Commit graph

248 commits

Author SHA1 Message Date
taca
1b21c85160 Update sudo package to 1.6.9p14.
pkgsrc changes:

- Explict to depends security/heimdal package when kerberos option is
  specified.  PR pkg/37999 should be fixed.

Change:

646) Sudo will now set the nproc resource limit to unlimited on Linux
     systems to work around Linux's setuid() resource limit semantics.
     On PAM systems the resource limits will be reset by pam_limits.so
     before the command is executed.

647) SELinux support that can be used to implement role based access
     control (RBAC).  A role and (optional) type may be specified
     in sudoers or on the command line.  These are then used in the
     security context that the command is run as.

648) Fixed a Kerberos 5 compilation problem with MIT Kerberos.

Sudo 1.6.9p13 released.

649) Fixed an invalid assumption in the PAM conversation function
     introduced in version 1.6.9p9.  The conversation function may
     be called for non-password reading purposes as well.

650) Fixed freeing an uninitialized pointer in -l mode, introduced in
     version 1.6.9p13.

651) Check /etc/sudoers after LDAP even if the user was found in LDAP.
     This allows Defaults options in /etc/sudoers to take effect.

652) Add missing checks for enforcing mode in SELinux RBAC mode.

Sudo 1.6.9p14 released.
2008-03-11 15:52:51 +00:00
taca
4ed365d3bc Distribution file was changed after sudo 1.6.9p12 was released. :-(
config.h.in
	configure
	configure.in
	ldap.c

Add DIST_SUBDIR to handle this situation.

Bump PKG_REVISION.
2008-01-22 12:45:24 +00:00
taca
cd62454d80 Update sudo package to 1.6.9p12.
Changes from 1.6.9p11:

641) Added a configure check for the ber_set_option() function.

642) Fixed a compilation problem with the HP-UX K&R C compiler.

643) Revamped the Kerberos 5 ticket verification code.

644) Added support for the checkpeer ldap.conf variable for
     netscape-based LDAP SDKs.

645) Fixed a problem where an incomplete password could be echoed
     to the screen if there was a read timeout.
2008-01-21 16:38:57 +00:00
taca
5fe02749ec Update sudo package to 1.6.9p11.
637) Fixed a compilation problem on SCO related to how they
     store the high resolution timestamps in struct stat.

638) Avoid checking the passwd file group multiple times
     in the LDAP query when the user's passwd group is also
     listed in the supplemental group vector.

639) The URI specifier can now be used in ldap.conf even when
     the LDAP SDK doesn't support ldap_initialize().

640) New %p prompt escape that expands to the user whose password
     is being prompted, as specified by the rootpw, targetpw and
     runaspw sudoers flags.  Based on a diff from Patrick Schoenfeld.
2008-01-06 16:08:24 +00:00
rillig
8159318d33 Install the binaries readable for the owner, so that a package can be
created in unprivileged pkgsrc mode. PKGREVISION++
2008-01-03 23:17:47 +00:00
heinz
b55970381a Replaced outdated mirrors by working mirrors. 2007-12-30 13:42:29 +00:00
taca
dca1f5683b Update sudo pacakge to 1.6.9p10.
Major changes since Sudo 1.6.9p9:

 o Moved LDAP options into a table for simplified parsing/setting.

 o Fixed a problem with how some LDAP options were being applied.

 o Added support for connecting directly to LDAP servers via SSL/TLS
   for servers that don't support the start_tls extension.
2007-12-21 03:12:34 +00:00
taca
a208a673da sudo-1.6.9p9.tar.gz was updated now. So, introduce DIST_SUBDIR and
bump PKGREVISION.

A little bug fix seems to applied.

-rw-r--r--  1 taca  taca  578259 Dec  3 19:38 sudo-1.6.9p9.tar.gz-prev
-rw-r--r--  1 taca  taca  578262 Dec  5 00:27 sudo-1.6.9p9.tar.gz

diff -dupNr sudo-1.6.9p9-20071203/parse.c sudo-1.6.9p9/parse.c
--- sudo-1.6.9p9-20071203/parse.c	2007-11-28 08:29:59.000000000 +0900
+++ sudo-1.6.9p9/parse.c	2007-12-05 00:26:40.000000000 +0900
@@ -90,7 +90,7 @@
 #endif /* HAVE_EXTENDED_GLOB */

 #ifndef lint
-__unused static const char rcsid[] = "$Sudo: parse.c,v 1.160.2.14 2007/10/24 16:43:27 millert Exp $";
+__unused static const char rcsid[] = "$Sudo: parse.c,v 1.160.2.15 2007/12/04 15:26:40 millert Exp $";
 #endif /* lint */

 /*
@@ -202,7 +202,7 @@ sudoers_lookup(pwflag)
 		    return(VALIDATE_OK |
 			(no_passwd == TRUE ? FLAG_NOPASS : 0) |
 			(no_execve == TRUE ? FLAG_NOEXEC : 0) |
-			(setenv_ok == TRUE ? FLAG_SETENV : 0));
+			(setenv_ok >= TRUE ? FLAG_SETENV : 0));
 		} else if ((runas_matches == TRUE && cmnd_matches == FALSE) ||
 		    (runas_matches == FALSE && cmnd_matches == TRUE)) {
 		    /*
@@ -212,7 +212,7 @@ sudoers_lookup(pwflag)
 		    return(VALIDATE_NOT_OK |
 			(no_passwd == TRUE ? FLAG_NOPASS : 0) |
 			(no_execve == TRUE ? FLAG_NOEXEC : 0) |
-			(setenv_ok == TRUE ? FLAG_SETENV : 0));
+			(setenv_ok >= TRUE ? FLAG_SETENV : 0));
 		}
 	    }
 	    top--;
diff -dupNr sudo-1.6.9p9-20071203/sudo.c sudo-1.6.9p9/sudo.c
--- sudo-1.6.9p9-20071203/sudo.c	2007-12-03 02:13:52.000000000 +0900
+++ sudo-1.6.9p9/sudo.c	2007-12-04 01:12:03.000000000 +0900
@@ -730,8 +730,10 @@ parse_args(argc, argv)

     while (NewArgc > 0) {
 	if (NewArgv[0][0] == '-') {
-	    if (NewArgv[0][1] != '\0' && NewArgv[0][2] != '\0')
+	    if (NewArgv[0][1] != '\0' && NewArgv[0][2] != '\0') {
 		warnx("please use single character options");
+		usage(1);
+	    }

 	    switch (NewArgv[0][1]) {
 		case 'p':
2007-12-05 10:07:14 +00:00
taca
498d04a83c Update sudo package to 1.6.9p9.
Major changes since Sudo 1.6.9p8:

 o The ALL command in sudoers now implies SETENV permissions.

 o The command search is now performed using the target user's
   auxiliary group vector, not just the target's primary group.

 o When determining if the PAM prompt is the default "Password: ",
   compare the localized version if possible.

 o New passprompt_override option in sudoers to cause sudo's prompt
   to be used in all cases.  Also set when the -p flag is used.
2007-12-05 04:14:42 +00:00
taca
8b69268cf1 - Fix build problem on DragonFly BSD.
- Reduce patch size.

