Commit graph

7618 commits

Author SHA1 Message Date
wiz
a7e3cf4059 Update to 2.0.27:
Noteworthy changes in version 2.0.27 (2015-02-18)
-------------------------------------------------

 * gpg: Detect faulty use of --verify on detached signatures.

 * gpg: New import option "keep-ownertrust".

 * gpg: Uses SHA-256 for all signature types also on RSA keys.

 * gpg: Added support for algo names when generating keys using the
   --command-fd method.

 * gpg: Unless --allow-weak-digest-algos is used the insecure MD5
   based fingerprints are shown as all zeroe

 * gpg: Fixed DoS based on bogus and overlong key packets.

 * gpg: Better error reporting for keyserver problems.

 * Fixed several bugs related to bogus keyrings and improved some
   other code.
2015-02-21 09:08:53 +00:00
fhajny
a6b55d6f0e Fix SSL queue handling based on an upstream patch. PKGREVISION++
https://github.com/bumptech/stud/pull/130
2015-02-20 09:32:07 +00:00
joerg
66a22fb17d Recognize evbarm. 2015-02-19 14:25:12 +00:00
wiz
70858bd1fb Update to 0.52:
0.52 - 2016-02-16
 - Skip "grp" records, generated by GPG 2.1; this suppresses "unknown
   record type" warnings
 - Add explicit Fatal dependency; though nominally part of code perl,
   RedHat's perl does not ship with it
 - Ensure that the trustdb is created before attempting to encrypt; gpg2
   requires that it exist, even for commands with --trust-model=always.
   See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751266
2015-02-19 13:18:10 +00:00
joerg
6b680a78b5 Wants qmake for qt detection. 2015-02-18 20:46:48 +00:00
tnn
a84f21ab9f Update to mozilla-rootcerts-20141117.
Added root certs:

C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority
C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=Terms of use at https://www.verisign.com/rpa (c)09, CN=VeriSign Class 3 Secure Server CA - G2
C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust ECC Certification Authority
C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority
OU=GlobalSign ECC Root CA - R4, O=GlobalSign, CN=GlobalSign
OU=GlobalSign ECC Root CA - R5, O=GlobalSign, CN=GlobalSign

Removed root certs:

C=US, O=America Online Inc., CN=America Online Root Certification Authority 1
C=US, O=America Online Inc., CN=America Online Root Certification Authority 2
C=US, O=GTE Corporation, OU=GTE CyberTrust Solutions, Inc., CN=GTE CyberTrust Global Root
C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Premium Server CA/emailAddress=premium-server@thawte.com
C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Server CA/emailAddress=server-certs@thawte.com
2015-02-16 13:09:10 +00:00
jperkin
680762de01 Put back implementation of MASTER_SITE_OPENBSD. 2015-02-16 11:03:20 +00:00
rodent
3db7e53778 Source code documentation says that renaming -lcrypt to -lcrypto works on
Darwin. Let's do that instead of removing that library, since it would
involve disabling another CFLAG to function properly. Do the same for
OpenBSD which fixes the build there too. Add options.mk file to enable the
user to choose the libcrack and debug options at build time. Bump
PKGREVISION.
2015-02-16 00:25:45 +00:00
gls
8f8d3e1add Update security/password-store to 1.6.5
Upstream changes:
=================

Release 1.6.5. Changes:
== Features ==
* Support Gpg4win alongside Cygwin

== Bug Fixes ==
* Work around unit tests bug with GnuPG 2.1.0 and 2.1.1
* Manually migrate unit tests keys to GnuPG 2.1 series
* Restore support GnuPG 2.0 series


Release 1.6.4. Changes:
== Features ==
* "add" is an alias of "insert"
* `pass edit` will no longer make a commit if the password does not change
* Symbolic links are now followed
* Remove gpg agent check, due to the auto-starting gpg-agent in GnuPG 2.1

