Commit graph

9382 commits

Author SHA1 Message Date
leot
af61e5c32a py-keyrings.alt: Import py-keyrings.alt-2.3 as security/py-keyrings.alt
Alternate keyring backend implementations for use with the
keyring (security/py-keyring) package.

Packaged by myself in pkgsrc-wip.
2017-12-19 11:55:12 +00:00
jdolecek
b63a4ef664 Update php-ssh2 to current version 1.1.2, mainly for PHP 7.x support
Changes since 0.13:

1.1.2	- Version 1.1.2 is same as 1.1 except this release contains this
  changelog
- Fixed bug #72988 (Libor M.)
- Fixed bug #73198 (Langemeijer)
- Fixed php_url_parse issue (Remi Collet)
- fix Invalid write of size 1 (Remi Collet)
- Fixed bug #73819 (Mitch Hagstrand)
- Fixed bug #73410 (Mitch Hagstrand)
- Travis CI (Mitch Hagstrand)
- Various other fixes on PHP 7 code and code cleanup (Mitch Hagstrand,
  Libor M., Anatol Belski)
1.1.1	- Version 1.1.1 is same as 1.1 except this release contains this
  changelog
- Fixed bug #72988 (Libor M.)
- Fixed bug #73198 (Langemeijer)
- Fixed php_url_parse issue (Remi Collet)
- fix Invalid write of size 1 (Remi Collet)
- Fixed bug #73819 (Mitch Hagstrand)
- Fixed bug #73410 (Mitch Hagstrand)
- Travis CI (Mitch Hagstrand)
- Various other fixes on PHP 7 code and code cleanup (Mitch Hagstrand,
  Libor M., Anatol Belski)
1.1	-
1.0	- Release for PHP 7 (Sean DuBois)
- Made win32 builds depend on zlib and openssl extensions (Credomane Evonguard)
- Add blocking call to php_ssh2_direct_tcpip (Credomane Evonguard)
- Added explicit ssh2_disconnect function (Credomane Evonguard)
- Fixed bug #72150 - Fixing segfault when passing env variables (Krakjoe)
2017-12-19 10:07:41 +00:00
jdolecek
a5d52cdc21 reimport php-ssh2 as php-ssh2-0, to prepare for update of php-ssh2 to newer version which doesn't support PHP 5.6 any more 2017-12-19 10:04:06 +00:00
jperkin
e1ffb01531 lasso: Don't overwrite user CFLAGS.
Also remove patched configure.ac, we don't do that if we're also patching
configure as it doesn't achieve anything and can cause timestamp issues.
2017-12-18 15:33:59 +00:00
adam
e60cba6d43 py-asn1crypto: updated to 0.24.0
0.24.0
- `x509.Certificate().self_signed` will no longer return `"yes"` under any
  circumstances. This helps prevent confusion since the library does not
  verify the signature. Instead a library like oscrypto should be used
  to confirm if a certificate is self-signed.
- Added various OIDs to `x509.KeyPurposeId()`
- Added `x509.Certificate().private_key_usage_period_value`
- Added structures for parsing common subject directory attributes for
  X.509 certificates, including `x509.SubjectDirectoryAttribute()`
- Added `algos.AnyAlgorithmIdentifier()` for situations where an
  algorithm identifier may contain a digest, signed digest or encryption
  algorithm OID
- Fixed a bug with `x509.Certificate().subject_directory_attributes_value`
  not returning the correct value
- Fixed a bug where explicitly-tagged fields in a `core.Sequence()` would
  not function properly when the field had a default value
- Fixed a bug with type checking in `pem.armor()`
2017-12-17 16:54:02 +00:00
tnn
cc41a24d91 libassuan2: add MASTER_SITE mirror 2017-12-17 16:48:23 +00:00
fhajny
0d401ab265 Enable security/erlang-jose 2017-12-14 21:05:45 +00:00
fhajny
0475e21e84 Import jose-1.8.4 as security/erlang-jose.
JSON Object Signing and Encryption (JOSE) for Erlang and Elixir.
2017-12-14 21:04:40 +00:00
tron
6a78edf09a openssl: Fix packaging under macOS
The last change for fixing packaging under macOS did not work when
the object directory resides on a case insensitive file-system.
2017-12-14 20:44:20 +00:00
fhajny
83e05c2803 Update security/erlang-fast_tls to 1.0.17.
- Fix case clause introduced after migration to NIF.
2017-12-14 20:44:14 +00:00
jperkin
d18dbcfde9 openssl: Avoid case-sensitive issue on Darwin. Bump PKGREVISION. 2017-12-14 09:18:47 +00:00
adam
6980d27a2c libassuan2: updated to 2.4.5
Noteworthy changes in version 2.4.5:
* Avoid a blocking close on Windows with nPth.
2017-12-14 08:52:17 +00:00
adam
44d7df9449 libgcrypt: updated to 1.8.2
Noteworthy changes in version 1.8.2:

 * Bug fixes:
   - Do not use /dev/srandom on OpenBSD.
   - Fix test suite failure on systems with large pages.
   - Fix test suite to not use mmap on Windows.
   - Fix fatal out of secure memory status in the s-expression parser
     on heavy loaded systems.

 * Other:
   - Backport the auto expand secmem feature from master for use by
     the forthcoming GnuPG 2.2.4.
2017-12-14 08:49:54 +00:00
adam
0d997cbf47 libsodium: updated to 1.0.16
Version 1.0.16
 - Signatures computations and verifications are now way faster on
64-bit platforms with compilers supporting 128-bit arithmetic (gcc,
clang, icc). This includes the WebAssembly target.
 - New low-level APIs for computations over edwards25519:
`crypto_scalarmult_ed25519()`, `crypto_scalarmult_ed25519_base()`,
`crypto_core_ed25519_is_valid_point()`, `crypto_core_ed25519_add()`,
`crypto_core_ed25519_sub()` and `crypto_core_ed25519_from_uniform()`
(elligator representative to point).
 - `crypto_sign_open()`, `crypto_sign_verify_detached() and
`crypto_sign_edwards25519sha512batch_open` now reject public keys in
non-canonical form in addition to low-order points.
 - The library can be built with `ED25519_NONDETERMINISTIC` defined in
order to use synthetic nonces for EdDSA. This is disabled by default.
 - Webassembly: `crypto_pwhash_*()` functions are now included in
non-sumo builds.
 - `sodium_stackzero()` was added to wipe content off the stack.
 - Android: support new SDKs where unified headers have become the
default.
 - The Salsa20-based PRNG example is now thread-safe on platforms with
support for thread-local storage, optionally mixes bits from RDRAND.
 - CMAKE: static library detection on Unix systems has been improved
 - Argon2 and scrypt are slightly faster on Linux.
2017-12-14 08:39:09 +00:00
tsutsui
00b0af46a2 ruby-oauth: update to 0.5.4.
Upstream changes (from HISTORY):

=== 0.5.4 2017-12-08

* Fixes UnknownRequestType on Rails 5.1 for ActionDispatch::Request (xprazak2)
* Various cleanups (charliesome)
2017-12-09 19:18:47 +00:00
fhajny
b26be6dc85 Update security/openssl to 1.0.2n.
Read/write after SSL object in error state (CVE-2017-3737)
==========================================================

Severity: Moderate

OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state"
mechanism. The intent was that if a fatal error occurred during a handshake then
OpenSSL would move into the error state and would immediately fail if you
attempted to continue the handshake. This works as designed for the explicit
handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()),
however due to a bug it does not work correctly if SSL_read() or SSL_write() is
called directly. In that scenario, if the handshake fails then a fatal error
will be returned in the initial function call. If SSL_read()/SSL_write() is
subsequently called by the application for the same SSL object then it will
succeed and the data is passed without being decrypted/encrypted directly from
the SSL/TLS record layer.

In order to exploit this issue an application bug would have to be present that
resulted in a call to SSL_read()/SSL_write() being issued after having already
received a fatal error.

rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)
=========================================================

Severity: Low

There is an overflow bug in the AVX2 Montgomery multiplication procedure
used in exponentiation with 1024-bit moduli. No EC algorithms are affected.
Analysis suggests that attacks against RSA and DSA as a result of this defect
would be very difficult to perform and are not believed likely. Attacks
against DH1024 are considered just feasible, because most of the work
necessary to deduce information about a private key may be performed offline.
The amount of resources required for such an attack would be significant.
However, for an attack on TLS to be meaningful, the server would have to share
the DH1024 private key among multiple clients, which is no longer an option
since CVE-2016-0701.

This only affects processors that support the AVX2 but not ADX extensions
like Intel Haswell (4th generation).
2017-12-09 18:02:02 +00:00
fhajny
f3aa8b64a1 Update security/py-{acme,certbot} to 0.20.0.
0.20.0 - 2017-12-06

- Certbot's ACME library now recognizes URL fields in challenge
  objects in preparation for Let's Encrypt's new ACME endpoint.
- The Apache plugin now parses some distro specific Apache
  configuration files on non-Debian systems allowing it to get a
  clearer picture on the running configuration.
- Certbot better reports network failures by removing information
  about connection retries from the error output.
- An unnecessary question when using Certbot's webroot plugin
  interactively has been removed.
- Certbot's NGINX plugin no longer sometimes incorrectly reports that
  it was unable to deploy a HTTP->HTTPS redirect when requesting
  Certbot to enable a redirect for multiple domains.
- Problems where the Apache plugin was failing to find directives and
  duplicating existing directives on openSUSE have been resolved.
- An issue running the test shipped with Certbot and some our DNS
  plugins with older versions of mock have been resolved.
- On some systems, users reported strangely interleaved output
  depending on when stdout and stderr were flushed.

0.19.0 - 2017-10-04

- Certbot now has renewal hook directories where executable files can
  be placed for Certbot to run with the renew subcommand.
- After revoking a certificate with the revoke subcommand, Certbot
  will offer to delete the lineage associated with the certificate.
- When using Certbot's Google Cloud DNS plugin on Google Compute
  Engine, you no longer have to provide a credential file to Certbot
  if you have configured sufficient permissions for the instance which
  Certbot can automatically obtain using Google's metadata service.
- When deleting certificates interactively using the delete
  subcommand, Certbot will now allow you to select multiple lineages
  to be deleted at once.
- Certbot's Apache plugin no longer always parses Apache's
  sites-available on Debian based systems and instead only parses
  virtual hosts included in your Apache configuration.
- The plugins subcommand can now be run without root access.
- certbot-auto now includes a timeout when updating itself so it no
  longer hangs indefinitely when it is unable to connect to the
  external server.
- An issue where Certbot's Apache plugin would sometimes fail to
  deploy a certificate on Debian based systems if mod_ssl wasn't
  already enabled has been resolved.
- A bug in our Docker image where the certificates subcommand could
  not report if certificates maintained by Certbot had been revoked
  has been fixed.
- Certbot's RFC 2136 DNS plugin (for use with software like BIND) now
  properly performs DNS challenges when the domain being verified
  contains a CNAME record.
2017-12-09 16:39:03 +00:00
taca
a4b6c28585 security/php-oauth: Allow build with php71 and php72 2017-12-09 02:38:23 +00:00
jdolecek
8347875131 fix pasto 2017-12-06 21:48:40 +00:00
jdolecek
b51cc9a339 php-sodium expect dir name as parameter to --with-sodium, so use
BUILDLINK_PREFIX.libsodium; hopefully will fix bulk build, locally it builds
just fine without this for some reason
2017-12-06 21:47:18 +00:00
adam
f5ce11ceda py-gssapi: updated to 1.3.0
1.3.0:

Features
* Support RFC 5587: Extended GSS Mechanism Inquiry APIs
* Support RFC 5801: Using GSSAPI Mechanisms in SASL

Bugfixes
* Fix potential infinite recursion in GSSError#display_status when there is an error displaying the error
* Read the linker path during setup to support properly building with Heimdal on Debian
* Fix OID inequality comparison

Tooling
* k5test and gssapi-console now live in their own projects. They can be found at pythongssapi/k5test and pythongssapi/gssapi-console, respectively, and are available on PyPI as k5test and gssapi_console
2017-12-06 12:19:43 +00:00
triaxx
298769ee90 gnupg2: add missing -lintl LDFLAGS for FreeBSD 2017-12-05 22:29:53 +00:00
wiz
327733d070 easy-rsa: remove DIST_SUBDIR, not necessary 2017-12-04 07:19:55 +00:00
jnemeth
453d769fd2 Fix version number. Since this is brand new and didn't create a
proper package, don't bother with PKGREVISION bump.
2017-12-04 06:55:56 +00:00
jnemeth
bcc39c82dd add and enable easy-rsa 2017-12-04 06:19:37 +00:00
jnemeth
e9cb7c49f2 Import easy-rsa 3.0.3.
This is a shell script to aid with creating a Certificate Authority
and certificates for use with an OpenVPN server.  See
http://openvpn.net/howto.html for usage instructions along with
the documentation provided in this package.
2017-12-04 06:15:23 +00:00
wiz
f9a0b2e810 p5-Crypt-OpenSSL-Bignum: update to 0.09.
0.09    2017/12/01
        - fix #4 License is not specified in metadata
        - fix #6 Strip \n and \r out of $lib and $inc
        - fix #7 Fix building with OpenSSL 1.1.0
2017-12-03 08:42:23 +00:00
adam
baba6f3d16 pyOpenSSL: updated to 17.5.0
17.5.0:
Backward-incompatible changes:
* The minimum cryptography version is now 2.1.4.

Changes:
* Fixed a potential use-after-free in the verify callback and resolved a memory leak when loading PKCS12 files with cacerts.
* Added Connection.export_keying_material for RFC 5705 compatible export of keying material.
2017-12-01 08:53:17 +00:00
adam
8977d31a36 Revbump after textproc/icu update 2017-11-30 16:45:00 +00:00
adam
02d465109d py-cryptography[_vectors]: updated to 2.1.4
2.1.4:
Added X509_up_ref for an upcoming pyOpenSSL release.
2017-11-30 08:23:27 +00:00
adam
e0914ac83f py-cybox: updated to 2.1.0.16
Version 2.1.0.16
- Re-packaged 2.1.0.15 with newer setuptools to fix broken wheel.

