From f1446ddf2bf8118f432b3ac74c88db3d832669a8 Mon Sep 17 00:00:00 2001 From: jmmv Date: Tue, 6 May 2003 17:40:18 +0000 Subject: Drop trailing whitespace. Ok'ed by wiz. --- security/AiCA/DESCR | 2 +- security/amavis-perl/Makefile | 6 +++--- security/arirang/DESCR | 26 +++++++++++++------------- security/avcheck/DESCR | 6 +++--- security/crack/DESCR | 2 +- security/fressh/DESCR | 4 ++-- security/kssh/DESCR | 2 +- security/kth-krb4/DESCR | 2 +- security/kth-krb4/MESSAGE | 6 +++--- security/kth-krb4/buildlink2.mk | 6 +++--- security/libdes/DESCR | 2 +- security/libident/DESCR | 4 ++-- security/logcheck/DESCR | 12 ++++++------ security/mirrordir/DESCR | 8 ++++---- security/openssh/Makefile | 4 ++-- security/p5-Crypt-DES_EDE3/DESCR | 8 ++++---- security/p5-Crypt-DSA/DESCR | 6 +++--- security/p5-Crypt-OpenPGP/DESCR | 6 +++--- security/p5-Crypt-Primes/DESCR | 10 +++++----- security/p5-Crypt-RIPEMD160/DESCR | 2 +- security/p5-Crypt-RSA/DESCR | 12 ++++++------ security/p5-Crypt-Rijndael/DESCR | 4 ++-- security/p5-Crypt-Twofish/DESCR | 6 +++--- security/p5-Tie-EncryptedHash/DESCR | 10 +++++----- security/pgpdump/DESCR | 2 +- security/pks/DESCR | 2 +- security/portsentry/DESCR | 12 ++++++------ security/priv/DESCR | 2 +- security/pyca/DESCR | 10 +++++----- security/rats/DESCR | 14 +++++++------- security/seahorse/DESCR | 2 +- security/sfs/MESSAGE | 6 +++--- security/skey/DESCR | 2 +- security/smimemsg/DESCR | 2 +- security/ssh/DESCR | 2 +- security/sudo/MESSAGE | 4 ++-- security/tct/DESCR | 2 +- security/uvscan/DESCR | 2 +- security/winbind/DESCR | 2 +- security/xdm-krb4/DESCR | 2 +- 40 files changed, 112 insertions(+), 112 deletions(-) (limited to 'security') diff --git a/security/AiCA/DESCR b/security/AiCA/DESCR index 055e9b79531..4d722225572 100644 --- a/security/AiCA/DESCR +++ b/security/AiCA/DESCR @@ -1,4 +1,4 @@ -The AiCA is the CA (Certification Authority) Package. +The AiCA is the CA (Certification Authority) Package. This package contains several applications, such as: * aica -- The CA program to issue, update, and revoke certificates. diff --git a/security/amavis-perl/Makefile b/security/amavis-perl/Makefile index 3fff6dce19e..f6cfb21851a 100644 --- a/security/amavis-perl/Makefile +++ b/security/amavis-perl/Makefile @@ -1,4 +1,4 @@ -# $NetBSD: Makefile,v 1.8 2003/05/02 11:56:16 wiz Exp $ +# $NetBSD: Makefile,v 1.9 2003/05/06 17:42:29 jmmv Exp $ DISTNAME= amavisd-${VERSION} PKGNAME= amavis-perl-${VERSION} @@ -48,7 +48,7 @@ VIRUSMAILTO?= security # whom to notify about viruses GNU_CONFIGURE= YES CONFIGURE_ENV+= procmail="/usr/libexec/mail.local" -# XXX Milter needs pthreads, and configure fails looking for it +# XXX Milter needs pthreads, and configure fails looking for it # because ${PREFIX}/include is not available in the include path. .if defined(USE_MILTER) && ${USE_MILTER} == "YES" CONFIGURE_ENV+= CFLAGS="-I${PREFIX}/include" @@ -102,7 +102,7 @@ do-install: ${INSTALL_DATA} ${WRKDIR}/amavis.m4 ${PREFIX}/share/doc/amavis # Man pages .if !defined(USE_MILTER) || ${USE_MILTER} != YES - ${INSTALL_DATA} ${WRKSRC}/doc/amavis.1 ${PREFIX}/man/man1 + ${INSTALL_DATA} ${WRKSRC}/doc/amavis.1 ${PREFIX}/man/man1 ${ECHO} "man/man1/amavis.1" >> ${PLIST_SRC} .endif ${INSTALL_DATA} ${WRKSRC}/doc/amavis-milter.1 ${PREFIX}/man/man1 diff --git a/security/arirang/DESCR b/security/arirang/DESCR index 88738dde158..5d00efa74f0 100644 --- a/security/arirang/DESCR +++ b/security/arirang/DESCR @@ -2,16 +2,16 @@ Powerful webserver security scanner. The following features are supported: -- Operating System Detect(used by NetCraft) -- webserver type scan -- CVE compatible(only NT, some Unix) -- flexible scan rule databases -- multiple hosts scan and multiple hosts webserver type scan. -- http port -- wide network(ip range) scan -- wide network webserver type scan -- patch information.