Commit graph

90 commits

Author SHA1 Message Date
taca
f65f692d8a Fix build problem with squid-ipf PKG_OPTIONS. 2016-10-16 15:58:14 +00:00
adam
818ab89337 Changes 3.5.22:
* HTTP: MUST ignore a [revalidation] response with an older Date header.
* Optimized/simplified buffering: Appending nothing is always possible.
* Hide OpenSSL tricks from Valgrind far-reaching initialization errors.
* Avoid segfaults when debugging section 4 at level 9.
* Bug 4302 pt2: IPFilter v5 transparent interception
* Bug 4594: build failure with clang 3.9
* Bug 4471: revalidation doesn't work when expired cached object lacks Last-Modified.
* Bug 2833: Collapse internal revalidation requests (SMP-unaware caches)
* Bug 3819: "fd >= 0" assertion in file_write() during reconfiguration
* Do not leak url_rewrite_extras and store_id_extras on reconfigure/shutdown.
* Do reset $HOME if needed after r13435. Minimize putenv() memory leaks.
* Bug 4228: ./configure bug/typo in r14394.
* Fix potential ICAP null pointer dereference after rev.14082
* Fix logged request size (%http::>st) and other size-related %codes.
2016-10-10 09:01:39 +00:00
taca
f22ac05d7e Update squid to 3.5.21.
Changes to squid-3.5.21 (08 Sep 2016):

	- Bug 4563: duplicate code in httpMakeVaryMark
	- Bug 4542: authentication credentials IP TTL updated incorrectly
	- Bug 4534: assertion failure in xcalloc when using many cache_dir
	- Bug 4428: mal-formed Cache-Control:stale-if-error header
	- Bug 3025: Proxy-Authenticate problem using ICAP server
	- Fix segfault via Ftp::Client::readControlReply()
	- Fix SSL-Bump failure results in SEGFAULT
	- HTTP/1.1: MUST always revalidate Cache-Control:no-cache responses
	- HTTP/1.1: do not allow Proxy-Connection to override Connection header
	- SSL: CN wildcard must only match a single domain component [fragment]
2016-09-11 17:41:17 +00:00
wiz
73716d23de Bump PKGREVISION for perl-5.24.0 for everything mentioning perl. 2016-07-09 06:38:30 +00:00
adam
fa91e154bb Changes 3.5.20:
Assertion failed: Write.cc:38: "fd_table[conn->fd].flags.open"
Bug 4523: smblib compile fails on NetBSD
Do not make bogus recvmsg(2) calls when closing UDS sockets.
Fix SEGFAULT parsing malformed adaptation service configuration
Fixed ConnStateData::In::maybeMakeSpaceAvailable() logic.
Bug 3579: assertion failed 'MemPools[type]' from dst_as ACL
Do not allow low-level debugging to hide important/critical messages.
Bug 4485: off-by-one out-of-bounds Parser::Tokenizer::int64() read errors
Increase debug level in a peek-and-splice related debug message
Fix icons loading speed.
Fix OpenSSL detection on FreeBSD
Do not override user defined -std option
Support unified EUI format code in external_acl_type
2016-07-04 12:06:45 +00:00
prlw1
510956dcd3 squid3 uses C++11 if available. Insist on C++11 if linking to libecap. 2016-06-28 10:31:42 +00:00
prlw1
5a9e700a78 Fix non-default, probably unusused so far, ecap option build, after
libecap move to C++11.
2016-06-23 15:10:36 +00:00
prlw1
91ab4457eb Add ecap option to squid3, switched off by default. 2016-06-17 16:56:28 +00:00
markd
a0275852b5 On NetBSD if squid-pf option enabled then also need --with-nat-devpf 2016-05-23 21:08:28 +00:00
taca
b01bed8b37 Update squid3 to 3.5.19, 3.5.18 contains security fix.
Changes to squid-3.5.19 (09 May 2016):

	- Regression Bug 4515: interception proxy hangs

Changes to squid-3.5.18 (06 May 2016):