Version 2.1.0.15
- Fully support PDFFile object.
- Add URI property to Artifact object.
- Support Object 'description' field.
- Add UnixUserAccount object.
- Fix error when PropertyTypes have 'delimiter' but no value.
- Allow setting 'condition' on Artifact object's RawArtifact propety.
- Support adding SSDEEP hashes.
- Don't include properties when adding Related Objects with inline=False.
- Handle 'event' property of Observables correctly.
2017-11-30 08:16:19 +00:00
adam
389d9c3efd py-gssapi: updated to 1.2.3
1.2.3:
Bug fixes.
2017-11-30 08:07:33 +00:00
triaxx
f6a5b5c9fa Add missing .mo files to PLIST
Since the last update, translations have been added but the additional files
have not been included into PLIST. The build failed in such a case:
PKG_OPTIONS.sudo= +nls
PKG_DEVELOPER= yes
2017-11-30 07:39:33 +00:00
wiz
6335d0d614 p5-CryptX: update to 0.055.
0.055   2017-11-28
        - new Crypt::Cipher::IDEA
        - new Crypt::Cipher::Serpent
        - new Crypt::Stream::Salsa20
        - new Crypt::Stream::Sosemanuk
        - added CCM object oriented interface: new-add-add-done
        - fix #39 accept CFLAGS and CPPFLAGS from the environment
        - fix #40 typos in POD
        - fix HMAC+SHA3 (now compliant with NIST test vectors)
2017-11-29 13:52:24 +00:00
wiz
1bde520d11 nettle: update to 3.4.
NEWS for the Nettle 3.4 release

	This release fixes bugs and adds a few new features. It also
	addresses an ABI compatibility issue affecting Nettle-3.1 and
	later, see below.

	Bug fixes:

	* Fixed an improper use of GMP mpn_mul, breaking curve2559 and
	  eddsa on certain platforms. Reported by Sergei Trofimovich.

	* Fixed memory leak when handling invalid signatures in
	  ecdsa_verify. Fix contributed by Nikos Mavrogiannopoulos.

	* Fix compilation error with --enable-fat om ARM. Fix
	  contributed by Andreas Schneider.

	* Reorganized the way certain data items are made available.

	  Short version: Nettle header files now define the symbols
	  nettle_hashes, nettle_ciphers, and nettle_aeads, as
	  preprocessor macros invoking a corresponding accessor
	  function. For backwards ABI compatibility, the symbols are
	  still present in the compiled libraries, and with the same
	  sizes as in nettle-3.3.

	New features:

	* Support for RSA-PSS signatures, contributed by Daiki Ueno.

	* Support for the HKDF key derivation function, defined by RFC
	  5869. Contributed by Nikos Mavrogiannopoulos.

	* Support for the Cipher Feedback Mode (CFB), contributed by
	  Dmitry Eremin-Solenikov.

	* New accessor functions: nettle_get_hashes,
	  nettle_get_ciphers, nettle_get_aeads, nettle_get_secp_192r1,
	  nettle_get_secp_224r1, nettle_get_secp_256r1,
	  nettle_get_secp_384r1, nettle_get_secp_521r1.

	  For source-level compatibility with future versions,
	  applications are encouraged to migrate to using these
	  functions instead of referring to the corresponding data
	  items directly.

	Miscellaneous:

	* The base16 and base64 functions now use the type char * for
	  ascii data, rather than uint8_t *. This eliminates the last
	  pointer-signedness warnings when building Nettle. This is a
	  minor API change, and applications may need to be adjusted,
	  but the ABI is unaffected on all platforms I'm aware of.

	* The contents of the header file nettle/version.h is now
	  architecture independent, except in --enable-mini-gmp
	  configurations.

	ABI issue:

	  Since the breakage was a bit subtle, let me document it
	  here. The nettle and hogweed libraries export a couple of
	  data symbols, and for some of these, the size was never
	  intended to be part of the ABI. E.g.,

	    extern const struct nettle_hash * const nettle_hashes[];

	  which is an NULL-terminated array.

	  It turns out the sizes nevertheless may leak into the ABI, and
	  that increasing the sizes can break old executables linked
	  with a newer version of the library.

	  When linking a classic non-PIE executable with a shared
	  library, we get ELF relocations of type R_X86_64_COPY for
	  references to data items. These mean that the linker allocates
	  space for the data item in the data segment of executable, at
	  a fixed address determined at link-time, and with size
	  extracted from the version of the .so-file seen when linking.

	  At load time, the run time linker then copies the contents of
	  the symbol from the .so file to that location, and uses the
	  copy instead of the version loaded with the .so-file. And if
	  the data item in the .so file used at load time is larger than
	  the data item seen at link time, it is silently truncated in
	  the process.

	  So when SHA3 hashes were was added to the nettle_hashes array
	  in the nettle-3.3 release, this way of linking produces a
	  truncated array at load time, no longer NULL-terminated.

	  We will get similar problems for planned extensions of the
	  internal struct ecc_curve, and exported data items like

	    extern const struct ecc_curve nettle_secp_256r1;

	  where the ecc_curve struct is only forward declared in the
	  public headers. To prepare, applications should migrate to
	  using the new function nettle_get_secp_256r1, and similarly
	  for the other curves.

	  In some future version, the plan is to add a leading
	  underscore to the name of the actual data items. E.g.,
	  nettle_hashes --> _nettle_hashes, breaking the ABI, while
	  keeping the nettle_get_hashes function and the nettle_hashes
	  macro as the supported ways to access it. We will also
	  rename nettle_secp_256r1 --> _nettle_secp_256r1, breaking
	  both ABI and API.

	  Note that data items like nettle_sha256 are *not* affected,
	  since the size and layout of this struct is considered part
	  of the ABI, and R_X86_64_COPY-relocations then work fine.
2017-11-28 14:06:12 +00:00
adam
1de52f5415 py-asn1: updated to 0.4.2
Revision 0.4.2:
---------------
- Fixed explicit tag splitting in chunked encoding mode at
  OctetString and BitString encoders

Revision 0.4.1:
---------------
- ANY DEFINED BY clause support implemented
- Encoders refactored to take either a value (as ASN.1 object)
  or a Python value plus ASN.1 schema
- BitString decoder optimised for better performance when running on
  constructed encoding
- Constructed types' .getComponentBy*() methods accept the default
  parameter to return instead if schema object is to be returned
- Constructed types' .getComponentBy*() methods accept the instantiate
  parameter to disable automatic inner component instantiation
- The ASN.1 types' __repr__ implementation reworked for better readability
  at the cost of not being eval-compliant
- Most ASN.1 types' __str__ magic methods (except for OctetString and
  character types) reworked to call .prettyPrint() rather than
  .prettyPrint calling __str__ as it was before. The intention is
  to eventually deprecate .prettyPrint() in favor of str().
  The other related change is that str() of enumerations and boolean
  types will return string label instead of number.
- Fixed Choice.clear() to fully reset internal state of the object
- Sphinx documentation rearranged, simplified and reworded
- The isValue singleton is now the only way to indicate ASN.1 schema
  as opposed to ASN.1 schema instance. The legacy None initializer
  support has been removed.
- Changed Null object initialization behaviour: previous default
  value ('') is not set anymore. Thus Null() call produces a
  ASN.1 schema object, while Null('') - value object.
- Migrated all docs and references from SourceForge
- Imports PEP8'ed
- Fixed ASN.1 encoder not to omit empty substrate produced for inner
  component if the inner component belongs to the simple class (as
  opposed to constructed class)
- Fixed CER/DER encoders to respect tagged CHOICE when ordering
  SET components
- Fixed ASN.1 types not to interfere with the Pickle protocol
- Fixed Sequence/SequenceOf types decoding heuristics in schema-less
  decoding mode
2017-11-28 09:14:34 +00:00
bsiegert
7de6e0e8c0 Add 2fa version 20171122.
From DESCR:

2fa is a two-factor authentication agent.

"2fa -add name" adds a new key to the 2fa keychain with the given name. It
prints a prompt to standard error and reads a two-factor key from standard
input. Two-factor keys are short case-insensitive strings of letters A-Z and
digits 2-7.

"2fa name" prints a two-factor authentication code from the key with the
given name.

With no arguments, "2fa" prints two-factor authentication codes from all
known time-based keys.

The default time-based authentication codes are derived from a hash of the
key and the current time, so it is important that the system clock have at
least one-minute accuracy.

The keychain is stored unencrypted in the text file "$HOME/.2fa".
2017-11-27 18:47:09 +00:00
adam
a72fe48f3a py-keyring: updated to 10.5.0
10.5.0
* Added ``--list-backends`` option to command-line interface.
* Removed ``logger`` from ``keyring``.
* Set the appid for SecretService & KWallet to something meaningful.
2017-11-27 13:05:44 +00:00
wiz
9aa66467e1 botan-devel: follow redirects 2017-11-26 10:40:05 +00:00
wiz
9d1c527d4f botan: follow redirects 2017-11-26 10:39:37 +00:00
bsiegert
7a2c6a3e34 Update openssl to 1.0.2m.
This is a recommended security update.

Changes between 1.0.2l and 1.0.2m [2 Nov 2017]

 *) bn_sqrx8x_internal carry bug on x86_64

    There is a carry propagating bug in the x86_64 Montgomery squaring
    procedure. No EC algorithms are affected. Analysis suggests that attacks
    against RSA and DSA as a result of this defect would be very difficult to
    perform and are not believed likely. Attacks against DH are considered just
    feasible (although very difficult) because most of the work necessary to
    deduce information about a private key may be performed offline. The amount
    of resources required for such an attack would be very significant and
    likely only accessible to a limited number of attackers. An attacker would
    additionally need online access to an unpatched system using the target
    private key in a scenario with persistent DH parameters and a private
    key that is shared between multiple clients.

    This only affects processors that support the BMI1, BMI2 and ADX extensions
    like Intel Broadwell (5th generation) and later or AMD Ryzen.

    This issue was reported to OpenSSL by the OSS-Fuzz project.
    (CVE-2017-3736)
    [Andy Polyakov]

 *) Malformed X.509 IPAddressFamily could cause OOB read

    If an X.509 certificate has a malformed IPAddressFamily extension,
    OpenSSL could do a one-byte buffer overread. The most likely result
    would be an erroneous display of the certificate in text format.

    This issue was reported to OpenSSL by the OSS-Fuzz project.
    (CVE-2017-3735)
    [Rich Salz]

Changes between 1.0.2k and 1.0.2l [25 May 2017]

 *) Have 'config' recognise 64-bit mingw and choose 'mingw64' as the target
    platform rather than 'mingw'.
    [Richard Levitte]
2017-11-24 20:34:23 +00:00
adam
c2a31e9a69 gnupg2: updated to 2.2.3
changes in version 2.2.3:
* gpgsm: Fix initial keybox creation on Windows.
* dirmngr: Fix crash in case of a CRL loading error.
* Fix the name of the Windows registry key.
* gpgtar: Fix wrong behaviour of --set-filename.
* gpg: Silence AKL retrieval messages.
* agent: Use clock or clock_gettime for calibration.
* agent: Improve robustness of the shutdown pending state.
2017-11-24 12:33:10 +00:00
wiz
187f1ab0c5 py-certifi: update to 2017.11.5.
The usual certificate updates.
2017-11-23 20:41:06 +00:00
wiz
20f7c989fe recursive bump for libxkbcommon removal from at-spi2-core 2017-11-23 17:19:40 +00:00
gson
d0312922fa Fix files in .destdir but not in PLIST, modelled after
devel/py-backports.functools_lru_cache.
2017-11-23 15:05:03 +00:00
adam
9bbf669736 py-OpenSSL: updated to 17.4.0
17.4.0:
Re-added a subset of the OpenSSL.rand module. This subset allows conscientious users to reseed the OpenSSL CSPRNG after fork.
Corrected a use-after-free when reusing an issuer or subject from an X509 object after the underlying object has been mutated.
2017-11-23 10:12:33 +00:00
markd
a082c7802d py-backports.ssl_match_hostname: depend on py-backports 2017-11-22 11:00:24 +00:00
adam
3f1222ff57 libassuan2: updated to 2.4.4
Changes in version 2.4.4:
* New configure option --disable-doc.
* Fix the use of nanosleep.
* Portability fixes for OpenBSD and macOS.
* Portability fix for systems not defining INADDR_LOOPBACK.
* Improve descriptor passing test to fix a Cygwin build problem.
2017-11-17 11:15:18 +00:00
adam
f89b220f4b py-asyncssh: updated to 1.11.1
Release 1.11.1:
Switched to using PBKDF2 implementation provided by PyCA, replacing a much slower pure-Python implementation used in earlier releases.
Improved support for file-like objects in process I/O redirection, properly handling objects which don’t support fileno() and allowing both text and binary file objects based on whether they have an ‘encoding’ member.
Changed PEM parser to be forgiving of trailing blank lines.
Updated documentation to note lack of support in OpenSSH for send_signal(), terminate(), and kill() channel requests.
Updated unit tests to work better with OpenSSH 7.6.
Updated Travis CI config to test with more recent Python versions.
2017-11-17 09:07:02 +00:00
fhajny
ec8c91d026 Update security/vault to 0.9.0.
DEPRECATIONS/CHANGES:

- API HTTP client behavior: When calling `NewClient` the API no longer
  modifies the provided client/transport.
- AWS EC2 client nonce behavior: The client nonce generated by the
  backend that gets returned along with the authentication response
  will be audited in plaintext.
- AWS Auth role options: The API will now error when trying to create
  or update a role with the mutually-exclusive options
  `disallow_reauthentication` and `allow_instance_migration`.
- SSH CA role read changes: When reading back a role from the `ssh`
  backend, the TTL/max TTL values will now be an integer number of
  seconds rather than a string. This better matches the API elsewhere
  in Vault.
- SSH role list changes: When listing roles from the `ssh` backend via
  the API, the response data will additionally return a `key_info` map
  that will contain a map of each key with a corresponding object
  containing the `key_type`.
- More granularity in audit logs: Audit request and response entires
  are still in RFC3339 format but now have a granularity of
  nanoseconds.
- High availability related values have been moved out of the
  `storage` and `ha_storage` stanzas, and into the top-level
  configuration. `redirect_addr` has been renamed to `api_addr`.
- A new `seal` stanza has been added to the configuration file, which
  is optional and enables configuration of the seal type to use for
  additional data protection, such as using HSM or Cloud KMS solutions
  to encrypt and decrypt data.

