summaryrefslogtreecommitdiff
path: root/security/Bastille
AgeCommit message (Collapse)AuthorFilesLines
2014-05-29Bump for perl-5.20.0.wiz1-2/+2
Do it for all packages that * mention perl, or * have a directory name starting with p5-*, or * depend on a package starting with p5- like last time, for 5.18, where this didn't lead to complaints. Let me know if you have any this time.
2013-05-31Bump all packages for perl-5.18, thatwiz1-2/+2
a) refer 'perl' in their Makefile, or b) have a directory name of p5-*, or c) have any dependency on any p5-* package Like last time, where this caused no complaints.
2012-10-23Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days.asau1-3/+1
2012-10-03Bump all packages that use perl, or depend on a p5-* package, orwiz1-2/+2
are called p5-*. I hope that's all of them.
2012-06-14Recursive PKGREVISION bump for libxml2 buildlink addition.sbd1-1/+2
2012-02-06Skip the interpreter check on a csh script stub.sbd1-1/+3
2009-06-14Remove @dirrm entries from PLISTsjoerg1-9/+1
2008-06-12Add DESTDIR support.joerg1-3/+5
2008-03-04Resign from maintaining a lot of packages, so everyone is free to updaterillig1-2/+2
them at will.
2007-09-21Fix paths for GConf, libglade, libart, libsigc++, lablgtk moves.wiz1-2/+2
Bump PKGREVISION.
2007-06-06Imported Bastille from pkgsrc-wip.rillig9-0/+563
Bastille is a system hardening / lockdown program which enhances the security of a Unix host. It configures daemons, system settings and firewalls to be more secure. It can shut off unneeded services like rcp and rlogin, and helps create "chroot jails" that help limit the vulnerability of common Internet services like Web services and DNS. This tool currently hardens Red Hat (Fedora Core, Enterprise and Legacy/Classic), SuSE, Debian, Gentoo, Mandrake Linux, HP-UX, Mac OS X and Turbo Linux. If run in the preferred interactive mode, it can teach you a good deal about security while personalizing your system security state. Bastille can also assess and report on the state of a system, which may serve as an aid to security administrators, auditors and system administrators who wish to investigate the state of their system's hardening without making changes to such. This assessment functionality has only been tested on Red Hat Linux (Fedora, Legacy, Enterprise) and SUSE systems.