From: Luca Longinotti Date: Sun, 14 Jan 2007 20:10:05 +0000 (+0000) Subject: Cleanup. X-Git-Url: http://git.tremily.us/?a=commitdiff_plain;h=f226e2402432c8f03160fdf96a9c85a33b6393a1;p=gentoo.git Cleanup. Package-Manager: portage-2.1.2_rc4-r8 --- diff --git a/net-www/mod_security/Manifest b/net-www/mod_security/Manifest index a8e26a8f7f3e..fa7c089700f7 100644 --- a/net-www/mod_security/Manifest +++ b/net-www/mod_security/Manifest @@ -1,37 +1,21 @@ ------BEGIN PGP SIGNED MESSAGE----- -Hash: SHA1 - -AUX 1.8.6/99_mod_security.conf 3666 RMD160 91198642f19e9031b9edb0429c9e388736caa072 SHA1 c7cc9e6610c414c5aa4fef19622a5d9588f9b6b0 SHA256 7a564bbd901bd26147a4febb7372aa9d72491a46a722b8676e7618e842ca520b -MD5 99189490f6840a16c1e14874719592cf files/1.8.6/99_mod_security.conf 3666 -RMD160 91198642f19e9031b9edb0429c9e388736caa072 files/1.8.6/99_mod_security.conf 3666 -SHA256 7a564bbd901bd26147a4febb7372aa9d72491a46a722b8676e7618e842ca520b files/1.8.6/99_mod_security.conf 3666 -AUX 99_mod_security.conf 3671 RMD160 9f455037b364ac2e9411120b54c66343a7aee257 SHA1 2c339d1d020b3ea94d785d3c9c717e0fea845416 SHA256 ff1bc53f4659d987c12ae47fbd810bb58be7555ccd1a8966243f1ea226c6c6eb -MD5 4ff2b278a8aaff992f04347e4fda401b files/99_mod_security.conf 3671 -RMD160 9f455037b364ac2e9411120b54c66343a7aee257 files/99_mod_security.conf 3671 -SHA256 ff1bc53f4659d987c12ae47fbd810bb58be7555ccd1a8966243f1ea226c6c6eb files/99_mod_security.conf 3671 -AUX mod_security.conf 3399 RMD160 e68dd188b6be79aa225cbb39867bcc3b93dc2c3a SHA1 4b7ea2289508fe9e1273ae0ca753cfe16b4f0b41 SHA256 e674c61610ad561ab0cf9200b298c5f7594b1ab684bc322a1708cfb5b80f6d19 -MD5 854e24ef0e50b53915629f226e76b43c files/mod_security.conf 3399 -RMD160 e68dd188b6be79aa225cbb39867bcc3b93dc2c3a files/mod_security.conf 3399 -SHA256 e674c61610ad561ab0cf9200b298c5f7594b1ab684bc322a1708cfb5b80f6d19 files/mod_security.conf 3399 +AUX 99_mod_security.conf 3666 RMD160 91198642f19e9031b9edb0429c9e388736caa072 SHA1 c7cc9e6610c414c5aa4fef19622a5d9588f9b6b0 SHA256 7a564bbd901bd26147a4febb7372aa9d72491a46a722b8676e7618e842ca520b +MD5 99189490f6840a16c1e14874719592cf files/99_mod_security.conf 3666 +RMD160 91198642f19e9031b9edb0429c9e388736caa072 files/99_mod_security.conf 3666 +SHA256 7a564bbd901bd26147a4febb7372aa9d72491a46a722b8676e7618e842ca520b files/99_mod_security.conf 3666 DIST modsecurity-1.8.7.tar.gz 313004 RMD160 ee5e6566dda8c932e5e01833af290186f22af773 SHA1 59296d4c2776b0beb3ee65e4d5b7dc51f36142a5 SHA256 7314a0c6ebe50d8c71e44fcc520969a60d1d01a3c1a2e0a1d08b2b166eabf8ce -DIST modsecurity-apache-1.9.1.tar.gz 395659 RMD160 7e3da9ec9a2ccfeec195d7c41328f085c071e56f SHA1 6575846f985aacb8922ded19ba6ffacc4b6886b8 SHA256 b8ef27d4bdfa652884217592c1c17d31a78a1b97978a9d9e2b7dcdf6e969cd6b DIST modsecurity-apache_1.9.4.tar.gz 496805 RMD160 2fd5e3f43fa94836a4845f106285bed68c704aef SHA1 8f34540a8dfa8374d9b2446cf9b17c4acc69e59f SHA256 9ca6e614c58783faec9b14f58f569a96de420b25ab23063387a1ab51ce3f5171 -EBUILD mod_security-1.8.7.ebuild 987 RMD160 41d012e4bbc2b005aa3bae84b620a0997fb86db4 SHA1 08485f4da89f081702aeb365729f2d35e3e17858 SHA256 03c3817e976d37e9f383527fefc6a61c7d77ce365bb22c74041418f55ad794e3 -MD5 f52d11d8c3d77f51818250f611b9a775 mod_security-1.8.7.ebuild 987 -RMD160 41d012e4bbc2b005aa3bae84b620a0997fb86db4 