	- Bug 4510: stale comment about 32KB limit on shared memory cache entries
	- Bug 4509: EUI compile error on NetBSD
	- Bug 4501: HTTP/1.1: normalize Host header
	- Bug 4498: URL-unescape the login-info after extraction from URI
	- Bug 4455: SegFault from ESIInclude::Start
	- Prevent Squid forcing -b 2048 into the arguments for sslcrtd_program
	- Fix TLS/SSL server handshake alert handling
2016-05-08 23:29:19 +00:00
adam
8913f9fd24 Fix build on NetBSD >=7.99.27 due route(4) change (deprecation of RTF_LLINFO). Courtesy of leot. 2016-04-26 10:36:48 +00:00
adam
732d55fef1 Changes 3.5.17:
* nullptr is a C++11 feature
* Fix several ESI element construction issues
* SourceFormat Enforcement
* cachemgr.cgi: use dynamic MemBuf for internal content generation
* Add chained certificates and signing certificate to peek-then-bumped connections.
* Handshake Error: ccs received early: fix typo
* Avoid startup/shutdown crashes [by avoiding static non-POD globals].
* Bugs fixed.
2016-04-22 15:14:22 +00:00
taca
6df5b7b42f Update squid3 pacakge to 3.5.16, fixing several security problems.
Please refer release note for other changes:
http://www.squid-cache.org/Versions/v3/3.5/RELEASENOTES.html

* SQUID-2016:4 - Denial of Service issue in HTTP Response processing

    http://www.squid-cache.org/Advisories/SQUID-2016_4.txt
    aka. CVE-2016-3948

This is another of the bugs left unfixed by the SQUID-2016:2 patches.
The visible symptom is assertions about:
 "String.cc:*: 'len_ + len <65536'"

There is an attack in the wild for this one, but not as widely as for
the previous issues.


* SQUID-2016:3 - Buffer overrun issue in pinger ICMPv6 processing.

    http://www.squid-cache.org/Advisories/SQUID-2016_3.txt
    aka. CVE-2016-3947

This bug shows up as pinger crashing with Icmp6::Recv errors. This may
affect Squid HTTP routing decisions. In some configurations, sub-optimal
routing decisions may result in serious service degradation or even
transaction failures.

All previous Squid-3 releases are affected by both these issues. See the
advisory for further details. Upgrade or patching should be considered a
high priority.


* pinger: drop capabilities on Linux

On Linux, it is now possible to install pinger helper with only
CAP_NET_RAW permissions raised instead of full setuid-root:

  (setcap cap_net_raw+ep /path/to/pinger &&
   chmod u-s /path/to/pinger) || :

Other operating systems without libcap capabilities features are not
affected by this change.


* Bug #4447: FwdState.cc:447 "serverConnection() == conn" assertion

This rather cripling bug appears after the CVE-2016-2569 patch. It
turned out to be a race condition closing connections and has now been
fully fixed.
2016-04-02 09:07:40 +00:00
jperkin
17661ff9a5 Bump PKGREVISION for security/openssl ABI bump. 2016-03-05 11:27:40 +00:00
jperkin
02201cb05b Use OPSYSVARS. 2016-02-26 10:57:45 +00:00
taca
91e20050c4 Update squid3 package to 3.5.15, security release.
* SQUID-2016:2 - Multiple Denial of Service issues in HTTP Response
  processing

    http://www.squid-cache.org/Advisories/SQUID-2016_2.txt

Changes to squid-3.5.15 (23 Feb 2016):

	- Bug 3870: assertion failed: String.cc: 'len_ + len <65536' in ESI::CustomParser
	- Fix multiple assertion on String overflows
	- Fix unit test errors on MacOS
	- Better handling of huge response headers. Fewer incorrect "Bug #3279" messages.
	- Log noise reduction for eCAP
2016-02-24 06:38:57 +00:00
taca
bfa05628c2 Update squid3 to 3.5.14 (Squid 3.5.14), security release.
Changes to squid-3.5.14 (16 Feb 2016):

