summaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
Diffstat (limited to 'security')
-rw-r--r--security/amavisd-new/files/pkg-message.in2
-rw-r--r--security/bruteblock/files/pkg-message.in6
-rw-r--r--security/calife/pkg-message2
-rw-r--r--security/clamav-unofficial-sigs/files/pkg-message.in4
-rw-r--r--security/clamsmtp/files/pkg-message.in6
-rw-r--r--security/denyhosts/files/pkg-message.in2
-rw-r--r--security/doorman/files/pkg-message.in2
-rw-r--r--security/dradis/files/pkg-message.in2
-rw-r--r--security/maia/files/pkg-message.in2
-rw-r--r--security/mailzu/files/pkg-message.in8
-rw-r--r--security/obfsproxy/files/pkg-message.in6
-rw-r--r--security/openbsm-devel/files/pkg-message.in2
-rw-r--r--security/openscep/files/pkg-message.in2
-rw-r--r--security/openssh-portable/pkg-message2
-rw-r--r--security/openssl_tpm_engine/files/pkg-message.in2
-rw-r--r--security/openvpn-devel/files/pkg-message.in2
-rw-r--r--security/p5-openxpki/files/pkg-message.in20
-rw-r--r--security/pam_yubico/files/pkg-message.in2
-rw-r--r--security/pks/files/pkg-message.in2
-rw-r--r--security/ppars/pkg-message2
-rw-r--r--security/py-fail2ban/pkg-message2
-rw-r--r--security/sguil/files/pkg-message-sensor.in12
-rw-r--r--security/snortsam/files/pkg-message.in2
-rw-r--r--security/sshguard/files/pkg-message.in4
-rw-r--r--security/sshit/files/pkg-message.in6
-rw-r--r--security/ssl-admin/files/pkg-message.in2
-rw-r--r--security/truecrypt/pkg-message2
-rw-r--r--security/vnccrack/files/pkg-message.in2
28 files changed, 55 insertions, 55 deletions
diff --git a/security/amavisd-new/files/pkg-message.in b/security/amavisd-new/files/pkg-message.in
index 3fe030a..e168d4a 100644
--- a/security/amavisd-new/files/pkg-message.in
+++ b/security/amavisd-new/files/pkg-message.in
@@ -3,7 +3,7 @@
To use amavisd-new, you need to install at least one virus scanner.
The following virus scanners are available in the FreeBSD ports
collection:
-
+
/usr/ports/security/clamav Clam Antivirus
/usr/ports/security/f-prot F-Prot Antivirus
diff --git a/security/bruteblock/files/pkg-message.in b/security/bruteblock/files/pkg-message.in
index c012910..9932afc 100644
--- a/security/bruteblock/files/pkg-message.in
+++ b/security/bruteblock/files/pkg-message.in
@@ -13,15 +13,15 @@ auth.info;authpriv.info |exec %%PREFIX%%/sbin/bruteblock
Also you should add ipfw2 table and the corresponding deny rule.
For example,
-# ipfw add deny ip from table(1) to any
+# ipfw add deny ip from table(1) to any
- Next, you'll want to setup periodical cleanup of ipfw2 table. Add following
+ Next, you'll want to setup periodical cleanup of ipfw2 table. Add following
lines to /etc/rc.conf:
bruteblockd_enable="YES"
bruteblockd_table="1"
bruteblockd_flags="-s 5"
-
+
and start bruteblockd: %%PREFIX%%/etc/rc.d/bruteblockd.sh start
See bruteblock(8) for more details.
diff --git a/security/calife/pkg-message b/security/calife/pkg-message
index 40c6e5f..6c58ac9 100644
--- a/security/calife/pkg-message
+++ b/security/calife/pkg-message
@@ -1,5 +1,5 @@
-This version supports (and encourages you to use) PAM. A sample
+This version supports (and encourages you to use) PAM. A sample
configuration file is in ${PREFIX}/etc/pam.d/calife.sample.
