- Do not install duplicate sample config files
- Do not bump PORTREVISION
PR: ports/165800 [1]
Submitted by: Michael Scheidell <scheidell@FreeBSD.org> [1]
Feature safe: yes
- install license via LICENSE framework, not manually
- strict python versions
- drop py-psyco dependency (also suggested at [1]), because it will work
only with python < 2.6 (EOL versions only)
PR: 165902 [1]
Submitted by: antoine [1]
Feature safe: yes
- Do not install duplicate sample config files
- Do not bump PORTREVISION
PR: ports/165800 [1]
Submitted by: Michael Scheidell <scheidell@FreeBSD.org> [1]
Feature safe: yes
small snippet from changelog:
http://nmap.org/changelog.html
o Integrated all of your IPv4 OS fingerprint submissions since June 2011 (about 1,900 of them)
Added about 256 new fingerprints (total 3,572)
o Integrated all of your service/version detection fingerprints submitted since November 2010
(signature count increased to 7,423)
o Integrated your latest IPv6 OS submissions and corrections
o [NSE] Added 43(!) NSE scripts, bringing the total up to 340
o [NSE] Added 14 new protocol libraries
o [CPE] (Common Platform Enumeration) OS classification is now supported for IPv6 OS detection
o Added a new --script-args-file option
o [NSE] Added support for decoding EIGRP broadcasts from Cisco routers to broadcast-listener
o [NSE] Added redirect support to the http library
o Update to the latest MAC address prefix assignments from IEEE as of March 8, 2012
Test builds sponsored by redports.org
Feature safe: yes
- Remove conditionals for PERL_LEVEL < 501200
- Remove regression-test targets b/c this will be centralized in Mk/bsd.perl.mk
- Other minor cleanups
RUN_DEPENDS = ${BUILD_DEPENDS} -> RUN_DEPENDS:= ${BUILD_DEPENDS}
PR: ports/165605
Submitted by: pgollucci (myself)
Approved by: portmgr (linimon)
Exp Run by: linimon
Tested by: make index
hard code the paths to the pgp/gpg at build time
- Switch to gpg as default since tests fail on 64bit with pgp for me and
more folks are likely to have gpg already installed since it seems more
common these days
- Pet portlint by moving LICENSE up
- Bump PORTREVISION due to RUN_DEPENDS changing causing package to change
PR: ports/165741
Approved by: Dereckson <dereckson@gmail.com> (maintainer)
* Mac OS X keyring backend now uses subprocess calls to the `security`
command instead of calling the API, which with the latest updates, no
longer allows Python to invoke from a virtualenv. Fixes issue #13.
* When using file-based storage, the keyring files are no longer stored
in the user's home directory, but are instead stored in platform-friendly
locations (`%localappdata%\Python Keyring` on Windows and according to
the freedesktop.org Base Dir Specification
(`$XDG_DATA_HOME/python_keyring` or `$HOME/.local/share/python_keyring`)
on other operating systems). This fixes#21.
*Backward Compatibility Notice*
Due to the new storage location for file-based keyrings, keyring 0.8
supports backward compatibility by automatically moving the password
files to the updated location. In general, users can upgrade to 0.8 and
continue to operate normally. Any applications that customize the storage
location or make assumptions about the storage location will need to take
this change into consideration. Additionally, after upgrading to 0.8,
it is not possible to downgrade to 0.7 without manually moving
configuration files. In 1.0, the backward compatibilty
will be removed.
PR: ports/165606
Submitted by: maintainer, douglas@douglasthrift.net
Tor traffic between the client and the bridge. This way, censors, who usually
monitor traffic between the client and the bridge, will see innocent-looking
transformed traffic instead of the actual Tor traffic.
WWW: https://www.torproject.org/projects/obfsproxy.html.en
Approved by: glarkin@ (mentor)
- Reset maintainership due to multiple maintainer timeouts
- Take maintainership
PR: ports/164471 [1]
Submitted by: Nikolay Denev <ndenev@gmail.com> [1]
From CHANGES.txt:
0.7.1
* Removed non-ASCII characters from README and CHANGES docs (required by
distutils if we're to include them in the long_description). Fixes#55.
0.7
* Python 3 is now supported. All tests now pass under Python 3.2 on
Windows and Linux (although Linux backend support is limited). Fixes#28.
* Extension modules on Mac and Windows replaced by pure-Python ctypes
implementations. Thanks to Jerome Laheurte.
* WinVaultKeyring now supports multiple passwords for the same service. Fixes
#47.
* Most of the tests don't require user interaction anymore.
* Entries stored in Gnome Keyring appears now with a meaningful name if you try
to browser your keyring (for ex. with Seahorse)
* Tests from Gnome Keyring no longer pollute the user own keyring.
* `keyring.util.escape` now accepts only unicode strings. Don't try to encode
strings passed to it.