	- Bug 4437: Fix Segfault on Certain SSL Handshake Errors
	- Bug 4431: C code is not compiled with CFLAGS
	- Bug 4418: FlexibleArray compile error with GCC 6
	- Bug 4378: assertion failed: DestinationIp.cc:60:
		'checklist->conn() && checklist->conn()->clientConnection != NULL'
	- Fix invalid FTP connection handling on blocked content
	- Fix handling of shared memory left over by Squid crashes or bugs
	- Fix mgr:config report 'qos_flows mark' output
	- Fix compile error in CPU affinity
	- Fix %un logging external ACL username
	- Avoid more certificate validation memory leaks
	- ... and some documentation updates
2016-02-16 06:50:06 +00:00
adam
d3c938ca4a Changes 3.5.13:
* Ssl::CertValidationHelper::sslSubmit: Assure that the callback->getDialer()
* Fix build error with ICC
* Fix GnuTLS detection via pkg-config
* Reflect the [ugly] reality in external_acl_type cache=n documentation.
* Avoid memory leaks when a certificate validator is used with SslBump
* Support Ephemeral Elliptic Curve Diffie-Hellman (EECDH) key exchange
* Fix clang build error after rev.13961
* Bug 4397: DragonFly BSD, POSIX shared memory is implemented as filepath
* Fix startup crash with a misconfigured (too-small) shared memory cache
* Fix connection retry and fallback after failed server TLS connections
* Complete certificate chains using external intermediate certificates
* Bug 4387: Kerberos build errors on Solaris
2016-01-11 09:24:32 +00:00
adam
8421a0225f Changes 3.5.12:
* Add missing stub definition for CPU_ISSET
* Fix build errors in cpuafinity.cc
* Bug 4228: links with krb5 libs despite --without options
* Fix delay_parameters documentation
* Stop using dangling pointers for eCAP-set custom HTTP reason phrases.
* Fix status code-based HTTP reason phrase for eCAP-generated messages.
* Revert r13921: Migrate StoreEntry to using MEMPROXY_CLASS
* Fix cache_peer forceddomain= in CONNECT
* TLS: Handshake Problem during Renegotiation
* Docs: Updated stale Ssl text to make the comment match the code again.
* Fix SSL_get_certificate() problem detection
* Polished cache_peer_access and related documentation.
* Bug 4374: refresh_pattern config parser (%)
* Bug 4373: assertion failed: client_side_request.cc:1709: 'calloutContext->redirect_state == REDIRECT_NONE'
* Make FATAL messages have a consistent prefix
2015-12-02 10:44:49 +00:00
adam
f3ac992a1e Changes 3.5.11:
* Add Locker friend class to SBuf for protection against memory issues
* Connection stats, including %<lp, missing for persistent connections
* Fix incorrect authentication headers on cache digest requests
* Bug 4281: copy-paste typos in src/tools.cc
* Bug 4188: Bumping intercepted SSL connections does not work on Solaris
* Avoid errors when parsing manager ACL in old squid.conf
* Bug 4279: No response from proxy for FTP-download of non-existing file
* Bug 3574: crashes on reconfigure and startup
* Bug 4347: compile errors with LibreSSL 2.3
2015-11-04 21:44:27 +00:00
agc
b9b754e081 Add SHA512 digests for distfiles for www category
Problems found locating distfiles:
	Package haskell-cgi: missing distfile haskell-cgi-20001206.tar.gz
	Package nginx: missing distfile array-var-nginx-module-0.04.tar.gz
	Package nginx: missing distfile encrypted-session-nginx-module-0.04.tar.gz
	Package nginx: missing distfile headers-more-nginx-module-0.261.tar.gz
	Package nginx: missing distfile nginx_http_push_module-0.692.tar.gz
	Package nginx: missing distfile set-misc-nginx-module-0.29.tar.gz
	Package nginx-devel: missing distfile echo-nginx-module-0.58.tar.gz
	Package nginx-devel: missing distfile form-input-nginx-module-0.11.tar.gz
	Package nginx-devel: missing distfile lua-nginx-module-0.9.16.tar.gz
	Package nginx-devel: missing distfile nginx_http_push_module-0.692.tar.gz
	Package nginx-devel: missing distfile set-misc-nginx-module-0.29.tar.gz
	Package php-owncloud: missing distfile owncloud-8.2.0.tar.bz2

