Commit graph

3949 commits

Author SHA1 Message Date
shannonjr
aec62f433a Update to 0.9.9. Changes:
- Implement an idea from Lex van Roon <r3boot@r3blog.nl.eu.org> providing
  an alert/heartbeat deletion performance improvement in the order of
  3000% (preludedb-admin already benefit from it, next Prewikka release
  will benefit from it too).
- Fix --with-(perl|python|swig) detection path ordering.
- Verbose error reporting on logfile opening error.
- Various bug fixes.
2006-08-17 11:33:07 +00:00
shannonjr
5ae116d696 Update to 0.9.10.1. Changes:
- Fix checking for swig/perl/python when full path to the
  application is specified.
- Fix OpenBSD getaddrinfo() AI_ADDRCONFIG issue (apply to
  some other system as well).
- Fix workaround for system with broken libtool,
  that prevented the use of plugin (#168).
2006-08-17 11:31:40 +00:00
tonio
00f3b905d0 Update security/caff to 0.4.7
From debian changelog:
signing-party (0.4.7-1) unstable; urgency=low
  * gpg-mailkeys: use right content-type for attached key,
    thanks Wesley Landaker
  * gpgsigs: recognize rvk (revoker), found in ksp-dc6.txt.
2006-08-16 09:53:49 +00:00
abs
46fbc6112a update p5-Crypt-SSLeay to 0.51nb6 - p5-libwww now depends on us 2006-08-15 12:30:58 +00:00
abs
f1cff1a366 Update security/p5-IO-Socket-SSL from 0.997 to 0.998.
v0.998
        - declare socket as opened before calling fatal_ssl_error
          because the SSL_error_trap set up from HTTP::Daemon
          needs this
        - accept_SSL sets errors on $socket (the accepted socket)
          not $self (the listening socket if called from accept)
          so it can be queried from SSL_error_trap
        - note in BUGS section that IO::Socket::SSL is not thread-safe

Note: The previous update from 0.97 broke all https:// URLs in p5-libwww,
will address that in next commit (to p5-libwww)
2006-08-15 12:07:33 +00:00
abs
befe9b9ae3 Update msu to 1.08:
- call fchown on tty
    - Rename log() to log_msu() to avoid compiler warning
    - switch dist to .tbz from .tgz
2006-08-14 13:19:54 +00:00
rpaulo
ffb01de1db I don't use this package anymore. 2006-08-14 13:19:24 +00:00
wiz
ef9799aa08 Reset maintainer, email bounced with:
host monkeybyte.org[69.16.221.13] said: 550-"The
recipient cannot be verified.  Please check all recipients of this 550
message to verify they are valid." (in reply to RCPT TO command)
2006-08-13 23:32:22 +00:00
adrianp
a6d27fc598 +p5-String-Random 2006-08-13 17:45:02 +00:00
adrianp
b56f820931 String::Random is used to generate random strings. It was written to
make generating random passwords and such a little easier.
2006-08-13 17:44:06 +00:00
adrianp
68e97090d9 +p5-Crypt-PasswdMD5 2006-08-13 17:41:31 +00:00
adrianp
92c407cf3f The unix_md5_crypt() provides a crypt()-compatible interface to the rather
new MD5-based crypt() function found in modern operating systems.
2006-08-13 17:40:13 +00:00
taca
c74021d9e4 Make this package compile with gcc-4.
Bump PKGREVISION.
2006-08-11 12:50:40 +00:00
salo
48ad7e3a7a Security fix for SA21436:
"A security issue has been reported in Heimdal, which potentially can be
 exploited by malicious, local users to perform certain actions with
 escalated privileges.

 The security issue is caused due to missing checks for whether the
 "setuid()" call has succeeded in the bundled rcp application. This may
 be exploited to perform certain actions with root privileges if the
 "setuid()" call fails due to e.g. resource limits."

http://secunia.com/advisories/21436/
http://www.pdc.kth.se/heimdal/advisory/2006-08-08/

Bump PKGREVISION.
2006-08-09 17:58:09 +00:00
salo
bb3e8f5e8d Security fixes for SA21402:
"A security issue has been reported in Kerberos, which potentially can
 be exploited by malicious, local users to perform certain actions with
 escalated privileges.

