Commit graph

7735 commits

Author SHA1 Message Date
nros
6fb82ca926 Revbump because of security/libbsh2 update. 2015-03-23 09:24:50 +00:00
nros
5f4c38a761 Update libssh2 to 1.5.0 to address CVE-2015-1782.
http://www.libssh2.org/adv_20150311.html

Set LICENSE.

Changelog:

This release includes the following changes:

 o Added Windows Cryptography API: Next Generation based backend

This release includes the following bugfixes:

 o Security Advisory for CVE-2015-1782, using SSH_MSG_KEXINIT data unbounded
 o missing _libssh2_error in _libssh2_channel_write
 o knownhost: Fix DSS keys being detected as unknown.
 o knownhost: Restore behaviour of `libssh2_knownhost_writeline` with short buffer.
 o libssh2.h: on Windows, a socket is of type SOCKET, not int
 o libssh2_priv.h: a 1 bit bit-field should be unsigned
 o windows build: do not export externals from static library
 o Fixed two potential use-after-frees of the payload buffer
 o Fixed a few memory leaks in error paths
 o userauth: Fixed an attempt to free from stack on error
 o agent_list_identities: Fixed memory leak on OOM
 o knownhosts: Abort if the hosts buffer is too small
 o sftp_close_handle: ensure the handle is always closed
 o channel_close: Close the channel even in the case of errors
 o docs: added missing libssh2_session_handshake.3 file
 o docs: fixed a bunch of typos
 o userauth_password: pass on the underlying error code
 o _libssh2_channel_forward_cancel: accessed struct after free
 o _libssh2_packet_add: avoid using uninitialized memory
 o _libssh2_channel_forward_cancel: avoid memory leaks on error
 o _libssh2_channel_write: client spins on write when window full
 o windows build: fix build errors
 o publickey_packet_receive: avoid junk in returned pointers
 o channel_receive_window_adjust: store windows size always
 o userauth_hostbased_fromfile: zero assign to avoid uninitialized use
 o configure: change LIBS not LDFLAGS when checking for libs
 o agent_connect_unix: make sure there's a trailing zero
 o MinGW build: Fixed redefine warnings.
 o sftpdir.c: added authentication method detection.
 o Watcom build: added support for WinCNG build.
 o configure.ac: replace AM_CONFIG_HEADER with AC_CONFIG_HEADERS
 o sftp_statvfs: fix for servers not supporting statfvs extension
 o knownhost.c: use LIBSSH2_FREE macro instead of free
 o Fixed compilation using mingw-w64
 o knownhost.c: fixed that 'key_type_len' may be used uninitialized
 o configure: Display individual crypto backends on separate lines
 o examples on Windows: check for WSAStartup return code
 o examples on Windows: check for socket return code
 o agent.c: check return code of MapViewOfFile
 o kex.c: fix possible NULL pointer de-reference with session->kex
 o packet.c: fix possible NULL pointer de-reference within listen_state
 o tests on Windows: check for WSAStartup return code
 o userauth.c: improve readability and clarity of for-loops
 o examples on Windows: use native SOCKET-type instead of int
 o packet.c: i < 256 was always true and i would overflow to 0
 o kex.c: make sure mlist is not set to NULL
 o session.c: check return value of session_nonblock in debug mode
 o session.c: check return value of session_nonblock during startup
 o userauth.c: make sure that sp_len is positive and avoid overflows
 o knownhost.c: fix use of uninitialized argument variable wrote
 o openssl: initialise the digest context before calling EVP_DigestInit()
 o libssh2_agent_init: init ->fd to LIBSSH2_INVALID_SOCKET
 o configure.ac: Add zlib to Requires.private in libssh2.pc if using zlib
 o configure.ac: Rework crypto library detection
 o configure.ac: Reorder --with-* options in --help output
 o configure.ac: Call zlib zlib and not libz in text but keep option names
 o Fix non-autotools builds: Always define the LIBSSH2_OPENSSL CPP macro
 o sftp: seek: Don't flush buffers on same offset
 o sftp: statvfs: Along error path, reset the correct 'state' variable.
 o sftp: Add support for fsync (OpenSSH extension).
 o _libssh2_channel_read: fix data drop when out of window
 o comp_method_zlib_decomp: Improve buffer growing algorithm
 o _libssh2_channel_read: Honour window_size_initial
 o window_size: redid window handling for flow control reasons
 o knownhosts: handle unknown key types
2015-03-23 09:14:53 +00:00
joerg
4f2fc835d7 Redo rpath handling as the option is leaked into the config binary.
Bump revision.
2015-03-22 20:09:09 +00:00
taca
bd724f7141 Fix PLIST which was for previous version of clamav.
Noted by joerg@.
2015-03-21 21:51:20 +00:00
jperkin
cbd3c21859 Ensure RANLIB is defined in the environment. 2015-03-21 19:39:44 +00:00
tron
faa762fe09 Fix build under Solaris 10. 2015-03-21 19:25:21 +00:00
wiz
fe50bcdc76 Add default-off libusb option.
If you enable this, scdaemon can use some USB Tokens without another
pcsc daemon.

From Yasushi Oshima in PR 49760.
2015-03-21 16:24:51 +00:00
rodent
a9770fe561 Fix build on FreeBSD. Approved by gdt@. 2015-03-20 22:41:19 +00:00
taca
9c0bd257c2 Restore hpn-patch delated DISTFIELS. 2015-03-20 02:34:32 +00:00
tron
e4fd5c0be9 Update "openssl" package to version 1.0.2. Changes since version 1.0.2a:
- ClientHello sigalgs DoS fix

  If a client connects to an OpenSSL 1.0.2 server and renegotiates with an
  invalid signature algorithms extension a NULL pointer dereference will
  occur. This can be exploited in a DoS attack against the server.

  This issue was was reported to OpenSSL by David Ramos of Stanford
  University.
  (CVE-2015-0291)
  [Stephen Henson and Matt Caswell]

- Multiblock corrupted pointer fix

  OpenSSL 1.0.2 introduced the "multiblock" performance improvement. This
  feature only applies on 64 bit x86 architecture platforms that support AES
  NI instructions. A defect in the implementation of "multiblock" can cause
  OpenSSL's internal write buffer to become incorrectly set to NULL when
  using non-blocking IO. Typically, when the user application is using a
  socket BIO for writing, this will only result in a failed connection.
  However if some other BIO is used then it is likely that a segmentation
  fault will be triggered, thus enabling a potential DoS attack.