mod_security-1.8.7.ebuild 987 -SHA256 03c3817e976d37e9f383527fefc6a61c7d77ce365bb22c74041418f55ad794e3 mod_security-1.8.7.ebuild 987 -EBUILD mod_security-1.9.1.ebuild 1046 RMD160 f450dda0e0db88c079e148070ccdad95002543df SHA1 27bccd6db1141c6aa64568abca6a2f940f90ac5c SHA256 4794facfb5338515bd333052302561e4a633c7df8555c86cbd45d6861efe9759 -MD5 65423c30d6932e66ace169fdbe5c3b10 mod_security-1.9.1.ebuild 1046 -RMD160 f450dda0e0db88c079e148070ccdad95002543df mod_security-1.9.1.ebuild 1046 -SHA256 4794facfb5338515bd333052302561e4a633c7df8555c86cbd45d6861efe9759 mod_security-1.9.1.ebuild 1046 -EBUILD mod_security-1.9.4.ebuild 1049 RMD160 6f4ed57f296bf43893ded11b1e3761a2de602780 SHA1 9073a7cc979dbccc17a88ea2d396c7e8ea9c9db7 SHA256 2da338f9f094f0246f8823c7dfb9daae2fc4b365f0168afeb8def63dce009f0e -MD5 cbecf8f644d2d6a7fbcda2c0cce9c397 mod_security-1.9.4.ebuild 1049 -RMD160 6f4ed57f296bf43893ded11b1e3761a2de602780 mod_security-1.9.4.ebuild 1049 -SHA256 2da338f9f094f0246f8823c7dfb9daae2fc4b365f0168afeb8def63dce009f0e mod_security-1.9.4.ebuild 1049 -MISC ChangeLog 2628 RMD160 1fe4e6dd7f02d299d616dc180e16e974b742e17f SHA1 9f78813f43f452b777dfc2d6d26d0f3f21a78839 SHA256 b465cfc392ddfb59e02ab7e88fc694f63050656941d43326482972fac2fb34e9 -MD5 33d876427b277ab4c13d6fa1d08a08de ChangeLog 2628 -RMD160 1fe4e6dd7f02d299d616dc180e16e974b742e17f ChangeLog 2628 -SHA256 b465cfc392ddfb59e02ab7e88fc694f63050656941d43326482972fac2fb34e9 ChangeLog 2628 +EBUILD mod_security-1.8.7.ebuild 959 RMD160 98e31f6a1b329a9333cd5ba2e91f84a671810ba7 SHA1 9a637bc8e607e3cf585b480d1f8097e109d749c8 SHA256 9f0f41875d9d289c10c0188ebafddfc2c7ff8db6c145f74dc6df7eb0df5b4489 +MD5 659744e396a4d23b449b1991ffe206e1 mod_security-1.8.7.ebuild 959 +RMD160 98e31f6a1b329a9333cd5ba2e91f84a671810ba7 mod_security-1.8.7.ebuild 959 +SHA256 9f0f41875d9d289c10c0188ebafddfc2c7ff8db6c145f74dc6df7eb0df5b4489 mod_security-1.8.7.ebuild 959 +EBUILD mod_security-1.9.4.ebuild 1046 RMD160 5c58eb6a37c89582cc52fb2c28444c8bfd0dc592 SHA1 312f95276429202fd8fb6029077dc7ace7d1db21 SHA256 c484056d4d2bcae2302e8e4bcb91e03e8ce02efbf53ba3556709d9e726d9bd5c +MD5 7fc7972da2e17738e779a603b53b6d98 mod_security-1.9.4.ebuild 1046 +RMD160 5c58eb6a37c89582cc52fb2c28444c8bfd0dc592 mod_security-1.9.4.ebuild 1046 +SHA256 c484056d4d2bcae2302e8e4bcb91e03e8ce02efbf53ba3556709d9e726d9bd5c mod_security-1.9.4.ebuild 1046 +MISC ChangeLog 2868 RMD160 7724c7ad97587edd90a747d13a8bbdd3de12f7b1 SHA1 d7c886d36722579cacd83b6d0b0da9757d7abf3e SHA256 fdbf7504f490d3ac3753d16dadc2ab96df41b10bd7d713f2854521978788489d +MD5 66dd6b5adb0bf6b26d8416c89b185c30 ChangeLog 2868 +RMD160 7724c7ad97587edd90a747d13a8bbdd3de12f7b1 ChangeLog 2868 +SHA256 fdbf7504f490d3ac3753d16dadc2ab96df41b10bd7d713f2854521978788489d ChangeLog 2868 MISC metadata.xml 255 RMD160 a80959a97f317179745aa51dc813fc77fc12f431 SHA1 202b14b369f47c3f1f5b44384447c7769cc61755 SHA256 deef3dd2faff775a34529a8909b6e003cce31ee1a9858ace880da761f463ab65 MD5 351176c1ea97204ce6b3a7516ee9f889 metadata.xml 255 RMD160 a80959a97f317179745aa51dc813fc77fc12f431 metadata.xml 255 @@ -39,16 +23,6 @@ SHA256 deef3dd2faff775a34529a8909b6e003cce31ee1a9858ace880da761f463ab65 metadata MD5 8c4e1e4e66aea15c00413b25ebfa5743 files/digest-mod_security-1.8.7 253 RMD160 