Commit graph

9623 commits

Author SHA1 Message Date
maya
6bcb1cccb8 libssh: update to 0.7.6. security fix.
version 0.7.6 (released 2018-10-16)
  * Fixed CVE-2018-10933
  * Added support for OpenSSL 1.1
  * Added SHA256 support for ssh_get_publickey_hash()
  * Fixed config parsing
  * Fixed random memory corruption when importing pubkeys

version 0.7.5 (released 2017-04-13)
  * Fixed a memory allocation issue with buffers
  * Fixed PKI on Windows
  * Fixed some SSHv1 functions
  * Fixed config hostname expansion

version 0.7.4 (released 2017-02-03)
  * Added id_ed25519 to the default identity list
  * Fixed sftp EOF packet handling
  * Fixed ssh_send_banner() to confirm with RFC 4253
  * Fixed some memory leaks
2018-10-16 20:25:25 +00:00
jaapb
bbf8742a9e Updated security/ocaml-safepass to version 3.0.
Changes include:
- use jbuilder for building
- allow picking different versions of Bcrypt hashes
- use unbuffered IO to read only required number of bytes from /dev/urandom
2018-10-15 11:26:59 +00:00
adam
f9ae290f5c py-libtaxii: updated to 1.1.111
Version 1.1.111:
Update clients.py to work with Python 2.6, 3.3, 3.5, and 3.6.
Add Python 3.6 support.
Handle Unicode- and byte-strings consistently.
Add timeout parameter to call_taxii_service2 (@mbekavac)
Add support for STIX 1.2.
Add user_agent parameter to call_taxii_service2
2018-10-15 11:17:08 +00:00
leot
676716cedd libtasn1: Update security/libtasn1 to 4.13
Changes:
- On indefinite string decoding, set a maximum level of allowed recursions
  (3) to protect the BER decoder from a stack exhaustion.
2018-10-13 23:23:20 +00:00
mlelstv
909c32eae5 update from 0.16.0 to 0.19.0
Project moved from sourceforge to github.
2018-10-13 10:54:04 +00:00
mlelstv
d1a26a9afc update from 1.8.20 to 1.8.24
new master site https://pcsclite.apdu.fr
2018-10-13 10:52:35 +00:00
spz
7e787fb5c6 this gpgme wants gpgrt_calloc etc that are introduced with libgpg-error 1.28 2018-10-11 17:49:26 +00:00
adam
7468cfe03d easy-rsa: updated to 3.0.5
3.0.5:
Fix: use AES256 for CA key
Also, don't use read -s, use stty -echo
Fix broken "nopass" option
Add -r to read to stop errors reported by shellcheck (and to behave)
remove overzealous quotes around $pkcs_opts (more SC errors)
Support for LibreSSL (now works on latest version of MacOS)
EasyRSA version will be reported in certificate comments
Client certificates now expire in 3 year (1080 days) by default
2018-10-11 09:13:30 +00:00
fhajny
3ba08d9b25 ## 0.11.2 (October 2nd, 2018)
CHANGES:

- `sys/seal-status` now includes an `initialized` boolean in the
  output. If Vault is not initialized, it will return a `200` with
  this value set `false` instead of a `400`.
- `passthrough_request_headers` will now deny certain headers from
  being provided to backends based on a global denylist.

FEATURES:

- AWS Secret Engine Root Credential Rotation: The credential used by
  the AWS secret engine can now be rotated, to ensure that only Vault
  knows the credentials it is using.
- Storage Backend Migrator: A new `operator migrate` command allows
  offline migration of data between two storage backends.
- AliCloud KMS Auto Unseal and Seal Wrap Support (Enterprise):
  AliCloud KMS can now be used a support seal for  Auto Unseal and
  Seal Wrapping.