Rename it to "calife" to enable PAM authentication. It will fall
back to the previous methods if PAM is not available.
diff --git a/security/clamav-unofficial-sigs/files/pkg-message.in b/security/clamav-unofficial-sigs/files/pkg-message.in
index 0681c17..3fa2404 100644
--- a/security/clamav-unofficial-sigs/files/pkg-message.in
+++ b/security/clamav-unofficial-sigs/files/pkg-message.in
@@ -6,7 +6,7 @@ it first. Sample configuration files have been installed to:
%%ETCDIR%%
All user configuration changes should go in file "user.conf". Modify
-it according to your needs and when you are done set the value of
+it according to your needs and when you are done set the value of
"user_configuration_complete" parameter to "yes".
NOTE: Starting with version 5.0.0 configuration has been split into
@@ -19,7 +19,7 @@ obsolete configuration file:
%%PREFIX%%/etc/clamav-unofficial-sigs.conf
-To run the script periodically by cron, you also need to add it to
+To run the script periodically by cron, you also need to add it to
your crontab. Sample crontab and logrotate files are located in:
%%EXAMPLESDIR%%
diff --git a/security/clamsmtp/files/pkg-message.in b/security/clamsmtp/files/pkg-message.in
index 8f8d456..cd10b7e 100644
--- a/security/clamsmtp/files/pkg-message.in
+++ b/security/clamsmtp/files/pkg-message.in
@@ -3,11 +3,11 @@ Edit /etc/rc.conf and set
clamsmtpd_enable="YES"
-to enable clamsmtpd.
+to enable clamsmtpd.
-Also, there is a clamsmtpd.conf-sample in %%PREFIX%%/etc/,
+Also, there is a clamsmtpd.conf-sample in %%PREFIX%%/etc/,
rename to clamsmtpd.conf, otherwise specify -f option to your
-config file.
+config file.
To work with postfix, See also
http://memberwebs.com/nielsen/software/clamsmtp/postfix.html
diff --git a/security/denyhosts/files/pkg-message.in b/security/denyhosts/files/pkg-message.in
index 8dc8231..ca437a5 100644
--- a/security/denyhosts/files/pkg-message.in
+++ b/security/denyhosts/files/pkg-message.in
@@ -8,7 +8,7 @@ In order to proper working of denyhosts
sshd : /etc/hosts.deniedssh : deny
sshd : ALL : allow
2. issue the following command if /etc/hosts.deniedssh does not exist yet
-touch /etc/hosts.deniedssh
+touch /etc/hosts.deniedssh
-------------------------------------------------------------------------------
Warning:
diff --git a/security/doorman/files/pkg-message.in b/security/doorman/files/pkg-message.in
index c8fc235..9ea2fe4 100644
--- a/security/doorman/files/pkg-message.in
+++ b/security/doorman/files/pkg-message.in
@@ -3,7 +3,7 @@
To configure Doorman, please edit the files guestlist and doormand.cf found in
%%PREFIX%%/etc/doormand. Documentation can be found using:
-
+
$ man guestlist
$ man doormand.cf
diff --git a/security/dradis/files/pkg-message.in b/security/dradis/files/pkg-message.in
index 42841e6..5908775 100644
--- a/security/dradis/files/pkg-message.in
+++ b/security/dradis/files/pkg-message.in
@@ -5,7 +5,7 @@
For other databases such as MySQL configure the file
%%PREFIX%%/dradis/server/config/database.yml
- The (SQLite) database can be initialized with the command
+ The (SQLite) database can be initialized with the command
%%PREFIX%%/etc/rc.d/dradis initdb
For more information see:
diff --git a/security/maia/files/pkg-message.in b/security/maia/files/pkg-message.in
index decfa35..98c72b9 100644
--- a/security/maia/files/pkg-message.in
+++ b/security/maia/files/pkg-message.in
@@ -3,7 +3,7 @@
To use Maia-Mailguard, you need to install at least one virus scanner.