== Bug Fixes ==
* Avoid trailing slash in `pass grep`
* Account for $CLIP_TIME in messages
* revelation2pass, keepassx2pass, and other script improvements
* Fix .gpg extension in tree listings, and preserve colors
* Improved support for getopt on OSX
* Updates for zsh and fish completion autoloading
* Always preserve TTY for pinentry
* Only use encryption subkeys
* Better clip error messages
* No longer use hidden recipients
2015-02-15 18:58:40 +00:00
adam
2f1650ffbe Changes 1.0.2:
Suite B support for TLS 1.2 and DTLS 1.2
Support for DTLS 1.2
TLS automatic EC curve selection.
API to set TLS supported signature algorithms and curves
SSL_CONF configuration API.
TLS Brainpool support.
ALPN support.
CMS support for RSA-PSS, RSA-OAEP, ECDH and X9.42 DH.
2015-02-12 13:08:53 +00:00
jnemeth
21a3461659 sort 2015-02-12 05:09:34 +00:00
agc
7e5a773aa6 Update multigest and libmultigest to version 20150211
+ bring over lint fixes from the version in othersrc
+ document the concat, comb4p, xor and hash combiner functions
2015-02-12 01:57:57 +00:00
adam
edc7180568 Changes 3.2.21:
** libgnutls: Corrected regression introduced in 3.2.19 related to
session renegotiation. Reported by Dan Winship.
** libgnutls: Corrected parsing issue with OCSP responses.
** API and ABI modifications:
No changes since last version.
2015-02-11 11:25:57 +00:00
spz
1c03c2f9fa update of sudo to the next upstream patch version (1.7.10p8 to 1.7.10p9)
Upstream Changelog:

+   The TZ environment variable is now checked for safety instead of
    simply being copied to the environment of the command.
    This fixes a potential security issue.

+   Sudo now only builds Position Independent Executables (PIE) by
    default on Linux systems and verifies that a trivial test program
    builds and runs.

+   On Solaris 11.1 and higher, sudo binaries will now have the ASLR tag
    enabled if supported by the linker.
2015-02-11 09:11:59 +00:00
wiz
28e2a250ef Add a build dependency on py-hgtools.
Seems to be needed, at least sometimes.
2015-02-09 18:55:45 +00:00
nils
7cffaeaa29 add & enable fail2ban 2015-02-09 10:06:48 +00:00
nils
08431a1378 Initial import of security/fail2ban, version 0.9.1, into the NetBSD Packages Collection.
Fail2Ban scans log files like /var/log/pwdfail and bans IP
that makes too many password failures. It updates firewall
rules to reject the IP address. Theses rules can be defined by
the user. Fail2Ban can read multiple log files such as sshd
or Apache web server ones.
2015-02-09 10:05:25 +00:00
wiz
2f92c4c1de Update to 5.0:
---
5.0
---

* Version numbering is now derived from the code repository tags via `hgtools
  <https://pypi.python.org/pypi/hgtools>`_.
* Build and install now requires setuptools.
2015-02-08 16:38:18 +00:00
agc
0cfaed6376 forcibly disable tools build when running the testing script - found when
testing the src/ version, benign for pkgsrc. ride previous version bump.
2015-02-05 01:28:25 +00:00
agc
804fbc2e4d appease compiler warning police - initialise a variable in case it's otherwise
"used uninitialised". ride previous version bump.
2015-02-05 00:58:02 +00:00
agc
b24a4c3e01 Update netpgpverify (and libnetpgpverify) to version 20150205
+ recognise signatures made by subkeys as well as by primary keys

+ print out the relevant key which signed the file, even if it's
a subkey and not the primary key itself.

+ keep the same API as before

with many thanks to Jonathan Perkin
2015-02-05 00:21:57 +00:00
agc
1d1b6986c4 The test file for the "one key" test has embedded CVS Identifiers, so
work around this.
2015-02-04 17:53:39 +00:00
agc
f5b8aa147a add a minimalist shell script to make a tarball of the sources - requested
by various people.
2015-02-04 17:45:04 +00:00
taca
61f2670d76 Update ruby-sshkit to 1.6.1.
## 1.6.0

  * Fix colorize to use the correct API (@fazibear)
  * Lock colorize (sorry guys) version at >= 0.7.0

## 1.6.0 (Yanked, because of colorize.)

  * Force dependency on colorize v0.6.0
  * Add your entries here, remember to credit yourself however you want to be
    credited!
  * Remove strip from capture to preserve whitespace. Nick Townsend
  * Add vmware_fusion Vagrant provider. Nick Townsend
  * Add some padding to the pretty log formatter