(completed patch info-NT) -- http request injection. -- virtual host scan -- fast scan(used a Processes) -- recv flags +- Operating System Detect(used by NetCraft) +- webserver type scan +- CVE compatible(only NT, some Unix) +- flexible scan rule databases +- multiple hosts scan and multiple hosts webserver type scan. +- http port +- wide network(ip range) scan +- wide network webserver type scan +- patch information.(completed patch info-NT) +- http request injection. +- virtual host scan +- fast scan(used a Processes) +- recv flags diff --git a/security/avcheck/DESCR b/security/avcheck/DESCR index f273f0de409..c74618897c0 100644 --- a/security/avcheck/DESCR +++ b/security/avcheck/DESCR @@ -1,14 +1,14 @@ Avcheck is a simple program that allows you to call an antivirus software in order to check mail messages for viruses before actual delivery from -within a Mail Transfer Agent, or MTA. +within a Mail Transfer Agent, or MTA. Avcheck itself isn't a virusscanner, nor it is an MTA. It sits between the MTA and a real antivirus software. Most MTAs available today can call an external program for every mail message in order to perform various tasks, including virus scanning and content filtering. Avcheck can be used as -that external program. +that external program. Avcheck will receive a mail message from a mail system, pass it to an antivirus software, and, depending on the presence of a virus in that message, will either allow the message to be delivered or take appropriate -actions to handle infected mail. +actions to handle infected mail. diff --git a/security/crack/DESCR b/security/crack/DESCR index abee92940da..318420d573d 100644 --- a/security/crack/DESCR +++ b/security/crack/DESCR @@ -1,6 +1,6 @@ This is Alec Muffett's Crack. -Crack is a freely available program designed to find encrypted passwords. +Crack is a freely available program designed to find encrypted passwords. When you would like to crack a 4.4BSD password file: diff --git a/security/fressh/DESCR b/security/fressh/DESCR index 9e8b503a1d3..c32194c72c0 100644 --- a/security/fressh/DESCR +++ b/security/fressh/DESCR @@ -1,8 +1,8 @@ -FreSSH is a free implementation of the SSH communication protocol. +FreSSH is a free implementation of the SSH communication protocol. It is compact, modular, portable, and designed for security and performance. It is a completely new implementation. Unlike various other SSH implementations already available for Unix, it does not -trace its ancestry to the original SSH code written by Tatu Ylonen. +trace its ancestry to the original SSH code written by Tatu Ylonen. FreSSH currently implements SSH protocol version 1.5, with extensions which offer enhanced security when both sides of a connection are running FreSSH. diff --git a/security/kssh/DESCR b/security/kssh/DESCR index 335aa8f0871..6dfe9ba26c9 100644 --- a/security/kssh/DESCR +++ b/security/kssh/DESCR @@ -1,4 +1,4 @@ KSSH is a KDE front-end to ssh. -It can work as a standard KDE application that launches ssh connections in +It can work as a standard KDE application that launches ssh connections in a terminal or as a konsole session. This means that you can press in any konsole "New Session" and then select "Secure Shell". diff --git a/security/kth-krb4/DESCR b/security/kth-krb4/DESCR index 294db535e3b..4f169fbf337 100644 --- a/security/kth-krb4/DESCR +++ b/security/kth-krb4/DESCR @@ -3,4 +3,4 @@ version. The DES library has been updated with his 3.23 version and numerous patches collected over the years have been applied to both the kerberos and DES sources, most notably the CMU patches for extended lifetimes that AFS uses. There is also support for AFS built into most -programs. +programs. diff --git a/security/kth-krb4/MESSAGE b/security/kth-krb4/MESSAGE index b01520d174f..dbc1978eba6 100644 --- a/security/kth-krb4/MESSAGE +++ b/security/kth-krb4/MESSAGE @@ -1,5 +1,5 @@ =========================================================================== -$NetBSD: MESSAGE,v 