Commit graph

14500 commits

Author SHA1 Message Date
Brendan Fabeny
5c468d0bdd - update to 0.2.1.30 (also submitted
independently by J. Snabb)
- remove two problematic mirrors, and add others
- reduce the diff against tor-devel

PR:		155159
Approved by:	makc, miwi (mentors, implicit)
2011-03-01 19:15:12 +00:00
Rene Ladan
d2bd854287 Document Chromium versions 9.0.597.[84,94,107]
Obtained from:	http://googlechromereleases.blogspot.com/search/label/Stable%20updates
2011-03-01 18:15:39 +00:00
Sunpoet Po-Chuan Hsieh
0831f224ab - Update to 0.76
Changes:	http://search.cpan.org/dist/zxid/
2011-03-01 11:24:12 +00:00
Alexander Leidinger
252e481b40 Deprecate all non-default Fedora based linux_base respectively linux-fx-*
ports. All of them are End of Life (no security updates) since a loooong time.

As they are not the default, I decided to go with a short expiration date (one
month). The maintainer of the few ports which depend upon the f8 infrastructure
is informed to take action (update to the default f10 infrastructure, or to
deprecate).
2011-02-28 14:07:23 +00:00
Martin Wilke
67fe8efbed - Update to 1.5.0 2011-02-27 13:57:02 +00:00
Martin Wilke
3c2358f950 - Update to 0.0.5
PR:		155025
Submitted by:	Ruslan Mahmatkhanov <cvs-src@yandex.ru> (maintainer)
2011-02-27 13:09:23 +00:00
Martin Wilke
201d0c7d32 - Update to 0.2
PR:		155032
Submitted by:	Ruslan Mahmatkhanov <cvs-src@yandex.ru>
2011-02-27 13:06:45 +00:00
Martin Wilke
4964e2155a - Chase devel/google-perftools shlib bump 2011-02-27 13:01:19 +00:00
Johan van Selst
75788b150a Update libecc to 14.0 2011-02-27 10:17:14 +00:00
Thomas Abthorpe
73c7900f5b - Reassign ports to heap
Submitted by:	alepulver
2011-02-27 04:54:41 +00:00
Emanuel Haupt
5cee224d7b Include a patchset that solves a problem with phase2 re-keying. That is, when
phase2 lifetime (either in seconds or bytes) expires, then vpnc either silently
stops passing traffic or that plus consuming CPU time by running a tight loop.

This issue have experienced this issue on various platforms.

Example of a bug report:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496718

Bump PORTREVISION and while we're here remove MD5 sums.

Submitted by:   avg
Obtained from:  http://www.gossamer-threads.com/lists/vpnc/devel/3442, with
                slight adjustments to apply to our patchlevel by avg
2011-02-25 19:42:32 +00:00
Xin LI
c0da877e99 Add two OpenLDAP security by-pass vulnerabilities. 2011-02-25 18:39:16 +00:00
Brooks Davis
5e1bb82021 Chase nss revision and update to 3.12.9.
PR:		ports/154961
Submitted by:	Niclas Zeising
2011-02-25 17:19:01 +00:00
Johan van Selst
8a43efc266 - Update GNU SASL to version 1.6.0
- This includes shlib bump
- Grab maintainership
2011-02-25 14:06:15 +00:00
Matthias Andree
81da014c29 Fix broken linux-sun-jdk vulndb entries.
VuXML:		18e5428f-ae7c-11d9-837d-000e0c2e438a
VuXML:		c93e4d41-75c5-11dc-b903-0016179b2dd5
PR:		ports/154918
2011-02-25 14:01:14 +00:00
Martin Wilke
3e8d73e14d - Part 1 of python24 removal
- Clean up bsd.python.mk (remove PYWSGIREF, PYHASHLIB, PYCTYPES and PYEXPAT) all these is now part of python
	  since python25