## 1.5.1

  * Use `sudo -u` rather than `sudo su` to switch users. Mat Trudel

## 1.5.0

  * Deprecate background helper - too many badly behaved pseudo-daemons. Lee Hambley
  * Don't colourize unless $stdout is a tty. Lee Hambley
  * Remove out of date "Known Issues" section from README. Lee Hambley
  * Dealy variable interpolation inside `as()` block. Nick Townsend
  * Fixes for functional tests under modern Vagrant. Lewis Marshal
  * Fixes for connection pooling. Chris Heald
  * Add `localhost` hostname to local backend. Adam Mckaig
  * Wrap execptions to include hostname. Brecht Hoflack
  * Remove `shellwords` stdlib dependency Bruno Sutic
  * Remove unused `cooldown` accessor. Bruno Sutic
  * Replace Term::ANSIColor with a lighter solution. Tom Clements
  * Documentation fixes. Matt Brictson

## 1.4.0

https://github.com/capistrano/sshkit/compare/v1.3.0...v1.4.0

  * Removed `invoke` alias for [`SSHKit::Backend::Printer.execute`](https://github.com/capistrano/sshkit/blob/master/lib/sshkit/backends/printer.rb#L20). This is to prevent collisions with
  methods in capistrano with similar names, and to provide a cleaner API. See [capistrano issue 912](https://github.com/capistrano/capistrano/issues/912) and [issue 107](https://github.com/capistrano/sshkit/issues/107) for more details.
  * Connection pooling now uses a thread local to store connection pool, giving each thread its own connection pool. Thank you @mbrictson see [#101](https://github.com/capistrano/sshkit/pull/101) for more.
  * Command map indifferent towards strings and symbols thanks to @thomasfedb see [#91](https://github.com/capistrano/sshkit/pull/91)
  * Moved vagrant wrapper to `support` directory, added ability to run tests with vagrant using ssh. @miry see [#64](https://github.com/capistrano/sshkit/pull/64)
  * Removed unnecessary require `require_relative '../sshkit'` in `lib/sshkit/dsl.rb` prevents warnings thanks @brabic.
  * Doc fixes thanks @seanhandley @vojto
2015-02-04 16:17:47 +00:00
taca
4629de0e8a Update ruby-shadow to 2.4.1.
[2014/12/02]
* Version 2.4.1
  - sp_loginclass support should NOT have been added to password implementation
[2014/12/01]
* Version 2.4.0
  - Add support for sp_loginclass via pwd.h
2015-02-04 16:14:57 +00:00
taca
e7b088b3d1 Update ruby-net-scp to 1.2.1.
=== 1.2.1 / 30 Apr 2014

* Resign gem with new pubkey

=== 1.2.0 / 11 Apr 2014

* Get the error string during download [jkeiser]
2015-02-04 16:11:32 +00:00
taca
1ce21bbb90 Update ruby-net-ssh to 2.9.2.
=== 2.9.2-rc3

* Remove advertised algorithms that were not working (curve25519-sha256@libssh.org) [mfazekas]

=== 2.9.2-rc2

* number_of_password_prompts is now accepted as ssh option, by setting it 0 net-ssh will not ask for password for password auth as with previous versions [mfazekas]

=== 2.9.2-rc1

* Documentation fixes and refactoring to keepalive [detiber, mfazekas]

=== 2.9.2-beta

* Remove advertised algorithms that were not working (ssh-rsa-cert-* *ed25519 acm*-gcm@openssh.com) [mfazekas]
* Unkown algorithms now ignored instead of failed [mfazekas]
* Asks for password with password auth (up to number_of_password_prompts) [mfazekas]
* Removed warnings [amatsuda]

=== 2.9.1 / 13 May 2014

* Fix for unknown response from agent on Windows with 64-bit PuTTY [chrahunt]
* Support negative patterns in host lookup from the SSH config file [nirvdrum]


