Commit graph

9300 commits

Author SHA1 Message Date
wiz
bff4597ffc Bump PKGREVISION for gdbm shlib major bump 2018-01-28 20:10:34 +00:00
wiz
691456c467 py-certifi: update to 2018.1.18.
Changes not found.
2018-01-28 16:38:18 +00:00
wiz
58a2a977a7 recursive bump after mpfr shlib major bump 2018-01-28 16:24:10 +00:00
bouyer
1e7228e2f0 Fix PLIST after clamav update 2018-01-28 13:22:53 +00:00
markd
63d72509a0 kauth: allow overriding the dbus install directory 2018-01-27 19:08:12 +00:00
roy
8115ceeee2 Import keychain-2.8.5 with the following improvements:
*  gnupg socket support
  *  better portability
2018-01-27 10:00:15 +00:00
bouyer
27605b8608 Fix memory/file descriptor leak in cli_scanscript().
Bump PKGREVISION.
2018-01-26 16:26:57 +00:00
bouyer
44650970f1 Reset PKGREVISION, ride previous package version bump. 2018-01-26 16:24:32 +00:00
jperkin
d24a7ffc58 sbd: Specify c++03 to avoid conflicts with std::bind. 2018-01-26 13:36:43 +00:00
bouyer
5905717e06 Update clamav and clamav-doc to 0.99.3. Changes since 0.99.2:
Security release fixing CVE-2017-12374, CVE-2017-12375, CVE-2017-12376,
CVE-2017-12377, CVE-2017-12378, CVE-2017-12379, CVE-2017-12380.
Also included are 2 minor fixes to properly detect openssl install locations on FreeBSD 11, and prevent false warnings about zlib 1.2.1# version numbers.
2018-01-26 12:20:16 +00:00
markd
52de0eb5b4 libssh: fix options.mk for current cmake based build 2018-01-25 19:52:38 +00:00
markd
e9c46ca027 kf5: strip -fvisibility=hidden in all kf5 packages
as it breaks the plugin mechanism due to not being able to
resolve various symbols
2018-01-24 19:06:06 +00:00
jperkin
41e1164ae6 qca2: Don't override QMAKE_MACOSX_DEPLOYMENT_TARGET. 2018-01-23 12:57:04 +00:00
fhajny
74add85d4c Update security/py-{acme,certbot} to 0.21.0.
### Added

- Support for the HTTP-01 challenge type was added to our Apache and Nginx
  plugins.
- IPv6 support was added to the Nginx plugin.
- Support for automatically creating server blocks based on the default server
  block was added to the Nginx plugin.
- The flags --delete-after-revoke and --no-delete-after-revoke were added
  allowing users to control whether the revoke subcommand also deletes the
  certificates it is revoking.

### Changed

- We deprecated support for Python 2.6 and Python 3.3 in Certbot and its ACME
  library.
- We split our implementation of JOSE (Javascript Object Signing and
  Encryption) out of our ACME library and into a separate package named josepy.
- We updated the ciphersuites used in Apache to the new values recommended by
  Mozilla

### Fixed

- An issue with our Apache plugin on Gentoo due to differences in their
  apache2ctl command have been resolved.
2018-01-22 13:37:25 +00:00
fhajny
95130c03ad Import josepy-1.0.1 as security/py-josepy.
JOSE protocol implementation in Python using cryptography.
2018-01-22 13:30:08 +00:00
leot
3ac4a82005 sqlmap: Update security/sqlmap to 1.2
Changes
(unfortunately upstream does not provide any changelog, this is based by
reading commit messages):
1.2
---
- Misc improvements and bug fixes

1.1.11
------
- Add support for Apache SHA1
- Add support for Joomla password
- Add support for vBulletin password hashes
- Add support for DJANGO_MD5 and DJANGO_SHA1
- Add WAF script for Wordfence
- Add WAF script for DOSarrest
- Misc improvements and bug fixes

1.1.10
------
- Polish translation
- Add support for blind-based charset dump
- Misc improvements and bug fixes
2018-01-21 21:46:34 +00:00
roy
2aa9c0a5d5 Update to keychain-2.8.4:
Uses id instead of whoami for better portability.
  GPG2 support, support for busybox ps and various optimizations.
2018-01-21 16:03:29 +00:00
markd
6c0ee424db Pass --disable-pinentry-fltk to configure to fix build when fltk installed 2018-01-20 11:06:13 +00:00
abs
a37d2c3937 Pass --disable-pinentry-fltk to configure to fix build when fltk installed 2018-01-19 13:36:42 +00:00
wiz
8408a2413f p5-Net-SSLeay: switch TEST_DEPENDS back to BUILD_DEPENDS
In pbulk with PKGSRC_RUN_TESTS, test dependencies are not installed
but expected.
2018-01-19 09:44:36 +00:00
adam
fe6e1fcfa9 py-requests-kerberos: updated to 0.12.0
0.12.0:
- Add support for channel binding tokens (assumes pykerberos support >= 1.2.1)
- Add support for kerberos message encryption (assumes pykerberos support >= 1.2.1)
- Misc CI/test fixes
2018-01-19 09:10:04 +00:00
sborrill
1a63599d49 lynis: update to 2.6.0
Changes:
--------
* Binary paths are now sorted
* Greek language added
* systemd detection improved
* VirtualBox detection extended
* Several code enhancements