  This issue was reported to OpenSSL by Daniel Danner and Rainer Mueller.
  (CVE-2015-0290)
  [Matt Caswell]

- Segmentation fault in DTLSv1_listen fix

  The DTLSv1_listen function is intended to be stateless and processes the
  initial ClientHello from many peers. It is common for user code to loop
  over the call to DTLSv1_listen until a valid ClientHello is received with
  an associated cookie. A defect in the implementation of DTLSv1_listen means
  that state is preserved in the SSL object from one invocation to the next
  that can lead to a segmentation fault. Errors processing the initial
  ClientHello can trigger this scenario. An example of such an error could be
  that a DTLS1.0 only client is attempting to connect to a DTLS1.2 only
  server.

  This issue was reported to OpenSSL by Per Allansson.
  (CVE-2015-0207)
  [Matt Caswell]

- Segmentation fault in ASN1_TYPE_cmp fix

  The function ASN1_TYPE_cmp will crash with an invalid read if an attempt is
  made to compare ASN.1 boolean types. Since ASN1_TYPE_cmp is used to check
  certificate signature algorithm consistency this can be used to crash any
  certificate verification operation and exploited in a DoS attack. Any
  application which performs certificate verification is vulnerable including
  OpenSSL clients and servers which enable client authentication.
  (CVE-2015-0286)
  [Stephen Henson]

- Segmentation fault for invalid PSS parameters fix

  The signature verification routines will crash with a NULL pointer
  dereference if presented with an ASN.1 signature using the RSA PSS
  algorithm and invalid parameters. Since these routines are used to verify
  certificate signature algorithms this can be used to crash any
  certificate verification operation and exploited in a DoS attack. Any
  application which performs certificate verification is vulnerable including
  OpenSSL clients and servers which enable client authentication.

  This issue was was reported to OpenSSL by Brian Carpenter.
  (CVE-2015-0208)
  [Stephen Henson]

- ASN.1 structure reuse memory corruption fix

  Reusing a structure in ASN.1 parsing may allow an attacker to cause
  memory corruption via an invalid write. Such reuse is and has been
  strongly discouraged and is believed to be rare.

  Applications that parse structures containing CHOICE or ANY DEFINED BY
  components may be affected. Certificate parsing (d2i_X509 and related
  functions) are however not affected. OpenSSL clients and servers are
  not affected.
  (CVE-2015-0287)
  [Stephen Henson]

- PKCS7 NULL pointer dereferences fix

  The PKCS#7 parsing code does not handle missing outer ContentInfo
  correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with
  missing content and trigger a NULL pointer dereference on parsing.

  Applications that verify PKCS#7 signatures, decrypt PKCS#7 data or
  otherwise parse PKCS#7 structures from untrusted sources are
  affected. OpenSSL clients and servers are not affected.

  This issue was reported to OpenSSL by Michal Zalewski (Google).
  (CVE-2015-0289)
  [Emilia Käsper]

- DoS via reachable assert in SSLv2 servers fix

  A malicious client can trigger an OPENSSL_assert (i.e., an abort) in
  servers that both support SSLv2 and enable export cipher suites by sending
  a specially crafted SSLv2 CLIENT-MASTER-KEY message.

  This issue was discovered by Sean Burford (Google) and Emilia Käsper
  (OpenSSL development team).
  (CVE-2015-0293)
  [Emilia Käsper]

- Empty CKE with client auth and DHE fix

  If client auth is used then a server can seg fault in the event of a DHE
  ciphersuite being selected and a zero length ClientKeyExchange message
  being sent by the client. This could be exploited in a DoS attack.
  (CVE-2015-1787)
  [Matt Caswell]

- Handshake with unseeded PRNG fix

  Under certain conditions an OpenSSL 1.0.2 client can complete a handshake
  with an unseeded PRNG. The conditions are:
  - The client is on a platform where the PRNG has not been seeded
  automatically, and the user has not seeded manually
  - A protocol specific client method version has been used (i.e. not
  SSL_client_methodv23)
  - A ciphersuite is used that does not require additional random data from
  the PRNG beyond the initial ClientHello client random (e.g. PSK-RC4-SHA).

  If the handshake succeeds then the client random that has been used will
  have been generated from a PRNG with insufficient entropy and therefore the
  output may be predictable.

  For example using the following command with an unseeded openssl will
  succeed on an unpatched platform:

  openssl s_client -psk 1a2b3c4d -tls1_2 -cipher PSK-RC4-SHA
  (CVE-2015-0285)
  [Matt Caswell]

- Use After Free following d2i_ECPrivatekey error fix

  A malformed EC private key file consumed via the d2i_ECPrivateKey function
  could cause a use after free condition. This, in turn, could cause a double
  free in several private key parsing functions (such as d2i_PrivateKey
  or EVP_PKCS82PKEY) and could lead to a DoS attack or memory corruption
  for applications that receive EC private keys from untrusted
  sources. This scenario is considered rare.

  This issue was discovered by the BoringSSL project and fixed in their
  commit 517073cd4b.
  (CVE-2015-0209)
  [Matt Caswell]

- X509_to_X509_REQ NULL pointer deref fix

  The function X509_to_X509_REQ will crash with a NULL pointer dereference if
  the certificate key is invalid. This function is rarely used in practice.

  This issue was discovered by Brian Carpenter.
  (CVE-2015-0288)
  [Stephen Henson]