=== 2.9.0 / 30 Apr 2014

* New ciphers [chr4]
  * Added host keys: ssh-rsa-cert-v01@openssh.com ssh-rsa-cert-v00@openssh.com ssh-ed25519-cert-v01@openssh.com ssh-ed25519
  * Added HMACs: hmac-sha2-512-etm@openssh.com hmac-sha2-256-etm@openssh.com umac-128-etm@openssh.com
  * Added Kex: aes256-gcm@openssh.com aes128-gcm@openssh.com curve25519-sha256@libssh.org
  * Added private key support for id_ed25519
* IdentiesOnly will not disable ssh_agent - fixes #148 and new fix for #137 [mfazekas]
* Ignore errors during ssh agent negotiation [simonswine, jasiek]
* Added an optional "options" argument to test socket open method [jefmathiot]
* Added gem signing (again) with new cert [delano]


=== 2.8.1 / 19 Feb 2014

* Correct location of global known_hosts files [mfischer-zd]
* Fix for password authentication [blackpond, zachlipton, delano]
2015-02-04 16:09:07 +00:00
taca
6f9a0726ec Update ruby-bcrypt to 3.1.10.
3.1.8  Oct 23 2014
  - Add support for Ruby 2.1 in compiled Windows binaries [GH #102]

3.1.9  Oct 23 2014
  - Rebuild corrupt binaries

3.1.10 Jan 28 2015
  - Fix issue with dumping a BCrypt::Password instance to YAML in Ruby 2.2 [GH #107 by @mattwildig]
2015-02-04 16:07:29 +00:00
wiz
56343eddac Update to 2.012. Depend on p5-Mozilla-CA.
2.012 2014/02/02
- fix t/ocsp.t in case no HTTP::Tiny is installed
2.011 2014/02/01
- fix t/ocsp.t - don't count on revoked.grc.com using OCSP stapling #101855
- added option 'purpose' to Utils::CERT_create to get better control of the
  certificates purpose. Default is 'server,client' for non-CA (contrary to
  only 'server' before)
- removed RC4 from default cipher suites on the server site
  https://github.com/noxxi/p5-io-socket-ssl/issues/22
- refactoring of some tests using Test::More thanks to Sweet-kid and the
  2015 Pull Request Challenge
2015-02-04 12:19:07 +00:00
agc
ada62f45b2 Update netpgpverify, and libnetpgpverify, to 20150204
+ dump the huge output to /dev/null so that we can see what's
happening with the other tests in testit.sh

+ fix from jperkin@, don't try to be clever when selecting the only
key id in a keyring

+ add a test for single key (non-ssh) pubring
2015-02-03 21:36:48 +00:00
agc
e5416534d1 Update netpgpverify, and libnetpgpverify, to 20150204
+ dump the huge output in testing script to /dev/null so that we can
see what's happening with the other tests in testit.sh

+ fix from jperkin@, don't try to be clever when selecting the only
key id in a keyring

+ add a test for single key (non-ssh) pubring
2015-02-03 21:34:57 +00:00
agc
5461aea2cb Update netpgpverify, and libnetpgpverify, to 20150203
+ portability fixes to make netpgpverify build on freebsd 10.1 with WARNS=5

+ fixed an oversight in the testit.sh script
2015-02-03 21:13:17 +00:00
wiz
536213f713 Update to 4.1:
4.1
---

* Added preliminary support for loading keyring backends through ``setuptools
  entry points``, specifically "keyring backends".
2015-02-01 19:51:37 +00:00
wiz
88db27cfbf Update to 1.18:
Noteworthy changes in version 1.18 (2015-01-26) [C14/A14/R0]
-----------------------------------------------

 * New translations for Hungarian, Portuguese, Russian, and
   traditional Chinese.  Updated other translations.

 * New error codes.