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
2015-11-04 02:46:46 +00:00
sborrill
8c917608f4 Check current file descriptor limit and raise if required rather than
blindly setting to 4096 (which may in fact be lower than current limit).
Bump PKGREVISION
2015-10-08 10:07:10 +00:00
adam
56a30c7f10 Changes 3.5.10:
* Align behavior of MEMPROXY_CLASS's operator delete with ::delete on nullptr
* Bug 4330: Do not use SSL_METHOD::put_cipher_by_char to determine size
* Fix cache_peer login=PASS(THRU) after CVE-2015-5400
* Bug 4304: PeerConnector.cc:743 "!callback" assertion.
* Relicense SSPI helper to GPLv2+
* Bug 4208: more than one port in wccp2_service_info line causes error
* Relicense smb_lm auth helper to GPLv2+
* Relicense ntlm_fake_auth.pl to GPLv2+
* SMP: register worker listening ports one by one
* Bug 4328: %un format code does not work for external ACLs in credentials-fetching rules
* Bug 4323: Netfilter broken cross-includes with Linux 4.2
* Cleanup: Migrate StoreEntry to using MEMPROXY_CLASS
* Remove custom pool chunk size for StoreEntry
* Implement default constructor for hash_link
* Bug 4326: base64 binary encoder rejects data beginning with nil byte
2015-10-02 07:57:13 +00:00
taca
445ceaf5fa Quick fix for build problem with IP Filter 4.1.34 (NetBSD 6.1
and may be older).  Tested on NetBSD 6_STABLE and 7,0_RC3.
2015-09-23 03:59:03 +00:00
taca
40d6c0a837 Update squid3 to 3.5.9, it is security fix release.
* SQUID-2015:3 Multiple Remote Denial of service issues in SSL/TLS
  processing

These problems allow any trusted client or external server to
perform a denial of service attack on the Squid service and all
other services on the same machine.

However, the bugs are exploitable only if you have configured a
Squid-3.5 listening port with ssl-bump.

The visible signs of these bugs are a Squid crash or high CPU usage.
Skype is known to trigger the crash and/or a small amount of extra CPU
use unintentionally. Malicious traffic is possible which could have
severe effects.


* Regression Bug 3618: ntlm_smb_lm_auth rejects correct passwords

The SMB LanMan authentication helper in Squid-3.2 and later has been
rejecting valid user credentials.

Reminder: Use of this helper is deprecated. We strongly recommend
against using it. LanMan authentication gives the illusion of
transmitting NTLM protocol while actually transmitting username and
password with crypto algorithms that can be decoded in real-time (this
helper relies on that ability). The combination makes it overall less
secure than even HTTP Basic authentication.


* TLS: Support SNI on generated CONNECT after peek

When Squid generates CONNECT requests it will now attempt to use the
client SNI value if any is known.

Note that SNI is found during an ssl_bump peek action, so will only be
available on some generated CONNECT. Intercepted traffic will always
begin with a raw-IP CONNECT message which must pass access controls and
adaptations before ssl_bump peek is even considered.


