Commit graph

677 commits

Author SHA1 Message Date
hubertf
1791cbecbb etc/rc.d cleanup: rename *.sh -> * 2001-01-26 05:21:43 +00:00
wiz
206133a012 Fix DEPENDS line. 2001-01-25 10:47:39 +00:00
dmcmahill
e3ab3aba58 remove PLIST entries which are not installed (on a.out _or_ ELF) 2001-01-23 20:55:21 +00:00
tron
707845f16f Use "--with-pem-dir" to specify directory where "stunnel.pem" is located. 2001-01-22 16:31:49 +00:00
jlam
fcd38b24af CONFLICTS= foo-* --> CONFLICTS= foo-[0-9]* 2001-01-22 14:23:43 +00:00
martin
ae1a666f1c Update pkg to stunnel-3.11.
Fixes key-length and zombies problems.
2001-01-22 13:30:36 +00:00
tron
778c32c173 Install "tcpd.h" required to build applications using "libwrap". 2001-01-21 01:22:08 +00:00
tron
eacf8a8b76 Add and enable "tcp_wrappers". 2001-01-19 21:19:40 +00:00
tron
15e41b9632 Import Solaris only "tcp_wrappers" package:
Monitor and filter incoming requests for network services
2001-01-19 21:18:16 +00:00
explorer
660d1d40cf Enabel p5-Crypto-CBC and p5-Crypto-Blowfish 2001-01-18 18:25:39 +00:00
explorer
11e2dc4780 Add p5-Crypt-Blowfish, an implementation of Blowfish for Perl5 2001-01-18 18:25:19 +00:00
explorer
323b9cbf36 add p5-Crypt-CBC, a cypher block chaining module which works with various crypto algorithms. 2001-01-18 18:24:43 +00:00
hubertf
ae66ad726e ve this a chance to build on 1.5 - defined sa_family_t (taken from -current) 2001-01-18 04:55:30 +00:00
wiz
001fec7fa0 Should make this buildable on Solaris, too. Untested for lack of Solaris. 2001-01-17 10:46:30 +00:00
wiz
982b769774 If we have to choose if this works on Solaris or NetBSD, prefer NetBSD.
XXX: This needs some work. How to handle platform-dependent patches?
What's the problem with using the NetBSD patches on Solaris?
2001-01-17 10:09:51 +00:00
itojun
ff695abc75 add security/scanssh 2001-01-15 06:41:03 +00:00
itojun
1e9efb9271 scanssh, ssh remote version scanner 2001-01-15 06:40:23 +00:00
tron
fa7191ae26 Pass "${CC}" to configure script. 2001-01-14 01:52:23 +00:00
tron
67350f5123 Regen. 2001-01-14 01:51:53 +00:00
tron
cc4979a399 Don't force to use WS 5.0 on Solaris. 2001-01-14 01:51:12 +00:00
jlam
0d35bbc9aa Use SSLCERTS for location of OpenSSL certificates directory. 2001-01-13 18:39:44 +00:00
dent
03b5b152e9 Fix typo. 2001-01-11 21:21:17 +00:00
tron
8016e23d6e Make this package work under SunOS. 2001-01-10 16:05:52 +00:00
tron
17e236023d Don't check for "/dev/urandom" under Solaris. 2001-01-10 15:10:59 +00:00
abs
ecb56c281b Update HOMEPAGE 2001-01-09 17:50:03 +00:00
itojun
860cfd39b1 add security/pakemon 2001-01-09 06:33:21 +00:00
itojun
0c5022760e pakemon, japanese-made IDS 2001-01-09 06:32:42 +00:00
itojun
72b96a6da6 typo. freebsd PR 24127 2001-01-08 06:33:42 +00:00
hubertf
aef6c5d86f If someone installs openssh on netbsd and then pkg_deletes it again,
he sure does NOT want to nuke /etc/ssh* - adjust to ssh*_config.
2001-01-07 05:07:17 +00:00
wiz
d9272f7dbd Update to 4114. 2001-01-07 00:29:10 +00:00
agc
9c2d582fc9 The way that shared objects were handled in the PLISTs and bsd.pkg.mk was
out of date - it was based on a.out OBJECT_FMT, and added entries in the
generated PLISTs to reflect the symlinks that ELF packages uses. It also
tried to be clever, and removed and recreated any symbolic links that were
created, which has resulted in some fun, especially with packages which
use dlopen(3) to load modules. Some recent changes to our ld.so to bring
it more into line with other Operating Systems also exposed some cracks.