Build problem on DragonFly BSD was noted by YONETANI Tomokazu
via private mail.
2007-11-12 11:12:16 +00:00
taca
2628c96443 Update sudo package to 1.6.9p8.
Major changes since Sudo 1.6.9p7:

 o Fixed a bug where a sudoers entry with no runas user specified
   was treated differently from a line with the default runas user
   explicitly specified.
2007-11-04 12:07:24 +00:00
taca
9685596eea Update sudo package to 1.6.9p7.
pkgsrc change: added DESTDIR support.


Major changes since Sudo 1.6.9p6:

 o Reverted back to to using TCSAFLUSH instead of TCSADRAIN when
   turning off echo during password reading.

 o Fixed a configure bug that was preventing the addition of -lutil for
   login.conf support on FreeBSD and NetBSD.

 o Added a configure check for struct in6_addr since some systems
   define AF_INET6 but have no real IPv6 support.
2007-10-28 02:05:44 +00:00
taca
8a81fb76e1 Update sudo package to 1.6.9p6.
Major changes since Sudo 1.6.9p5:

 o Worked around bugs in the session support of some PAM implementations.
   The full tty path is now passed to PAM as well.

 o Sudo now only prints the password prompt if the process is in the
   foreground.

 o inttypes.h is now included when appropriate if it is present.

 o Simplified alias allocation in the parser.
2007-10-10 00:08:24 +00:00
bjs
cde8014a55 PKG_OPTIONS_OPTIONAL_GROUPS/PKG_OPTIONS_NONEMPTY_SETS have their respective
options added to PKG_SUPPORTED_OPTIONS automagically.  Duplicate options
removed.
2007-09-26 05:47:46 +00:00
taca
e669d33f13 Update sudo pacakge to 1.6.9p5.
617) Fixed a bug in the IP address matching introduced by the IPV6 merge.

618) For "visudo -f file" we now use the permissions of the original file
     and not the hard-coded sudoers owner/group/mode.  This makes
     it possible to use visudo with a revision control system.

619) Fixed sudoedit when used on a non-existent file.

620) Regenerated configure using autoconf 2.6.1 and libtool 1.5.24.

621) Groups and netgroups are now valid in an LDAP sudoRunas statement.
2007-09-09 12:54:36 +00:00
taca
b55392c988 Update sudo package to 1.6.9p4.
pkgsrc change:

Make these options mutual exclusive: kerberos pam skey.
(Really, combinations of kerberos and pam, pam and skey are conflicts.)

CHANGES:

609) Worked around a bug ins some PAM implementations that caused a crash
     when no tty was present.

610) Fixed a crash on some platforms in the error logging function.

611) Documentation improvements.

Sudo 1.6.9p1 released.

612) Fixed updating of the saved environment when the environ pointer
     gets changed out from underneath us.

Sudo 1.6.9p2 released.

613) Fixed a bug related to supplemental group matching introduced
     in 1.6.9.

Sudo 1.6.9p3 released.

614) Added IPv6 support from YOSHIFUJI Hideaki.

615) Fixed sudo_noexec installation path.

616) Fixed a K&R compilation error.

Sudo 1.6.9p4 released.
2007-08-18 15:09:11 +00:00
joerg
5ac5c16149 Readd the DragonFly libtool.m4 patches. 2007-07-30 08:41:20 +00:00
gdt
d7922fde3a Fix location of old distfiles in MASTER_SITE (s/old/OLD/). 2007-07-27 17:28:48 +00:00
jlam
ea2890b4d2 Remove a redundant PKGNAME definition (which matches DISTNAME), and add
a fetch location for old distfiles so that we don't need to always keep
this package at the latest release.
2007-07-26 19:34:12 +00:00
tls
e45a7ebbb0 Update sudo to 1.6.9. We don't take the new default of PAM and no other
authentication; that can be enabled by adding pam to the package options
if users desire.
2007-07-23 16:38:36 +00:00
jlam
a6f8cbe795 pkgsrc basically follows the BSD man page hierarchy. Install the su
and visudo manpages in man/man1, and the sudoers manpage in man/man5.
Remove the platform-specific PLISTs that only differed in the location
of the man pages.

Bump the PKGREVISION to 5.
2007-07-04 20:37:50 +00:00
tls
d4bffa6d45 On some hosts, this package's configure script fails to detech Heimdal
(in fact, it's not clear that there is a good way to do so).  The resulting
configuration works fine *except* if it encounters a host that has 3DES
but no DES service keys in its keytab.

Fix this by explicitly passing 0 ("default enctype") to Kerberos.
2007-07-02 06:04:01 +00:00
jlam
04e13269d6 Use -[ogm] instead of -[OGM] when passing permissions options to the
install script.  The latter are special install-sh script options that
check whether the invoking user is the root user or not, which is
completely unnecessary.
2007-06-26 15:05:50 +00:00
tls
1194ad7ee6 Add file omitted from previous commit. 2007-06-25 23:53:28 +00:00
tls
36ca7970b3 Fix privilege-escalation vulnerability with PKG_OPTIONS.sudo=kerberos:
cleanse environment of variables that alter behavior of Kerberos library
so the user can't override the default keytab location, and do *not*
ignore missing keytab errors.  Prevents root compromise via spoofed KDC
on systems with Kerberos libraries but no host key in keytab, no keytab,
or keytab overidden via environment.

Don't insist that the keytab key be DES -- some Kerberos sites are 3DES/AES
only.

Somewhat less invasive than the fix Todd incorporated into the 1.6.9 branch
of sudo (presently beta) but equivalent (though not as clean).
2007-06-25 09:53:42 +00:00
wiz
f1123cd7a3 Try fixing PLIST for Darwin. 2007-03-18 18:58:07 +00:00
rillig
bec1d82f20 bin/sudo is set-uid root. PKGREVISION++ 2007-03-13 09:46:00 +00:00
reed
da04fb6a7e Make sudo use VARBASE.
Always use "man" instead of catpages.

Make sure "run" directory is precreated, so you don't get:
/usr/bin/sudo sudo: can't mkdir /var/run/sudo: No such file or directory

Bump PKGREVISION.

Okayed by maintainer back in December. The only concern was
that /var/run may not be for all platforms, but this is same
as other packages to (not specific to sudo).
2006-06-14 00:06:27 +00:00
ghen
2eca3d9f2c The databases/openldap package has been split in -client and -server component
packages.  Convert LDAP-based applications to depend on openldap-client, and
bump PKGREVISION for those that depend on it by default.
2006-05-31 18:22:23 +00:00
adrianp
91f591c243 Add PYTHONINSPECT to the list of environment variables to clean
Fix for http://secunia.com/advisories/18358/
Bump to nb1
2006-01-15 11:32:06 +00:00
cube
fa24fed649 Sync with latest sudo release (1.6.8pl12). The actual diff is one line
long.  PR#32378 by Stefan Krüger.

