FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

I am looking for an LTO tape library. Do you have one to spare?
Port details
rabl_client 1.0.0 mail Deleted on this many watch lists=0 search for ports that depend on this port
Deprecated DEPRECATED: Not staged. See http://lists.freebsd.org/pipermail/freebsd-ports-announce/2014-May/000080.html
Expired This port expired on: 2014-08-31
Reactive Autonomous Blackhole List client

There is no maintainer for this port.
Any concerns regarding this port should be directed to the FreeBSD Ports mailing list via ports@FreeBSD.org search for ports maintained by this maintainer
Port Added: 08 Oct 2005 04:58:21
Also Listed In: dns
License: not specified in port


The RABL (pronounced "rabble") server is a statistical, machine-automated and
up-to-the-second blackhole list server designed to monitor global network
activity and make decisions based on network spread and infection rate -
that is, abuse from an address which has been reported by a number of
participating networks. This is in far contrast to how most other
blacklists function, where fallable humans (many with political agendas) must
process thousands of reports and make decisions - many times after the fact.
The RABL is fully reactive to new threats and can block addresses within
seconds of widespread infection - good to know in this world of drone PCs
and stolen accounts. The RABL server blacklists addresses until they have
cleared a minimum duration (an hour by default) without any additional
reporting, making the appeals process as simple as "fix your junk". The RABL
is designed to function via automated machine-learning spam filters, such as
Bayesian filters. Each participating network is granted write authentication
in the blackhole list, to prevent abuse. A client tool is also provided.

The RABL client is the lookup and reporting component of the RABL. It is
necessary for performing streaming connection lookups and writing to the RABL
(assuming you have an account).

WWW: http://www.nuclearelephant.com/projects/rabl/
SVNWeb : Main Web Site : Distfiles Availability : PortsMonThere are no ports dependent upon this port

No installation instructions: this port has been deleted.

The package name of this deleted port was: rabl_client


Configuration Options
===> The following configuration options are available for rabl_client-1.0.0:
     DEBUG=off: Build with debugging support
     DOCS=on: Build and/or install documentation
===> Use 'make config' to modify these settings

Master Sites:
  1. http://distcache.FreeBSD.org/ports-distfiles/
  2. http://sce-tindy.tecnik93.com/FreeBSD/ports/rabl_client/sources/
  3. http://www.nuclearelephant.com/projects/rabl/sources/

Number of commits found: 13

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
01 Sep 2014 21:26:00
Original commit files touched by this commit  1.0.0
Revision:366959
bapt search for other commits by this committer
Remove non staged ports without pending PR from ma*
04 Jul 2014 09:12:57
Original commit files touched by this commit  1.0.0
Revision:360579
bapt search for other commits by this committer
Resetting maintainership on ports that have not been staged and without any
pending PR (related to stage)

With hat:	portmgr
20 Sep 2013 19:59:14
Original commit files touched by this commit  1.0.0
Revision:327742
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
mail)
04 Jun 2013 10:32:49
Refresh Original commit files touched by this commit
Revision:319851  Sanity Test Failure
bapt search for other commits by this committer
Convert to new options framework
23 Sep 2011 22:26:39
Original commit files touched by this commit  1.0.0
amdmi3 search for other commits by this committer
- Add LDFLAGS to CONFIGURE_ENV and MAKE_ENV (as it was done with LDFLAGS)
- Fix all ports that add {CPP,LD}FLAGS to *_ENV to modify flags instead

PR:             157936
Submitted by:   myself
Exp-runs by:    pav
Approved by:    pav
03 Jul 2011 13:53:52
Original commit files touched by this commit  1.0.0
ohauer search for other commits by this committer
- remove MD5
21 Aug 2008 06:18:49
Original commit files touched by this commit  1.0.0
rafan search for other commits by this committer
Update CONFIGURE_ARGS for how we pass CONFIGURE_TARGET to configure script.
Specifically, newer autoconf (> 2.13) has different semantic of the
configure target. In short, one should use --build=CONFIGURE_TARGET
instead of CONFIGURE_TARGET directly. Otherwise, you will get a warning
and the old semantic may be removed in later autoconf releases.