e47d4f2750e52352444e1bc1a7171fac532b5120 files/digest-mod_security-1.8.7 253 SHA256 213963e27e0d3834b032c587f0045c3f75670f586d3e5f7bf3cc6bdc40b477a2 files/digest-mod_security-1.8.7 253 -MD5 40c5503db8d7f9714e55ca30a47e798c files/digest-mod_security-1.9.1 274 -RMD160 88dcf1cfdea0d7c0ddeb4b5c64ed1e5b288b6c86 files/digest-mod_security-1.9.1 274 -SHA256 6bbaf5b90a0e4decc7b9d20f1806b86eff1d5c5457639c0e8440d6676359ad53 files/digest-mod_security-1.9.1 274 MD5 97b7aedea9ae3e7a9f1860e686d24c3d files/digest-mod_security-1.9.4 274 RMD160 d52e1a24b3277f8016f746bac6a3cdaea63b638a files/digest-mod_security-1.9.4 274 SHA256 53acccec6f7f67ae628633bd127400295d38e1ce8b0e60173db7a5e6a5a1f022 files/digest-mod_security-1.9.4 274 ------BEGIN PGP SIGNATURE----- -Version: GnuPG v1.4.3 (GNU/Linux) - -iD8DBQFEoeXh/ejvha5XGaMRAiNEAKClx+3dG6qnHKBpU7GQRM1hqRlFQQCg9CBG -Ur2ME/WKpMIKc5qIueqkNOI= -=hGx+ ------END PGP SIGNATURE----- diff --git a/net-www/mod_security/files/1.8.6/99_mod_security.conf b/net-www/mod_security/files/1.8.6/99_mod_security.conf deleted file mode 100644 index 1269365021b4..000000000000 --- a/net-www/mod_security/files/1.8.6/99_mod_security.conf +++ /dev/null @@ -1,123 +0,0 @@ - - - LoadModule security_module modules/mod_security.so - - - -# Examples below are taken from the online documentation -# Refer to: -# http://www.modsecurity.org/documentation/quick-examples.html - - - - # Turn the filtering engine On or Off - SecFilterEngine On - - # Make sure that URL encoding is valid - SecFilterCheckURLEncoding On - - # Only allow bytes from this range - SecFilterForceByteRange 32 126 - - # The audit engine works independently and - # can be turned On of Off on the per-server or - # on the per-directory basis. "On" will log everything, - # "DynamicOrRelevant" will log dynamic requests or violations, - # and "RelevantOnly" will only log policy violations - SecAuditEngine RelevantOnly - - # The name of the audit log file - SecAuditLog logs/audit_log - - SecFilterDebugLog logs/modsec_debug_log - SecFilterDebugLevel 0 - - # Should mod_security inspect POST payloads - SecFilterScanPOST On - - # Action to take by default - SecFilterDefaultAction "deny,log,status:500" - - # Redirect user on filter match - SecFilter xxx redirect:http://www.webkreator.com - - # Execute the external script on filter match - SecFilter yyy log,exec:/home/users/ivanr/apache/bin/report-attack.pl - - # Simple filter - SecFilter 111 - - # Only check the QUERY_STRING variable - SecFilterSelective QUERY_STRING 222 - - # Only check the body of the POST request - SecFilterSelective POST_PAYLOAD 333 - - # Only check arguments (will work for GET and POST) - SecFilterSelective ARGS 444 - - # Test filter - SecFilter "/cgi-bin/modsec-test.pl/keyword" - - # Another test filter, will be denied with 404 but not logged - # action supplied as a parameter overrides the default action - SecFilter 999 "deny,nolog,status:500" - - # Prevent OS specific keywords - SecFilter /etc/passwd - - # Prevent path traversal (..) attacks - SecFilter "\.\./" - - # Weaker XSS protection but allows common HTML tags - SecFilter "<[[:space:]]*script" - - # Prevent XSS atacks (HTML/Javascript injection) - SecFilter "<(.