------BEGIN PGP SIGNED MESSAGE-----
-Hash: SHA1
-
-AUX 1.8.6/99_mod_security.conf 3666 RMD160 91198642f19e9031b9edb0429c9e388736caa072 SHA1 c7cc9e6610c414c5aa4fef19622a5d9588f9b6b0 SHA256 7a564bbd901bd26147a4febb7372aa9d72491a46a722b8676e7618e842ca520b
-MD5 99189490f6840a16c1e14874719592cf files/1.8.6/99_mod_security.conf 3666
-RMD160 91198642f19e9031b9edb0429c9e388736caa072 files/1.8.6/99_mod_security.conf 3666
-SHA256 7a564bbd901bd26147a4febb7372aa9d72491a46a722b8676e7618e842ca520b files/1.8.6/99_mod_security.conf 3666
-AUX 99_mod_security.conf 3671 RMD160 9f455037b364ac2e9411120b54c66343a7aee257 SHA1 2c339d1d020b3ea94d785d3c9c717e0fea845416 SHA256 ff1bc53f4659d987c12ae47fbd810bb58be7555ccd1a8966243f1ea226c6c6eb
-MD5 4ff2b278a8aaff992f04347e4fda401b files/99_mod_security.conf 3671
-RMD160 9f455037b364ac2e9411120b54c66343a7aee257 files/99_mod_security.conf 3671
-SHA256 ff1bc53f4659d987c12ae47fbd810bb58be7555ccd1a8966243f1ea226c6c6eb files/99_mod_security.conf 3671
-AUX mod_security.conf 3399 RMD160 e68dd188b6be79aa225cbb39867bcc3b93dc2c3a SHA1 4b7ea2289508fe9e1273ae0ca753cfe16b4f0b41 SHA256 e674c61610ad561ab0cf9200b298c5f7594b1ab684bc322a1708cfb5b80f6d19
-MD5 854e24ef0e50b53915629f226e76b43c files/mod_security.conf 3399
-RMD160 e68dd188b6be79aa225cbb39867bcc3b93dc2c3a files/mod_security.conf 3399
-SHA256 e674c61610ad561ab0cf9200b298c5f7594b1ab684bc322a1708cfb5b80f6d19 files/mod_security.conf 3399
+AUX 99_mod_security.conf 3666 RMD160 91198642f19e9031b9edb0429c9e388736caa072 SHA1 c7cc9e6610c414c5aa4fef19622a5d9588f9b6b0 SHA256 7a564bbd901bd26147a4febb7372aa9d72491a46a722b8676e7618e842ca520b
+MD5 99189490f6840a16c1e14874719592cf files/99_mod_security.conf 3666
+RMD160 91198642f19e9031b9edb0429c9e388736caa072 files/99_mod_security.conf 3666
+SHA256 7a564bbd901bd26147a4febb7372aa9d72491a46a722b8676e7618e842ca520b files/99_mod_security.conf 3666
DIST modsecurity-1.8.7.tar.gz 313004 RMD160 ee5e6566dda8c932e5e01833af290186f22af773 SHA1 59296d4c2776b0beb3ee65e4d5b7dc51f36142a5 SHA256 7314a0c6ebe50d8c71e44fcc520969a60d1d01a3c1a2e0a1d08b2b166eabf8ce
-DIST modsecurity-apache-1.9.1.tar.gz 395659 RMD160 7e3da9ec9a2ccfeec195d7c41328f085c071e56f SHA1 6575846f985aacb8922ded19ba6ffacc4b6886b8 SHA256 b8ef27d4bdfa652884217592c1c17d31a78a1b97978a9d9e2b7dcdf6e969cd6b
DIST modsecurity-apache_1.9.4.tar.gz 496805 RMD160 2fd5e3f43fa94836a4845f106285bed68c704aef SHA1 8f34540a8dfa8374d9b2446cf9b17c4acc69e59f SHA256 9ca6e614c58783faec9b14f58f569a96de420b25ab23063387a1ab51ce3f5171
-EBUILD mod_security-1.8.7.ebuild 987 RMD160 41d012e4bbc2b005aa3bae84b620a0997fb86db4 SHA1 08485f4da89f081702aeb365729f2d35e3e17858 SHA256 03c3817e976d37e9f383527fefc6a61c7d77ce365bb22c74041418f55ad794e3
-MD5 f52d11d8c3d77f51818250f611b9a775 mod_security-1.8.7.ebuild 987
-RMD160 41d012e4bbc2b005aa3bae84b620a0997fb86db4 mod_security-1.8.7.ebuild 987
-SHA256 03c3817e976d37e9f383527fefc6a61c7d77ce365bb22c74041418f55ad794e3 mod_security-1.8.7.ebuild 987