Changes:
     Added PS4 and SHELLOPTS to the list of variables to remove from
     the environment.     (Already in pkgsrc)
     Added JAVA_TOOL_OPTIONS to the list of variables to remove from
     the environment.
     Added PERLLIB, PERL5LIB and PERL5OPT to the list of variables to
     remove from the environment.     (Already in pkgsrc)
2006-01-09 15:53:40 +00:00
jlam
dc9594e09d Remove USE_PKGINSTALL from pkgsrc now that mk/install/pkginstall.mk
automatically detects whether we want the pkginstall machinery to be
used by the package Makefile.
2005-12-29 06:21:30 +00:00
reed
2688ef6242 Remove paragraph about "MAILING LISTS". 2005-12-27 19:27:48 +00:00
reed
253ef99212 Sort. 2005-12-27 18:29:18 +00:00
rillig
579e977969 Ran "pkglint --autofix", which corrected some of the quoting issues in
CONFIGURE_ARGS.
2005-12-05 23:55:01 +00:00
adrianp
8382f588a5 Update sudo to nb2 to address the recent secuity issue:
- http://www.sudo.ws/sudo/alerts/perl_env.html

- Add "PERLLIB", "PERL5LIB" and the "PERL5OPT" to the list of
  environment variables to be cleaned.
2005-11-12 14:17:45 +00:00
cube
b62e58b21b Add a patch for CVE-2005-2959: SHELLOPTS and PS4 have to be cleared from
the environment before letting the user execute bash scripts.

Bump PKGREVISION.

From Debian.
2005-10-25 22:05:55 +00:00
riz
2188d18285 When patches are updated, distinfo must be updated as well.
Hi joerg!  8-)
2005-10-11 01:53:16 +00:00
joerg
c3d20eec3a Allow sudo to properly build on DragonFly. Without the detection of
shared linking the noexec wrapper is not build.
2005-10-10 17:48:09 +00:00
rillig
44f4f508db Fixed a pkglint warning. 2005-10-07 12:53:02 +00:00
abs
937bd80bc8 check for /usr/include/skey.h on NetBSD - in case dist with MKSKEY=no 2005-08-22 10:20:33 +00:00
taca
cbe3a8804d Update PKG_OPTIONS variable "PAM" to "pam". 2005-06-22 10:30:12 +00:00
jlam
7fcf75bb22 Security update for security/sudo to 1.6.8p9. Changes from version
1.6.8p7 include:

562) Fixed noexec functionality on Linux.

564) Fixed a bug that prevented Heimdal authentication from working.

566) A sudoers entry with sudo ALL no longer overwrites the value of
     safe_cmnd.  This fixes the privilege escalation vulnerability
     noted in http://www.courtesan.com/sudo/alerts/path_race.html
2005-06-20 20:11:11 +00:00
dillo
f81ae835ad Packages have no business modifying PKG_DEFAULT_OPTIONS -- it's a
user settable variable.  Set PKG_SUGGESTED_OPTIONS instead.  Also,
make use of PKG_OPTIONS_LEGACY_VARS.

Reviewed by wiz.
2005-05-31 10:01:36 +00:00
tv
f816d81489 Remove USE_BUILDLINK3 and NO_BUILDLINK; these are no longer used. 2005-04-11 21:44:48 +00:00
cube
f51a99f68c Update to 1.6.8pl7.
Changes:

557) Added a set of missing braces needed for MacOS X / Darwin.
558) Define LDAP_OPT_SUCCESS for those without it.
559) Warn if the user tries to use the -u option when not running a command.
560) Better PAM error handling and messages.
561) Fixed setting of $USER when env_reset is enabled.
2005-03-30 12:08:15 +00:00
agc
d81d19f8e0 Add RMD160 digests. 2005-02-24 12:51:41 +00:00
kim
0dfef04fbd Remove "--disable-setreuid" -- the configure scripts seems to have
adequate logic for determining when to use setreuid.

This makes sudoedit work on NetBSD again.

Closes PR pkg/28998
2005-01-30 21:36:53 +00:00
jlam
1b5734f517 Create a pam.buildlink3.mk file that is used by PAM-using packages.
It includes the correct buildlink3.mk file from either Linux-PAM
(security/PAM) or OpenPAM (security/openpam) and eventually will
support solaris-pam.  pam.buildlink3.mk will:

	* set PAMBASE to the base directory of the PAM files;
	* set PAM_TYPE to the PAM implementation used.

There are two variables that can be used to tweak the selection of
the PAM implementation:

PAM_DEFAULT is a user-settable variable whose value is the default
	PAM implementation to use.

PAM_ACCEPTED is a package-settable list of PAM implementations
	that may be used by the package.

Modify most packages that include PAM/buildlink3.mk to include
pam.buildlink3.mk instead.
2005-01-14 05:15:39 +00:00
jlam
02e7a05425 Allow building sudo without S/Key support on NetBSD. Patch from
PR pkg/28743 by Jukka Salmi with minor changes by me.
2004-12-22 04:36:32 +00:00
jlam
2a9c112e73 Sort the options. 2004-12-22 03:59:10 +00:00
xtraeme
a431aa7332 Update to 1.6.8pl5.
Changes:

o Added a configure check for systems with a 2-argument version of
  timespecsub (like BSD/OS).
o Added stub struct defintions to sudo.h to quiet compiler warnings
  on some systems.
o In sudoers Defaults lines, tuples like "lecture" may now be used
  without a value, restoring their old boolean-like nature.
o Invalid values for a tuple are now handled correctly.
2004-11-30 00:27:10 +00:00
jlam
21983ee0c4 Auto-add the options for dlopen() since we're only building a single
application.
2004-11-26 18:26:01 +00:00
cube
590ccb09f2 sudo is nominated for crapware of the year. Now at version 1.6.8pl4!
Just as for pl2, changes are about environment sanitizing, meaning there
are possible security issues with current versions.

Changes:

550) The CDPATH variable is now stripped from the environment passed
     to the program to be executed.
551) Fix temp file generation on systems where the _PATH_VARTMP macro
     lacks a trailing slash.
552) The KRB5CCNAME environment variable is preserved during sudo
     execution for password lookups that use GSSAPI.
2004-11-26 16:23:57 +00:00
jlam
e545d1e43c Honor PKG_SYSCONFDIR by looking for the LDAP configuration file in
${PKG_SYSCONFDIR}/ldap.conf (by default, /usr/pkg/etc/ldap.conf) instead
of hard-coding /etc/ldap.conf.  Bump the PKGREVISION.
2004-11-19 23:18:01 +00:00
jlam
05ba52c71f The universal option to enable PAM support is "PAM" not "pam". We strive
to use common option names were possible, so change these instances of
"pam" to "PAM" to match existing usage.
2004-11-18 23:02:00 +00:00
cube
72a83b746a Update to version 1.6.8pl2. Fixes a security flaw for the sad people using
bash-as-sh (and people allowing bash scripts to be run through sudo).  The
user could override commands by functions of her own.