|\n)+>" - - # Very crude filters to prevent SQL injection attacks - SecFilter "delete[[:space:]]+from" - SecFilter "insert[[:space:]]+into" - SecFilter "select.+from" - - # Require HTTP_USER_AGENT and HTTP_HOST headers - SecFilterSelective "HTTP_USER_AGENT|HTTP_HOST" "^$" - - # Forbid file upload - SecFilterSelective "HTTP_CONTENT_TYPE" multipart/form-data - - # Only watch argument p1 - SecFilterSelective "ARG_p1" 555 - - # Watch all arguments except p1 - SecFilterSelective "ARGS|!ARG_p2" 666 - - # Only allow our own test utility to send requests (or Mozilla) - SecFilterSelective HTTP_USER_AGENT "!(mod_security|mozilla)" - - # Do not allow variables with this name - SecFilterSelective ARGS_NAMES 777 - - # Do now allow this variable value (names are ok) - SecFilterSelective ARGS_VALUES 888 - - # Test for a POST variable parsing bug, see test #41 - SecFilterSelective ARG_p2 AAA - - # Stop spamming through FormMail - # note the exclamation mark at the beginning - # of the filter - only requests that match this regex will - # be allowed - - SecFilterSelective "ARG_recipient" "!@webkreator.com$" - - - # when allowing upload, only allow images - # note that this is not foolproof, a determined attacker - # could get around this - - SecFilterInheritance Off - SecFilterSelective POST_PAYLOAD "!image/(jpeg|bmp|gif)" - - - diff --git a/net-www/mod_security/files/digest-mod_security-1.9.1 b/net-www/mod_security/files/digest-mod_security-1.9.1 deleted file mode 100644 index 19fa7ddb3ce9..000000000000 --- a/net-www/mod_security/files/digest-mod_security-1.9.1 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 d648ba26b1dba708a06344072bea984c modsecurity-apache-1.9.1.tar.gz 395659 -RMD160 7e3da9ec9a2ccfeec195d7c41328f085c071e56f modsecurity-apache-1.9.1.tar.gz 395659 -SHA256 b8ef27d4bdfa652884217592c1c17d31a78a1b97978a9d9e2b7dcdf6e969cd6b modsecurity-apache-1.9.1.tar.gz 395659 diff --git a/net-www/mod_security/files/mod_security.conf b/net-www/mod_security/files/mod_security.conf deleted file mode 100644 index 186eaf58b46f..000000000000 --- a/net-www/mod_security/files/mod_security.conf +++ /dev/null @@ -1,113 +0,0 @@ - - - # Turn the filtering engine On or Off - SecFilterEngine On - - # Make sure that URL encoding is valid - SecFilterCheckURLEncoding On - - # Only allow bytes from this range - SecFilterForceByteRange 32 126 - - # The audit engine works independently and - # can be turned On of Off on the per-server or - # on the per-directory basis. "On" will log everything, - # "DynamicOrRelevant" will log dynamic requests or violations, - # and "RelevantOnly" will only log policy violations - SecAuditEngine RelevantOnly - - # The name of the audit log file - SecAuditLog logs/audit_log - - SecFilterDebugLog logs/modsec_debug_log - SecFilterDebugLevel 0 - - # Should mod_security inspect POST payloads - SecFilterScanPOST On - - # Action to take by default - SecFilterDefaultAction "deny,log,status:500" - - # Redirect user on filter match - SecFilter xxx redirect:http://www.webkreator.com - - # Execute the external script on filter match - SecFilter yyy log,exec:/home/users/ivanr/apache/bin/report-attack.pl - - # Simple filter - SecFilter 111 - - # Only check the QUERY_STRING variable - SecFilterSelective QUERY_STRING 222 - - # Only check the body of the POST request - SecFilterSelective POST_PAYLOAD 333 - - # Only check arguments (will work for GET and POST) - SecFilterSelective ARGS 444 - - # Test filter - SecFilter "/cgi-bin/modsec-test.pl/keyword" - - # Another test filter, will be denied with 404 but not logged - # action supplied as a parameter overrides the default action - SecFilter 999 "deny,nolog,status:500" - - # Prevent OS specific keywords - SecFilter /etc/passwd - - # Prevent path traversal (..) attacks - SecFilter "\.