BUG FIXES:

- auth/okta: Fix reading deprecated `token` parameter if a token was
  previously set in the configuration
- core: Re-add deprecated capabilities information for now
- core: Fix handling of cyclic token relationships
- storage/mysql: Fix locking on MariaDB
- replication: Fix DR API when using a token
- identity: Ensure old group alias is removed when a new one is
  written
- storage/alicloud: Don't call uname on package init
- secrets/jwt: Fix issue where request context would be canceled too
  early
- ui: fix need to have update for aws iam creds generation
- ui: fix calculation of token expiry

IMPROVEMENTS:

- auth/aws: The identity alias name can now configured to be either
  IAM unique ID of the IAM Principal, or ARN of the caller identity
- auth/cert: Add allowed_organizational_units support
- cli: Format TTLs for non-secret responses
- identity: Support operating on entities and groups by their names
- plugins: Add `env` parameter when registering plugins to the catalog
  to allow operators to include environment variables during plugin
  execution.
- secrets/aws: WAL Rollback improvements
- secrets/aws: Allow specifying STS role-default TTLs
- secrets/pki: Add configuration support for setting NotBefore
- core: Support for passing the Vault token via an Authorization
  Bearer header
- replication: Reindex process now runs in the background and does not
  block other vault operations
- storage/zookeeper: Enable TLS based communication with Zookeeper
- ui: you can now init a cluster with a seal config
- ui: added the option to force promote replication clusters
- replication: Allow promotion of a secondary when data is syncing
  with a "force" flag
2018-10-07 20:19:38 +00:00
adam
6e001f15d3 py-rsa: updated to 4.0
Version 4.0:
- Removed deprecated modules:
    - rsa.varblock
    - rsa.bigfile
    - rsa._version133
    - rsa._version200
- Removed CLI commands that use the VARBLOCK/bigfile format.
- Ensured that PublicKey.save_pkcs1() and PrivateKey.save_pkcs1() always return bytes.
- Dropped support for Python 2.6 and 3.3.
- Dropped support for Psyco.
- Miller-Rabin iterations determined by bitsize of key.
- Added function rsa.find_signature_hash() to return the name of the hashing
  algorithm used to sign a message. rsa.verify() now also returns that name,
  instead of always returning True.
- Add support for SHA-224 for PKCS1 signatures.
- Transitioned from requirements.txt to Pipenv for package management.
2018-10-07 10:41:52 +00:00
leot
0b72cb6185 sqlmap: Update security/sqlmap to 1.2.10
Changes:
- Unfortunately no changelog is provided but according commit messages bug fixes
  and misc improvements
2018-10-03 08:18:54 +00:00
triaxx
12e60941e2 sudo: update PLIST for zh_TW locale 2018-10-03 03:53:31 +00:00
wen
4a8e5dfaa9 Update to 0.31
Upstream changes:
0.31 Mon Sep 24 2018
    - Remove default of SHA256 for RSA keys. This has caused significant
      problems with downstream modules and it has always been possible to
      do $key->use_sha256_hash()
2018-10-02 12:26:12 +00:00
wen
33478dd820 Update to 2.060
Upstream changes:
2.060 2018/09/16
- support for TLS 1.3 with OpenSSL 1.1.1 (needs support in Net::SSLeay too)
  Thanks to ppisar[AT]redhat.com for major help
  see also https://rt.cpan.org/Ticket/Display.html?id=126899
  TLS 1.3 support is not complete yet for session resume
2018-10-02 01:03:33 +00:00
tnn
a6418d59ed gnutls: be explicit about --without-idn 2018-09-27 18:32:35 +00:00
tnn
6951fef3b3 p11-kit: Avoid non-portable use of readlink(1) in Makefile. 2018-09-27 18:06:36 +00:00
wiz
dce46fbb13 zkt: switch to an existing bind version
Only used on DragonFly
2018-09-27 04:23:12 +00:00
ryoon
7f19b6b9bf Fix segfault from -y case
* Bump PKGREVISION
2018-09-26 05:04:09 +00:00
adam
8c300d0786 py-oauth2client: updated to 4.1.3
v4.1.3

**Note**: oauth2client is deprecated. No more features will be added to the
libraries and the core team is turning down support.

