В целях сокращения текста тикета я изъял отчет об установке.
Но раз зашла о нем речь, то я выложу его:
----------------------------------------------------------------------------------
===> Registering installation for openssl-0.9.8e_1
===> SECURITY REPORT:
This port has installed the following files, which may act as network
servers and may therefore pose a remote security risk to the system.
/usr/local/bin/openssl
/usr/local/lib/libcrypto.so.4
If there are vulnerabilities in these programs there may be a security
risk to the system. FreeBSD makes no guarantee about the security of
ports included in the Ports Collection. Please type 'make deinstall'
to deinstall the port if this is a concern.
For more information, and contact details about the security
status of this software, see the following webpage:
http://www.openssl.org/ To enable this port, please add sshd_program=/usr/local/sbin/sshd and make
sure sshd_enable is set to YES in your /etc/rc.conf
You may also want to put NO_OPENSSH= true in your /etc/make.conf
and make sure your path is setup to /usr/local/bin before /usr/bin so that
you are running the port version of openssh and not the version that comes
with FreeBSD
'PermitRootLogin no' is the new default for the OpenSSH port.
This now matches the PermitRootLogin configuration of OpenSSH in
the base system. Please be aware of this when upgrading your
OpenSSH port, and if truly necessary, re-enable remote root login
by readjusting this option in your sshd_config.
Users are encouraged to create single-purpose users with ssh keys
and very narrowly defined sudo privileges instead of using root
for automated tasks.
===> Installing rc.d startup script(s)
===> Registering installation for openssh-skey-3.6.1_6
===> SECURITY REPORT:
This port has installed the following binaries, which execute with
increased privileges.
/usr/local/libexec/ssh-keysign
This port has installed the following files, which may act as network
servers and may therefore pose a remote security risk to the system.
/usr/local/bin/ssh
/usr/local/bin/ssh-keyscan
/usr/local/libexec/ssh-keysign
/usr/local/bin/ssh-agent
/usr/local/sbin/sshd
/usr/local/bin/slogin
This port has installed the following startup scripts, which may cause
these network services to be started at boot time.
/usr/local/etc/rc.d/sshd.sh
If there are vulnerabilities in these programs there may be a security
risk to the system. FreeBSD makes no guarantee about the security of
ports included in the Ports Collection. Please type 'make deinstall'
to deinstall the port if this is a concern.
For more information, and contact details about the security
status of this software, see the following webpage:
http://www.openssh.com/ ===> SECURITY REPORT:
This port has installed the following files, which may act as network
servers and may therefore pose a remote security risk to the system.
/usr/local/sbin/proftpd
This port has installed the following startup scripts, which may cause
these network services to be started at boot time.
/usr/local/etc/rc.d/proftpd.sh
If there are vulnerabilities in these programs there may be a security
risk to the system. FreeBSD makes no guarantee about the security of
ports included in the Ports Collection. Please type 'make deinstall'
to deinstall the port if this is a concern.
For more information, and contact details about the security
status of this software, see the following webpage:
http://www.proftpd.org/ /
*************************************************************************
* _ _____ _____ _____ _ _ _____ ___ ___ _ _ *
* / \|_ _|_ _| ____| \ | |_ _|_ _/ _ \| \ | | *
* / _ \ | | | | | _| | \| | | | | | | | | \| | *
* / ___ \| | | | | |___| |\ | | | | | |_| | |\ | *
* /_/ \_\_| |_| |_____|_| \_| |_| |___\___/|_| \_| *
* *
* BIND 9 requires a good source of randomness to operate. *
* It also requires configuration of rndc, including a *
* "secret" key. If you are using FreeBSD 4.x, visit *
*
http://people.freebsd.org/~dougb/randomness.html for *
* information on how to set up entropy gathering. Users *
* of FreeBSD 5.x or later do not need to do this step. If *
* you are running BIND 9 in a chroot environment, make *
* sure that there is a /dev/random device in the chroot. *
* *
* The easiest, and most secure way to configure rndc is *
* to run 'rndc-confgen -a' which will generate the proper *
* conf file, with a new random key, and appropriate file *
* permissions. *
* *
*************************************************************************
===> Compressing manual pages for bind9-base-9.3.4
===> Registering installation for bind9-base-9.3.4
===> SECURITY REPORT:
This port has installed the following files, which may act as network
servers and may therefore pose a remote security risk to the system.
/usr/sbin/rndc-confgen
/usr/sbin/named-checkconf
/usr/sbin/dnssec-keygen
/usr/sbin/rndc
/usr/sbin/lwresd
/usr/bin/nsupdate
/usr/bin/dig
/usr/sbin/named
/usr/bin/host
/usr/sbin/dnssec-signzone
/usr/bin/nslookup
/usr/sbin/named-checkzone
If there are vulnerabilities in these programs there may be a security
risk to the system. FreeBSD makes no guarantee about the security of
ports included in the Ports Collection. Please type 'make deinstall'
to deinstall the port if this is a concern.
For more information, and contact details about the security
status of this software, see the following webpage:
http://www.isc.org/index.pl?/sw/bind/bind9.3.php Обновление ПО завершено