summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAndrei Dinu <andrei.adrianx.dinu@intel.com>2013-07-10 16:41:44 +0300
committerAndrei Dinu <andrei.adrianx.dinu@intel.com>2013-07-10 16:41:44 +0300
commitd54c9d7dadfddcd60ca11be23c5a2946f8a1b385 (patch)
treed52a2fdabd074fdbde6bb6744a627d9d20d771ec
parentf359c35ab250c09e858d88b8b1aa872bb7d2cddd (diff)
downloadmeta-security-d54c9d7dadfddcd60ca11be23c5a2946f8a1b385.tar.gz
Security layer version 1.0
Signed-off-by: Andrei Dinu <andrei.adrianx.dinu@intel.com>
-rw-r--r--README191
-rw-r--r--recipes-security/Mail-SpamAssasin/Mail-SpamAssassin_3.3.2.bb19
-rw-r--r--recipes-security/bastille/bastille_3.2.1.bb1
-rw-r--r--recipes-security/nikto/files/location.patch36
-rw-r--r--recipes-security/nikto/nikto_2.1.5.bb101
-rw-r--r--recipes-security/nmap/nmap_6.25.bb3
-rw-r--r--recipes-security/openvas-cli/openvas-cli_1.2.0.bb13
-rw-r--r--recipes-security/openvas-libraries/files/g_type_init.patch36
-rw-r--r--recipes-security/openvas-libraries/openvas-libraries_6.0.0.bb14
-rw-r--r--recipes-security/perl/files/libwhisker2.patch73
-rw-r--r--recipes-security/perl/libhtml-parser-perl_3.71.bb25
-rw-r--r--recipes-security/perl/libnet-dns-perl_0.72.bb25
-rw-r--r--recipes-security/perl/libnet-ssleay-perl_1.55.bb24
-rw-r--r--recipes-security/perl/libnetaddr-ip-perl_4.069.bb24
-rw-r--r--recipes-security/perl/libwhisker2-perl_2.5.bb24
15 files changed, 525 insertions, 84 deletions
diff --git a/README b/README
index 0d8ffba..4e42bc5 100644
--- a/README
+++ b/README
@@ -15,7 +15,7 @@ This layer depends on:
15 prio: default 15 prio: default
16 16
17Adding the security layer to your build 17Adding the security layer to your build
18================================================= 18========================================
19 19
20In order to use this layer, you need to make the build system aware of 20In order to use this layer, you need to make the build system aware of
21it. 21it.
@@ -29,8 +29,195 @@ other layers needed. e.g.:
29 /path/to/yocto/meta \ 29 /path/to/yocto/meta \
30 /path/to/poky/meta-security \ 30 /path/to/poky/meta-security \
31 31
32Contents and Help
33=================
34
35In this section the contents of the layer is listed, along with a short
36help for each package.
37
38 == bastille ==
39
40 Bastille is a system hardening / lockdown program which enhances the
41 security of a Unix host. It configures daemons, system settings and
42 firewalls to be more secure. It can shut off unneeded services
43 like rcp and rlogin, and helps create "chroot jails" that help limit the
44 vulnerability of common Internet services like Web services and DNS.
45
46 usage : Bastille can be used via meta-security layer only in command line mode.
47 To start Bastille simply write in a terminal :
48
49 bastille -c
50
51 If this is the first usage of Bastille on the system, the user will be
52 guided through a list of questions which need to be answered. In the end,
53 a config file will be created and run. After these steps, you will have a
54 hardened system.
55
56 If you only want to run the config file, without stepping through the
57 list of questions, simply write in a terminal :
58
59 bastille -b
60
61 More information can be found in the package readme and manual.
62
63
64 == redhat-security ==
65
66 Sometimes you want to check different aspects of a distribution for security problems.
67 This can be anything from file permissions to correctness of code. This is a collection of those tools.
68 Depending on what information the tool has to access, it may need to be run as root.
69
70 - rpm-chksec.sh : This will take an rpm name as input and verify each ELF file to see if its compiled with the intended flags
71 to most effectively use PIE and RELRO. Green is good, Orange could use work but is acceptable, and Red needs fixing.
72 It has a mode --all that is the equivalent of using rpm -qa and feeding the packages to it.
73 In this mode it will only give a summary result for the package. To find which files don't comply,
74 re-run using just the package name.
75
76 - find-nodrop-groups.sh : This will scan a whole file system to see if a program makes calls to change UID
77 and GID without also calling setgroups or initgroups.
78
79 - rpm-drop-groups.sh : Same as above, but takes an rpm name instead.
80
81 - find-chroot.sh : This script scans the whole file system looking for ELF files that calls chroot(2) that also do not include a call to chdir.
82 Programs that fail to do this do not have the cwd inside the chroot. This means the app can escape the protection that was intended.
83
84 - find-chroot-py.sh : This test is like the one above except it examines python scripts for the same problem.
85
86 - find-execstack.sh : This program scans the whole file system for ELF programs that have marked the stack as being executable.
87 This means that if the program has another vulnerablity such as stack buffer overflow,
88 any code the attacker places there is executable. Any program found must be fixed.
89
90 - find-hidden-exec.sh : This program scans the whole file system looking for excutables that are hidden.
91 Anything found must be investigated since its highly unusual for executables to be hidden.
92
93 - find-sh4errors.sh : This program scans the whole file system looking for shell scripts.
