2019-02-15 dns/p5-pgeodns: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 ftp/proftpd-mod_geoip: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 net/go-geoip: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 net/py-GeoIP: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 net/pecl-geoip: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 net/pen: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 net/subnetcalc: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 net/p5-Geo-IP: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 net/rubygem-geoip: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 security/sguil: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 devel/go-sql-driver: Go source should not be packaged
2019-02-15 devel/geoip-java: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 dns/go-geodns: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
Flamethrower is a small, fast, configurable tool for functional
testing, benchmarking, and stress testing DNS servers and networks.
It supports IPv4, IPv6, UDP and TCP, and has a modular system for
generating queries used in the tests.
It was built as an alternative to dnsperf, and many of the command
line options are compatible.
WWW: https://github.com/DNS-OARC/flamethrower
PR: 235521
Submitted by: Leo Vandewoestijne <freebsd@dns.company>
- This keeps the port name aligned with the project name
Approved by: araujo (mentor), miwi (mentor)
Differential Revision: https://reviews.freebsd.org/D18959
Installing current DNSSEC (NSEC3) exposes private DNS data to low-cost
DNS database espionage. The nsec3walker tool allows administrators and users
to see how much private information is being given away by DNSSEC.
WWW: https://dnscurve.org/nsec3walker.html
PR: 215995
Submitted by: Piotr Kubaj <pkubaj@anongoth.pl>
2018-12-31 net/libsrtp: Superseded by libsrtp2
2018-12-31 x11-toolkits/wlc: Deprecated upstream
2018-12-31 japanese/spamassassin: does not build
2018-12-31 www/spdylay: SPDY is deprecated, use HTTP/2 instead
2018-12-31 www/moodle33: Upstream no longer maintained
2018-12-31 security/krb5-114: EOL twelve months after release of krb5-1.16
2018-12-31 databases/mongodb32: EOL upstream since September 2018
2018-12-31 databases/mongodb32-tools: EOL upstream since September 2018
2018-12-31 audio/creox: Qt4 has been EOL since december 2015
2018-12-31 audio/terminatorx: Unmaintained, broken too often
2018-12-31 audio/shoutcast: Upstream vendor no longer provides releases
2018-12-31 dns/powerdns-recursor40: FreeBSD 10.3 has reached EoL since 2018-04-30; users should upgrade and use dns/powerdns-recursor instead
2018-12-31 sysutils/ataidle: obsoleted by camcontrol(8)
2018-12-31 sysutils/syslog-ng37: No longer officially supported by Balabit, does not support openssl111
2018-12-31 sysutils/cfengine22: No longeer supported by cfengine.com
2018-12-31 sysutils/syslog-ng36: No longer officially supported by Balabit, does not support openssl111
This port allows to install only libknot, which comes along with
Knot DNS (authoritative), but also is a depency of knot-resolver
WWW: https://www.knot-dns.cz/
PR: 233165 (with minor changes to dns/knot2)
Submitted by: Leo Vandewoestijne <freebsd@dns.company> (dns/knot2 maintainer)
localzone is a low-calorie library for managing DNS zones.
Features:
- A simple API focused on managing resource records in local zone files
- Support for almost all resource record types
- Auto-save and auto-serial
- Built for automation
WWW: https://github.com/ags-slc/localzone
Public Suffix List parser implementation for Python.
- Compliant with TEST DATA
- Support IDN (unicode or punycoded).
- Support Python 2.5+ and Python 3.x
- Shipped with built-in PSL and the updater script.
- Written in Pure Python. No library dependencies.
WWW: https://github.com/ko-zu/psl
This is a shell script to update Namesilo's DNS record when IP changed.
Set to run this script as cronjob in your system.
WWW: https://github.com/crees/namesilo_ddns
GeoDNS is a DNS server with per-client targeted responses. It powers the NTP
Pool system and other similar services.
WWW: https://github.com/abh/geodns
PR: 227492
Submitted by: Vinicius Zavam <egypcio@googlemail.com>
Differential Revision: https://reviews.freebsd.org/D15056
KadNode is a small decentralized DNS resolver that can use existing
public key infrastructures. It utilizes the BitTorrent P2P network
and mbedtls for TLS/crypto support.
WWW: https://github.com/mwarning/KadNode
PR: 225924
Submitted by: moritzwarning@web.de
A flexible DNS proxy, with support for modern encrypted DNS protocols such as
DNSCrypt v2 and DNS-over-HTTP/2.
WWW: https://github.com/jedisct1/dnscrypt-proxy
Without a repocopy because it's a new port, rewritten from scratch.
PR: 225821
Submitted by: Vinícius Zavam <egypcio@googlemail.com>
Differential Revision: https://reviews.freebsd.org/D14319
DSC (originally developed by The Measurement Factory and now developed
by DNS-OARC) is a system for collecting and exploring statistics from
busy DNS servers. It uses a distributed architecture with collectors
running on or near nameservers sending their data to one or more
central presenters for display and archiving. Collectors use pcap to
sniff network traffic. They transmit aggregated data to the presenter
as XML data. dsc is configurable to allow the administrator to capture
any kind of data that he or she chooses.