1.3 2002/09/24 12:30:33 wiz Exp $ +$NetBSD: MESSAGE,v 1.4 2003/05/06 17:42:31 jmmv Exp $ Kth-krb4 now has been installed on your system. @@ -8,10 +8,10 @@ More information on how to configure Kerberos is available via the "info" command. Sample configuration files are installed in ${PREFIX}/share/examples/kth-krb4. -At a minimum, to configure a Kerberos client, copy +At a minimum, to configure a Kerberos client, copy ${PREFIX}/share/examples/kth-krb4/{krb.conf,krb.realms} to /etc and customize them. Also, apply the patches provided in services-1.4.2.diff -(for NetBSD-1.4.2) or services-1.5.diff (for NetBSD-1.5/1.5.x) +(for NetBSD-1.4.2) or services-1.5.diff (for NetBSD-1.5/1.5.x) to /etc/services. =========================================================================== diff --git a/security/kth-krb4/buildlink2.mk b/security/kth-krb4/buildlink2.mk index c840c623526..c2d2618d991 100644 --- a/security/kth-krb4/buildlink2.mk +++ b/security/kth-krb4/buildlink2.mk @@ -1,7 +1,7 @@ -# $NetBSD: buildlink2.mk,v 1.2 2002/08/25 19:23:16 jlam Exp $ +# $NetBSD: buildlink2.mk,v 1.3 2003/05/06 17:42:31 jmmv Exp $ .if !defined(KTHKRB4_BUILDLINK2_MK) -KTHKRB4_BUILDLINK2_MK= # defined +KTHKRB4_BUILDLINK2_MK= # defined BUILDLINK_PACKAGES+= kth-krb4 BUILDLINK_DEPENDS.kth-krb4?= kth-krb4>=1.1.1 @@ -25,6 +25,6 @@ BUILDLINK_FILES.kth-krb4+= lib/libss.* BUILDLINK_TARGETS+= kth-krb4-buildlink -kth-krb4-buildlink: _BUILDLINK_USE +kth-krb4-buildlink: _BUILDLINK_USE .endif # KTHKRB4_BUILDLINK2_MK diff --git a/security/libdes/DESCR b/security/libdes/DESCR index a1ade56c6c5..9177657ca94 100644 --- a/security/libdes/DESCR +++ b/security/libdes/DESCR @@ -6,4 +6,4 @@ this one around. Plus, it compiles easily on PCs with djgpp. I've renamed all the installed files to be libdes, libdes.h, etc., to avoid conflicts with other packages. -NetBSD package by: John Refling +NetBSD package by: John Refling diff --git a/security/libident/DESCR b/security/libident/DESCR index c4876fa449a..f4de7a3d7b4 100644 --- a/security/libident/DESCR +++ b/security/libident/DESCR @@ -12,10 +12,10 @@ COMMENTS: This is the second stab at a small library to interface to the Ident protocol server. Maybe this will work correctly on some machines.. :-) - + The ident-tester.c file is a small daemon (to be started from Inetd) that does an ident lookup on you if you telnet into it. Can be used to verify that your Ident server is working correctly. - + I'm currently running this "ident-tester" on port 114 at lysator.liu.se (130.236.254.1) if you wish to test your server. diff --git a/security/logcheck/DESCR b/security/logcheck/DESCR index afc44988695..2e00fbd66bd 100644 --- a/security/logcheck/DESCR +++ b/security/logcheck/DESCR @@ -1,9 +1,9 @@ -Logcheck helps spot problems and security violations in your logfiles +Logcheck helps spot problems and security violations in your logfiles automatically and will send the results to you in e-mail. -Logcheck is part of the Abacus Project of security tools. It is a program -created to help in the processing of UNIX system logfiles generated by the -various Abacus Project tools, system daemons, Wietse Venema's TCP Wrapper -and Log Daemon packages, and the Firewall Toolkit(c) by Trusted Information -Systems Inc.(TIS). Logcheck also works very well at reporting on other +Logcheck is part of the Abacus Project of security tools. It is a program +created to help in the processing of UNIX system logfiles generated by the +various Abacus Project tools, system daemons, Wietse Venema's TCP Wrapper +and Log Daemon packages, and the Firewall Toolkit(c) by Trusted Information +Systems Inc.