diff options
author | Andrei Dinu <andrei.adrianx.dinu@intel.com> | 2013-07-10 16:41:44 +0300 |
---|---|---|
committer | Andrei Dinu <andrei.adrianx.dinu@intel.com> | 2013-07-10 16:41:44 +0300 |
commit | d54c9d7dadfddcd60ca11be23c5a2946f8a1b385 (patch) | |
tree | d52a2fdabd074fdbde6bb6744a627d9d20d771ec | |
parent | f359c35ab250c09e858d88b8b1aa872bb7d2cddd (diff) | |
download | meta-security-d54c9d7dadfddcd60ca11be23c5a2946f8a1b385.tar.gz |
Security layer version 1.0
Signed-off-by: Andrei Dinu <andrei.adrianx.dinu@intel.com>
-rw-r--r-- | README | 191 | ||||
-rw-r--r-- | recipes-security/Mail-SpamAssasin/Mail-SpamAssassin_3.3.2.bb | 19 | ||||
-rw-r--r-- | recipes-security/bastille/bastille_3.2.1.bb | 1 | ||||
-rw-r--r-- | recipes-security/nikto/files/location.patch | 36 | ||||
-rw-r--r-- | recipes-security/nikto/nikto_2.1.5.bb | 101 | ||||
-rw-r--r-- | recipes-security/nmap/nmap_6.25.bb | 3 | ||||
-rw-r--r-- | recipes-security/openvas-cli/openvas-cli_1.2.0.bb | 13 | ||||
-rw-r--r-- | recipes-security/openvas-libraries/files/g_type_init.patch | 36 | ||||
-rw-r--r-- | recipes-security/openvas-libraries/openvas-libraries_6.0.0.bb | 14 | ||||
-rw-r--r-- | recipes-security/perl/files/libwhisker2.patch | 73 | ||||
-rw-r--r-- | recipes-security/perl/libhtml-parser-perl_3.71.bb | 25 | ||||
-rw-r--r-- | recipes-security/perl/libnet-dns-perl_0.72.bb | 25 | ||||
-rw-r--r-- | recipes-security/perl/libnet-ssleay-perl_1.55.bb | 24 | ||||
-rw-r--r-- | recipes-security/perl/libnetaddr-ip-perl_4.069.bb | 24 | ||||
-rw-r--r-- | recipes-security/perl/libwhisker2-perl_2.5.bb | 24 |
15 files changed, 525 insertions, 84 deletions
@@ -15,7 +15,7 @@ This layer depends on: | |||
15 | prio: default | 15 | prio: default |
16 | 16 | ||
17 | Adding the security layer to your build | 17 | Adding the security layer to your build |
18 | ================================================= | 18 | ======================================== |
19 | 19 | ||
20 | In order to use this layer, you need to make the build system aware of | 20 | In order to use this layer, you need to make the build system aware of |
21 | it. | 21 | it. |
@@ -29,8 +29,195 @@ other layers needed. e.g.: | |||
29 | /path/to/yocto/meta \ | 29 | /path/to/yocto/meta \ |
30 | /path/to/poky/meta-security \ | 30 | /path/to/poky/meta-security \ |
31 | 31 | ||
32 | Contents and Help | ||
33 | ================= | ||
34 | |||
35 | In this section the contents of the layer is listed, along with a short | ||
36 | help for each package. | ||
37 | |||
38 | == bastille == | ||
39 | |||
40 | Bastille is a system hardening / lockdown program which enhances the | ||
41 | security of a Unix host. It configures daemons, system settings and | ||
42 | firewalls to be more secure. It can shut off unneeded services | ||
43 | like rcp and rlogin, and helps create "chroot jails" that help limit the | ||
44 | vulnerability of common Internet services like Web services and DNS. | ||
45 | |||
46 | usage : Bastille can be used via meta-security layer only in command line mode. | ||
47 | To start Bastille simply write in a terminal : | ||
48 | |||
49 | bastille -c | ||
50 | |||
51 | If this is the first usage of Bastille on the system, the user will be | ||
52 | guided through a list of questions which need to be answered. In the end, | ||
53 | a config file will be created and run. After these steps, you will have a | ||
54 | hardened system. | ||
55 | |||
56 | If you only want to run the config file, without stepping through the | ||
57 | list of questions, simply write in a terminal : | ||
58 | |||
59 | bastille -b | ||
60 | |||
61 | More information can be found in the package readme and manual. | ||
62 | |||
63 | |||
64 | == redhat-security == | ||
65 | |||
66 | Sometimes you want to check different aspects of a distribution for security problems. | ||
67 | This can be anything from file permissions to correctness of code. This is a collection of those tools. | ||
68 | Depending on what information the tool has to access, it may need to be run as root. | ||
69 | |||
70 | - rpm-chksec.sh : This will take an rpm name as input and verify each ELF file to see if its compiled with the intended flags | ||
71 | to most effectively use PIE and RELRO. Green is good, Orange could use work but is acceptable, and Red needs fixing. | ||
72 | It has a mode --all that is the equivalent of using rpm -qa and feeding the packages to it. | ||
73 | In this mode it will only give a summary result for the package. To find which files don't comply, | ||
74 | re-run using just the package name. | ||
75 | |||
76 | - find-nodrop-groups.sh : This will scan a whole file system to see if a program makes calls to change UID | ||
77 | and GID without also calling setgroups or initgroups. | ||
78 | |||
79 | - rpm-drop-groups.sh : Same as above, but takes an rpm name instead. | ||
80 | |||