* Changed OAuth2 endpoints to use oauth2.googleapis.com variants.
2018-09-24 09:52:24 +00:00
bsiegert
7ad478b4c3 Use correct versioned Go dependency, subst go tool path. 2018-09-23 18:39:22 +00:00
taca
003dd17690 security/ruby-rex-powershell: update to 0.1.79
0.1.78 (2018-06-21)

* Land #13, Update cmd_psh_payload to simplify exec_in_place

0.1.79 (2018-08-01)

* Land #12, Update GetMethod for GetProcAddress for Windows 10 1803
2018-09-23 18:02:07 +00:00
taca
0933551c2a security/ruby-rex-exploitation: update to 0.1.19
0.1.18

* Add CmdStager option to skip command compression

0.1.19

* Rename opts[:nocompress] to opts[:noconcat]
2018-09-23 18:00:56 +00:00
taca
9dc1f7620a security/ruby-rex-text: update to 0.2.21
0.2.17 (2018-02-09)

* Land #9, remove use of 'fun' keyword
* Land #10, add rand_country

0.2.18 (2018-04-12)

* Land #11, ranges for rand_base and rand_text_*

0.2.19 (2018-04-18)

* Land #13, add text encryption / encoding wrappers

0.2.20 (2018-04-18)

* Land #14, remove RC4/SHA256 support
* Land #12, bump ruby deps

0.2.21 (2018-06-13)

* Land #16, simplify shuffle_a implementation
* Land #17, speedup to_mixed_case_array
* Land #18, use single regular expression for strict case
* Land #19, remove unnecessary gsub regex to remove newline
* Land #21, add SHA2 digest wrappers
2018-09-23 18:00:00 +00:00
taca
c1b049ba03 security/ruby-rex-socket: update to 0.1.15
0.1.13

* add helper methods for determining supported SSL version methods

0.1.14

* Add IPv6 support to addr_atoc and addr_ctoa

0.1.15

* SSH socket registration removed
2018-09-23 17:58:47 +00:00
taca
499948e37f security/ruby-metasploit_payloads-mettle: update to 0.4.2
No proper change log is not available.  Please refer commit log:
<https://github.com/rapid7/mettle/commits/master>.
2018-09-23 17:57:29 +00:00
taca
370b0d6971 security/ruby-metasploit-payloads: update to 1.3.49
No proper change log is not available.  Please refer commit log:
<https://github.com/rapid7/metasploit-payloads/commits/master>.
2018-09-23 17:55:58 +00:00
taca
c86a47868c security/ruby-sshkit: update to 1.17.0
## [1.17.0][] (2018-07-07)

  * [#430](https://github.com/capistrano/sshkit/pull/430): [Feature] Command Argument STDOUT/capistrano.log Hiding - [@NorseGaud](https://github.com/NorseGaud)

## [1.16.1][] (2018-05-20)

  * [#425](https://github.com/capistrano/sshkit/pull/425): Command#group incorrectly escapes double quotes, resulting in a a syntax error when specifying the group execution using `as`. This issue manifested when user command quotes changed from double quotes to single quotes. This fix removes the double quote escaping - [@pblesi](https://github.com/pblesi).
2018-09-23 16:13:49 +00:00
taca
13aecfe3da security/ruby-nexpose: update to7.2.1
v7.2.1 (2018-06-01)

Merged pull requests:

* When passed a filename, download a report in chunks #321 (toofishes)
2018-09-23 16:11:24 +00:00
taca
f18c036194 security/ruby-net-ssh: update to 5.0.2
=== 5.0.2

  * fix ctr for jruby [#612]

=== 5.0.1

  * default_keys were not loaded even if no keys or key_data options specified [#607]

=== 5.0.0

 * Breaking change: ed25519 now requires ed25519 gem instead of RbNaCl gem [#563]
 * Verify_host_key options rename (true, false, :very, :secure depreacted new equivalents are :never, :accept_new_or_local_tunnel :accept_new :always) [Jared Beck, #595]

=== 5.0.0.rc2

 * Add .dll extensions to dlopen on cygwin [#603]
 * Fix host certificate validation [#601]

=== 5.0.0.rc1

 * Fix larger than 4GB file transfers [#599]
 * Update HTTP proxy to version 1.1 [Connor Dunn, #597]

=== 5.0.0.beta2

 * Support for sha256 pubkey fingerprint [Tom Maher, #585]
 * Don't try to load default_keys if key_data option is used [Josh Larson, #589]
 * Added fingerprint_hash defaulting to SHA256 as fingerprint format, and MD5 can be used as an option [Miklós Fazekas, #591]