(TIS). Logcheck also works very well at reporting on other common operating system security violations and strange events. diff --git a/security/mirrordir/DESCR b/security/mirrordir/DESCR index f9f58fc1264..820dad28fa6 100644 --- a/security/mirrordir/DESCR +++ b/security/mirrordir/DESCR @@ -1,13 +1,13 @@ Mirrordir is a suite of functions in one package. It contains the -following programs: +following programs: * pslogin: A remote login utility and daemon that provides a secure -shell. This can be considered as a GPL replacement to Ssh. +shell. This can be considered as a GPL replacement to Ssh. * copydir: A cp equivalent which additionally copies to and from ftp servers. Use it to upload and download via ftp and via mirrordir's secure daemon. Use it as a rigorous cp to correctly reproduce -hardlinks, permissions and access times. +hardlinks, permissions and access times. * mirrordir: Mirrors filesystems over ftp or locally via a minimal set of changes. It is optimised for locally mirroring a device as @@ -16,7 +16,7 @@ detail, even correctly recreating hardlinks, devices and access times. It works well mirroring ftp sites that don't support ls-lR summaries. Mirrordir can take a C script to customise the kind of files to mirror based on their stat info, name, or other -information. +information. * recursdir: Pass a C script to recursdir to recursively perform operations on files. This is a fast and overkill equivalent of find. diff --git a/security/openssh/Makefile b/security/openssh/Makefile index dafd5164882..bf38bdc4c15 100644 --- a/security/openssh/Makefile +++ b/security/openssh/Makefile @@ -1,4 +1,4 @@ -# $NetBSD: Makefile,v 1.98 2003/04/22 09:50:01 grant Exp $ +# $NetBSD: Makefile,v 1.99 2003/05/06 17:42:32 jmmv Exp $ DISTNAME= openssh-3.6.1p1 PKGNAME= openssh-3.6.1.1 @@ -27,7 +27,7 @@ USE_OPENSSL_VERSION= ${OPENSSL_VERSION_096} CRYPTO= yes -# retain the following line, for IPv6-ready pkgsrc webpage +# retain the following line, for IPv6-ready pkgsrc webpage BUILD_DEFS+= USE_INET6 #BUILD_DEFS+= KERBEROS diff --git a/security/p5-Crypt-DES_EDE3/DESCR b/security/p5-Crypt-DES_EDE3/DESCR index fa9809a6815..154cdc34fd9 100644 --- a/security/p5-Crypt-DES_EDE3/DESCR +++ b/security/p5-Crypt-DES_EDE3/DESCR @@ -1,8 +1,8 @@ -Crypt::DES_EDE3 implements DES-EDE3 encryption. This is triple-DES -encryption where an encrypt operation is encrypt-decrypt-encrypt, and -decrypt is decrypt-encrypt-decrypt. This implementation uses Crypt::DES +Crypt::DES_EDE3 implements DES-EDE3 encryption. This is triple-DES +encryption where an encrypt operation is encrypt-decrypt-encrypt, and +decrypt is decrypt-encrypt-decrypt. This implementation uses Crypt::DES to do its dirty DES work, and simply provides a wrapper around that -module: setting up the individual DES ciphers, initializing the keys, +module: setting up the individual DES ciphers, initializing the keys, and performing the encryption/decryption steps. DES-EDE3 encryption requires a key size of 24 bytes. diff --git a/security/p5-Crypt-DSA/DESCR b/security/p5-Crypt-DSA/DESCR index ba808f5abab..b0491dfe759 100644 --- a/security/p5-Crypt-DSA/DESCR +++ b/security/p5-Crypt-DSA/DESCR @@ -1,6 +1,6 @@ -Crypt::DSA is an implementation of the DSA (Digital Signature Algorithm) -signature verification system. The implementation itself is pure Perl, -although the heavy-duty mathematics underneath are provided by the +Crypt::DSA is an implementation of the DSA (Digital Signature Algorithm) +signature verification system. The implementation itself is pure Perl, +although the heavy-duty mathematics underneath are provided by the Math::Pari library. This package provides DSA signing, signature verification, diff --git a/security/p5-Crypt-OpenPGP/DESCR b/security/p5-Crypt-OpenPGP/DESCR index 43cbd34b8bf..49e56fa5eec 100644 --- a/security/p5-Crypt-OpenPGP/DESCR +++ b/security/p5-Crypt-OpenPGP/DESCR @@ -1,4 +1,4 @@ -Crypt::OpenPGP is a pure-Perl implementation of the OpenPGP standard. -In addition to support for the standard itself, Crypt::OpenPGP claims -compatibility with many other PGP implementations, both those that +Crypt::OpenPGP is a pure-Perl implementation of the OpenPGP standard. +In addition