FEATURES:

- RSA Support for Transit Backend: Transit backend can now generate
  RSA keys which can be used for encryption and signing.
- Identity System: Now in open source and with significant
  enhancements, Identity is an integrated system for understanding
  users across tokens and enabling easier management of users directly
  and via groups.
- External Groups in Identity: Vault can now automatically assign
  users and systems to groups in Identity based on their membership in
  external groups.
- Seal Wrap / FIPS 140-2 Compatibility (Enterprise): Vault can now
  take advantage of FIPS 140-2-certified HSMs to ensure that Critical
  Security Parameters are protected in a compliant fashion.
- Control Groups (Enterprise): Require multiple members of an Identity
  group to authorize a requested action before it is allowed to run.
- Cloud Auto-Unseal (Enterprise): Automatically unseal Vault using AWS
  KMS and GCP CKMS.
- Sentinel Integration (Enterprise): Take advantage of HashiCorp
  Sentinel to create extremely flexible access control policies - even
  on unauthenticated endpoints.
- Barrier Rekey Support for Auto-Unseal (Enterprise): When using
  auto-unsealing functionality, the `rekey` operation is now
  supported; it uses recovery keys to authorize the master key rekey.
- Operation Token for Disaster Recovery Actions (Enterprise): When
  using Disaster Recovery replication, a token can be created that can
  be used to authorize actions such as promotion and updating primary
  information, rather than using recovery keys.
- Trigger Auto-Unseal with Recovery Keys (Enterprise): When using
  auto-unsealing, a request to unseal Vault can be triggered by a
  threshold of recovery keys, rather than requiring the Vault process to
  be restarted.
- UI Redesign (Enterprise): All new experience for the Vault
  Enterprise UI. The look and feel has been completely redesigned to
  give users a better experience and make managing secrets fast and
  easy.
- UI: SSH Secret Backend (Enterprise): Configure an SSH secret
  backend, create and browse roles. And use them to sign keys or
  generate one time passwords.
- UI: AWS Secret Backend (Enterprise): You can now configure the AWS
  backend via the Vault Enterprise UI. In addition you can create
  roles, browse the roles and Generate IAM Credentials from them
  in the UI.

IMPROVEMENTS:

- api: Add ability to set custom headers on each call
- command/server: Add config option to disable requesting client
  certificates
- core: Disallow mounting underneath an existing path, not just over
- physical/file: Use `700` as permissions when creating directories.
  The files themselves were `600` and are all encrypted, but this
  doesn't hurt.
- secret/aws: Add ability to use custom IAM/STS endpoints
- secret/cassandra: Work around Cassandra ignoring consistency levels
  for a user listing query
- secret/pki: Private keys can now be marshalled as PKCS#8
- secret/pki: Allow entering URLs for `pki` as both comma-separated
  strings and JSON arrays
- secret/ssh: Role TTL/max TTL can now be specified as either a string
  or an integer
- secret/transit: Sign and verify operations now support a `none` hash
  algorithm to allow signing/verifying pre-hashed data
- secret/database: Add the ability to glob allowed roles in the
  Database Backend
- ui (enterprise): Support for RSA keys in the transit backend
- ui (enterprise): Support for DR Operation Token generation,
  promoting, and updating primary on DR Secondary clusters

BUG FIXES:

- api: Fix panic when setting a custom HTTP client but with a nil
  transport
- api: Fix authing to the `cert` backend when the CA for the client
  cert is not known to the server's listener
- auth/approle: Create role ID index during read if a role is missing
  one
- auth/aws: Don't allow mutually exclusive options
- auth/radius: Fix logging in in some situations
- core: Fix memleak when a connection would connect to the cluster
  port and then go away
- core: Fix panic if a single-use token is used to step-down or seal
- core: Set rather than add headers to prevent some duplicated headers
  in responses when requests were forwarded to the active node
- physical/etcd3: Fix some listing issues due to how etcd3 does prefix
  matching
- physical/etcd3: Fix case where standbys can lose their etcd client
  lease
- physical/file: Fix listing when underscores are the first component
  of a path
- plugins: Allow response errors to be returned from backend plugins
- secret/transit: Fix panic if the length of the input ciphertext was
  less than the expected nonce length
- ui (enterprise): Reinstate support for generic secret backends -
  this was erroneously removed in a previous release
2017-11-16 11:31:12 +00:00
wiz
e8c35c6fdf pkcs11-helper: fix HOMEPAGE 2017-11-15 22:18:52 +00:00
wiz
26c015927f openct: update HOMEPAGE 2017-11-15 22:16:17 +00:00
taca
8736d55d43 security/php-pecl-mcrypt: enable php72
It should support php72.  (Not tested yet.)
2017-11-15 22:01:22 +00:00
he
f1c7f60ae0 Update {py-,}yara to version 3.7.0.
Pkgsrc changes:
 * adapt PLIST
 * remove patch which no longer applies
 * apply patches for proper value domain for isxxxx() functions/macros

Upstream changes:
 * time module (Wesley Shields)
 * yara command-line tool now accept multiple rule files
 * Allow a configurable limit for the number of strings per rule
   (option --max-strings-per-rule)
 * Implement integrity check for compiled rules
 * Implement API for customizingimport statement (@edhoedt)
 * Scan process memory in FreeBSD and OpenBDS (Hilko Bengen)
 * BUGFIX: Negated character classes not working with case-insensitive
   regexps (#765)
 * BUGFIX: Multiple bugs while parsing ELF files (Nate Rosenblum)
 * BUGFIX: Out-of-bounds access while parsing PE files.
 * BUGFIX: Memory leaks while parsing invalid rules.
2017-11-15 18:22:22 +00:00
adam
3c8b84aa91 py-paramiko: updated to 2.4.0
2.4.0:

[Feature]: Add a new passphrase kwarg to SSHClient.connect so users may disambiguate key-decryption passphrases from password-auth passwords. (This is a backwards compatible change; password will still pull double duty as a passphrase when passphrase is not given.)
[Support]: Drop Python 2.6 and Python 3.3 support; now only 2.7 and 3.4+ are supported. If you’re unable to upgrade from 2.6 or 3.3, please stick to the Paramiko 2.3.x (or below) release lines.
[Support]: Include LICENSE file in wheel archives.
[Support]: Updated the test suite & related docs/metadata/config to be compatible with pytest instead of using the old, custom, crufty unittest-based test.py.

This includes marking known-slow tests (mostly the SFTP ones) so they can be filtered out by inv test‘s default behavior; as well as other minor tweaks to test collection and/or display (for example, GSSAPI tests are collected, but skipped, instead of not even being collected by default as in test.py.)

[Support]: Update tearDown of client test suite to avoid hangs due to eternally blocking accept() calls on the internal server thread (which can occur when test code raises an exception before actually connecting to the server.)
2017-11-15 09:24:14 +00:00
jdolecek
6c5a2917bb Add php-sodim - php module for libsodium library, new module for PHP 7.2 2017-11-15 08:58:35 +00:00
jperkin
189631356f logcheck: Remove unnecessary TMPDIR handling to be MAKE_JOBS safe. 2017-11-10 10:34:51 +00:00
snj
27438d56bb dropbear: update to 2017.75
Changes:
- Security: Fix double-free in server TCP listener cleanup
  A double-free in the server could be triggered by an authenticated
  user if dropbear is running with -a (Allow connections to forwarded
  ports from any host)
  This could potentially allow arbitrary code execution as root by an
  authenticated user.  Affects versions 2013.56 to 2016.74. Thanks to
  Mark Shepard for reporting the crash.
  CVE-2017-9078 https://secure.ucc.asn.au/hg/dropbear/rev/c8114a48837c

- Security: Fix information disclosure with ~/.ssh/authorized_keys
  symlink.  Dropbear parsed authorized_keys as root, even if it were
  a symlink. The fix is to switch to user permissions when opening
  authorized_keys

  A user could symlink their ~/.ssh/authorized_keys to a root-owned
  file they couldn't normally read. If they managed to get that file
  to contain valid authorized_keys with command= options it might be
  possible to read other contents of that file.
  This information disclosure is to an already authenticated user.
  Thanks to Jann Horn of Google Project Zero for reporting this.
  CVE-2017-9079 https://secure.ucc.asn.au/hg/dropbear/rev/0d889b068123

- Generate hostkeys with dropbearkey atomically and flush to disk with
  fsync. Thanks to Andrei Gherzan for a patch.

- Fix out of tree builds with bundled libtom
  Thanks to Henrik Nordström and Peter Krefting for patches.
2017-11-09 19:00:25 +00:00
adam
f9b487b590 gnupg2: updated to 2.2.2
changes in version 2.2.2:
  * gpg: Avoid duplicate key imports by concurrently running gpg
    processes.
  * gpg: Fix creating on-disk subkey with on-card primary key.
  * gpg: Fix validity retrieval for multiple keyrings.
  * gpg: Fix --dry-run and import option show-only for secret keys.
  * gpg: Print "sec" or "sbb" for secret keys with import option
    import-show.
  * gpg: Make import less verbose.
  * gpg: Add alias "Key-Grip" for parameter "Keygrip" and new
    parameter "Subkey-Grip" to unattended key generation.
  * gpg: Improve "factory-reset" command for OpenPGP cards.
  * gpg: Ease switching Gnuk tokens into ECC mode by using the magic
    keysize value 25519.
  * gpgsm: Fix --with-colon listing in crt records for fields > 12.
  * gpgsm: Do not expect X.509 keyids to be unique.
  * agent: Fix stucked Pinentry when using --max-passphrase-days.
  * agent: New option --s2k-count.
  * dirmngr: Do not follow https-to-http redirects.
  * dirmngr: Reduce default LDAP timeout from 100 to 15 seconds.
  * gpgconf: Ignore non-installed components for commands
    --apply-profile and --apply-defaults.
  * Add configure option --enable-werror.
2017-11-09 08:02:30 +00:00
wiz
ceb650d278 p5-Net-SSLeay: update to 1.82.
1.82 2017-10-31
	Added support for building under Linuxbrew (a linuxbrew version of MacOS Homebrew)
	Patch from Matthew Altus, that implements SSL_CTX_set_psk_client_callback() and SSL_set_psk_client_callback().
	Patch to build with LibreSSL has no support for NPN
	Also skip the NPN test if the SSL library is LibreSSL.
	Fixed a problem with a variable declaration in ssleay_session_secret_cb_invoke reported by Graham Ollis.
	Significant patch set from Open System Consultants:
	- Bugfix: tlsext_status_cb_invoke(...): free ocsp_response only when allocated.
 	- The same callback is used on a server side for OCSP stapling and in that
  	 case ocsp_response is NULL and not used.
	 - New feature: Added a binding SSL_set_session_ticket_ext_cb(ssl,callback,data)
	 - A callback used by EAP-FAST/EAP-TEAT to parse and process TLS session ticket.
	 - Tests are in t/local/65_ticket_sharing_2.t
	 - New feature: Added a binding SSL_set_session_ticket_ext(ssl,ticket)
	 - Used by EAP-FAST/EAP-TEAP to define TLS session ticket value.
	 - Tests are in t/local/65_ticket_sharing_2.t
	 - Bugfix: tlsext_ticket_key_cb_invoke(...): allow SHA256 HMAC key to be 32 bytes
	 instead of 16 bytes (which OpenSSL will pad with zeros up to 32 bytes).
	 - New feature: Added following bindings:
	 - X509_get_ex_data(cert,idx)
	 - X509_get_ex_new_index(argl,argp,new_func,dup_funL,free_func)
	 - X509_get_app_data(cert)
	 - X509_set_ex_data(cert,idx,data)
	 - X509_set_app_data(cert,arg)
	 - X509_STORE_CTX_get_ex_new_index(argl,argp,new_func,dup_func,free_func)
	 - X509_STORE_CTX_get_app_data(x509_store_ctx)
	 - X509_STORE_CTX_set_app_data(x509_store_ctx,arg)
	 - New feature: Added an implementation for SSL_get_finished(ssl,buf,count=2*EVP_MAX_MD_SIZE)
	 - Tests are in t/local/43_misc_functions.t
	 - New feature: Added an implementation for SSL_get_peer_finished(ssl,buf,count=2*EVP_MAX_MD_SIZE)
	 - Tests are in t/local/43_misc_functions.t
	 - Bugfix: SSL_get_keyblock_size(s): Calculate key block size correctly also with AEAD ciphers
	 which don’t use digest functions.
	 - New feature: Added a binding SSL_set_tlsext_status_ocsp_resp(ssl,staple)
	 - Used by a server side to include OCSP staple in ServerHello.
	 - Bugfix: SSL_OCSP_response_verify(ssl,rsp,svreq,flags): check that chain and last are not NULL
	 before trying to use them.
	 - Bugfix: inc/Module/Install/PRIVATE/Net/SSLeay.pm: Don’t quote include and lib paths.
2017-11-08 21:08:48 +00:00
wiz
9330a0b877 p5-IO-Socket-SSL: update to 2.052.
2.052 2017/10/22
- disable NPN support if LibreSSL>=2.6.1 is detected since they've replaced the
  functions with dummies instead of removing NPN completly or setting
  OPENSSL_NO_NEXTPROTONEG
- t/01loadmodule.t shows more output helpful in debugging problems
- update fingerprints for extenal tests
- update documentation to make behavior of syswrite more clear
2017-11-08 21:07:32 +00:00
wiz
fa1dc4bc14 p5-Digest-SHA3: update to 1.01.
1.01  Sun Oct 22 16:04:22 MST 2017
	- added optional $lsb argument for add_bits() method
		-- many public vectors in least-significant-bit format
			-- using $lsb flag results in simpler test code
	- further minor optimizations in add_bits() and tests
2017-11-08 21:04:21 +00:00
wiz
923f1caff1 keychain: follow redirect 2017-11-06 13:27:21 +00:00
adam
e273a2072d py-cryptography[_vectors]: updated to 2.1.3
2.1.3:
Updated Windows, macOS, and manylinux1 wheels to be compiled with OpenSSL 1.1.0g.
2017-11-03 10:36:12 +00:00
minskim
aad293fd54 security/yara: Needs OpenSSL to build 2017-11-01 19:29:30 +00:00
adam
79f750fbb6 py-requests-ntlm: updated to 1.1.0
1.1.0:
Correct behaviour when parsing a UPN passed in as the username
Enhanced the CBT hashes when using a certificate that has a hash algorithm that is greater than sha256
2017-10-31 08:27:55 +00:00
adam
49230339d5 py-ntlm-auth: updated to 1.0.6
Changes 1.0.6:
* More changes to packaging to better handle copyright and licensing
2017-10-31 08:27:03 +00:00
adam
270030f46c py-asyncssh: added version 1.11.0
AsyncSSH is a Python package which provides an asynchronous client and server
implementation of the SSHv2 protocol on top of the Python 3.4+ asyncio
framework.
2017-10-30 18:21:20 +00:00
adam
960b446f05 py-gssapi: enable all Python versions; fixed PLIST for different KRB5_TYPE 2017-10-30 18:17:13 +00:00
adam
8aab303a9a py-m2crypto: updated to 0.27.0
0.27.0:
- Fix licence: it is MIT, not BSD
- At least minimal support of SNI in httpslib.
- Small bugfixes and cleanups.
- More effort to make build system more robust (now should work even on
  Debian LTS).
- Restore m2.rsa_set_e() and m2.rsa_set_n().
- Make sure that every exceptional return throws and exception and vice
  versa.
2017-10-26 07:08:10 +00:00
adam
1be5bf6c36 Updated HOMEPAGE 2017-10-25 06:38:53 +00:00
adam
ee968357b5 py-cryptography[_vectors]: updated to 2.1.2
2.1.2:
Corrected a bug with the manylinux1 wheels where OpenSSL's stack was marked executable.
2017-10-25 03:53:05 +00:00
adam
d85ca9d7c5 py-oauthlib: update to 2.0.6
2.0.6:
* 2.0.5 contains breaking changes.
2017-10-22 20:29:56 +00:00
jperkin
063acb04a4 netpgpverify: Update to 20171019.
Changes since 20170201:

  + Don't overwrite error messages generated by time checks, now the correct
    error is printed instead of the generic "Signature does not match".