94 It then does a sh -n on the script which causes bash to parse the file to see if there are any mistakes.
95
96 - selinux-check-devices.sh : This script checks the /dev directory to see if there are any devices that are not correctly labeled.
97 Anything found by this test should be reported so that selinux policy can be fixed.
98 This test is very hardware specific, so to be effective a lot of people with different hardware
99 should run this test each upstream kernel version release.
100
101 - selinux-ls-unconfined.sh : This script scans the running processes and looks for anything labeled with initrc_t or inetd.
102 These both mean that there are daemons that do not have policy and are therefore running unconfined.
103 These should be reported as SE Linux policy problems. Because it checks currently running daemons,
104 the more you have running, the better the test is.
105
106 - find-sh4tmp.sh : This script scans the whole filesystem to check if shell scripts are using well known tmp file names
107 instead of obscure ones created by something like mktemp.
108
109 - find-elf4tmp.sh : This script scans the whole file system for ELF files using /tmp. When it finds this,
110 it also looks to see if any of the known good random name generator functions is called by looking
111 at the symbol table. If not, it will output the string.
112
113 - lib-bin-check.sh : This will check all installed library packages to see if an application is also part of the package.
114 The relationship to security is that the SHA256 hash check will fail if a 32 bit version overwrites it.
115 Also, the less binaries on a system, the more secure it is by virtue of removing the chance for an exploitable bug.
116
117
118 usage : simply invoke the script name in the terminal.
119
120
121 == pax-utils ==
122
123 pax-utils is a small set of various PaX aware and related utilities for
124 ELF binaries.
125
126 - scanelf : With this application you can print out information specific to the ELF structure of a binary.
127 For more help please consult the man pages or the readme file.
128
129 - pspax : is a user-space utility that scans the proc directory and list
130 ELF types, as well as their respective PaX flags and filenames and
131 attributes. Depending on build options, it may additionaly display the
132 process running set of capabilities.
133
134 - scanmacho : is a user-space utility to quickly scan given
135 Mach-Os, directories, or common system paths for different information. This
136 may include Mach-O types, their install_names, etc.
137
138 - dumpelf : is a user-space utility to dump all of the internal
139 ELF structures into the equivalent C structures for fun debugging and/or
140 reference purposes.
141
142
143 usage : simply invoke the script name in the terminal.
144
145
146 == buck-security ==
147
148 Buck-Security is a security scanner for Debian and Ubuntu Linux. It runs a couple of important checks and helps you to harden your Linux
149 system. This enables you to quickly overview the security status of your Linux system.
150
151 usage : switch to directory /usr/local/buck-security.
152 before running the script, you should check the activated checks in conf/buck-security.conf file.
153 after altering the changes, save the file and simply run :
154
155 ./buck-security
156
157 you can choose between different outputs : 1, 2(default) or 3.
158
159 More detailed usage can be found typing ./buck-security --help
160
161
162 == libseccomp ==
163
164 The libseccomp library provides and easy to use, platform independent, interface to the Linux Kernel's syscall filtering mechanism: seccomp.
165 The libseccomp API is designed to abstract away the underlying BPF based syscall filter language and present a more conventional
166 function-call based filtering interface that should be familiar to, and easily adopted by application developers.
167
168 usage : More detailed usage can be found in the man pages and README file of the package.
169
170
171
172 == checksecurity ==
173
174 checksecurity is a simple package which will scan your system for several simple security holes.
175 It uses a simple collection of plugins, all of which are shell scripts which are configured by environmental variables.
176
177 !! IMPORTANT !!
178
179 When including this package in the image, please consider adding the following line to the end of the conf/local.conf file:
180
181 CORE_IMAGE_EXTRA_INSTALL = "coreutils"
182
183 usage : To start checksecurity simply write in the terminal :
184
185 checksecurity
186
187 More detailed usage can be found in the man pages and README file of the package.
188
189
190 == nikto ==
191
192 Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items,
193 including over 6500 potentially dangerous files/CGIs, checks for outdated versions of over 1250 servers, and version specific
194 problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files,
195 HTTP server options, and will attempt to identify installed web servers and software.
196
197 usage : To start nikto simply write in the terminal :
198
199 nikto
200
201 More detailed usage can be found in the man pages and README file of the package.
202
203
204 == nmap ==
205
206 Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing.
207 Many systems and network administrators also find it useful for tasks such as network inventory,
208 managing service upgrade schedules, and monitoring host or service uptime.
209
210 usage : To start nikto simply write in the terminal :
211
212 nmap
213
214 More detailed usage can be found in the man pages and README file of the package.
215
216
217
218
32License 219License
33------- 220=======
34 221
35All metadata is MIT licensed unless otherwise stated. Source code included 222All metadata is MIT licensed unless otherwise stated. Source code included
36in tree for individual recipes is under the LICENSE stated in each recipe 223in tree for individual recipes is under the LICENSE stated in each recipe
diff --git a/recipes-security/Mail-SpamAssasin/Mail-SpamAssassin_3.3.2.bb b/recipes-security/Mail-SpamAssasin/Mail-SpamAssassin_3.3.2.bb
deleted file mode 100644
index af5907f..0000000
--- a/recipes-security/Mail-SpamAssasin/Mail-SpamAssassin_3.3.2.bb
+++ /dev/null
@@ -1,19 +0,0 @@
1SUMMARY = "e-mail filter"
2DESCRIPTION = "SpamAssassin is a mail filter which attempts to identify spam using a variety of mechanisms including text analysis, Bayesian filtering, DNS blocklists, and collaborative filtering databases."