- Removed the export ciphers from the DEFAULT ciphers
  [Kurt Roeckx]
2015-03-19 22:11:22 +00:00
tron
a27d59a95f Add patch from MacPorts to fix X11 forwarding under Mac OS X Yosemite. 2015-03-19 20:23:55 +00:00
jperkin
f6ea7819da Use ranlib for ranlib instead of non-portable 'ar s'. 2015-03-19 11:25:24 +00:00
dholland
17ae429f98 Fix build on NetBSD > 3. Add patch comments. 2015-03-19 08:34:53 +00:00
joerg
87e0ab0291 Fix prototypes. 2015-03-18 13:21:36 +00:00
taca
3f81e84dec Bump PKGREVISION.
Missing entries for patch files might cause creating broken binary package.
Noted by bouyer@.
2015-03-17 08:55:57 +00:00
taca
195c235212 Revice checksum for patch files which were accidently removed. 2015-03-17 06:00:07 +00:00
joerg
45c2e5bc3e GC MAKE_PROGRAM as well. 2015-03-16 10:44:23 +00:00
joerg
ea967f82bb Don't use -R without argument. Make libapputils a convenience archive as
it is. Don't depend on gmake.
2015-03-15 23:07:20 +00:00
wiz
bf9bf2a634 Update to 0.8:
0.8 - 2015-03-08
~~~~~~~~~~~~~~~~

* :func:`~cryptography.hazmat.primitives.serialization.load_ssh_public_key` can
  now load elliptic curve public keys.
* Added
  :attr:`~cryptography.x509.Certificate.signature_hash_algorithm` support to
  :class:`~cryptography.x509.Certificate`.
* Added
  :func:`~cryptography.hazmat.primitives.asymmetric.rsa.rsa_recover_prime_factors`
* :class:`~cryptography.hazmat.primitives.kdf.KeyDerivationFunction` was moved
  from :mod:`~cryptography.hazmat.primitives.interfaces` to
  :mod:`~cryptography.hazmat.primitives.kdf`.
* Added support for parsing X.509 names. See the
  :doc:`X.509 documentation</x509>` for more information.
* Added
  :func:`~cryptography.hazmat.primitives.serialization.load_der_private_key` to
  support loading of DER encoded private keys and
  :func:`~cryptography.hazmat.primitives.serialization.load_der_public_key` to
  support loading DER encoded public keys.
* Fixed building against LibreSSL, a compile-time substitute for OpenSSL.
* FreeBSD 9.2 was removed from the continuous integration system.
* Updated Windows wheels to be compiled against OpenSSL 1.0.2.
* :func:`~cryptography.hazmat.primitives.serialization.load_pem_public_key`
  and :func:`~cryptography.hazmat.primitives.serialization.load_der_public_key`
  now support PKCS1 RSA public keys (in addition to the previous support for
  SubjectPublicKeyInfo format for RSA, EC, and DSA).
* Added
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithSerialization`
  and deprecated
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithNumbers`.
* Added
  :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithSerialization.private_bytes`
  to
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithSerialization`.
* Added
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithSerialization`
  and deprecated
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithNumbers`.
* Added
  :meth:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithSerialization.private_bytes`
  to
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithSerialization`.
* Added
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithSerialization`
  and deprecated
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithNumbers`.
* Added
  :meth:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithSerialization.private_bytes`
  to
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithSerialization`.
* Added
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithSerialization`
  and deprecated
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithNumbers`.
* Added
  :meth:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithSerialization.public_bytes`
  to
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithSerialization`.
* Added
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithSerialization`
  and deprecated
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithNumbers`.
* Added
  :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithSerialization.public_bytes`
  to
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithSerialization`.
* Added
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithSerialization`
  and deprecated
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithNumbers`.
* Added
  :meth:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithSerialization.public_bytes`
  to
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithSerialization`.
* :class:`~cryptography.hazmat.primitives.hashes.HashAlgorithm` and
  :class:`~cryptography.hazmat.primitives.hashes.HashContext` were moved from
  :mod:`~cryptography.hazmat.primitives.interfaces` to
  :mod:`~cryptography.hazmat.primitives.hashes`.
* :class:`~cryptography.hazmat.primitives.ciphers.CipherContext`,
  :class:`~cryptography.hazmat.primitives.ciphers.AEADCipherContext`,
  :class:`~cryptography.hazmat.primitives.ciphers.AEADEncryptionContext`,
  :class:`~cryptography.hazmat.primitives.ciphers.CipherAlgorithm`, and
  :class:`~cryptography.hazmat.primitives.ciphers.BlockCipherAlgorithm`
  were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
  :mod:`~cryptography.hazmat.primitives.ciphers`.
* :class:`~cryptography.hazmat.primitives.ciphers.modes.Mode`,
  :class:`~cryptography.hazmat.primitives.ciphers.modes.ModeWithInitializationVector`,
  :class:`~cryptography.hazmat.primitives.ciphers.modes.ModeWithNonce`, and
  :class:`~cryptography.hazmat.primitives.ciphers.modes.ModeWithAuthenticationTag`
  were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
  :mod:`~cryptography.hazmat.primitives.ciphers.modes`.
* :class:`~cryptography.hazmat.primitives.padding.PaddingContext` was moved
  from :mod:`~cryptography.hazmat.primitives.interfaces` to
  :mod:`~cryptography.hazmat.primitives.padding`.
*
  :class:`~cryptography.hazmat.primitives.asymmetric.padding.AsymmetricPadding`
  was moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
  :mod:`~cryptography.hazmat.primitives.asymmetric.padding`.
*
  :class:`~cryptography.hazmat.primitives.asymmetric.AsymmetricSignatureContext`
  and
  :class:`~cryptography.hazmat.primitives.asymmetric.AsymmetricVerificationContext`
  were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
  :mod:`~cryptography.hazmat.primitives.asymmetric`.
* :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAParameters`,
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAParametersWithNumbers`,
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey`,
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithNumbers`,
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey` and