\./" - - # Weaker XSS protection but allows common HTML tags - SecFilter "<[[:space:]]*script" - - # Prevent XSS atacks (HTML/Javascript injection) - SecFilter "<(.|\n)+>" - - # Very crude filters to prevent SQL injection attacks - SecFilter "delete[[:space:]]+from" - SecFilter "insert[[:space:]]+into" - SecFilter "select.+from" - - # Require HTTP_USER_AGENT and HTTP_HOST headers - SecFilterSelective "HTTP_USER_AGENT|HTTP_HOST" "^$" - - # Forbid file upload - SecFilterSelective "HTTP_CONTENT_TYPE" multipart/form-data - - # Only watch argument p1 - SecFilterSelective "ARG_p1" 555 - - # Watch all arguments except p1 - SecFilterSelective "ARGS|!ARG_p2" 666 - - # Only allow our own test utility to send requests (or Mozilla) - SecFilterSelective HTTP_USER_AGENT "!(mod_security|mozilla)" - - # Do not allow variables with this name - SecFilterSelective ARGS_NAMES 777 - - # Do now allow this variable value (names are ok) - SecFilterSelective ARGS_VALUES 888 - - # Test for a POST variable parsing bug, see test #41 - SecFilterSelective ARG_p2 AAA - - # Stop spamming through FormMail - # note the exclamation mark at the beginning - # of the filter - only requests that match this regex will - # be allowed - - SecFilterSelective "ARG_recipient" "!@webkreator.com$" - - - # when allowing upload, only allow images - # note that this is not foolproof, a determined attacker - # could get around this - - SecFilterInheritance Off - SecFilterSelective POST_PAYLOAD "!image/(jpeg|bmp|gif)" - - - diff --git a/net-www/mod_security/mod_security-1.9.1.ebuild b/net-www/mod_security/mod_security-1.9.1.ebuild deleted file mode 100644 index 22b5c14c83f1..000000000000 --- a/net-www/mod_security/mod_security-1.9.1.ebuild +++ /dev/null @@ -1,31 +0,0 @@ -# Copyright 1999-2006 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/net-www/mod_security/mod_security-1.9.1.ebuild,v 1.2 2006/02/19 21:44:08 kumba Exp $ - -inherit eutils apache-module - -MY_P="${P/mod_security/modsecurity-apache}" -S="${WORKDIR}/${MY_P}" - -DESCRIPTION="Intrusion Detection System for Apache." -HOMEPAGE="http://www.modsecurity.org/" -SRC_URI="http://www.modsecurity.org/download/${MY_P}.tar.gz" -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="~amd64 ~mips ~ppc ~sparc ~x86" -IUSE="doc" - -APXS1_ARGS="-S LIBEXECDIR=${S} -c ${S}/apache1/mod_security.c" -APACHE1_MOD_FILE="apache1/${PN}.so" -APACHE1_MOD_CONF="1.8.6/99_mod_security" -APACHE1_MOD_DEFINE="SECURITY" - -APXS2_ARGS="-S LIBEXECDIR=${S} -c ${S}/apache2/mod_security.c" -APACHE2_MOD_FILE="apache2/.libs/${PN}.so" -APACHE2_MOD_CONF="1.8.6/99_mod_security" -APACHE2_MOD_DEFINE="SECURITY" - -DOCFILES="CHANGES httpd.conf.* INSTALL LICENSE README" -useq doc && DOCFILES="${DOCFILES} doc/modsecurity-apache-manual-1.9.pdf" - -need_apache