PR: ports/165345
Submitted by: maintainer, douglas@douglasthrift.net
generate RSA and DSA keys, read and write PEM files, generate message
digests, sign and verify messages, encrypt and decrypt messages. It has
also some capabilities of creating SSL clients and servers.
WWW: https://github.com/phonohawk/HsOpenSSL
Obtained from: FreeBSD Haskell
client.
This provides a high-level implementation of a sensitive security
protocol, eliminating a common set of security issues through the use of
the advanced type system, high level constructions and common Haskell
features.
Currently implement the SSL3.0, TLS1.0, TLS1.1 and TLS1.2 protocol, with
only RSA supported for Key Exchange.
WWW: http://github.com/vincenthz/hs-tls
Obtained from: FreeBSD Haskell
and unencrypted private key are supported, but will include PGP
certificate and pkcs8 private keys.
WWW: http://github.com/vincenthz/hs-certificate
Obtained from: FreeBSD Haskell
arbitrarily-sized ByteStrings. While the implementations work, they are
not necessarily the fastest ones on the planet. Particularly key
generation. The algorithms included are based of RFC 3447, or the
Public-Key Cryptography Standard for RSA, version 2.1 (a.k.a, PKCS#1
v2.1).
WWW: http://hackage.haskell.org/package/RSA
Obtained from: FreeBSD Haskell
XSS in replication setup
ChangeLog:
Welcome to phpMyAdmin 3.4.10.1, a minor security release.
3.4.10.1 (2012-02-18)
- [security] XSS in replication setup, see PMASA-2012-1
Security Advisory:
http://www.phpmyadmin.net/home_page/security/PMASA-2012-1.php
Approved by: shaun (mentor)
'tsshbatch' is a tool to enable you to issue a command to many
servers without having to log into each one separately. When writing
scripts, this overcomes the 'ssh' limitation of not being able to
specify the password on the command line.
'tsshbatch' also understands basic 'sudo' syntax and can be used
to access a server, 'sudo' a command, and then exit.
'tsshbatch' thus allows you to write complex, hands-off scripts that
issue commands to many servers without the tedium of manual login and
'sudo' promotion. System administrators, especially, will find this
helpful when working in large server farms.
WWW: http://www.tundraware.com/Software/tsshbatch
PR: ports/163866
Submitted by: Tim Daneliuk, tsshbatch at tundraware.com
since 1.2.4 (not yet in tree) is vulnerable, and 1.2.5 has not been
released by upstream yet
- Fixed the URL in the recent WebCalendar entry
- Canonicalized naming in other WebCalendar entries
- Fixed various nits flagged by "make tidy"
Guard) tool which is soley concerned with making it as easy as
possible to encrypt files with one (or more) public keys. It does
not provide any major key management tools and does not support
decryption.
WWW: https://github.com/HHRy/gpgr
GHC in the ports tree has been updated to version 7.0.4 and the port revision
for all the Haskell ports without version changes are bumped. Other per-port
updates are coming soon.
This update also incorporates some improvements for bsd.cabal.mk that makes
working with Haskell ports even easier.
Thanks ashish@ for the help!
Obtained from: FreeBSD Haskell
package uses bindings to the optimized C implementation of Skein. There
is a high-level interface provided to some of the Skein use cases, and a
low-level interface when Skein has to be used in a different way.
Currently Skein is supported as cryptographic hash function as Skein as
a message authentication code (Skein-MAC).
[1] http://www.skein-hash.info/
WWW: http://patch-tag.com/r/felipe/skein
Obtained from: FreeBSD Haskell
slow hash function. This library uses PBKDF1-SHA256, and handles all the
details. It uses the cryptohash package for speed; if you need a pure
Haskell library, pwstore-purehaskell has the exact same API, but uses
only pure Haskell. It is about 25 times slower than this package, but
still quite usable.
WWW: https://github.com/PeterScott/pwstore
Obtained from: FreeBSD Haskell
(urandom on Linux, CryptAPI on Windows, patches welcome). Users looking
for cryptographically strong (number-theoretically sound) PRNGs should
see the DRBG package too!
WWW: http://trac.haskell.org/crypto-api/wiki
Obtained from: FreeBSD Haskell
pure APIs, with performance close to the fastest implementations available
in others languages.
The implementations are made in C with a haskell FFI wrapper that hide the
C implementation.
WWW: http://github.com/vincenthz/hs-cryptohash
Obtained from: FreeBSD Haskell
RNG, property tests and known-answer tests (KATs) for common algorithms, and a
basic benchmark infrastructure. Maintainers of hash and cipher implementations
are encouraged to add instances for the classes defined in Crypto.Classes.
Crypto users are similarly encouraged to use the interfaces defined in the
Classes module. Any concepts or functions of general use to more than one
cryptographic algorithm (ex: padding) is within scope of this package.
WWW: http://trac.haskell.org/crypto-api/wiki
Obtained from: FreeBSD Haskell