3SECTION = "security"
4LICENSE = "GPL-2.0"
5LIC_FILES_CHKSUM = "file://${COMMON_LICENSE_DIR}/Apache-2.0;md5=89aea4e17d99a7cacdbeed46a0096b10"
6DEPENDS = "perl"
7
8SRC_URI = "http://apache.mirrors.hoobly.com/spamassassin/source/${PN}-${PV}.tar.gz"
9
10SRC_URI[md5sum] = "d1d62cc5c6eac57e88c4006d9633b81e"
11SRC_URI[sha256sum] = "5323038939a0ef9fc97d5264defce3ae1d95e98b3a94c4c3b583341c927f32df"
12
13EXTRA_CPANFLAGS = "EXPATLIBPATH=${STAGING_LIBDIR} EXPATINCPATH=${STAGING_INCDIR}"
14inherit cpan
15
16do_compile(){
17 export LIBC="$(find ${STAGING_DIR_TARGET}/${base_libdir}/ -name 'libc-*.so')"
18 cpan_do_compile
19}
diff --git a/recipes-security/bastille/bastille_3.2.1.bb b/recipes-security/bastille/bastille_3.2.1.bb
index ef754c2..36c30e5 100644
--- a/recipes-security/bastille/bastille_3.2.1.bb
+++ b/recipes-security/bastille/bastille_3.2.1.bb
@@ -4,6 +4,7 @@ LICENSE = "GPLv2"
4LIC_FILES_CHKSUM = "file://${S}/COPYING;md5=c93c0550bd3173f4504b2cbd8991e50b" 4LIC_FILES_CHKSUM = "file://${S}/COPYING;md5=c93c0550bd3173f4504b2cbd8991e50b"
5# Bash is needed for set +o privileged (check busybox), might also need ncurses 5# Bash is needed for set +o privileged (check busybox), might also need ncurses
6RDEPENDS_${PN} = "perl bash tcl perl-module-getopt-long perl-module-text-wrap lib-perl perl-module-file-path perl-module-mime-base64 perl-module-file-find perl-module-errno perl-module-file-glob perl-module-tie-hash-namedcapture perl-module-file-copy perl-module-english perl-module-exporter perl-module-cwd curses-perl coreutils" 6RDEPENDS_${PN} = "perl bash tcl perl-module-getopt-long perl-module-text-wrap lib-perl perl-module-file-path perl-module-mime-base64 perl-module-file-find perl-module-errno perl-module-file-glob perl-module-tie-hash-namedcapture perl-module-file-copy perl-module-english perl-module-exporter perl-module-cwd curses-perl coreutils"
7FILES_${PN} += "/run/lock/subsys/bastille"
7 8
8inherit allarch 9inherit allarch
9 10
diff --git a/recipes-security/nikto/files/location.patch b/recipes-security/nikto/files/location.patch
new file mode 100644
index 0000000..a95b062
--- /dev/null
+++ b/recipes-security/nikto/files/location.patch
@@ -0,0 +1,36 @@
1From e10b9b1f6704057ace39956ae1dc5c7caca07ff1 Mon Sep 17 00:00:00 2001
2From: Andrei Dinu <andrei.adrianx.dinu@intel.com>
3Date: Mon, 8 Jul 2013 11:53:54 +0300
4Subject: [PATCH] Setting the location of nikto on the image
5
6Upstream Status: Inapropriate
7
8Signed-off-by: Andrei Dinu <andrei.adrianx.dinu@intel.com>
9---
10 nikto.conf | 10 +++++-----
11 1 file changed, 5 insertions(+), 5 deletions(-)
12
13diff --git a/nikto.conf b/nikto.conf
14index 25b784d..9577033 100644
15--- a/nikto.conf
16+++ b/nikto.conf
17@@ -61,11 +61,11 @@ CIRT=174.142.17.165
18 CHECKMETHODS=HEAD GET
19
20 # If you want to specify the location of any of the files, specify them here
21-# EXECDIR=/opt/nikto # Location of Nikto
22-# PLUGINDIR=/opt/nikto/plugins # Location of plugin dir
23-# DBDIR=/opt/nikto/databases # Location of plugin dir
24-# TEMPLATEDIR=/opt/nikto/templates # Location of tempmlate dir
25-# DOCDIR=/opt/nikto/docs # Location of docs dir
26+EXECDIR=/usr/bin/nikto # Location of Nikto
27+PLUGINDIR=/etc/nikto/plugins # Location of plugin dir
28+DBDIR=/etc/nikto/databases # Location of plugin dir
29+TEMPLATEDIR=/etc/nikto/templates # Location of tempmlate dir
30+DOCDIR=/usr/share/doc/nikto # Location of docs dir
31
32 # Default plugin macros
33 @@MUTATE=dictionary;subdomain
34--
351.7.9.5
36
diff --git a/recipes-security/nikto/nikto_2.1.5.bb b/recipes-security/nikto/nikto_2.1.5.bb
new file mode 100644
index 0000000..3ca31ca
--- /dev/null
+++ b/recipes-security/nikto/nikto_2.1.5.bb
@@ -0,0 +1,101 @@
1SUMMARY = "web server scanner"
2DESCRIPTION = "Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6500 potentially dangerous \
3 files/CGIs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers."
