Commit graph

6608 commits

Author SHA1 Message Date
agc
4d43c1efb4 Provide a buildlink file for libsodium 2013-02-28 15:47:41 +00:00
agc
cddae7f603 add and enable libsodium 2013-02-28 15:44:23 +00:00
agc
10e57911b8 Import libsodium-0.3 into the Packages Collection. Provided by csosstudy E.
in PR 47600.

	NaCl (pronounced "salt") is a new easy-to-use high-speed
	software library for network communication, encryption, decryption,
	signatures, etc.

	NaCl's goal is to provide all of the core operations needed to
	build higher-level cryptographic tools.

	libsodium is a library for network communication, encryption,
	decryption, signatures, etc.

	libsodium is a portable, cross-compilable, installable,
	packageable, API-compatible version for NaCl.

One minor change was to take the "check" target out of the post-build
state and put it into the TEST_TARGET definition.
2013-02-28 15:43:25 +00:00
tez
6d317fd07b Add patch for CVE-2013-1415 (SA52390) 2013-02-28 14:19:36 +00:00
joerg
348b2d57f2 Fix linking fdpassing. 2013-02-26 11:00:59 +00:00
agc
e73aa3340e Add ane enable netpgpverify 2013-02-23 21:12:54 +00:00
agc
ed05475ec5 Initial import of netpgpverify-20120928 into the Packages Collection
netpgpverify is a standalone program to verify a PGP signature
	on a file or document. Both RSA and DSA signatures are supported,
	as are binary and document signatures.

	netpgpverify is compliant with RFC 4880.

netpgpverify is a small frontend for libnetpgpverify, to allow PGP digital
signatures to be verified from the command line.
2013-02-23 21:11:56 +00:00
agc
9c7f6bcaff Add and enable libnetpgpverify 2013-02-23 21:05:27 +00:00
agc
1154af4361 Initial import of libnetpgpverify-20120928, a library to verify PGP
signatures.

This library has no pre-requisites other than -lz and -lbz2.

	This is libnetpgpverify, a standalone library to verify PGP
	signatures.

	It uses its own internal MPI/BIGNUM functions, which are a vastly
	cut-down version of libtommath.  For this reason, utilities and other
	libraries can embed PGP signature verification, using a BSD-licensed
	library.
2013-02-23 21:04:26 +00:00
shattered
088e18038c Update homepage URLs. 2013-02-22 19:59:05 +00:00
pettai
78e9163195 OpenDNSSEC 1.3.13 - 2013-02-20
Bugfixes:
* OPENDNSSEC-388: Signer Engine: Internal serial should take into account
  the inbound serial.
* OPENDNSSEC-242: Signer Engine: Could get stuck on load signconf while
  signconf was not changed.
* Signer Engine: Fixed locking and notification on the drudge work queue,
  signals could be missed so that drudgers would stall when there was work to
  be done.
2013-02-21 15:51:17 +00:00
dholland
384132a8a7 Revbump all elisp packages after emacs changes. 2013-02-17 19:17:55 +00:00
agc
5e5b85326e Update ipv6-toolkit from 1.3beta to 1.3
Changes since previous version:

+ Minor documentation updates
+ gmake no longer needed to build
+ updated patch - still needed to quieten compiler for ctype warnings
  (reported upstream)
2013-02-16 22:39:46 +00:00
wiz
48ead00e71 Fix incorrect expansion (use PYPKGPREFIX instead of hardcoded py27) 2013-02-16 12:07:26 +00:00
wiz
d1b820f37b Recursive bump for png-1.6. 2013-02-16 11:18:58 +00:00
obache
07659b9b8d recursive bump from boost-lib shlib update. 2013-02-15 11:53:59 +00:00
schmonz
81f1451599 Update to 1.7.1. From the changelog:
* Fix autoconf issues...
2013-02-14 19:48:04 +00:00
taca
3231eb3717 Oops, forgot to "cvs rm" an obsolete patch file.
Thanks to wiz@ noted via mail.
2013-02-13 15:09:48 +00:00
taca
e7d146917c Update OpenSSL to 1.0.1e. ("Corrected fix" was already incorporated in pkgsrc.)
OpenSSL version 1.0.1e released
===============================

OpenSSL - The Open Source toolkit for SSL/TLS
http://www.openssl.org/

The OpenSSL project team is pleased to announce the release of
version 1.0.1e of our open source toolkit for SSL/TLS. This new
OpenSSL version is a new feature release. For a complete
list of changes, please see

    http://www.openssl.org/source/exp/CHANGES.