Remove:
	textproc/py-expat
	devel/py-ctypes
	security/py-hashlib
	www/py-wsgiref
2011-02-25 09:46:39 +00:00
Martin Wilke
3fc2da5cbc - Get rid (RUN|BUILD) PYCTYPES since py25 is default in python 2011-02-25 08:46:07 +00:00
Ade Lovett
e0d39220da Update to libtool 2.4
Tested by:	pav (multiple -exp runs)
2011-02-25 06:15:44 +00:00
Martin Wilke
729d9d232f - Move over to py25 or above
- While here get rid FreeBSD 6.X and md5 support
2011-02-25 03:19:29 +00:00
Xin LI
03b42818c9 Chase after net/openldap24-server update.
Reminded by:	miwi
2011-02-25 01:32:17 +00:00
Dirk Meyer
40161454f3 - update to 0.14.1 2011-02-24 13:49:49 +00:00
Roman Bogorodskiy
c09ac60c23 Update to 2.11.6. 2011-02-23 19:05:33 +00:00
Wesley Shields
5b5cf8e237 Add CONFLICTS_INSTALL on audio/csound. There is a PR to update audio/csound
to 5.13 and I've asked miwi@ to add the conflict when he does the update.

While here drop MD5 from distinfo.

Submitted by:	atom@smasher.org
2011-02-23 17:49:41 +00:00
Renato Botelho
77b710064d - Update to 20110223
- Align with clamav port new option to use llvm from ports
2011-02-23 15:32:46 +00:00
Renato Botelho
3254e6b917 Add a new option to build JIT bytecode compiler using llvm installed from ports
instead of build clamav's own llvm. The option is off by default, so, no
PORTREVISION bum is required

PR:		ports/154900
Submitted by:	Denny Lin <dennylin93@hs.ntnu.edu.tw>
2011-02-23 15:14:35 +00:00
Martin Wilke
aaf8e0c47c - Cleanup previous entry 2011-02-23 14:43:41 +00:00
Florian Smeets
8b5a0e6344 - add asterisk -- Exploitable Stack and Heap Array Overflows 2011-02-22 21:30:18 +00:00
Renato Botelho
eb8d173c48 Fix detection if python was built with threads support and run make check
accordingly

PR:		ports/154848
Submitted by:	Martin Simmons <martin@lispworks.com>
2011-02-21 11:35:52 +00:00
Cheng-Lung Sung
b5b9e94db8 - Update to 2.0.24 2011-02-20 11:32:58 +00:00
Xin LI
4443818f1f Document PivotX administrator password reset vulnerability. 2011-02-20 05:04:28 +00:00
Martin Wilke
a9d926beb4 - Update to 3.5.1
PR:		154588
Submitted by:	Cezary Morga <cm@therek.net>
Approved by:	maintainer timeout
2011-02-19 12:49:34 +00:00
Wesley Shields
c3765ac8e1 Apply two patches:
- Fix build when --enable-dynamicplugins is not given to configure. [1]
- Fix a segfault in HttpInspect

PR:		ports/154868
Submitted by:	Dean Freeman <wfreeman@sourcefire.com> (maintainer)
		[1]: Michael Scheidell
2011-02-18 20:06:36 +00:00
Wen Heping
8c6e637343 - Update to 0.5.29 2011-02-17 03:25:42 +00:00
Thomas Abthorpe
7387137ea8 Reassign ports to the pool, thanks for your service, we hope to see you
back.
2011-02-16 03:46:50 +00:00
Martin Wilke
9fb10a5d3e - Update lastest tomcat entry (tomcat6/7 have the same problem)
Note: Please ask for review at ports-security@  THX!
2011-02-15 08:18:21 +00:00
Wen Heping
b6bcb75050 - Document tomcat vulnerability 2011-02-15 08:00:38 +00:00
Johan van Selst
8e72fed5ce - Update libecc 0.13.0
- Includes shlib bump
2011-02-14 22:01:30 +00:00
Pav Lucistnik
0b40fb1da6 - Remove stray cmd from plist that created bogus file on pkg_add
Reported by:	pointyhat
2011-02-13 22:17:19 +00:00
Olli Hauer
997592b8db - fix leftover if APACHE_VERSION > 13
PR:		ports/147009
2011-02-13 22:06:37 +00:00
Olli Hauer
8d8c954d31 - update to version 5.51
Nmap 5.51 [2011-02-11]

o [Ndiff] Added support for prerule and postrule scripts. [David]

o [NSE] Fixed a bug which caused some NSE scripts to fail due to the
  absence of the NSE SCRIPT_NAME environment variable when loaded.
  Michael Pattrick reported the problem. [Djalal]

o [Zenmap] Selecting one of the scan targets in the left pane is
  supposed to jump to that host in the Nmap Output in the right pane
  (but it wasn't).  Brian Krebs reported this bug. [David]