4SECTION = "security"
5LICENSE = "GPLv2"
6LIC_FILES_CHKSUM = "file://${COMMON_LICENSE_DIR}/GPL-2.0;md5=801f80980d171dd6425610833a22dbe6"
7RDEPENDS_${PN} = "perl libnet-ssleay-perl perl-module-getopt-long perl-module-time-local perl-module-io-socket nikto-doc"
8
9SRC_URI = "http://cirt.net/nikto/${PN}-${PV}.tar.gz \
10 file://location.patch"
11
12SRC_URI[md5sum] = "efcc98a918becb77471ee9a5df0a7b1e"
13SRC_URI[sha256sum] = "0e672a6a46bf2abde419a0e8ea846696d7f32e99ad18a6b405736ee6af07509f"
14
15do_install() {
16 install -d ${D}${bindir}
17 install -d ${D}${datadir}
18 install -d ${D}${datadir}/man/man1
19 install -d ${D}${datadir}/doc/nikto
20 install -d ${D}${sysconfdir}/nikto
21 install -d ${D}${sysconfdir}/nikto/databases
22 install -d ${D}${sysconfdir}/nikto/plugins
23 install -d ${D}${sysconfdir}/nikto/templates
24
25 install -m 0644 databases/db_404_strings ${D}${sysconfdir}/nikto/databases
26 install -m 0644 databases/db_content_search ${D}${sysconfdir}/nikto/databases
27 install -m 0644 databases/db_dictionary ${D}${sysconfdir}/nikto/databases
28 install -m 0644 databases/db_embedded ${D}${sysconfdir}/nikto/databases
29 install -m 0644 databases/db_favicon ${D}${sysconfdir}/nikto/databases
30 install -m 0644 databases/db_headers ${D}${sysconfdir}/nikto/databases
31 install -m 0644 databases/db_httpoptions ${D}${sysconfdir}/nikto/databases
32 install -m 0644 databases/db_multiple_index ${D}${sysconfdir}/nikto/databases
33 install -m 0644 databases/db_outdated ${D}${sysconfdir}/nikto/databases
34 install -m 0644 databases/db_parked_strings ${D}${sysconfdir}/nikto/databases
35 install -m 0644 databases/db_realms ${D}${sysconfdir}/nikto/databases
36 install -m 0644 databases/db_server_msgs ${D}${sysconfdir}/nikto/databases
37 install -m 0644 databases/db_subdomains ${D}${sysconfdir}/nikto/databases
38 install -m 0644 databases/db_tests ${D}${sysconfdir}/nikto/databases
39 install -m 0644 databases/db_variables ${D}${sysconfdir}/nikto/databases
40
41 install -m 0644 plugins/JSON-PP.pm ${D}${sysconfdir}/nikto/plugins
42 install -m 0644 plugins/LW2.pm ${D}${sysconfdir}/nikto/plugins
43 install -m 0644 plugins/nikto_apache_expect_xss.plugin ${D}${sysconfdir}/nikto/plugins
44 install -m 0644 plugins/nikto_apacheusers.plugin ${D}${sysconfdir}/nikto/plugins
45 install -m 0644 plugins/nikto_auth.plugin ${D}${sysconfdir}/nikto/plugins
46 install -m 0644 plugins/nikto_cgi.plugin ${D}${sysconfdir}/nikto/plugins
47 install -m 0644 plugins/nikto_clientaccesspolicy.plugin ${D}${sysconfdir}/nikto/plugins
48 install -m 0644 plugins/nikto_content_search.plugin ${D}${sysconfdir}/nikto/plugins
49 install -m 0644 plugins/nikto_cookies.plugin ${D}${sysconfdir}/nikto/plugins
50 install -m 0644 plugins/nikto_core.plugin ${D}${sysconfdir}/nikto/plugins
51 install -m 0644 plugins/nikto_dictionary_attack.plugin ${D}${sysconfdir}/nikto/plugins
52 install -m 0644 plugins/nikto_embedded.plugin ${D}${sysconfdir}/nikto/plugins
53 install -m 0644 plugins/nikto_favicon.plugin ${D}${sysconfdir}/nikto/plugins
54 install -m 0644 plugins/nikto_fileops.plugin ${D}${sysconfdir}/nikto/plugins
55 install -m 0644 plugins/nikto_headers.plugin ${D}${sysconfdir}/nikto/plugins
56 install -m 0644 plugins/nikto_httpoptions.plugin ${D}${sysconfdir}/nikto/plugins
57 install -m 0644 plugins/nikto_msgs.plugin ${D}${sysconfdir}/nikto/plugins
58 install -m 0644 plugins/nikto_multiple_index.plugin ${D}${sysconfdir}/nikto/plugins
59 install -m 0644 plugins/nikto_outdated.plugin ${D}${sysconfdir}/nikto/plugins
60 install -m 0644 plugins/nikto_parked.plugin ${D}${sysconfdir}/nikto/plugins
61 install -m 0644 plugins/nikto_paths.plugin ${D}${sysconfdir}/nikto/plugins
62 install -m 0644 plugins/nikto_put_del_test.plugin ${D}${sysconfdir}/nikto/plugins
63 install -m 0644 plugins/nikto_report_csv.plugin ${D}${sysconfdir}/nikto/plugins
64 install -m 0644 plugins/nikto_report_html.plugin ${D}${sysconfdir}/nikto/plugins