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithNumbers`
  were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
  :mod:`~cryptography.hazmat.primitives.asymmetric.dsa`
* :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurve`,
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurveSignatureAlgorithm`,
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey`,
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithNumbers`,
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey`,
  and
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithNumbers`
  were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
  :mod:`~cryptography.hazmat.primitives.asymmetric.ec`.
* :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey`,
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithNumbers`,
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey` and
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithNumbers`
  were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
  :mod:`~cryptography.hazmat.primitives.asymmetric.rsa`.
2015-03-15 21:10:16 +00:00
tnn
47930bdcf8 requires openssl 2015-03-15 18:33:29 +00:00
hiramatsu
333d96379d Set MAINTAINER to pkgsrc-users. 2015-03-15 18:31:52 +00:00
hiramatsu
bb2e62806b Set MAINTAINER to pkgsrc-users. 2015-03-15 17:56:15 +00:00
hiramatsu
80b88da227 Set MAINTAINER to pkgsrc-users. 2015-03-15 17:30:24 +00:00
tnn
9467e5af75 needs lex & yacc 2015-03-15 16:57:31 +00:00
hiramatsu
26305b1f4b Set MAINTAINER to pkgsrc-users. 2015-03-15 16:56:49 +00:00
hiramatsu
5078478cf8 Set MAINTAINER to pkgsrc-users. 2015-03-15 16:47:19 +00:00
tnn
643798e804 wants to link with pthreads 2015-03-15 16:45:04 +00:00
tnn
01d86e060d wants to link with pthreads 2015-03-15 14:17:00 +00:00
taca
c0f1d07fbd Add and enable clamav-doc. 2015-03-15 00:55:56 +00:00
taca
f0703ce26d Add clamav-doc package version 0.98.6.
This is documents included in Clam AntiVirus distribution.
2015-03-15 00:55:06 +00:00
taca
322e7376b6 * Add unit-test PKG_OPTIONS.
* Allow version information to be shared with an another package
  (documentation).

Bump PKGREVISION.
2015-03-15 00:52:53 +00:00
taca
56ebd702c6 Update php-suhosin to 0.9.37.1
* support for PHP 5.3 was dropped.

2014-12-12 - 0.9.37.1
    - Changed version string to 0.9.37.1 (without -dev)
    - Relaxed array index blacklist (removed '-') due to wordpress incompatibility

2014-12-03 - 0.9.37

    - Added SQL injection protection for Mysqli and several test cases
    - Added wildcard matching for SQL username
    - Added check for SQL username to only contain valid characters (>= ASCII 32)
    - Test cases for user_prefix and user_postfix
    - Added experimental PDO support
    - SQL checks other than mysql (Mysqli + old-style) must be enabled with
      configure --enable-suhosin-experimental, e.g. MSSQL.
    - disallow_ws now matches all single-byte whitespace characters
    - remove_binary and disallow_binary now optionally allow UTF-8.
    - Introduced suhosin.upload.allow_utf8 (experimental)
    - Reimplemented suhosin_get_raw_cookies()
    - Fixed potential segfault for disable_display_errors=fail (only on ARM)
    - Fixed potential NULL-pointer dereference with func.blacklist and logging
    - Logging timestamps are localtime instead of gmt now (thanks to mkrokos)
    - Added new array index filter (character whitelist/blacklist)
    - Set default array index blacklist to '"+-<>;()
    - Added option to suppress date/time for suhosin file logging (suhosin.log.file.time=0)
    - Added simple script to create binary Debian package
    - Fixed additional recursion problems with session handler
    - Suhosin now depends on php_session.h instead of version-specific struct code

2014-06-10 - 0.9.36

    - Added better handling of non existing/non executable shell scripts
    - Added protection against XSS/SQL/Other Injections through User-Agent HTTP header
    - Fix variable logging statistics outputting on every include - ticket: #37
    - Added more entropy from /dev/urandom to internal random seeding (64 bit => 256 bit)
    - Added non initialized stack variables to random seeding
    - Added php_win32_get_random_bytes for windows compatibility in random seeding
    - Added suhosin.rand.seedingkey for INI supplied additional entropy string (idea DavisNT)
    - Added suhosin.rand.reseed_every_request to allow reseeding on every request (idea DavisNT)
    - Changed that calls to srand() / mt_srand() will trigger auto reseeding (idea DavisNT)
    - Fixed problems with SessionHandler() class and endless recursions
    - Added LICENSE file to make distributions happy

2014-02-24 - 0.9.35

    - From now only PHP >= 5.4 is officially supported
    - Fix problems with the hard memory_limit on 64 bit systems
    - Fix problems with user space session handler due to change in PHP 5.4.0
    - Add changes in PHP 5.5 session handlers structures for PHP 5.5 compability
    - Fix std post handler for PHP >= 5.3.11
    - Fix suhosin logo in phpinfo() for PHP 5.5
    - Change fileupload handling for PHP >= 5.4.0 to use an up to date RFC1867 replacement code
    - Adapted suhosin to PHP 5.5 executor
    - Added some test cases for various things
    - Added suhosin.log.stdout to log to stdout (for debugging purposes only)
    - Add ini_set() fail mode to suhosin.disable.display_errors
    - Fix suhosin.get/post/cookie.max_totalname_length filter
    - Refactor array index handling in filter to make it work always
    - Added support for PHP 5.6.0alpha2
    - WARNING: FUNCTION WHITELISTS/BLACKLISTS NEVER WORKED CORRECTLY WITH PHP < 5.5

2012-02-12 - 0.9.34

    - Added initial support for PHP 5.4.0
    - Fix include whitelist and blacklist to support shemes with dots in their names
    - Fix read after efree() that lets function_exists() malfunction
    - Fix build with clang compiler
    - Added a request variable drop statistic log message
2015-03-15 00:35:14 +00:00
tnn
d53e0da30f Update master site URL and checksum for unfetchable distribution patch 2015-03-14 17:22:46 +00:00
wiz
c5ee0b8f37 Fix previous. 2015-03-13 23:00:49 +00:00
gendalia
d192f06246 libgpg-error needs to be >= version 1.11. 2015-03-13 22:38:08 +00:00
taca
aeb39d7101 Update ruby-sshkit to 1.7.1.
## 1.7.1

  * Fix a regression in 1.7.0 that caused command completion messages to be removed from log output. @mattbrictson

## 1.7.0

  * Update Vagrantfile to use multi-provider Hashicorp precise64 box - remove URLs. @townsen
  * Merge host ssh_options and Netssh defaults @townsen