WWW: https://www.dns-oarc.net/dsc/
PR: 226631
Submitted by: Leo Vandewoestijne <freebsd@dns.company>
DNS Statistics Presenter (DSP) is a tool used
for exploring statistics from busy DNS servers
collected by DNS Statistics Collector (DSC).
WWW: https://www.dns-oarc.net/dsc/
PR: 226630
Submitted by: Leo Vandewoestijne <freebsd@dns.company>
Perl Library to extract and graph DNS Statistics Collector (DSC) data
DNS Statistics Presenter (DSP) is a tool used for exploring statistics
from busy DNS servers collected by DNS Statistics Collector (DSC).
This is the Perl library that is used to extract and graph DSC data.
WWW: https://www.dns-oarc.net/dsc/
PR: 226629
Submitted by: Leo Vandewoestijne <freebsd@dns.company>
This is a pure C program that accesses the DNSDB API server at Farsight
Security. An API key is required for operation. The command syntax was
inspired by a python script called dnsdb_query, but significant departure
has occured, largely inspired by a modern understanding of "time fencing"
and a desire for new features such as CSV output and JSON reprocessing.
Sponsored by: Farsight Security, Inc.
2017-12-31 security/gnupg20: Will reach EOL upstream on 2017-12-31
2018-01-01 dns/dualserver: Please migrate to dns/dnsmasq. Over the years dualserver becomes unmaintenaible.
2018-01-01 devel/p5-Parse-Pidl44: yes
2018-01-01 sysutils/DTraceToolkit: Now maintained as part of the base system
FreeBSD 10.3 and below doesn't support __cxa_thread_atexit() in
libc, which is required for building PowerDNS Recursor 4.1.0.
This new port follows the 4.0.x branch, which has no such
requirement.
PR: 224297
Submitted by: tremere@cainites.net
Approved by: mat
Differential Revision: https://reviews.freebsd.org/D13540
dynip is a daemon that monitors your host system ISP assigned dynamic IP
address. If it changes, dynip automatically updates the dynamic DNS IP
address at your dynamic DNS hosting provider then posts an informational
message to the host system log followed by sending an informational email
to user root.
The dynip daemon and the daily script are very simple Bourne Shell type
scripts containing self documenting embedded comments. They use the
"fetch" command to issue the standard browser style URL format used by
most dynamic DNS hosting providers for the purpose of actual updating
the registered IP address with the new IP address. There are some small
variations in the URL format depending on the dynamic DNS hosting
provider being used.
Mandatory requirements. The host that is running dynip "MUST" be cabled
directly to the ISP modem and be using the public routable dynamic IP
address assigned by the ISP.
Includes templates for these dynamic DNS hosting providers
namecheap.com
freedns.afraid.org
changeip.com
no-ip.com
zoneedit.com
easydns.com
and is simple to configure for other providers that use a variation
of the URL format.
WWW: http://dynip.sourceforge.net/
PR: 224329
Submitted by: Joe Barbish
Ports using USE_PYTHON=distutils are now flavored. They will
automatically get flavors (py27, py34, py35, py36) depending on what
versions they support.
There is also a USE_PYTHON=flavors for ports that do not use distutils
but need FLAVORS to be set. A USE_PYTHON=noflavors can be set if
using distutils but flavors are not wanted.
A new USE_PYTHON=optsuffix that will add PYTHON_PKGNAMESUFFIX has been
added to cope with Python ports that did not have the Python
PKGNAMEPREFIX but are flavored.
USES=python now also exports a PY_FLAVOR variable that contains the
current python flavor. It can be used in dependency lines when the
port itself is not python flavored. For example, deskutils/calibre.
By default, all the flavors are generated. To only generate flavors
for the versions in PYTHON2_DEFAULT and PYTHON3_DEFAULT, define
BUILD_DEFAULT_PYTHON_FLAVORS in your make.conf.
In all the ports with Python dependencies, the *_DEPENDS entries MUST
end with the flavor so that the framework knows which to build/use.
This is done by appending '@${PY_FLAVOR}' after the origin (or
@${FLAVOR} if in a Python module with Python flavors, as the content
will be the same). For example:
RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}six>0:devel/py-six@${PY_FLAVOR}
PR: 223071
Reviewed by: portmgr, python
Sponsored by: Absolight
Differential Revision: https://reviews.freebsd.org/D12464
dns2blackhole is a set of Bourne Shell csh scripts that fetch host files
from public host file providers that contain the FQDN [ Fully Qualified
Domain Names ] of sites that fall into the following categories, adware,
malware, exploit, hijackers, harvesters, tracking, phishing, fake news,
fraud, spam, sex, porn, gambling, advertisements, misleading marketing,
illegal pharmacy, warez/piracy and others. The output of the dns2blackhole
scripts is fed directly into the ports/package versions of unbound, named,
and dnsmask DNS servers to block those FQDN thus protecting user
devices from being compromised or bothered seeing things of no interest.
The base built-in version of unbound titled "local_unbound" can also be
configured to work using the dns2blackhole method. This black hole method
is another layer of protection that you can customize to your needs.
WWW: http://dns2blackhole.sourceforge.net/
PR: 222805
Submitted by: joeb1@a1poweruser.com
Net::LibIDN2 provides bindings for GNU Libidn2, a C library for handling
internationalized domain names based on IDNA 2008, Punycode and TR46.
WWW: http://search.cpan.org/dist/Net-LibIDN2/