65 install -m 0644 plugins/nikto_report_msf.plugin ${D}${sysconfdir}/nikto/plugins
66 install -m 0644 plugins/nikto_report_nbe.plugin ${D}${sysconfdir}/nikto/plugins
67 install -m 0644 plugins/nikto_report_text.plugin ${D}${sysconfdir}/nikto/plugins
68 install -m 0644 plugins/nikto_report_xml.plugin ${D}${sysconfdir}/nikto/plugins
69 install -m 0644 plugins/nikto_robots.plugin ${D}${sysconfdir}/nikto/plugins
70 install -m 0644 plugins/nikto_siebel.plugin ${D}${sysconfdir}/nikto/plugins
71 install -m 0644 plugins/nikto_ssl.plugin ${D}${sysconfdir}/nikto/plugins
72 install -m 0644 plugins/nikto_subdomain.plugin ${D}${sysconfdir}/nikto/plugins
73 install -m 0644 plugins/nikto_tests.plugin ${D}${sysconfdir}/nikto/plugins
74
75 install -m 0644 templates/htm_close.tmpl ${D}${sysconfdir}/nikto/templates
76 install -m 0644 templates/htm_end.tmpl ${D}${sysconfdir}/nikto/templates
77 install -m 0644 templates/htm_host_head.tmpl ${D}${sysconfdir}/nikto/templates
78 install -m 0644 templates/htm_host_im.tmpl ${D}${sysconfdir}/nikto/templates
79 install -m 0644 templates/htm_host_item.tmpl ${D}${sysconfdir}/nikto/templates
80 install -m 0644 templates/htm_start.tmpl ${D}${sysconfdir}/nikto/templates
81 install -m 0644 templates/htm_stop.tmpl ${D}${sysconfdir}/nikto/templates
82 install -m 0644 templates/htm_start.tmpl ${D}${sysconfdir}/nikto/templates
83 install -m 0644 templates/htm_summary.tmpl ${D}${sysconfdir}/nikto/templates
84 install -m 0644 templates/xml_end.tmpl ${D}${sysconfdir}/nikto/templates
85 install -m 0644 templates/xml_host_head.tmpl ${D}${sysconfdir}/nikto/templates
86 install -m 0644 templates/xml_host_im.tmpl ${D}${sysconfdir}/nikto/templates
87 install -m 0644 templates/xml_host_item.tmpl ${D}${sysconfdir}/nikto/templates
88 install -m 0644 templates/xml_start.tmpl ${D}${sysconfdir}/nikto/templates
89 install -m 0644 templates/xml_summary.tmpl ${D}${sysconfdir}/nikto/templates
90
91 install -m 0644 nikto.conf ${D}${sysconfdir}
92
93 install -m 0755 nikto.pl ${D}${bindir}/nikto
94 install -m 0644 replay.pl ${D}${bindir}
95 install -m 0644 docs/nikto.1 ${D}${datadir}/man/man1
96
97 install -m 0644 docs/CHANGES.txt ${D}${datadir}/doc/nikto
98 install -m 0644 docs/LICENSE.txt ${D}${datadir}/doc/nikto
99 install -m 0644 docs/nikto.dtd ${D}${datadir}/doc/nikto
100 install -m 0644 docs/nikto_manual.html ${D}${datadir}/doc/nikto
101}
diff --git a/recipes-security/nmap/nmap_6.25.bb b/recipes-security/nmap/nmap_6.25.bb
index ff0caa7..cb5f7d3 100644
--- a/recipes-security/nmap/nmap_6.25.bb
+++ b/recipes-security/nmap/nmap_6.25.bb
@@ -3,6 +3,7 @@ DESCRIPTION = "Nmap ("Network Mapper") is a free and open source (license) utili
3SECTION = "security" 3SECTION = "security"
4LICENSE = "GPL-2.0" 4LICENSE = "GPL-2.0"
5LIC_FILES_CHKSUM = "file://${COMMON_LICENSE_DIR}/GPL-2.0;md5=801f80980d171dd6425610833a22dbe6" 5LIC_FILES_CHKSUM = "file://${COMMON_LICENSE_DIR}/GPL-2.0;md5=801f80980d171dd6425610833a22dbe6"
6FILES_${PN} += "${target_datadir}/ncat"
6 7
7SRC_URI = "http://nmap.org/dist/${PN}-${PV}.tar.bz2 \ 8SRC_URI = "http://nmap.org/dist/${PN}-${PV}.tar.bz2 \
8 file://lua.patch" 9 file://lua.patch"
@@ -12,6 +13,8 @@ SRC_URI[sha256sum] = "3349cc6d36b86b95ca2b8075d16615a3a598cef494920d6652f9a8bf9f
12 13
13inherit autotools 14inherit autotools
14 15
16DEPENDS = "libpcap"
17
15EXTRA_OECONF = "--without-liblua --without-zenmap" 18EXTRA_OECONF = "--without-liblua --without-zenmap"
16 19
17do_configure() { 20do_configure() {
diff --git a/recipes-security/openvas-cli/openvas-cli_1.2.0.bb b/recipes-security/openvas-cli/openvas-cli_1.2.0.bb
deleted file mode 100644
index d755578..0000000
--- a/recipes-security/openvas-cli/openvas-cli_1.2.0.bb
+++ /dev/null
@@ -1,13 +0,0 @@
1DESCRIPTION = "The module OpenVAS-CLI collects command line tools to handle with the OpenVAS services via the respective protocols."