ChangeLog:

549) Bash exported functions and the CDPATH variable are now stripped from
     the environment passed to the program to be executed.
2004-11-12 16:47:31 +00:00
tv
c487cb967a Libtool fix for PR pkg/26633, and other issues. Update libtool to 1.5.10
in the process.  (More information on tech-pkg.)

Bump PKGREVISION and BUILDLINK_DEPENDS of all packages using libtool and
installing .la files.

Bump PKGREVISION (only) of all packages depending directly on the above
via a buildlink3 include.
2004-10-03 00:12:51 +00:00
jlam
1a280185e1 Mechanical changes to package PLISTs to make use of LIBTOOLIZE_PLIST.
All library names listed by *.la files no longer need to be listed
in the PLIST, e.g., instead of:

	lib/libfoo.a
	lib/libfoo.la
	lib/libfoo.so
	lib/libfoo.so.0
	lib/libfoo.so.0.1

one simply needs:

	lib/libfoo.la

and bsd.pkg.mk will automatically ensure that the additional library
names are listed in the installed package +CONTENTS file.

Also make LIBTOOLIZE_PLIST default to "yes".
2004-09-22 08:09:14 +00:00
agc
7847f8610c Use "pl" as the magic abbreviation for "pathlevel" in the package name. 2004-09-17 09:45:02 +00:00
cube
875ccd9356 Update to version 1.6.8p1. This is a security update, see advisory
at:

http://www.sudo.ws/sudo/alerts/sudoedit.html

Major changes since Sudo 1.6.8:

o Sudoedit now re-opens the temp file as the invoking user
  and will only open regular files.

o Better detection of unchanged files in sudoedit.

o The path to ldap.conf is now configurable.

o Added SSL tls_* certificate checking options when using LDAP.

o The sample pam config file has been updated.
2004-09-17 09:25:18 +00:00
cube
536e0ddf84 Restore USE_LIBTOOL which was silently removed recently (hi xtraeme!).
Fix build with recent libtool.  Not bumping PKGREVISION, it's in the flow
of current PLIST fixes and such...
2004-08-24 17:31:48 +00:00
schmonz
6064f91bc1 visudo(8) is still in ${PREFIX}/sbin, at least on NetBSD 2.0_BETA. 2004-08-24 16:43:18 +00:00
xtraeme
748f9e643a Add missing files. 2004-08-24 09:19:16 +00:00
xtraeme
bb6feecffc Update security/sudo to 1.6.8 and convert to use bsd.options.mk, which
adds two new options, ldap and pam.

Changes:

 * Sudo now supports storing sudoers info in LDAP (optionally using TLS).
 * There is a new -e option to edit files the with uid of the invoking
   user. This makes it possible to give users to ability to safely edit
   files without the possibility of editing other files or running commands
   as the target user. If sudo is run as "sudoedit" the -e flag is implied.
 * A new tag, NOEXEC, will prevent a dynamically-linked program being run
   by sudo from executing another program (think shell escapes). Because
   this uses LD_PRELOAD it has no effect on static binaries.
 * A uid specified in sudoers now matches the user specified by the -u flag
   even if the -u flag specified a name, not a uid.
 * Added a -i option to simulate an initial login similar to "su -".
 * If sudo is used to run as root shell, further sudo commands will be logged
   as run by the user specified by the SUDO_USER environment variable. In -e
   mode (sudoedit), SUDO_USER is used to determine what user to run the editor
   when the real uid is 0.
 * The sudoers file is now parsed as the runas user in all cases instead of
   root. This fixes some issues with running NFS-mounted commands.
 * If the target user == invoking user a password is no longer required.
 * Sudo now produces a sensible error message when the targetpw Defaults option
   is set and a non-existent uid is specified via the -u option.
 * A negated user/uid in a runas list is now treated the same as a negated
   command and overrides a previously allowed entry.
 * PAM support now uses Use pam_acct_mgmt() to check for disabled accounts.
 * Added a check in visudo for runas_default being used before it was set.
 * Fixed several issues when closing all open descriptors. Sudo now uses
   closefrom() if it exists, otherwise it uses /proc/$$/fd if that exists
   with a fallback of closing all possible descriptors.
 * Quoting globbing characters with a backslash now works as documented.
 * Fixed a problem on FreeBSD (and perhaps others) when the user is only
   listed in NIS (not master.passwd) and netgroups are used in the
   master.passwd file.
 * The username in a log entry is no longer truncated at 8 characters.
 * Added a "sudo_lecture" option that can point to a file containing a
   custom lecture.
 * The timeout for password reading is now done via alarm(), not select().
 * /tmp/.odus is no longer used for timestamps by default.
 * Sudo now works on the nsr-tandem-nsk platform.
 * Fixed the --with-stow configure option.
 * TIS fwtk authentication now supports fwtk 2.0 and higher.
 * Added Stan Lee / Uncle Ben quote to the lecture from RedHat.
 * Added the --with-pc-insults configure to replace politically incorrect
   insults with other ones.
2004-08-23 21:15:17 +00:00
jlam
9d5426ff76 Change the way that legacy USE_* and FOO_USE_* options are converted
into the bsd.options.mk framework.  Instead of appending to
${PKG_OPTIONS_VAR}, it appends to PKG_DEFAULT_OPTIONS.  This causes
the default options to be the union of PKG_DEFAULT_OPTIONS and any
old USE_* and FOO_USE_* settings.

This fixes PR pkg/26590.
2004-08-22 19:32:51 +00:00
jlam
b460ce1ab5 Convert to use bsd.options.mk. The relevant options variable to set
for each package can be determined by invoking:

