These modules provide a basis for parsing snort configuration files and
rules, allow tools to be built that muck with rulesets with less effort.
An example tool, snortconfig, is included. snortconfig was the reason
these modules were built.
ok sturm@
This module supports getaddrinfo() and getnameinfo() to intend to
enable protocol independent programing. IPv6 related defines such
as AF_INET6 are also included.
Fixes and OK sturm@
IO::Socket::INET6 provides an object interface to creating and using
sockets in either AF_INET or AF_INET6 domains. It is built upon the
IO::Socket interface and inherits all the methods defined by IO::Socket.
Fixes and OK sturm@
This is a maintenance release of Samba 2.2.8a to address the problem with
user password changes after applying the Microsoft hotfix described in
KB828741 to Windows NT 4.0/200x/XP clients.
This module is an implementation of the BGP-4 inter-domain routing
protocol. It encapsulates all of the functionality needed to establish
and maintain a BGP peering session and exchange routing update
information with the peer. It aims to provide a simple API to the BGP
protocol for the purposes of automation, logging, monitoring, testing,
and similar tasks using the power and flexibility of perl. The module
does not implement the functionality of a RIB (Routing Information Base)
nor does it modify the kernel routing table of the host system. However,
such operations could be implemented using the API provided by the
module.
ok sturm@
cnupm is an IPv4/IPv6 traffic collector daemon; it listens on a network
interface for IPv4/IPv6 packets that match the boolean expression (see
tcpdump(8) for more information) and collects the following statistics:
o address family (INET/INET6)
o IPv4/IPv6 protocol number
o source IPv4/IPv6 address
o source TCP/UDP port
o destination IPv4/IPv6 address
o destination TCP/UDP port
o total number of bytes transferred
Based on the port from the cnupm author
Oleg Safiullin <form@pdp-11.org.ru>.
Help and ok pval@ naddy@.
SECURITY:
Paths sent to an rsync daemon are more thoroughly sanitized when
chroot is not used. If you're running a non-read-only rsync daemon
with chroot disabled, *please upgrade*, especially if the user privs
you run rsync under is anything above "nobody".