 The security issue is caused due to missing checks for whether the
 "setuid()" call has succeeded in the bundled krshd and v4rcp
 applications. This can be exploited to disclose or manipulate the
 contents of arbitrary files or execute arbitrary code with root
 privileges if the "setuid()" call fails due to e.g. resource limits."

http://secunia.com/advisories/21402/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3083
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3084
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-001-setuid.txt

Bump PKGREVISION.
2006-08-09 17:31:10 +00:00
abs
516a84e887 some apps (dovecot) need the SSLDIR rather than SSLCERTS & SSLKEYS 2006-08-09 11:23:20 +00:00
jdolecek
3f2cc5d3c9 this actually uses both c and c++ - C is used for openssl test 2006-08-07 19:38:43 +00:00
wiz
f301edf912 Update to 0.997:
v0.997
        - fix readline (e.g. getline,getlines,<>) so that it behaves
          regarding $/ like written in the $/ dokumentation.
v0.996
        - removed links and comments to inofficial release of
          Net::SSLeay, because there is a newer version already
v0.995
        - add support for Diffie Hellman Key Exchange.
          See parameter SSL_dh_file and SSL_dh.
v0.994
        - hide DEBUG statements and remove test to load Debug.pm
          because packets like Spamassisin cannot cope with it
          (at least the OpenBSD port)
v0.993
        - added SSL_cert and SSL_key parameter which do not take
          a file name like SSL_cert_file and SSL_key_file but
          an internal X509* resp. EVP_PKEY* value. Useful for
          dynamically created certificates and keys.
        - added test for sysread/syswrite behavior (which was changed
          in v0.991)
v0.992
        - _set_rw_error does $!||=EAGAIN only if error is one of
          SSL_WANT_READ|SSL_WANT_WRITE (patch from Mike Smith
          <mike at mailchannels dot com>)
        - Fix Makefile.PL to allow detectection of failures in PREREQ_PM
          (http://rt.cpan.org/Public/Bug/Display.html?id=20563, patch
          by alexchorny at gmail dot com)
v0.991
        - sysread and syswrite ar no longer the same as read and write,
          but can return already if only parts of the data are read
          or written (which is the usual semantic for sysread and syswrite)
          This should fix problems with HTTP::Daemon::SSL
v0.99
        - just upgrade Version number because I've screwed up upload
	  of v0.98 to cpan
v0.98
	- Maintainer changed to <Steffen_Ullrich at genua dot de>
	- Better support for nonblocking sockets:
	  . exports $SSL_ERROR which contains the latest error from
	    the openssl library. Exports constants SSL_WANT_READ and
	    SSL_WANT_WRITE es special errors which will be set if
	    openssl wants to write or read during nonblocking connects,
	    accepts, reads or writes.
	  . accept,accept_SSL,connect and connect_SSL don't block
	    anymore if the socket is nonblocking.
	    Instead $! will be set from the underlying IO::Socket::INET
	    connect or accept if it failed there (usually EAGAIN or
	    EINPROGRESS) or if the underlying openssl needs to read or
	    write $! will be set to EAGAIN and $SSL_ERROR will be set
	    to SSL_WANT_READ or SSL_WANT_WRITE
	  . syswrite returns undef and sets $!,$SSL_ERROR if it fails
	    to write instead of returning 0.
	- Bugfixes (http://rt.cpan.org/Public/Bug/Display.html?id=Bugid)
	  . Bug 18439: fileno 0 should be valid
	  . Bug 15001: sysread interpretes buffer "0" as ""
	- peer_certifcate returns X509 struct string if no field
	  for extraction was specified
	- get_peer_certificate returns the certificate instead of the
	  IO::Socket::SSL object
2006-08-05 17:47:25 +00:00
adrianp
406bfd4cd5 Bump to nb6 2006-08-05 13:38:26 +00:00
adrianp
ca5182745b Fix for SA21310/CVE-2006-3123
Patch via. Debian
2006-08-05 13:30:26 +00:00
dsainty
3e77ddc300 Add an HTTP download location too, as a fallback for when FTP downloads are awkward. 2006-08-05 03:13:25 +00:00
gdt
081d6c9bcb When using idea option, change license from fee-based-commercial-use
to idea-license, and also set RESTRICTED and NO_*_CDROM.
(Note that this doesn't change what happens if the idea option is unused.)
2006-08-03 14:49:14 +00:00
drochner
383423e5b5 update to 1.4.5
security update, recommended by gnupg.org
(fixes CVE-2006-3746)
changes:
* More DSA2 tweaks.
* Fixed a problem uploading certain keys to the smart card.
* Fixed 2 more possible memory allocation attacks.
* Added Norwegian translation.
2006-08-02 10:37:34 +00:00
schmonz
1c5fa5a0e5 Bump default dependency so dependent packages get shared cvm libs. 2006-07-31 01:23:55 +00:00
schmonz
6ff6cd2b92 Update to 0.81. From the changelog:
- Fixed a typo in the INSTHIER file that caused incomplete
    installations.
2006-07-31 01:23:00 +00:00
minskim
8406d11c7c USE_TOOLS+=lex 2006-07-29 05:39:09 +00:00
schmonz
fc734011fc Update to 0.80. From the changelog:
- Modified the build procedures to use libtool to produce and install
    shared libraries.