2SECTION = "security"
3LICENSE = "GPL-2.0"
4LIC_FILES_CHKSUM = "file://${COMMON_LICENSE_DIR}/GPL-2.0;md5=801f80980d171dd6425610833a22dbe6"
5
6DEPENDS = "gnutls openvas-libraries glib-2.0"
7
8SRC_URI = "http://wald.intevation.org/frs/download.php/1323/${PN}-${PV}.tar.gz"
9
10SRC_URI[md5sum] = "e712eb71f3a13cc1b70b50f696465f8e"
11SRC_URI[sha256sum] = "d195ca01a44940d1e6fd2ad54ee4fc9b57a3d103235f0a1f05a8b35d97db6be8"
12
13inherit cmake pkgconfig
diff --git a/recipes-security/openvas-libraries/files/g_type_init.patch b/recipes-security/openvas-libraries/files/g_type_init.patch
deleted file mode 100644
index db55057..0000000
--- a/recipes-security/openvas-libraries/files/g_type_init.patch
+++ /dev/null
@@ -1,36 +0,0 @@
1From f498503889b8178f165afa66dc33aa8ad8901371 Mon Sep 17 00:00:00 2001
2From: Andrei Dinu <andrei.adrianx.dinu@intel.com>
3Date: Fri, 28 Jun 2013 09:38:08 +0300
4Subject: [PATCH] removed the g_type_init()
5
6The function is depricated in glib >= 2.35.0 and is
7automatically called.
8
9Signed-off-by: Andrei Dinu <andrei.adrianx.dinu@intel.com>
10---
11 base/openvas_file.c | 2 --
12 1 file changed, 2 deletions(-)
13
14diff --git a/base/openvas_file.c b/base/openvas_file.c
15index 8597198..d110c7f 100644
16--- a/base/openvas_file.c
17+++ b/base/openvas_file.c
18@@ -164,7 +164,6 @@ openvas_file_copy (const gchar *source_file, const gchar *dest_file)
19 GFile *sfile, *dfile;
20 GError *error;
21
22- g_type_init ();
23 sfile = g_file_new_for_path (source_file);
24 dfile = g_file_new_for_path (dest_file);
25 error = NULL;
26@@ -200,7 +199,6 @@ openvas_file_move (const gchar *source_file, const gchar *dest_file)
27 GFile *sfile, *dfile;
28 GError *error;
29
30- g_type_init ();
31 sfile = g_file_new_for_path (source_file);
32 dfile = g_file_new_for_path (dest_file);
33 error = NULL;
34--
351.7.9.5
36
diff --git a/recipes-security/openvas-libraries/openvas-libraries_6.0.0.bb b/recipes-security/openvas-libraries/openvas-libraries_6.0.0.bb
deleted file mode 100644
index caf96f1..0000000
--- a/recipes-security/openvas-libraries/openvas-libraries_6.0.0.bb
+++ /dev/null
@@ -1,14 +0,0 @@
1DESCRIPTION = "This is the libraries module for the Open Vulnerability Assessment System (OpenVAS)."
2SECTION = "security"
3LICENSE = "GPL-2.0"
4LIC_FILES_CHKSUM = "file://${COMMON_LICENSE_DIR}/GPL-2.0;md5=801f80980d171dd6425610833a22dbe6"
5
6DEPENDS = "bison flex gpgme glib-2.0"
7
8SRC_URI = "http://wald.intevation.org/frs/download.php/1303/${PN}-${PV}.tar.gz \
9 file://g_type_init.patch"
10
11SRC_URI[md5sum] = "0e8b73ee4ad5b36984b5d7be5d6bdfc0"
12SRC_URI[sha256sum] = "50d23afd46f7b49c4cb82a6500b0fe1fb53378af5efce95fd275ea33c879e1dd"
13
14inherit cmake pkgconfig
diff --git a/recipes-security/perl/files/libwhisker2.patch b/recipes-security/perl/files/libwhisker2.patch
new file mode 100644
index 0000000..c066366
--- /dev/null
+++ b/recipes-security/perl/files/libwhisker2.patch
@@ -0,0 +1,73 @@
1From 34698c7f561fb575293a1c991a71e1b4ddc5ae73 Mon Sep 17 00:00:00 2001
2From: Andrei Dinu <andrei.adrianx.dinu@intel.com>
3Date: Fri, 5 Jul 2013 11:56:58 +0300
4Subject: [PATCH] Mandir and perl install dir were overwritten with faulty
5 information in the Makefile. Now the Mandir and perl
6 install dir are sent via paramters from the recipe.