  + Remove extraneous newlines from time check errors.

Ok'd agc@
2017-10-19 08:23:21 +00:00
adam
c7e7bed30b py-oauthlib: update to 2.0.5
2.0.5:
* Fix OAuth2Error.response_mode
* Documentation improvement
2017-10-19 06:28:40 +00:00
adam
072c38ba60 py-keyring: update to 10.4.0
10.4.0
In Kwallet, pass mainloop to SessionBus.
Unpin pywin32-ctypes, but blacklist known incompatible versions.
2017-10-18 07:22:53 +00:00
minskim
99373de2e5 security/Makefile: Add ruby-openvas-omp 2017-10-17 19:39:19 +00:00
minskim
64a183d46f securitiy/ruby-openvas-omp: Import version 0.0.4
This library is used for communication with OpenVAS manager over
OMP. You can start, stop, pause and resume scan. Watch progress and
status of scan, download report, etc.
2017-10-17 19:38:12 +00:00
minskim
6794e1cfcb security/Makefile: Add ruby-nessus_rest 2017-10-17 18:33:52 +00:00
minskim
c0a79151b0 security/ruby-nessus_rest: Import version 0.1.6
Ruby library for Nessus (version 6+) JSON/REST interface. This library
is used for communication with Nessus over REST interface. You can
start, stop, pause and resume scan. Watch progress and status of scan,
download report, etc.
2017-10-17 18:33:09 +00:00
minskim
aed3bc53b8 security/Makefile: Add ruby-nexpose 2017-10-17 18:17:51 +00:00
minskim
c27c36eb7e security/ruby-nexpose: Import version 7.1.1
nexpose is the official gem package for the Ruby Nexpose API client
library.
2017-10-17 18:15:18 +00:00
fhajny
422b7c8b20 Update security/erlang-fast_tls to 1.0.16.
- Updating p1_utils to version 1.0.10.
- Fix couple memory leaks
- Make ECDH work on openssl < 1.0.2
- Add SNI and ALPN support for client connections
2017-10-17 14:48:53 +00:00
wiz
5b071020ad p5-CryptX: update to 0.054.
0.054   2017-10-12
        - fix Crypt::PK::DSA verify
        - libtomcrypt updated to 1.18 (+ some extra patches)
        - documentation fixes
2017-10-17 09:44:49 +00:00
minskim
d1d343be37 security/Makefile: Add ruby-rbnacl 2017-10-16 17:20:00 +00:00
minskim
bd74a0ca3c security/ruby-rbnacl: Import version 4.0.2
A Ruby binding to the state-of-the-art Networking and Cryptography
library by Daniel J. Bernstein. This is NOT Google Native Client. This
is a crypto library.
2017-10-16 17:19:13 +00:00
minskim
2fc79726e5 security/Makefile: Add ruby-bcrypt_bpkdf 2017-10-16 17:05:07 +00:00
minskim
d3d9d5c5a8 security/ruby-bcrypt_pbkdf: Import version 1.0.0
bcrypt_pbkdf is a ruby gem implementing bcrypt_pbkdf from
OpenBSD. This is currently used by net-ssh to read password encrypted
Ed25519 keys.
2017-10-16 17:04:11 +00:00
prlw1
d59c698db2 Revert buildtool.mk additions for glib-{mkenums,genmarshal} using packages
Add TOOL_DEPENDS+=glib2-tools to glib2/buildlink3.mk
2017-10-15 23:19:10 +00:00
prlw1
c7d3d5b5d2 Put gdbus-codgen back into operation
- Revert "Move gdbus-codegen users to py-glib2-tools by including
  glib2/buildtools.mk" 1f764df
- while here change to TOOL_DEPENDS
- switch from py-glib2-tools to glib2-tools
2017-10-15 22:31:01 +00:00
wen
a713936867 Update to 1.00
Upstream changes:
1.00  Sat Oct 14 18:08:10 MST 2017
	- promoted to major release version 1.0
		-- module stable enough not to be considered draft
	- fixed alignment issue in BITS mode of addfile
		-- surfaced only for large non-aligned inputs
2017-10-15 04:11:04 +00:00
prlw1
434071af1d policykit-gnome: requires py-glib2-tools to build 2017-10-14 21:14:13 +00:00
prlw1
c127ef7e23 polkit: requires glib-mkenums which is now in py-glib2-tools 2017-10-13 22:04:44 +00:00
minskim
cceff1076e security/Makefile: Add ruby-rex-exploitation 2017-10-13 19:02:40 +00:00
minskim
93fcf72186 security/ruby-rex-exploitation: Import version 0.1.15
Ruby Exploitation library for various exploitation helpers This gem
contains various helper mechanisms for creating exploits. This
includes SEH Overwrite helpers, egghunters, command stagers and more.
2017-10-13 19:02:05 +00:00
minskim
70e506c77b security/Makefile: Add ruby-rex-encoder 2017-10-13 18:52:25 +00:00
minskim
857890c8b6 security/ruby-rex-encoder: Import version 0.1.4
This library provides the basis for all of the polymorphic encoders
that Metasploit uses for payload encoding. Encoders are used to try
and create a version of a payload that is free of bad characters as
defined by the exploit.
2017-10-13 18:51:42 +00:00
minskim
9c424e599e security/Makefile: Add ruby-rex-rop_builder 2017-10-13 18:39:45 +00:00
minskim
b0f4ed8708 security/ruby-rex-rop_builder: Import version 0.1.3
This is the Ruby Exploitation(Rex) Library for building ROP chains. It
also comes with the msfrop command line tool.
2017-10-13 18:39:13 +00:00
minskim
b6aa8e309e security/Makefile: Add ruby-rex-sslscan 2017-10-13 18:32:16 +00:00
minskim
c09e5f3cd1 securitiy/ruby-rex-sslscan: Import version 0.1.5
This library is a pure ruby implmenetation of the SSLScan tool
originally written by Ian Ventura-Whiting.
2017-10-13 18:31:47 +00:00
minskim
0e86a95c3c security/ruby-rex-socket: Update DESCR 2017-10-13 18:24:59 +00:00
minskim
059fbd3d2c security/Makefile: Add ruby-rex-socket 2017-10-13 18:23:32 +00:00
minskim
0e40a053ff security/ruby-rex-socket: Import version 0.1.8
Ruby Exploitation(Rex) Library which contains architecture specific
information such as registers, opcodes, and stack manipulation
routines.
2017-10-13 18:22:46 +00:00
minskim
9e77fc7b16 security/Makefile: Add ruby-rex-bin_tools 2017-10-13 18:12:59 +00:00
minskim
4da13a217c security/ruby-rex-bin_tools: Import version 0.1.4
Ruby Exploitation Library (REX) for Binary Manipulation. This suite of
tools contains ElfScan, MachScan, PEScan, and BinScan. These tools are
designed to help you analyze an executable binary and search for
particular instruction sets. This is particularly useful for things
like building ROP chains or SEH exploits.
2017-10-13 18:11:49 +00:00
minskim
53a13a545f security/Makefile: Add ruby-rex-nop 2017-10-13 17:59:46 +00:00
minskim
38a44ba7e3 security/ruby-rex-nop: Import version 0.1.1
This library contains the opty2 library for dynamic generation of x86
multi-byte NOPs.This is useful in writing exploits and encoders. It
allows you to dynamic generate variable length instruction sets that
are equivalent to a No Operation(NOP) without using the actual 0x90
bytecode.
2017-10-13 17:59:11 +00:00
minskim
b560013626 security/Makefile: Add ruby-rex-registry 2017-10-13 17:49:24 +00:00
minskim
e83d374178 security/ruby-rex-registry: Import version 0.1.3
Ruby Exploitation Library for parsing offline copys of Windows
Registry Hives.
2017-10-13 17:48:55 +00:00
minskim
e314f231c7 security/Makefile: Add ruby-rex-zip 2017-10-13 17:42:38 +00:00
minskim
33e8bf7b8d security/ruby-rex-zip: Import version 0.1.3
Ruby Exploitation Library for creating Zip based archives such as
*.zip, *.war, and *.jar files.
2017-10-13 17:42:09 +00:00
minskim
e07a39917c security/Makefile: Add ruby-rex-mime 2017-10-13 17:08:07 +00:00
minskim
fd8ca4d884 security/ruby-rex-mime: Import version 0.1.5
Ruby Exploitation(Rex) Library for creating and/or parsing MIME
messages.
2017-10-13 17:07:32 +00:00
prlw1
ee6cf974ac Move gdbus-codegen users to py-glib2-tools by including glib2/buildtools.mk 2017-10-13 16:36:03 +00:00
minskim
2363665c37 security/Makefile: Add ruby-rex-ole 2017-10-13 16:29:35 +00:00
minskim
58a0d24c18 security/ruby-rex-ole: Import version 0.1.6
Ruby Exploitation(Rex) Library which contains architecture specific
information such as registers, opcodes, and stack manipulation
routines.
2017-10-13 16:29:07 +00:00
minskim
c4c172dfa7 security/Makefile: Add ruby-rex-java 2017-10-13 16:15:19 +00:00
minskim
17982f2a7f security/ruby-rex-java: Import version 0.1.5
Ruby Exploitation (Rex) library for parsing Java serialized streams.
2017-10-13 16:14:05 +00:00
minskim
dc5b6ea166 security/Makefile: Add ruby-rex-arch 2017-10-13 16:00:06 +00:00
minskim
ba4699243b security/ruby-rex-arch: Import version 0.1.11
Ruby Exploitation(Rex) Library which contains architecture specific
information such as registers, opcodes, and stack manipulation
routines.
2017-10-13 15:59:36 +00:00
nros
7347d95313 Revbump and use of c++11 beacuse of lang/qore update. 2017-10-12 18:21:23 +00:00
minskim
d9c2a241b5 security/Makefile: Add ruby-rex-core 2017-10-12 16:19:18 +00:00
minskim
bf944d0d3c security/ruby-rex-core: Import version 0.1.12
The Ruby Exploitation (rex) Core Gem. This Gem contains the odds and
ends of code that so many other pieces of Rex rely upon, but that are
too small to be put into their own seperate gems. This include some of
the ruby cross-platform compatibility and file utility code.
2017-10-12 16:18:13 +00:00
adam
114e8d35f1 py-paramiko: update to 2.3.1
2.3.1:
[Bug] 1071: Certificate support broke the no-certificate case for Ed25519 keys (symptom is an AttributeError about public_blob.) This went uncaught due to cert autoload behavior (i.e. our test suite never actually ran the no-cert case, because the cert existed!) Both issues have been fixed. Thanks to John Hu for the report.
2017-10-12 12:42:26 +00:00
adam
ccca74e315 PyNaCl is a Python binding to libsodium, which is a fork of the Networking and
Cryptography library. These libraries have a stated goal of improving
usability, security and speed.
2017-10-12 12:35:34 +00:00
adam
d8931d3dfb libsodium: update to 1.0.15
Version 1.0.15
 - The default password hashing algorithm is now Argon2id. The
`pwhash_str_verify()` function can still verify Argon2i hashes
without any changes, and `pwhash()` can still compute Argon2i hashes
as well.
 - The aes128ctr primitive was removed. It was slow, non-standard, not
authenticated, and didn't seem to be used by any opensource project.
 - Argon2id required at least 3 passes like Argon2i, despite a minimum
of `1` as defined by the `OPSLIMIT_MIN` constant. This has been fixed.
 - The secretstream construction was slightly changed to be consistent
with forthcoming variants.
 - The Javascript and Webassembly versions have been merged, and the
module now returns a `.ready` promise that will resolve after the
Webassembly code is loaded and compiled.
 - Note that due to these incompatible changes, the library version
major was bumped up.
2017-10-12 12:08:39 +00:00
adam
046ddb4985 py-bcrypt: update to 3.1.4
3.1.4
Fixed compilation with mingw and on illumos.
2017-10-12 08:31:58 +00:00
adam
f931c27680 py-cryptography[_vectors]: update to 2.1.1
2.1:
FINAL DEPRECATION Python 2.6 support is deprecated, and will be removed in the next release of cryptography.
BACKWARDS INCOMPATIBLE: Whirlpool, RIPEMD160, and UnsupportedExtension have been removed in accordance with our :doc:`/api-stability` policy.
BACKWARDS INCOMPATIBLE: :attr:`~cryptography.x509.DNSName.value`, :attr:`~cryptography.x509.RFC822Name.value`, and :attr:`~cryptography.x509.UniformResourceIdentifier.value` will now return an :term:`A-label` string when parsing a certificate containing an internationalized domain name (IDN) or if the caller passed a :term:`U-label` to the constructor. See below for additional deprecations related to this change.
Installing cryptography now requires pip 6 or newer.
Deprecated passing :term:`U-label` strings to the :class:`~cryptography.x509.DNSName`, :class:`~cryptography.x509.UniformResourceIdentifier`, and :class:`~cryptography.x509.RFC822Name` constructors. Instead, users should pass values as :term:`A-label` strings with idna encoding if necessary. This change will not affect anyone who is not processing internationalized domains.
Added support for :class:`~cryptography.hazmat.primitives.ciphers.algorithms.ChaCha20`. In most cases users should choose :class:`~cryptography.hazmat.primitives.ciphers.aead.ChaCha20Poly1305` rather than using this unauthenticated form.
Added :meth:`~cryptography.x509.CertificateRevocationList.is_signature_valid` to :class:`~cryptography.x509.CertificateRevocationList`.
Support :class:`~cryptography.hazmat.primitives.hashes.BLAKE2b` and :class:`~cryptography.hazmat.primitives.hashes.BLAKE2s` with :class:`~cryptography.hazmat.primitives.hmac.HMAC`.
Added support for :class:`~cryptography.hazmat.primitives.ciphers.modes.XTS` mode for AES.
Added support for using labels with :class:`~cryptography.hazmat.primitives.asymmetric.padding.OAEP` when using OpenSSL 1.0.2 or greater.
Improved compatibility with NSS when issuing certificates from an issuer that has a subject with non-UTF8String string types.
Add support for the :class:`~cryptography.x509.DeltaCRLIndicator` extension.
Add support for the :class:`~cryptography.x509.TLSFeature` extension. This is commonly used for enabling OCSP Must-Staple in certificates.
Add support for the :class:`~cryptography.x509.FreshestCRL` extension.
2017-10-12 08:28:40 +00:00
tez
ae64bfc327 mit-krb5: update to 1.14.6
Major changes in 1.14.6 (2017-09-25)

This is a bug fix release.