81 | - find-chroot.sh : This script scans the whole file system looking for ELF files that calls chroot(2) that also do not include a call to chdir. | ||
82 | Programs that fail to do this do not have the cwd inside the chroot. This means the app can escape the protection that was intended. | ||
83 | |||
84 | - find-chroot-py.sh : This test is like the one above except it examines python scripts for the same problem. | ||
85 | |||
86 | - find-execstack.sh : This program scans the whole file system for ELF programs that have marked the stack as being executable. | ||
87 | This means that if the program has another vulnerablity such as stack buffer overflow, | ||
88 | any code the attacker places there is executable. Any program found must be fixed. | ||
89 | |||
90 | - find-hidden-exec.sh : This program scans the whole file system looking for excutables that are hidden. | ||
91 | Anything found must be investigated since its highly unusual for executables to be hidden. | ||
92 | |||
93 | - find-sh4errors.sh : This program scans the whole file system looking for shell scripts. | ||
94 | It then does a sh -n on the script which causes bash to parse the file to see if there are any mistakes. | ||
95 | |||
96 | - selinux-check-devices.sh : This script checks the /dev directory to see if there are any devices that are not correctly labeled. | ||
97 | Anything found by this test should be reported so that selinux policy can be fixed. | ||
98 | This test is very hardware specific, so to be effective a lot of people with different hardware | ||
99 | should run this test each upstream kernel version release. | ||
100 | |||
101 | - selinux-ls-unconfined.sh : This script scans the running processes and looks for anything labeled with initrc_t or inetd. | ||
102 | These both mean that there are daemons that do not have policy and are therefore running unconfined. | ||
103 | These should be reported as SE Linux policy problems. Because it checks currently running daemons, | ||
104 | the more you have running, the better the test is. | ||
105 | |||
106 | - find-sh4tmp.sh : This script scans the whole filesystem to check if shell scripts are using well known tmp file names | ||
107 | instead of obscure ones created by something like mktemp. | ||
108 | |||
109 | - find-elf4tmp.sh : This script scans the whole file system for ELF files using /tmp. When it finds this, | ||
110 | it also looks to see if any of the known good random name generator functions is called by looking | ||
111 | at the symbol table. If not, it will output the string. | ||
112 | |||
113 | - lib-bin-check.sh : This will check all installed library packages to see if an application is also part of the package. | ||
114 | The relationship to security is that the SHA256 hash check will fail if a 32 bit version overwrites it. | ||
115 | Also, the less binaries on a system, the more secure it is by virtue of removing the chance for an exploitable bug. | ||
116 | |||
117 | |||
118 | usage : simply invoke the script name in the terminal. | ||
119 | |||
120 | |||
121 | == pax-utils == | ||
122 | |||
123 | pax-utils is a small set of various PaX aware and related utilities for | ||
124 | ELF binaries. | ||
125 | |||
126 | - scanelf : With this application you can print out information specific to the ELF structure of a binary. | ||
127 | For more help please consult the man pages or the readme file. | ||
128 | |||
129 | - pspax : is a user-space utility that scans the proc directory and list | ||
130 | ELF types, as well as their respective PaX flags and filenames and | ||
131 | attributes. Depending on build options, it may additionaly display the | ||
132 | process running set of capabilities. | ||
133 | |||
134 | - scanmacho : is a user-space utility to quickly scan given | ||
135 | Mach-Os, directories, or common system paths for different information. This | ||
136 | may include Mach-O types, their install_names, etc. | ||
137 | |||
138 | - dumpelf : is a user-space utility to dump all of the internal | ||
139 | ELF structures into the equivalent C structures for fun debugging and/or | ||
140 | reference purposes. | ||
141 | |||
142 | |||
143 | usage : simply invoke the script name in the terminal. | ||
144 | |||
145 | |||
146 | == buck-security == | ||
147 | |||
148 | Buck-Security is a security scanner for Debian and Ubuntu Linux. It runs a couple of important checks and helps you to harden your Linux | ||
149 | system. This enables you to quickly overview the security status of your Linux system. | ||
150 | |||
151 | usage : switch to directory /usr/local/buck-security. | ||
152 | before running the script, you should check the activated checks in conf/buck-security.conf file. | ||
153 | after altering the changes, save the file and simply run : | ||
154 | |||
155 | ./buck-security | ||
156 | |||
157 | you can choose between different outputs : 1, 2(default) or 3. | ||