* Quieten UFS cache maintenance skipped warnings

This resolves the log noise encountered since the 3.5.8 release when
large caches are running a full (aka. 'DIRTY') cache_dir rebuild scan.
2015-09-22 13:39:31 +00:00
adam
4e452c8de4 Changes 3.5.8:
Fix FreeBSD Clang-3.5 build error
Support splice for SSLv3 and TLSv1 sessions that start with an SSLv2 Hello
Bug 3553: cache_swap_high ignored and maxCapacity used instead
Fix memory leak in Surrogate-Capability header detection
When a RESPMOD service aborts, mark the body it produced as truncated.
Cleanup: fix assertion in Store unit tests
Bug 3696: crash when client delay pools are activated
Bug 4278: Docs: typo in the refresh_pattern freshness algorithm
Bug 4306: build portability fix in Kerberos helpers
Docs: auto-build release notes for snapshots
FtpServer.cc:1024: "reply != NULL" assertion
Work around clang-3.6 complaining of unknown attributes in libxml2
Ignore impossible SSL bumping actions, as intended and documented.
Bug 4242: compile errors with eCAP using clang-3.6
Docs: fix typo in miss_access
Bug 4285 partial: %us is not supported in access.log
Bug 4302: IPFilter v5 transparent interception
Docs: update intercept/tproxy related text
Bug 4301: compile errors with IPFilter interception
Polish: add debug section,level to cache.log
Reject non-chunked HTTP messages with conflicting Content-Length values
Boilerplate: update ignored files
Boilerplate: add Foundation details to rfcnb and smblib documentation files
Cleanup: de-duplicate fake-CONNECT code
Use automake subdir-objects feature
2015-09-05 14:25:37 +00:00
prlw1
be7da8f3bf Bump for IPFilter fix 2015-08-17 16:41:28 +00:00
prlw1
d6e13b2415 Fix transparent proxying with IPFilter v5.
Also fix ipf configure test, and remove superfluous debug patch.
2015-08-17 16:39:38 +00:00
adam
cfd0105e85 Changes 3.5.7:
* Bug 4293: wrong SNI sent to server after URL-rewrite
* Add ENABLE_POD2MAN_DOC automake conditional for pod2man builds
* basic_smb_auth: rejecting valid credentials
* basic_smb_auth: doesn't handle passwords with backslashes
* basic_smb_auth: nmblookup fails when smb.conf contaisn WINS servers
* Docs: fix man(8) page syntax for lexgrof tool
* Make pod2man an optional dependency
* Handle exceptions during squid.conf parse
* When SBuf chop()s away everything, always clear the buffer.
* Cleanup: avoid mentioning compiler directives in configure output
* Bug 4251: incorrect instance name for memory segments in /dev/shm
* Bug 3345: Support %un (any available user name) format code for external ACLs.
* AUFS: Raise I/O queue congestion limits
* Improve handling of client connections on shutdown
* Avoid SSL certificate db corruption with empty index.txt as a symptom.
* Errors served using invalid certificates when dealing with SSL server errors.
* IPv6: improve BCP 177 compliance
* Polish debugs on NAT failure
* Fix crash in TcpAccepter with profiler enabled
* Splice to origin cache_peer.
* Bug 4227: invalid key in AuthUserHashPointer causing assertation failure
2015-08-05 08:10:56 +00:00
adam
ad570b313b Changes 3.5.6:
* ext_edirectory_userip_acl: fix uninitialized variable
* Do not blindly forward cache peer CONNECT responses.
* Bug 3483: assertion failed store.cc:1866: 'isEmpty()'
* Use relative-URL in errorpage.css for SN.png
* Bug 4193: Memory leak on FTP listings
* Bug 4274: ssl_crtd.8 not being installed
* Fix CONNECT failover to IPv4 after trying broken IPv6 servers
* Bug 4183: segfault when freeing https_port clientca on reconfigure or exit.
* TLS: Disable client-initiated renegotiation
* Translations: add Spanish US dialect alias
* Cleanup: replace __DATE__ and __TIME__ macros
* Fix assertion String.cc:221: "str"
* Fix assertion comm.cc:759: "Comm::IsConnOpen(conn)" in ConnStateData::getSslContextDone