+ Modify bsd.pkg.mk and its shared object handling, so that PLISTs now contain
the ELF symlinks.
+ Don't mess about with file system entries when handling shared objects in
bsd.pkg.mk, since it's likely that libtool and the BSD *.mk processing will
have got it right, and have a much better idea than we do.
+ Modify PLISTs to contain "ELF symlinks"
+ On a.out platforms, delete any "ELF symlinks" from the generated PLISTs
+ On ELF platforms, no extra processing needs to be done in bsd.pkg.mk
+ Modify print-PLIST target in bsd.pkg.mk to add dummy symlink entries on
a.out platforms
+ Update the documentation in Packages.txt

With many thanks to Thomas Klausner for keeping me honest with this.
2001-01-04 15:10:17 +00:00
veego
af1c220995 Use USE_SSL and not DEPENDS=openssl 2001-01-02 22:38:43 +00:00
rh
c605593411 Add and enable sslwrap 2000-12-30 20:14:26 +00:00
rh
785e7a5601 Resolve conflicts from earlier import (the package was apparently already
added and then deleted again during the last freeze)
2000-12-30 20:12:16 +00:00
rh
54b00999bb Initial import of sslwrap-206, a simple SSL TCP wrapper. 2000-12-30 20:04:25 +00:00
wiz
04c985472d Enable on alpha again; according to itojun, the referenced PR doesn't
apply to the package.
2000-12-28 21:35:34 +00:00
wiz
7cb1efe1ab add and enable rid 2000-12-28 14:10:03 +00:00
abs
e0ea3850b0 Update to dat-4112 2000-12-21 17:47:10 +00:00
hubertf
d64abcf879 Import rip-1.11:
Remote Intrusion Detection to track down compromised hosts

Purpose: To use intrusion fingerprints to track down compromised hosts.
Scope:   TCP/UDP/ICMP (No fragmentation reassembly)
Specs:   Program can create somewhat arbitrary UDP/ICMP/TCP packets/streams
         and send them to a range of hosts.  It also listens promiscuously
	 for predefined intrusion "fingerprints".
2000-12-21 13:35:49 +00:00
itojun
492a3ea7c8 it seems that the tar.gz was replaced without filename change. 2000-12-20 04:16:25 +00:00
jlam
47dddbae81 Update stunnel to 3.9. For NetBSD, if in-tree OpenSSL exists, then the
default certificate directory is now /etc/openssl/certs (matches OpenSSL's
default), but if stunnel uses the pkgsrc OpenSSL, then the default is
${PREFIX}/certs.

Changes from version 3.8 include:

* Updated temporary key generation:
   - stunnel is now honoring requested key-lengths correctly,
   - temporary key is changed every hour.
* transfer() no longer hangs on some platforms.
  Special thanks to Peter Wagemans for the patch.
* Potential security problem with syslog() call fixed.
* use daemon() function instead of daemonize, if available
* added -S flag, allowing you to choose which default verify
  sources to use
* relocated service name output logging until after log_open.
  (no longer outputs log info to inetd socket, causing bad SSL)
* -V flag now outputs the default values used by stunnel
* Added rigerous PRNG seeding
* PID changes (and related security-fix)
* Man page fixes
* Client SSL Session-IDs now used
* -N flag to specify tcpwrapper service name

* UPGRADE NOTE: this version seriously changes several previous stunnel
  default behaviours.  There are no longer any default cert file/dirs
  compilied into stunnel, you must use the --with-cert-dir and
  --with-cert-file configure arguments to set these manually, if desired.
  Stunnel does not use the underlying ssl library defaults by default
  unless configured with --enable-ssllib-cs.  Note that these can always
  be enabled at run time with the -A,-a, and -S flags.
  Additionally, unless --with-pem-dir is specified at compile time,
  stunnel will default to looking for stunnel.pem in the current directory.
2000-12-19 07:03:21 +00:00
itojun
bc03f88c7b upgrade to 2.3. XXX not sure if patch-aa is right or not.
pcap-int.h is normally installed, as it is internal to libpcap.