-EBUILD mod_security-1.9.1.ebuild 1046 RMD160 f450dda0e0db88c079e148070ccdad95002543df SHA1 27bccd6db1141c6aa64568abca6a2f940f90ac5c SHA256 4794facfb5338515bd333052302561e4a633c7df8555c86cbd45d6861efe9759
-MD5 65423c30d6932e66ace169fdbe5c3b10 mod_security-1.9.1.ebuild 1046
-RMD160 f450dda0e0db88c079e148070ccdad95002543df mod_security-1.9.1.ebuild 1046
-SHA256 4794facfb5338515bd333052302561e4a633c7df8555c86cbd45d6861efe9759 mod_security-1.9.1.ebuild 1046
-EBUILD mod_security-1.9.4.ebuild 1049 RMD160 6f4ed57f296bf43893ded11b1e3761a2de602780 SHA1 9073a7cc979dbccc17a88ea2d396c7e8ea9c9db7 SHA256 2da338f9f094f0246f8823c7dfb9daae2fc4b365f0168afeb8def63dce009f0e
-MD5 cbecf8f644d2d6a7fbcda2c0cce9c397 mod_security-1.9.4.ebuild 1049
-RMD160 6f4ed57f296bf43893ded11b1e3761a2de602780 mod_security-1.9.4.ebuild 1049
-SHA256 2da338f9f094f0246f8823c7dfb9daae2fc4b365f0168afeb8def63dce009f0e mod_security-1.9.4.ebuild 1049
-MISC ChangeLog 2628 RMD160 1fe4e6dd7f02d299d616dc180e16e974b742e17f SHA1 9f78813f43f452b777dfc2d6d26d0f3f21a78839 SHA256 b465cfc392ddfb59e02ab7e88fc694f63050656941d43326482972fac2fb34e9
-MD5 33d876427b277ab4c13d6fa1d08a08de ChangeLog 2628
-RMD160 1fe4e6dd7f02d299d616dc180e16e974b742e17f ChangeLog 2628
-SHA256 b465cfc392ddfb59e02ab7e88fc694f63050656941d43326482972fac2fb34e9 ChangeLog 2628
+EBUILD mod_security-1.8.7.ebuild 959 RMD160 98e31f6a1b329a9333cd5ba2e91f84a671810ba7 SHA1 9a637bc8e607e3cf585b480d1f8097e109d749c8 SHA256 9f0f41875d9d289c10c0188ebafddfc2c7ff8db6c145f74dc6df7eb0df5b4489
+MD5 659744e396a4d23b449b1991ffe206e1 mod_security-1.8.7.ebuild 959
+RMD160 98e31f6a1b329a9333cd5ba2e91f84a671810ba7 mod_security-1.8.7.ebuild 959
+SHA256 9f0f41875d9d289c10c0188ebafddfc2c7ff8db6c145f74dc6df7eb0df5b4489 mod_security-1.8.7.ebuild 959
+EBUILD mod_security-1.9.4.ebuild 1046 RMD160 5c58eb6a37c89582cc52fb2c28444c8bfd0dc592 SHA1 312f95276429202fd8fb6029077dc7ace7d1db21 SHA256 c484056d4d2bcae2302e8e4bcb91e03e8ce02efbf53ba3556709d9e726d9bd5c
+MD5 7fc7972da2e17738e779a603b53b6d98 mod_security-1.9.4.ebuild 1046
+RMD160 5c58eb6a37c89582cc52fb2c28444c8bfd0dc592 mod_security-1.9.4.ebuild 1046
+SHA256 c484056d4d2bcae2302e8e4bcb91e03e8ce02efbf53ba3556709d9e726d9bd5c mod_security-1.9.4.ebuild 1046
+MISC ChangeLog 2868 RMD160 7724c7ad97587edd90a747d13a8bbdd3de12f7b1 SHA1 d7c886d36722579cacd83b6d0b0da9757d7abf3e SHA256 fdbf7504f490d3ac3753d16dadc2ab96df41b10bd7d713f2854521978788489d
+MD5 66dd6b5adb0bf6b26d8416c89b185c30 ChangeLog 2868
+RMD160 7724c7ad97587edd90a747d13a8bbdd3de12f7b1 ChangeLog 2868
+SHA256 fdbf7504f490d3ac3753d16dadc2ab96df41b10bd7d713f2854521978788489d ChangeLog 2868
MISC metadata.xml 255 RMD160 a80959a97f317179745aa51dc813fc77fc12f431 SHA1 202b14b369f47c3f1f5b44384447c7769cc61755 SHA256 deef3dd2faff775a34529a8909b6e003cce31ee1a9858ace880da761f463ab65
MD5 351176c1ea97204ce6b3a7516ee9f889 metadata.xml 255
RMD160 a80959a97f317179745aa51dc813fc77fc12f431 metadata.xml 255
MD5 8c4e1e4e66aea15c00413b25ebfa5743 files/digest-mod_security-1.8.7 253
RMD160 e47d4f2750e52352444e1bc1a7171fac532b5120 files/digest-mod_security-1.8.7 253