158 | |||
159 | More detailed usage can be found typing ./buck-security --help | ||
160 | |||
161 | |||
162 | == libseccomp == | ||
163 | |||
164 | The libseccomp library provides and easy to use, platform independent, interface to the Linux Kernel's syscall filtering mechanism: seccomp. | ||
165 | The libseccomp API is designed to abstract away the underlying BPF based syscall filter language and present a more conventional | ||
166 | function-call based filtering interface that should be familiar to, and easily adopted by application developers. | ||
167 | |||
168 | usage : More detailed usage can be found in the man pages and README file of the package. | ||
169 | |||
170 | |||
171 | |||
172 | == checksecurity == | ||
173 | |||
174 | checksecurity is a simple package which will scan your system for several simple security holes. | ||
175 | It uses a simple collection of plugins, all of which are shell scripts which are configured by environmental variables. | ||
176 | |||
177 | !! IMPORTANT !! | ||
178 | |||
179 | When including this package in the image, please consider adding the following line to the end of the conf/local.conf file: | ||
180 | |||
181 | CORE_IMAGE_EXTRA_INSTALL = "coreutils" | ||
182 | |||
183 | usage : To start checksecurity simply write in the terminal : | ||
184 | |||
185 | checksecurity | ||
186 | |||
187 | More detailed usage can be found in the man pages and README file of the package. | ||
188 | |||
189 | |||
190 | == nikto == | ||
191 | |||
192 | Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, | ||
193 | including over 6500 potentially dangerous files/CGIs, checks for outdated versions of over 1250 servers, and version specific | ||
194 | problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, | ||
195 | HTTP server options, and will attempt to identify installed web servers and software. | ||
196 | |||
197 | usage : To start nikto simply write in the terminal : | ||
198 | |||
199 | nikto | ||
200 | |||
201 | More detailed usage can be found in the man pages and README file of the package. | ||
202 | |||
203 | |||
204 | == nmap == | ||
205 | |||
206 | Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. | ||
207 | Many systems and network administrators also find it useful for tasks such as network inventory, | ||
208 | managing service upgrade schedules, and monitoring host or service uptime. | ||
209 | |||
210 | usage : To start nikto simply write in the terminal : | ||
211 | |||
212 | nmap | ||
213 | |||
214 | More detailed usage can be found in the man pages and README file of the package. | ||
215 | |||
216 | |||
217 | |||
218 | |||
32 | License | 219 | License |
33 | ------- | 220 | ======= |
34 | 221 | ||
35 | All metadata is MIT licensed unless otherwise stated. Source code included | 222 | All metadata is MIT licensed unless otherwise stated. Source code included |
36 | in tree for individual recipes is under the LICENSE stated in each recipe | 223 | in tree for individual recipes is under the LICENSE stated in each recipe |
diff --git a/recipes-security/Mail-SpamAssasin/Mail-SpamAssassin_3.3.2.bb b/recipes-security/Mail-SpamAssasin/Mail-SpamAssassin_3.3.2.bb deleted file mode 100644 index af5907f..0000000 --- a/recipes-security/Mail-SpamAssasin/Mail-SpamAssassin_3.3.2.bb +++ /dev/null | |||
@@ -1,19 +0,0 @@ | |||
1 | SUMMARY = "e-mail filter" | ||
2 | DESCRIPTION = "SpamAssassin is a mail filter which attempts to identify spam using a variety of mechanisms including text analysis, Bayesian filtering, DNS blocklists, and collaborative filtering databases." | ||
3 | SECTION = "security" | ||
4 | LICENSE = "GPL-2.0" | ||
5 | LIC_FILES_CHKSUM = "file://${COMMON_LICENSE_DIR}/Apache-2.0;md5=89aea4e17d99a7cacdbeed46a0096b10" | ||
6 | DEPENDS = "perl" | ||
7 | |||
8 | SRC_URI = "http://apache.mirrors.hoobly.com/spamassassin/source/${PN}-${PV}.tar.gz" | ||
9 | |||
10 | SRC_URI[md5sum] = "d1d62cc5c6eac57e88c4006d9633b81e" | ||
11 | SRC_URI[sha256sum] = "5323038939a0ef9fc97d5264defce3ae1d95e98b3a94c4c3b583341c927f32df" | ||
12 | |||
13 | EXTRA_CPANFLAGS = "EXPATLIBPATH=${STAGING_LIBDIR} EXPATINCPATH=${STAGING_INCDIR}" | ||
14 | inherit cpan | ||
15 | |||
16 | do_compile(){ | ||
17 | export LIBC="$(find ${STAGING_DIR_TARGET}/${base_libdir}/ -name 'libc-*.so')" | ||
18 | cpan_do_compile | ||
19 | } | ||
diff --git a/recipes-security/bastille/bastille_3.2.1.bb b/recipes-security/bastille/bastille_3.2.1.bb index ef754c2..36c30e5 100644 --- a/recipes-security/bastille/bastille_3.2.1.bb +++ b/recipes-security/bastille/bastille_3.2.1.bb | |||
@@ -4,6 +4,7 @@ LICENSE = "GPLv2" | |||
4 | LIC_FILES_CHKSUM = "file://${S}/COPYING;md5=c93c0550bd3173f4504b2cbd8991e50b" | 4 | LIC_FILES_CHKSUM = "file://${S}/COPYING;md5=c93c0550bd3173f4504b2cbd8991e50b" |