7
8Signed-off-by: Andrei Dinu <andrei.adrianx.dinu@intel.com>
9---
10 Makefile.pl | 12 +++++++-----
11 1 file changed, 7 insertions(+), 5 deletions(-)
12
13diff --git a/Makefile.pl b/Makefile.pl
14index 9ca5602..8776e18 100644
15--- a/Makefile.pl
16+++ b/Makefile.pl
17@@ -131,6 +131,8 @@ foreach (keys %MODULES){
18
19 # adjust DESTDIR, if needed
20 $DESTDIR = $ENV{DESTDIR} if(defined $ENV{DESTDIR});
21+$MANDIR = $ENV{MANDIR} if(defined $ENV{MANDIR});
22+$INSTALLDIR = $ENV{INSTALLDIR} if(defined $ENV{INSTALLDIR});
23
24 # parse command line build options
25 while($COMMAND = shift @ARGV){
26@@ -171,7 +173,7 @@ sub command_install_pod {
27 command_build() if(!-e $TARGET);
28 die("Can not install without Config.pm") if($MODULES{Config}==0);
29 $CWD=&cwd if($MODULES{Cwd}>0);
30- my $where=$DESTDIR . $Config{'man3direxp'};
31+ my $where=$DESTDIR . $MANDIR;
32 my $t = $TARGET;
33 if($LIBRARY){
34 $t="$PACKAGE.3pm";
35@@ -219,7 +221,7 @@ sub command_install_pod {
36 sub command_uninstall_pod {
37 die("Can not uninstall without Config.pm") if($MODULES{Config}==0);
38 $CWD=&cwd if($MODULES{Cwd}>0);
39- my $where=$DESTDIR . $Config{'man3direxp'};
40+ my $where=$DESTDIR . $MANDIR;
41 my $t = $TARGET;
42 if($LIBRARY){
43 $t="$PACKAGE.3pm";
44@@ -243,7 +245,7 @@ sub command_install_library {
45 command_build() if(!-e $TARGET);
46 die("Can not install without Config.pm") if($MODULES{Config}==0);
47 $CWD=&cwd if($MODULES{Cwd}>0);
48- my $where=$DESTDIR . $Config{'installsitelib'};
49+ my $where=$DESTDIR . $INSTALLDIR;
50 if(!-e $where){
51 print STDOUT "WARNING!\n\n",
52 "The local perl site directory does not exist:\n",
53@@ -271,7 +273,7 @@ sub command_install_library {
54 sub command_uninstall_library {
55 die("Can not uninstall without Config.pm") if($MODULES{Config}==0);
56 $CWD=&cwd if($MODULES{Cwd}>0);
57- my $where=$DESTDIR . $Config{'installsitelib'};
58+ my $where=$DESTDIR . $INSTALLDIR;
59 chdir($where);
60 if(-e $TARGET){
61 unlink $TARGET;
62@@ -401,7 +403,7 @@ sub command_socket_diag {
63 sub command_install_compat {
64 die("Can not install without Config.pm") if($MODULES{Config}==0);
65 $CWD=&cwd if($MODULES{Cwd}>0);
66- my $where=$DESTDIR . $Config{'installsitelib'};
67+ my $where=$DESTDIR . $INSTALLDIR;
68 if(!-e $where){
69 print STDOUT "WARNING!\n\n",
70 "The local perl site directory does not exist:\n",
71--
721.7.9.5
73
diff --git a/recipes-security/perl/libhtml-parser-perl_3.71.bb b/recipes-security/perl/libhtml-parser-perl_3.71.bb
new file mode 100644
index 0000000..be0f4b2
--- /dev/null
+++ b/recipes-security/perl/libhtml-parser-perl_3.71.bb
@@ -0,0 +1,25 @@
1DESCRIPTION = "This package contains the Parser.pm module with friends."
2
3SECTION = "libs"
4LICENSE = "Artistic-1.0 | GPL-1.0+"
5
6LIC_FILES_CHKSUM = "file://README;md5=6c3dacf9f405c7483870ab5f148770c3"
7
8DEPENDS += "perl"
9
10SRC_URI = "http://search.cpan.org/CPAN/authors/id/G/GA/GAAS/HTML-Parser-${PV}.tar.gz"
11
12SRC_URI[md5sum] = "9128a45893097dfa3bf03301b19c5efe"
13SRC_URI[sha256sum] = "be918b3749d3ff93627f72ee4b825683332ecb4c81c67a3a8d72b0435ffbd802"
14
15S = "${WORKDIR}/HTML-Parser-${PV}"
16
17EXTRA_CPANFLAGS = "EXPATLIBPATH=${STAGING_LIBDIR} EXPATINCPATH=${STAGING_INCDIR}"
18
19inherit cpan
20
21do_compile() {
22 export LIBC="$(find ${STAGING_DIR_TARGET}/${base_libdir}/ -name 'libc-*.so')"
23 cpan_do_compile
24}
25BBCLASSEXTEND = "native"
diff --git a/recipes-security/perl/libnet-dns-perl_0.72.bb b/recipes-security/perl/libnet-dns-perl_0.72.bb
new file mode 100644
index 0000000..5c218b8
--- /dev/null
+++ b/recipes-security/perl/libnet-dns-perl_0.72.bb
@@ -0,0 +1,25 @@
1DESCRIPTION = "This package contains the DNS.pm module with friends."
