushd
+
+ slushd: slushd.o common.o
+! $(CC) -static $(LDFLAGS) -o $@ slushd.o common.o $(LIBS)
+
+ slushd.o: slushd.c common.o
+ $(CC) -c $(CFLAGS) slushd.c
+
+ slush: slush.o common.o
+! $(CC) -static $(LDFLAGS) -o $@ slush.o common.o $(LIBS)
+
+ slush.o: slush.c common.o
+ $(CC) -c $(CFLAGS) slush.c
+***************
+*** 38,44 ****
+ install: $(SBINDIR)/slushd $(MANDIR)/slush.8
+
+ cert:
+! ssleay req -new -x509 -nodes \
+ -out slushd.pem -days 365 -keyout slushd.pem
+
+ clean:
+--- 38,44 ----
+ install: $(SBINDIR)/slushd $(MANDIR)/slush.8
+
+ cert:
+! openssl req -new -x509 -nodes \
+ -out slushd.pem -days 365 -keyout slushd.pem
+
+ clean:
diff --git a/security/slush/files/patch-ab b/security/slush/files/patch-ab
new file mode 100644
index 0000000..2a72fc6
--- /dev/null
+++ b/security/slush/files/patch-ab
@@ -0,0 +1,19 @@
+*** slush.c- Fri May 7 03:31:04 1999
+--- slush.c Fri May 7 03:31:14 1999
+***************
+*** 34,40 ****
+ #include <signal.h>
+ #include <string.h>
+ #include <stdlib.h>
+! #include <getopt.h>
+ #include <termios.h>
+ #include <pwd.h>
+ #include <sys/ioctl.h>
+--- 34,40 ----
+ #include <signal.h>
+ #include <string.h>
+ #include <stdlib.h>
+! /* #include <getopt.h> */
+ #include <termios.h>
+ #include <pwd.h>
+ #include <sys/ioctl.h>
diff --git a/security/slush/files/patch-ac b/security/slush/files/patch-ac
new file mode 100644
index 0000000..8ee3c7f
--- /dev/null
+++ b/security/slush/files/patch-ac
@@ -0,0 +1,120 @@
+*** slushd.c.orig Tue Apr 6 05:14:04 1999
+--- slushd.c Sat May 8 23:53:40 1999
+***************
+*** 40,46 ****
+ #include <ctype.h>
+ #include <stdlib.h>
+ #include <netdb.h>
+! #include <getopt.h>
+ #include <pwd.h>
+ #include <grp.h>
+ #include <fcntl.h>
+--- 40,46 ----
+ #include <ctype.h>
+ #include <stdlib.h>
+ #include <netdb.h>
+! #include <libutil.h>
+ #include <pwd.h>
+ #include <grp.h>
+ #include <fcntl.h>
+***************
+*** 51,56 ****
+--- 51,57 ----
+ #include <sys/stat.h>
+ #include <sys/ioctl.h>
+ #include <sys/file.h>
++
+ #ifdef HAVE_UNISTD_H
+ #include <unistd.h> /* fork, execvp, exit */
+ #endif
+***************
+*** 654,711 ****
+ void log_uwtmp(struct passwd *pw, struct in_addr *i, char *tty, int is_logout)
+ {
+ struct utmp ut;
+- int wtmp;
+- int lock;
+
+ tty = strrchr(tty, '/');
+ if (tty == NULL)
+ {
+ syslog(LOG_ERR, "Can't determine basename of tty");
+! exit(3);
+ }
+ tty++;
+
+- utmpname(_PATH_UTMP);
+- setutent();
+- memset(&ut, 0, sizeof(ut));
+
+! if (ut.ut_id[0] == 0)
+! strncpy(ut.ut_id, tty + 3, sizeof(ut.ut_id));
+
+- if (!is_logout)
+- strncpy(ut.ut_user, pw->pw_name, sizeof(ut.ut_user));
+-
+ strncpy(ut.ut_line, tty, sizeof(ut.ut_line) - 1);
+! ut.ut_line[sizeof(ut.ut_line) - 1] = 0;
+!
+! ut.ut_time = time(NULL);
+! ut.ut_type = is_logout?DEAD_PROCESS:USER_PROCESS;
+! ut.ut_pid = getpid();
+
+- strncpy(ut.ut_host, hostname, sizeof(ut.ut_host) - 1);
+- ut.ut_host[sizeof(ut.ut_host) - 1] = 0;
+
+! memcpy(&ut.ut_addr, i, sizeof(ut.ut_addr));
+!
+! pututline(&ut);
+! endutent();
+!
+! lock = open(_PATH_WTMPLOCK, O_CREAT|O_WRONLY, 0660);
+! if (lock == -1)
+! ioerror("open");
+!
+! if (flock(lock, LOCK_EX) == -1)
+! ioerror("flock");
+!
+! wtmp = open(_PATH_WTMP, O_APPEND|O_WRONLY);
+! if (wtmp == -1)
+! ioerror("open");
+!
+! write(wtmp, (char *)&ut, sizeof(ut));
+! close(wtmp);
+!
+! flock(lock, LOCK_UN);
+! close(lock);
+ }
+
+ /* Retrieve client X509 certificate and test authentication */
+--- 655,684 ----
+ void log_uwtmp(struct passwd *pw, struct in_addr *i, char *tty, int is_logout)
+ {
+ struct utmp ut;
+
+ tty = strrchr(tty, '/');
+ if (tty == NULL)
+ {
+ syslog(LOG_ERR, "Can't determine basename of tty");
+! return;
+ }
+ tty++;
++
+
+
+! if(is_logout) {
+! logout(tty);
+! return;
+! }
+
+ strncpy(ut.ut_line, tty, sizeof(ut.ut_line) - 1);
+! strncpy(ut.ut_name, pw->pw_name, sizeof(ut.ut_name)-1);
+! strncpy(ut.ut_host, inet_ntoa(*i), sizeof(ut.ut_host) - 1);
+! ut.ut_time = time(0);
+! login(&ut);
+
+
+! return;
+ }
+
+ /* Retrieve client X509 certificate and test authentication */
diff --git a/security/slush/pkg-comment b/security/slush/pkg-comment
new file mode 100644
index 0000000..b316eeb
--- /dev/null
+++ b/security/slush/pkg-comment
@@ -0,0 +1 @@
+A telnet-like application which uses a secure SSL channel
diff --git a/security/slush/pkg-descr b/security/slush/pkg-descr
new file mode 100644
index 0000000..8b7fba0
--- /dev/null
+++ b/security/slush/pkg-descr
@@ -0,0 +1,7 @@
+slush SSL remote shell
+
+slush is a simple telnet-like application which communicates over a
+secure SSL channel. It uses X509 certificates for authentication and
+can be compiled with tcp wrappers support (service name "slushd").
+
+slush is *alpha* software. Use it at your own risk.
diff --git a/security/slush/pkg-plist b/security/slush/pkg-plist
new file mode 100644
index 0000000..de12fbb
--- /dev/null
+++ b/security/slush/pkg-plist
@@ -0,0 +1,8 @@
+bin/slush
+sbin/slushd
+share/doc/slush/COPYING
+share/doc/slush/HISTORY
+share/doc/slush/INSTALL
+share/doc/slush/README
+share/doc/slush/control.txt
+@dirrm share/doc/slush
OpenPOWER on IntegriCloud