SHA256 213963e27e0d3834b032c587f0045c3f75670f586d3e5f7bf3cc6bdc40b477a2 files/digest-mod_security-1.8.7 253
-MD5 40c5503db8d7f9714e55ca30a47e798c files/digest-mod_security-1.9.1 274
-RMD160 88dcf1cfdea0d7c0ddeb4b5c64ed1e5b288b6c86 files/digest-mod_security-1.9.1 274
-SHA256 6bbaf5b90a0e4decc7b9d20f1806b86eff1d5c5457639c0e8440d6676359ad53 files/digest-mod_security-1.9.1 274
MD5 97b7aedea9ae3e7a9f1860e686d24c3d files/digest-mod_security-1.9.4 274
RMD160 d52e1a24b3277f8016f746bac6a3cdaea63b638a files/digest-mod_security-1.9.4 274
SHA256 53acccec6f7f67ae628633bd127400295d38e1ce8b0e60173db7a5e6a5a1f022 files/digest-mod_security-1.9.4 274
------BEGIN PGP SIGNATURE-----
-Version: GnuPG v1.4.3 (GNU/Linux)
-
-iD8DBQFEoeXh/ejvha5XGaMRAiNEAKClx+3dG6qnHKBpU7GQRM1hqRlFQQCg9CBG
-Ur2ME/WKpMIKc5qIueqkNOI=
-=hGx+
------END PGP SIGNATURE-----
+++ /dev/null
-<IfDefine SECURITY>
- <IfModule !mod_security.c>
- LoadModule security_module modules/mod_security.so
- </IfModule>
-</IfDefine>
-
-# Examples below are taken from the online documentation
-# Refer to:
-# http://www.modsecurity.org/documentation/quick-examples.html
-
-<IfModule mod_security.c>
-
- # Turn the filtering engine On or Off
- SecFilterEngine On
-
- # Make sure that URL encoding is valid
- SecFilterCheckURLEncoding On
-
- # Only allow bytes from this range
- SecFilterForceByteRange 32 126
-
- # The audit engine works independently and
- # can be turned On of Off on the per-server or
- # on the per-directory basis. "On" will log everything,
- # "DynamicOrRelevant" will log dynamic requests or violations,
- # and "RelevantOnly" will only log policy violations
- SecAuditEngine RelevantOnly
-
- # The name of the audit log file
- SecAuditLog logs/audit_log
-
- SecFilterDebugLog logs/modsec_debug_log
- SecFilterDebugLevel 0
-
- # Should mod_security inspect POST payloads
- SecFilterScanPOST On
-
- # Action to take by default
- SecFilterDefaultAction "deny,log,status:500"
-
- # Redirect user on filter match
- SecFilter xxx redirect:http://www.webkreator.com
-
- # Execute the external script on filter match
- SecFilter yyy log,exec:/home/users/ivanr/apache/bin/report-attack.pl
-
- # Simple filter
- SecFilter 111
-
- # Only check the QUERY_STRING variable
- SecFilterSelective QUERY_STRING 222
-
- # Only check the body of the POST request
- SecFilterSelective POST_PAYLOAD 333
-
- # Only check arguments (will work for GET and POST)
- SecFilterSelective ARGS 444
-
- # Test filter
- SecFilter "/cgi-bin/modsec-test.pl/keyword"
-
- # Another test filter, will be denied with 404 but not logged
- # action supplied as a parameter overrides the default action
- SecFilter 999 "deny,nolog,status:500"
-
- # Prevent OS specific keywords
- SecFilter /etc/passwd
-
- # Prevent path traversal (..) attacks
- SecFilter "\.\./"
-
- # Weaker XSS protection but allows common HTML tags
- SecFilter "<[[:space:]]*script"
-
- # Prevent XSS atacks (HTML/Javascript injection)
- SecFilter "<(.|\n)+>"
-