* Bug 3875: bad mimeLoadIconFile error handling
* Support custom OIDs in *_cert ACLs
* Bug 3329: The server side pinned connection is not closed properly
2015-07-06 09:39:40 +00:00
wiz
2e65d464e8 Recursive PKGREVISION bump for all packages mentioning 'perl',
having a PKGNAME of p5-*, or depending such a package,
for perl-5.22.0.
2015-06-12 10:50:58 +00:00
sborrill
3818900cb6 Fix transparent proxying with IPFilter. Patch submitted to squid mailing
list.
2015-06-01 16:18:20 +00:00
adam
37bc30e75c Changes 3.5.5:
* Portability: migrate auto_ptr to C++11 unique_ptr
* Portability: Define nullptr if not provided
* Cleanup: sync ModSelect.cc and ModSelectWin32.cc
* Fix segmentation fault inside Adaptation::Icap::Xaction::swanSong
* Fix "Not enough space to hold server hello message" error message
* Bug 4132: regression in short_icon_urls with global_internal_static on
* Prevent unused ssl_crtd helpers being run
* Docs: fix debug output on https_port context failure
* HTTP/2: publish RFC 7540
* Fix incorrect use of errno in various libcomm.la places
* Bug 4236: SSL negotiation error of 'success'
* Fix signal.h usage to resolve compiler warning
* Bug 3930: assertion 'connIsUsable(http->getConn())'
* Fix missing external ACL helper notes
* Bug 4238: assertion Read.cc:205: "params.data == data"
* Docs: remove 4.0-only info added by rev.13823
* comm_connect_addr on failures returns Comm:OK
* Docs: shuffle SMP specific options to the top of squid.conf
* CacheMgr: display 'client_db off' instead of 0 clients accessing cache
* Fix assertion errorpage.cc:600: "entry->isEmpty()"
* Fix assertion MemBuf.cc:380: "new_cap > (size_t) capacity" in SSL I/O buffer
2015-05-29 07:50:59 +00:00
adam
205288e03c Changes 3.5.4:
* Fix X509 server certificate domain matching
* Bug 3775: Disable HTTP/1.1 pipeline feature for pinned connections
* Cleanup: Display correct error code in debugging output for IoCallback::finish
* Cleanup: Fix spelling error in debug message in parseHttpRequest()
* Cleanup: Add whitespace to make debug message in writeComplete() more readable
* Add Kerberos support for MAC OS X 10.x
* Bug 4234: comm_connect_addr uses errno incorrectly
* Fix 'access_log none' to prevent following logs being used
* Unexpected SQUID_X509_V_ERR_DOMAIN_MISMATCH errors while accessing sites with valid certificates
* Docs: Update CONTRIBUTORS
* Ensure class Lock counter remains within bounds
* Portability: Add hacks to define C++11 explicit N-bit type limits
* Fix SSL_get_peer_certificate memory leak
* Bug 4231 pt2: comm_open_uds does not provide description for newly opened FD
* Bug 4231 pt1: fd_open() not correctly handling empty descriptions
* Negotiate Kerberos authentication request size exceeds output buffer size.
* Do not increment an iterator invalidated by std::map::erase().
* Fix require-proxy-header preventing HTTPS proxying and ssl-bump
* Fix atomics check broken by C++11 #include added in v3.5 branch r13783
* Support for resuming TLS sessions
* Bug 4212: ssl_crtd crashes with corrupt database
* Fix rev.13795 ServerName class
* Add server_name ACL matching server name(s) obtained from various sources
* Bug 4226: digest_edirectory_auth: found but cannot be built
* Invalid request->clientConnectionManager object used by Ssl::PeerConnector::handleNegotiateError
* Bug 4198: assertion failed: client_side.h:364: "sslServerBump == srvBump"
* Fix cross-compile issues with SSL_get_certificate()
* Docs: RFC 7238 obsoleted by RFC 7538
* Boilerplate: reference Translator copyrights in CREDITS
* Cleanup: Place explicit size on ref-count lock counter
* Cleanup: extend SBuf debugging information
* digest_edirectory_auth: Fix -lnettle dependency error
2015-05-04 09:13:34 +00:00
taca
81c2a94aab Update squid3 to 3.5.2 (Squid 3.5.3).
Changes to squid-3.5.2 (18 Feb 2015):

