           SPELL=portsentry
         VERSION=1.2
          SOURCE=$SPELL-$VERSION.tar.gz
SOURCE_DIRECTORY=$BUILD_DIRECTORY/${SPELL}_beta
   SOURCE_URL[0]=http://downloads.sourceforge.net/sourceforge/sentrytools/$SOURCE
   SOURCE_URL[1]=http://www.netsw.org/net/ip/audit/scanning/$SOURCE
        WEB_SITE=http://sourceforge.net/projects/sentrytools/
     SOURCE_HASH=sha512:bcbea576816c654a9e165897ea51de3a4dde2940b05e26e785315fae5a5c7a0f697abfa2ace14d16e687e4a26f37c75cdaffefa1c5f98681f858dda22bcf3dae
         ENTERED=20011210
         UPDATED=20030108
        KEYWORDS="security"
       BUILD_API=1
           SHORT="Portsentry is a program to detect and respond to port scans in real-time."
cat << EOF
Portsentry is a program designed to detect and respond to port scans 
against a target host in real-time.
PortSentry has a number of options to detect port scans, when it finds one it
can react in the following ways:

   - A log indicating the incident is made via syslog()
   - The target host is automatically dropped into /etc/hosts.deny
     for TCP Wrappers
   - The local host is automatically re-configured to route all
     traffic to the target to a dead host to make the target system
     disappear.
   - The local host is automatically re-configured to drop all
     packets from the target via a local packet filter.


The purpose of this is to give an admin a heads up that their host is
being probed.
EOF