5 | # Bash is needed for set +o privileged (check busybox), might also need ncurses | 5 | # Bash is needed for set +o privileged (check busybox), might also need ncurses |
6 | RDEPENDS_${PN} = "perl bash tcl perl-module-getopt-long perl-module-text-wrap lib-perl perl-module-file-path perl-module-mime-base64 perl-module-file-find perl-module-errno perl-module-file-glob perl-module-tie-hash-namedcapture perl-module-file-copy perl-module-english perl-module-exporter perl-module-cwd curses-perl coreutils" | 6 | RDEPENDS_${PN} = "perl bash tcl perl-module-getopt-long perl-module-text-wrap lib-perl perl-module-file-path perl-module-mime-base64 perl-module-file-find perl-module-errno perl-module-file-glob perl-module-tie-hash-namedcapture perl-module-file-copy perl-module-english perl-module-exporter perl-module-cwd curses-perl coreutils" |
7 | FILES_${PN} += "/run/lock/subsys/bastille" | ||
7 | 8 | ||
8 | inherit allarch | 9 | inherit allarch |
9 | 10 | ||
diff --git a/recipes-security/nikto/files/location.patch b/recipes-security/nikto/files/location.patch new file mode 100644 index 0000000..a95b062 --- /dev/null +++ b/recipes-security/nikto/files/location.patch | |||
@@ -0,0 +1,36 @@ | |||
1 | From e10b9b1f6704057ace39956ae1dc5c7caca07ff1 Mon Sep 17 00:00:00 2001 | ||
2 | From: Andrei Dinu <andrei.adrianx.dinu@intel.com> | ||
3 | Date: Mon, 8 Jul 2013 11:53:54 +0300 | ||
4 | Subject: [PATCH] Setting the location of nikto on the image | ||
5 | |||
6 | Upstream Status: Inapropriate | ||
7 | |||
8 | Signed-off-by: Andrei Dinu <andrei.adrianx.dinu@intel.com> | ||
9 | --- | ||
10 | nikto.conf | 10 +++++----- | ||
11 | 1 file changed, 5 insertions(+), 5 deletions(-) | ||
12 | |||
13 | diff --git a/nikto.conf b/nikto.conf | ||
14 | index 25b784d..9577033 100644 | ||
15 | --- a/nikto.conf | ||
16 | +++ b/nikto.conf | ||
17 | @@ -61,11 +61,11 @@ CIRT=174.142.17.165 | ||
18 | CHECKMETHODS=HEAD GET | ||
19 | |||
20 | # If you want to specify the location of any of the files, specify them here | ||
21 | -# EXECDIR=/opt/nikto # Location of Nikto | ||
22 | -# PLUGINDIR=/opt/nikto/plugins # Location of plugin dir | ||
23 | -# DBDIR=/opt/nikto/databases # Location of plugin dir | ||
24 | -# TEMPLATEDIR=/opt/nikto/templates # Location of tempmlate dir | ||
25 | -# DOCDIR=/opt/nikto/docs # Location of docs dir | ||
26 | +EXECDIR=/usr/bin/nikto # Location of Nikto | ||
27 | +PLUGINDIR=/etc/nikto/plugins # Location of plugin dir | ||
28 | +DBDIR=/etc/nikto/databases # Location of plugin dir | ||
29 | +TEMPLATEDIR=/etc/nikto/templates # Location of tempmlate dir | ||
30 | +DOCDIR=/usr/share/doc/nikto # Location of docs dir | ||
31 | |||
32 | # Default plugin macros | ||
33 | @@MUTATE=dictionary;subdomain | ||
34 | -- | ||
35 | 1.7.9.5 | ||
36 | |||
diff --git a/recipes-security/nikto/nikto_2.1.5.bb b/recipes-security/nikto/nikto_2.1.5.bb new file mode 100644 index 0000000..3ca31ca --- /dev/null +++ b/recipes-security/nikto/nikto_2.1.5.bb | |||
@@ -0,0 +1,101 @@ | |||
1 | SUMMARY = "web server scanner" | ||
2 | DESCRIPTION = "Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6500 potentially dangerous \ | ||
3 | files/CGIs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers." | ||
4 | SECTION = "security" | ||
5 | LICENSE = "GPLv2" | ||
6 | LIC_FILES_CHKSUM = "file://${COMMON_LICENSE_DIR}/GPL-2.0;md5=801f80980d171dd6425610833a22dbe6" | ||
7 | RDEPENDS_${PN} = "perl libnet-ssleay-perl perl-module-getopt-long perl-module-time-local perl-module-io-socket nikto-doc" | ||
8 | |||
9 | SRC_URI = "http://cirt.net/nikto/${PN}-${PV}.tar.gz \ | ||
10 | file://location.patch" | ||
11 | |||
12 | SRC_URI[md5sum] = "efcc98a918becb77471ee9a5df0a7b1e" | ||
13 | SRC_URI[sha256sum] = "0e672a6a46bf2abde419a0e8ea846696d7f32e99ad18a6b405736ee6af07509f" | ||
14 | |||
15 | do_install() { | ||
16 | install -d ${D}${bindir} | ||
17 | install -d ${D}${datadir} | ||
18 | install -d ${D}${datadir}/man/man1 | ||
19 | install -d ${D}${datadir}/doc/nikto | ||
20 | install -d ${D}${sysconfdir}/nikto | ||
21 | install -d ${D}${sysconfdir}/nikto/databases | ||
22 | install -d ${D}${sysconfdir}/nikto/plugins | ||
23 | install -d ${D}${sysconfdir}/nikto/templates | ||
24 | |||
25 | install -m 0644 databases/db_404_strings ${D}${sysconfdir}/nikto/databases | ||
26 | install -m 0644 databases/db_content_search ${D}${sysconfdir}/nikto/databases | ||
27 | install -m 0644 databases/db_dictionary ${D}${sysconfdir}/nikto/databases | ||
28 | install -m 0644 databases/db_embedded ${D}${sysconfdir}/nikto/databases | ||
29 | install -m 0644 databases/db_favicon ${D}${sysconfdir}/nikto/databases | ||
30 | install -m 0644 databases/db_headers ${D}${sysconfdir}/nikto/databases | ||
31 | install -m 0644 databases/db_httpoptions ${D}${sysconfdir}/nikto/databases | ||
32 | install -m 0644 databases/db_multiple_index ${D}${sysconfdir}/nikto/databases | ||
33 | install -m 0644 databases/db_outdated ${D}${sysconfdir}/nikto/databases | ||