Tests:
------
* [PHP-2379] - Small enhancement to resolve error on screen in some cases
* [MALW-3280] - Improved detection for BitDefender tooling
2018-01-18 16:42:40 +00:00
sborrill
d0ee27ce4d Make sure .orig files aren't installed 2018-01-18 16:26:05 +00:00
sborrill
71777ca9c3 Fix path in patch 2018-01-18 13:22:18 +00:00
markd
e92e325fbb kwallet: remove old patch 2018-01-18 05:10:44 +00:00
jnemeth
1902c33594 add and enable lynis 2018-01-18 04:57:22 +00:00
markd
41773c874e kf5: update to 5.41.0
16 months worth of updates. requires qt5>=5.7
2018-01-17 20:00:20 +00:00
markd
9e510201d4 kwalletmanager: PLIST changes for polkit-qt update 2018-01-17 18:59:53 +00:00
markd
1211c9a350 polkit-qt: update to 0.112.0
matching the polkit-qt5 version, and switching to polkit.
2018-01-17 18:48:26 +00:00
wiz
48f3fc592b p5-Net-SSLeay: update to 1.84.
Use TEST_DEPENDS.

1.84 2018-01-17
	Fixed an error in t/local/04_basic.t causing a test failure if
	Test::Exception not installed. Reported by Joel Berger.

1.83 2018-01-16
	Fixed a problem with exporting OPENSSL_NO_NEXTPROTONEG even though they are not availble on LibreSSL.
	Patch patch-SSLeay_xs-NO_NPN from Alexander Bluhm.
	Patch from Heikki Vatiainen adds support for SSL_set_default_passwd_cb* for
	OpenSSL 1.1.0f and later. LibreSSL does not support these functions, at
	least yet.
	Patch from Heikki Vatiainen adds new functions related to SSL_CTX_new.
	Patch from Heikki Vatiainen adds two new functions introduced in OpenSSL 1.1.0, a number
	of constants and a couple of const qualifiers to SSLeay.xs. Tests and
	documentation .pod were also updated.
	Patch from Heikki Vatiainen adds one new OpenSSL 1.1.0 function and has a minor fix for
	LibreSSL version detection:
	*   Added support for SSL_use_certificate_chain_file
     	function introduced in OpenSSL 1.1.0.
	*   Fixed LibreSSL version detection to correctly parse
     	LibreSSL minor version.
	Patch from Steffen Ulrich to fix memory leaks in OCSP handling. Thanks.
	Patch from Heikki Vatiainen adds new functions for certificate verification introduced in
	OpenSSL 1.02, a number of constants, new test data files, new tests and
	updates to .pod documentation.
	The new functions provide access to the built-in wildcard check
	functionality available in OpenSSL 1.0.2 and later.
	The patch also adds new tests for the new functions and updates some of
	the current tests for CTX_set_default_passwd_cb* functions.
	Added X509_STORE_CTX_new and X509_verify_cert.
	SSL_OCSP_response_verify now clears the error queue if OCSP_basic_verify fails but the
	intermediate certificate succeeds. Patch from Stefan Ullrich.
2018-01-17 08:52:51 +00:00
fhajny
1869f5db99 Update security/fast_tls to 1.0.20.
Version 1.0.20
- Include uthash.h in hex package

Version 1.0.19
- Fix couple memory leaks
- Switch hashmap to uthash library
- Use system allocator in openssl
- Update ciphers and option to safer defaults
2018-01-16 12:16:22 +00:00
jperkin
d525a984c7 openssl: Don't set LD_LIBRARY_PATH during build. 2018-01-16 09:48:46 +00:00
sborrill
f94537ebc1 lynis: add 2.5.9
Lynis is an open source security auditing tool. Used by system
administrators, security professionals, and auditors, to evaluate the
security defenses of their Linux and Unix-based systems. It runs on the host
itself, so it performs more extensive security scans than vulnerability
scanners.
2018-01-15 12:38:37 +00:00
jnemeth
0f612ec608 set sane default location for config file 2018-01-15 09:26:23 +00:00
maya
ea36019c88 sudo: avoid segfault if hostname is empty
from andrew hall in pr pkg/52923
PKGREVISION++
2018-01-14 15:29:38 +00:00
jaapb
2db819ded7 Recursive revbump associated with the update to OCaml 4.06. 2018-01-10 16:53:07 +00:00
jaapb
072d2bf47a Updated package security/ocaml-ssl to version 0.5.5.
This introduces compatibility with OCaml 4.06 (or rather safe-string)
and honours LDFLAGS during build.
2018-01-10 16:44:16 +00:00
wiz
215c1a4e0d pinentry-gtk2: update to 1.1.0.
See pinentry.
2018-01-10 12:30:00 +00:00
wiz
2e3cf37d6f pinentry: update to 1.1.0.
Noteworthy changes in version 1.1.0 (2017-12-03)
------------------------------------------------

 * A FLTK1.3-based pinentry has been contributed.

