Commit graph

194 commits

Author SHA1 Message Date
Cy Schubert
f9e42e587b Update 1.12 --> 1.12.1 2014-01-16 13:49:42 +00:00
Cy Schubert
da068efd24 Update krb5 to 1.12. Security/krb5 tracks MIT KRB5 current release.
Adjust the newly created krb5-maint with a new portname and conflicts.
Krb5-maint is a maintenance release for those who wish to use the previous
release of krb5. krb5-maint remains at 1.11.3.

Adjust CONFLICTS in security/heimdal and security/srp to account for the
newly repocopied krb5-maint.

Adjust security/Makefile to include krb5-maint.
2013-12-12 05:19:57 +00:00
Cy Schubert
8250beb020 pkg-plist fixup. 2013-12-11 20:50:17 +00:00
Cy Schubert
a8a9c98a14 Add LDAP support.
PR:		184557
Submitted by:	Erick Turnquist <jhujhiti@adjectivism.org>
2013-12-11 03:45:23 +00:00
Baptiste Daroussin
a65ed2e51b Add NO_STAGE all over the place in preparation for the staging support (cat: security) 2013-09-20 22:55:24 +00:00
Baptiste Daroussin
f56f112403 Convert to new perl framework
Convert USE_GMAKE to USES=gmake
2013-09-16 16:58:41 +00:00
Antoine Brodin
45ab3998d9 Add an empty directory created by the port to pkg-plist
Approved by:	portmgr (miwi)
2013-06-21 16:40:56 +00:00
Cy Schubert
fd0bfa7a6d Update krb5 1.11.2 --> 1.11.3.
This is a bugfix release.

* Fix a UDP ping-pong vulnerability in the kpasswd (password changing)
  service.  [CVE-2002-2443]

* Improve interoperability with some Windows native PKINIT clients.

Security:	CVE-2002-2443
2013-06-04 04:45:22 +00:00
Alex Kozlov
e159824929 - Convert USE_GETTEXT to USES (part 3)
Approved by:	portmgr (bapt)
2013-04-24 18:10:30 +00:00
Cy Schubert
9a7f529315 Update 1.11.1 --> 1.11.2
Major changes in 1.11.2 (2013-04-12)
====================================

This is a bugfix release.

* Incremental propagation could erroneously act as if a slave's
  database were current after the slave received a full dump that
  failed to load.

* gss_import_sec_context incorrectly set internal state that
  identifies whether an imported context is from an interposer
  mechanism or from the underlying mechanism.

Feature safe:	yes
2013-04-17 00:41:37 +00:00
Carlo Strub
f87124df63 - Remove A/An in COMMENT
- Trim Header where applicable
2013-03-29 19:33:41 +00:00
Cy Schubert
c886643ab6 Reset ulog if database load failed.
Avoids a slave reporting it is current when a full resync fails.

Obtained from:	https://github.com/rbasch/krb5/commit/2ef5ae0607d1c317a936e439b4be7a6f5184dc
2013-03-05 16:10:39 +00:00
Cy Schubert
2dcaa3f892 Update 1.11 --> 1.11.1.
Security:	Fix a null pointer dereference in the KDC PKINIT code [CVE-2013-1415].
2013-02-22 20:03:17 +00:00
Cy Schubert
ace0474fa7 Fix verto.h missing build error on some systems.
The following contributed by mandree@:
	- Header standardization.

	- Make use of OptionsNG.

	- Make portlint happy.
2013-01-24 14:15:26 +00:00
Cy Schubert
734550f60d Update 1.10.3 --> 1.11 2013-01-22 04:03:17 +00:00
Cy Schubert
823cac2328 Fix plist.
Feature safe:	yes
2012-11-04 02:10:49 +00:00
Cy Schubert
132c8dd868 Update krb5 1.9.2 --> 1.10.3
Feature safe:	yes
2012-11-03 18:59:37 +00:00
Cy Schubert
dac3936a56 Fix build of security/krb5 with clang.
PR:		169740
Submitted by:		Niclas Zeising <zeising@daemonic.se>
2012-07-09 19:20:09 +00:00
Dirk Meyer
2b74a89bc8 - update png to 1.5.10 2012-06-01 05:26:28 +00:00
Pav Lucistnik
ab747f70f6 - pointyhat kludge - tetex drags in port-OpenSSL on 7.X, but only as a build
dependency. Yet this triggers autodetection code in bsd.openssl.mk and
  OpenSSL dependency is registered with the resulting package, creating a
  discord between INDEX and actual package. Work around by explicitly recording
  the dependency in a way that INDEX build will see.

