Portaudit
m (Reverted edits by 193.194.69.155 (Talk); changed back to last version by Ninereasons) |
(how to install package even though it has vulnerabilities) |
||
Line 15: | Line 15: | ||
===> Vulnerability check disabled, database not found | ===> Vulnerability check disabled, database not found | ||
+ | </pre> | ||
+ | |||
+ | If for some reason you need to install a port even though it has know vulnerabilities, you can use the DISABLE_VULNERABILITIES make argument | ||
+ | <pre> | ||
+ | cd /usr/ports/foo/bar | ||
+ | make -DDISABLE_VULNERABILITIES | ||
+ | </pre> | ||
+ | or using portupgrade | ||
+ | <pre> | ||
+ | portupgrade -m 'DISABLE_VULNERABILITIES=yes' <package> | ||
</pre> | </pre> |
Revision as of 06:30, 26 January 2009
portaudit is a small FreeBSD port that automatically creates and maintains a database of known vulnerabilities. Installing this port enables port security auditing on your system.
After port auditing is enabled, you will not be able to install or upgrade an insecure port. Instead, you will receive a message that reads:
===> package-version has known vulnerabilities: => package -- vulnerability summary Reference: &tt;http://www.FreeBSD.org/ports/portaudit/reference.html> => Please update your ports tree and try again. *** Error code 1
portaudit is installed to /usr/local/etc/periodic/security/
by default, so that it will be run automatically, and will be part of the automated security report that is run by the system and mailed (by default) to the root
user.
If you do not have port auditing enabled, you may notice the mysterious but harmless warning, when you run make
on any port, or use portupgrade or portmanager:
===> Vulnerability check disabled, database not found
If for some reason you need to install a port even though it has know vulnerabilities, you can use the DISABLE_VULNERABILITIES make argument
cd /usr/ports/foo/bar make -DDISABLE_VULNERABILITIES
or using portupgrade
portupgrade -m 'DISABLE_VULNERABILITIES=yes' <package>