    Fix a KDC denial of service vulnerability caused by unset status strings [CVE-2017-11368]
    Preserve GSS contexts on init/accept failure [CVE-2017-11462]
    Fix kadm5 setkey operation with LDAP KDB module
    Use a ten-second timeout after successful connection for HTTPS KDC requests, as we do for TCP requests
    Fix client null dereference when KDC offers encrypted challenge without FAST
2017-10-10 21:22:53 +00:00
adam
1278fc6b50 py-stix: update to 1.2.0.4
Version 1.2.0.4:
Add support for Python 3.6.
Update to latest mixbox.
Emit proper xsi:type for AISMarkingStructure.
Implement hash for required objects
2017-10-10 07:32:30 +00:00
adam
0b88562472 py-cybox: update to 2.1.0.14
Version 2.1.0.14:
- Add support for Python 3.6.
- Update to latest version of mixbox.
- Add __hash__ to classes.
2017-10-10 07:30:58 +00:00
jperkin
f0f4e59027 ruby-metasploit_payloads-mettle: Disable SSP checks. 2017-10-09 15:34:04 +00:00
wiz
ddfa23f6ca ruby-metasploit-payloads: follow redirect 2017-10-09 08:47:51 +00:00
wiz
5c5c46e9e7 py-slowaes: update HOMEPAGE 2017-10-09 08:25:56 +00:00
wiz
752fded5be p5-Digest-SHA3: update to 0.27.
0.27  Wed Oct  4 00:40:04 MST 2017
	- removed "portable" mode from sha3sum and addfile
		-- rarely used, mostly in outdated systems
		-- potentially confusing features (e.g. \r\r\n -> \n)
		-- Universal Newlines mode (-U) a much cleaner approach
			-- mimics Universal Newlines in Python
	- sha3sum now depends explicitly on Digest::SHA3
		-- eliminates runtime loading of modules
		-- no future plans to write Digest::SHA3::PurePerl
2017-10-09 07:37:32 +00:00
wiz
d072dd2551 p5-Digest-SHA: update to 5.98.
5.98  Wed Oct  4 00:40:02 MST 2017
	- removed "portable" mode from shasum and addfile
		-- rarely used, mostly in outdated systems
		-- potentially confusing features (e.g. \r\r\n -> \n)
		-- Universal Newlines mode (-U) a much cleaner approach
			-- mimics Universal Newlines in Python
	- shasum now uses Digest::SHA explicitly
		-- no longer loads Digest::SHA::PurePerl as an option
			-- hence no need for -R switch
		-- Digest::SHA::PurePerl has its own shasum: shasumpp
2017-10-09 07:36:54 +00:00
adam
1524bb7052 Fixed: PLIST is different for Python 2.x and 3.x 2017-10-09 06:21:39 +00:00
adam
401f21717c py-bcrypt: update to 3.1.3
3.1.3
Fixed a compilation issue on Solaris.
Added a warning when using too few rounds with kdf.
2017-10-08 08:58:21 +00:00
hauke
63e40c9399 Project homepage has changed. 2017-10-06 14:29:10 +00:00
hauke
7954e57d7f Upgrade security/libfprint from 0.0.6 to 0.7.0
Changes are too numerous to list.
Install cli test tools.
2017-10-06 14:16:00 +00:00
adam
61c24d5d5b py-asn1: update to 0.3.7
Revision 0.3.7:
Fixed ASN.1 time types pickling/deepcopy'ing
2017-10-06 06:34:36 +00:00
hauke
3971a80644 Project homepage is at freedesktop.org now. 2017-10-05 12:51:59 +00:00
wiz
45e1ad2483 openssh: update to 7.6.1.
Potentially-incompatible changes
================================

This release includes a number of changes that may affect existing
configurations:

 * ssh(1): delete SSH protocol version 1 support, associated
   configuration options and documentation.

 * ssh(1)/sshd(8): remove support for the hmac-ripemd160 MAC.

 * ssh(1)/sshd(8): remove support for the arcfour, blowfish and CAST
   ciphers.

 * Refuse RSA keys <1024 bits in length and improve reporting for keys
   that do not meet this requirement.

 * ssh(1): do not offer CBC ciphers by default.

Changes since OpenSSH 7.5
=========================

This is primarily a bugfix release. It also contains substantial
internal refactoring.

Security
--------

 * sftp-server(8): in read-only mode, sftp-server was incorrectly
   permitting creation of zero-length files. Reported by Michal
   Zalewski.

New Features
------------

 * ssh(1): add RemoteCommand option to specify a command in the ssh
   config file instead of giving it on the client's command line. This
   allows the configuration file to specify the command that will be
   executed on the remote host.

 * sshd(8): add ExposeAuthInfo option that enables writing details of
   the authentication methods used (including public keys where
   applicable) to a file that is exposed via a $SSH_USER_AUTH
   environment variable in the subsequent session.

 * ssh(1): add support for reverse dynamic forwarding. In this mode,
   ssh will act as a SOCKS4/5 proxy and forward connections
   to destinations requested by the remote SOCKS client. This mode
   is requested using extended syntax for the -R and RemoteForward
   options and, because it is implemented solely at the client,
   does not require the server be updated to be supported.

 * sshd(8): allow LogLevel directive in sshd_config Match blocks;
   bz#2717

 * ssh-keygen(1): allow inclusion of arbitrary string or flag
   certificate extensions and critical options.

 * ssh-keygen(1): allow ssh-keygen to use a key held in ssh-agent as
   a CA when signing certificates. bz#2377

 * ssh(1)/sshd(8): allow IPQoS=none in ssh/sshd to not set an explicit
   ToS/DSCP value and just use the operating system default.

 * ssh-add(1): added -q option to make ssh-add quiet on success.

 * ssh(1): expand the StrictHostKeyChecking option with two new
   settings. The first "accept-new" will automatically accept
   hitherto-unseen keys but will refuse connections for changed or
   invalid hostkeys. This is a safer subset of the current behaviour
   of StrictHostKeyChecking=no. The second setting "off", is a synonym
   for the current behaviour of StrictHostKeyChecking=no: accept new
   host keys, and continue connection for hosts with incorrect
   hostkeys. A future release will change the meaning of
   StrictHostKeyChecking=no to the behaviour of "accept-new". bz#2400

 * ssh(1): add SyslogFacility option to ssh(1) matching the equivalent
   option in sshd(8). bz#2705

Bugfixes
--------

 * ssh(1): use HostKeyAlias if specified instead of hostname for
   matching host certificate principal names; bz#2728

 * sftp(1): implement sorting for globbed ls; bz#2649

 * ssh(1): add a user@host prefix to client's "Permission denied"
   messages, useful in particular when using "stacked" connections
   (e.g. ssh -J) where it's not clear which host is denying. bz#2720

 * ssh(1): accept unknown EXT_INFO extension values that contain \0
   characters. These are legal, but would previously cause fatal
   connection errors if received.

 * ssh(1)/sshd(8): repair compression statistics printed at
   connection exit

 * sftp(1): print '?' instead of incorrect link count (that the
   protocol doesn't provide) for remote listings. bz#2710

 * ssh(1): return failure rather than fatal() for more cases during
   session multiplexing negotiations. Causes the session to fall back
   to a non-mux connection if they occur. bz#2707

 * ssh(1): mention that the server may send debug messages to explain
   public key authentication problems under some circumstances; bz#2709

 * Translate OpenSSL error codes to better report incorrect passphrase
   errors when loading private keys; bz#2699

 * sshd(8): adjust compatibility patterns for WinSCP to correctly
   identify versions that implement only the legacy DH group exchange
   scheme. bz#2748

 * ssh(1): print the "Killed by signal 1" message only at LogLevel
   verbose so that it is not shown at the default level; prevents it
   from appearing during ssh -J and equivalent ProxyCommand configs.
   bz#1906, bz#2744

 * ssh-keygen(1): when generating all hostkeys (ssh-keygen -A), clobber
   existing keys if they exist but are zero length. zero-length keys
   could previously be made if ssh-keygen failed or was interrupted part
   way through generating them. bz#2561

 * ssh(1): fix pledge(2) violation in the escape sequence "~&" used to
   place the current session in the background.

 * ssh-keyscan(1): avoid double-close() on file descriptors; bz#2734

 * sshd(8): avoid reliance on shared use of pointers shared between
   monitor and child sshd processes. bz#2704

 * sshd_config(8): document available AuthenticationMethods; bz#2453

 * ssh(1): avoid truncation in some login prompts; bz#2768

 * sshd(8): Fix various compilations failures, inc bz#2767

 * ssh(1): make "--" before the hostname terminate argument processing
   after the hostname too.

 * ssh-keygen(1): switch from aes256-cbc to aes256-ctr for encrypting
   new-style private keys. Fixes problems related to private key
   handling for no-OpenSSL builds. bz#2754

 * ssh(1): warn and do not attempt to use keys when the public and
   private halves do not match. bz#2737

 * sftp(1): don't print verbose error message when ssh disconnects
   from under sftp. bz#2750

 * sshd(8): fix keepalive scheduling problem: activity on a forwarded
   port from preventing the keepalive from being sent; bz#2756

 * sshd(8): when started without root privileges, don't require the
   privilege separation user or path to exist. Makes running the
   regression tests easier without touching the filesystem.

 * Make integrity.sh regression tests more robust against timeouts.
   bz#2658

 * ssh(1)/sshd(8): correctness fix for channels implementation: accept
   channel IDs greater than 0x7FFFFFFF.

Portability
-----------

 * sshd(9): drop two more privileges in the Solaris sandbox:
   PRIV_DAX_ACCESS and PRIV_SYS_IB_INFO; bz#2723

 * sshd(8): expose list of completed authentication methods to PAM
   via the SSH_AUTH_INFO_0 PAM environment variable. bz#2408

 * ssh(1)/sshd(8): fix several problems in the tun/tap forwarding code,
   mostly to do with host/network byte order confusion. bz#2735

 * Add --with-cflags-after and --with-ldflags-after configure flags to
   allow setting CFLAGS/LDFLAGS after configure has completed. These
   are useful for setting sanitiser/fuzzing options that may interfere
   with configure's operation.

 * sshd(8): avoid Linux seccomp violations on ppc64le over the
   socketcall syscall.

 * Fix use of ldns when using ldns-config; bz#2697

 * configure: set cache variables when cross-compiling. The cross-
   compiling fallback message was saying it assumed the test passed,
   but it wasn't actually set the cache variables and this would
   cause later tests to fail.

 * Add clang libFuzzer harnesses for public key parsing and signature
   verification.
2017-10-04 11:44:14 +00:00
minskim
c9db389d67 security/Makefile: Add ruby-rubyntlm 2017-10-03 15:57:06 +00:00
minskim
744b363403 security/ruby-rubyntlm: Import version 0.6.2
Ruby/NTLM provides message creator and parser for the NTLM
authentication.
2017-10-03 15:56:29 +00:00
wiz
565d6e265d py-oauthlib: update to 2.0.4.
2.0.4 (2017-09-17)
------------------
* Fixed typo that caused OAuthlib to crash because of the fix in
"Address missing OIDC errors and fix a typo in the AccountSelectionRequired
exception".
2017-10-03 12:46:52 +00:00
wiz
321105cae4 libsecret: update to 0.18.5.
0.18.5
 * Build fixes
 * Port tests to Python 3 [#761834]
 * Fix textual typos [#763143]
 * Updated translations

0.18.4
 * Multithreading fixes [#756766]
 * Fix memory leaks [#756766]
 * Updated translations

0.18.3
 * Updated translations
 * Documentation fixes

0.18.2
 * Testing fixes
 * Documentation typo [#747654 ...]
 * Build fixes [#743444]
 * Updated transaltions
 * Accomodate libgcrypt 1.6+

0.18.1
 * Testing fix [#726909]
2017-10-02 15:38:05 +00:00
taca
0307dd484b security/ruby-metasploit-payloads: Fix syntax of Makefile
Fix syntax fo Makefile.
2017-10-02 05:03:19 +00:00
joerg
58d83fb139 Don't check payload files for library dependencies. 2017-10-01 19:05:40 +00:00
adam
f5b291c774 py-asn1: update to 0.3.6
Revision 0.3.6:
* End-of-octets encoding optimized at ASN.1 encoders
* The __getitem__/__setitem__ behavior of Set/Sequence and SetOf/SequenceOf objects aligned with the canonical Mapping and Sequence protocols in part
* Fixed crash in ASN.1 encoder when encoding an explicitly tagged component of a Sequence
2017-09-30 15:12:30 +00:00
adam
02b624b473 gnupg2: update to 2.2.1
version 2.2.1:
* gpg: Fix formatting of the user id in batch mode key generation
  if only "name-email" is given.
* gpgv: Fix annoying "not suitable for" warnings.
* wks: Convey only the newest user id to the provider.  This is the
  case if different names are used with the same addr-spec.
* wks: Create a complying user id for provider policy mailbox-only.
* wks: Add workaround for posteo.de.
* scd: Fix the use of large ECC keys with an OpenPGP card.
* dirmngr: Use system provided root certificates if no specific HKP
  certificates are configured.  If build with GNUTLS, this was
  already the case.
2017-09-30 12:38:01 +00:00
adam
34bf97af84 py-kerberos: update to 1.2.5
1.2.5:
Bug fixes.
2017-09-30 09:42:52 +00:00
wiz
48f6d824b2 KeePass: follow redirect 2017-09-30 07:42:46 +00:00
minskim
5bc5fc2d73 security/Makefile: Add ruby-rex-powershell 2017-09-29 17:16:13 +00:00
minskim
72d9d7a4ba security/ruby-rex-powershell: Import version 0.1.72
Ruby Exploitation (Rex) library for generating/manipulating Powershell
scripts.
2017-09-29 17:15:41 +00:00
minskim
89cc479013 security/Makefile: Add ruby-rex-random_identifier 2017-09-29 16:52:46 +00:00
minskim
923f1162a7 security/ruby-rex-random_identifier: Import version 0.1.4
Ruby Exploitation (Rex) library for generating Random identifier
strings.
2017-09-29 16:51:00 +00:00
minskim
e2356a026c security/Makefile: Add ruby-rex-text 2017-09-29 16:26:15 +00:00
minskim
a1934b506f security/ruby-rex-text: Import version 0.2.15
rex-text contains all of the Ruby Exploitation (Rex) methods for text
manipulation and generation.
2017-09-29 16:25:43 +00:00
minskim
7fbb02da30 security/Makefile: Add ruby-metasploit-payloads 2017-09-29 15:46:17 +00:00
minskim
c22dc27069 security/ruby-metasploit-payloads: Import version 1.3.9
Compiled binaries for Metasploit's Meterpreter.
2017-09-29 15:45:15 +00:00
wiz
eef80df883 emacs22*, emacs23*, emacs24*: remove unmaintained emacs versions
As announced in
https://mail-index.netbsd.org/pkgsrc-users/2017/09/11/msg025563.html