	make show-var VARNAME=PKG_OPTIONS_VAR

The old options are still supported unless the variable named in
PKG_OPTIONS_VAR is set within make(1) (usually via /etc/mk.conf).
2004-07-30 21:05:41 +00:00
kim
aecc988438 Use -lcrypto with Heimdahl if it exists.
Fixes PR pkg/25623
2004-05-19 19:26:38 +00:00
jlam
40372bf47b Fix building this package with Kerberos 5 support -- the misdeclared
krb5_mcc_ops variable is "const" in both Heimdal and in MIT krb5.
2004-03-22 08:45:56 +00:00
reed
9c5adc6fea The MESSAGE mentions modifying the sudoers file (and doesn't
haev location shown), so tell the admin to use the visudo tool.
2004-03-11 23:33:09 +00:00
jlam
22645a942c bl3ify 2004-01-05 11:28:07 +00:00
kim
f1e225f085 Change maintainer to myself. 2003-11-03 22:43:37 +00:00
grant
ca3be631f2 s/netbsd.org/NetBSD.org/ 2003-07-17 22:50:55 +00:00
jschauma
e366d0c694 Use tech-pkg@ in favor of packages@ as MAINTAINER for orphaned packages.
Should anybody feel like they could be the maintainer for any of thewe packages,
please adjust.
2003-06-02 01:15:31 +00:00
wiz
164b721135 Update to 1.6.7p5:
509) Fixed a typo that caused a compilation error on Heimdal.
510) Darwin (MacOS X) doesn't have a real setreuid() system call.
511) Fixed a problem with large numbers of environment variables.
2003-05-09 08:29:14 +00:00
jwise
73357897ce Add patch from lha@netbsd.org to fix build when KERBEROS == 5. 2003-05-08 18:08:38 +00:00
jmmv
f1446ddf2b Drop trailing whitespace. Ok'ed by wiz. 2003-05-06 17:40:18 +00:00
jmmv
ba64a08666 Do not let the program's Makefile directly install the sudoers file under
PKG_SYSCONFDIR.  This is already done by bsd.pkg.install.mk in a better way.
2003-05-03 18:27:46 +00:00
taca
5ad6718994 Update sudo package to 1.6.7.4 (1.6.7p4). This closes PR pkg/21256.
508) Fixed remaining Kerberos V issues with MIT Kerberos V and old Heimdal.
2003-04-22 02:19:12 +00:00
cjep
4411f47d3d Update of security/sudo to 1.6.7p3.
Changes since 1.6.7p2:
* Kerberos V support should work on latest MIT Kerberos V and Heimdal.
2003-04-07 10:44:14 +00:00
taca
647358bbb7 Update sudo package to 1.6.7.2.
Changes since Sudo 1.6.7p1:

 o Fixed an unterminated comment that broke Kerberos V authentication.

 o The krb5-config script is now used to determine Kerberos V
   CPPFLAGS and LDFLAGS/LIBS if it exists.

 o Backed out changes to mkinstalldirs from autoconf 2.57 that
   caused problems on Tru64 Unix.
2003-04-03 15:46:45 +00:00
wiz
5319633bb2 Update to 1.6.7p1 (1.6.7.1):
478) Wildcards now work correctly in the env_keep Defaults directive.
479) Added support for non-root timestamp dirs.  This allows the timestamp
     dir to be shared via NFS (though this is not recommended).
480) Removed double printing of bad environment variable table in -V mode.
481) configure script has been regenerated with autoconf 2.5.7.
     This required some changes to configure.in.
482) Fixed a compilation problem on SunOS; thanks to Alek O. Komarnitsky.
483) SecurID 5.0 API support from Michael Stroucken.
484) Restore state of signal handlers to what we had upon startup.
     Fixes a problem when using sudo with nohup; thanks to Paul Markham.
485) Revamp set_perms() to use setresuid() or setreuid() when available
     in preference to POSIX stuff since they allow us to properly
     implement "stay_setuid" whereas POSIX does not really.
486) In strict mode sudo did not throw an error for undefined User_Aliases.
487) Fixed a Makefile bug on IRIX.
488) Write the prompt *after* turning off echo to avoid some password
     characters being echoed on heavily-loaded machines with fast typists.
489) Added %U and %H escapes in the prompt and fixed treatment of %%.
490) Visudo will now add a final newline to sudoers if the user's editor
     not add one before EOF.
491) The lexer state is now reset to its initial value on EOF.
     Previously, the state was not reset between parser invocations
     which could cause problems for visudo in rare cases.
492) Added support for Defaults that apply based on the RunasUser.
493) Sudo now includes copies of strlc{at,py} and uses them throughout.
494) Sudo is now careful to avoid interger overflow when allocating
     memory.  This is one of those "should not happen" situations.
495) Added a configure option (--with-stow) to make sudo compatible
     with GNU stow.
496) auth/kerb5.c now compiles under Heimdal.
497) The volatile prefix is used in the hopes of preventing compilers
     from optimizing away memory zeroing.  Unfortunately, this results
     in some warnings from gcc.
498) Better Kerberos IV/V support in the configure script.
499) Fixed a logic thinko in the SIGCHLD handler that caused problems
     with rlogin on HP-UX.
500) configure now adds -R to LDFLAGS when it adds -L for Solaris and
     SVR4.  There is a configure option, --with-rpath, to control this.
501) On AIX, configure will pass extra directory paths to the linker
     via the -blibpath ld option.  This is only active when additional
     library paths are used.  It may be disabled via the
     --without-blibpath configure option.
502) The --with-skey and --with-opie configure options now take
     an optional directory argument that should have an include and
     lib dir for the skey/opie include file and library respectively.
503) Fixed false positives in the overflow detection of expand_prompt().
2003-04-01 16:07:21 +00:00
grant
6d16b9adea grammar tweak 2003-03-25 17:27:49 +00:00
jlam
d7f69e47ce Instead of including bsd.pkg.install.mk directly in a package Makefile,
have it be automatically included by bsd.pkg.mk if USE_PKGINSTALL is set
to "YES".  This enforces the requirement that bsd.pkg.install.mk be
included at the end of a package Makefile.  Idea suggested by Julio M.
Merino Vidal <jmmv at menta.net>.
2003-01-28 22:03:00 +00:00
grant
36f2f3809c Use automatic PLIST handling. 2002-12-25 12:26:46 +00:00
wiz
e8817c9088 Complete standardization of messages according to latest pkglint. 2002-09-24 12:29:55 +00:00
jlam
1c57323789 Merge packages from the buildlink2 branch back into the main trunk that
have been converted to USE_BUILDLINK2.
2002-08-25 21:48:57 +00:00
wiz
6cfb711833 Undo last, was not meant to be committed. 2002-06-16 20:21:20 +00:00
wiz
92445981c5 Add RCS Id. 2002-06-16 20:20:18 +00:00
wiz
c2137d285c Add recognition of mipseb systems to config.sub. (thanks, jason!)
Closes pkg/17212.
While here, fix compilation with kerberos5.
2002-06-16 20:16:50 +00:00
cjep
64c9e8a407 Change USE_KERBEROS to PKG_USE_KERBEROS in pkgsrc. There was a "conflict"
which the basesrc USE_KERBEROS variable. Discussed on packages@

This fixes PR#17182 from Takahiro Kambe. The problem was pointed out by
FUKAUMI Naoki on a Japanese NetBSD mailing list.
2002-06-15 21:19:59 +00:00
jschauma
a0028b4b58 Update to sudo 1.6.6 to fix local root-exploit-possibility as per
http://www.globalintersec.com/adv/sudo-2002041701.txt

(Approved by hubertf.)
2002-04-25 16:57:13 +00:00
taca
f24f88b7bf Correct PKGNAME not sudo-1.6.5p2 but sudo-1.6.5.2. 2002-01-28 15:38:37 +00:00
taca
ec3c1a879c Update sudo package to 1.6.5.2 (1.6.5p2).
469) Older versions of BSDi have getifaddrs() but no freeifaddrs().