 * A TQt3-based pinentry has been contributed.

 * New option --ttyalert for pinentry-curses to alert the user.

 * Don't show "save passphrase" checkbox if secret service is
   unavailable.

 * The GTK Pinentry shows on Linux some information anout the process
   which invoked the Pinentry.

 * The GTK Pinentry does not anymore show tooltips when keyboard
   grabbing is enabled.

 * Fixed various minor problems.
2018-01-10 12:29:38 +00:00
adam
0d28a725ec py-argon2_cffi: updated to 18.1.0
18.1.0:
- It is now possible to use the ``argon2_cffi`` bindings against an Argon2 library that is provided by the system.
2018-01-10 09:39:10 +00:00
adam
0665b4cc80 Better -install_name on Darwin 2018-01-10 09:36:54 +00:00
wiz
c009f26104 p5-GnuPG-Interface: Add comment about gnupg2 support patch. 2018-01-09 10:22:47 +00:00
rillig
17e39f419d Fix indentation in buildlink3.mk files.
The actual fix as been done by "pkglint -F */*/buildlink3.mk", and was
reviewed manually.

There are some .include lines that still are indented with zero spaces
although the surrounding .if is indented. This is existing practice.
2018-01-07 13:03:53 +00:00
fhajny
40781a6508 Update security/erlang-fast_tls to 1.0.18.
- Do not report badly formed Client Hello as a TLS error
- Report meaningful error when SNI callback fails
- Add Server Name Indication support for server connections
- Libressl only offer pre 1.1 api even if it present version > 1.1
- Fix crash on Mac OS X High Sierra due to replacement of system
  OpenSSL with BoringSSL
2018-01-03 20:48:28 +00:00
rillig
7a5e496e68 Added missing LICENSE variable. 2018-01-03 01:04:54 +00:00
jperkin
e671c7d641 policykit-gnome: Disable gtk-doc, requires gtkdoc-mktmpl. 2018-01-02 10:45:54 +00:00
fhajny
3abc583dc2 Update security/vault to 0.9.1.
DEPRECATIONS/CHANGES:

- AppRole Case Sensitivity: In prior versions of Vault, `list` operations
  against AppRole roles would require preserving case in the role name, even
  though most other operations within AppRole are case-insensitive with
  respect to the role name. This has been fixed; existing roles will behave as
  they have in the past, but new roles will act case-insensitively in these
  cases.
- Token Auth Backend Roles parameter types: For `allowed_policies` and
  `disallowed_policies` in role definitions in the token auth backend, input
  can now be a comma-separated string or an array of strings. Reading a role
  will now return arrays for these parameters.
- Transit key exporting: You can now mark a key in the `transit` backend as
  `exportable` at any time, rather than just at creation time; however, once
  this value is set, it still cannot be unset.
- PKI Secret Backend Roles parameter types: For `allowed_domains` and
  `key_usage` in role definitions in the PKI secret backend, input
  can now be a comma-separated string or an array of strings. Reading a role
  will now return arrays for these parameters.
- SSH Dynamic Keys Method Defaults to 2048-bit Keys: When using the dynamic
  key method in the SSH backend, the default is now to use 2048-bit keys if no
  specific key bit size is specified.
- Consul Secret Backend lease handling: The `consul` secret backend can now
  accept both strings and integer numbers of seconds for its lease value. The
  value returned on a role read will be an integer number of seconds instead
  of a human-friendly string.
- Unprintable characters not allowed in API paths: Unprintable characters are
  no longer allowed in names in the API (paths and path parameters), with an
  extra restriction on whitespace characters. Allowed characters are those
  that are considered printable by Unicode plus spaces.

FEATURES:

- Transit Backup/Restore: The `transit` backend now supports a backup
  operation that can export a given key, including all key versions and
  configuration, as well as a restore operation allowing import into another
  Vault.
- gRPC Database Plugins: Database plugins now use gRPC for transport,
  allowing them to be written in other languages.
- Nomad Secret Backend: Nomad ACL tokens can now be generated and revoked
  using Vault.
- TLS Cert Auth Backend Improvements: The `cert` auth backend can now
  match against custom certificate extensions via exact or glob matching, and
  additionally supports max_ttl and periodic token toggles.