The following virus scanners are available in the FreeBSD ports
collection:
-
+
security/clamav Clam Antivirus
security/f-prot F-Prot Antivirus
security/drweb DrWeb antivirus suite
diff --git a/security/mailzu/files/pkg-message.in b/security/mailzu/files/pkg-message.in
index 5b7aa7e..b9a93c7 100644
--- a/security/mailzu/files/pkg-message.in
+++ b/security/mailzu/files/pkg-message.in
@@ -1,5 +1,5 @@
%%PKGNAME%% has been installed into:
-
+
%%WWWDIR%%
****************************************************
@@ -11,13 +11,13 @@ Then, edit %%WWWDIR%%/config/config.php
Also, please note that MailZu needs PHP's short_open_tag
boolean to be "on" (this is detault in typical installations
of PHP). To be certain, you can set "short_open_tag = on" in
-%%LOCALBASE%%/etc/php.ini.
+%%LOCALBASE%%/etc/php.ini.
-Finally, make MailZu available through your web site. An
+Finally, make MailZu available through your web site. An
example for httpd.conf:
Alias /mailzu/ "%%WWWDIR%%/"
-
+
<Directory "%%WWWDIR%%/">
Options none
AllowOverride Limit
diff --git a/security/obfsproxy/files/pkg-message.in b/security/obfsproxy/files/pkg-message.in
index 1e492d8..171730a6 100644
--- a/security/obfsproxy/files/pkg-message.in
+++ b/security/obfsproxy/files/pkg-message.in
@@ -5,14 +5,14 @@ As a client, add the following to %%PREFIX%%/etc/tor/torrc:
UseBridges 1
Bridge obfs2 x.x.x.x:yyyy FINGERPRINT-OF-BRIDGE
- ClientTransportPlugin obfs2 exec %%PREFIX%%/bin/obfsproxy managed
+ ClientTransportPlugin obfs2 exec %%PREFIX%%/bin/obfsproxy managed
or
UseBridges 1
Bridge obfs3 u.u.u.u:wwww FINGERPRINT-OF-BRIDGE
- ClientTransportPlugin obfs3 exec %%PREFIX%%/bin/obfsproxy managed
-
+ ClientTransportPlugin obfs3 exec %%PREFIX%%/bin/obfsproxy managed
+
As a bridge, add the following to %%PREFIX%%/etc/tor/torrc:
ServerTransportPlugin obfs2,obfs3 exec %%PREFIX%%/bin/obfsproxy managed
diff --git a/security/openbsm-devel/files/pkg-message.in b/security/openbsm-devel/files/pkg-message.in
index 73a7b28..39cd289 100644
--- a/security/openbsm-devel/files/pkg-message.in
+++ b/security/openbsm-devel/files/pkg-message.in
@@ -20,7 +20,7 @@ SHA256=8F:0A:FC:8A:3D:09:80:AF:D9:AA:38:CC:8A:86:53:E6:8F:B6:1C:55:30...
# dd if=/dev/urandom bs=32 count=1 | openssl base64 | cut -b -32
YjwbK69H5cEBlhcT+eJpJgJTFn5B2SrG
-4. Create /etc/security/auditdistd.conf configuration file:
+4. Create /etc/security/auditdistd.conf configuration file:
receiver {
host "<enter hostname of sender here> {
remote "tls://<enter IP of sender here>"
diff --git a/security/openscep/files/pkg-message.in b/security/openscep/files/pkg-message.in
index 83a5e54..d8c4dd6 100644
--- a/security/openscep/files/pkg-message.in
+++ b/security/openscep/files/pkg-message.in
@@ -8,7 +8,7 @@ You should also include %%PREFIX%%/etc/openscep/openscep.schema
into your slapd config (sample of this is at
%%PREFIX%%/etc/openscep/slapd.conf).
-Furthermore, you should add your ldap directory information from
+Furthermore, you should add your ldap directory information from
%%PREFIX%%/etc/openscep/openscep.ldif and edit DN specific information
there before doing ldapadd.
======================================================================
diff --git a/security/openssh-portable/pkg-message b/security/openssh-portable/pkg-message
index c89f7b0..9a781cb 100644
--- a/security/openssh-portable/pkg-message
+++ b/security/openssh-portable/pkg-message
@@ -11,6 +11,6 @@ OpenSSH port, and if truly necessary, re-enable remote root login
by readjusting this option in your sshd_config.