OK'ed by:	cy (maintainer)
Feature safe:	yes
2012-04-06 07:41:20 +00:00
Cy Schubert
4cb5bba3a9 PORTREVISION bump.
PR:		163272
Feature safe:	yes
2011-12-14 04:33:23 +00:00
Cy Schubert
9544f5eff2 Apply patch for MITKRB5-SA-2011-007, KDC null pointer dereference in TGS
handling.

PR:		163272
Submitted by:	zi
Security:	6c7d9a35-2608-11e1-89b4-001ec9578670
Feature safe:	yes
2011-12-14 04:31:21 +00:00
Cy Schubert
a564f94724 Update 1.9.1 --> 1.9.2. This is a bugfix release.
Feature safe:	yes
2011-11-16 20:38:49 +00:00
Cy Schubert
6fc815c911 Apply patch from MIT KRB5 GIT tree commit: 043533c2f13d2bc69316.
libgssrpc was ignorant of the remote address of the kadmin socket,
even when it's IPv4.  This made old-style GSSAPI authentication fail
because it uses the wrong channel bindings.  Fix this problem by making
clnttcp_create() get the remote address from the socket using getpeername()
if the caller doesn't provide it and it's an IPv4 address.

PR:		160500
Submitted by:	Ben Kaduk <kaduk@mit.edu>
2011-09-06 15:55:36 +00:00
Cy Schubert
fe6aa8f527 Update 1.9 --> 1.9.1.
PR:		158520
Submitted by:	Ryan Steinmetz <rpsfa@rit.edu>
2011-06-30 04:03:11 +00:00
Cy Schubert
a4eccde1aa Apply patch for MITKRB5-SA-2011-004, kadmind invalid pointer free()
[CVE-2011-0285]

Security:	MITKRB5-SA-2011-004, CVE-2011-0285
Feature safe:	yes
2011-04-14 00:39:25 +00:00
Cy Schubert
e95e6edcc1 Bump PORTREVISION. 2011-04-08 21:03:14 +00:00
Cy Schubert
b4f7af7927 Adjust krb5-config when $KRB5_HOME is specified. This will allow applications
linking aganst the MIT krb5 libraries to link using the correct ones.
2011-04-08 21:02:41 +00:00
Cy Schubert
3ed59e1a47 Apply patch for MITKRB5-SA-2011-003, KDC vulnerable to double-free when
PKINIT enabled.

Obtained from:	http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt
Security:	MITKRB5-SA-2011-003, CVE-2011-0284
Feature safe:	yes
2011-03-25 00:19:02 +00:00
Cy Schubert
2d5c97dc53 Apply fixes for kpropd denial of service (MITKRB5-SA-2011-001) and KDC
denial of service (MITKRB5-SA-2011-002).

Security:	MITKRB5-SA-2011-001 (CVE-2010-4022),
		MITKRB5-SA-2011-002 (CVE-2011-0281)
2011-02-11 01:04:09 +00:00
Cy Schubert
186a989ba9 Remove the OpenSSL port requirement. The base OpenSSL will work too.
Feature safe:	yes
2011-01-18 15:07:56 +00:00
Cy Schubert
4108064a78 Update from 1.8.3_2 to 1.9. 2010-12-23 01:04:41 +00:00
Ade Lovett
4a8684e352 Sync to new bsd.autotools.mk 2010-12-04 07:34:27 +00:00
Cy Schubert
13b6797ec5 Fix security vulnerabilities CVE-2010-1324, CVE-2010-1323, CVE-2010-4020,
CVE-2010-4021, and CVE-2010-1322.

