Port details |
- rabl_client Reactive Autonomous Blackhole List client
- 1.0.0 mail
=0 1.0.0Version of this port present on the latest quarterly branch.
- DEPRECATED: Not staged. See http://lists.freebsd.org/pipermail/freebsd-ports-announce/2014-May/000080.html
This port expired on: 2014-08-31
- There is no maintainer for this port.
- Any concerns regarding this port should be directed to the FreeBSD Ports mailing list via ports@FreeBSD.org
- Port Added: 2005-10-08 04:58:21
- Last Update: 2014-09-01 21:26:00
- SVN Revision: 366959
- Also Listed In: dns
- License: not specified in port
- WWW:
- http://www.nuclearelephant.com/projects/rabl/
- Description:
- The RABL (pronounced "rabble") server is a statistical, machine-automated and
up-to-the-second blackhole list server designed to monitor global network
activity and make decisions based on network spread and infection rate -
that is, abuse from an address which has been reported by a number of
participating networks. This is in far contrast to how most other
blacklists function, where fallable humans (many with political agendas) must
process thousands of reports and make decisions - many times after the fact.
The RABL is fully reactive to new threats and can block addresses within
seconds of widespread infection - good to know in this world of drone PCs
and stolen accounts. The RABL server blacklists addresses until they have
cleared a minimum duration (an hour by default) without any additional
reporting, making the appeals process as simple as "fix your junk". The RABL
is designed to function via automated machine-learning spam filters, such as
Bayesian filters. Each participating network is granted write authentication
in the blackhole list, to prevent abuse. A client tool is also provided.
The RABL client is the lookup and reporting component of the RABL. It is
necessary for performing streaming connection lookups and writing to the RABL
(assuming you have an account).
WWW: http://www.nuclearelephant.com/projects/rabl/
-
cgit ¦ GitHub ¦ GitHub ¦ GitLab ¦
- Manual pages:
- FreshPorts has no man page information for this port.
- pkg-plist: as obtained via:
make generate-plist - There is no configure plist information for this port.
- Dependency lines:
-
- rabl_client>0:mail/rabl_client
- No installation instructions:
- This port has been deleted.
- PKGNAME: rabl_client
- Flavors: there is no flavor information for this port.
- distinfo:
- There is no distinfo for this port.
No package information for this port in our database- Sometimes this happens. Not all ports have packages. Perhaps there is a build error. Check the fallout link:
- This port has no dependencies.
- There are no ports dependent upon this port
Configuration Options:
- ===> The following configuration options are available for rabl_client-1.0.0:
DEBUG=off: Build with debugging support
DOCS=on: Build and/or install documentation
===> Use 'make config' to modify these settings
- Options name:
- N/A
- FreshPorts was unable to extract/find any pkg message
- Master Sites:
|
Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
1.0.0 01 Sep 2014 21:26:00 |
bapt |
Remove non staged ports without pending PR from ma* |
1.0.0 04 Jul 2014 09:12:57 |
bapt |
Resetting maintainership on ports that have not been staged and without any
pending PR (related to stage)
With hat: portmgr |
1.0.0 20 Sep 2013 19:59:14 |
bapt |
Add NO_STAGE all over the place in preparation for the staging support (cat:
mail) |
04 Jun 2013 10:32:49
|
bapt |
Convert to new options framework |
1.0.0 23 Sep 2011 22:26:39 |
amdmi3 |
- Add LDFLAGS to CONFIGURE_ENV and MAKE_ENV (as it was done with LDFLAGS)
- Fix all ports that add {CPP,LD}FLAGS to *_ENV to modify flags instead
PR: 157936
Submitted by: myself
Exp-runs by: pav
Approved by: pav |
1.0.0 03 Jul 2011 13:53:52 |
ohauer |
- remove MD5 |
1.0.0 21 Aug 2008 06:18:49 |
rafan |
Update CONFIGURE_ARGS for how we pass CONFIGURE_TARGET to configure script.
Specifically, newer autoconf (> 2.13) has different semantic of the
configure target. In short, one should use --build=CONFIGURE_TARGET
instead of CONFIGURE_TARGET directly. Otherwise, you will get a warning
and the old semantic may be removed in later autoconf releases.
To workaround this issue, many ports hack the CONFIGURE_TARGET variable
so that it contains the ``--build='' prefix.
To solve this issue, under the fact that some ports still have
configure script generated by the old autoconf, we use runtime detection
in the do-configure target so that the proper argument can be used.
Changes to Mk/*:
- Add runtime detection magic in bsd.port.mk (Only the first 15 lines of the commit message are shown above ) |
1.0.0 29 Jun 2006 13:48:49 |
itetcu |
Switch backup mirror on my other server |
1.0.0 29 Jun 2006 13:46:45 |
itetcu |
- s/INSTALL_SHLIB/USE_LDCONFIG/
- use my @FreeBSD.org address |
1.0.0 23 Feb 2006 10:40:45 |
ade |
Conversion to a single libtool environment.
Approved by: portmgr (kris) |
1.0.0 22 Jan 2006 12:50:54 |
edwin |
SHA256ify
Approved by: krion@ |
1.0.0 15 Nov 2005 06:52:12 |
ade |
Mass-conversion to the USE_AUTOTOOLS New World Order. The code present
in bsd.autotools.mk essentially makes this a no-op given that all the
old variables set a USE_AUTOTOOLS_COMPAT variable, which is parsed in
exactly the same way as USE_AUTOTOOLS itself.
Moreover, USE_AUTOTOOLS has already been extensively tested by the GNOME
team -- all GNOME 2.12.x ports use it.
Preliminary documentation can be found at:
http://people.FreeBSD.org/~ade/autotools.txt
which is in the process of being SGMLized before introduction into the
Porters Handbook.
Light blue touch-paper. Run. |
1.0.0 08 Oct 2005 04:57:47 |
mnag |
The RABL (pronounced "rabble") server is a statistical, machine-automated and
up-to-the-second blackhole list server designed to monitor global network
activity and make decisions based on network spread and infection rate -
that is, abuse from an address which has been reported by a number of
participating networks. This is in far contrast to how most other
blacklists function, where fallable humans (many with political agendas) must
process thousands of reports and make decisions - many times after the fact.
The RABL is fully reactive to new threats and can block addresses within
seconds of widespread infection - good to know in this world of drone PCs
and stolen accounts. The RABL server blacklists addresses until they have
cleared a minimum duration (an hour by default) without any additional
reporting, making the appeals process as simple as "fix your junk". The RABL
is designed to function via automated machine-learning spam filters, such as
Bayesian filters. Each participating network is granted write authentication
in the blackhole list, to prevent abuse. A client tool is also provided.
The RABL client is the lookup and reporting component of the RABL. It is
necessary for performing streaming connection lookups and writing to the RABL
(assuming you have an account).
PR: 87096
Submitted by: Ion-Mihai "IOnut" Tetcu <itetcu@people.tecnik93.com> |