o Fixed an obscure bug in Windows interface matching. If the MAC
  address of an interface couldn't be retrieved, it might have been
  used instead of the correct interface. Alexander Khodyrev reported
  the problem.  [David]

o [NSE] Fixed portrules in dns-zone-transfer and ftp-proftpd-backdoor
  that used shortport functions incorrectly and always returned
  true. [Jost Krieger]

o [Ndiff] Fixed ndiff.dtd to include two elements that can be diffed:
  status and address. [Daniel Miller]

o [Ndiff] Fixed the ordering of hostscript-related elements in XML
  output. [Daniel Miller]

o [NSE] Fixed a bug in the nrpe-enum script that would make it run for
  every port (when it was selected--it isn't by default).  Daniel
  Miller reported the bug. [Patrick]

o [NSE] When an NSE script sets a negative socket timeout, it now
  causes a controlled Lua stack trace instead of a fatal error.
  Vlatko Kosturjak reported the bug. [David]

o [Zenmap] Worked around an error that caused the py2app bootstrap
  executable to be non-universal even when the rest of the application
  was universal. This prevented the binary .dmg from working on
  PowerPC. Yxynaxen reported the problem. [David]

o [Ndiff] Fixed an output line that wasn't being redirected to a file
  when all other output was. [Daniel Miller]
2011-02-13 19:36:36 +00:00
Alexey Dokuchaev
616b037062 - Update jumbo patch to version 11
- Add LICENSE (GPLv2)
2011-02-13 14:12:21 +00:00
Sahil Tandon
034342f190 Expand the range of supported Python versions and
pacify portlint(1).

PR:		ports/154374
Submitted by:	Jase Thew <freebsd@beardz.net>
Approved by:	maintainer timeout
2011-02-13 07:01:53 +00:00
Frederic Culot
e74b252d55 - Update to 5.7
Changes:	http://squidclamav.darold.net/news.html
PR:		ports/154691
Submitted by:	Laurent Levier <llevier AT argosnet.com> (maintainer)
2011-02-12 09:38:53 +00:00
Andrej Zverev
85b13ac345 Fix WWW in pkg-descr to http://search.cpan.org/dist/<MODULE> for unification.
No functional changes.

Sponsored by:	p5 namespace
2011-02-12 09:30:23 +00:00
Xin LI
57763c8ea6 Document two phpMyAdmin vulnerabilities. 2011-02-11 22:23:47 +00:00
Juergen Lock
4edd8ea987 Update to 10.2r152.
PR:		ports/154630
Submitted by:	Tsurutani Naoki <turutani@scphys.kyoto-u.ac.jp>
Security:	http://www.freebsd.org/ports/portaudit/4a3482da-3624-11e0-b995-001b2134ef46.html
Feature safe:	yes
2011-02-11 21:39:03 +00:00
Xin LI
802d02a1b7 Document mupdf PDF handling remote code execution vulnerability.
Submitted by:	Tim Zingelman <tez netbsd.org>
2011-02-11 19:59:48 +00:00
Xin LI
7adbdc82a2 Document rubygem-mail Remote Arbitrary Shell Command Injection Vulnerability.
Submitted by:	Tim Zingelman <tez netbsd.org>
2011-02-11 19:51:20 +00:00
Xin LI
7fb7de0219 Document plone remote security bypass vulnerability.
Submitted by:	Tim Zingelman <tez netbsd.org>
2011-02-11 19:48:03 +00:00
Xin LI
daf58256ad Document exim local privilege escalasion vulnerability.
Submitted by:	Tim Zingelman <tez netbsd.org>
2011-02-11 19:40:12 +00:00
Xin LI
5664bbedc9 Document OpenOffice multiple vulnerabilities.
Submitted by:	Tim Zingelman <tez netbsd.org>
2011-02-11 19:36:45 +00:00
Brooks Davis
7eeab3d6e6 Update to 2.2.2
PR:		ports/154568
Submitted by:	Ruslan Mahmatkhanov
2011-02-11 18:12:28 +00:00
Sunpoet Po-Chuan Hsieh
846198cc68 - Update MAINTAINER address 2011-02-11 08:27:24 +00:00
Sunpoet Po-Chuan Hsieh
058c615405 - Update to 2.9.0.4
- Update snortsam checksum
- Fix LIBNET_CONFIG issue
- Pet portlint

Changes:	http://www.snort.org/downloads/740
PR:		ports/154668
Submitted by:	Dean Freeman <wfreeman@sourcefire.com> (maintainer)
2011-02-11 08:01:39 +00:00
Cy Schubert
2d5c97dc53 Apply fixes for kpropd denial of service (MITKRB5-SA-2011-001) and KDC
denial of service (MITKRB5-SA-2011-002).

