Commit graph

8 commits

Author SHA1 Message Date
nia
3df0f20e22 security: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes

Unfetchable distfiles (fetched conditionally?):
./security/cyrus-sasl/distinfo cyrus-sasl-dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d.patch.v2
2021-10-26 11:16:56 +00:00
nia
fa4b2904a6 security: Remove SHA1 hashes for distfiles 2021-10-07 14:53:40 +00:00
bacon
3f84ea81e5 security/munge: Fix PLIST issues, new maintainer bacon@NetBSD.org
Also add LICENSE, patch Linux init scripts, create etc/munge dir
2018-03-24 18:05:58 +00:00
wiz
cd8788b7b0 munge: update to 0.5.13 to fix build with openssl-1.1.
munge-0.5.13 (2017-09-26):
- Added support for OpenSSL 1.1.0. (#54)
- Added support for UID/GID values >= 2^31.
- Added support for getentropy() and getrandom().
- Added --trusted-group cmdline opt to munged.
- Added --log-file and --seed-file cmdline opts to munged. (#57)
- Changed default MAC algorithm to SHA-256.
- Fixed autoconf installation directory variable substitution. (#47)
- Fixed all gcc, clang, and valgrind warnings.
- Improved resilience and unpredictability of PRNG.
- Improved hash table performance.
- Removed libmissing dependency from libmunge. (#49)

munge-0.5.12 (2016-02-25):
- Changed project homepage to <https://dun.github.io/munge/>.
- Changed RPM specfile from sysvinit to systemd. (#33)
- Added --max-ttl cmdline opt to munged. (#28)
- Added --pid-file cmdline opt to munged. (#41)
- Added support for "make dist" and "make distcheck". (#45)
- Fixed group-writable permissions error for logfile on Ubuntu. (#31)
- Fixed packaging with missing pkgconfig munge.pc file. (#25)
- Fixed packaging with missing systemd service & tmpfiles.d config. (#34)
- Fixed recursive make command in makefiles. (#40)
2018-02-28 09:20:29 +00:00
agc
5293710fb4 Add SHA512 digests for distfiles for security category
Problems found locating distfiles:
	Package f-prot-antivirus6-fs-bin: missing distfile fp-NetBSD.x86.32-fs-6.2.3.tar.gz
	Package f-prot-antivirus6-ws-bin: missing distfile fp-NetBSD.x86.32-ws-6.2.3.tar.gz
	Package libidea: missing distfile libidea-0.8.2b.tar.gz
	Package openssh: missing distfile openssh-7.1p1-hpn-20150822.diff.bz2
	Package uvscan: missing distfile vlp4510e.tar.Z

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
2015-11-04 01:17:40 +00:00
joerg
1501f302a6 Fix build. 2013-12-08 22:34:10 +00:00
asau
02d5a6dc4f Update to MUNGE 0.5.11
munge-0.5.11 (2013-08-27):
- Added --mlockall cmdline opt to munged.
- Added --syslog cmdline opt to munged.
- Added --uid and --gid cmdline opts to munge.
- Added numeric timezone to unmunge timestamp output.
- Added timer to munged for periodically stirring PRNG entropy pool.
- Added support for pkg-config.
- Added support for systemd.
- Changed timer thread to better accommodate misbehaving system clocks.
- Changed behavior of munge --string cmdline opt to not append newline.
- Changed init script chkconfig priority levels to start after ntpd/ntpdate.
- Changed init script so munged runs as munge user by default.
- Fixed HMAC validation timing attack vulnerability.
- Fixed bug with munged being unable to restart if daemon not cleanly shutdown.
- Fixed bug with large groups triggering "numerical result out of range" error.
- Fixed bug causing high CPU utilization on FreeBSD when processing group info.
- Fixed bug causing IPv6-only hosts to exit due to failed hostname resolution.
- Fixed autoconf check that was not portable across shells.
- Fixed init script LSB Header on openSUSE.
- Replaced perl build-time dependency with awk.
2013-12-06 00:24:10 +00:00
asau
e30b5a755a Import MUNGE 0.5.10 as security/munge.
MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service
for creating and validating credentials. It is designed to be
highly scalable for use in an HPC cluster environment. It allows
a process to authenticate the UID and GID of another local or
remote process within a group of hosts having common users and
groups. These hosts form a security realm that is defined by a
shared cryptographic key. Clients within this security realm can
create and validate credentials without the use of root
privileges, reserved ports, or platform-specific methods.
2012-02-19 03:51:17 +00:00