=== 5.0.0.beta1

 * Don't leave proxy command as zombie on timeout [DimitriosLisenko, #560]
 * Use OpenSSL for aes*-ctr for up to 5x throughput improvement [Miklós Fazekas, Harald Sitter, #570]
 * Optimize slice! usage in CTR for up to 2x throughput improvement [Harald Sitter, #569]
 * Replace RbNaCl dependency with ed25519 gem [Tony Arcieri ,#563]
 * Add initial Match support [Kasumi Hanazuki,  #553]
2018-09-23 16:08:58 +00:00
taca
a7290f3e27 security/ruby-bcrypt: update to 3.1.12
3.1.12 May 16 2018
  - Add support for Ruby 2.3, 2.4, and 2.5 in compiled Windows binaries
  - Fix compatibility with libxcrypt [GH #164 by @besser82]
2018-09-23 16:05:28 +00:00
leot
1ca7c1ee7a password-store: Adjust BASE64 definition as part of fixsh SUBST class
Instead of using a generic `base64' initialize the BASE64 variable in order to
actually use converters/base64 (this was problematic when for example NetBSD
base64(1) was used).

Bump PKGREVISION
2018-09-23 12:39:19 +00:00
taca
bff087ce15 security/sudo: update to 1.8.25p1
What's new in Sudo 1.8.25p1

 * Fixed a bug introduced in sudo 1.8.25 that caused a crash on
   systems that have the poll() function but not the ppoll() function.
   Bug #851.
2018-09-23 03:48:20 +00:00
wiz
703e2bf1cc gnutls: add another REPLACE_BASH so the tests all run through 2018-09-21 14:20:11 +00:00
adam
03582f6e6c py-paramiko: updated to 2.4.2
2.4.2:
Fix exploit (CVE pending) in Paramiko’s server mode (not client mode) where hostile clients could trick the server into thinking they were authenticated without actually submitting valid authentication.

Specifically, steps have been taken to start separating client and server related message types in the message handling tables within Transport and AuthHandler; this work is not complete but enough has been performed to close off this particular exploit (which was the only obvious such exploit for this particular channel).

Modify protocol message handling such that Transport does not respond to MSG_UNIMPLEMENTED with its own MSG_UNIMPLEMENTED. This behavior probably didn’t cause any outright errors, but it doesn’t seem to conform to the RFCs and could cause (non-infinite) feedback loops in some scenarios (usually those involving Paramiko on both ends).
Add *.pub files to the MANIFEST so distributed source packages contain some necessary test assets. Credit: Alexander Kapshuna.
Backport pytest support and application of the black code formatter (both of which previously only existed in the 2.4 branch and above) to everything 2.0 and newer. This makes back/forward porting bugfixes significantly easier.
Backport changes from 979 (added in Paramiko 2.3) to Paramiko 2.0-2.2, using duck-typing to preserve backwards compatibility. This allows these older versions to use newer Cryptography sign/verify APIs when available, without requiring them (as is the case with Paramiko 2.3+).
2018-09-21 11:04:16 +00:00
adam
300f5c526b py-asyncssh: updated to 1.14.0
Release 1.14.0:
Changed license from EPL 1.0 to EPL 2.0 with GPL 2.0 or later as an available secondary license.
Added support for automatically parallelizing large reads and write made using the SFTPClientFile class, similar to what was already available in the get/put/copy methods of SFTPClient.
Added support for get_extra_info() in SSH process classes, returning information associated with the channel the process is tied to.
Added new set_extra_info() method on SSH connection and channel classes, allowing applications to store additional information on these objects.
Added handlers for OpenSSH keepalive global & channel requests to avoid messages about unknown requests in the debug log. These requests are still logged, but at debug level 2 instead of 1 and they are not labeled as unknown.
Fixed race condition when closing sockets associated with forwarded connections.
Improved error handling during connection close in SFTPClient.
Worked around issues with integer overflow on systems with a 32-bit time_t value when dates beyond 2038 are used in X.509 certificates.
Added guards around some imports and tests which were causing problems on Fedora 27.
Changed debug level for reporting PTY modes from 1 to 2 to reduce noise in the logs.
Improved SFTP debug log output when sending EOF responses.
2018-09-21 10:58:59 +00:00
adam
08305a393a sudo: updated to 1.8.25
What's new in Sudo 1.8.25

 * Fixed a bug introduced in sudo 1.8.20 that broke formatting of
   I/O log timing file entries on systems without a C99-compatible
   snprintf() function.  Our replacement snprintf() doesn't support
   floating point so we can't use the "%f" format directive.