This still leaves emacs20, emacs21, and the current version, emacs25.
2017-09-29 12:40:26 +00:00
adam
0540fbb749 py-asn1crypto: update to 0.23.0
0.23.0:
Backwards compatibility break: the tag_type, explicit_tag and explicit_class attributes on core.Asn1Value no longer exist and were replaced by the implicit and explicit attributes. Field param dicts may use the new explicit and implicit keys, or the old tag_type and tag keys. The attribute changes will likely to have little to no impact since they were primarily an implementation detail.
Teletex strings used inside of X.509 certificates are now interpreted using Windows-1252 (a superset of ISO-8859-1). This enables compatibility with certificates generated by OpenSSL. Strict parsing of Teletex strings can be retained by using the x509.strict_teletex() context manager.
Added support for nested explicit tagging, supporting values that are defined with explicit tagging and then added as a field of another structure using explicit tagging.
Fixed a UnicodeDecodeError when trying to find the (optional) dependency OpenSSL on Python 2
Fixed next_update field of crl.TbsCertList to be optional
Added the x509.Certificate.sha256_fingerprint property
x509.Certificate.ocsp_urls and x509.DistributionPoint.url will now return https://, ldap:// and ldaps:// URLs in addition to http://.
Added CMS Attribute Protection definitions from RFC 6211
Added OIDs from RFC 6962
2017-09-29 06:36:31 +00:00
gdt
7218faef05 gnupg2: drop DESCR claim about gnupg 1.4/gpg-agent 2017-09-28 18:53:32 +00:00
spz
18e83f2b77 patch the Makefiles so RELRO flags work 2017-09-28 11:04:07 +00:00
adam
7af597aa4f py-m2crypto: update to 0.26.4
0.26.3:
- Fix a syntax typo.

0.26.2:
- port to support OpenSSL 1.1.0 API
- add generated Sphinx documentation
- another set of cleanups
2017-09-28 10:44:11 +00:00
wiz
d97fb7cb46 p5-Digest-CRC: update to 0.22.2.
0.22  Sat Feb 18 17:45:31 2017
          - added padding for hex encoded digests
2017-09-27 20:43:52 +00:00
adam
24c2ff685b py-cryptodome: update to 3.4.7
3.4.7:

New features
* API documentation is made with sphinx instead of epydoc.
* Start using ``importlib`` instead of ``imp``` where available.

Resolved issues
* Fixed PEM header for RSA/DSA public keys.
2017-09-27 20:10:56 +00:00
fhajny
7bbd7861a0 Update security/py-certbot to 0.18.2.
- An issue where Certbot's ACME module would raise an AttributeError
  trying to create self-signed certificates when used with pyOpenSSL
  17.3.0 has been resolved. For Certbot users with this version of
  pyOpenSSL, this caused Certbot to crash when performing a TLS SNI
  challenge or when the Nginx plugin tried to create an SSL server
  block.
2017-09-27 12:44:39 +00:00
wiz
06bd0ca307 *: remove qt3 and the packages using it, including KDE3
Announced in https://mail-index.netbsd.org/pkgsrc-users/2017/09/10/msg025556.html
2017-09-26 10:26:54 +00:00
fhajny
19d11314c4 Update security/vault to 0.8.3.
CHANGES:

- Policy input/output standardization: For all built-in authentication
  backends, policies can now be specified as a comma-delimited string or an
  array if using JSON as API input; on read, policies will be returned as an
  array; and the `default` policy will not be forcefully added to policies
  saved in configurations. Please note that the `default` policy will continue
  to be added to generated tokens, however, rather than backends adding
  `default` to the given set of input policies (in some cases, and not in
  others), the stored set will reflect the user-specified set.
- `sign-self-issued` modifies Issuer in generated certificates: In 0.8.2 the
  endpoint would not modify the Issuer in the generated certificate, leaving
  the output self-issued. Although theoretically valid, in practice crypto
  stacks were unhappy validating paths containing such certs. As a result,
  `sign-self-issued` now encodes the signing CA's Subject DN into the Issuer
  DN of the generated certificate.
- `sys/raw` requires enabling: While the `sys/raw` endpoint can be extremely
  useful in break-glass or support scenarios, it is also extremely dangerous.
  As of now, a configuration file option `raw_storage_endpoint` must be set in
  order to enable this API endpoint. Once set, the available functionality has
  been enhanced slightly; it now supports listing and decrypting most of
  Vault's core data structures, except for the encryption keyring itself.
- `generic` is now `kv`: To better reflect its actual use, the `generic`
  backend is now `kv`. Using `generic` will still work for backwards
  compatibility.

FEATURES:

- GCE Support for GCP Auth: GCE instances can now authenticate to Vault
  using machine credentials.
- Support for Kubernetes Service Account Auth: Kubernetes Service Accounts
  can now authenticate to vault using JWT tokens.

IMPROVEMENTS:

- configuration: Provide a config option to store Vault server's process ID
  (PID) in a file
- mfa (Enterprise): Add the ability to use identity metadata in username
  format
- mfa/okta (Enterprise): Add support for configuring base_url for API calls
- secret/pki: `sign-intermediate` will now allow specifying a `ttl` value
  longer than the signing CA certificate's NotAfter value.
- sys/raw: Raw storage access is now disabled by default

BUG FIXES:

- auth/okta: Fix regression that removed the ability to set base_url
- core: Fix panic while loading leases at startup on ARM processors
- secret/pki: Fix `sign-self-issued` encoding the wrong subject public key
2017-09-26 07:41:14 +00:00
joerg
9e1d337b2d Include the right pcre version. 2017-09-25 22:27:43 +00:00
wiedi
658393ed3b snoopy: fix build on SunOS
Needs POSIX_PTHREAD_SEMANTICS
2017-09-23 20:30:30 +00:00
wiedi
3c2589426f dropbear: fix build on SunOS
Link network libs
2017-09-23 20:14:57 +00:00
joerg
7ae3f50e21 Do not use false as pointer. 2017-09-23 15:30:01 +00:00
tnn
b712714ae2 py-argon2_cffi: py2x/3x PLIST differentiation 2017-09-23 12:38:18 +00:00
tnn
db4d6bba53 kwallet: build fix 2017-09-23 11:58:37 +00:00
wiedi
a0b5a6334f bearssl: fix build on SunOS
Needs to link -lsocket -lnsl
2017-09-22 22:00:57 +00:00
tez
36c9239fb9 openssl: fix for CVE-2017-3735 2017-09-22 21:02:43 +00:00
wiz
87bd06c310 dhbitty: follow redirects 2017-09-22 07:02:57 +00:00
taca
ec28c80372 cleanup: remove unnecessary RUBY_VERSIONS_ACCEPTED
Remove unnecessary RUBY_VERSIONS_ACCEPTED since ruby21 removed.
2017-09-19 16:36:07 +00:00
taca
bae82f6df7 security/ruby-metasploit_payloads-mettle: skip RELRO
Add CHECK_RELRO_SKIP for pre-built binaries.
2017-09-18 13:11:09 +00:00
maya
33ebf687dc revbump for requiring ICU 59.x 2017-09-18 09:52:56 +00:00
wiz
431107402e p5-Net-SSH: update to 2.14.
2.14 2017.07.03
    - DSA key bugfix: verify would fail if r had unnecessary leading zeros

2.13 2017.06.30
    - Bug Fix: AES-CBC IV length needs to be blocksize, not keysize
    - Bug Fix: DES3 init needs to pass key as variable to avoid scalar error
    - Bug Fix: Packet padlen decode was using signed 8-bit unpack (should be unsigned)
    - Fix CBC inefficiency
    - Fix Key not being loaded prior to Agent use [ https://github.com/lkinley/Net-SSH-Perl/issues/10 ]
2017-09-17 22:13:30 +00:00
wiz
302baac6a7 p5-CryptX: update to 0.053.
0.053   2017/09/15
        - fix Crypt::PK::DSA generate_key

0.051   2017/08/08
        - INCOMPATIBLE CHANGE: Crypt::AuthEnc::OCB is now compliant with RFC 7253

0.050   2017/07/18
        - fix cpantesters failures/warnings

0.049   2017/07/18
        - libtomcrypt updated to 1.18-rc2 (+ some extra patches)
        - REMOVED: Crypt::PK::DH encrypt decrypt sign_message verify_message sign_hash verify_hash
        - NEW: Crypt::Misc - encode_b32*, decode_b32*, encode_b58*, decode_b58*
        - Crypt::PK::RSA: import public key from X509 certificate
        - Crypt::PK::DSA: improved generate_key()
        - Crypt::PK::DH: improved generate_key()
        - fix #36 aad_add is obsolete for all EncAuth algs (correct is adata_add)
        - fix #37 GCM - Encryption of the empty string

0.048   2017/05/31
        - NEW: Crypt::Digest::SHA3_224
        - NEW: Crypt::Digest::SHA3_256
        - NEW: Crypt::Digest::SHA3_384
        - NEW: Crypt::Digest::SHA3_512
        - NEW: Crypt::Digest::SHAKE
        - NEW: Crypt::Digest::BLAKE2b_160
        - NEW: Crypt::Digest::BLAKE2b_256
        - NEW: Crypt::Digest::BLAKE2b_384
        - NEW: Crypt::Digest::BLAKE2b_512
        - NEW: Crypt::Digest::BLAKE2s_128
        - NEW: Crypt::Digest::BLAKE2s_160
        - NEW: Crypt::Digest::BLAKE2s_224
        - NEW: Crypt::Digest::BLAKE2s_256
        - NEW: Crypt::AuthEnc::ChaCha20Poly1305
        - NEW: Crypt::Mac::Poly1305
        - NEW: Crypt::Mac::BLAKE2s
        - NEW: Crypt::Mac::BLAKE2b
        - NEW: Crypt::PRNG::ChaCha20
        - NEW: Crypt::Stream::ChaCha
        - NEW: Crypt::Stream::RC4
        - NEW: Crypt::Stream::Sober128
        - NEW: functions in Crypt::Misc - increment_octets_be, increment_octets_le
        - Crypt::PRNG now uses chacha20 prng by default
2017-09-17 22:08:29 +00:00
adam
1a8def38d3 py-asn1: update to 0.3.5
Revision 0.3.5:
Codecs signatures unified and pass the options kwargs through the call chain
Explicit tag encoding optimized to avoid unnecessary copying
End-of-octets sentinel encoding optimized
Refactored ASN.1 codecs properties to silently enforce proper length and chunk size encoding modes
Fixed DER encoder to always produce primitive encoding
Fixed crash at SequenceOf native decoder
Fixed Real.prettyPrint() to fail gracefully on overflow
Fixed a couple of crashes when debug mode is enabled
2017-09-17 10:18:41 +00:00
abs
59ade816e7 Update USE_LANGUAGES from "c c++" to "c c++11" 2017-09-17 09:33:59 +00:00
wiz
ef141a6b79 Reset maintainer 2017-09-16 19:26:41 +00:00
wiz
7647f13ec9 py-certifi: use pypi homepage instead of dead one 2017-09-16 08:51:17 +00:00
adam
59ad9558ea py-OpenSSL: update to 17.3.0
17.3.0
Backward-incompatible changes:
* Dropped support for Python 3.3.
* Removed the deprecated OpenSSL.rand module. This is being done ahead of our normal deprecation schedule due to its lack of use and the fact that it was becoming a maintenance burden. os.urandom() should be used instead.

Deprecations:
* Deprecated OpenSSL.tsafe.

Changes:
* Fixed a memory leak in OpenSSL.crypto.CRL.
* Fixed a memory leak when verifying certificates with OpenSSL.crypto.X509StoreContext.
2017-09-16 06:47:52 +00:00
minskim
ef647daef5 security/Makefile: Add ruby-metasploit-model 2017-09-14 19:44:15 +00:00
minskim
b8d8b2c2b1 security/ruby-metasploit-model: Import version 2.0.4
Common code, such as validators and mixins, that are shared between
ActiveModels in metasploit-framework and ActiveRecords in
metasploit_data_models.
2017-09-14 19:43:45 +00:00
minskim
fa480c01bb security/ruby-metasploit_payloads-mettle: Update to 0.2.2
New binaries have been added for the following platforms:
- aarch64-iphone-darwin
- arm-iphone-darwin
- darwin.x86_64
- i686-w64-mingw32
- x86_64-apple-darwin
2017-09-14 18:14:04 +00:00
minskim
264b760307 security/Makefile: Add ruby-metasploit-concern 2017-09-14 17:47:29 +00:00
minskim
0c8f0122cc Import ruby-metasploit-concern-2.0.5 as security/ruby-metasploit-concern
Automatically includes Modules from
app/concerns/<module_with_concerns>/<concern>.rb into
<module_with_concerns> to ease monkey-patching associations and
validations on ActiveRecord::Base descendents from other gems when
layering schemas.
2017-09-14 17:46:23 +00:00
minskim
72cc3e014e security/Makefile: Add ruby-jsobfu 2017-09-14 17:01:08 +00:00
minskim
49058fe563 Import ruby-jsobfu-0.4.2 as security/ruby-jsobfu
This is a Javascript code obfuscator written in Ruby.
2017-09-14 17:00:25 +00:00
leot
d3b939ccea sqlmap: Update security/sqlmap to 1.1.9
Changes:
1.1.9
-----
- Misc bug fixes and improvements

1.1.8
-----
- Add support to log all HTTP traffic into an HAR file (via `--har' option)
- Misc bug fixes

1.1.7
-----
- Add Bulgarian translation
- Misc bug fixes and improvements

1.1.6
-----
- Misc bug fixes
2017-09-14 12:43:54 +00:00
dholland
6113f901ef Remove stray extra distinfo file; this package uses the distinfo file
in ../libpreludedb via its Makefile.common. The extra one appears to
have been accidentally created while adding new distinfo hash
functions a couple years back.