Users are encouraged to create single-purpose users with ssh keys, disable
-Password authentication by setting 'PasswordAuthentication no' and
+Password authentication by setting 'PasswordAuthentication no' and
'ChallengeResponseAuthentication no', and to define very narrow sudo
privileges instead of using root for automated tasks.
diff --git a/security/openssl_tpm_engine/files/pkg-message.in b/security/openssl_tpm_engine/files/pkg-message.in
index 68bdf78..c2aa43e 100644
--- a/security/openssl_tpm_engine/files/pkg-message.in
+++ b/security/openssl_tpm_engine/files/pkg-message.in
@@ -8,4 +8,4 @@ you might get the following error messages:
| 65738:error:80066070:tpm engine:TPM_ENGINE_INIT:unit failure:e_tpm.c:484:
| 65738:error:260B806D:engine routines:ENGINE_TABLE_REGISTER:init failed:/usr/src/secure/lib/libcrypto/../../../crypto/openssl/crypto/engine/eng_table.c:161:
| 65738:error:260BC065:engine routines:INT_ENGINE_CONFIGURE:engine configuration error:/usr/src/secure/lib/libcrypto/../../../crypto/openssl/crypto/engine/eng_cnf.c:204:section=tpm_section, name=default_algorithms, value=ALL
- | 65738:error:0E07606D:configuration file routines:MODULE_RUN:module initialization error:/usr/src/secure/lib/libcrypto/../../../crypto/openssl/crypto/conf/conf_mod.c:235:module=engines, value=engine_section, retcode=-1
+ | 65738:error:0E07606D:configuration file routines:MODULE_RUN:module initialization error:/usr/src/secure/lib/libcrypto/../../../crypto/openssl/crypto/conf/conf_mod.c:235:module=engines, value=engine_section, retcode=-1
diff --git a/security/openvpn-devel/files/pkg-message.in b/security/openvpn-devel/files/pkg-message.in
index 6f66ec4..a475fb2 100644
--- a/security/openvpn-devel/files/pkg-message.in
+++ b/security/openvpn-devel/files/pkg-message.in
@@ -9,7 +9,7 @@
### It may or may not be suitable for production. Use at your own risk.
### ------------------------------------------------------------------------
###
-### PLUGIN LOCATION CHANGED!
+### PLUGIN LOCATION CHANGED!
### The following plugin locations have changed. There is a symlink to the
### new file for the duration of the 2.3 release. This will be removed in
### OpenVPN 2.4+.
diff --git a/security/p5-openxpki/files/pkg-message.in b/security/p5-openxpki/files/pkg-message.in
index 87c2276..2d6c9de 100644
--- a/security/p5-openxpki/files/pkg-message.in
+++ b/security/p5-openxpki/files/pkg-message.in
@@ -1,31 +1,31 @@
=================================================================
-- Universal server building block (OpenXPKI) for arbitrary PKI: installed.
+- Universal server building block (OpenXPKI) for arbitrary PKI: installed.
- SCEP prerequisite binary and i18n tools for UI: installed.
- Enable utf8 locale (e.g. en_US.utf8) for the translation staff to operate
(translation is needed even for English language).
-- Install your favorite database (enable utf8 support),
+- Install your favorite database (enable utf8 support),
e.g. databases/mysql56-server
-- Install perl interface for your favorite database,
+- Install perl interface for your favorite database,
e.g. databases/p5-DBD-mysql
- Install your favorite web server.
Choose from two versions of the handler: based on CGI or FastCGI
perl core modules.
Copy CGI or FastCGI scripts from %%EXAMPLESDIR%%/cgi-bin to the location
- where your web server can use them. Set executable permissions for them.
- Copy htdocs files from %%EXAMPLESDIR%%/htdocs to the location
+ where your web server can use them. Set executable permissions for them.
+ Copy htdocs files from %%EXAMPLESDIR%%/htdocs to the location
where your web server can use them.
You can see some samples in %%EXAMPLESDIR%%/config/apache.
-- If you want your server to act just as the simplest CA,
+- If you want your server to act just as the simplest CA,
then the basic deployment procedure is all you need:
- copy sample configuration for this case with
+ copy sample configuration for this case with
cp -R %%EXAMPLESDIR%%/config/openxpki/* %%PREFIX%%/etc/openxpki/
and follow advice at:
https://openxpki.readthedocs.org/en/latest/quickstart.html
Without this deployment procedure OpenXPKI server would not start.