	- Regression Bug 4176: Digest auth too many helper lookups
	- Regression Bug 4180: not-fully-initialized data member in ACLUserData
	- Bug 4172: Solaris broken krb5-config
	- Bug 4073: Cygwin compile errors
	- Bug 3919: remove several never-true / never-false comparisons
	- HTTPS: Add missing root CAs when validating chains that passed internal checks
	- Fix some cbdataFree related memory leaks
	- Quieten CBDATA 'leak' messages
	- Set SNI information in transparent bumping mode
	- negotiate_kerberos_auth: fix krb5.conf backward compatibility
	- Fix memory leaks in cachemgr.cgi URL parser
	- Fix sslproxy_options in peek-and-splice mode
	- ... and fix several portability and build issues
	- ... and some documentation updates
	- ... and all fixes from squid 3.4.11
2015-02-19 01:10:23 +00:00
obache
9933a49f07 libltdl is used. 2015-01-22 11:53:21 +00:00
obache
f6ddef94e0 int64_t GNU atomic operations are used, check them instead in configure.
i486 is not sufficient, i686 and/or much newer compiler will be required for
NetBSD-5.*-i386.
2015-01-22 11:38:58 +00:00
obache
901b079579 --with-krb5-config is not in the current version, try to use currently available
other ways instead.
2015-01-22 09:32:49 +00:00
adam
fa4db2a7f8 Changes 3.5.1:
Support libecap v1.0
Authentication helper query extensions
Support named services
Upgraded squidclient tool
Helper support for concurrency channels
Native FTP Relay
Receive PROXY protocol, Versions 1 & 2
Basic authentication MSNT helper changes
2015-01-21 11:23:16 +00:00
adam
1c684e7744 Fix buidling when IPF is turned on 2015-01-17 10:20:57 +00:00
adam
50244501b2 Changes 3.4.11:
* cachemgr.cgi: memory leak in request parser
* Fix typo on commStartSslClose
* Fix SQUID_CC_REQUIRE_ARGUMENT autoconf macro
* Bug 3760: squidclient ignores --disable-ipv6
* Bug 3664: ssl_crtd fails to build on OpenSolaris/OpenIndiana/Solaris 11
* Bug 3754: configure doesnt detect IPFilter 5.1.2 system headers
* Bug 4164: SEGFAULT when %W formating code used in errorpages
* Deleting first fs left psstate->servers pointing to uninitialized memory
* Maintenance: check release notes on packaging
* Bug 4057: Avoid on-exit crashes when adaptation is enabled.
2015-01-16 11:41:11 +00:00
adam
02768a438c Changes 3.4.10:
* Fix bootstrap.sh dependency on SPONSORS.list
* HTTP/2: Support 421 (Misdirected Request) status code
* Alternate-Protocol is a hop-by-hop header
* Bug 4148: external_acl_type header format does not accept the new libformat syntax
* Bug 4033: Rebuild corrupted ssl_db/size file
* Bug 3902: Docs: external_acl_type cache hash key
* Bug 4145: squid_endian.h compile errors with OpenBSD 5.6
* Fix segmentation fault in ACLUrlPathStrategy::match
2014-12-10 10:18:36 +00:00
adam
aa108e4d40 Changes 3.4.9:
* Fix man(8)/man(1) page syntax
* Source Maintenance: bump astyle version to 2.03
* Bug 4093: source-maintenance.sh bad perl -i option
* Bug 4102: sslbump cert contains only a dot character in key usage extension
* kerberos_ldap_group/cert_tool: Remove ksh dependency
* ext_kerberos_ldap_group_acl: Fix regression typo in 3.4.7
* Bug 3803: ident leaks memory on failure
* Bug 4024: Bad host/IP ::1 when using IPv4-only environment
* Bug 4093: source-maintenance.sh errors and warnings due to wrong tools/options
* CBDATA: log memory leak situations when --enable-debug-cbdata
* Bug 4088: memory leak in external_acl_type helper with cache=0 or ttl=0
* SourceFormat Enforcement
2014-11-08 09:33:33 +00:00
taca
2088a1d275 Update squid to 3.4.8, a security release resolving several vulnerability
issues found in the prior Squid releases.