    Previously if host-level ssh_options were defined the Netssh defaults
    were ignored.
  * Merge host ssh_options and Netssh defaults
  * Fixed race condition where output of failed command would be empty. @townsen
    Caused random failures of `test_execute_raises_on_non_zero_exit_status_and_captures_stdout_and_stderr`
    Also fixes output handling in failed commands, and generally buggy output.
  * Remove override of backtrace() and backtrace_locations() from ExecuteError. @townsen
    This interferes with rake default behaviour and creates duplicate stacktraces.
  * Allow running local commands using `on(:local)`
  * Implement the upload! and download! methods for the local backend
2015-03-13 15:49:17 +00:00
taca
9db33a7cab Update ruby-simple_oauth to 0.3.1.
No exact changes are available, but various dependency and fixes.
2015-03-13 15:47:53 +00:00
taca
18b035c0d5 Update ruby-ruby-openid to 2.7.0.
Sort PLIST.

## 2.7.0

* Use RFC 2396 compatible URI parser for trustroot - 7c84ec9ced3ccbdad575e02dbfa81e53b52f909e
  See https://github.com/openid/ruby-openid/pull/85
* Use HMAC from OpenSSL rather than Digest - ce2e30d7ff3308f17ef7d8c19d6f4752f76c9c40
  See https://github.com/openid/ruby-openid/pull/84
* Check if OpenSSL is loaded - 751e55820d958ee781f5abb466a576d83ddde6fd

## 2.6.0

* More safely build filenames - 1c4a90630b183e7572b8ab5f2e3a3e0c0fecd2c7
  See https://github.com/openid/ruby-openid/pull/80
* The session serializer of Rails4.1 is json - b44a1eb511dec3be25a07930121bc80cacec0f1c
* Handle boolean value to fix signature issue - d65076269b77754da7db6e4b189edeeb9201600d
  See https://github.com/openid/ruby-openid/pull/76
2015-03-13 15:30:58 +00:00
roy
887ea4ec53 Keychain isn't a bash script.
Update homepage to proper one.
2015-03-13 11:29:33 +00:00
tnn
b78884dedc needs zlib 2015-03-12 19:41:30 +00:00
tnn
1825e3f88a requires openssl 2015-03-12 17:50:30 +00:00
tnn
da7dc52ac1 post-extract target needs gzip as tool 2015-03-12 14:26:11 +00:00
tnn
90fe0375ac unconditionally wants dlopen 2015-03-11 22:49:40 +00:00
nils
7b4e4adddf Corrected a build problem with py-sphinx-1.2.3nb1 because sphinx-build has
been replaced with sphinx-build${PYVERSSUFFIX} (therefore it depends on at
least this version).

Corrected maintainer's email address.
2015-03-11 20:45:52 +00:00
mef
ae4dd76315 (pkgsrc)
- Drop patch-ah, seems to have included
 - License from gnu-gpl-v2 to gnu-gpl-v3
(upstream)
 - Update 1.1.0 to 1.1.1
---------------------
2013-04-26  Werner Koch  <wk@gnupg.org>
        Release 1.1.1.

2013-04-26  Andre Heinecke  <aheinecke@intevation.de>  (wk)
        * configure.ac (strcasecmp): Check otherwise jnlib would defines it.
        * configure.ac (sigset_t): Add check.
        * configure.ac (LBER_LIBS): Add check.

2010-11-16  Werner Koch  <wk@g10code.com>
        Change the license to GPLv3+.
        * COPYING: Replace by GPLv3 version.
2015-03-11 01:31:02 +00:00
mef
e9b11ec7ca (pkgsrc)
- Add LICENSE= gnu-gpl-v2
(upstream)
 - Update 1.27 to 1.31
----------------------
2014-08-03 David A. Wheeler <dwheeler, at, dwheeler.com>
        * Release version 1.31, a set of small improvements mostly CWE-related.
        * Note that flawfinder is officially CWE-compatible.
        * Support GNU make install conventions (prefix, bindir, DESTDIR, etc.).
          The older program-specific conventions are still supported, but
          the documentation emphasizes using the standard conventions instead.
        * Simplified installation text.
        * Added more wide character function rules.
        * Add reference to info at "http://www.dwheeler.com/secure-programs".
        * Document that hitlists should be trusted to be loaded or diffed.
          These are implented using Python's pickle module, and that module
          presumes the data is from a trustworthy source.  In the expected
          use case this is fine... but it needed to be documented.
        * Tweak/improve mappings to CWE.  E.G., strlen()
          better maps to CWE-126 (buffer over-read).  In a few cases the
          CWE mappings weren't reported as such; that is now fixed.
          CWEs are actually a hierarchy; expose a little of this so
          people can more easily search on them.
        * Improved error detection and reporting.  In particular, error
          messages are sent to standard errors, filenames listed but
          non-existent trigger a separate warning, and there's a warning
          about non-existent filenames listed on the command line that
          begin with the UTF-8 long dash sequence (users might not notice
          the difference between long dash and dash, and this can happen
          in some cases when copying and pasting).
        * Add "-H" option as synonym for "--html".

2014-07-19 David A. Wheeler <dwheeler, at, dwheeler.com>
        * Release 1.29, primarily for CWE improvements.
        * Multi-line formatting is faster and formats better.
        * Documentation about CWEs has been improved.
        * HTML format includes links from CWE identifiers to their definitions.
        * Tweak CWE mappings, e.g., strlen maps to CWE-126 (buffer over-read).
        * Option "--listrules" now gives default warning and is tab-delimited.
        * Regression test suite now also tests the generated HTML.

2014-07-13 David A. Wheeler <dwheeler, at, dwheeler.com>
        * Release 1.28
        * Common Weakness Enumeration (CWE) references are
          now included in most hits
        * Handle files not ending in newline (thanks to Alexis Wilke)
        * Documentation clarifications
        * Added support for "git diff" in patchfile processing
        * Handles unbalanced double-quotes in sprintf
        * Fix incorrect time executed report
        * Fix bug to allow "flawfinder ." (fix bug#3)
        * Fix ignore directive when filenames differ (fix bug#6)
2015-03-11 00:51:06 +00:00
gdt
82cf4e4c2e Explain usable apache versions and point from ap-modsecurity to ap-modsecurity2. 2015-03-09 14:26:33 +00:00
taca
17a1a339eb Add ${GEM_EXTSDIR}/gem.build_complete for new rubygems and updated ruby. 2015-03-08 15:17:17 +00:00
tnn
541b621578 mark as broken, no distfile 2015-03-06 23:22:25 +00:00
tnn
00800f8237 bump rev for symbol rename in security/mhash 2015-03-05 22:47:54 +00:00
tnn
1c5e7f30e6 bump bl3 due to API change 2015-03-05 22:31:56 +00:00
tnn
4fd084ce6c avoid namespace clash with libc. Bump rev. 2015-03-05 22:28:37 +00:00
wiedi
310bc236e1 use c99 to fix build on illumos 2015-03-04 16:39:41 +00:00
jperkin