34 | install -m 0644 databases/db_parked_strings ${D}${sysconfdir}/nikto/databases | ||
35 | install -m 0644 databases/db_realms ${D}${sysconfdir}/nikto/databases | ||
36 | install -m 0644 databases/db_server_msgs ${D}${sysconfdir}/nikto/databases | ||
37 | install -m 0644 databases/db_subdomains ${D}${sysconfdir}/nikto/databases | ||
38 | install -m 0644 databases/db_tests ${D}${sysconfdir}/nikto/databases | ||
39 | install -m 0644 databases/db_variables ${D}${sysconfdir}/nikto/databases | ||
40 | |||
41 | install -m 0644 plugins/JSON-PP.pm ${D}${sysconfdir}/nikto/plugins | ||
42 | install -m 0644 plugins/LW2.pm ${D}${sysconfdir}/nikto/plugins | ||
43 | install -m 0644 plugins/nikto_apache_expect_xss.plugin ${D}${sysconfdir}/nikto/plugins | ||
44 | install -m 0644 plugins/nikto_apacheusers.plugin ${D}${sysconfdir}/nikto/plugins | ||
45 | install -m 0644 plugins/nikto_auth.plugin ${D}${sysconfdir}/nikto/plugins | ||
46 | install -m 0644 plugins/nikto_cgi.plugin ${D}${sysconfdir}/nikto/plugins | ||
47 | install -m 0644 plugins/nikto_clientaccesspolicy.plugin ${D}${sysconfdir}/nikto/plugins | ||
48 | install -m 0644 plugins/nikto_content_search.plugin ${D}${sysconfdir}/nikto/plugins | ||
49 | install -m 0644 plugins/nikto_cookies.plugin ${D}${sysconfdir}/nikto/plugins | ||
50 | install -m 0644 plugins/nikto_core.plugin ${D}${sysconfdir}/nikto/plugins | ||
51 | install -m 0644 plugins/nikto_dictionary_attack.plugin ${D}${sysconfdir}/nikto/plugins | ||
52 | install -m 0644 plugins/nikto_embedded.plugin ${D}${sysconfdir}/nikto/plugins | ||
53 | install -m 0644 plugins/nikto_favicon.plugin ${D}${sysconfdir}/nikto/plugins | ||
54 | install -m 0644 plugins/nikto_fileops.plugin ${D}${sysconfdir}/nikto/plugins | ||
55 | install -m 0644 plugins/nikto_headers.plugin ${D}${sysconfdir}/nikto/plugins | ||
56 | install -m 0644 plugins/nikto_httpoptions.plugin ${D}${sysconfdir}/nikto/plugins | ||
57 | install -m 0644 plugins/nikto_msgs.plugin ${D}${sysconfdir}/nikto/plugins | ||
58 | install -m 0644 plugins/nikto_multiple_index.plugin ${D}${sysconfdir}/nikto/plugins | ||
59 | install -m 0644 plugins/nikto_outdated.plugin ${D}${sysconfdir}/nikto/plugins | ||
60 | install -m 0644 plugins/nikto_parked.plugin ${D}${sysconfdir}/nikto/plugins | ||
61 | install -m 0644 plugins/nikto_paths.plugin ${D}${sysconfdir}/nikto/plugins | ||
62 | install -m 0644 plugins/nikto_put_del_test.plugin ${D}${sysconfdir}/nikto/plugins | ||
63 | install -m 0644 plugins/nikto_report_csv.plugin ${D}${sysconfdir}/nikto/plugins | ||
64 | install -m 0644 plugins/nikto_report_html.plugin ${D}${sysconfdir}/nikto/plugins | ||
65 | install -m 0644 plugins/nikto_report_msf.plugin ${D}${sysconfdir}/nikto/plugins | ||
66 | install -m 0644 plugins/nikto_report_nbe.plugin ${D}${sysconfdir}/nikto/plugins | ||
67 | install -m 0644 plugins/nikto_report_text.plugin ${D}${sysconfdir}/nikto/plugins | ||
68 | install -m 0644 plugins/nikto_report_xml.plugin ${D}${sysconfdir}/nikto/plugins | ||
69 | install -m 0644 plugins/nikto_robots.plugin ${D}${sysconfdir}/nikto/plugins | ||
70 | install -m 0644 plugins/nikto_siebel.plugin ${D}${sysconfdir}/nikto/plugins | ||
71 | install -m 0644 plugins/nikto_ssl.plugin ${D}${sysconfdir}/nikto/plugins | ||
72 | install -m 0644 plugins/nikto_subdomain.plugin ${D}${sysconfdir}/nikto/plugins | ||
73 | install -m 0644 plugins/nikto_tests.plugin ${D}${sysconfdir}/nikto/plugins | ||
74 | |||
75 | install -m 0644 templates/htm_close.tmpl ${D}${sysconfdir}/nikto/templates | ||
76 | install -m 0644 templates/htm_end.tmpl ${D}${sysconfdir}/nikto/templates | ||
77 | install -m 0644 templates/htm_host_head.tmpl ${D}${sysconfdir}/nikto/templates | ||
78 | install -m 0644 templates/htm_host_im.tmpl ${D}${sysconfdir}/nikto/templates | ||
79 | install -m 0644 templates/htm_host_item.tmpl ${D}${sysconfdir}/nikto/templates | ||
80 | install -m 0644 templates/htm_start.tmpl ${D}${sysconfdir}/nikto/templates | ||
81 | install -m 0644 templates/htm_stop.tmpl ${D}${sysconfdir}/nikto/templates | ||
82 | install -m 0644 templates/htm_start.tmpl ${D}${sysconfdir}/nikto/templates | ||
83 | install -m 0644 templates/htm_summary.tmpl ${D}${sysconfdir}/nikto/templates | ||
84 | install -m 0644 templates/xml_end.tmpl ${D}${sysconfdir}/nikto/templates | ||
85 | install -m 0644 templates/xml_host_head.tmpl ${D}${sysconfdir}/nikto/templates | ||
86 | install -m 0644 templates/xml_host_im.tmpl ${D}${sysconfdir}/nikto/templates | ||
87 | install -m 0644 templates/xml_host_item.tmpl ${D}${sysconfdir}/nikto/templates | ||
88 | install -m 0644 templates/xml_start.tmpl ${D}${sysconfdir}/nikto/templates | ||
89 | install -m 0644 templates/xml_summary.tmpl ${D}${sysconfdir}/nikto/templates | ||
90 | |||
91 | install -m 0644 nikto.conf ${D}${sysconfdir} | ||
92 | |||
93 | install -m 0755 nikto.pl ${D}${bindir}/nikto | ||