- If you want more complex role for your server inside the PKI infrastructure,
- then you need to perform further deployment procedure for your server atop
- the basic deployment.
-- This port has created user:group as openxpki:openxpki, which owns
+ then you need to perform further deployment procedure for your server atop
+ the basic deployment.
+- This port has created user:group as openxpki:openxpki, which owns
the OpenXPKI server.
- After first fresh installation, create empty log files as follows
(assuming your web server is owned by user www):
diff --git a/security/pam_yubico/files/pkg-message.in b/security/pam_yubico/files/pkg-message.in
index 6a781fe..7dac757 100644
--- a/security/pam_yubico/files/pkg-message.in
+++ b/security/pam_yubico/files/pkg-message.in
@@ -1,5 +1,5 @@
-For setup instructions on authenticating with your YubiKey, see:
+For setup instructions on authenticating with your YubiKey, see:
%%DOCSDIR%%/README
or
https://github.com/Yubico/yubico-pam/blob/master/README
diff --git a/security/pks/files/pkg-message.in b/security/pks/files/pkg-message.in
index b9676fe..ed4799c 100644
--- a/security/pks/files/pkg-message.in
+++ b/security/pks/files/pkg-message.in
@@ -12,7 +12,7 @@ Add the following lines to /etc/rc.conf.local or /etc/rc.conf to enable this ser
infrastructure to enable this. See:
%%PREFIX%%/share/doc/pks/README and
%%PREFIX%%/share/doc/pks/EMAIL for details.
-
+
pksd_queue_delay (int): Periodically process incoming mail.
Set to 60 seconds by default.
diff --git a/security/ppars/pkg-message b/security/ppars/pkg-message
index 3b04053..327b6a8 100644
--- a/security/ppars/pkg-message
+++ b/security/ppars/pkg-message
@@ -1,7 +1,7 @@
***************************************************************************
-Installer instructions.
+Installer instructions.
First issue rehash command and then run abuse.Reporting.system.pl
it contains an overview of how the system works and how to setup the
diff --git a/security/py-fail2ban/pkg-message b/security/py-fail2ban/pkg-message
index 1339f2c..eecbcca 100644
--- a/security/py-fail2ban/pkg-message
+++ b/security/py-fail2ban/pkg-message
@@ -10,7 +10,7 @@ For more information, see the official manual:
http://www.fail2ban.org/wiki/index.php/MANUAL_0_8#Configuration
-If you are upgrading from 0.8.x consider adopting the new
+If you are upgrading from 0.8.x consider adopting the new
configuration style.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
diff --git a/security/sguil/files/pkg-message-sensor.in b/security/sguil/files/pkg-message-sensor.in
index 609090d..22aa6d4 100644
--- a/security/sguil/files/pkg-message-sensor.in
+++ b/security/sguil/files/pkg-message-sensor.in
@@ -7,15 +7,15 @@ it and install the barnyard2-sguil port instead. You will need to
deinstall the barnyard2 port and install the barnyard2-sguil port yourself
instead. This port WILL NOT WORK without the barnyard2-sguil port!!
-See the %%DOCSDIR%%/INSTALL doc for details on the
-configuration and for croning the script.
+See the %%DOCSDIR%%/INSTALL doc for details on the
+configuration and for croning the script.
-WARNING!!! Sguil et al will fill up your /tmp directory very
+WARNING!!! Sguil et al will fill up your /tmp directory very
quickly. You should probably configure sguil et al to log to
another partition/location (e.g. /nsm/tmp/).
-You must ALSO edit all of the sensor conf files (located in
-%%PREFIX%%/%%SENSOR_SGUILDIR%%/etc/) to reflect your configuration before
+You must ALSO edit all of the sensor conf files (located in
+%%PREFIX%%/%%SENSOR_SGUILDIR%%/etc/) to reflect your configuration before
starting the sensor_agents.