The major changes to be aware of:

* CVE-2014-6270 : SQUID-2014:3 Buffer overflow in SNMP processing

  http://www.squid-cache.org/Advisories/SQUID-2014_3.txt

This vulnerability allows any client who is allowed to send SNMP
packets to the proxy to perform a denial of service attack on Squid.

The issue came to light as the result of active 0-day attacks. Since
publication several other attack sightings have been reported.


* CVE-2014-7141 and CVE-2014-7142 : SQUID-2014:4

  http://www.squid-cache.org/Advisories/SQUID-2014_4.txt

These vulnerabilities allow a remote attack server to trigger DoS or
information leakage by sending various malformed ICMP and ICMPv6
packets to the Squid pinger helper.
The worst-case DoS scenario is a rarity, a more common impact will be
general service degradation for high-performance systems relying on
the pinger for realtime network measurement.


 All users of Squid are urged to upgrade to this release as soon as
possible.



 See the ChangeLog for the full list of changes in this and earlier
 releases.

Please refer to the release notes at
http://www.squid-cache.org/Versions/v3/3.4/RELEASENOTES.html
when you are ready to make the switch to Squid-3.4

Upgrade tip:
  "squid -k parse" is starting to display even more
   useful hints about squid.conf changes.
2014-10-02 07:33:47 +00:00
tron
935985957a Get "/etc/rc.d/squid status" and "/etc/rc.d/squid restart" to work again
under NetBSD (and other platforms using "/etc/rc.subr"?).

Bump package revision because of this fix.
2014-08-29 11:13:46 +00:00
adam
6e3b762266 Changes 3.4.7:
kerberos_ldap_group: Fix 'error during setup of Kerberos credential cache'
Ignore Range headers with unidentifiable byte-range values
Use v3 for fake certificate if we add _any_ certificate extension.
Fix regression in rev.13156
Fix %USER_CA_CERT_* and %CA_CERT_ external_acl formating codes
Enable compile-time override for MAXTCPLISTENPORTS
ntlm_sspi_auth: fix various build errors
negotiate_wrapper: vfork is not portable
Windows: fix iphlpapi.h include case-sensitivity
Windows: correct libsspwin32 API for SSP_LogonUser()
negotiate_sspi_auth: Portability fixes for MinGW
ext_lm_group_acl: portability fixes for MinGW
SourceFormat Enforcement
Bug 4080: worker hangs when client identd is not responding
Bug 3966: Add KeyEncipherment when ssl-bump substitues RSA for EC.
Reduce cache_effective_user was leaking $HOME memory
2014-08-28 16:52:02 +00:00
adam
3acb8fc7c7 Changes 3.4.6:
Docs: external_acl_type documentation lies for cache=n option
Non https connectiona on SSL-bump enabled port may stuck
Do not leak implicit ACLs during reconfigure.
Assure that when LruMap::memLimit_ is set to 0 no entries stored on LruMap
Portability: use 64-bit for X-Cache-Age header
Windows: fix various libip build issues
Windows: rename TcpLogger::connect
Windows: rename ConnOpener::connect
Change order of BSD-specific network includes so that they are properly picked up
Do not leak ex_data for SSL state that survived reconfigure.
Do not register the same Cache Manager action more than once
Fix leaked TcpAcceptor job on reconfiguration
Fix leak of ACLs related to adaptation access rules
Bug 4056: assertion MemPools[type] from netdbExchangeStart()
Bug 4065: round-robin neighbor selection with unequal weights
Bug 4050: Segfault in CommSelectEngine::checkEvents on helper response
Fix segfault setting up server SSL connnection
Regression: segfault logging with %tg format specifier
SourceFormat Enforcement
2014-07-02 08:48:27 +00:00
asau
fc9006b5e9 configure fails to detect <netinet/ip_icmp.h> presense on FreeBSD 10.
Work around it.
2014-06-27 23:07:44 +00:00
wiz
7eeb51b534 Bump for perl-5.20.0.
Do it for all packages that
* mention perl, or
* have a directory name starting with p5-*, or
* depend on a package starting with p5-
like last time, for 5.18, where this didn't lead to complaints.
Let me know if you have any this time.
2014-05-29 23:35:13 +00:00
adam
84148f2dad Changes 3.4.5:
* Logformat annotation fixes
* Resolve 'dying from an unhandled exception: c'
* Fix order dependency between cache_dir and maximum_object_size
* Bug 4051: fix inverted test on CONNECT payload existence
2014-05-05 09:59:21 +00:00