94 | install -m 0644 replay.pl ${D}${bindir} | ||
95 | install -m 0644 docs/nikto.1 ${D}${datadir}/man/man1 | ||
96 | |||
97 | install -m 0644 docs/CHANGES.txt ${D}${datadir}/doc/nikto | ||
98 | install -m 0644 docs/LICENSE.txt ${D}${datadir}/doc/nikto | ||
99 | install -m 0644 docs/nikto.dtd ${D}${datadir}/doc/nikto | ||
100 | install -m 0644 docs/nikto_manual.html ${D}${datadir}/doc/nikto | ||
101 | } | ||
diff --git a/recipes-security/nmap/nmap_6.25.bb b/recipes-security/nmap/nmap_6.25.bb index ff0caa7..cb5f7d3 100644 --- a/recipes-security/nmap/nmap_6.25.bb +++ b/recipes-security/nmap/nmap_6.25.bb | |||
@@ -3,6 +3,7 @@ DESCRIPTION = "Nmap ("Network Mapper") is a free and open source (license) utili | |||
3 | SECTION = "security" | 3 | SECTION = "security" |
4 | LICENSE = "GPL-2.0" | 4 | LICENSE = "GPL-2.0" |
5 | LIC_FILES_CHKSUM = "file://${COMMON_LICENSE_DIR}/GPL-2.0;md5=801f80980d171dd6425610833a22dbe6" | 5 | LIC_FILES_CHKSUM = "file://${COMMON_LICENSE_DIR}/GPL-2.0;md5=801f80980d171dd6425610833a22dbe6" |
6 | FILES_${PN} += "${target_datadir}/ncat" | ||
6 | 7 | ||
7 | SRC_URI = "http://nmap.org/dist/${PN}-${PV}.tar.bz2 \ | 8 | SRC_URI = "http://nmap.org/dist/${PN}-${PV}.tar.bz2 \ |
8 | file://lua.patch" | 9 | file://lua.patch" |
@@ -12,6 +13,8 @@ SRC_URI[sha256sum] = "3349cc6d36b86b95ca2b8075d16615a3a598cef494920d6652f9a8bf9f | |||
12 | 13 | ||
13 | inherit autotools | 14 | inherit autotools |
14 | 15 | ||
16 | DEPENDS = "libpcap" | ||
17 | |||
15 | EXTRA_OECONF = "--without-liblua --without-zenmap" | 18 | EXTRA_OECONF = "--without-liblua --without-zenmap" |
16 | 19 | ||
17 | do_configure() { | 20 | do_configure() { |
diff --git a/recipes-security/openvas-cli/openvas-cli_1.2.0.bb b/recipes-security/openvas-cli/openvas-cli_1.2.0.bb deleted file mode 100644 index d755578..0000000 --- a/recipes-security/openvas-cli/openvas-cli_1.2.0.bb +++ /dev/null | |||
@@ -1,13 +0,0 @@ | |||
1 | DESCRIPTION = "The module OpenVAS-CLI collects command line tools to handle with the OpenVAS services via the respective protocols." | ||
2 | SECTION = "security" | ||
3 | LICENSE = "GPL-2.0" | ||
4 | LIC_FILES_CHKSUM = "file://${COMMON_LICENSE_DIR}/GPL-2.0;md5=801f80980d171dd6425610833a22dbe6" | ||
5 | |||
6 | DEPENDS = "gnutls openvas-libraries glib-2.0" | ||
7 | |||
8 | SRC_URI = "http://wald.intevation.org/frs/download.php/1323/${PN}-${PV}.tar.gz" | ||
9 | |||
10 | SRC_URI[md5sum] = "e712eb71f3a13cc1b70b50f696465f8e" | ||
11 | SRC_URI[sha256sum] = "d195ca01a44940d1e6fd2ad54ee4fc9b57a3d103235f0a1f05a8b35d97db6be8" | ||
12 | |||
13 | inherit cmake pkgconfig | ||
diff --git a/recipes-security/openvas-libraries/files/g_type_init.patch b/recipes-security/openvas-libraries/files/g_type_init.patch deleted file mode 100644 index db55057..0000000 --- a/recipes-security/openvas-libraries/files/g_type_init.patch +++ /dev/null | |||
@@ -1,36 +0,0 @@ | |||
1 | From f498503889b8178f165afa66dc33aa8ad8901371 Mon Sep 17 00:00:00 2001 | ||
2 | From: Andrei Dinu <andrei.adrianx.dinu@intel.com> | ||
3 | Date: Fri, 28 Jun 2013 09:38:08 +0300 | ||
4 | Subject: [PATCH] removed the g_type_init() | ||
5 | |||
6 | The function is depricated in glib >= 2.35.0 and is | ||
7 | automatically called. | ||
8 | |||
9 | Signed-off-by: Andrei Dinu <andrei.adrianx.dinu@intel.com> | ||
10 | --- | ||
11 | base/openvas_file.c | 2 -- | ||
12 | 1 file changed, 2 deletions(-) | ||
13 | |||
14 | diff --git a/base/openvas_file.c b/base/openvas_file.c | ||
15 | index 8597198..d110c7f 100644 | ||
16 | --- a/base/openvas_file.c | ||
17 | +++ b/base/openvas_file.c | ||
18 | @@ -164,7 +164,6 @@ openvas_file_copy (const gchar *source_file, const gchar *dest_file) | ||
19 | GFile *sfile, *dfile; | ||
20 | GError *error; | ||
21 | |||
22 | - g_type_init (); | ||
23 | sfile = g_file_new_for_path (source_file); | ||
24 | dfile = g_file_new_for_path (dest_file); | ||
25 | error = NULL; | ||
26 | @@ -200,7 +199,6 @@ openvas_file_move (const gchar *source_file, const gchar *dest_file) | ||
27 | GFile *sfile, *dfile; | ||
28 | GError *error; | ||
29 | |||
30 | - g_type_init (); | ||
31 | sfile = g_file_new_for_path (source_file); | ||
32 | dfile = g_file_new_for_path (dest_file); | ||
33 | error = NULL; | ||
34 | -- | ||
35 | 1.7.9.5 | ||
36 | |||
diff --git a/recipes-security/openvas-libraries/openvas-libraries_6.0.0.bb b/recipes-security/openvas-libraries/openvas-libraries_6.0.0.bb deleted file mode 100644 index caf96f1..0000000 --- a/recipes-security/openvas-libraries/openvas-libraries_6.0.0.bb +++ /dev/null | |||
@@ -1,14 +0,0 @@ | |||
1 | DESCRIPTION = "This is the libraries module for the Open Vulnerability Assessment System (OpenVAS)." | ||
2 | SECTION = "security" | ||
3 | LICENSE = "GPL-2.0" | ||
4 | LIC_FILES_CHKSUM = "file://${COMMON_LICENSE_DIR}/GPL-2.0;md5=801f80980d171dd6425610833a22dbe6" | ||
5 | |||
6 | DEPENDS = "bison flex gpgme glib-2.0" | ||
7 | |||