470) BSDi has a fake setreuid() as do certain versions of FreeBSD and NetBSD.

471) Ignore the return value of pam_setcred().  In Linux-PAM 0.75,
     pam_setcred() will return PAM_PERM_DENIED even if the setcred function
     of the module succeeds when pam_authenticate() has not been called.

472) Avoid giving PAM a NULL password response, use the empty string instead.
     This avoids a log warning when the user hits ^C at the password prompt
     when Linux-PAM is in use.  This also prevents older versions of
     Linux-PAM from dereferencing the NULL pointer.

473) The user's password was not zeroed after use when AIX authentication,
     BSD authentication, FWTK or PAM was in use.

Sudo 1.6.5p2 released.
2002-01-24 16:01:02 +00:00
taca
1aaee629da Update sudo package to 1.6.5p1. Quote from CHANGES is below.
467) Visudo could access memory that was already freed.

468) If the skey.access file denied use of plaintext passwords sudo
     would exit instead of allowing the user to enter an S/Key.

Sudo 1.6.5p1 released.
2002-01-18 11:44:14 +00:00
taca
bd9f7cc1ff Update sudo package to 1.6.5 for recent security problem.
Added --disable-root-mailer to CONFIGURE_ARGS better security.

Changes from 1.6.3p7 to 1.6.5 is attached bellow.

417) Visudo now checks for the existence of an editor and gives a sensible
     error if it does not exist.

418) The path to the editor for visudo is now a colon-separated list of
     allowable editors.  If the user has $EDITOR set and it matches
     one of the allowed editors that editor will be used.  If not,
     the first editor that actually exists is used.

419) Visudo now does its own fork/exec instead of calling system(3).

420) Allow special characters (including '#') to be embedded in pathnames
     if quoted by a '\\'.  The quoted chars will be dealt with by fnmatch().
     Unfortunately, 'sudo -l' still prints the '\\'.

421) Added the always_set_home option.

422) Strip NLSPATH and PATH_LOCALE out from the environment to prevent
     reading of protected files by a less privileged user.

423) Added support for BSD authentication and associated -a flag.

424) Added check for _innetgr(3) since NCR systems have this instead
     of innetgr(3).

425) Added stay_setuid option for systems that have libraries that perform
     extra paranoia checks in system libraries for setuid programs.

426) Environment munging is now done by hand.  The environment is zeroed
     upon sudo startup and a new environment is built before the command
     is executed.  This means we don't rely on getenv(3), putenv(3),
     or setenv(3).

427) Added a class of environment variables that are only cleared if they
     contain '/' or '%' characters.

428) Use stashed user_gid when checking against exempt gid since sudo
     sets its gid to SUDOERS_GID, making getgid() return that, not the
     real gid.  Fixes problem with setting exempt group == SUDOERS_GID.
     Fix from Paul Kranenburg.

429) Fixed file locking in visudo on NeXT which has a broken lockf().
     Patch from twetzel@gwdg.de.

430) Regenerated configure script with autoconf-2.52 (required some
     tweaking of configure.in and friends).

431) Added mail_badpass option to send mail when the user does not
     authenticate successfully.

432) Added env_reset Defaults option to reset the environment to
     a clean slate.  Also implemented env_keep Defaults option
     to specify variables to be preserved when resetting the
     environment.

433) Added env_check and env_delete Defaults options to allow the admin
     to modify the builtin list of environment variables to remove.

434) If timestamp_timeout < 0 then the timestamp never expires.  This
     allows users to manage their own timestamps and create or delete
     them via 'sudo -v' and 'sudo -k' respectively.

435) Authentication routines that use sudo's tgetpass() now accept
     ^C or ^Z at the password prompt and sudo will act appropriately.

436) Added a check-only mode to visudo to check an existing sudoers
     file for sanity.

437) Visudo can now edit an alternate sudoers file.

438) If sudo is configured with S/Key support and the system has
     skeyaccess(3) use that to determine whether or not to allow
     a normal Unix password or just S/Key.

439) Fixed CIDR handling in sudoers.

440) Fixed a segv if the local hostname is not resolvable and
     the 'fqdn' option is set.

441) "listpw=never" was not having an effect for users who did not
     appear in sudoers--now it does.

442) The --without-sendmail option now works on systems with
     a /usr/include/paths.h file that defines _PATH_SENDMAIL.

443) Removed the "secure_path" Defaults option as it does not work and
     cannot work until the parser is overhauled.

444) Added new -P flag and "preserve_groups" sudoers option to cause
     sudo to preserve the group vector instead of setting it to that
     of the target user.  Previously, if the target user was root
     the group vector was not changed.  Now it is always changed unless
     the -P flag or "preserve_groups" option was given.

445) If find_path() fails as root, try again as the invoking user (useful
     for NFS).  Idea from Chip Capelik.

446) Use setpwent()/endpwent() and its shadow equivalents to be sure
     the passwd/shadow file gets closed.

447) Use getifaddrs(3) to get the list of network interfaces if it is
     available.

448) Dump list of local IP addresses and environment variables to clear
     when 'sudo -V' is run as root.

449) Reorganized the lexer a bit and added more states.  Sudo now does a
     better job of parsing command arguments in the sudoers file.

450) Wrap each call to syslog() with openlog()/closelog() since some
     things (such as PAM) may call closelog(3) behind sudo's back.

451) The LOGNAME and USER environment variables are now set if the user
     specified a target uid and that uid exists in the password database.

452) configure will no longer add the -g flag to CFLAGS by default.

453) Now call pam_setcreds() to setup creds for the target user when
     PAM is in use.  On Linux this often sets resource limits.

454) If "make install" is run by non-root and the destination dir
     is writable, install things normally but don't set owner and mode.

455) The Makefile now supports installing in a shadow hierarchy
     specified via the DESTDIR variable.

456) config.h.in is now generated by autoheader.

Sudo 1.6.4 released.

457) Move the call to rebuild_env() until after MODE_RESET_HOME is set.
     Otherwise, the set_home option has no effect.

458) Fix use of freed memory when the "fqdn" flag is set.  This was
     introduced by the fix for the "segv when gethostbynam() fails" bug.

459) Add 'continue' statements to optimize the switch statement.
     From Solar Designer.

Sudo 1.6.4p1 released.

460) Some special characters were not being escaped properly (e..g '\,')
     in command line arguments and would cause a syntax error instead.

461) "sudo -l" would not work if the always_set_home option was set.

462) Added a configure option to disable use of POSIX saved IDs for
     operating systems where these are broken.

463) The SHELL environment variable was preserved from the user's environment
     instead of being reset based on the passwd database even when the
     "env_reset" option was set.

Sudo 1.6.4p2 released.

464) Added a configure option to cause mail sent by sudo to be run as
     the invoking user instead of root.  Some people consider this to
     be safer.

465) If the mailer is being run as root, use a hard-coded environment
     that is not influenced in any way by the invoking user's environment.