 * Interface changes relative to the 1.17 release:
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 GPG_ERR_FORBIDDEN                NEW.
 GPG_ERR_OBJ_TERM_STATE           NEW.
 GPG_ERR_REQUEST_TOO_SHORT        NEW.
 GPG_ERR_REQUEST_TOO_LONG         NEW.
 GPG_ERR_LEGACY_KEY               NEW.
2015-02-01 19:49:38 +00:00
obache
07f5a526c0 Revert "Define and use MASTER_SITE_OPENBSD.",
proposed/discussed is required for such changes.
2015-02-01 09:07:40 +00:00
agc
d5812ef86c allow the keyring to be set on the command line in the chk.sh script
this syncs with sources under src/crypto
2015-01-31 22:00:55 +00:00
agc
cd0b62f435 Missed file in previous - sync with reality... 2015-01-30 18:55:01 +00:00
agc
9f4436de94 Update to version 20150115.
This version includes support for the '-c dump' command, which dumps
the contents of all PGP packets to stdout.  Note that since we're
verifying, no private keys are involved.
2015-01-30 18:47:50 +00:00
jperkin
805047afbd Fix typo in previous. 2015-01-27 13:54:10 +00:00
jperkin
e31292423f Ensure we call the full path to the script. Bump PKGREVISION. 2015-01-27 13:53:06 +00:00
sevan
586c550bac On Darwin define BIND_8_COMPAT to resolve build issue as dsniff utilises the
BIND8 API, not the v9 API.

Closes PR pkg/39062
Reviewed by wiz@
2015-01-26 16:05:04 +00:00
joerg
5c69f67011 For clang, don't use the rotate inline asm, but expect the compiler to
generate optimal code.
2015-01-25 13:13:51 +00:00
wiz
f14da50ce3 Update to 1.68:
1.68 2015-01-24
     Fixed a problem on OSX when macports openssl 1.x is installed: headers from
     macport were found but older OSX openssl libraries were linked, resulting
     in "Symbol not found: _EVP_MD_do_all_sorted".
     Added notes about runtime error "no OPENSSL_Applink", when calling
     Net::SSLeay::P_PKCS12_load_file.
2015-01-25 11:58:41 +00:00
joerg
ab75586cc9 Not MAKE_JOBS_SAFE. 2015-01-23 15:09:26 +00:00
obache
c811308510 simplify MASTER_SITES subdirectory. 2015-01-23 06:22:20 +00:00
jaapb
714f854d4d Revbump associated with update of lang/ocaml. 2015-01-20 14:24:34 +00:00
wiz
a8a2723794 Update to 2.010:
2.010 2014/01/14
- new options SSL_client_ca_file and SSL_client_ca to let the server send
  the list of acceptable CAs for the client certificate.
- t/protocol_version.t - fix in case SSLv3 is not supported in Net::SSLeay.
  RT#101485, thanks to TEAM.
2015-01-18 18:58:17 +00:00
wiz
906c52359f Update to 1.67:
1.67 2015-01-17
     Improvements to inc/Module/Install/PRIVATE/Net/SSLeay.pm to handle the
     case whe there are muliple OPENSSLs installed. Patch from HBRAND
     Fixed a documentation error in get_peer_cert_chain, reported by tejas.
     Fixed a problem with building on Windows that prevented correct OpenSSL
     directory detection with version 1.0.1j as delivered with Shining Light OpenSSL.
     Fixed a problem with building on Windows that prevented finding MT or MD
     versions of SSL libraries.
     Updated doc in README.Win32 to build with Microsoft Visual Studio 2010 Express.
     Added Windows crypt32 library to Windows linking as some compilers/platforms seem to
     require it and it is innocuous otherwise. For Steve Hay.
     Fixed a failure in t/external/20_cert_chain.t where some platforms do not
     have HTTPS in /etc/services. Reported and patched by Gisle Aas.
     Recent 1.0.2 betas have dropped the SSLv3_method function.
     This patch leaves out the function on newer versions, much the same as
     the SSLv2 deprecation is handled. Patch from Tom Molesworth.
     Fix the ALPN test, which was incorrectly failing on OpenSSL due to the
     LibreSSL check (earlier versions bailed out before that line).Patch from
     Tom Molesworth.
2015-01-18 18:56:43 +00:00
wiz
079b2bfb97 Update to 0.7.2:
0.7.2 - 2015-01-16
~~~~~~~~~~~~~~~~~~

* Updated Windows wheels to be compiled against OpenSSL 1.0.1l.
* ``enum34`` is no longer installed on Python 3.4, where it is included in
  the standard library.
* Added a new function to the OpenSSL bindings to support additional
  functionality in pyOpenSSL.
2015-01-18 17:25:39 +00:00
wiz
1d580201bf Fix startup script. Bump PKGREVISION. From ISIHARA Takanori.
(Ooops, what happened here.)
2015-01-17 18:43:15 +00:00