Security:	MITKRB5-SA-2011-001 (CVE-2010-4022),
		MITKRB5-SA-2011-002 (CVE-2011-0281)
2011-02-11 01:04:09 +00:00
Dirk Meyer
74bfc0300e - Security update to 1.0.0d
Security: http://openssl.org/news/secadv_20110208.txt
Security: CVE-2011-0014
Feature safe:	yes
2011-02-10 18:30:34 +00:00
Martin Wilke
4f067e03ce - Cleanup previous commit 2011-02-10 16:44:00 +00:00
Koop Mast
f089b1925b Document multiple webkit-gtk2 security vulnabilities, fixed in 1.2.7. 2011-02-10 10:41:58 +00:00
Peter Pentchev
5bafc9702d Update to stunnel-4.35:
- drop the transparent proxying patch, integrated upstream
- while I'm here, fix the very first master site URL -
  the download page on stunnel.org just links to the sites now,
  and does not contain downloadable source

PR:		154631
Submitted by:	Tsurutani Naoki <turutani@scphys.kyoto-u.ac.jp>
2011-02-10 09:34:59 +00:00
Xin LI
1683ca14df Document awstat multiple vulnerability.
Notified by:    Tim Zingelman <tez netbsd.org>
2011-02-10 00:44:26 +00:00
Xin LI
8df64b351b Document Opera multiple vulnerabilities.
Notified by:	Tim Zingelman <tez netbsd.org>
2011-02-10 00:28:17 +00:00
Xin LI
6054a2050b Document multiple vulnerabilities in Django.
Notified by:	Jesco Freund <jesco.freund my-universe.com>
2011-02-09 21:37:55 +00:00
Cheng-Lung Sung
26212e8cb3 - Update to 2.9.0.3 [1]
- pass maintainership to William Freeman <wfreeman_AT_sourcefire dot com>

Note: This attached patch replaces the one in ports/153998.
      Also fixes the location of the dynamic libs/rules in ports/153224.
PR:		ports/154514 [1], ports/153998 [2]
Submitted by:	Michael Scheidell <scheidell_AT_secnap dot net>
2011-02-09 06:50:03 +00:00
Cy Schubert
fd14e293b5 Update 4.1.2 --> 4.1.3 2011-02-09 05:51:54 +00:00
Martin Wilke
1f309f19b4 - S/seriuos/serious 2011-02-09 05:36:33 +00:00
Martin Wilke
1b8421c704 - Document mediawiki - multiple vulnerabilites 2011-02-09 05:23:00 +00:00
Martin Wilke
9295de19b6 - Add chinese/wordpress-zh_CN and chinese/wordpress-zh_TW to the previous wordpress entry 2011-02-09 04:53:12 +00:00
Renato Botelho
2640092f35 Update to 0.97
Feature safe:	yes
2011-02-08 12:13:53 +00:00
Doug Barton
4cf0626f6b Version 2.0.17 was released on 2011-01-13:
What's New
===========
* Allow more hash algorithms with the OpenPGP v2 card.
* The gpg-agent now tests for a new gpg-agent.conf on a HUP.
* Fixed output of "gpgconf --check-options".
* Fixed a bug where Scdaemon sends a signal to Gpg-agent running in
  non-daemon mode.
* Fixed TTY management for pinentries and session variable update
  problem.
* Minor bug fixes.

For the port:
Camellia stopped being a configure option in 2.0.12
Fix minor typo for GPGSM OPTION
Minor plist update for 2.0.17

files/patch-keybox-blob.c seems to be no longer needed [2]

PR:		ports/153984
Submitted by:	me
Submitted by:	Hirohisa Yamaguchi <umq@ueo.co.jp> [2]
Approved by:	maintainer timeout (24 days)
Feature safe:	yes
2011-02-08 03:40:15 +00:00
Hajimu UMEMOTO
1c2c5282c5 Try to fix GSSAPI when using heimdal from ports.
Submitted by:	Graham Todd <gtodd__at__bellanet.org>
Feature safe:	yes
2011-02-06 08:00:08 +00:00
Hajimu UMEMOTO
cba09ab3e5 Backout previous commit.
Unfortunately, it broke GSSAPI when using heimdal in base.
I have no idea how to detect whether heimdal is in base or
from ports, now.

