freebsd-ports/net/ntop/pkg-message
Johann Visagie c06e10de07 - Update to version 2.0.99.r2 which is only a release candidate, but there
has been a "massive public demand" that this port be unFORBIDDEN.
- Remove FORBIDDEN.
- Add a PKGMESSAGE to explain new post-install procedure, and to warn the
  user that this port/package is likely to have future security issues.
- Install startup script mode 444, forcing the user to change this explicitly
  to run ntop at system startup.  Document this in PKGMESSAGE.
2002-06-24 14:51:21 +00:00

30 lines
1.1 KiB
Plaintext

----------------------------------------------------------------------------
ntop has been installed, but is not quite ready to be used yet!
You need to set an administrator password for ntop before it may be used.
As root, execute the following command to set this password:
# ntop -A
ntop may now be started. The recommended method to do so is via the
installed startup script. As root, execute the following command:
# sh %%LOCALBASE%%/etc/rc.d/ntop.sh
The recommended way to change startup flags for ntop is to edit this
startup script.
Note that the installed startup script will NOT be execute at system
startup by default. If you wish ntop to start when your system boots,
you should make this script executable:
# chmod 555 %%LOCALBASE%%/etc/rc/ntop.sh
NB!! NB!! NB!!
In the past, ntop has been the subject of repeated security vulner-
abilities, particularly relating to its web interface. It is strongly
suggested that you protect your ntop web interface via packet filters
or TCP wrappers.
----------------------------------------------------------------------------