8 | SRC_URI = "http://wald.intevation.org/frs/download.php/1303/${PN}-${PV}.tar.gz \ | ||
9 | file://g_type_init.patch" | ||
10 | |||
11 | SRC_URI[md5sum] = "0e8b73ee4ad5b36984b5d7be5d6bdfc0" | ||
12 | SRC_URI[sha256sum] = "50d23afd46f7b49c4cb82a6500b0fe1fb53378af5efce95fd275ea33c879e1dd" | ||
13 | |||
14 | inherit cmake pkgconfig | ||
diff --git a/recipes-security/perl/files/libwhisker2.patch b/recipes-security/perl/files/libwhisker2.patch new file mode 100644 index 0000000..c066366 --- /dev/null +++ b/recipes-security/perl/files/libwhisker2.patch | |||
@@ -0,0 +1,73 @@ | |||
1 | From 34698c7f561fb575293a1c991a71e1b4ddc5ae73 Mon Sep 17 00:00:00 2001 | ||
2 | From: Andrei Dinu <andrei.adrianx.dinu@intel.com> | ||
3 | Date: Fri, 5 Jul 2013 11:56:58 +0300 | ||
4 | Subject: [PATCH] Mandir and perl install dir were overwritten with faulty | ||
5 | information in the Makefile. Now the Mandir and perl | ||
6 | install dir are sent via paramters from the recipe. | ||
7 | |||
8 | Signed-off-by: Andrei Dinu <andrei.adrianx.dinu@intel.com> | ||
9 | --- | ||
10 | Makefile.pl | 12 +++++++----- | ||
11 | 1 file changed, 7 insertions(+), 5 deletions(-) | ||
12 | |||
13 | diff --git a/Makefile.pl b/Makefile.pl | ||
14 | index 9ca5602..8776e18 100644 | ||
15 | --- a/Makefile.pl | ||
16 | +++ b/Makefile.pl | ||
17 | @@ -131,6 +131,8 @@ foreach (keys %MODULES){ | ||
18 | |||
19 | # adjust DESTDIR, if needed | ||
20 | $DESTDIR = $ENV{DESTDIR} if(defined $ENV{DESTDIR}); | ||
21 | +$MANDIR = $ENV{MANDIR} if(defined $ENV{MANDIR}); | ||
22 | +$INSTALLDIR = $ENV{INSTALLDIR} if(defined $ENV{INSTALLDIR}); | ||
23 | |||
24 | # parse command line build options | ||
25 | while($COMMAND = shift @ARGV){ | ||
26 | @@ -171,7 +173,7 @@ sub command_install_pod { | ||
27 | command_build() if(!-e $TARGET); | ||
28 | die("Can not install without Config.pm") if($MODULES{Config}==0); | ||
29 | $CWD=&cwd if($MODULES{Cwd}>0); | ||
30 | - my $where=$DESTDIR . $Config{'man3direxp'}; | ||
31 | + my $where=$DESTDIR . $MANDIR; | ||
32 | my $t = $TARGET; | ||
33 | if($LIBRARY){ | ||
34 | $t="$PACKAGE.3pm"; | ||
35 | @@ -219,7 +221,7 @@ sub command_install_pod { | ||
36 | sub command_uninstall_pod { | ||
37 | die("Can not uninstall without Config.pm") if($MODULES{Config}==0); | ||
38 | $CWD=&cwd if($MODULES{Cwd}>0); | ||
39 | - my $where=$DESTDIR . $Config{'man3direxp'}; | ||
40 | + my $where=$DESTDIR . $MANDIR; | ||
41 | my $t = $TARGET; | ||
42 | if($LIBRARY){ | ||
43 | $t="$PACKAGE.3pm"; | ||
44 | @@ -243,7 +245,7 @@ sub command_install_library { | ||
45 | command_build() if(!-e $TARGET); | ||
46 | die("Can not install without Config.pm") if($MODULES{Config}==0); | ||
47 | $CWD=&cwd if($MODULES{Cwd}>0); | ||
48 | - my $where=$DESTDIR . $Config{'installsitelib'}; | ||
49 | + my $where=$DESTDIR . $INSTALLDIR; | ||
50 | if(!-e $where){ | ||
51 | print STDOUT "WARNING!\n\n", | ||
52 | "The local perl site directory does not exist:\n", | ||
53 | @@ -271,7 +273,7 @@ sub command_install_library { | ||
54 | sub command_uninstall_library { | ||
55 | die("Can not uninstall without Config.pm") if($MODULES{Config}==0); | ||
56 | $CWD=&cwd if($MODULES{Cwd}>0); | ||
57 | - my $where=$DESTDIR . $Config{'installsitelib'}; | ||
58 | + my $where=$DESTDIR . $INSTALLDIR; | ||
59 | chdir($where); | ||
60 | if(-e $TARGET){ | ||
61 | unlink $TARGET; | ||
62 | @@ -401,7 +403,7 @@ sub command_socket_diag { | ||
63 | sub command_install_compat { | ||
64 | die("Can not install without Config.pm") if($MODULES{Config}==0); | ||
65 | $CWD=&cwd if($MODULES{Cwd}>0); | ||
66 | - my $where=$DESTDIR . $Config{'installsitelib'}; | ||
67 | + my $where=$DESTDIR . $INSTALLDIR; | ||
68 | if(!-e $where){ | ||
69 | print STDOUT "WARNING!\n\n", | ||
70 | "The local perl site directory does not exist:\n", | ||
71 | -- | ||
72 | 1.7.9.5 | ||
73 | |||
diff --git a/recipes-security/perl/libhtml-parser-perl_3.71.bb b/recipes-security/perl/libhtml-parser-perl_3.71.bb new file mode 100644 index 0000000..be0f4b2 --- /dev/null +++ b/recipes-security/perl/libhtml-parser-perl_3.71.bb | |||
@@ -0,0 +1,25 @@ | |||
1 | DESCRIPTION = "This package contains the Parser.pm module with friends." | ||
2 | |||
3 | SECTION = "libs" | ||
4 | LICENSE = "Artistic-1.0 | GPL-1.0+" | ||
5 | |||
6 | LIC_FILES_CHKSUM = "file://README;md5=6c3dacf9f405c7483870ab5f148770c3" | ||
7 | |||
8 | DEPENDS += "perl" | ||
9 | |||
10 | SRC_URI = "http://search.cpan.org/CPAN/authors/id/G/GA/GAAS/HTML-Parser-${PV}.tar.gz" | ||
11 | |||
12 | SRC_URI[md5sum] = "9128a45893097dfa3bf03301b19c5efe" | ||
13 | SRC_URI[sha256sum] = "be918b3749d3ff93627f72ee4b825683332ecb4c81c67a3a8d72b0435ffbd802" | ||
14 | |||
15 | S = "${WORKDIR}/HTML-Parser-${PV}" | ||
16 | |||
17 | EXTRA_CPANFLAGS = "EXPATLIBPATH=${STAGING_LIBDIR} EXPATINCPATH=${STAGING_INCDIR}" | ||
18 | |||
19 | inherit cpan | ||
20 | |||
21 | do_compile() { | ||