to support for the standard itself, Crypt::OpenPGP claims +compatibility with many other PGP implementations, both those that support the standard and those that preceded it. diff --git a/security/p5-Crypt-Primes/DESCR b/security/p5-Crypt-Primes/DESCR index 3c73b4a1da0..2fefe9b4bc7 100644 --- a/security/p5-Crypt-Primes/DESCR +++ b/security/p5-Crypt-Primes/DESCR @@ -1,6 +1,6 @@ -This module implements Ueli Maurer's algorithm for generating large provable -primes and secure parameters for public-key cryptosystems. The generated -primes are almost uniformly distributed over the set of primes of the -specified bitsize and expected time for generation is less than the time -required for generating a pseudo-prime of the same size with Miller-Rabin +This module implements Ueli Maurer's algorithm for generating large provable +primes and secure parameters for public-key cryptosystems. The generated +primes are almost uniformly distributed over the set of primes of the +specified bitsize and expected time for generation is less than the time +required for generating a pseudo-prime of the same size with Miller-Rabin tests. diff --git a/security/p5-Crypt-RIPEMD160/DESCR b/security/p5-Crypt-RIPEMD160/DESCR index 3f1c65d636f..ac103de82fe 100644 --- a/security/p5-Crypt-RIPEMD160/DESCR +++ b/security/p5-Crypt-RIPEMD160/DESCR @@ -1,2 +1,2 @@ -The Crypt::RIPEMD160 module allows you to use the RIPEMD160 Message Digest +The Crypt::RIPEMD160 module allows you to use the RIPEMD160 Message Digest algorithm from within Perl programs. diff --git a/security/p5-Crypt-RSA/DESCR b/security/p5-Crypt-RSA/DESCR index a00c0739ff3..bfd0bb7b624 100644 --- a/security/p5-Crypt-RSA/DESCR +++ b/security/p5-Crypt-RSA/DESCR @@ -1,9 +1,9 @@ -Crypt::RSA is a pure-perl, cleanroom implementation of the RSA public-key -cryptosystem. It uses Math::Pari, a perl interface to the blazingly fast +Crypt::RSA is a pure-perl, cleanroom implementation of the RSA public-key +cryptosystem. It uses Math::Pari, a perl interface to the blazingly fast PARI library, for big integer arithmetic and number theoretic computations. -Crypt::RSA provides arbitrary size key-pair generation, plaintext-aware -encryption (OAEP) and digital signatures with appendix (PSS). For -compatibility with SSLv3, RSAREF2, PGP and other applications that follow -the PKCS #1 v1.5 standard, it also provides PKCS #1 v1.5 encryption and +Crypt::RSA provides arbitrary size key-pair generation, plaintext-aware +encryption (OAEP) and digital signatures with appendix (PSS). For +compatibility with SSLv3, RSAREF2, PGP and other applications that follow +the PKCS #1 v1.5 standard, it also provides PKCS #1 v1.5 encryption and signatures. diff --git a/security/p5-Crypt-Rijndael/DESCR b/security/p5-Crypt-Rijndael/DESCR index 664f7271c40..363255e3f88 100644 --- a/security/p5-Crypt-Rijndael/DESCR +++ b/security/p5-Crypt-Rijndael/DESCR @@ -1,3 +1,3 @@ -This is Crypt::Rijndael, an XS-based implementation of the newly-selected -Advanced Encryption Standard algorithm Rijndael, designed by Joan Daemen and +This is Crypt::Rijndael, an XS-based implementation of the newly-selected +Advanced Encryption Standard algorithm Rijndael, designed by Joan Daemen and Vincent Rijmen. diff --git a/security/p5-Crypt-Twofish/DESCR b/security/p5-Crypt-Twofish/DESCR index 702d805eed1..e0965e3fcf3 100644 --- a/security/p5-Crypt-Twofish/DESCR +++ b/security/p5-Crypt-Twofish/DESCR @@ -1,4 +1,4 @@ -This module implements Twofish encryption. It supports the Crypt::CBC -interface, with the functions described below. It also provides an interface -that is call-compatible with Crypt::Twofish 1.0, but its use in new code is +This module implements Twofish encryption. It supports the Crypt::CBC +interface, with the functions described below. It also provides an interface +that is call-compatible with Crypt::Twofish 1.0, but its use in new code is strongly