The most significant changes are:

   o Corrected fix for CVE-2013-0169
2013-02-13 14:35:19 +00:00
drochner
6a030026bf update to 3.0.28
changes: bugfixes

This prevents the recent TLS CBC padding timing attack (CVE-2013-1619).
2013-02-12 13:16:25 +00:00
agc
81747b07f2 Fix the package name to reflect that this is version 1.3beta 2013-02-11 07:22:29 +00:00
agc
ced65a02fb Add and enable ipv6-toolkit 2013-02-11 06:56:32 +00:00
agc
96464e2c63 Initial import of the SI6 ipv6-toolkit, a security assessment and
troubleshooting package for ipv6, into the Packages Collection. This is version
1.3b.

	The SI6 Networks' IPv6 toolkit is a set of IPv6
	security/trouble-shooting tools, that can send arbitrary IPv6-based
	packets.

	flow6:	A tool to perform a security asseessment of the IPv6 Flow Label.
	frag6:  A tool to perform IPv6 fragmentation-based attacks and to
		perform a security assessment of a number of fragmentation-related
		aspects.
	icmp6:	A tool to perform attacks based on ICMPv6 error messages.
	jumbo6:	A tool to assess potential flaws in the handling of IPv6 Jumbograms.
	na6:	A tool to send arbitrary Neighbor Advertisement messages.
	ni6:	A tool to send arbitrary ICMPv6 Node Information messages, and
		assess possible flaws in the processing of such packets.
	ns6:	A tool to send arbitrary Neighbor Solicitation messages.
	ra6:	A tool to send arbitrary Router Advertisement messages.
	rd6:	A tool to send arbitrary ICMPv6 Redirect messages.
	rs6:	A tool to send arbitrary Router Solicitation messages.
	scan6:	An IPv6 address scanning tool.
	tcp6:	A tool to send arbitrary TCP segments and perform a variety of
		TCP-based attacks.
2013-02-11 06:55:05 +00:00
taca
4235ca219d Depends on rubygems when ruby's version is 1.8.7.
Bump PKGREVISION.
2013-02-11 05:01:13 +00:00
taca
77111f2512 Update ruby-net-ssh-gateway to 1.2.0.
=== 1.2.0 / 06 Feb 2013

* Added public cert. All gem releases are now signed. See INSTALL in readme.
2013-02-11 02:08:16 +00:00
taca
7b1f7d8b7b Update ruby-net-sftp to 2.1.1.
=== 2.1.0 / 06 Feb 2013

* Added public cert. All gem releases are now signed. See INSTALL in readme.
* Remove self-require, it causes a warning in Ruby 1.9.2. [jbarnette]
* Allow for upload to use the filename of the local file by default [czarneckid]
* Properly handle receiving less data than requested. [thedarkone]
* Added option to create directory on directory upload [Pablo Merino]
* Remove a warnings in tests [kachick]
2013-02-11 02:07:37 +00:00
taca
03ec5b4a4e Update ruby-net-scp to 1.1.0.
=== 1.1.0 / 06 Feb 2013

* Added public cert. All gem releases are now signed. See INSTALL in readme.
2013-02-11 02:07:09 +00:00
taca
5ec83cfe44 Update ruby-net-ssh to 2.6.5.
=== 2.6.5 / 06 Feb 2013

* Fixed path in gemspec [thanks priteau]

=== 2.6.4 / 06 Feb 2013

* Added license info to gemspec [jordimassaguerpla]
* Added public cert. All gem releases are now signed.


=== 2.6.3 / 10 Jan 2013

* Small doc fix and correct error class for PKey::EC key type [Andreas Wolff]
* Improve test dependencies [Kenichi Kamiya]
2013-02-11 02:06:29 +00:00
ryoon
9bef86f5fd Bump PKGREVISION from audio/jack. 2013-02-09 22:11:28 +00:00
wiz
fbe27aee2e Remove obsolete sentence about idea. 2013-02-09 15:49:55 +00:00
jperkin
74d287ece9 Fix NetBSD/amd64 build. 2013-02-08 15:58:02 +00:00
jperkin
5d16921570 Apply upstream patch to fix data corruption.
Bump PKGREVISION.
2013-02-08 14:11:08 +00:00
wiz
b9d372dacd Revert API depends change, not needed.
Ok jperkin.
2013-02-07 11:30:57 +00:00
tron
6e639d6ed3 Reduce minium required OpenSSL version to 1.0.1c (instead of 1.0.1d) which
is what NetBSD 6.0* ships with.