PR:		152755
Submitted by:	wollman
Security:	CVE-2010-1324, CVE-2010-1323, CVE-2010-4020, CVE-2010-4021,
		and CVE-2010-1322.
Feature safe:	Yes
2010-12-02 02:09:23 +00:00
Cy Schubert
812ec0d220 Enable ksu DEBUG (-D) flag. 2010-11-04 04:37:36 +00:00
Cy Schubert
d17854089e Update to 1.8.3.
PR:		149299
Submitted by:	gwollman
2010-08-05 22:37:11 +00:00
Cy Schubert
524a2efde7 Apply patch for MIT KRB5 security vulnerability MITKRB5-SA-2010-005.
PR:		146939
Submitted by:	wollman
Security:	MIT krb5 Security Advisory 2010-005
2010-05-25 05:14:15 +00:00
Philip M. Gollucci
8e261ebb13 - No longer broken on -current b/c of utmpx changes
PR:             ports/146384
Submitted by:   pgollucci@ (myself), others
Approved by:    maintainer timeout (cy@, 16 days)
2010-05-24 00:01:05 +00:00
Cy Schubert
1a0ed7c73e Welcome the new krb5-1.8.1. Significant changes include the removal of
the MIT KRB5 applications (now in a separate tarball and port).
2010-04-26 03:48:43 +00:00
Cy Schubert
3c82bcd5d8 MFkrb5-17. 2010-04-26 03:23:08 +00:00
Pav Lucistnik
8ada9590ab - Mark BROKEN: does not compile
Reported by:	pointyhat
2010-04-14 20:21:10 +00:00
Dirk Meyer
de78af3ac5 - update to 1.4.1
Reviewed by:	exp8 run on pointyhat
Supported by:	miwi
2010-03-28 06:47:48 +00:00
Martin Wilke
92d0cbeefe - Mark BROKEN: fails to build with new utmpx
Reported by:	pointyhat
2010-03-17 06:51:26 +00:00
Dirk Meyer
ca9c60461c - update to jpeg-8 2010-02-05 11:46:55 +00:00
Cy Schubert
c318193ee2 Remove commented out option from a bygone era. 2009-10-13 21:37:19 +00:00
Cy Schubert
dff989f0d4 Remove redundant length check. 2009-08-28 20:02:01 +00:00
Jeremy Messenger
789d75c728 -Repocopy devel/libtool15 -> libtool22 and libltdl15 -> libltdl22.
-Update libtool and libltdl to 2.2.6a.
-Remove devel/libtool15 and devel/libltdl15.
-Fix ports build with libtool22/libltdl22.
-Bump ports that depend on libltdl22 due to shared library version change.
-Explain what to do update in the UPDATING.

It has been tested with GNOME2, XFCE4, KDE3, KDE4 and other many wm/desktop
and applications in the runtime.

With help:	marcus and kwm
Pointyhat-exp:	a few times by pav
Tested by:	pgollucci, "Romain Tartière" <romain@blogreen.org>, and
		a few MarcusCom CVS users. Also, I might have missed a few.
Repocopy by:	marcus
Approved by:	portmgr
2009-08-02 19:36:34 +00:00
Dirk Meyer
eca78ec61b - bump all port that indirectly depends on libjpeg and have not yet been bumped or updated
Requested by:	edwin
2009-07-31 13:57:52 +00:00
Cy Schubert
6d4aa839c8 Convert missing WANT_KRB5_DOC pieces.
Add HTML documentation OPTION knob.
2008-05-23 21:01:58 +00:00
Cy Schubert
f52aaf28df Implement OPTIONS menu.
Implement options that will allow the user to:

	- rename ftp and ftpd to kftp and kftpd
	- rename telnet and telnetd to ktelnet and ktelnetd
	- rename rlogin to krlogin
	- rename rsh to krsh
	- rename rcp to krcp

This avoids shadowing by or being shadowed by, depending on one's PATH,
system utilities of the same name.
2008-05-14 23:06:13 +00:00