discouraged. diff --git a/security/p5-Tie-EncryptedHash/DESCR b/security/p5-Tie-EncryptedHash/DESCR index f9c182fcc79..8e9f4e368da 100644 --- a/security/p5-Tie-EncryptedHash/DESCR +++ b/security/p5-Tie-EncryptedHash/DESCR @@ -1,7 +1,7 @@ -Tie::EncryptedHash augments Perl hash semantics to build secure, encrypting -containers of data. Tie::EncryptedHash introduces special hash fields that +Tie::EncryptedHash augments Perl hash semantics to build secure, encrypting +containers of data. Tie::EncryptedHash introduces special hash fields that are coupled with encrypt/decrypt routines to encrypt assignments at STORE() -and decrypt retrievals at FETCH(). By design, encrypting fields are -associated with keys that begin in single underscore. The remaining keyspace -is used for accessing normal hash fields, which are retained without +and decrypt retrievals at FETCH(). By design, encrypting fields are +associated with keys that begin in single underscore. The remaining keyspace +is used for accessing normal hash fields, which are retained without modification. diff --git a/security/pgpdump/DESCR b/security/pgpdump/DESCR index b4ca9286e8e..cc1f302026f 100644 --- a/security/pgpdump/DESCR +++ b/security/pgpdump/DESCR @@ -1,3 +1,3 @@ "pgpdump" is a PGP packet visualizer which displays the packet format of OpenPGP (RFC 2440 + bis) and PGP version 2 (RFC 1991). -To know how to use pgpdump, type "pgpdump -h". +To know how to use pgpdump, type "pgpdump -h". diff --git a/security/pks/DESCR b/security/pks/DESCR index c0ff028a842..b20a1bc6e0d 100644 --- a/security/pks/DESCR +++ b/security/pks/DESCR @@ -1,2 +1,2 @@ -This program implements a standard PGP Key Server, which can be assumed +This program implements a standard PGP Key Server, which can be assumed to be in addition to the public key server at MIT. diff --git a/security/portsentry/DESCR b/security/portsentry/DESCR index 26d99009009..a64fba11c2c 100644 --- a/security/portsentry/DESCR +++ b/security/portsentry/DESCR @@ -1,22 +1,22 @@ PortSentry is designed to detect and respond to port scans against a -target host in real-time. Some of the more useful features include: +target host in real-time. Some of the more useful features include: + Runs on TCP and UDP sockets to detect port scans against your system. PortSentry is configurable to run on multiple sockets at the same time so you only need to start one copy to cover dozens of -tripwired services. +tripwired services. + PortSentry will react to a port scan attempt by blocking the host in real-time. This is done through configured options of either dropping the local route back to the attacker, using the Linux ipfwadm/ipchains command, *BSD ipfw command, and/or dropping the attacker host IP into -a TCP Wrappers hosts.deny file automatically. +a TCP Wrappers hosts.deny file automatically. + PortSentry has an internal state engine to remember hosts that connected previously. This allows the setting of a trigger value to -prevent false alarms and detect "random" port probing. +prevent false alarms and detect "random" port probing. + PortSentry will report all violations to the local or remote syslog daemons indicating the system name, time of attack, attacking host IP and the TCP or UDP port a connection attempt was made to. When used in conjunction with Logcheck it will provide an alert to -administrators through e-mail. +administrators through e-mail. + Once a scan is detected your system will turn into a blackhole and -disappear from the attacker. This feature stops most attacks cold. +disappear from the attacker. This feature stops most attacks cold. diff --git a/security/priv/DESCR b/security/priv/DESCR index e93a0b93c0b..ee2ef6ab923 100644 --- a/security/priv/DESCR +++ b/security/priv/DESCR @@ -6,7 +6,7 @@ database file called ${PREFIX}/etc/priv/ -Each line of the database file is a colon-seperated list of fields. +Each line of the database file