- No other code changes.
2006-07-29 00:59:23 +00:00
jlam
ccdf6dbe01 Rename "SITES_* to "SITES.*" for file-specific lists of sites from which
to fetch the file.  This completes the renaming described in revision
1.1799 of bsd.pkg.mk.
2006-07-27 18:48:02 +00:00
rillig
144a1ee175 Added "c" to USE_LANGUAGES for packages that use GNU configure scripts,
since they always need a C compiler, even when the source code is
completely in C++.

For some other packages, stated in the comment that a C compiler is
really not needed.
2006-07-22 04:46:13 +00:00
minskim
ecd492d070 This package needs zlib. Include its buildlink3.mk. This fixes PR 33856. 2006-07-21 20:26:45 +00:00
wiz
dfbce5a67d Add missing file to PLIST. Bump PKGREVISION. 2006-07-21 16:22:36 +00:00
jlam
f4776bbdaf Convert to use the pkginstall framework for INSTALL/DEINSTALL scripts. 2006-07-20 20:07:13 +00:00
jlam
70ed8f8e8b REPLACE_INTERPRETER occurs as part of the configure step, so don't set
NO_CONFIGURE.
2006-07-20 13:48:14 +00:00
wiz
8e52c97716 Fix a pkglint warning. 2006-07-19 23:02:13 +00:00
wiz
48d9fe2aa7 Remove superfluous bsd.prefs.mk inclusion. 2006-07-19 23:01:49 +00:00
wiz
f00b37853e regen with current createbuildlink. 2006-07-19 23:01:03 +00:00
wiz
82394bce31 Update to 1.1.0, based on patches provided by George Michaelson
in PR 32761.

Noteworthy changes in version 1.1.0 (2005-10-01)
------------------------------------------------

 * You can now configure the backend engine file name and home
   directory to be used, as default and per context.

 * Information about the recipients of an encrypted text is now
   available at decryption time.

 * New status GPGME_STATUS_PLAINTEXT.  This is analyzed by the decrypt
   and verify handlers, the information about the plaintext filename,
   if available is made available in the new field file_name of the
   respective result structure.

 * The code for "automagically detecting the thread library" has been
   removed from libgpgme.  It is deprecated since version 0.4.3.
   Since then, you had to link against libgpgme-pthread for
   applications using pthread and libgpgme-pth for applications using
   GNU Pth.

   The code was removed because it caused compilation problems on
   systems where the pthread.h header from GNU Pth is available in
   addition to the system header (FreeBSD 6 and later for example).

 * There is a new flag for keys and subkeys, is_qualified, which
   indicates if a key can be used for qualified signatures according
   to local government regulations.

 * You can associate a filename with a data object using the new
   function gpgme_data_set_file_name().  This filename will be stored
   in the output when encrypting or signing the data and will be
   returned when decrypting or verifying the output data.

 * You can now set notation data at signature creation with the new
   function gpgme_sig_notation_add().