Feature safe:	yes
2011-02-06 07:41:12 +00:00
Martin Wilke
85c93697cb - Use GOOGLE_CODE/LOCAL macro
PR:		153113
Submitted by:	Sunpoet Po-Chuan Hsieh <sunpoet@FreeBSD.org>
Approved by:	maintainer timeout
Feature safe:	yes
2011-02-05 11:19:28 +00:00
Martin Wilke
da3e156fec * Fix GSSAPI when using heimdal from ports
PR:		152071
Submitted by:	Joerg Pulz <Joerg.Pulz@frm2.tum.de>
Approved by:	maintainer timeout
Feature safe:	yes
2011-02-05 06:55:32 +00:00
Martin Wilke
b7e4515267 - While here drop MD5 Support
Feature safe:	yes
2011-02-05 04:37:18 +00:00
Martin Wilke
3fdaa0b9fa - Add entry for wordpress - SQL injection vulnerability
PR:		153526
Submitted by:	Mark Foster <mark@foster.cc>
Feature safe:	yes
2011-02-05 04:36:36 +00:00
Doug Barton
ff29495b22 Remove former maintainer from pkg-desr at their request
Feature safe:	yes
2011-02-05 01:08:40 +00:00
Renato Botelho
dbe7a76658 Update to 20110204
Feature safe:	yes
2011-02-04 16:28:43 +00:00
Martin Wilke
4f42a45ecc - Cleanup previous commit
Feature safe:	yes
2011-02-02 23:51:54 +00:00
Koop Mast
7d33cb0f6d Add vlc - Insufficient input validation in MKV demuxer vulnability.
Feature safe:	yes
2011-02-02 15:45:11 +00:00
Roman Bogorodskiy
018c1efc98 Update to 2.11.5.
PR:		154137 (based on)
Submitted by:	Fumiyuki Shimizu <fumifumi@abacustech.jp>
Feature safe:	yes
2011-01-31 18:55:59 +00:00
Martin Wilke
97de1995af - Cleanup previous Entry
Feature safe:	yes
2011-01-31 14:02:34 +00:00
Bernhard Froehlich
6036842338 - Document maradns -- denial of service when resolving a long DNS hostname
Submitted by:	n j <nino80 at gmail dot com>
Feature safe:	yes
2011-01-31 09:47:54 +00:00
Olli Hauer
83cb0309a2 - update barnyard2 to version 2.1.9
Changes:
 2010-12-27 - Barnyard 2.1.9
   [*] Additions
      * spo_database. Support of encrypted connections to postgresql is now
        available. See README.database for the appropriate options.

      * spo_sguil. Fixed issue with duplication of alerts.

   [*] Improvements

      * spooler. Fixed issue with borking when reading unrecognised records.
        There is now sufficient information to skip and move on.

      * spooler. Fixed early termination of non-readable files, causing the
        dreaded SEGFAULT.

      * classifications. Tweaked output for classification identification if the
        appropriate node can't be found.

PR:		ports/154400
Submitted by:	Paul Schmehl <pauls _at_ utdallas.edu> (maintainer)
Feature safe:	yes
2011-01-31 01:17:36 +00:00
Olli Hauer
0813236ffa - update to version 5.50
- always enable bpf in libdnet-stripped to support build in Jail [1]

Announcement and Changelog are very long and covered by last updates.

Announcement: http://seclists.org/nmap-hackers/2011/0
Changelog: http://nmap.org/changelog.html

PR:		ports/154353 [1]
Submitted by:	Mars G Miro <spry _at_ anarchy.in.the.ph> [1]
Feature safe:	yes
2011-01-30 17:15:07 +00:00
Martin Wilke
ac1cb23d59 bcrypt() is a sophisticated and secure hash algorithm designed by The OpenBSD
project for hashing passwords. bcrypt-ruby provides a simple, humane wrapper
for safely handling passwords.