is a colon-seperated list of fields. The first two fields must be specified. Blank lines or lines beginning with a ``#'' character are ignored. The fields, in order, are: diff --git a/security/pyca/DESCR b/security/pyca/DESCR index d69941063ff..87fbdbc5818 100644 --- a/security/pyca/DESCR +++ b/security/pyca/DESCR @@ -1,5 +1,5 @@ -pyCA tries to make it easier for people to set up and run a organizational -certificate authority which fulfills the need for a fairly secure -certification processing. The package also tries to reduce administrative -tasks and user's frustration by providing a comfortable web interface to -users contacting the certificate authority. +pyCA tries to make it easier for people to set up and run a organizational +certificate authority which fulfills the need for a fairly secure +certification processing. The package also tries to reduce administrative +tasks and user's frustration by providing a comfortable web interface to +users contacting the certificate authority. diff --git a/security/rats/DESCR b/security/rats/DESCR index 272e4801ce5..7832b1994d4 100644 --- a/security/rats/DESCR +++ b/security/rats/DESCR @@ -1,7 +1,7 @@ -RATS, the Rough Auditing Tool for Security, is a security auditing utility -for C and C++ code. RATS scans source code, finding potentially dangerous -function calls. -The goal of this project is not to definitively find bugs (yet). -The current goal is to provide a reasonable starting point for performing -manual security audits. -RATS is released under version 2 of the GNU Public License (GPL). +RATS, the Rough Auditing Tool for Security, is a security auditing utility +for C and C++ code. RATS scans source code, finding potentially dangerous +function calls. +The goal of this project is not to definitively find bugs (yet). +The current goal is to provide a reasonable starting point for performing +manual security audits. +RATS is released under version 2 of the GNU Public License (GPL). diff --git a/security/seahorse/DESCR b/security/seahorse/DESCR index 9d52b4a98ed..7c0dd68ba75 100644 --- a/security/seahorse/DESCR +++ b/security/seahorse/DESCR @@ -5,6 +5,6 @@ has. Seahorse is also a keymanager, which can be used to edit almost all the properties of the keys stored in your keyrings. Seahorse currently consists of two projects. Along with Seahorse -itself, a bonobo component called Seahorse-bonobo is being developed. +itself, a bonobo component called Seahorse-bonobo is being developed. This bonobo component will serve as a backend to Seahorse, as the most gnupg common functions are being implemented in it. diff --git a/security/sfs/MESSAGE b/security/sfs/MESSAGE index a152abb9efd..71b9706b96f 100644 --- a/security/sfs/MESSAGE +++ b/security/sfs/MESSAGE @@ -1,5 +1,5 @@ =========================================================================== -$NetBSD: MESSAGE,v 1.2 2003/03/23 14:28:32 lukem Exp $ +$NetBSD: MESSAGE,v 1.3 2003/05/06 17:42:36 jmmv Exp $ Quick Client Setup: @@ -8,7 +8,7 @@ Quick Client Setup: sfscd=YES 2. Run: ${PREFIX}/etc/rc.d/sfscd start -3. cd /sfs/sfs.fs.net:eu4cvv6wcnzscer98yn4qjpjnn9iv6pi +3. cd /sfs/sfs.fs.net:eu4cvv6wcnzscer98yn4qjpjnn9iv6pi 4. cat CONGRATULATIONS Quick Server Setup: @@ -20,7 +20,7 @@ nfs_server=YES sfssd=YES 2. Run: /etc/rc.d/nfsd start -3. Copy ${SFSEXAMPLEDIR}/sfsrwsd_config.sample to +3. Copy ${SFSEXAMPLEDIR}/sfsrwsd_config.sample to ${PREFIX}/etc/sfs/sfsrwsd_config and modify. 4. Modify /etc/exports to match your sfsrwsd_config. 