IMPROVEMENTS:

- auth/cert: Support custom certificate constraints
- auth/cert: Support setting `max_ttl` and `period`
- audit/file: Setting a file mode of `0000` will now disable Vault from
  automatically `chmod`ing the log file
- auth/github: The legacy MFA system can now be used with the GitHub auth
  backend
- auth/okta: The legacy MFA system can now be used with the Okta auth backend
- auth/token: `allowed_policies` and `disallowed_policies` can now be specified
  as a comma-separated string or an array of strings
- command/server: The log level can now be specified with `VAULT_LOG_LEVEL`
- core: Period values from auth backends will now be checked and applied to the
  TTL value directly by core on login and renewal requests
- database/mongodb: Add optional `write_concern` parameter, which can be set
  during database configuration. This establishes a session-wide write
  concern for the lifecycle of the mount
- http: Request path containing non-printable characters will return 400 - Bad
  Request
- mfa/okta: Filter a given email address as a login filter, allowing operation
  when login email and account email are different
- plugins: Make Vault more resilient when unsealing when plugins are
  unavailable
- secret/pki: `allowed_domains` and `key_usage` can now be specified
  as a comma-separated string or an array of strings
- secret/ssh: Allow 4096-bit keys to be used in dynamic key method
- secret/consul: The Consul secret backend now uses the value of `lease` set
  on the role, if set, when renewing a secret.
- storage/mysql: Don't attempt database creation if it exists, which can help
  under certain permissions constraints

BUG FIXES:

- api/status (enterprise): Fix status reporting when using an auto seal
- auth/approle: Fix case-sensitive/insensitive comparison issue
- auth/cert: Return `allowed_names` on role read
- auth/ldap: Fix incorrect control information being sent
- core: Fix seal status reporting when using an autoseal
- core: Add creation path to wrap info for a control group token
- core: Fix potential panic that could occur using plugins when a node
  transitioned from active to standby
- core: Fix memory ballooning when a connection would connect to the cluster
  port and then go away -- redux!
- core: Replace recursive token revocation logic with depth-first logic, which
  can avoid hitting stack depth limits in extreme cases
- core: When doing a read on configured audited-headers, properly handle case
  insensitivity
- core/pkcs11 (enterprise): Fix panic when PKCS#11 library is not readable
- database/mysql: Allow the creation statement to use commands that are not yet
  supported by the prepare statement protocol
- plugin/auth-gcp: Fix IAM roles when using `allow_gce_inference`
2018-01-02 09:35:44 +00:00
maya
e48d11bf83 Remove traces of crypto restrictions from packages.
ok for idea riastradh.
2018-01-02 05:37:22 +00:00
rillig
b381c6e2f3 Sort PLIST files.
Unsorted entries in PLIST files have generated a pkglint warning for at
least 12 years. Somewhat more recently, pkglint has learned to sort
PLIST files automatically. Since pkglint 5.4.23, the sorting is only
done in obvious, simple cases. These have been applied by running:

  pkglint -Cnone,PLIST -Wnone,plist-sort -r -F
2018-01-01 22:29:15 +00:00
adam
983847f667 Revbump after boost update 2018-01-01 21:18:06 +00:00
rillig
982cef7323 Cleaned up PLIST files.
The actual cleanup has been done by pkglint:
* Added missing identifier comments
* Replaced ${PKGMANDIR} with a simple man, since the infrastructure does
  all the magic for PLISTs
2018-01-01 18:33:32 +00:00
rillig
4760eca917 Replaced $(ROUND) with ${CURLY} variable references.
This has been a pkglint warning for several years now, and pkglint can even
fix it automatically. And it did for this commit.

Only in lang/mercury, two passes of autofixing were necessary because there
were nested variables.
2018-01-01 18:16:35 +00:00
wiz
67ea766c4c apache22: remove, it was eol'd in June 2017
Remove packages that only work with apache22.
Remove apache22 references.
2018-01-01 10:23:04 +00:00
wiz
ef622598f1 p5-Digest-SHA3: update to 1.03.
1.03  Mon Dec 25 00:08:10 MST 2017
	- added "--ignore-missing" and "--strict" options to sha3sum
		-- consistent with GNU coreutils
		-- ref. rt.cpan.org #123897

1.02  Fri Dec  8 22:44:46 MST 2017
	- added "tag" option (BSD-style checksums) to sha3sum
		-- consistent with GNU sha1sum, sha224sum, etc.
		-- thanks to Christopher Tubbs for suggestion
	- modified SHA3.pm to use XSLoader
		-- falls back to DynaLoader if necessary
2017-12-30 14:52:09 +00:00
wiz
d58aa3e988 p5-Digest-SHA: update to 6.01.
6.01  Mon Dec 25 00:08:08 MST 2017
	- added "--ignore-missing" and "--strict" options to shasum
		-- consistent with GNU coreutils
		-- ref. rt.cpan.org #123897
	- removed PERL_CORE preambles from test scripts
		-- preambles no longer needed for core testing
		-- thanks to Chris Williams for patch
		-- ref. rt.cpan.org #123863