To workaround this issue, many ports hack the CONFIGURE_TARGET variable
so that it contains the ``--build='' prefix.

To solve this issue, under the fact that some ports still have
configure script generated by the old autoconf, we use runtime detection
in the do-configure target so that the proper argument can be used.

Changes to Mk/*:
 - Add runtime detection magic in bsd.port.mk
(Only the first 15 lines of the commit message are shown above View all of this commit message)
29 Jun 2006 13:48:49
Original commit files touched by this commit  1.0.0
itetcu search for other commits by this committer
Switch backup mirror on my other server
29 Jun 2006 13:46:45
Original commit files touched by this commit  1.0.0
itetcu search for other commits by this committer
- s/INSTALL_SHLIB/USE_LDCONFIG/
- use my @FreeBSD.org address
23 Feb 2006 10:40:45
Original commit files touched by this commit  1.0.0
ade search for other commits by this committer
Conversion to a single libtool environment.

Approved by:    portmgr (kris)
22 Jan 2006 12:50:54
Original commit files touched by this commit  1.0.0
edwin search for other commits by this committer
SHA256ify

Approved by: krion@
15 Nov 2005 06:52:12
Original commit files touched by this commit  1.0.0
ade search for other commits by this committer
Mass-conversion to the USE_AUTOTOOLS New World Order.  The code present
in bsd.autotools.mk essentially makes this a no-op given that all the
old variables set a USE_AUTOTOOLS_COMPAT variable, which is parsed in
exactly the same way as USE_AUTOTOOLS itself.

Moreover, USE_AUTOTOOLS has already been extensively tested by the GNOME
team -- all GNOME 2.12.x ports use it.

Preliminary documentation can be found at:
        http://people.FreeBSD.org/~ade/autotools.txt

which is in the process of being SGMLized before introduction into the
Porters Handbook.

Light blue touch-paper.  Run.
08 Oct 2005 04:57:47
Original commit files touched by this commit  1.0.0
mnag search for other commits by this committer
The RABL (pronounced "rabble") server is a statistical, machine-automated and
up-to-the-second blackhole list server designed to monitor global network
activity and make decisions based on network spread and infection rate -
that is, abuse from an address which has been reported by a number of
participating networks. This is in far contrast to how most other
blacklists function, where fallable humans (many with political agendas) must
process thousands of reports and make decisions - many times after the fact.
The RABL is fully reactive to new threats and can block addresses within
seconds of widespread infection - good to know in this world of drone PCs
and stolen accounts. The RABL server blacklists addresses until they have
cleared a minimum duration (an hour by default) without any additional
reporting, making the appeals process as simple as "fix your junk". The RABL
is designed to function via automated machine-learning spam filters, such as
Bayesian filters. Each participating network is granted write authentication
in the blackhole list, to prevent abuse. A client tool is also provided.

The RABL client is the lookup and reporting component of the RABL. It is
necessary for performing streaming connection lookups and writing to the RABL
(assuming you have an account).

PR:             87096
Submitted by:   Ion-Mihai "IOnut" Tetcu <itetcu@people.tecnik93.com>

Number of commits found: 13

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
flacNov 25
asterisk11Nov 21
asterisk11Nov 21
phpmyadminNov 21
kde4-runtimeNov 20
kwebkitpartNov 20
yiiNov 19
chromiumNov 18
kde4-workspaceNov 17
dbusNov 11
wgetNov 08
konversation-kde4Nov 05
jenkinsOct 31
jenkins-ltsOct 31
twikiOct 31

9 vulnerabilities affecting 11 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds


Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 24391
Broken 160
Deprecated 79
Ignore 417
Forbidden 1
Restricted 206
No CDROM 93
Vulnerable 18
Expired 12
Set to expire 74
Interactive 0
new 24 hours 9
new 48 hours11
new 7 days51
new fortnight182
new month238

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.