2
3SECTION = "libs"
4LICENSE = "Artistic-1.0 | GPL-1.0+"
5
6LIC_FILES_CHKSUM = "file://README;md5=f21d77d9c6b56a07470bbce561b169e3"
7
8DEPENDS += "perl"
9
10SRC_URI = "http://search.cpan.org/CPAN/authors/id/N/NL/NLNETLABS/Net-DNS-${PV}.tar.gz"
11
12SRC_URI[md5sum] = "393e48ec6f28abe5ed30204276e02775"
13SRC_URI[sha256sum] = "a62cae0be54a9684c305456cb95515a0bd3128d6ef3093b6069fe8e8e8d5943f"
14
15S = "${WORKDIR}/Net-DNS-${PV}"
16
17EXTRA_CPANFLAGS = "EXPATLIBPATH=${STAGING_LIBDIR} EXPATINCPATH=${STAGING_INCDIR}"
18
19inherit cpan
20
21do_compile() {
22 export LIBC="$(find ${STAGING_DIR_TARGET}/${base_libdir}/ -name 'libc-*.so')"
23 cpan_do_compile
24}
25BBCLASSEXTEND = "native"
diff --git a/recipes-security/perl/libnet-ssleay-perl_1.55.bb b/recipes-security/perl/libnet-ssleay-perl_1.55.bb
new file mode 100644
index 0000000..1dd59f4
--- /dev/null
+++ b/recipes-security/perl/libnet-ssleay-perl_1.55.bb
@@ -0,0 +1,24 @@
1DESCRIPTION = "Perl module for using OpenSSL"
2
3SECTION = "libs"
4LICENSE = "Artistic-1.0 | GPL-1.0+"
5
6LIC_FILES_CHKSUM = "file://README;md5=94ec8036b939a2e3c9b5e7f10af8f4ee"
7
8DEPENDS += "perl openssl"
9
10SRC_URI = "http://search.cpan.org/CPAN/authors/id/M/MI/MIKEM/Net-SSLeay-${PV}.tar.gz"
11
12SRC_URI[md5sum] = "473b8d66ca69d5784bb0e428721f58e0"
13SRC_URI[sha256sum] = "8cd5f09722e07b4e436102cb3a4b93623d753c171665ca9752c3b39a62ea3a79"
14
15S = "${WORKDIR}/Net-SSLeay-${PV}"
16
17EXTRA_CPANFLAGS = "INC='-I${STAGING_INCDIR}' LIBS='-L${STAGING_LIBDIR} -lssl -lcrypto -lz'"
18
19inherit cpan
20
21do_compile() {
22 export LIBC="$(find ${STAGING_DIR_TARGET}/${base_libdir}/ -name 'libc-*.so')"
23 cpan_do_compile
24}
diff --git a/recipes-security/perl/libnetaddr-ip-perl_4.069.bb b/recipes-security/perl/libnetaddr-ip-perl_4.069.bb
new file mode 100644
index 0000000..99c11b2
--- /dev/null
+++ b/recipes-security/perl/libnetaddr-ip-perl_4.069.bb
@@ -0,0 +1,24 @@
1DESCRIPTION = "This package contains the IP.pm module with friends."
2
3SECTION = "libs"
4LICENSE = "Artistic-1.0 | GPL-1.0+"
5
6LIC_FILES_CHKSUM = "file://Copying;md5=cde580764a0fbc0f02fafde4c65d6227"
7
8DEPENDS += "perl"
9
10SRC_URI = "http://search.cpan.org/CPAN/authors/id/M/MI/MIKER/NetAddr-IP-${PV}.tar.gz"
11
12SRC_URI[md5sum] = "7721135fcea390327f75421a6b701144"
13SRC_URI[sha256sum] = "96739afc484eca1597c4f4b520864b342169c8fdeef486778511e5a1527ba4e7"
14
15S = "${WORKDIR}/NetAddr-IP-${PV}"
16
17EXTRA_CPANFLAGS = "EXPATLIBPATH=${STAGING_LIBDIR} EXPATINCPATH=${STAGING_INCDIR}"
18
19inherit cpan
20
21do_compile() {
22 cpan_do_compile
23}
24BBCLASSEXTEND = "native"
diff --git a/recipes-security/perl/libwhisker2-perl_2.5.bb b/recipes-security/perl/libwhisker2-perl_2.5.bb
new file mode 100644
index 0000000..477f995
--- /dev/null
+++ b/recipes-security/perl/libwhisker2-perl_2.5.bb
@@ -0,0 +1,24 @@
1DESCRIPTION = "Libwhisker is a Perl module geared specificly for HTTP testing."
2
3SECTION = "libs"
4LICENSE = "Artistic-1.0 | GPL-1.0+"
5
6LIC_FILES_CHKSUM = "file://LICENSE;md5=254b8e29606fce6d1c1a4c9e32354573"
7
8DEPENDS = "perl"
9
10SRC_URI = "http://sourceforge.net/projects/whisker/files/libwhisker/${PV}/libwhisker2-${PV}.tar.gz \
11 file://libwhisker2.patch"
12
13SRC_URI[md5sum] = "7cc1718dddde8f9a439d5622ae2f37eb"
14SRC_URI[sha256sum] = "f45a1cf2ad2637b29dd1b13d7221ea12e3923ea09d107ced446400f19070a42f"
15
16S = "${WORKDIR}/libwhisker2-2.5"
17
18inherit cpan-base perlnative
19
20do_install() {
21 install -d 755 ${D}${PERLLIBDIRS}/vendor_perl/${PERLVERSION}
22 install -d 755 ${D}${datadir}/perl/${PERLVERSION}
23 oe_runmake install DESTDIR=${D} INSTALLDIR=${PERLLIBDIRS}/vendor_perl/${PERLVERSION} MANDIR=${datadir}/perl/${PERLVERSION}
24}