66849d390c Pull in TLS fixes from https://github.com/bumptech/stud/pull/138
Bump PKGREVISION.
2015-03-04 12:04:30 +00:00
wiz
197697cff9 Update to 5.3:
---
5.2
---

* Prefer setuptools_scm to hgtools.

---
5.1
---

* Host project at Github (`repo <https://github.com/jaraco/keyring>`_).
2015-03-01 15:09:07 +00:00
wiz
95c83ef80f + sslsplit. 2015-03-01 10:03:48 +00:00
wiz
264a46f831 Import sslsplit-0.4.10 as security/sslsplit.
SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS
encrypted network connections.  Connections are transparently
intercepted through a network address translation engine and
redirected to SSLsplit.  SSLsplit terminates SSL/TLS and initiates
a new SSL/TLS connection to the original destination address, while
logging all data transmitted.  SSLsplit is intended to be useful
for network forensics and penetration testing.

SSLsplit supports plain TCP, plain SSL, HTTP and HTTPS connections
over both IPv4 and IPv6.  For SSL and HTTPS connections, SSLsplit
generates and signs forged X509v3 certificates on-the-fly, based
on the original server certificate subject DN and subjectAltName
extension.  SSLsplit fully supports Server Name Indication (SNI)
and is able to work with RSA, DSA and ECDSA keys and DHE and ECDHE
cipher suites.  Depending on the version of OpenSSL, SSLsplit
supports SSL 3.0, TLS 1.0, TLS 1.1 and TLS 1.2, and optionally SSL
2.0 as well.  SSLsplit can also use existing certificates of which
the private key is available, instead of generating forged ones.
SSLsplit supports NULL-prefix CN certificates and can deny OCSP
requests in a generic way.  For HTTP and HTTPS connections, SSLsplit
removes response headers for HPKP in order to prevent public key
pinning, for HSTS to allow the user to accept untrusted certificates,
and Alternate Protocols to prevent switching to QUIC/SPDY.
2015-03-01 09:59:45 +00:00
wiz
9eaa9bcf84 Update to 1.6.3:
Noteworthy changes in version 1.6.3 (2015-02-27) [C20/A0/R3]
------------------------------------------------

 * Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
   See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.

 * Fixed data-dependent timing variations in modular exponentiation
   [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
   are Practical].

 * Improved asm support for older toolchains.
2015-02-28 00:14:25 +00:00
wiz
3ca6fa4811 Update to 1.4.19:
Noteworthy changes in version 1.4.19 (2015-02-27)
-------------------------------------------------

 * Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
   See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.

 * Fixed data-dependent timing variations in modular exponentiation
   [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
   are Practical].

 * Detect faulty use of --verify on detached signatures.

 * Changed the PKA method to use CERT records and hashed names.

 * New import option "keep-ownertrust".

 * Support algorithm names when generating keys using the --command-fd
   method.

 * Updated many translations.

 * Updated build system.

 * Fixed a regression in keyserver import

 * Fixed argument parsing for option --debug-level.

 * Fixed DoS based on bogus and overlong key packets.

 * Fixed bugs related to bogus keyrings.

 * The usual minor minor bug fixes.
2015-02-28 00:13:25 +00:00
tnn
653dfbd8b0 Remove stale HP-UX bulk build quirks 2015-02-27 14:35:01 +00:00
mef
f31ff8abeb Added security/p5-Crypt-DH-GMP version 0.00012 2015-02-27 01:35:28 +00:00
mef
5375505e80 Import p5-Crypt-DH-GMP-0.00012 as security/p5-Crypt-DH-GMP.
Crypt::DH::GMP is a (somewhat) portable replacement to Crypt::DH,
implemented mostly in C.
2015-02-27 01:32:49 +00:00
tez
c2d3b7a572 Backported fixes for:
http://web.mit.edu/kerberos/advisories/2015-001-patch-r111.txt
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423
and:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5353
and
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5355
 (also apparently known as SA62976)
2015-02-25 22:28:58 +00:00
wiz
d322dc27d7 Reset maintainer, lukem has no pkgsrc capabilities. 2015-02-24 08:58:56 +00:00
hiramatsu
c1f9098ae3 Update clamav to 0.98.6.
Changes from 0.98.5.
--------------------
- library shared object revisions.
- installation issues on some Mac OS X and FreeBSD platforms.
- includes a patch from Sebastian Andrzej Siewior making
  ClamAV pid files compatible with systemd.
- Fix a heap out of bounds condition with crafted Yoda's
  crypter files. This issue was discovered by Felix Groebert
  of the Google Security Team.
- Fix a heap out of bounds condition with crafted mew packer
  files. This issue was discovered by Felix Groebert of the
  Google Security Team.
- Fix a heap out of bounds condition with crafted upx packer
  files. This issue was discovered by Kevin Szkudlapski of
  Quarkslab.
- Fix a heap out of bounds condition with crafted upack packer
  files. This issue was discovered by Sebastian Andrzej Siewior.
  CVE-2014-9328.
- Compensate a crash due to incorrect compiler optimization when
  handling crafted petite packer files. This issue was discovered
  by Sebastian Andrzej Siewior.
2015-02-24 07:28:59 +00:00
fhajny
edb533c4af One more fix for assumption about POSIX accept(). PKGREVISION++ 2015-02-23 22:27:37 +00:00
wiedi
3e24ab8a32 Update spiped to 1.5.0
Changelog:
 spiped-1.5.0
 * Attempt to set the TCP_NODELAY socket option on connections, in order
   to avoid punishing latencies from TCP nagling.
2015-02-22 14:26:47 +00:00
wiz
a7e3cf4059 Update to 2.0.27:
Noteworthy changes in version 2.0.27 (2015-02-18)
-------------------------------------------------

 * gpg: Detect faulty use of --verify on detached signatures.

 * gpg: New import option "keep-ownertrust".

 * gpg: Uses SHA-256 for all signature types also on RSA keys.

 * gpg: Added support for algo names when generating keys using the
   --command-fd method.

 * gpg: Unless --allow-weak-digest-algos is used the insecure MD5
   based fingerprints are shown as all zeroe

 * gpg: Fixed DoS based on bogus and overlong key packets.

 * gpg: Better error reporting for keyserver problems.

 * Fixed several bugs related to bogus keyrings and improved some
   other code.
2015-02-21 09:08:53 +00:00
fhajny
a6b55d6f0e Fix SSL queue handling based on an upstream patch. PKGREVISION++
https://github.com/bumptech/stud/pull/130
2015-02-20 09:32:07 +00:00
joerg
66a22fb17d Recognize evbarm. 2015-02-19 14:25:12 +00:00
wiz
70858bd1fb Update to 0.52:
0.52 - 2016-02-16
 - Skip "grp" records, generated by GPG 2.1; this suppresses "unknown
   record type" warnings
