===========================================================================
$NetBSD: MESSAGE,v 1.4 2008/01/13 22:31:25 rillig Exp $

You may wish to have the vulnerabilities file downloaded daily so that
it remains current.  This may be done by adding an appropriate entry
to a user's crontab(5) entry.  For example the entry

# download vulnerabilities file
0 3 * * * /usr/pkg/sbin/download-vulnerability-list >/dev/null 2>&1

will update the vulnerability list every day at 3AM. You may wish to do
this more often than once a day.

In addition, you may wish to run the package audit from the daily
security script.  This may be accomplished by adding the following
lines to /etc/security.local

if [ -x /usr/pkg/sbin/audit-packages ]; then
        /usr/pkg/sbin/audit-packages
fi

Alternatively this can also be acomplished by adding an entry to a user's
crontab(5) file. e.g.:

# run audit-packages
0 3 * * * /usr/pkg/sbin/audit-packages

audit-packages and/or download-vulnerability-list need not be run by
the root user.  They will function as an unprivileged user, as long
as the user chosen has permission to write the pkg-vulnerabilites
to /var/db/pkg.

A sample audit-packages.conf has been installed to:

	/usr/pkg/share/examples/pkg_install/audit-packages.conf

You may want to customise this file and copy it to
/usr/pkg/etc/audit-packages.conf.
If you want to use signature verification you will need to install GnuPG and
set the path for GPG appropriately in your audit-packages.conf.  See
audit-packages.conf(5) and audit-packages(8) for further information.
===========================================================================
