Commit graph

19 commits

Author SHA1 Message Date
nia
ab845b2028 net: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes

Not committed (merge conflicts...):

net/radsecproxy/distinfo

The following distfiles could not be fetched (fetched conditionally?):

./net/citrix_ica/distinfo citrix_ica-10.6.115659/en.linuxx86.tar.gz
./net/djbdns/distinfo dnscache-1.05-multiple-ip.patch
./net/djbdns/distinfo djbdns-1.05-test28.diff.xz
./net/djbdns/distinfo djbdns-1.05-ignoreip2.patch
./net/djbdns/distinfo djbdns-1.05-multiip.diff
./net/djbdns/distinfo djbdns-cachestats.patch
2021-10-26 11:05:20 +00:00
nia
5c85662953 net: Remove SHA1 hashes for distfiles 2021-10-07 14:41:10 +00:00
nia
a56ed88352 maradns: Update to 2.0.17
maradns-2.0.17:
This is the stable release of MaraDNS. No security updates were made.

        Deadwood updated to 3.2.14
        Default max_mem value doubled as discussed in GitHub issue #52.
2019-10-06 12:52:20 +00:00
bsiegert
3da1ada7af Update maradns to 2.0.16.
maradns-2.0.16:

This is the stable release of MaraDNS. A very minor security update was made.
Deadwood updated to 3.2.12

maradns-2.0.15:

This is the stable release of MaraDNS. No security updates were done in this release.
Deadwood updated to 3.2.11

maradns-2.0.14:

This is the stable release of MaraDNS. No security updates were done in this release.
Deadwood updated to 3.2.10
2019-01-18 22:14:14 +00:00
agc
203292f73e Add SHA512 digests for distfiles for net category
Problems found with existing digests:
	Package haproxy distfile haproxy-1.5.14.tar.gz
	159f5beb8fdc6b8059ae51b53dc935d91c0fb51f [recorded]
	da39a3ee5e6b4b0d3255bfef95601890afd80709 [calculated]

Problems found locating distfiles:
	Package bsddip: missing distfile bsddip-1.02.tar.Z
	Package citrix_ica: missing distfile citrix_ica-10.6.115659/en.linuxx86.tar.gz
	Package djbdns: missing distfile djbdns-1.05-test25.diff.bz2
	Package djbdns: missing distfile djbdns-cachestats.patch
	Package djbdns: missing distfile 0002-dnscache-cache-soa-records.patch
	Package gated: missing distfile gated-3-5-11.tar.gz
	Package owncloudclient: missing distfile owncloudclient-2.0.2.tar.xz
	Package poink: missing distfile poink-1.6.tar.gz
	Package ra-rtsp-proxy: missing distfile rtspd-src-1.0.0.0.tar.gz
	Package ucspi-ssl: missing distfile ucspi-ssl-0.70-ucspitls-0.1.patch
	Package waste: missing distfile waste-source.tar.gz

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
2015-11-04 00:34:51 +00:00
wen
d53abc9f78 Update to 2.0.13
Add LICENSE

Upstream changes:
maradns-2.0.13:
This is the stable release of MaraDNS.

        Two non-critical buffer overflows from ParseMaraRc fixed. One can never be exploited; the other one can only be exploted by the (usually) root user by writing to the system mararc file.
        Deadwood updated to 3.2.09

    (2015-09-25)

maradns-2.0.12:
This is the stable release of MaraDNS.

        Security fix for improper free() in zoneserver
        Deadwood updated to 3.2.08
        Zone transfers now work with newer versions of dig
        Documentation updates

    (2015.08.19)

maradns-2.0.11:
This is the stable release of MaraDNS.

        Deadwood updated to 3.2.07

    (2015.01.30)
maradns-2.0.10:
This is the stable release of MaraDNS.

        Deadwood updated to 3.2.06
        Zoneserver now compiles and runs in Cygwin (so Windows users can have DNS-over-TCP support).

    (2015.01.24)
maradns-2.0.09:
This is the stable release of MaraDNS.

        Deadwood updated to 3.2.05
        Startup scripts are now chkconfig-compatible

    (2014.02.12)

maradns-2.0.08:
This is the stable release of MaraDNS.

        Deadwood updated to 3.2.04
        Make DNS packet compression case-insensitive
        Attach IPv6 glue to NS and MX records when MaraDNS is compiled for IPv6
        Remove warning when MaraDNS is compiled for IPv6
        Remove warning when compiling getzone.c

    (2014.01.14)

maradns-2.0.07d:
This is the stable release of MaraDNS.