 - Add explicit Fatal dependency; though nominally part of code perl,
   RedHat's perl does not ship with it
 - Ensure that the trustdb is created before attempting to encrypt; gpg2
   requires that it exist, even for commands with --trust-model=always.
   See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751266
2015-02-19 13:18:10 +00:00
joerg
6b680a78b5 Wants qmake for qt detection. 2015-02-18 20:46:48 +00:00
tnn
a84f21ab9f Update to mozilla-rootcerts-20141117.
Added root certs:

C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority
C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=Terms of use at https://www.verisign.com/rpa (c)09, CN=VeriSign Class 3 Secure Server CA - G2
C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust ECC Certification Authority
C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority
OU=GlobalSign ECC Root CA - R4, O=GlobalSign, CN=GlobalSign
OU=GlobalSign ECC Root CA - R5, O=GlobalSign, CN=GlobalSign

Removed root certs:

C=US, O=America Online Inc., CN=America Online Root Certification Authority 1
C=US, O=America Online Inc., CN=America Online Root Certification Authority 2
C=US, O=GTE Corporation, OU=GTE CyberTrust Solutions, Inc., CN=GTE CyberTrust Global Root
C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Premium Server CA/emailAddress=premium-server@thawte.com
C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Server CA/emailAddress=server-certs@thawte.com
2015-02-16 13:09:10 +00:00
jperkin
680762de01 Put back implementation of MASTER_SITE_OPENBSD. 2015-02-16 11:03:20 +00:00
rodent
3db7e53778 Source code documentation says that renaming -lcrypt to -lcrypto works on
Darwin. Let's do that instead of removing that library, since it would
involve disabling another CFLAG to function properly. Do the same for
OpenBSD which fixes the build there too. Add options.mk file to enable the
user to choose the libcrack and debug options at build time. Bump
PKGREVISION.
2015-02-16 00:25:45 +00:00
gls
8f8d3e1add Update security/password-store to 1.6.5
Upstream changes:
=================

Release 1.6.5. Changes:
== Features ==
* Support Gpg4win alongside Cygwin

== Bug Fixes ==
* Work around unit tests bug with GnuPG 2.1.0 and 2.1.1
* Manually migrate unit tests keys to GnuPG 2.1 series
* Restore support GnuPG 2.0 series


Release 1.6.4. Changes:
== Features ==
* "add" is an alias of "insert"
* `pass edit` will no longer make a commit if the password does not change
* Symbolic links are now followed
* Remove gpg agent check, due to the auto-starting gpg-agent in GnuPG 2.1

== Bug Fixes ==
* Avoid trailing slash in `pass grep`
* Account for $CLIP_TIME in messages
* revelation2pass, keepassx2pass, and other script improvements
* Fix .gpg extension in tree listings, and preserve colors
* Improved support for getopt on OSX
* Updates for zsh and fish completion autoloading
* Always preserve TTY for pinentry
* Only use encryption subkeys
* Better clip error messages
* No longer use hidden recipients
2015-02-15 18:58:40 +00:00
adam
2f1650ffbe Changes 1.0.2:
Suite B support for TLS 1.2 and DTLS 1.2
Support for DTLS 1.2
TLS automatic EC curve selection.
API to set TLS supported signature algorithms and curves
SSL_CONF configuration API.
TLS Brainpool support.
ALPN support.
CMS support for RSA-PSS, RSA-OAEP, ECDH and X9.42 DH.
2015-02-12 13:08:53 +00:00
jnemeth
21a3461659 sort 2015-02-12 05:09:34 +00:00
agc
7e5a773aa6 Update multigest and libmultigest to version 20150211
+ bring over lint fixes from the version in othersrc
+ document the concat, comb4p, xor and hash combiner functions
2015-02-12 01:57:57 +00:00
adam
edc7180568 Changes 3.2.21:
** libgnutls: Corrected regression introduced in 3.2.19 related to
session renegotiation. Reported by Dan Winship.
** libgnutls: Corrected parsing issue with OCSP responses.
** API and ABI modifications:
No changes since last version.
2015-02-11 11:25:57 +00:00
spz
1c03c2f9fa update of sudo to the next upstream patch version (1.7.10p8 to 1.7.10p9)
Upstream Changelog:

+   The TZ environment variable is now checked for safety instead of
    simply being copied to the environment of the command.
    This fixes a potential security issue.

+   Sudo now only builds Position Independent Executables (PIE) by
    default on Linux systems and verifies that a trivial test program
    builds and runs.

+   On Solaris 11.1 and higher, sudo binaries will now have the ASLR tag
    enabled if supported by the linker.
2015-02-11 09:11:59 +00:00
wiz
28e2a250ef Add a build dependency on py-hgtools.
Seems to be needed, at least sometimes.
2015-02-09 18:55:45 +00:00
nils
7cffaeaa29 add & enable fail2ban 2015-02-09 10:06:48 +00:00
nils
08431a1378 Initial import of security/fail2ban, version 0.9.1, into the NetBSD Packages Collection.
Fail2Ban scans log files like /var/log/pwdfail and bans IP
that makes too many password failures. It updates firewall
rules to reject the IP address. Theses rules can be defined by
the user. Fail2Ban can read multiple log files such as sshd
or Apache web server ones.
2015-02-09 10:05:25 +00:00
wiz
2f92c4c1de Update to 5.0:
---
5.0
---

* Version numbering is now derived from the code repository tags via `hgtools
  <https://pypi.python.org/pypi/hgtools>`_.
* Build and install now requires setuptools.
2015-02-08 16:38:18 +00:00
agc
0cfaed6376 forcibly disable tools build when running the testing script - found when
testing the src/ version, benign for pkgsrc. ride previous version bump.
2015-02-05 01:28:25 +00:00
agc
804fbc2e4d appease compiler warning police - initialise a variable in case it's otherwise
"used uninitialised". ride previous version bump.
2015-02-05 00:58:02 +00:00
agc
b24a4c3e01 Update netpgpverify (and libnetpgpverify) to version 20150205
+ recognise signatures made by subkeys as well as by primary keys

+ print out the relevant key which signed the file, even if it's
a subkey and not the primary key itself.

+ keep the same API as before

with many thanks to Jonathan Perkin
2015-02-05 00:21:57 +00:00
agc
1d1b6986c4 The test file for the "one key" test has embedded CVS Identifiers, so
work around this.
2015-02-04 17:53:39 +00:00
agc
f5b8aa147a add a minimalist shell script to make a tarball of the sources - requested
by various people.
2015-02-04 17:45:04 +00:00
taca
61f2670d76 Update ruby-sshkit to 1.6.1.
## 1.6.0

  * Fix colorize to use the correct API (@fazibear)
  * Lock colorize (sorry guys) version at >= 0.7.0

## 1.6.0 (Yanked, because of colorize.)

  * Force dependency on colorize v0.6.0