A number of ancilliary things have been installed in
@@ -27,5 +27,5 @@ The new sancp.conf-sample file contains the settings for squil. NOTE:
the conf file is for sancp 1.5.3. It may need additional edits to work
with the current ports version of sancp. If you still want to maintain
the customized sancp.conf file, then copy the new sancp.conf-sample
-file to sguild-sancp.conf (for example) and add
+file to sguild-sancp.conf (for example) and add
sancp_conf=%%PREFIX%%/etc/sguild-sancp.conf to /etc/rc.conf.
diff --git a/security/snortsam/files/pkg-message.in b/security/snortsam/files/pkg-message.in
index 461458e..339b106 100644
--- a/security/snortsam/files/pkg-message.in
+++ b/security/snortsam/files/pkg-message.in
@@ -9,7 +9,7 @@ NOTE: SNORT have to be build with OPTION SNORTSAM.
With samtool it is possible to send alerts to snortsam,
this way you can test and adjust your FW rules.
- For more information read the INSTALL, FAQ, README
+ For more information read the INSTALL, FAQ, README
files in %%DOCSDIR%%
Additional consolidate http://snortsam.net
diff --git a/security/sshguard/files/pkg-message.in b/security/sshguard/files/pkg-message.in
index 2443827..8116946 100644
--- a/security/sshguard/files/pkg-message.in
+++ b/security/sshguard/files/pkg-message.in
@@ -5,12 +5,12 @@
You can start sshguard as a daemon by using the
rc.d script installed at %%PREFIX%%/etc/rc.d/sshguard .
-
+
See sshguard(8) and http://www.sshguard.net/docs/setup for additional info.
Please note that a few rc script parameters have been renamed to
better reflect the documentation:
-
+
sshguard_safety_thresh -> sshguard_danger_thresh
sshguard_pardon_min_interval -> sshguard_release_interval
sshguard_prescribe_interval -> sshguard_reset_interval
diff --git a/security/sshit/files/pkg-message.in b/security/sshit/files/pkg-message.in
index ad45352..f587a7b 100644
--- a/security/sshit/files/pkg-message.in
+++ b/security/sshit/files/pkg-message.in
@@ -16,9 +16,9 @@ auth.info;authpriv.info |exec %%PREFIX%%/sbin/sshit
table <badhosts> persist
block on $extdev from <badhosts> to any
- and reload the pf rules.
+ and reload the pf rules.
- If you want to use ipfw2 (with table) as the firewall, you should add a
+ If you want to use ipfw2 (with table) as the firewall, you should add a
table and the corresponding deny rule. For example,
-# ipfw add deny ip from table(0) to any
+# ipfw add deny ip from table(0) to any
diff --git a/security/ssl-admin/files/pkg-message.in b/security/ssl-admin/files/pkg-message.in
index cfb2f8f..7791df0 100644
--- a/security/ssl-admin/files/pkg-message.in
+++ b/security/ssl-admin/files/pkg-message.in
@@ -1,5 +1,5 @@
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
-Please edit the configuration file %%PREFIX%%/etc/ssl-admin/ssl-admin.conf
+Please edit the configuration file %%PREFIX%%/etc/ssl-admin/ssl-admin.conf
before running ssl-admin for the first time.
You're now ready to manage your SSL certificates.
diff --git a/security/truecrypt/pkg-message b/security/truecrypt/pkg-message
index 31d58ea..2b8c1e8 100644
--- a/security/truecrypt/pkg-message
+++ b/security/truecrypt/pkg-message
@@ -4,7 +4,7 @@
TrueCrypt is not offically supported under FreeBSD, however
it does seem to function fine under certain conditions.
-Until TrueCrypt is officially supported under FreeBSD, this
+Until TrueCrypt is officially supported under FreeBSD, this
port should be considered experimental. TrueCrypt's website
cites that system instability is possible.
diff --git a/security/vnccrack/files/pkg-message.in b/security/vnccrack/files/pkg-message.in
index edd2d41..1efde53 100644
--- a/security/vnccrack/files/pkg-message.in
+++ b/security/vnccrack/files/pkg-message.in
@@ -1,2 +1,2 @@
-Additional info on program usage can be found in this file:
+Additional info on program usage can be found in this file:
%%DOCSDIR%%/readme.txt
OpenPOWER on IntegriCloud