- # Very crude filters to prevent SQL injection attacks
- SecFilter "delete[[:space:]]+from"
- SecFilter "insert[[:space:]]+into"
- SecFilter "select.+from"
-
- # Require HTTP_USER_AGENT and HTTP_HOST headers
- SecFilterSelective "HTTP_USER_AGENT|HTTP_HOST" "^$"
-
- # Forbid file upload
- SecFilterSelective "HTTP_CONTENT_TYPE" multipart/form-data
-
- # Only watch argument p1
- SecFilterSelective "ARG_p1" 555
-
- # Watch all arguments except p1
- SecFilterSelective "ARGS|!ARG_p2" 666
-
- # Only allow our own test utility to send requests (or Mozilla)
- SecFilterSelective HTTP_USER_AGENT "!(mod_security|mozilla)"
-
- # Do not allow variables with this name
- SecFilterSelective ARGS_NAMES 777
-
- # Do now allow this variable value (names are ok)
- SecFilterSelective ARGS_VALUES 888
-
- # Test for a POST variable parsing bug, see test #41
- SecFilterSelective ARG_p2 AAA
-
- # Stop spamming through FormMail
- # note the exclamation mark at the beginning
- # of the filter - only requests that match this regex will
- # be allowed
- <Location /cgi-bin/FormMail>
- SecFilterSelective "ARG_recipient" "!@webkreator.com$"
- </Location>
-
- # when allowing upload, only allow images
- # note that this is not foolproof, a determined attacker
- # could get around this
- <Location /fileupload.php>
- SecFilterInheritance Off
- SecFilterSelective POST_PAYLOAD "!image/(jpeg|bmp|gif)"
- </Location>
-
-</IfModule>
+++ /dev/null
-MD5 d648ba26b1dba708a06344072bea984c modsecurity-apache-1.9.1.tar.gz 395659
-RMD160 7e3da9ec9a2ccfeec195d7c41328f085c071e56f modsecurity-apache-1.9.1.tar.gz 395659
-SHA256 b8ef27d4bdfa652884217592c1c17d31a78a1b97978a9d9e2b7dcdf6e969cd6b modsecurity-apache-1.9.1.tar.gz 395659
+++ /dev/null
-<IfModule mod_security.c>
-
- # Turn the filtering engine On or Off
- SecFilterEngine On
-
- # Make sure that URL encoding is valid
- SecFilterCheckURLEncoding On
-
- # Only allow bytes from this range
- SecFilterForceByteRange 32 126
-
- # The audit engine works independently and
- # can be turned On of Off on the per-server or
- # on the per-directory basis. "On" will log everything,
- # "DynamicOrRelevant" will log dynamic requests or violations,
- # and "RelevantOnly" will only log policy violations
- SecAuditEngine RelevantOnly
-
- # The name of the audit log file
- SecAuditLog logs/audit_log
-
- SecFilterDebugLog logs/modsec_debug_log
- SecFilterDebugLevel 0
-
- # Should mod_security inspect POST payloads
- SecFilterScanPOST On
-
- # Action to take by default
- SecFilterDefaultAction "deny,log,status:500"
-
- # Redirect user on filter match
- SecFilter xxx redirect:http://www.webkreator.com
-
- # Execute the external script on filter match
- SecFilter yyy log,exec:/home/users/ivanr/apache/bin/report-attack.pl
-
- # Simple filter
- SecFilter 111
-
- # Only check the QUERY_STRING variable
- SecFilterSelective QUERY_STRING 222
-
- # Only check the body of the POST request
- SecFilterSelective POST_PAYLOAD 333
-
- # Only check arguments (will work for GET and POST)