466) Fixed the call to skeyaccess().  Patch from Phillip E. Lobbes.

Sudo 1.6.5 released.
2002-01-17 16:32:04 +00:00
jlam
55ffb37406 bsd.pkg.install.mk calls the INSTALL script at the right times
automatically, so no need to do it ourselves.
2001-12-02 06:56:38 +00:00
jlam
ffceca11a9 PKG_SYSCONFDIR is where the configuration files for a package may be found.
This value may be customized in various ways:

PKG_SYSCONFBASE is the main config directory under which all package
	configuration files are to be found.

PKG_SYSCONFSUBDIR is the subdirectory of PKG_SYSCONFBASE under which the
	configuration files for a particular package may be found.

PKG_SYSCONFDIR.${PKGBASE} overrides the value of ${PKG_SYSCONFDIR} for a
	particular package.

Users will typically want to set PKG_SYSCONFBASE to /etc, or accept the
default location of ${PREFIX}/etc.

This obsoletes the use of CONFDIR, which was active for only 6 days, so no
need to have a workaround to still accept old CONFDIR settings.
2001-11-25 18:59:45 +00:00
jlam
c0465ef8a6 Respect ${CONFDIR} and use the general INSTALL/DEINSTALL scripts. 2001-11-19 17:27:22 +00:00
zuntum
c72c1cf5f9 Move pkg/ files into package's toplevel directory 2001-11-01 00:57:41 +00:00
jlam
d7fd38173d Mark as USE_BUILDLINK_ONLY. 2001-08-02 17:27:41 +00:00
jlam
9820a22a90 In package Makefiles, create FILES_SUBST instead of duplicating sed
expression for substituting in DEINSTALL/INSTALL scripts.  Use "${CMP} -s"
instead of "diff -q" since the former is more portable across OSes.
2001-07-13 07:09:17 +00:00
wiz
a660ab3da1 Remove build time dependency on autoconf by adding a patch for configure.
Fixes pkg/13004.
2001-06-26 00:49:54 +00:00
agc
a35e3d707c Move to sha1 digests, add distfile sizes. 2001-04-19 15:40:29 +00:00
agc
2d6b6a009c + move the distfile digest/checksum value from files/md5 to distinfo
+ move the patch digest/checksum values from files/patch-sum to distinfo
2001-04-17 11:43:32 +00:00
itojun
7d1286b91e upgrade to 1.6.3p7. p6 is no longer available.
416) Fix negation of path-type Defaults entries in a boolean context.
2001-04-08 00:02:45 +00:00
hubertf
e32afb6fea Change BUILD_DEPENDS semantics:
first component is now a package name+version/pattern, no more
executable/patchname/whatnot.

While there, introduce BUILD_USES_MSGFMT as shorthand to pull in
devel/gettext unless /usr/bin/msgfmt exists (i.e. on post-1.5 -current).

Patch by Alistair Crooks <agc@netbsd.org>
2001-03-27 03:19:43 +00:00
assar
55da32de67 turn KERBEROS into a binary switch 2001-03-04 03:26:50 +00:00
itojun
c1618cc152 upgrade to 1.6.3p6. (security fix)
415) Fix word splitting bug that caused a segv for very long command line args.
2001-02-23 08:11:35 +00:00
wiz
a87738b456 Update to new COMMENT style: COMMENT var in Makefile instead of pkg/COMMENT. 2001-02-17 17:42:09 +00:00
tron
f2d262e0be Use full pathname "${LOCALBASE}/bin/auto..." in dependences and make
targets. This includes a fix for PR pkg/12125 by Tomasz Luchowski.
2001-02-05 09:00:54 +00:00
wiz
b979f7222a Add automatic ${VARIABLE} handling for MESSAGE files.
Convert most MESSAGE files to new syntax (${VARIABLE} gets replaced,
not @VARIABLE@, nor @@VARIABLE@@).
By default, substitutions are done for LOCALBASE, PKGNAME, PREFIX,
X11BASE, X11PREFIX; additional patterns can be added via MESSAGE_SUBST.
Clean up some packages while I'm there; add RCS tags to most MESSAGEs.
Remove some uninteresting MESSAGEs.
2001-01-29 11:34:21 +00:00
jlam
d75ede5b27 Look for build dependency in path instead. 2000-12-06 16:27:39 +00:00
jlam
3668b20367 * Cosmetic changes to Makefile.
* Use DEINSTALL/INSTALL scripts to handle config files.
* Install the UPGRADE file and add a MESSAGE file to refer to it, instead
  of spewing a big file every time sudo is installed.
2000-12-06 06:33:39 +00:00
jlam
23370c3263 Update sudo to 1.6.3p5. Changes from version 1.6.3p4:
* Fixed listpw and verifypw sudoers options.
	* Do not write NUL when writing passwd prompt.
2000-12-05 18:30:05 +00:00
thorpej
c986504d51 Don't syslog krb5_init_context() failure. It can happen if
Kerberos is simply not configured on the system.
2000-08-10 16:57:32 +00:00
thorpej
61e0d5c07e Make this work with Heimdal Kerberos 5. Requires fleshed-out MCC
support in Heimdal.
2000-08-10 02:25:28 +00:00
thorpej
f7dd62d6ee Remove a commend/if clause which turns out to not actually
be true.
2000-08-09 20:01:45 +00:00
veego
167953d5bb Make it work on Solaris. 2000-07-26 15:12:08 +00:00
mjl
26e1caa2ee Update to 1.6.3p4. Notable changes:
393) Users in the 'exempt' group shouldn't get their $PATH overridden
     by 'secure-path'.  Patch from jmknoble@pobox.com.
395) Fixed a bug that caused an infinite loop when the password
     timeout was disabled.
396) It is now possible to set the path to the editor for visudo as well
     as the flag that determines whether or not visudo will look at
     $EDITOR in the sudoers file.
398) Added rootpw, runaspw, and targetpw to prompt for the root, runas_default
     and target user's passwords respectively (instead of the invoking user's
     password).
399) Added -S flag to force password read from stdin.
400) Restore coredumpsize resource limit before exec'ing the child
     process (sudo sets it to 0 internally).
404) Fixed a bug where sudo would hang around and consume CPU if we spawn
     a long-running process.
406) Added set_logname run-time option.  When unset, sudo will not set
     the USER and LOGNAME environment variables.
407) Wildcards are now allowed in the hostnames specified in sudoers.
     The 'fqdn' option is often required for this to be useful.
408) Fixed a bug where host and user qualifiers in a Defaults entry were
     not being used correctly and the entry was being applied globally.
409) Fixed targetpw, rootpw, and runaspw options when used with non-passwd
     authentication (pam, etc).
410) When the targetpw flag is set, use the target username as part
     of the timestamp path.
411) Fixed a bug that prevented the -H option from being useful.
412) Fixed a case where a string was used after it has been freed.
2000-06-06 11:07:19 +00:00
thorpej
2388b352d8 Only enable Kerberos 5 support if USE_HEIMDAL is set; sudo uses API
features present in Heimdal but NOT present in MIT Kerberos (one more
reason to ditch MIT, I guess).
2000-02-28 01:55:26 +00:00
thorpej
565be9586e Find krb5 includes/libraries as installed in a crypto-aware NetBSD
installation.