 * Interface changes relative to the 1.0.3 release:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
gpgme_set_engine_info		NEW
gpgme_ctx_get_engine_info	NEW
gpgme_ctx_set_engine_info	NEW
gpgme_recipient_t		NEW
gpgme_decrypt_result_t		EXTENDED: New field recipients.
gpgme_verify_result_t		EXTENDED: New fields pubkey_algo, hash_algo.
gpgme_decrypt_result_t		EXTENDED: New field plaintext_filename.
gpgme_verify_result_t		EXTENDED: New field plaintext_filename.
GPGME_STATUS_PLAINTEXT		NEW
gpgme_key_t			EXTENDED: New field is_qualified.
gpgme_subkey_t			EXTENDED: New field is_qualified.
gpgme_data_get_file_name	NEW
gpgme_data_set_file_name	NEW
gpgme_sig_notation_flags_t	NEW
GPGME_SIG_NOTATION_HUMAN_READABLE NEW
GPGME_SIG_NOTATAION_CRITICAL	NEW
gpgme_sig_notation_clear	NEW
gpgme_sig_notation_add		NEW
gpgme_sig_notation_get		NEW
2006-07-19 22:59:59 +00:00
jlam
7af716330d Drop support for LTCONFIG_OVERRIDE. For quite a long time, pkgsrc
had actually been ignoring LTCONFIG_OVERRIDE anyway and just using
the default LIBTOOL_OVERRIDE to replace libtool scripts in packages.
This just formalizes the fact that LTCONFIG_OVERRIDE is not used
meaningfully by pkgsrc.
2006-07-19 19:14:37 +00:00
adrianp
04dea1605f Move from www.thc.org to thc.segfault.net 2006-07-18 22:12:30 +00:00
wiz
6a6d26166e Update to 1.4.1:
* Version 1.4.1 (released 2006-06-14)

** Replaced inactive ifdefs to enable openpgp support in test programs.

** Fixed bug in OpenPGP authentication handshake.

** Fixed typographical in man pages.

** Build fixes of the manual.

** Added Swedish translation.

** API and ABI modifications:
No changes since last version.
2006-07-17 17:02:02 +00:00
adrianp
a859170897 Minor typo fix. 2006-07-14 22:41:58 +00:00
heinz
24258e6d27 This is pure Perl, no compiler required. 2006-07-13 19:10:50 +00:00
bad
94809ece46 Update libfwbuilder and fwbuilder to 2.0.12. Bugfixes only.
2.0.12:
Bugs fixed in this release:
bug #1455772: Implement more portable fix for converting UTF-8 in
comments. The previous one broke the Windows installer.

2.0.11:
Bugs fixed in this release:
* fixes to make code compile with g++ 4.1.
* bug #1455772: Properly convert comments to/from UTF-8 to ensure the
script is not corrupted when copied to the firewall
* bug #1455748: "make firewall script executable".

Bugs fixed in policy compiler for iptables:
* bug #1375432: avoid using '-m state' twice for stateless rules with
with custom services.
* bug#1364060: change shell pattern to match names of conntrack modules
in Linux 2.6.

Bugs fixed in policy compiler for ipfilter:
* bug #1386226: removed nat.conf when nat rules are removed.
* bug #1393004: use 'egrep -s' on Solaris.
2006-07-13 17:37:34 +00:00
jlam
6e13044e74 Convert digest dependency to a USE_TOOLS dependency. 2006-07-13 14:36:19 +00:00
shannonjr
29143945f0 Update to prelude-lml 0.9.6. Changes:
- Fix a bug where some rules marked silent would trigger an alert.
- Load Sonicwall and Spamassassin ruleset by default.
- Fix rule syntax problem in Sonicwall ruleset.
- Fix rule indexing problem in Squid ruleset.
- Postfix rule consistency fix.
2006-07-11 09:41:33 +00:00
joerg
d418a97441 The yield syntax used in one of the modules is not supported by
Python 2.2, so mark it as 2.3+ only.
2006-07-11 00:21:17 +00:00
rillig
1e1766126d Fixed two pkglint warnings. 2006-07-10 04:20:57 +00:00
schwarz
76dbe9f124 - made sure skeyprune uses the correct perl binary
- made sure that troff-style man pages are used on every platform
- some hacks to add IRIX 5 support in hacks.mk
2006-07-09 13:39:06 +00:00
jlam
c16221a4db Change the format of BUILDLINK_ORDER to contain depth information as well,
and add a new helper target and script, "show-buildlink3", that outputs
a listing of the buildlink3.mk files included as well as the depth at
which they are included.