6.00  Fri Dec  8 22:44:44 MST 2017
	- added "tag" option (BSD-style checksums) to shasum
		-- consistent with GNU sha1sum, sha224sum, etc.
		-- thanks to Christopher Tubbs for suggestion
	- modified SHA.pm to use XSLoader
		-- falls back to DynaLoader if necessary
	- decoupled Digest::SHA and Digest::SHA::PurePerl
		-- scripts/tests in each module now fully independent
		-- Digest::SHA::PurePerl to be phased out eventually
			-- past versions will remain available
2017-12-30 14:51:31 +00:00
wiz
ae3c6af700 p5-CryptX: update to 0.056.
0.056   2017-12-22
        - new Crypt::Stream::Rabbit
2017-12-30 14:50:46 +00:00
adam
cf6c6ad3b9 argon2: updated to 20171227
20171227:
Added ABI version number
AVX2/AVX-512F optimizations of BLAMKA
Set Argon2 version number from the command line
New bindings
Minor bug and warning fixes (no security issue)
2017-12-30 11:34:12 +00:00
plunky
b6fad88afb fix install: use INSTALL_SCRIPT for scripts 2017-12-28 07:01:46 +00:00
ryoon
10404af4e6 Fix RELRO build
* Fix pasto
2017-12-25 03:23:21 +00:00
wiz
4942fbd2c3 pyca: comment out dead sites 2017-12-24 10:12:10 +00:00
adam
76efedc93b py-keyring: updated to 10.5.1
10.5.1:
Prevent AttributeError on import when Debian has created broken dbus installs.
2017-12-21 14:06:32 +00:00
ryoon
c0820bea5d Revert PKGNAME change from gnupg2 to gnupg 2017-12-21 13:30:40 +00:00
ryoon
3ff89625b8 Restore PKGNAME to gnupg2 2017-12-21 13:15:21 +00:00
adam
f5a2246b38 gpgme: updated to 1.10.0
Noteworthy changes in version 1.10.0:
 * Now returns more specific error codes for decryption to distinguish
   between bad passphrase, user canceled, and no secret key.
 * Now returns key origin information if available.
 * Added context flag "auto-key-retrieve" to selectively enable the
   corresponding gpg option.
 * Added flag is_de_vs to decryption and verify results.
 * py: Use SEEK_SET as default for data.seek.
 * cpp: Various new APIs.
 * Reduced spawn overhead on Linux again.  Added new configure option
   --disable-linux-getdents to disable this feature for very old
   Linux versions.
 * Improved the Python bindings build system.
 * Made the test suite less fragile.
2017-12-21 09:47:31 +00:00
adam
8f7a6189ab gnupg2: updated to 2.2.4
Noteworthy changes in version 2.2.4:
  * gpg: Change default preferences to prefer SHA512.
  * gpg: Print a warning when more than 150 MiB are encrypted using a
    cipher with 64 bit block size.
  * gpg: Print a warning if the MDC feature has not been used for a
    message.
  * gpg: Fix regular expression of domain addresses in trust
    signatures.
  * agent: New option --auto-expand-secmem to help with high numbers
    of concurrent connections.  Requires libgcrypt 1.8.2 for having
    an effect.
  * dirmngr: Cache responses of WKD queries.
  * gpgconf: Add option --status-fd.
  * wks: Add commands --check and --remove-key to gpg-wks-server.
  * Increase the backlog parameter of the daemons to 64 and add
    option --listen-backlog.
  * New configure option --enable-run-gnupg-user-socket to first try a
    socket directory which is not removed by systemd at session end.
2017-12-21 09:45:41 +00:00
adam
8d144214f8 libassuan2: updated to 2.5.1
Noteworthy changes in version 2.5.1:
 * Fix c+p error in the previous usleep fix.

Noteworthy changes in version 2.5.0:
 * New function to change the system hooks for the socket
   interface.
 * Fix the use of the internal usleep in the nPth implementation.
 * Interface changes relative to the 2.4.0 release:
 assuan_sock_set_system_hooks   NEW.
2017-12-21 09:44:14 +00:00
jnemeth
032298222a sort 2017-12-21 07:12:39 +00:00
leot
431fc65a5d security/Makefile: Add py-keyrings.alt 2017-12-19 11:55:52 +00:00
leot
af61e5c32a py-keyrings.alt: Import py-keyrings.alt-2.3 as security/py-keyrings.alt
Alternate keyring backend implementations for use with the
keyring (security/py-keyring) package.