The minimum ABI version was incorrect anyway and a result of an unnecessary
revision bump of the "openssl" package.
2013-02-07 10:22:57 +00:00
jperkin
becd113253 PKGREVISION bumps for the security/openssl 1.0.1d update. 2013-02-06 23:20:50 +00:00
jperkin
3dcd343e26 Update OpenSSL to 1.0.1d. Changes are far too numerous to list, the main one being
that we can now take advantage of AES-NI support in modern processors to significantly
increase performance.

Miscellaneous pkgsrc changes:

 - Remove unnecessary warning message on Solaris.
 - Fix RPATH for libgost.so.
 - MD2 support is optional, enabled by default for compatability.
2013-02-06 21:40:33 +00:00
jperkin
73dedd67c2 PKGREVISION bumps for net/libpcap update. 2013-02-06 19:30:54 +00:00
taca
066fb95196 Update openssl to 0.9.8y.
Changes between 0.9.8x and 0.9.8y [5 Feb 2013]

  *) Make the decoding of SSLv3, TLS and DTLS CBC records constant time.

     This addresses the flaw in CBC record processing discovered by
     Nadhem Alfardan and Kenny Paterson. Details of this attack can be found
     at: http://www.isg.rhul.ac.uk/tls/

     Thanks go to Nadhem Alfardan and Kenny Paterson of the Information
     Security Group at Royal Holloway, University of London
     (www.isg.rhul.ac.uk) for discovering this flaw and Adam Langley and
     Emilia Käsper for the initial patch.
     (CVE-2013-0169)
     [Emilia Käsper, Adam Langley, Ben Laurie, Andy Polyakov, Steve Henson]

  *) Return an error when checking OCSP signatures when key is NULL.
     This fixes a DoS attack. (CVE-2013-0166)
     [Steve Henson]

  *) Call OCSP Stapling callback after ciphersuite has been chosen, so
     the right response is stapled. Also change SSL_get_certificate()
     so it returns the certificate actually sent.
     See http://rt.openssl.org/Ticket/Display.html?id=2836.
     (This is a backport)
     [Rob Stradling <rob.stradling@comodo.com>]

  *) Fix possible deadlock when decoding public keys.
     [Steve Henson]
2013-02-05 15:54:30 +00:00
wiz
23bfa90cfb Update HOMEPAGE and remove commented-out sf MASTER_SITE.
From Bug Hunting.
2013-02-03 12:37:40 +00:00
jperkin
aa056b4497 Bump libssh dependency. Fixes bulk builds. 2013-02-02 01:18:03 +00:00
wiz
bd06e1cb46 Reset MAINTAINER/OWNER (became observers) 2013-02-01 22:21:05 +00:00
is
ee9abb69fa Make pkg_info show the upstream version, for comparison to advisories etc. 2013-02-01 21:55:55 +00:00
is
4431c09043 fix typo 2013-02-01 21:50:45 +00:00
is
693f205dd5 Commit missing file, and fix the version gate. Thanks to Noud de Brouwer
for beta-testing the package.
2013-02-01 16:47:51 +00:00
is
55ec1ecd6f Update libssh to (upstream) 0.5.4 == (our) 0.54.
(We need to keep the old numbering syntax to make versions compare
correctly.)

There are only two consumers in pkgsrc; one of them (remmina and
remmina-plugins) actually needed library version 0.4 or later, and
didn't build the ssh/sftp/nx plugins without. Hydra is also supposed
to build with 0.4.x and later.)

Upstream changelogs:

0.5.4:
        CVE-2013-0176 - NULL dereference leads to denial of service
        Fixed several NULL pointer dereferences in SSHv1.
        Fixed a free crash bug in options parsing.

and for completeness 0.5.3:

        This is an important SECURITY and maintenance release in
        order to address CVE-2012-4559, CVE-2012-4560, CVE-2012-4561
        and CVE-2012-4562.