For example, "make show-buildlink3" in fonts/Xft2 displays:

	zlib
	fontconfig
	    iconv
	    zlib
	    freetype2
	    expat
	freetype2
	Xrender
	    renderproto
2006-07-08 23:10:35 +00:00
jlam
9430e49307 Track information in a new variable BUILDLINK_ORDER that informs us
of the order in which buildlink3.mk files are (recursively) included
by a package Makefile.
2006-07-08 22:38:58 +00:00
markd
349db29ab7 Don't try and use assembler when building 64bit on Solaris. It gets it
wrong for both amd64 and sparc.
Fixes PR pkg/32648 and possibly PR pkg/33030.
2006-07-08 21:37:02 +00:00
markd
0f621942da Solaris grep doesn't deal well with the binary output of tar when testing
if tar supports "ustar" so feed through strings before grep.
Fixes PR pkg/33776.
2006-07-08 21:29:24 +00:00
jlam
b7ebfd264d Add an explicit run-time dependency on perl because these packages
install perl scripts.  Bump the PKGREVISION for the dependency change.
2006-07-07 22:10:06 +00:00
jlam
ee68c93314 LIBTOOL_OVERRIDE generally doesn't need to be specified anymore... just
set OVERRIDE_DIRDEPTH to find any libtool scripts deeper in the WRKSRC
tree unless they're named something other than "libtool".

SHLIBTOOL_OVERRIDE generally doesn't need to be specified either -- just
define it to the empty list and shlibtool-override will look for libtool
scripts.
2006-07-07 15:49:30 +00:00
wiz
54bb8ae9ae Depend on security/kth-krb4 to make this build
on NetBSD-current (where kerberosIV was removed).
Bump PKGREVISION for dependency change.
2006-07-05 20:53:11 +00:00
jlam
00478b39e6 Sweep pkgsrc and convert packages that included intltool/buildlink3.mk
to use instead "USE_TOOLS+=intltool".  Remove now unused
intltool/buildlink3.mk
2006-07-05 05:37:39 +00:00
jlam
3a30118c2f Back out previous and do the same thing more generally for all platforms.
Since the heimdal install process will install additional headers in
${PREFIX}/include/krb5 depending on what the configure process detects,
simply query the source Makefile at install-time for the extra headers
that it will install and dynamically add them to the PLIST.
2006-07-05 04:39:14 +00:00
drochner
6f0afdfb3b +py-paramiko 2006-07-04 15:37:08 +00:00
drochner
972886bda5 add py-paramiko-1.6, a python extension implementing the ssh2 protocol 2006-07-04 15:35:54 +00:00
drochner
ef0d226cac add one... 2006-07-04 15:33:13 +00:00
drochner
ef9c99e791 update to 0.3.5
changes:
- Fix asn1_octet_der to handle writes of zero-length buffers, before
  it did not write the ASN.1 length for a zero-length buffer.  This caused
  ASN.1 encodings to be incorrect on 64-bit platforms.
- Add self test that attempt to trigger the above bug.
- Fix test of -Wno-pointer-sign.
- Improve cross-compilation to MinGW by using AC_LIBTOOL_WIN32_DLL.
2006-07-04 15:29:34 +00:00
wiz
637befe263 Update to 1.4.4:
Noteworthy changes in version 1.4.4 (2006-06-25)
------------------------------------------------

    * User IDs are now capped at 2048 byte.  This avoids a memory
      allocation attack (see CVE-2006-3082).
	[was already fixed in pkgsrc]

    * Added support for the SHA-224 hash.  Like the SHA-384 hash, it
      is mainly useful when DSS (the US Digital Signature Standard)
      compatibility is desired.