 * I/O log timing file entries now use a monotonic timer and include
   nanosecond precision.  A monotonic timer that does not increment
   while the system is sleeping is used where available.

 * Fixed a bug introduced in sudo 1.8.24 where sudoNotAfter in the LDAP
   backend was not being properly parsed.

 * When sudo runs a command in a pseudo-tty, the slave device is
   now closed in the main process immediately after starting the
   monitor process.  This removes the need for an AIX-specific
   workaround that was added in sudo 1.8.24.

 * Added support for monotonic timers on HP-UX.

 * Fixed a bug displaying timeout values the "sudo -V" output.
   The value displayed was 3600 times the actual value.

 * Fixed a build issue on AIX 7.1 BOS levels that include memset_s()
   and define rsize_t in string.h.

 * The testsudoers utility now supports querying an LDIF-format
   policy.

 * Sudo now sets the LOGIN environment variable to the same value as
   LOGNAME on AIX systems.

 * Fixed a regression introduced in sudo 1.8.24 where the LDAP and
   SSSD backends evaluated the rules in reverse sudoOrder.
2018-09-21 10:33:34 +00:00
leot
d239733a29 password-store: Remove no longer needed patch-contrib_dmenu_passmenu
xdotool-3.20160805.1 supports the --file option.

Please also note that with the previous patch spaces in password
were ignored possibly leading to surprising and incorrect paste,
sorry for that! (now they should work fine)

Bump PKGREVISION
2018-09-19 09:45:18 +00:00
schmonz
1dc8084740 Remove decade-old warning that stunnel moved from sbin to bin. 2018-09-14 16:37:41 +00:00
fhajny
fbd28ecc36 security/openssl: Update to 1.0.2p.
- Client DoS due to large DH parameter

  During key agreement in a TLS handshake using a DH(E) based ciphersuite a
  malicious server can send a very large prime value to the client. This will
  cause the client to spend an unreasonably long period of time generating a
  key for this prime resulting in a hang until the client has finished. This
  could be exploited in a Denial Of Service attack.

  This issue was reported to OpenSSL on 5th June 2018 by Guido Vranken
  (CVE-2018-0732)
  [Guido Vranken]

- Cache timing vulnerability in RSA Key Generation

  The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to
  a cache timing side channel attack. An attacker with sufficient access to
  mount cache timing attacks during the RSA key generation process could
  recover the private key.

  This issue was reported to OpenSSL on 4th April 2018 by Alejandro Cabrera
  Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis Manuel Alvarez Tapia.
  (CVE-2018-0737)
  [Billy Brumley]

- Make EVP_PKEY_asn1_new() a bit stricter about its input.  A NULL pem_str
  parameter is no longer accepted, as it leads to a corrupt table.  NULL
  pem_str is reserved for alias entries only.
  [Richard Levitte]

- Revert blinding in ECDSA sign and instead make problematic addition
  length-invariant. Switch even to fixed-length Montgomery multiplication.
  [Andy Polyakov]

- Change generating and checking of primes so that the error rate of not
  being prime depends on the intended use based on the size of the input.
  For larger primes this will result in more rounds of Miller-Rabin.
  The maximal error rate for primes with more than 1080 bits is lowered
  to 2^-128.
  [Kurt Roeckx, Annie Yousar]

- Increase the number of Miller-Rabin rounds for DSA key generating to 64.
  [Kurt Roeckx]

- Add blinding to ECDSA and DSA signatures to protect against side channel
  attacks discovered by Keegan Ryan (NCC Group).
  [Matt Caswell]

- When unlocking a pass phrase protected PEM file or PKCS#8 container, we
  now allow empty (zero character) pass phrases.
  [Richard Levitte]

- Certificate time validation (X509_cmp_time) enforces stricter
  compliance with RFC 5280. Fractional seconds and timezone offsets
  are no longer allowed.
  [Emilia Käsper]
2018-09-12 12:44:17 +00:00
schmonz
f80e881160 Update to 5.49. From the changelog:
* New features
  - Performance optimizations.
  - Logging of negotiated or resumed TLS session IDs (thx
    to ANSSI - National Cybersecurity Agency of France).
  - Merged Debian 10-enabled.patch and 11-killproc.patch
    (thx to Peter Pentchev).