  * Add your entries here, remember to credit yourself however you want to be
    credited!
  * Remove strip from capture to preserve whitespace. Nick Townsend
  * Add vmware_fusion Vagrant provider. Nick Townsend
  * Add some padding to the pretty log formatter

## 1.5.1

  * Use `sudo -u` rather than `sudo su` to switch users. Mat Trudel

## 1.5.0

  * Deprecate background helper - too many badly behaved pseudo-daemons. Lee Hambley
  * Don't colourize unless $stdout is a tty. Lee Hambley
  * Remove out of date "Known Issues" section from README. Lee Hambley
  * Dealy variable interpolation inside `as()` block. Nick Townsend
  * Fixes for functional tests under modern Vagrant. Lewis Marshal
  * Fixes for connection pooling. Chris Heald
  * Add `localhost` hostname to local backend. Adam Mckaig
  * Wrap execptions to include hostname. Brecht Hoflack
  * Remove `shellwords` stdlib dependency Bruno Sutic
  * Remove unused `cooldown` accessor. Bruno Sutic
  * Replace Term::ANSIColor with a lighter solution. Tom Clements
  * Documentation fixes. Matt Brictson

## 1.4.0

https://github.com/capistrano/sshkit/compare/v1.3.0...v1.4.0

  * Removed `invoke` alias for [`SSHKit::Backend::Printer.execute`](https://github.com/capistrano/sshkit/blob/master/lib/sshkit/backends/printer.rb#L20). This is to prevent collisions with
  methods in capistrano with similar names, and to provide a cleaner API. See [capistrano issue 912](https://github.com/capistrano/capistrano/issues/912) and [issue 107](https://github.com/capistrano/sshkit/issues/107) for more details.
  * Connection pooling now uses a thread local to store connection pool, giving each thread its own connection pool. Thank you @mbrictson see [#101](https://github.com/capistrano/sshkit/pull/101) for more.
  * Command map indifferent towards strings and symbols thanks to @thomasfedb see [#91](https://github.com/capistrano/sshkit/pull/91)
  * Moved vagrant wrapper to `support` directory, added ability to run tests with vagrant using ssh. @miry see [#64](https://github.com/capistrano/sshkit/pull/64)
  * Removed unnecessary require `require_relative '../sshkit'` in `lib/sshkit/dsl.rb` prevents warnings thanks @brabic.
  * Doc fixes thanks @seanhandley @vojto
2015-02-04 16:17:47 +00:00
taca
4629de0e8a Update ruby-shadow to 2.4.1.
[2014/12/02]
* Version 2.4.1
  - sp_loginclass support should NOT have been added to password implementation
[2014/12/01]
* Version 2.4.0
  - Add support for sp_loginclass via pwd.h
2015-02-04 16:14:57 +00:00
taca
e7b088b3d1 Update ruby-net-scp to 1.2.1.
=== 1.2.1 / 30 Apr 2014

* Resign gem with new pubkey

=== 1.2.0 / 11 Apr 2014

* Get the error string during download [jkeiser]
2015-02-04 16:11:32 +00:00
taca
1ce21bbb90 Update ruby-net-ssh to 2.9.2.
=== 2.9.2-rc3

* Remove advertised algorithms that were not working (curve25519-sha256@libssh.org) [mfazekas]

=== 2.9.2-rc2

* number_of_password_prompts is now accepted as ssh option, by setting it 0 net-ssh will not ask for password for password auth as with previous versions [mfazekas]

=== 2.9.2-rc1

* Documentation fixes and refactoring to keepalive [detiber, mfazekas]

=== 2.9.2-beta

* Remove advertised algorithms that were not working (ssh-rsa-cert-* *ed25519 acm*-gcm@openssh.com) [mfazekas]
* Unkown algorithms now ignored instead of failed [mfazekas]
* Asks for password with password auth (up to number_of_password_prompts) [mfazekas]
* Removed warnings [amatsuda]

=== 2.9.1 / 13 May 2014

* Fix for unknown response from agent on Windows with 64-bit PuTTY [chrahunt]
* Support negative patterns in host lookup from the SSH config file [nirvdrum]


=== 2.9.0 / 30 Apr 2014

* New ciphers [chr4]
  * Added host keys: ssh-rsa-cert-v01@openssh.com ssh-rsa-cert-v00@openssh.com ssh-ed25519-cert-v01@openssh.com ssh-ed25519
  * Added HMACs: hmac-sha2-512-etm@openssh.com hmac-sha2-256-etm@openssh.com umac-128-etm@openssh.com
  * Added Kex: aes256-gcm@openssh.com aes128-gcm@openssh.com curve25519-sha256@libssh.org
  * Added private key support for id_ed25519
* IdentiesOnly will not disable ssh_agent - fixes #148 and new fix for #137 [mfazekas]
* Ignore errors during ssh agent negotiation [simonswine, jasiek]
* Added an optional "options" argument to test socket open method [jefmathiot]
* Added gem signing (again) with new cert [delano]


=== 2.8.1 / 19 Feb 2014

* Correct location of global known_hosts files [mfischer-zd]
* Fix for password authentication [blackpond, zachlipton, delano]
2015-02-04 16:09:07 +00:00
taca
6f9a0726ec Update ruby-bcrypt to 3.1.10.
3.1.8  Oct 23 2014
  - Add support for Ruby 2.1 in compiled Windows binaries [GH #102]

3.1.9  Oct 23 2014
  - Rebuild corrupt binaries

3.1.10 Jan 28 2015
  - Fix issue with dumping a BCrypt::Password instance to YAML in Ruby 2.2 [GH #107 by @mattwildig]
2015-02-04 16:07:29 +00:00
wiz
56343eddac Update to 2.012. Depend on p5-Mozilla-CA.
2.012 2014/02/02
- fix t/ocsp.t in case no HTTP::Tiny is installed
2.011 2014/02/01
- fix t/ocsp.t - don't count on revoked.grc.com using OCSP stapling #101855
- added option 'purpose' to Utils::CERT_create to get better control of the
  certificates purpose. Default is 'server,client' for non-CA (contrary to
  only 'server' before)
- removed RC4 from default cipher suites on the server site
  https://github.com/noxxi/p5-io-socket-ssl/issues/22
- refactoring of some tests using Test::More thanks to Sweet-kid and the
  2015 Pull Request Challenge
2015-02-04 12:19:07 +00:00
agc
ada62f45b2 Update netpgpverify, and libnetpgpverify, to 20150204
+ dump the huge output to /dev/null so that we can see what's
happening with the other tests in testit.sh

+ fix from jperkin@, don't try to be clever when selecting the only
key id in a keyring

+ add a test for single key (non-ssh) pubring
2015-02-03 21:36:48 +00:00
agc
e5416534d1 Update netpgpverify, and libnetpgpverify, to 20150204
+ dump the huge output in testing script to /dev/null so that we can
see what's happening with the other tests in testit.sh

+ fix from jperkin@, don't try to be clever when selecting the only
key id in a keyring

+ add a test for single key (non-ssh) pubring
2015-02-03 21:34:57 +00:00
agc
5461aea2cb Update netpgpverify, and libnetpgpverify, to 20150203
+ portability fixes to make netpgpverify build on freebsd 10.1 with WARNS=5

+ fixed an oversight in the testit.sh script
2015-02-03 21:13:17 +00:00
wiz
536213f713 Update to 4.1:
4.1
---

* Added preliminary support for loading keyring backends through ``setuptools
  entry points``, specifically "keyring backends".
2015-02-01 19:51:37 +00:00