        Deadwood updated to 3.2.03d to patch security hole discussed at samiam.org/blog/20131202.html

    (2013.12.02)
maradns-2.0.07c:
This is the stable release of MaraDNS.

        Seven-line fix to Deadwood to fix resolution problem; more details in blog

    (2013.07.20; declared stable 2013.09.20)

maradns-2.0.07b:
This is the stable release of MaraDNS.

        One-line fix to Deadwood to fix resolution problem

    (2013.04.23; declared stable 2013.06.22)

maradns-2.0.07:
This is the stable release of MaraDNS.

        MaraDNS updated for CentOS 6
        Deadwood updated to 3.2.03
        GPG key updated
        Installs and tests pass in new CentOS install

    (2013.01.20)
maradns-2.0.06:
This is a stable release of MaraDNS.

        Deadwood updated to 3.2.02

    (2012.03.11)
2015-09-26 07:40:25 +00:00
cheusov
bfa46edc40 Update to 2.0.05 by package maintainer + my fixes.
maradns-2.0.05:

     This is a stable release of MaraDNS.

       * Security bugfix for CVE-2011-5056
       * Deadwood updated to Deadwood 3.2.01
       * Nicholas Bamber's Makefile.freebsd file added.

     (2012.02.12)

   maradns-1.4.10:

     The hash compression function has better collision resistance.
     More details at http://bam2.vk.tj

     (2012.01.13)

   maradns-1.4.09:

     Hotfix: The hash randomization now has 31 bits of entropy, and
     the hash does a fairly good job of choosing a random hash
     bucket again. More details at http://al72.vk.tj

     (2011.12.30)

   maradns-1.4.08:

     Security hotfix: Hash randomization added to MaraDNS 1's
     recursive resolver. MaraDNS 2 is not impacted (it's been using
     a randomized hash since 2007). More details at
     http://al62.vk.tj

     (2011.12.29)

   maradns-1.4.07:

   This is a legacy release of MaraDNS. All patches are backports
   of MaraDNS 2.0 bug fixes.

       * A typo fix for fetchzone
       * AXFR-over-UDP packets are now correctly marked "truncated"
       * It is now possible to have the '/' in hostnames
       * Fix for Debian bug #607739: Hostname shown when
         complaining about DDIP issues
       * AngelD's issue with zone transfers when there are a lot of
         FQDN4 records fixed.
       * Karim's issue with '/read' directive fixed

     (2011.11.11)
2012-02-28 21:55:27 +00:00
obache
96553f5e89 Update maradns to 1.4.06.
maradns-1.4.06:

   This is the stable branch of MaraDNS.

       * Fix for CVE-2011-0520
       * Deadwood updated to 3.0.02

     (2011.01.28)

   maradns-1.4.05:

   This is a stable branch of MaraDNS.

       * Deadwood updated to the stable 3.0.01 release.
       * MicroDNS now returns "not implemented" when given an EDNS packet
       * FAQ updated.

     (2010.09.25)

   maradns-1.4.04:

   This is the stable branch of MaraDNS.

       * Bugfix: NAPTR records now work when ~ is used to separate
         records
       * NAPTR records now documented
       * Bugfix: ANY queries now correctly work with NS referrals
       * Example IPv6 addresses now use RFC-4193 compliant IPs
       * Website updated to point out that Deadwood is now feature
         complete and ready for beta-testing
       * Some updates to the SQA regressions
       * Deadwood updated to Deadwood 2.9.02
       * Windows-only mkSecretTxt program added (*NIX users can
         just type in "dd if=/dev/urandom of=secret.txt bs=64
         count=1"; this gives Windows the same ability).