This came to light because a new patch over the weekend didn't get
into this copy, and it seems that if a distinfo file appears in the
current directory, pkglint ignores the setting of ${DISTINFO_FILE}
even if it points somewhere else. Which is probably a bug.
2017-09-14 08:05:47 +00:00
abs
237ef75d1c Fix LICENSE pattern (lgpl2 -> gnu-lgpl-v2.1) 2017-09-13 10:40:18 +00:00
fhajny
5a99b35667 Update security/py-certbot to 0.18.1.
- The Nginx plugin now configures Nginx to use 2048-bit Diffie-Hellman
  parameters.
- certbot-auto now installs Certbot in directories under /opt/eff.org.
- The Nginx plugin can now be selected in Certbot's interactive output.
- Output verbosity of renewal failures when running with --quiet has
  been reduced.
- The default revocation reason shown in Certbot help output now is a
  human readable string instead of a numerical code.
- Plugin selection is now included in normal terminal output.
- A newer version of ConfigArgParse is now installed when using
  certbot-auto causing values set to false in a Certbot INI
  configuration file to be handled intuitively.
- New naming conventions preventing certbot-auto from installing OS
  dependencies on Fedora 26 have been resolved.
2017-09-13 10:28:42 +00:00
wiz
a08ccc4150 recursive bump for qt5-qtwebkit dependency change 2017-09-12 13:51:59 +00:00
dholland
5ea746d2d3 Fix build with ocaml 4.05. 2017-09-12 06:55:42 +00:00
adam
ef3f31c323 What's new in Sudo 1.8.21p2
* Fixed a bug introduced in version 1.8.21 which prevented sudo
   from using the PAM-supplied prompt.  Bug 799

 * Fixed a bug introduced in version 1.8.21 which could result in
   sudo hanging when running commands that exit quickly.  Bug 800

 * Fixed a bug introduced in version 1.8.21 which prevented the
   command from being run when the password was read via an external
   program using the askpass interface.  Bug 801

What's new in Sudo 1.8.21p1

 * On systems that support both PAM and SIGINFO, the main sudo
   process will no longer forward SIGINFO to the command if the
   signal was generated from the keyboard.  The command will have
   already received SIGINFO since it is part of the same process
   group so there's no need for sudo to forward it.  This is
   consistent with the handling of SIGINT, SIGQUIT and SIGTSTP.
   Bug 796

 * If SUDOERS_SEARCH_FILTER in ldap.conf does not specify a value,
   the LDAP search expression used when looking up netgroups and
   non-Unix groups had a syntax error if a group plugin was not
   specified.

 * "sudo -U otheruser -l" will now have an exit value of 0 even
   if "otheruser" has no sudo privileges.  The exit value when a
   user attempts to lists their own privileges or when a command
   is specified is unchanged.

 * Fixed a regression introduced in sudo 1.8.21 where sudoreplay
   playback would hang for I/O logs that contain terminal input.

 * Sudo 1.8.18 contained an incomplete fix for the matching of
   entries in the LDAP and SSSD backends when a sudoRunAsGroup is
   specified but no sudoRunAsUser is present in the sudoRole.

What's new in Sudo 1.8.21

 * The path that sudo uses to search for terminal devices can now
   be configured via the new "devsearch" Path setting in sudo.conf.

 * It is now possible to preserve bash shell functions in the
   environment when the "env_reset" sudoers setting is disabled by
   removing the "*=()*" pattern from the env_delete list.

 * A change made in sudo 1.8.15 inadvertantly caused sudoedit to
   send itself SIGHUP instead of exiting when the editor returns
   an error or the file was not modified.

 * Sudoedit now uses an exit code of zero if the file was not
   actually modified.  Previously, sudoedit treated a lack of
   modifications as an error.

 * When running a command in a pseudo-tty (pty), sudo now copies a
   subset of the terminal flags to the new pty.  Previously, all
   flags were copied, even those not appropriate for a pty.

 * Fixed a problem with debug logging in the sudoers I/O logging
   plugin.

 * Window size change events are now logged to the policy plugin.
   On xterm and compatible terminals, sudoreplay is now capable of
   resizing the terminal to match the size of the terminal the
   command was run on.  The new -R option can be used to disable
   terminal resizing.

 * Fixed a bug in visudo where a newly added file was not checked
   for syntax errors.  Bug 791.

 * Fixed a bug in visudo where if a syntax error in an include
   directory (like /etc/sudoers.d) was detected, the edited version
   was left as a temporary file instead of being installed.

 * On PAM systems, sudo will now treat "username's Password:" as
   a standard password prompt.  As a result, the SUDO_PROMPT
   environment variable will now override "username's Password:"
   as well as the more common "Password:".  Previously, the
   "passprompt_override" Defaults setting would need to be set for
   SUDO_PROMPT to override a prompt of "username's Password:".

 * A new "syslog_pid" sudoers setting has been added to include
   sudo's process ID along with the process name when logging via
   syslog.  Bug 792.

 * Fixed a bug introduced in sudo 1.8.18 where a command would
   not be terminated when the I/O logging plugin returned an error
   to the sudo front-end.

 * A new "timestamp_type" sudoers setting has been added that replaces
   the "tty_tickets" option.  In addition to tty and global time stamp
   records, it is now possible to use the parent process ID to restrict
   the time stamp to commands run by the same process, usually the shell.
   Bug 793.

 * The --preserve-env command line option has been extended to accept
   a comma-separated list of environment variables to preserve.
   Bug 279.

 * Friulian translation for sudo from translationproject.org.
2017-09-12 06:34:22 +00:00
dholland
b0e1340249 pkglint 2017-09-12 06:15:19 +00:00
dholland
cd4cdd29d0 sort 2017-09-12 06:14:40 +00:00
dholland
e9070b6c51 pkglint 2017-09-12 06:14:08 +00:00
dholland
08b8131cd1 Don't #undef bool, it breaks the perl bindings build. 2017-09-12 06:04:47 +00:00
dholland
edaa01f6bb Add additional baling wire to cpp hackery to make it not explode on gcc5. 2017-09-12 05:58:41 +00:00
dholland
8b16f5c35d sort 2017-09-12 05:55:31 +00:00
ryoon
00209e84e2 Fix packaging when pgp5 is no installed etc.
* Add pgp5 or gpg configure args explicitly
* Conditional PLIST

Reported by pgoyette@. Thank you.
2017-09-12 02:32:17 +00:00
wiz
b6f35f683e Add -fPIC to CFLAGS.
Fixes SSP build, which otherwise breaks in configure:

cc1: warning: command line option '-fpermissive' is valid for C++/ObjC++ but not for C
ld: /var/tmp//ccfWqlYy.o: warning: relocation against `__stack_chk_fail' in readonly section `.text.startup'
ld: /var/tmp//ccfWqlYy.o: relocation R_X86_64_PC32 against symbol `__stack_chk_fail' can not be used when making a shared object; recompile with -fPIC
ld: final link failed: Bad value
configure: failed program was:
#line 10722 "configure"
#include "confdefs.h"

int main() {

; return 0; }
configure: error: --enable-pie requires PIE support from the linker.
2017-09-10 17:11:47 +00:00
taca
eda32cd7e9 Update ruby-sshkit to 1.14.0.
1.14.0 (2017-06-30)

Breaking changes

* None

New features

* #401: Add :log_percent option to specify upload!/download! transfer log
  percentage - @aubergene
2017-09-10 15:36:13 +00:00
taca
e4cb2b45ee Update ruby-net-ssh to 4.2.0.
=== 4.2.0.rc2

 * Fix double close bug on auth failure (or ruby 2.2 or earlier) [#538]

=== 4.2.0.rc1

 * Improved logging with proxy command [Dmitriy Ivliev, #530]
 * Close transport on proxy error [adamruzicka, #526]
 * Support multiple identity files [Kimura Masayuki, #528]
 * Move `none` cipher to end of cipher list [Brian Cain, #525]
 * Deprecate `:paranoid` in favor of `:verify_host_key` [Jared Beck, #524]
 * Support Multile Include ssh config files [Kasumi Hanazuki, #516]
 * Support Relative path in ssh confif files [Akinori MUSHA, #510]
 * add direct-streamlocal@openssh.com support in Forward class [Harald Sitter, #502]
2017-09-10 15:32:59 +00:00
joerg
aaefc566f3 Recognize gpg2.2 2017-09-10 14:12:44 +00:00
dholland
6d43ee6f54 Fix one set of C++ build errors, but I don't know what to do about the
next set.
2017-09-10 01:49:40 +00:00
dholland
1e3d30c097 Work around macro name conflict with netbsd's builtin libevent.
The build goes further than before, but fails later trying to do
no-longer-permitted things with libevent's internals.
2017-09-10 01:44:31 +00:00
joerg
38286c8ad5 Deal with newer GPG. 2017-09-09 22:48:09 +00:00
ryoon
4d676a4de5 Fix BASH substitutions with modern GCC, PR pkg/52534
* Bump PKGREVISION
* Use options framework for gpg and pgp5
2017-09-09 11:43:08 +00:00
alnsn
d0ec8c5424 Add commit "Add IP6 address type to valid types for ConnInfo" to patches.
Bump PKGREVISION.
2017-09-09 07:55:31 +00:00
jaapb
3bc2bd9cdc Build is not safe for -j n. 2017-09-08 13:34:04 +00:00
jaapb
410a1001fa Recursive revbump associated with update of ocaml to 4.05 2017-09-08 09:51:18 +00:00
wiz
b5dbf4cd6a Updated p5-IO-Socket-SSL to 2.051.
2.051 2017/09/05
- syswrite: if SSL_write sets SSL_ERROR_SYSCALL but no $! (as seen with
  OpenSSL 1.1.0 on Windows) set $! to EPIPE to propagate a useful error up
  https://github.com/noxxi/p5-io-socket-ssl/issues/62
2017-09-08 08:48:32 +00:00
adam
9d4a5067ad Revision 0.3.4:
- Fixed Native encoder to handle SEQUENCE/SET objects without
  the componentType property
- Added missing component-less SEQUENCE/SET objects dict duck-typing support
- Fixed unnecessary duplicate tags detection at NamesType.tagMap
- Fixed crash at SEQUENCE and SEQUENCE OF CER encoder when running
  in schemaless mode
- Fixed Character types instantiation from OctetString type -- double
  unicode decoding may have scrambled the data
2017-09-08 07:28:31 +00:00
adam
633728ad42 2.0.3:
* Address missing OIDC errors and fix a typo in the AccountSelectionRequired exception.
* Update proxy keys on CaseInsensitiveDict.update().
* Redirect errors according to OIDC's response_mode.
* Added universal wheel support.
* Added log statements to except clauses.
* According to RC7009 Section 2.1, a client should include authentication credentials when revoking its tokens.
  As discussed in 339, this is not make sense for public clients.
  However, in that case, the public client should still be checked that is infact a public client (authenticate_client_id).
* Improved prompt parameter validation.
* Added two error codes from RFC 6750.
* Hybrid response types are now be fragment-encoded.
* Added Python 3.6 to Travis CI testing and trove classifiers.
* Fixed BytesWarning issued when using a string placeholder for bytes object.
* Documented PyJWT dependency and improved logging and exception messages.
* Documentation improvements and fixes.
2017-09-08 06:58:35 +00:00
ryoon
5bd9ca4ef6 Recursive revbump from audio/pulseaudio-11.0 2017-09-08 02:38:35 +00:00
fhajny
5985dc54b2 Update security/py-certbot to 0.18.0.
### Added
- The Nginx plugin now configures Nginx to use 2048-bit Diffie-Hellman
  parameters.

### Changed
- certbot-auto now installs Certbot in directories under `/opt/eff.org`.
- The Nginx plugin can now be selected in Certbot's interactive output.
- Output verbosity of renewal failures when running with `--quiet` has
  been reduced.
- The default revocation reason shown in Certbot help output now is a
  human readable string instead of a numerical code.
- Plugin selection is now included in normal terminal output.

### Fixed
- A newer version of ConfigArgParse is now installed when using
  certbot-auto causing values set to false in a Certbot INI
  configuration file to be handled intuitively.
- New naming conventions preventing certbot-auto from installing OS
  dependencies on Fedora 26 have been resolved.
2017-09-07 09:12:23 +00:00
wiz
7f4cff1709 Updated gnutls to 3.6.0.
* Version 3.6.0 (released 2017-08-21)

** libgnutls: tlsfuzzer is part of the CI testsuite. This is a TLS testing and
   fuzzying toolkit, allowing for corner case testing, and ensuring that the
   behavior of the library will not change across releases.
   https://github.com/tomato42/tlsfuzzer

** libgnutls: Introduced a lock-free random generator which operates per-thread
   and eliminates random-generator related bottlenecks in multi-threaded operation.
   Resolves gitlab issue #141.
   http://nmav.gnutls.org/2017/03/improving-by-simplifying-gnutls-prng.html

** libgnutls: Replaced the Salsa20 random generator with one based on CHACHA.
   The goal is to reduce code needed in cache (CHACHA is also used for TLS),
   and the number of primitives used by the library. That does not affect the
   AES-DRBG random generator used in FIPS140-2 mode.

** libgnutls: Added support for RSA-PSS key type as well as signatures in
   certificates, and TLS key exchange. Contributed by Daiki Ueno.
   RSA-PSS signatures can be generated by RSA-PSS keys and normal RSA keys,
   but not vice-versa.  The feature includes:
     * RSA-PSS key generation and key handling (in PKCS#8 form)
     * RSA-PSS key generation and key handling from PKCS#11 (with CKM_RSA_PKCS_PSS mech)
     * Handling of RSA-PSS subjectPublicKeyInfo parameters, when present
       in either the private key or certificate.
     * RSA-PSS signing and verification of PKIX certificates
     * RSA-PSS signing and verification of TLS 1.2 handshake
     * RSA-PSS signing and verification of PKCS#7 structures
     * RSA-PSS and RSA key combinations for TLS credentials. That is, when
       multiple keys are supplied, RSA-PSS keys are preferred over RSA for RSA-PSS
       TLS signatures, to contain risks of cross-protocol attacks between the algorithms.
     * RSA-PSS key conversion to RSA PKCS#1 form (certtool --to-rsa)
   Note that RSA-PSS signatures with SHA1 are (intentionally) not supported.

** libgnutls: Added support for Ed25519 signing in certificates and TLS key
   exchange following draft-ietf-tls-rfc4492bis-17.  The feature includes:
     * Ed25519 key generation and key handling (in PKCS#8 form)
     * Ed25519 signing and verification of PKIX certificates
     * Ed25519 signing and verification of TLS 1.2 handshake
     * Ed25519 signing and verification of PKCS#7 structures

** libgnutls: Enabled X25519 key exchange by default, following draft-ietf-tls-rfc4492bis-17.

** libgnutls: Added support for Diffie-Hellman group negotiation following RFC7919.
   That makes the DH parameters negotiation more robust and less prone to errors
   due to insecure parameters. Servers are no longer required to specific explicit
   DH parameters, though if they do these parameters will be used. Group
   selection can be done via priority strings. The introduced strings are
   GROUP-ALL, GROUP-FFDHE2048, GROUP-FFDHE3072, GROUP-FFDHE4096 and
   GROUP-FFDHE8192, as well as the corresponding to curves groups. Note that
   the 6144 group from RFC7919 is not supported.

