Hello,

On freshly updated -current and /usr/ports, on amd64 `make test` fails with:

===> Returning to build of floss-1.5.0                                          
   
===> floss-1.5.0 depends on: py-plugnplay-* -> py-plugnplay-0.5.3               
   
>> Broken dependency: security/py-viv_utils non existent \
  (DEPENDS was security/py-viv_utils) in security/floss
*** Error 1 in . (/usr/ports/infrastructure/mk/bsd.port.mk:2073\
 '/usr/ports/pobj/floss-1.5.0/.dep-securit

`port-lib-depends-check` and `package` targets fail as well with the same
complaint about missing dependency.

Is `py-viv_utils` a port that is currently in development?

Cheers

On 12.03, Remi Pointel wrote:
> 
> 
> -------- Courriel original --------
> Objet: [NEW] security/floss
> Date: 10-03-2018 08:52
> De: Remi Pointel <remi.poin...@xiri.fr>
> À: The OpenBSD ports mailing-list <ports@openbsd.org>
> 
> Hi,
> 
> attached is the port of floss: FireEye Labs Obfuscated String Solver.
> 
> ---------------------------------
> $ pkg_info floss
> Information for inst:floss-1.5.0
> 
> Comment:
> FireEye Labs Obfuscated String Solver
> 
> Description:
> The FireEye Labs Obfuscated String Solver (FLOSS) uses advanced static
> analysis
> techniques to automatically deobfuscate strings from malware binaries. You
> can
> use it just like strings.exe to enhance basic static analysis of unknown
> binaries.
> Rather than heavily protecting backdoors with hardcore packers, many malware
> authors evade heuristic detections by obfuscating only key portions of an
> executable. Often, these portions are strings and resources used to
> configure
> domains, files, and other artifacts of an infection. These key features will
> not
> show up as plaintext in output of the strings.exe utility that is commonly
> used
> during basic static analysis.
> 
> Maintainer: Remi Pointel <rpoin...@openbsd.org>
> 
> WWW: https://github.com/fireeye/flare-floss
> ---------------------------------
> 
> Ok?
> 
> Cheers,
> 
> Remi.


Reply via email to