     (2010.07.31)
2011-05-06 11:36:23 +00:00
schwarz
cb61ebf899 updated to 1.4.03
patched to support Darwin
2010-05-23 17:30:31 +00:00
tonnerre
fc39e60fea Fix a Denial-of-Service vulnerability in maradns version 1.2.12.06
Crafted CNAME entries can be used to DoS MaraDNS without this patch
See CVE-2008-0061 for more details
Approved-by: wiz
2008-03-19 22:55:21 +00:00
joerg
9258a49e84 Update to maradns-1.2.12.06.
Most important changes:
- full Y2038 compliance
- full support for DNS over TCP
- some changes in the zone format.
2007-08-12 01:14:30 +00:00
obache
578d809b76 Update maradns to 1.0.39.
changelog:
       maradns-1.0.39:

           * Backport of memory leak fix to 1.0 branch of MaraDNS

           (2006.07.24)

       maradns-1.0.38:
           Backport of MaraDNS 1.2.09 Microsoft.com fix to legacy 1.0 branch

           (2006.06.16)

       maradns-1.0.37:
           This is an update for the 1.0 legacy branch of MaraDNS

           * Removed all example mararc files which allow any IP on the
             internet to perform recursive queries (these can be used for
             denial of service attacks)

           (2006.04.07)

       maradns-1.0.36:
           This is a bugfix release for the legacy 1.0 branch of MaraDNS.

           * A backport of the 2-line patch recently posted to the mailing
             list concerning incorrect dangling CNAME warnings

           (2005.12.31)

       maradns-1.0.35:

           * Backport of 1.1.x fix of csv1 example in documentation

           * Backport of 1.1.x fix of MINFO RR description

           * Backport of 1.1.x security fix.

           (2005.11.20)

       maradns-1.0.34:

           * Hotfix: recursion works again

           * Regression procedure added.

           (2005.10.26)

       maradns-1.0.33:

           * Fixed occassional crash that happens while reading zone files at
             MaraDNS startup.

           * Fixed occassional compression error which shows up in MaraDNS
             logs.

           * Update man page to point out some unimplemented features will be
             in 1.2

           (2005.10.24)

       maradns-1.0.32:
           Hotfix: RR rotation now works again.

           (2005.08.08)

       maradns-1.0.31:
           Two patches by Albert Lee that improve Maras stability.

           (2005.08.07)

       maradns-1.0.30:

           * Warn the user when they have dangling CNAME records

           * Fix bug with MX records with preferences > 255 in getzone tool

           (2005.06.30)

       maradns-1.0.29:
           This release improves how MaraDNS'recursive resolver parses
           packets so that Mara can interoperate better with some stub
           resolvers that dont bother looking past the header of a DNS
           packet.

           (2005.05.13)
2006-12-13 04:35:16 +00:00
joerg
c20234c51d DragonFly also needs sys/time.h before sys/resource.h. 2006-01-25 17:48:54 +00:00
salo
37a5e2dd19 Update to version 1.0.28
Too many changes to list, see CHANGELOG within the source tarball.
This update was prompted by an issue with random number generator,
see the following url for details:

 http://www.maradns.org/download/patches/maradns-1.0.26-rekey_rng
2005-05-13 13:25:55 +00:00
agc
b12d62efb5 Add RMD160 digests. 2005-02-24 12:13:41 +00:00
cube
4f73b397e7 o Better handling of pthreads dependency
o Fixes to make building and installing more easy
o Make MaraDNS actually look into ${PKG_SYSCONFDIR} for its configuration
  file, thus bumping PKGREVISION.
2003-11-14 21:19:03 +00:00
wiz
92c0808d82 Make build with pth. 2003-11-14 09:34:42 +00:00
xtraeme
d6697f91b0 Updated to 1.0.18
Changes:

	Cleaned up and fixed a bug in the MaraDNS startup
	script. Now, the only prorcesses that will be killed
	will be bona fide MaraDNS processes.

Closes PR pkg/22963.
2003-09-26 10:11:58 +00:00
xtraeme
133995d090 Initial import of maradns 1.0.17.
Package provided by pancake <pancake@phreaker.net> via pkgsrc-wip.

MaraDNS is a package that implements the Domain Name Service (DNS), an
essential internet service. MaraDNS is intended for environments where a DNS
server must be secure and where the server must use the absolute minimum
number of resources possible. MaraDNS was created in response to issues
people had with the DNS servers available in early 2001; and has the
following design goals:

Security-aware programming. A DNS server needs to be secure. I have a number
of security features in the code, including:

   1. The code uses a special string library which is resistant to buffer
      overflows.

   2. The code, if started as root, mandates running as an unpriviledged user
      in a chroot() jail.

Open-Source. The 1.0 release of the DNS server is public-domain code;
the 1.2 release will be released under a very liberal BSD-style license.

Simplicity. This DNS server has the minimum number of features needed to
correctly act as an authoritative and/or recursive name server.
2003-09-25 14:12:50 +00:00