- SecFilterSelective ARGS 444
-
- # Test filter
- SecFilter "/cgi-bin/modsec-test.pl/keyword"
-
- # Another test filter, will be denied with 404 but not logged
- # action supplied as a parameter overrides the default action
- SecFilter 999 "deny,nolog,status:500"
-
- # Prevent OS specific keywords
- SecFilter /etc/passwd
-
- # Prevent path traversal (..) attacks
- SecFilter "\.\./"
-
- # Weaker XSS protection but allows common HTML tags
- SecFilter "<[[:space:]]*script"
-
- # Prevent XSS atacks (HTML/Javascript injection)
- SecFilter "<(.|\n)+>"
-
- # Very crude filters to prevent SQL injection attacks
- SecFilter "delete[[:space:]]+from"
- SecFilter "insert[[:space:]]+into"
- SecFilter "select.+from"
-
- # Require HTTP_USER_AGENT and HTTP_HOST headers
- SecFilterSelective "HTTP_USER_AGENT|HTTP_HOST" "^$"
-
- # Forbid file upload
- SecFilterSelective "HTTP_CONTENT_TYPE" multipart/form-data
-
- # Only watch argument p1
- SecFilterSelective "ARG_p1" 555
-
- # Watch all arguments except p1
- SecFilterSelective "ARGS|!ARG_p2" 666
-
- # Only allow our own test utility to send requests (or Mozilla)
- SecFilterSelective HTTP_USER_AGENT "!(mod_security|mozilla)"
-
- # Do not allow variables with this name
- SecFilterSelective ARGS_NAMES 777
-
- # Do now allow this variable value (names are ok)
- SecFilterSelective ARGS_VALUES 888
-
- # Test for a POST variable parsing bug, see test #41
- SecFilterSelective ARG_p2 AAA
-
- # Stop spamming through FormMail
- # note the exclamation mark at the beginning
- # of the filter - only requests that match this regex will
- # be allowed
- <Location /cgi-bin/FormMail>
- SecFilterSelective "ARG_recipient" "!@webkreator.com$"
- </Location>
-
- # when allowing upload, only allow images
- # note that this is not foolproof, a determined attacker
- # could get around this
- <Location /fileupload.php>
- SecFilterInheritance Off
- SecFilterSelective POST_PAYLOAD "!image/(jpeg|bmp|gif)"
- </Location>
-
-</IfModule>
+++ /dev/null
-# Copyright 1999-2006 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/net-www/mod_security/mod_security-1.9.1.ebuild,v 1.2 2006/02/19 21:44:08 kumba Exp $
-
-inherit eutils apache-module
-
-MY_P="${P/mod_security/modsecurity-apache}"
-S="${WORKDIR}/${MY_P}"
-
-DESCRIPTION="Intrusion Detection System for Apache."
-HOMEPAGE="http://www.modsecurity.org/"
-SRC_URI="http://www.modsecurity.org/download/${MY_P}.tar.gz"
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="~amd64 ~mips ~ppc ~sparc ~x86"
-IUSE="doc"
-
-APXS1_ARGS="-S LIBEXECDIR=${S} -c ${S}/apache1/mod_security.c"
-APACHE1_MOD_FILE="apache1/${PN}.so"
-APACHE1_MOD_CONF="1.8.6/99_mod_security"
-APACHE1_MOD_DEFINE="SECURITY"
-
-APXS2_ARGS="-S LIBEXECDIR=${S} -c ${S}/apache2/mod_security.c"
-APACHE2_MOD_FILE="apache2/.libs/${PN}.so"
-APACHE2_MOD_CONF="1.8.6/99_mod_security"
-APACHE2_MOD_DEFINE="SECURITY"
-
-DOCFILES="CHANGES httpd.conf.* INSTALL LICENSE README"
-useq doc && DOCFILES="${DOCFILES} doc/modsecurity-apache-manual-1.9.pdf"
-
-need_apache