    * Added support for the latest update to DSA keys and signatures.
      This allows for larger keys than 1024 bits and hashes other than
      SHA-1 and RIPEMD/160.  Note that not all OpenPGP implementations
      can handle these new keys and signatures yet.  See
      "--enable-dsa2" in the manual for more information.
2006-07-03 21:15:14 +00:00
rillig
38ca26e82e Fixed unprivileged builds. 2006-07-02 17:20:17 +00:00
markd
90186b1231 Solaris does not have err.h, glob.h, ifaddrs.h and vis.h compatible with
heimdal, so heimdal installs its own. Add them in PLIST.SunOS
Fixes PR pkg/33656.   Bump PKGREVISION.
2006-07-02 13:53:28 +00:00
rillig
e34dcfcba2 This package needs expect(1). Bumped PKGREVISION. 2006-07-02 10:34:55 +00:00
joerg
95b1c585e0 Forgotten patchsum update. 2006-07-01 17:26:47 +00:00
joerg
a565175904 Needs Python 2.2+ 2006-06-30 11:37:56 +00:00
joerg
346cf857e5 Use config file framework. Keep the permission of the original code
for the installed version of the configuration file, but not the
example. Bump revision.
2006-06-28 17:05:50 +00:00
shannonjr
1d9bdc5d3e Back out changes unrelated to last security update. 2006-06-26 12:27:09 +00:00
salo
5ba55d77ed Security fix for CVE-2006-3082:
"parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions,
 allows remote attackers to cause a denial of service (gpg crash) and
 possibly overwrite memory via a message packet with a large length,
 which could lead to an integer overflow, as demonstrated using the
 --no-armor option."

Patch from GnuPG CVS repository.
Bump PKGREVISION.
2006-06-24 14:20:29 +00:00
shannonjr
9bcf15ef87 Backport fix for CVE-2006-3082 from GnuPG: trunk/g10/ 2006-06-23 12:28:55 +00:00
rillig
e234a07b5d Fixed the set of installed files when the "qt" or "gtk" options are
selected. Fixed pkglint warnings. Bumped PKGREVISION.
2006-06-17 13:46:34 +00:00
jlam
7d619eb1fe Support checking passwords using either Kerberos or PAM via PKG_OPTIONS.
This fixes the PLIST on systems that have PAM natively.  Bump the
PKGREVISION to 5.
2006-06-16 18:43:18 +00:00
shannonjr
32e95bcd54 Update to 0.9.5. Changes:
- Store Prelude-Manager FIFO into the profile backup directory so that FIFO
  are per profile. Fix #151.
- Update libwrap check, don't statically link libwrap. Cleanup. Fix #144.
- XMLmod: Implement CorrelationAlert processing.
- XMLmod: No ntpstamp attribute in File/Inode element datetime fields.
- XMLmod: permission -> Permission, as per IDMEF DTD requirements.
- XMLmod: Process the Checksum IDMEF element.
- XMLmod: Make AdditionalData validation pass (IDMEF v15 -> v16 change).
- XMLmod: disable-buffering option argument is optional.
- XMLmod: Correct DTD loading error.
- XMLmod: Avoid NULL libxml warning.
2006-06-16 09:45:35 +00:00
rillig
328847734f REPLACE_PERL without a runtime dependency to Perl is useless. Bumped
PKGREVISION.
2006-06-16 09:23:22 +00:00
rillig
65f0098548 Converted to the SUBST framework. 2006-06-16 09:20:32 +00:00
rillig
debd58bcce Removed the leading "@" from shell commands. 2006-06-16 09:17:21 +00:00
reed
5c9d507553 PKGMANDIR instead of "man". 2006-06-14 00:14:24 +00:00
reed
da04fb6a7e Make sudo use VARBASE.
Always use "man" instead of catpages.

Make sure "run" directory is precreated, so you don't get:
/usr/bin/sudo sudo: can't mkdir /var/run/sudo: No such file or directory

Bump PKGREVISION.