Packaged by myself in pkgsrc-wip.
2017-12-19 11:55:12 +00:00
jdolecek
b63a4ef664 Update php-ssh2 to current version 1.1.2, mainly for PHP 7.x support
Changes since 0.13:

1.1.2	- Version 1.1.2 is same as 1.1 except this release contains this
  changelog
- Fixed bug #72988 (Libor M.)
- Fixed bug #73198 (Langemeijer)
- Fixed php_url_parse issue (Remi Collet)
- fix Invalid write of size 1 (Remi Collet)
- Fixed bug #73819 (Mitch Hagstrand)
- Fixed bug #73410 (Mitch Hagstrand)
- Travis CI (Mitch Hagstrand)
- Various other fixes on PHP 7 code and code cleanup (Mitch Hagstrand,
  Libor M., Anatol Belski)
1.1.1	- Version 1.1.1 is same as 1.1 except this release contains this
  changelog
- Fixed bug #72988 (Libor M.)
- Fixed bug #73198 (Langemeijer)
- Fixed php_url_parse issue (Remi Collet)
- fix Invalid write of size 1 (Remi Collet)
- Fixed bug #73819 (Mitch Hagstrand)
- Fixed bug #73410 (Mitch Hagstrand)
- Travis CI (Mitch Hagstrand)
- Various other fixes on PHP 7 code and code cleanup (Mitch Hagstrand,
  Libor M., Anatol Belski)
1.1	-
1.0	- Release for PHP 7 (Sean DuBois)
- Made win32 builds depend on zlib and openssl extensions (Credomane Evonguard)
- Add blocking call to php_ssh2_direct_tcpip (Credomane Evonguard)
- Added explicit ssh2_disconnect function (Credomane Evonguard)
- Fixed bug #72150 - Fixing segfault when passing env variables (Krakjoe)
2017-12-19 10:07:41 +00:00
jdolecek
a5d52cdc21 reimport php-ssh2 as php-ssh2-0, to prepare for update of php-ssh2 to newer version which doesn't support PHP 5.6 any more 2017-12-19 10:04:06 +00:00
jperkin
e1ffb01531 lasso: Don't overwrite user CFLAGS.
Also remove patched configure.ac, we don't do that if we're also patching
configure as it doesn't achieve anything and can cause timestamp issues.
2017-12-18 15:33:59 +00:00
adam
e60cba6d43 py-asn1crypto: updated to 0.24.0
0.24.0
- `x509.Certificate().self_signed` will no longer return `"yes"` under any
  circumstances. This helps prevent confusion since the library does not
  verify the signature. Instead a library like oscrypto should be used
  to confirm if a certificate is self-signed.
- Added various OIDs to `x509.KeyPurposeId()`
- Added `x509.Certificate().private_key_usage_period_value`
- Added structures for parsing common subject directory attributes for
  X.509 certificates, including `x509.SubjectDirectoryAttribute()`
- Added `algos.AnyAlgorithmIdentifier()` for situations where an
  algorithm identifier may contain a digest, signed digest or encryption
  algorithm OID
- Fixed a bug with `x509.Certificate().subject_directory_attributes_value`
  not returning the correct value
- Fixed a bug where explicitly-tagged fields in a `core.Sequence()` would
  not function properly when the field had a default value
- Fixed a bug with type checking in `pem.armor()`
2017-12-17 16:54:02 +00:00
tnn
cc41a24d91 libassuan2: add MASTER_SITE mirror 2017-12-17 16:48:23 +00:00
fhajny
0d401ab265 Enable security/erlang-jose 2017-12-14 21:05:45 +00:00
fhajny
0475e21e84 Import jose-1.8.4 as security/erlang-jose.
JSON Object Signing and Encryption (JOSE) for Erlang and Elixir.
2017-12-14 21:04:40 +00:00
tron
6a78edf09a openssl: Fix packaging under macOS
The last change for fixing packaging under macOS did not work when
the object directory resides on a case insensitive file-system.
2017-12-14 20:44:20 +00:00
fhajny
83e05c2803 Update security/erlang-fast_tls to 1.0.17.
- Fix case clause introduced after migration to NIF.
2017-12-14 20:44:14 +00:00
jperkin
d18dbcfde9 openssl: Avoid case-sensitive issue on Darwin. Bump PKGREVISION. 2017-12-14 09:18:47 +00:00
adam
6980d27a2c libassuan2: updated to 2.4.5
Noteworthy changes in version 2.4.5:
* Avoid a blocking close on Windows with nPth.
2017-12-14 08:52:17 +00:00
adam
44d7df9449 libgcrypt: updated to 1.8.2
Noteworthy changes in version 1.8.2:

 * Bug fixes:
   - Do not use /dev/srandom on OpenBSD.
   - Fix test suite failure on systems with large pages.
   - Fix test suite to not use mmap on Windows.
   - Fix fatal out of secure memory status in the s-expression parser
     on heavy loaded systems.