        CVE-2012-4559 - Fix multiple double free() flaws
        CVE-2012-4560 - Fix multiple buffer overflow flaws
        CVE-2012-4561 - Fix multiple invalid free() flaws
        CVE-2012-4562 - Fix multiple improper overflow checks

        (...)

Suggested by Noud de Brouwer in wip/libssh and PR pkg/47518, but needed
some changes to PLIST as well as to make "pkg_admin audit" and updates
compare correctly.
2013-02-01 13:33:49 +00:00
is
455b7247c1 Update libssh to (upstream) 0.5.4 == (our) 0.54.
(We need to keep the old numbering syntax to make versions compare
correctly.)

There are only two consumers in pkgsrc; one of them (remmina and
remmina-plugins) actually needed library version 0.4 or later, and
didn't build the ssh/sftp/nx plugins without. Hydra is also supposed
to build with 0.4.x and later.)

Upstream changelogs:

0.5.4:
	CVE-2013-0176 - NULL dereference leads to denial of service
	Fixed several NULL pointer dereferences in SSHv1.
	Fixed a free crash bug in options parsing.

and for completeness 0.5.3:

	This is an important SECURITY and maintenance release in
	order to address CVE-2012-4559, CVE-2012-4560, CVE-2012-4561
	and CVE-2012-4562.

	CVE-2012-4559 - Fix multiple double free() flaws
	CVE-2012-4560 - Fix multiple buffer overflow flaws
	CVE-2012-4561 - Fix multiple invalid free() flaws
	CVE-2012-4562 - Fix multiple improper overflow checks

	(...)
2013-02-01 13:33:48 +00:00
is
2ae067baf6 Update libssh to (upstream) 0.5.4 == (our) 0.54.
(We need to keep the old numbering syntax to make versions compare
correctly.)

There are only two consumers in pkgsrc; one of them (remmina and
remmina-plugins) actually needed library version 0.4 or later, and
didn't build the ssh/sftp/nx plugins without. Hydra is also supposed
to build with 0.4.x and later.)

Upstream changelogs:

0.5.4:
        CVE-2013-0176 - NULL dereference leads to denial of service
        Fixed several NULL pointer dereferences in SSHv1.
        Fixed a free crash bug in options parsing.

and for completeness 0.5.3:

        This is an important SECURITY and maintenance release in
        order to address CVE-2012-4559, CVE-2012-4560, CVE-2012-4561
        and CVE-2012-4562.

        CVE-2012-4559 - Fix multiple double free() flaws
        CVE-2012-4560 - Fix multiple buffer overflow flaws
        CVE-2012-4561 - Fix multiple invalid free() flaws
        CVE-2012-4562 - Fix multiple improper overflow checks

        (...)

Suggested by Noud de Brouwer in wip/libssh and PR pkg/47518, but needed
some changes to PLIST as well as to make "pkg_admin audit" and updates
compare correctly.
2013-02-01 13:33:48 +00:00
is
2776e9a639 Update libssh to (upstream) 0.5.4 == (our) 0.54.
(We need to keep the old numbering syntax to make versions compare
correctly.)

There are only two consumers in pkgsrc; one of them (remmina and
remmina-plugins) actually needed library version 0.4 or later, and
didn't build the ssh/sftp/nx plugins without. Hydra is also supposed
to build with 0.4.x and later.)

Upstream changelogs:

0.5.4:
	CVE-2013-0176 - NULL dereference leads to denial of service
	Fixed several NULL pointer dereferences in SSHv1.
	Fixed a free crash bug in options parsing.

and for completeness 0.5.3:

	This is an important SECURITY and maintenance release in
	order to address CVE-2012-4559, CVE-2012-4560, CVE-2012-4561
	and CVE-2012-4562.

	CVE-2012-4559 - Fix multiple double free() flaws
	CVE-2012-4560 - Fix multiple buffer overflow flaws
	CVE-2012-4561 - Fix multiple invalid free() flaws
	CVE-2012-4562 - Fix multiple improper overflow checks

	(...)
2013-02-01 13:33:48 +00:00
jperkin
c3a27bbb2c Fix the first master site. 2013-02-01 13:13:22 +00:00
hans
6767f272e2 Use LIBABISUFFIX when creating the .pc files to make builtin openssl
work on 64bit SunOS and possibly others.
2013-02-01 12:34:15 +00:00