Okayed by maintainer back in December. The only concern was
that /var/run may not be for all platforms, but this is same
as other packages to (not specific to sudo).
2006-06-14 00:06:27 +00:00
joerg
e6b6a333a2 py-cheetah needs Python 2.2+ 2006-06-13 14:52:30 +00:00
joerg
2265d39d98 Forgotten patchsum update. 2006-06-13 12:00:43 +00:00
joerg
dea482e6ce Add DragonFly support. 2006-06-12 22:46:50 +00:00
joerg
066004d576 Rename to match Python naming convention. Depend on py-cheetah.
Fix PLIST. Conflict on old name.
2006-06-11 23:44:23 +00:00
joerg
65a8266e62 Needs pkg-config. 2006-06-11 14:45:50 +00:00
joerg
7fd73893c7 Forgotten patchsum. Detected by wizd(8). 2006-06-09 06:31:06 +00:00
shannonjr
94b0b5b82d Removed temporary code that should not have been committed in my last
update.
2006-06-08 22:07:24 +00:00
heinz
0cbca03253 Updated to version 5.41.
Pkgsrc changes:
  - none

Relevant changes since version 5.31:
====================================
	- modified addfile to accept indirect filehandles
		-- ref. rt.cpan.org #19627 and #19641
	- modified shasum to warn rather than die for file errors
		-- to follow conventions of GNU sha1sum/md5sum
	- added new capabilities to the "addfile" method
		-- now able to accept file names as well as handles
		-- includes mode for portable digest calculation
			-- thanks to Adam Kennedy for emails and ideas
				ref. File::LocalizeNewlines
	- used expanded addfile interface to simplify shasum (sumfile)
		-- regex a tad less general than 5.37, but handles all
			known newline variants in UNIX/Windows/MacOS
	- enhanced WARNING messages from shasum checkfile processing
		-- to mimic behavior of md5sum
	- improved error handling of checksum files in shasum
		-- to better mimic the behavior of md5sum
	- refined line-break regex in shasum (ref. sub sumfile)
		-- catches multiple CR's preceding LF
			thanks to Gisle Aas for suggested patch
	- changed loop vars to signed int's in shadump (ref. src/sha.c)
		-- to prevent type mismatch warnings
	- added "portable" option to shasum
		-- to make digests match across Windows/Unix/MacOS
	- enabled bundling of shasum command line options
		-- to mimic behavior of md5sum
	- removed \r's from text files in t/nist directory
		-- resolves SIGNATURE clashes (rt.cpan.org #18983)
	- changed suffix on SHA64_MAX (src/sha.h) to ULL
		-- eliminates gcc warnings (rt.cpan.org #18988)
	- specified minimum Perl version for module and Makefile.PL
		-- closes rt.cpan.org #18984
	- made minor code changes to silence compiler warnings
		-- resulting from signed/unsigned integer mixing
2006-06-07 20:14:23 +00:00
joerg
285c5a1c04 Needs bison. 2006-06-07 12:32:31 +00:00
joerg
610c492b99 Don't use BIOCIMMEDIATE if it doesn't exist. 2006-06-07 12:24:45 +00:00
adrianp
3f9f234e5d Update distinfo missed in the update to 1.2.5 2006-06-06 20:09:49 +00:00
adrianp
23072d8ed9 Update to 1.2.5
> - 6/4/2006 1.2.5 (sarah)
> - Added base64 encoding support for MAC addresses presented on the screen for FLoP extended database -- Juergen Leising
> - Added base64 encoding support for rebuild of packet in pcap format for FLoP extended database -- Juergen Leising
> - Fixed issue with Oracle and schema version in base_db.inc.php -- Nikns
> - Fixed bug when alerts with sig references would fail to archive causing duplicates error -- Nikns
> - Added base64 encoding support for ICMP payload additional table in base_qry_alert.php -- Juergen Leising
> - Added check for PHP Logging Level against E_NOTICES in setup/index.php -- Nikns
> - Fixed bug when certain preprocessor alerts would not be cached (for example arpspoof) -- Nikns
> - Added setup/setup_db.inc.php with CreateBASEAG() to resolve redundancy in setup and base_db_setup.php -- Nikns
> - Removed unnecessary and broken search index stuff from Create BASE AG, since schemas are already with them  -- Nikns
> - Added XSSPrintSafe() (array safe htmlspecilchars() function) and made filterSql() use ADOdb qmagic() -- Nikns
> - Changed input type of the password field to actually be password in setup3.php -- Nikns
> - Filtered all unfiltred (mainly auth system stuff) $_POST and $_GET variables using filterSql() -- Nikns
> - Santized all $_SERVER variables to be protected against XSS attacks -- Nikns
> - Added "Clear Data Tables" option in base_maintenance.php and "Repair Tables" option to execute CreateBASEAG() -- Nikns
> - Make use of FLoP's event reference. Signature name of alert which trigered "Tagged Packet" alert is shown too -- Nikns
> - Updated chinese.lang.php -- Johnson Chiang
> - Fixed Time error in searches -- Jeff Kell
> - Fixed refresh issue with ~ directories -- Kevin Johnson
> - Fixed cookie stored data and authentication scheme to correct Nikns' report on session forge issue -- GaRaGeD
> - Updated link to the Nessus plug in DB -- Jonathan W Miner
> - Fixed display after deleting alerts -- Bruce Briggs
> - Fixed Bug #1466392 - Back button doesn't work after refresh. -- Juergen Leising
> - Patches from jhart@spoofed.org to add missing ICMP and TCP type and codes - GaRaGeD
> - add support for ICMP redirect decoding. - Jon Hart
> - add decoding support for ICMP source quench and ICMP parameter problem - Jon Hart
> - split up "flags" into DF and MF, much like tcp flags are currently handled - Jon Hart
2006-06-06 19:41:43 +00:00
minskim
bb97528be1 Make this package build on platforms without native pcap. 2006-06-06 16:54:47 +00:00
shannonjr
42514c88eb Added MESSAGE file. 2006-06-06 12:30:02 +00:00
shannonjr
e0addc7626 PLIST correction. 2006-06-06 12:28:01 +00:00
shannonjr
ff989caf31 Added sql to create additional database indices supporting deletion. Without
these indices web browser will often timeout before delete operation completes.