22 | export LIBC="$(find ${STAGING_DIR_TARGET}/${base_libdir}/ -name 'libc-*.so')" | ||
23 | cpan_do_compile | ||
24 | } | ||
25 | BBCLASSEXTEND = "native" | ||
diff --git a/recipes-security/perl/libnet-dns-perl_0.72.bb b/recipes-security/perl/libnet-dns-perl_0.72.bb new file mode 100644 index 0000000..5c218b8 --- /dev/null +++ b/recipes-security/perl/libnet-dns-perl_0.72.bb | |||
@@ -0,0 +1,25 @@ | |||
1 | DESCRIPTION = "This package contains the DNS.pm module with friends." | ||
2 | |||
3 | SECTION = "libs" | ||
4 | LICENSE = "Artistic-1.0 | GPL-1.0+" | ||
5 | |||
6 | LIC_FILES_CHKSUM = "file://README;md5=f21d77d9c6b56a07470bbce561b169e3" | ||
7 | |||
8 | DEPENDS += "perl" | ||
9 | |||
10 | SRC_URI = "http://search.cpan.org/CPAN/authors/id/N/NL/NLNETLABS/Net-DNS-${PV}.tar.gz" | ||
11 | |||
12 | SRC_URI[md5sum] = "393e48ec6f28abe5ed30204276e02775" | ||
13 | SRC_URI[sha256sum] = "a62cae0be54a9684c305456cb95515a0bd3128d6ef3093b6069fe8e8e8d5943f" | ||
14 | |||
15 | S = "${WORKDIR}/Net-DNS-${PV}" | ||
16 | |||
17 | EXTRA_CPANFLAGS = "EXPATLIBPATH=${STAGING_LIBDIR} EXPATINCPATH=${STAGING_INCDIR}" | ||
18 | |||
19 | inherit cpan | ||
20 | |||
21 | do_compile() { | ||
22 | export LIBC="$(find ${STAGING_DIR_TARGET}/${base_libdir}/ -name 'libc-*.so')" | ||
23 | cpan_do_compile | ||
24 | } | ||
25 | BBCLASSEXTEND = "native" | ||
diff --git a/recipes-security/perl/libnet-ssleay-perl_1.55.bb b/recipes-security/perl/libnet-ssleay-perl_1.55.bb new file mode 100644 index 0000000..1dd59f4 --- /dev/null +++ b/recipes-security/perl/libnet-ssleay-perl_1.55.bb | |||
@@ -0,0 +1,24 @@ | |||
1 | DESCRIPTION = "Perl module for using OpenSSL" | ||
2 | |||
3 | SECTION = "libs" | ||
4 | LICENSE = "Artistic-1.0 | GPL-1.0+" | ||
5 | |||
6 | LIC_FILES_CHKSUM = "file://README;md5=94ec8036b939a2e3c9b5e7f10af8f4ee" | ||
7 | |||
8 | DEPENDS += "perl openssl" | ||
9 | |||
10 | SRC_URI = "http://search.cpan.org/CPAN/authors/id/M/MI/MIKEM/Net-SSLeay-${PV}.tar.gz" | ||
11 | |||
12 | SRC_URI[md5sum] = "473b8d66ca69d5784bb0e428721f58e0" | ||
13 | SRC_URI[sha256sum] = "8cd5f09722e07b4e436102cb3a4b93623d753c171665ca9752c3b39a62ea3a79" | ||
14 | |||
15 | S = "${WORKDIR}/Net-SSLeay-${PV}" | ||
16 | |||
17 | EXTRA_CPANFLAGS = "INC='-I${STAGING_INCDIR}' LIBS='-L${STAGING_LIBDIR} -lssl -lcrypto -lz'" | ||
18 | |||
19 | inherit cpan | ||
20 | |||
21 | do_compile() { | ||
22 | export LIBC="$(find ${STAGING_DIR_TARGET}/${base_libdir}/ -name 'libc-*.so')" | ||
23 | cpan_do_compile | ||
24 | } | ||
diff --git a/recipes-security/perl/libnetaddr-ip-perl_4.069.bb b/recipes-security/perl/libnetaddr-ip-perl_4.069.bb new file mode 100644 index 0000000..99c11b2 --- /dev/null +++ b/recipes-security/perl/libnetaddr-ip-perl_4.069.bb | |||
@@ -0,0 +1,24 @@ | |||
1 | DESCRIPTION = "This package contains the IP.pm module with friends." | ||
2 | |||
3 | SECTION = "libs" | ||
4 | LICENSE = "Artistic-1.0 | GPL-1.0+" | ||
5 | |||
6 | LIC_FILES_CHKSUM = "file://Copying;md5=cde580764a0fbc0f02fafde4c65d6227" | ||
7 | |||
8 | DEPENDS += "perl" | ||
9 | |||
10 | SRC_URI = "http://search.cpan.org/CPAN/authors/id/M/MI/MIKER/NetAddr-IP-${PV}.tar.gz" | ||
11 | |||
12 | SRC_URI[md5sum] = "7721135fcea390327f75421a6b701144" | ||
13 | SRC_URI[sha256sum] = "96739afc484eca1597c4f4b520864b342169c8fdeef486778511e5a1527ba4e7" | ||
14 | |||
15 | S = "${WORKDIR}/NetAddr-IP-${PV}" | ||
16 | |||
17 | EXTRA_CPANFLAGS = "EXPATLIBPATH=${STAGING_LIBDIR} EXPATINCPATH=${STAGING_INCDIR}" | ||
18 | |||
19 | inherit cpan | ||
20 | |||
21 | do_compile() { | ||
22 | cpan_do_compile | ||
23 | } | ||
24 | BBCLASSEXTEND = "native" | ||
diff --git a/recipes-security/perl/libwhisker2-perl_2.5.bb b/recipes-security/perl/libwhisker2-perl_2.5.bb new file mode 100644 index 0000000..477f995 --- /dev/null +++ b/recipes-security/perl/libwhisker2-perl_2.5.bb | |||
@@ -0,0 +1,24 @@ | |||
1 | DESCRIPTION = "Libwhisker is a Perl module geared specificly for HTTP testing." | ||
2 | |||
3 | SECTION = "libs" | ||
4 | LICENSE = "Artistic-1.0 | GPL-1.0+" | ||
5 | |||
6 | LIC_FILES_CHKSUM = "file://LICENSE;md5=254b8e29606fce6d1c1a4c9e32354573" | ||
7 | |||
8 | DEPENDS = "perl" | ||
9 | |||
10 | SRC_URI = "http://sourceforge.net/projects/whisker/files/libwhisker/${PV}/libwhisker2-${PV}.tar.gz \ | ||
11 | file://libwhisker2.patch" | ||
12 | |||
13 | SRC_URI[md5sum] = "7cc1718dddde8f9a439d5622ae2f37eb" | ||
14 | SRC_URI[sha256sum] = "f45a1cf2ad2637b29dd1b13d7221ea12e3923ea09d107ced446400f19070a42f" | ||
15 | |||
16 | S = "${WORKDIR}/libwhisker2-2.5" | ||
17 | |||
18 | inherit cpan-base perlnative | ||
19 | |||
20 | do_install() { | ||
21 | install -d 755 ${D}${PERLLIBDIRS}/vendor_perl/${PERLVERSION} | ||
22 | install -d 755 ${D}${datadir}/perl/${PERLVERSION} | ||
23 | oe_runmake install DESTDIR=${D} INSTALLDIR=${PERLLIBDIRS}/vendor_perl/${PERLVERSION} MANDIR=${datadir}/perl/${PERLVERSION} | ||
24 | } | ||