 * Other:
   - Backport the auto expand secmem feature from master for use by
     the forthcoming GnuPG 2.2.4.
2017-12-14 08:49:54 +00:00
adam
0d997cbf47 libsodium: updated to 1.0.16
Version 1.0.16
 - Signatures computations and verifications are now way faster on
64-bit platforms with compilers supporting 128-bit arithmetic (gcc,
clang, icc). This includes the WebAssembly target.
 - New low-level APIs for computations over edwards25519:
`crypto_scalarmult_ed25519()`, `crypto_scalarmult_ed25519_base()`,
`crypto_core_ed25519_is_valid_point()`, `crypto_core_ed25519_add()`,
`crypto_core_ed25519_sub()` and `crypto_core_ed25519_from_uniform()`
(elligator representative to point).
 - `crypto_sign_open()`, `crypto_sign_verify_detached() and
`crypto_sign_edwards25519sha512batch_open` now reject public keys in
non-canonical form in addition to low-order points.
 - The library can be built with `ED25519_NONDETERMINISTIC` defined in
order to use synthetic nonces for EdDSA. This is disabled by default.
 - Webassembly: `crypto_pwhash_*()` functions are now included in
non-sumo builds.
 - `sodium_stackzero()` was added to wipe content off the stack.
 - Android: support new SDKs where unified headers have become the
default.
 - The Salsa20-based PRNG example is now thread-safe on platforms with
support for thread-local storage, optionally mixes bits from RDRAND.
 - CMAKE: static library detection on Unix systems has been improved
 - Argon2 and scrypt are slightly faster on Linux.
2017-12-14 08:39:09 +00:00
tsutsui
00b0af46a2 ruby-oauth: update to 0.5.4.
Upstream changes (from HISTORY):

=== 0.5.4 2017-12-08

* Fixes UnknownRequestType on Rails 5.1 for ActionDispatch::Request (xprazak2)
* Various cleanups (charliesome)
2017-12-09 19:18:47 +00:00
fhajny
b26be6dc85 Update security/openssl to 1.0.2n.
Read/write after SSL object in error state (CVE-2017-3737)
==========================================================

Severity: Moderate

OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state"
mechanism. The intent was that if a fatal error occurred during a handshake then
OpenSSL would move into the error state and would immediately fail if you
attempted to continue the handshake. This works as designed for the explicit
handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()),
however due to a bug it does not work correctly if SSL_read() or SSL_write() is
called directly. In that scenario, if the handshake fails then a fatal error
will be returned in the initial function call. If SSL_read()/SSL_write() is
subsequently called by the application for the same SSL object then it will
succeed and the data is passed without being decrypted/encrypted directly from
the SSL/TLS record layer.

In order to exploit this issue an application bug would have to be present that
resulted in a call to SSL_read()/SSL_write() being issued after having already
received a fatal error.

rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)
=========================================================

Severity: Low

There is an overflow bug in the AVX2 Montgomery multiplication procedure
used in exponentiation with 1024-bit moduli. No EC algorithms are affected.
Analysis suggests that attacks against RSA and DSA as a result of this defect
would be very difficult to perform and are not believed likely. Attacks
against DH1024 are considered just feasible, because most of the work
necessary to deduce information about a private key may be performed offline.
The amount of resources required for such an attack would be significant.
However, for an attack on TLS to be meaningful, the server would have to share
the DH1024 private key among multiple clients, which is no longer an option
since CVE-2016-0701.

This only affects processors that support the AVX2 but not ADX extensions
like Intel Haswell (4th generation).
2017-12-09 18:02:02 +00:00
fhajny
f3aa8b64a1 Update security/py-{acme,certbot} to 0.20.0.
0.20.0 - 2017-12-06

- Certbot's ACME library now recognizes URL fields in challenge
  objects in preparation for Let's Encrypt's new ACME endpoint.
- The Apache plugin now parses some distro specific Apache
  configuration files on non-Debian systems allowing it to get a
  clearer picture on the running configuration.
- Certbot better reports network failures by removing information
  about connection retries from the error output.
- An unnecessary question when using Certbot's webroot plugin
  interactively has been removed.
- Certbot's NGINX plugin no longer sometimes incorrectly reports that
  it was unable to deploy a HTTP->HTTPS redirect when requesting
  Certbot to enable a redirect for multiple domains.
- Problems where the Apache plugin was failing to find directives and
  duplicating existing directives on openSUSE have been resolved.
- An issue running the test shipped with Certbot and some our DNS
  plugins with older versions of mock have been resolved.
- On some systems, users reported strangely interleaved output
  depending on when stdout and stderr were flushed.

