Bug 102238 - New port: security/mosref 2.0.b3, a secure remote execution framework
Summary: New port: security/mosref 2.0.b3, a secure remote execution framework
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: Normal Affects Only Me
Assignee: Rong-En Fan
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2006-08-18 18:00 UTC by Piet Delport
Modified: 2006-08-23 14:13 UTC (History)
0 users

See Also:


Attachments
mosref.shar (9.19 KB, text/plain)
2006-08-18 18:00 UTC, Piet Delport
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description Piet Delport 2006-08-18 18:00:32 UTC
"MOSREF is a exploitation architecture utilizing the power of the MOSVM virtual
machine and Mosquito Lisp to make penetration testing, exploit development, and
general systems security tasks more efficient."

The port does the following non-canonical things:
* Remove the exec bit from all the distribution files.
* Patch $PREFIX into the install process, bypassing the interactive
  configuration.
Comment 1 Rong-En Fan freebsd_committer freebsd_triage 2006-08-18 18:06:27 UTC
Responsible Changed
From-To: freebsd-ports-bugs->rafan

Eat.
Comment 2 Rong-En Fan freebsd_committer freebsd_triage 2006-08-23 14:13:54 UTC
State Changed
From-To: open->closed

Committed, with minor changes. Thanks!