Still doesn't work; MIT Kerberos 5 is missing some calls that
sudo wants (tho Heimdal has them).
2000-02-27 20:48:16 +00:00
jlam
9a70ae8992 Update to sudo-1.6.2p1. Changes from 1.6.2 (committed yesterday!):
393) Users in the 'exempt' group shouldn't get their $PATH overridden
     by 'secure-path'.  Patch from jmknoble@pobox.com.

394) Pam now works on HP-UX 11.0, thanks to Jeff A. Earickson.
2000-01-28 17:01:46 +00:00
jlam
ca4a2fdd0c Update to sudo-1.6.2. This is a bugfix release over sudo-1.6.1.
Changes from Sudo 1.6.1:

383) Better behavior for -l and -v flags in conjunction with NOPASSWD and
     added "verifypw" and "listpw" options.

384) For HP-UX with cc, add the -Aa flag along with -D_HPUX_SOURCE.

385) Fix compilation with K&R compilers.

386) For netgroup host matching, match against the short version of the
     hostname as well as the long one if they are different.

387) Terminate passwd reading on '\r' in addition to '\n'

388) Visudo used to loop endlessly if a user entered ^D at the whatnow
     prompt.  EOF is now treaded as 'x' (exit w/o saving changes).

389) The 'shell_noargs' runtime option is back based on a patch from
     bguillory@email.com.

390) Systems that return RLIM_INFINITY for RLIMIT_NOFILE (like AIX)
     would loop for a very loing time during sudo startup.  A value of
     RLIM_INFINITY is now ignored (getdtablesize/sysconf is used instead).

391) Locking in visudo was broken.  We now lock the sudoers file, not the
     sudoers temp file, which should be safe.

392) PAM fixups: custom prompts now work correctly and errors are
     dealt with more sanely.  Patches from Cloyce D. Spradling.
2000-01-28 00:33:21 +00:00
abs
df05aef71f Strip trailing '.', and/or leading '(a|an) ' 2000-01-05 15:37:50 +00:00
jlam
cd06a400cd CHANGES 1999-12-30 22:51:28 +00:00
kim
d0e9933400 Change how Kerberos support is enabled in pkgsrc.
Quick guide for compiling packages:
- set KERBEROS=4 or KERBEROS=5 in /etc/mk.conf

Quick guide for configuring Kerberos support in a package Makefile:
- test for KERBEROS value and enable the appropriate version with
  CONFIGURE_ARGS or other means and set USE_KERBEROS=yes
- make sure to disable Kerberos support otherwise (especially if
  using configure, which might automatically detect it)
- BUILD_DEFS and RESTRICTED are set automatically in bsd.pkg.mk
  when USE_KERBEROS=yes is set
1999-09-14 02:32:21 +00:00
kim
c00d43f70e Got some coffee, feel much better now. Thank you. 1999-09-13 13:30:45 +00:00
kim
02bd4492fd Add Kerberos V support, record Kerberos options. 1999-09-13 13:24:48 +00:00
kim
a40be5c1a9 Use Kerberos IV where appropriate. 1999-09-13 13:17:40 +00:00
jlam
94b5df60f7 Update sudo to 1.5.9p4. It's the latest stable security release. 1999-08-31 19:26:40 +00:00
agc
00a16e3008 Add package patch checksum files. 1999-07-09 14:22:59 +00:00
frueauf
4b2a245037 Update sudo to 1.5.9p1. 1999-05-09 14:10:27 +00:00
agc
697a80799f Make this work on Solaris.
Substitute ${LOCALBASE} for the hardcoded value in the manual pages.
1999-03-30 15:37:00 +00:00
hubertf
2a95ad9c6b Fix CONFLICTS (remove redundancy, mostly) 1999-02-20 22:48:24 +00:00
frueauf
0bf080ed59 pkglint: move WRKSRC where it belongs. 1998-12-14 10:25:50 +00:00
frueauf
7a70ef5668 Update sudo to 1.5.7p4.
Changes since 1.5.6:
- Various bug fixes (not security related).
- All compile-time options are now set via options to the configure script.
- visudo is now installed in /usr/local/sbin where it belongs.
  [of course this is ${PREFIX}/sbin in our package for a long time - TF]
- two problems with tgetpass() have been fixed. In one case the user was
  not always given a chance to enter a password. In the other a newline
  was not always printed after the password was entered on Linux.
- Added support for Digital UNIX SIA (Security Integration Architecture).
- %groups now work as RunAs specifiers like the man page says.
- Sudo now sets the USER environment variable to the target user
  (root unless -u is specified).
- Sudo will print "command not found" unless configure was run with
  --disable-path-info. Also, tell user when we ignore '.' in their path and
  it would have been used but for --with-ignore-dot. This means that sudo can
  be used to gather information about the existence of executable in
  directories not accessible by a normal user. If this bothers you, run
  configure with --disable-path-info.
  [in our package --disable-path-info is default - TF]
- A longstanding bug wrt "sudo -l" has been fixed that could cause "sudo -l"
  to complain about non-existent syntax errors.
- When configured with --with-tty-tickets the filename is now "user:tty"
  (was "user.tty") since a username could have a '.' in it.
1998-12-13 11:34:31 +00:00
frueauf
c931b5eab3 Update sudo to 1.5.6p2. 1998-09-28 13:10:07 +00:00
agc
f7c4996e0b Add NetBSD RCS Ids. 1998-08-07 13:27:33 +00:00
agc
41bfb30737 Add NetBSD RCS Ids. 1998-08-07 11:08:53 +00:00
frueauf
8dbd15d094 Update to sudo-1.5.4p1. 1998-07-01 19:09:42 +00:00
agc
988019b016 Update package Makefiles for automatic manual page handling. 1998-06-22 12:58:33 +00:00
agc
258b808c9f Use the bsd.pkg.mk and bsd.pkg.subdir.mk files in the pkgsrc tree.
Remove redundant (and sometimes erroneous) comments.
1998-04-15 10:38:15 +00:00
hubertf
b9cb721cf6 portlint: add RCS Id 1998-01-24 22:53:04 +00:00
hubertf
cc5e8a4a80 portlint: use command macros 1998-01-24 22:52:56 +00:00
hubertf
8639bafeaa Fix setting CONFIGURE_ARGS ("=" -> "+=") 1997-12-22 07:45:38 +00:00
hubertf
da40dd73e2 Update for NetBSD, mostly by Soren S. Jorvang <soren@t.dk> 1997-12-14 23:38:21 +00:00
hubertf
e189790044 Import vanialla FreeBSD sudo. 1997-12-14 23:27:00 +00:00