0.19.0 - 2017-10-04

- Certbot now has renewal hook directories where executable files can
  be placed for Certbot to run with the renew subcommand.
- After revoking a certificate with the revoke subcommand, Certbot
  will offer to delete the lineage associated with the certificate.
- When using Certbot's Google Cloud DNS plugin on Google Compute
  Engine, you no longer have to provide a credential file to Certbot
  if you have configured sufficient permissions for the instance which
  Certbot can automatically obtain using Google's metadata service.
- When deleting certificates interactively using the delete
  subcommand, Certbot will now allow you to select multiple lineages
  to be deleted at once.
- Certbot's Apache plugin no longer always parses Apache's
  sites-available on Debian based systems and instead only parses
  virtual hosts included in your Apache configuration.
- The plugins subcommand can now be run without root access.
- certbot-auto now includes a timeout when updating itself so it no
  longer hangs indefinitely when it is unable to connect to the
  external server.
- An issue where Certbot's Apache plugin would sometimes fail to
  deploy a certificate on Debian based systems if mod_ssl wasn't
  already enabled has been resolved.
- A bug in our Docker image where the certificates subcommand could
  not report if certificates maintained by Certbot had been revoked
  has been fixed.
- Certbot's RFC 2136 DNS plugin (for use with software like BIND) now
  properly performs DNS challenges when the domain being verified
  contains a CNAME record.
2017-12-09 16:39:03 +00:00
taca
a4b6c28585 security/php-oauth: Allow build with php71 and php72 2017-12-09 02:38:23 +00:00
jdolecek
8347875131 fix pasto 2017-12-06 21:48:40 +00:00
jdolecek
b51cc9a339 php-sodium expect dir name as parameter to --with-sodium, so use
BUILDLINK_PREFIX.libsodium; hopefully will fix bulk build, locally it builds
just fine without this for some reason
2017-12-06 21:47:18 +00:00
adam
f5ce11ceda py-gssapi: updated to 1.3.0
1.3.0:

Features
* Support RFC 5587: Extended GSS Mechanism Inquiry APIs
* Support RFC 5801: Using GSSAPI Mechanisms in SASL

Bugfixes
* Fix potential infinite recursion in GSSError#display_status when there is an error displaying the error
* Read the linker path during setup to support properly building with Heimdal on Debian
* Fix OID inequality comparison

Tooling
* k5test and gssapi-console now live in their own projects. They can be found at pythongssapi/k5test and pythongssapi/gssapi-console, respectively, and are available on PyPI as k5test and gssapi_console
2017-12-06 12:19:43 +00:00
triaxx
298769ee90 gnupg2: add missing -lintl LDFLAGS for FreeBSD 2017-12-05 22:29:53 +00:00
wiz
327733d070 easy-rsa: remove DIST_SUBDIR, not necessary 2017-12-04 07:19:55 +00:00
jnemeth
453d769fd2 Fix version number. Since this is brand new and didn't create a
proper package, don't bother with PKGREVISION bump.
2017-12-04 06:55:56 +00:00
jnemeth
bcc39c82dd add and enable easy-rsa 2017-12-04 06:19:37 +00:00
jnemeth
e9cb7c49f2 Import easy-rsa 3.0.3.
This is a shell script to aid with creating a Certificate Authority
and certificates for use with an OpenVPN server.  See
http://openvpn.net/howto.html for usage instructions along with
the documentation provided in this package.
2017-12-04 06:15:23 +00:00
wiz
f9a0b2e810 p5-Crypt-OpenSSL-Bignum: update to 0.09.
0.09    2017/12/01
        - fix #4 License is not specified in metadata
        - fix #6 Strip \n and \r out of $lib and $inc
        - fix #7 Fix building with OpenSSL 1.1.0
2017-12-03 08:42:23 +00:00
adam
baba6f3d16 pyOpenSSL: updated to 17.5.0
17.5.0:
Backward-incompatible changes:
* The minimum cryptography version is now 2.1.4.

Changes:
* Fixed a potential use-after-free in the verify callback and resolved a memory leak when loading PKCS12 files with cacerts.
* Added Connection.export_keying_material for RFC 5705 compatible export of keying material.
2017-12-01 08:53:17 +00:00
adam
8977d31a36 Revbump after textproc/icu update 2017-11-30 16:45:00 +00:00
adam
02d465109d py-cryptography[_vectors]: updated to 2.1.4
2.1.4:
Added X509_up_ref for an upcoming pyOpenSSL release.
2017-11-30 08:23:27 +00:00
adam
e0914ac83f py-cybox: updated to 2.1.0.16
Version 2.1.0.16
- Re-packaged 2.1.0.15 with newer setuptools to fix broken wheel.

Version 2.1.0.15
- Fully support PDFFile object.
- Add URI property to Artifact object.
- Support Object 'description' field.
- Add UnixUserAccount object.
- Fix error when PropertyTypes have 'delimiter' but no value.
- Allow setting 'condition' on Artifact object's RawArtifact propety.
- Support adding SSDEEP hashes.
- Don't include properties when adding Related Objects with inline=False.
- Handle 'event' property of Observables correctly.
2017-11-30 08:16:19 +00:00
adam
389d9c3efd py-gssapi: updated to 1.2.3
1.2.3:
Bug fixes.
2017-11-30 08:07:33 +00:00