* Bugfixes
  - Fixed a crash in the session persistence implementation.
  - Fixed syslog identifier after configuration file reload.
  - Fixed non-interactive "make check" invocations.
  - Fixed reloading syslog configuration.
  - stunnel.pem created with SHA-256 instead of SHA-1.
  - SHA-256 "make check" certificates.
2018-09-11 09:43:41 +00:00
schmonz
7570c0498e Update to 4.0.4. From the git log:
- Make regular expression accept a whitespace after CN.
- Don't fail on openssl 1.1 output
- Add documentation and support for Red Hat openssl directories
- fix parsing of new (?) openssl output format
- Fix broken Markdown headings
- FIX CN parsing to work with OpenSSL 1.1
- Make acme_tiny.py executable in index
- Minor tweak that makes deploying a tiny bit easier
- OpenSSL output seems to have changed another time.
- fixed changing error message
- fixed more error message case changes
- Fix typos
- switched to grabbing the agreement url from /directory, addresses #145, #148, #172, #189
- damn python3 bytes-to-strings encoding gets you again...
- added python 3.6 to test coverage
- update SSL config
- mostly working ACMEv2, except for letsencrypt/boulder#3367
- deprecated CA url in favor of using the direct certificate authority directory url
- added badNonce retries
- consolidated external commandline execution error handling to bring back under 200 lines of code
- removed challenge payload that is no longer needed in new acme spec
- updated test coverage to ignore new setup.py file (setup install still gets tested via test_install.py)
- updated readme to note that ACME v2 certificate downloads now include the intermediate certificate
- added optional contact details
- fixed buffer to unicode decoding for tests
- cleaned up help and copyright text
- Readme: Only needs access to private account key
- added tiny user agent
- don't skip ValueError when urlopen(Request(nonvalid, ...))
2018-09-08 18:52:18 +00:00
fhajny
c311f77703 security/hitch: Update to 1.4.8.
hitch-1.4.8 (2018-04-19)
------------------------

- Reworked the dynamic backend bits.
- Update docs to recommend running Hitch as a separate non-privileged
  user.

hitch-1.4.7 (2018-01-11)
------------------------

- Massive test suite refactor and update.
- Fix OpenBSD/FreeBSD/POSIX portability issues: restrict fstat(1) to
  OpenBSD, bring sockstat(1) support back, drop pathchk(1) usage in
  the test suite, switch from sockstat(1) to fstat(1)
- Add an OCSP refresh timeout parameter
- Autotools polish
- Random usage of config section if reduntant
- Support for separate key files
- Fix logging to syslog even when set to syslog = off
- Making log-filename, recv-bufsize and send-bufsize parameters
  available though command line and config file.
- Fix: global backaddr is assumed to be static
- Add support for session-cache in config file and as cmdline option
- Plug file descriptor leak: killing worker processes would leave the
  pipe's write end open, leaking one file descriptor per worker upon
  reload
2018-09-07 13:54:45 +00:00
fhajny
d0fc14b184 security/vault: Update to 0.11.1.
SECURITY:

- Random Byte Reading in Barrier: Prior to this release, Vault was not
  properly checking the error code when reading random bytes for the IV for
  AES operations in its cryptographic barrier. Specifically, this means that
  such an IV could potentially be zero multiple times, causing nonce re-use
  and weakening the security of the key. On most platforms this should never
  happen because reading from kernel random sources is non-blocking and always
  successful, but there may be platform-specific behavior that has not been
  accounted for. (Vault has tests to check exactly this, and the tests have
  never seen nonce re-use.)

FEATURES:

- AliCloud Agent Support: Vault Agent can now authenticate against the
  AliCloud auth method.
- UI: Enable AliCloud auth method and Azure secrets engine via the UI.