Update to libpreludedb 0.9.8. Changes:
- Always use prelude_escape_binary() when inserting additional data, even in case
  we're inserting a string, since the database field might be of a type that require
  binary kind of escaping. Fix #143.
- Implement reading of message_processing_model, security_model, security_level.
  Handling of community member is deprecated (IDMEFv16 update).
- Fix a bug where Service->ip_version would not be read from database.
- Error reporting improvement.
2006-06-06 12:26:00 +00:00
shannonjr
c1bcede8ad Update to libprelude 0.9.9. Changes:
- Correct IDMEF v16 checksum algorithms letter case.
- Detailed, verbose error reporting when failing to read IDMEF message.
- Detailed, verbose error reporting for unsupported value operation.
2006-06-06 12:19:30 +00:00
minskim
2d1e61f7b1 Do not install files directly into etc; it should be handled through
CONF_FILES.
2006-06-06 00:57:59 +00:00
adrianp
6b90e0f80d Update to 2.6
The changes since the 2.5 release include:

msfconsole:
* Tab completion improvements
* Remember last used exploit after save
* Improved reload/rexploit/rcheck commands
* Security fixes for handling terminal escapes

msfcli:
* Security fixes for handling terminal escapes

msfweb:
* Security fixes when using defanged mode

meterpreter:
* Addition of the SAM password dump extension
* Improvements to the VNC injection

msfpescan:
* PE fingerprinting via the -S option
* Additional information via the -D option
* Major bug fixes to PE format parser

exploits:
* Major rewrites of many exploit modules
* Reliability improvements across the entire set
* 42 new exploits added since 2.5 was released
* Improved IPS evasion for SMB/DCERPC/HTTP modules

libraries:
* Human-friendly SMB and DCERPC error codes
* Reworking of the entire DCERPC API
* Incremental improvements to the SMB stack
* Integration of commonly-duplicated routines
* Major improvements to PEInfo module
2006-06-05 12:33:52 +00:00
joerg
8572e2517c Fix CONFLICTS of php/pear packages, the asterix was missing (thanks tv).
While going through the tree, fix some more packages which had similiar
issues with too strict conflicts, bump the revisions of those.
2006-06-04 16:26:54 +00:00
joerg
d1f92fbbf3 Remove OPENSSH_GID and OPENSSH_UID, it happened to work before,
since those are the values in NetBSD. In reality, they haven't been
used for ages though.
2006-06-04 14:56:37 +00:00