5. Create the root directories in ${SFSDIR}/root. diff --git a/security/skey/DESCR b/security/skey/DESCR index 82376b13a75..8471a325cb4 100644 --- a/security/skey/DESCR +++ b/security/skey/DESCR @@ -3,4 +3,4 @@ to Solaris, Linux, *BSD, AIX and probably other *NIX systems. This port consists of the introduction of autoconf support and replacement of OpenBSD library functions that are (regrettably) -absent from other unices. +absent from other unices. diff --git a/security/smimemsg/DESCR b/security/smimemsg/DESCR index c999a98c28b..880596141ab 100644 --- a/security/smimemsg/DESCR +++ b/security/smimemsg/DESCR @@ -8,7 +8,7 @@ Limitation is following : * only "RC2 40bit" symmentric cipher is used for encryption and decryption. * AiCrypto S/MIME can not operate any MultiPart analysis. Therefore, - the Clear Signature message type is not available to use. + the Clear Signature message type is not available to use. * Signature and message will be embeded in smime.p7s file. * Verification process requires the certificates, which shuold be embeded in the S/MIME message. diff --git a/security/ssh/DESCR b/security/ssh/DESCR index 5c76294d0b0..a191dd75801 100644 --- a/security/ssh/DESCR +++ b/security/ssh/DESCR @@ -24,7 +24,7 @@ FEATURES secure channel. Fake Xauthority information is automatically generated and forwarded to the remote machine; the local client automatically examines incoming X11 connections and replaces the - fake authorization data with the real data (never telling the + fake authorization data with the real data (never telling the remote machine the real information). o Arbitrary TCP/IP ports can be redirected through the encrypted channel diff --git a/security/sudo/MESSAGE b/security/sudo/MESSAGE index f0d7bea404f..6046fd695f1 100644 --- a/security/sudo/MESSAGE +++ b/security/sudo/MESSAGE @@ -1,8 +1,8 @@ =========================================================================== -$NetBSD: MESSAGE,v 1.4 2003/03/25 17:27:49 grant Exp $ +$NetBSD: MESSAGE,v 1.5 2003/05/06 17:42:36 jmmv Exp $ If you are upgrading from a version of sudo prior to 1.6, please read - + ${PREFIX}/share/doc/sudo/UPGRADE on how to modify your sudoers file appropriately. diff --git a/security/tct/DESCR b/security/tct/DESCR index 29edcec5d70..1361d1e8118 100644 --- a/security/tct/DESCR +++ b/security/tct/DESCR @@ -5,7 +5,7 @@ Notable TCT components are the grave-robber tool that captures information, the ils and mactime tools that display access patterns of files dead or alive, the unrm and lazarus tools that recover deleted files, and the findkey tool that recovers cryptographic keys from a -running process or from files. +running process or from files. WARNING diff --git a/security/uvscan/DESCR b/security/uvscan/DESCR index 3293253ab1c..3f127a086a8 100644 --- a/security/uvscan/DESCR +++ b/security/uvscan/DESCR @@ -5,7 +5,7 @@ emulation. You may use this software for only thirty (30) days, after which period you must either buy the software from Network Associates, Inc. or - stop using it and remove it from your computer. + stop using it and remove it from your computer. Please see ${PREFIX}/share/doc/uvscan/license.txt for more information. diff --git a/security/winbind/DESCR b/security/winbind/DESCR index 14745a4f54d..ff4bde56c3f 100644 --- a/security/winbind/DESCR +++ b/security/winbind/DESCR @@ -1,5 +1,5 @@ Winbind uses a UNIX implementation of Microsoft RPC calls, Pluggable Authentication Modules, and the Name Service Switch to allow Windows NT -domain users to appear and operate as UNIX users on a UNIX machine. +domain users to appear and operate as UNIX users on a UNIX machine. Users and groups are allocated as they are resolved to a range of user and group ids specified by the administrator of the Samba system. diff --git a/security/xdm-krb4/DESCR b/security/xdm-krb4/DESCR index 890dbf4ac5c..1caa7c8aa49 100644 --- a/security/xdm-krb4/DESCR +++ b/security/xdm-krb4/DESCR @@ -1,6 +1,6 @@ This is xdm-krb4-3.3.6.1, a Kerberos IV and AFS-aware version of xdm. It is a downsized version of the xdm that comes with XFree86 version 3.3.6, -with Kerberos IV functionality added. +with Kerberos IV functionality added. xdm-krb4 tries to authenticate to a Kerberos IV server and get Kerberos tickets. If AFS/arla is installed and running, it additionaly gets an -- cgit v1.2.3