$Id: CHANGES,v 1.54 2000/12/17 16:39:05 dugsong Exp $

v2.3 Sun Dec 17 11:35:38 EST 2000

- Add VRRP parsing to dsniff, from Eric Jackson <shinobi@monkey.org>.

- Require pcap filter argument for tcpkill, tcpnice.

- Add Microsoft PPTP MS-CHAP (v1, v2) parsing to dsniff, based on
  anger.c by Aleph One <aleph1@securityfocus.com>.

- Fix pcAnywhere 7, 9.x parsing in dsniff.

- Add -t trigger[,...] flag to dsniff, to specify individual triggers
  on the command line.

- Convert most everything to use new buf interface.

- New programs: dnsspoof, msgsnarf, sshmitm, webmitm.

- Fix inverted regex matching in *snarf programs.

- Consistent arpspoof, macof, tcpnice, tcpkill output.

- Rename arpredirect to arpspoof (maintain consistent *sniff, *snarf,
  *spoof, *spy nomenclature).

- Consistent pcap filter argument to dsniff, *snarf programs.

- Add trigger for Checkpoint Firewall-1 Session Authentication Agent
  (261/tcp), as suggested by Joe Segreti <seg@clark.net>.

- Add SMTP parsing to dsniff, as requested by Denis Ducamp
  <Denis.Ducamp@hsc.fr>.

- Add rexec and RPC ypserv parsing to dsniff, as requested by
  Oliver Friedrichs <of@securityfocus.com>.

- Add HTTP proxy auth parsing back to dsniff, it got lost in the
  shuffle. Reported by Denis Ducamp <Denis.Ducamp@hsc.fr>.

- Add NNTPv2 and other AUTHINFO extensions to dsniff.
2000-12-18 08:49:38 +00:00
wiz
e5c7741cff Update to latest distfile. 2000-12-15 20:18:49 +00:00
wiz
a871a49684 Update to 1.1 because of a possible security problem:
The socket creation code in fshd was not paranoid enough.  There
 were are at least two possible attacks:
 - If a malicious user has symlinked /tmp/fshd-<UID> to another
   file, fshd will chmod 0700 that file.
 - A race condition made it possible for an attacker to create an
   unsafe socket directory, so that the attacker can access an
   fshd tunnel.
 The attacker must alread have a local shell on the computer where
 fsh or fshd is invoked.
Other changes:
New timeout option, fixed to work with openssh2, now also usable if
you have to enter a password to connect, and some others.
2000-12-14 11:55:03 +00:00
jlam
012eb86717 Rename pwcheck' rc.d control script to sasl_pwcheck' to avoid name clash
with NetBSD 1.5's existing /etc/rc.d/pwcheck script.
2000-12-13 16:24:50 +00:00
itojun
d5689c8473 remove bogus bound-check. need revisit (DoS issue is not re-introduced).
sync with kame
2000-12-12 08:16:00 +00:00
wiz
a32b3a5655 Unify Makefiles -- mostly headers: remove FreeBSD Ids.
Consistent 4 character indentation of SUBDIR entries.
2000-12-12 01:30:36 +00:00
jlam
6c06179a66 Better whitespace control in message. 2000-12-11 09:10:24 +00:00
jlam
7a4ca6c19b Replace a few more utilities with their paths from bsd.pkg.mk. 2000-12-11 09:04:52 +00:00
itojun
767d3adb3c upgrade to the latest (2000/12/11). most important change is that prior
versions had DoS possiblity, due to insufficient length check.
2000-12-11 09:01:45 +00:00