WWW: http://rubygems.org/gems/bcrypt-ruby

PR:		ports/153965
Submitted by:	Jason Helfman <jhelfman at experts-exchange.com>
Feature safe:	yes
2011-01-30 12:08:25 +00:00
Martin Wilke
344c7ae7b6 - Update to 1.2
PR:		153611
Submitted by:	Yoshisato YANAGISAWA <osho@pcc-software.org> (maintainer)
Feature safe:	yes
2011-01-30 12:08:14 +00:00
Martin Wilke
281a97f4c5 - Update to 0.96
PR:		154079
Submitted by:	Uffe Jakobsen <uffe@uffe.org> (Maintainer)
Feature safe:	yes
2011-01-29 14:28:38 +00:00
Brendan Fabeny
1b897f9223 - Remove an unnecessary addition to CPPFLAGS
that can break non-sandboxed builds when
  some other (poorly-configured) ports are
  installed (For example, lang/libutils or
  textproc/irstlm)
- Remove a problematic mirror, based on
  distilator results

Approved by:	makc, miwi (mentors, implicit)
Feature safe:	yes
2011-01-29 11:27:54 +00:00
Brendan Fabeny
8b824bd56c - Update to 0.2.2.22-alpha
- Remove an unnecessary addition to CPPFLAGS
  that can break non-sandboxed builds when
  some other (poorly-configured) ports are
  installed (For example, lang/libutils or
  textproc/irstlm)
- Remove a problematic mirror, based on
  distilator results

Approved by:	makc, miwi (mentors, implicit)
Feature safe:	yes
2011-01-29 10:55:21 +00:00
Wesley Shields
3377432a65 Adjust range for ISC DHCPv6 server crash.
Feature safe:	yes
2011-01-29 00:23:19 +00:00
Wesley Shields
bf7d233ce8 Document ISC DHCPv6 server crash.
Feature safe:	yes
2011-01-29 00:15:09 +00:00
Xin LI
7e4d1a3af0 crypto++ assumes that the as(1) in PATH is the one used by c++(1),
which is not always true.  When PATH is being configured to a
non-standard sequence, we may found an as(1) newer than the base
one and draw wrong conclusion which leads to failed builds.

Use the result given by c++.  This is also accepted to upstream.

PR:			ports/154325
Submitted by:		swell.k gmail.com
Feature safe:		yes
2011-01-27 20:47:30 +00:00
Alexander Logvinov
0bf09d8ebd - Update to 0.4.8
- Remove BSD license, this library is distributed under LGPL21 license

Feature safe:	yes
2011-01-27 09:36:41 +00:00
Beat Gaetzi
b42fbb8b4f - Add tk-wrapper as run dependency to fix execution of gorilla script
PR:		ports/153706
Reported by:	Aldis Berjoza <aldis AT bsdroot.lv>
Submitted by:	Chris Rees <utisoft AT gmail.com> (maintainer)
Feature safe:	yes
2011-01-26 21:12:02 +00:00
Pav Lucistnik
3cccd3e66c - Update to 0.2.5
PR:		ports/153912
Submitted by:	Ruslan Mahmatkhanov <cvs-src@yandex.ru>
Approved by:	maintainer timeout (15 days)
Feature safe:	yes
2011-01-26 12:11:13 +00:00
Pav Lucistnik
826426c946 - Update to 1.2.11
PR:		ports/153911
Submitted by:	Ruslan Mahmatkhanov <cvs-src@yandex.ru>
Approved by:	maintainer timeout (15 days)
Feature safe:	yes
2011-01-26 12:04:42 +00:00
Renato Botelho
98c5b4f39f Restrict LLVM to i386 and amd64 since it doesn't build on sparc64, ia64 and
probably on ppc

Submitted by:	Anton Shterenlikht <mexas@bristol.ac.uk>
Feature safe:	yes
2011-01-26 11:04:40 +00:00
Josh Paetzel
0b827a1f4a Update to week 4 snapshot
PR:	ports/154296
Submitted by:	Eric F Crist <ecrist@secure-computing.net>
Feature safe:	yes
Sponsored by:	ClaimLynx, Inc
2011-01-25 23:31:23 +00:00
Gabor Kovesdan
1ab85b998e - Turn IPV6 support on by default
- Bump PORTREVISION

Requested by:	dougb, delphij
Feature safe:	yes
2011-01-25 23:24:03 +00:00
Emanuel Haupt
ce1197e105 Add LICENSE and remove MD5 sums.
Feature safe:	yes
2011-01-25 19:59:40 +00:00