IMPROVEMENTS:

- core: Logging level for most logs (not including secrets/auth plugins) can
  now be changed on-the-fly via `SIGHUP`, reading the desired value from
  Vault's config file

BUG FIXES:

- core: Ensure we use a background context when stepping down
- core: Properly check error return from random byte reading
- core: Re-add `sys/` top-route injection for now
- core: Properly store the replication checkpoint file if it's larger than the
  storage engine's per-item limit
- identity: Update MemDB with identity group alias while loading groups
- secrets/database: Fix nil pointer when revoking some leases
- secrets/pki: Fix sign-verbatim losing extra Subject attributes
- secrets/pki: Remove certificates from store when tidying revoked
  certificates and simplify API
- ui: JSON editor will not coerce input to an object, and will now show an
  error about Vault expecting an object
- ui: authentication form will now default to any methods that have been tuned
  to show up for unauthenticated users
2018-09-06 20:41:53 +00:00
adam
210800f5a9 py-trustme: added version 0.4.0
trustme is a tiny Python package that does one thing: it gives you a fake
certificate authority (CA) that you can use to generate fake TLS certs to use
in your tests. Well, technically they're real certs, they're just signed by
your CA, which nobody trusts. But you can trust it. Trust me.
2018-09-06 13:36:16 +00:00
adam
ae27f264b5 py-paramiko: BUILD_DEPENDS -> TEST_DEPENDS 2018-09-06 13:28:00 +00:00
fhajny
8665bb2c38 security/py-certbot-dns-rfc2136: Fix EGG_NAME. 2018-09-06 12:26:43 +00:00
fhajny
da4b10957e py-{acme,certbot}: Update to 0.27.0.
## 0.27.0 - 2018-09-05

### Added

- The Apache plugin now accepts the parameter --apache-ctl which can
  be used to configure the path to the Apache control script.

### Changed

- When using `acme.client.ClientV2` (or
 `acme.client.BackwardsCompatibleClientV2` with an ACME server that
 supports a newer version of the ACME protocol), an
 `acme.errors.ConflictError` will be raised if you try to create
 an ACME account with a key that has already been used. Previously,
 a JSON parsing error was raised in this scenario when using the
 library with Let's Encrypt's ACMEv2 endpoint.

### Fixed

- When Apache is not installed, Certbot's Apache plugin no longer
  prints messages about being unable to find apachectl to the
  terminal when the plugin is not selected.
- If you're using the Apache plugin with the --apache-vhost-root flag
  set to a directory containing a disabled virtual host for the
  domain you're requesting a certificate for, the virtual host will
  now be temporarily enabled if necessary to pass the HTTP challenge.
- The documentation for the Certbot package can now be built using
  Sphinx 1.6+.
- You can now call `query_registration` without having to first call
  `new_account` on `acme.client.ClientV2` objects.
- The requirement of `setuptools>=1.0` has been removed from
  `certbot-dns-ovh`.
- Names in certbot-dns-sakuracloud's tests have been updated to refer
  to Sakura Cloud rather than NS1 whose plugin certbot-dns-sakuracloud
  was based on.

## 0.26.1 - 2018-07-17

### Fixed

- Fix a bug that was triggered when users who had previously manually
  set `--server` to get ACMEv2 certs tried to renew ACMEv1 certs.
2018-09-06 12:25:26 +00:00
leot
70f6e58fbf sqlmap: Update security/sqlmap to 1.2.9
Changes:
Unfortunately no changelog is provided upstream. According skimming of commit
messages mostly bug fixes since 1.2.
2018-09-05 19:34:03 +00:00
ryoon
cf4a7b7df0 Update to 2.2.10
Changelog:
Noteworthy changes in version 2.2.10 (2018-08-30)
-------------------------------------------------

  gpg: Refresh expired keys originating from the WKD.  [#2917]

  gpg: Use a 256 KiB limit for a WKD imported key.

  gpg: New option --known-notation.  [#4060]

  scd: Add support for the Trustica Cryptoucan reader.

  agent: Speed up starting during on-demand launching.  [#3490]

  dirmngr: Validate SRV records in WKD queries.
2018-09-05 15:41:12 +00:00
adam
68c7635d39 Removed py-oauth, py-oauth2 2018-09-05 09:21:51 +00:00