** libgnutls: Introduced various sanity checks on certificate import. Refuse
   to import certificates which have fractional seconds in Time fields, X.509v1
   certificates which have the unique identifiers set, and certificates with illegal
   version numbers. All of these are prohibited by RFC5280.

** libgnutls: Introduced gnutls_x509_crt_set_flags(). This function can set flags
   in the crt structure. The only flag supported at the moment is
   GNUTLS_X509_CRT_FLAG_IGNORE_SANITY which skips the certificate sanity
   checks on import.

** libgnutls: PKIX certificates with unknown critical extensions are rejected
   on verification with status GNUTLS_CERT_UNKNOWN_CRIT_EXTENSIONS. This
   behavior can be overriden by providing the flag GNUTLS_VERIFY_IGNORE_UNKNOWN_CRIT_EXTENSIONS
   to verification functions. Resolves gitlab issue #177.

** libgnutls: Refuse to generate a certificate with an illegal version, or an
   illegal serial number. That is, gnutls_x509_crt_set_version() and
   gnutls_x509_crt_set_serial(), will fail on input considered to be invalid
   in RFC5280.

** libgnutls: Calls to gnutls_record_send() and gnutls_record_recv()
   prior to handshake being complete are now refused. Addresses gitlab issue #158.

** libgnutls: Added support for PKCS#12 files with no salt (zero length) in their
   password encoding, and PKCS#12 files using SHA384 and SHA512 as MAC.

** libgnutls: Exported functions to encode and decode DSA and ECDSA r,s values.

** libgnutls: Added new callback setting function to gnutls_privkey_t for external
   keys. The new function (gnutls_privkey_import_ext4), allows signing in addition
   to previous algorithms (RSA PKCS#1 1.5, DSA, ECDSA), with RSA-PSS and Ed25519
   keys.

** libgnutls: Introduced the %VERIFY_ALLOW_BROKEN and %VERIFY_ALLOW_SIGN_WITH_SHA1
   priority string options. These allows enabling all broken and SHA1-based signature
   algorithms in certificate verification, respectively.

** libgnutls: 3DES-CBC is no longer included in the default priorities
   list. It has to be explicitly enabled, e.g., with a string like
   "NORMAL:+3DES-CBC".

** libgnutls: SHA1 was marked as insecure for signing certificates. Verification
   of certificates signed with SHA1 is now considered insecure and will
   fail, unless flags intended to enable broken algorithms are set. Other uses
   of SHA1 are still allowed. This can be reverted on compile time with the configure
   flag --enable-sha1-support.

** libgnutls: RIPEMD160 was marked as insecure for certificate signatures. Verification
   of certificates signed with RIPEMD160 hash algorithm is now considered insecure and
   will fail, unless flags intended to enable broken algorithms are set.

** libgnutls: No longer enable SECP192R1 and SECP224R1 by default on TLS handshakes.
   These curves were rarely used for that purpose, provide no advantage over
   x25519 and were deprecated by TLS 1.3.

** libgnutls: Removed support for DEFLATE, or any other compression method.

** libgnutls: OpenPGP authentication was removed; the resulting library is ABI
   compatible, with the openpgp related functions being stubs that fail
   on invocation.

** libgnutls: Removed support for libidn (i.e., IDNA2003); gnutls can now be compiled
   only with libidn2 which provides IDNA2008.

** certtool: The option '--load-ca-certificate' can now accept PKCS#11
   URLs in addition to files.

** certtool: The option '--load-crl' can now be used when generating PKCS#12
   files (i.e., in conjunction with '--to-p12' option).

** certtool: Keys with provable RSA and DSA parameters are now only read and
   exported from PKCS#8 form, following draft-mavrogiannopoulos-pkcs8-validated-parameters-00.txt.
   This removes support for the previous a non-standard key format.

** certtool: Added support for generating, printing and handling RSA-PSS and
   Ed25519 keys and certificates.

** certtool: the parameters --rsa, --dsa and --ecdsa to --generate-privkey are now
   deprecated, replaced by the --key-type option.

** p11tool: The --generate-rsa, --generate-ecc and --generate-dsa options were
   replaced by the --generate-privkey option.

** psktool: Generate 256-bit keys by default.

** gnutls-server: Increase request buffer size to 16kb, and added the --alpn and
   --alpn-fatal options, allowing testing of ALPN negotiation.

** API and ABI modifications:
gnutls_encode_rs_value: Added
gnutls_decode_rs_value: Added
gnutls_base64_encode2: Added
gnutls_base64_decode2: Added
gnutls_x509_crt_set_flags: Added
gnutls_x509_crt_check_ip: Added
gnutls_x509_ext_import_inhibit_anypolicy: Added
gnutls_x509_ext_export_inhibit_anypolicy: Added
gnutls_x509_crt_get_inhibit_anypolicy: Added
gnutls_x509_crt_set_inhibit_anypolicy: Added
gnutls_pubkey_export_rsa_raw2: Added
gnutls_pubkey_export_dsa_raw2: Added
gnutls_pubkey_export_ecc_raw2: Added
gnutls_privkey_export_rsa_raw2: Added
gnutls_privkey_export_dsa_raw2: Added
gnutls_privkey_export_ecc_raw2: Added
gnutls_x509_spki_init: Added
gnutls_x509_spki_deinit: Added
gnutls_x509_spki_get_pk_algorithm: Added
gnutls_x509_spki_set_pk_algorithm: Added
gnutls_x509_spki_get_digest_algorithm: Added
gnutls_x509_spki_set_digest_algorithm: Added
gnutls_x509_spki_get_salt_size: Added
gnutls_x509_spki_set_salt_size: Added
gnutls_x509_crt_set_spki: Added
gnutls_x509_crt_get_spki: Added
gnutls_x509_privkey_get_spki: Added
gnutls_x509_privkey_set_spki: Added
gnutls_x509_crq_get_spki: Added
gnutls_x509_crq_set_spki: Added
gnutls_pubkey_set_spki: Added
gnutls_pubkey_get_spki: Added
gnutls_privkey_set_spki: Added
gnutls_privkey_get_spki: Added
gnutls_privkey_import_ext4: Added
GNUTLS_EXPORT_FLAG_NO_LZ: Added
GNUTLS_DT_IP_ADDRESS: Added
GNUTLS_X509_CRT_FLAG_IGNORE_SANITY: Added
GNUTLS_CERT_UNKNOWN_CRIT_EXTENSIONS: Added
GNUTLS_VERIFY_ALLOW_SIGN_WITH_SHA1: Added
GNUTLS_VERIFY_DO_NOT_ALLOW_IP_MATCHES: Added
GNUTLS_VERIFY_IGNORE_UNKNOWN_CRIT_EXTENSIONS: Added
GNUTLS_SFLAGS_RFC7919: Added
2017-09-06 13:41:26 +00:00
wen
0d2727804e Update to 0.26
Upstream changes:
0.26  Wed Sep  6 02:23:08 MST 2017
	- added 'quiet' option to sha3sum
		-- thanks to Chris David for suggestion and initial patch
		-- ref. rt.cpan.org #122750
	- expanded sha3sum --help message
		-- to explain use of escaped FILE names
2017-09-06 13:32:27 +00:00
wen
310d46b3bd Update to 5.97
Upstream changes:
5.97  Wed Sep  6 02:23:02 MST 2017
	- added 'quiet' option to shasum
		-- thanks to Chris David for suggestion and initial patch
		-- ref. rt.cpan.org #122750
	- expanded shasum --help message
		-- to explain use of escaped FILE names
2017-09-06 13:24:39 +00:00
fhajny
cb73ef5c2a ## 0.8.2 (September 5th, 2017)
SECURITY:

- In prior versions of Vault, if authenticating via AWS IAM and
  requesting a periodic token, the period was not properly respected.
  This could lead to tokens expiring unexpectedly, or a token lifetime
  being longer than expected. Upon token renewal with Vault 0.8.2 the
  period will be properly enforced.

DEPRECATIONS/CHANGES:

- `vault ssh` users should supply `-mode` and `-role` to reduce the
  number of API calls. A future version of Vault will mark these
  optional values are required. Failure to supply `-mode` or `-role`
  will result in a warning.
- Vault plugins will first briefly run a restricted version of the
  plugin to fetch metadata, and then lazy-load the plugin on first
  request to prevent crash/deadlock of Vault during the unseal process.
  Plugins will need to be built with the latest changes in order for them
  to run properly.

FEATURES:

- Lazy Lease Loading: On startup, Vault will now load leases from
  storage in a lazy fashion (token checks and revocation/renewal
  requests still force an immediate load). For larger installations this
  can significantly reduce downtime when switching active nodes or
  bringing Vault up from cold start.
- SSH CA Login with `vault ssh`: `vault ssh` now supports the SSH CA
  backend for authenticating to machines. It also supports remote host
  key verification through the SSH CA backend, if enabled.
- Signing of Self-Issued Certs in PKI: The `pki` backend now supports
  signing self-issued CA certs. This is useful when switching root CAs.

IMPROVEMENTS:

- audit/file: Allow specifying `stdout` as the `file_path` to log to
  standard output
- auth/aws: Allow wildcards in `bound_iam_principal_id`
- auth/okta: Compare groups case-insensitively since Okta is only
  case-preserving
- auth/okta: Standarize Okta configuration APIs across backends
- cli: Add subcommand autocompletion that can be enabled with `vault
  -autocomplete-install`
- cli: Add ability to handle wrapped responses when using `vault auth`.
  What is output depends on the other given flags; see the help output
  for that command for more information.
- core: TLS cipher suites used for cluster behavior can now be set via
  `cluster_cipher_suites` in configuration
- core: The `plugin_name` can now either be specified directly as part
  of the parameter or within the `config` object when mounting a secret
  or auth backend via `sys/mounts/:path` or `sys/auth/:path` respectively
- core: It is now possible to update the `description` of a mount when
  mount-tuning, although this must be done through the HTTP layer
- secret/databases/mongo: If an EOF is encountered, attempt reconnecting
  and retrying the operation
- secret/pki: TTLs can now be specified as a string or an integer number
  of seconds
- secret/pki: Self-issued certs can now be signed via
  `pki/root/sign-self-issued`
- storage/gcp: Use application default credentials if they exist

BUG FIXES:

- auth/aws: Properly use role-set period values for IAM-derived token
  renewals
- auth/okta: Fix updating organization/ttl/max_ttl after initial setting
- core: Fix PROXY when underlying connection is TLS
- core: Policy-related commands would sometimes fail to act
  case-insensitively
- storage/consul: Fix parsing TLS configuration when using a bare IPv6
  address
- plugins: Lazy-load plugins to prevent crash/deadlock during unseal
  process.
- plugins: Skip mounting plugin-based secret and credential mounts when
  setting up mounts if the plugin is no longer present in the catalog.
2017-09-06 11:44:07 +00:00
wiz
1fc957a0ce Follow some redirects. 2017-09-06 09:02:59 +00:00
taca
08ac43609d Update pear-Crypt_GPG to 1.16.2.
pkgsrc change: Add LICENSE.

1.16.2						2017-09-03 04:01 UTC

Changelog:

Added options to configure digest/cipher algorithms.
2017-09-05 15:00:03 +00:00
joerg
0b683f2691 Fix license. 2017-09-04 18:59:30 +00:00
joerg
ec1ce0d5b8 + py-ntlm-auth
+ py-requests-ntlm
2017-09-04 18:58:50 +00:00
joerg
14fa2defe1 Add py-requests-ntlm-1.0.0:
Requests is an HTTP library, written in Python, for human beings. This
library adds optional NTLM authentication support.
2017-09-04 18:58:11 +00:00
joerg
e8c910d057 Add py-ntlm-auth-1.0.5:
This library handles the low-level details of NTLM authentication for use
in authenticating with a service that uses NTLM. It will create and parse
the 3 different message types in the order required and produce a base64
encoded value that can be attached to the HTTP header.

Features:
- LM, NTLM and NTLMv2 authentication
- NTLM1 and NTLM2 extended session security
- Set the The NTLM Compatibility level when sending messages
- Channel Binding Tokens support, need to pass in the SHA256 hash of the
  certificate for it to work
- Support for MIC to enhance the integrity of the messages
- Support for session security with signing and sealing messages after
  authentication happens
2017-09-04 18:57:20 +00:00
wiz
303dc564fb Update some URLs. 2017-09-04 18:55:07 +00:00
wiz
ff22ec594f Follow some redirects. 2017-09-04 18:08:18 +00:00
wiz
1770bcacd4 Comment out dead sites. 2017-09-04 18:00:49 +00:00
wiz
e5ecda42af Updated keepassx to 2.0.3.
2.0.3 (2016-09-04)
=========================

- Improved error reporting when reading / writing databases fails. [#450, #462]
- Display an error message when opening a custom icon fails.
- Detect custom icon format based on contents instead of the filename. [#512]
- Keep symlink intact when saving databases. [#442].
- Fix a crash when deleting parent group of recycle bin. [#520]
- Display a confirm dialog before moving an entry to the recycle bin. [#447]
- Repair UUIDs of inconsistent history items. [#130]
- Only include top-level windows in auto-type window list when using gnome-shell.
- Update translations.
2017-09-04 14:43:13 +00:00
wiz
d4911b75dd Updated p5-IO-Socket-SSL to 2.050.
2.050 2017/08/18
- removed unecessary settings of SSL_version and SSL_cipher_list from tests
- protocol_version.t can now deal when TLS 1.0 and/or TLS 1.1 are not supported
  as is the case with openssl versions in latest Debian (buster)
2017-09-04 12:26:14 +00:00
wiz
320f5ea809 Comment out dead sites. 2017-09-04 05:36:14 +00:00
adam
fd4a896b4b PLIST update 2017-09-04 04:50:26 +00:00
wiz
564031cca2 Update some HOMEPAGEs. 2017-09-03 09:22:57 +00:00
wiz
42426a5a45 Follow some redirects. 2017-09-03 08:53:04 +00:00
wiz
9ddb7f9e9c Comment out dead MASTER_SITES/HOMEPAGEs. 2017-09-03 08:36:49 +00:00
wiz
c0fe3330e6 Bump libzip ABI depends and PKGREVISIONs of its users for bzip2 dependency. 2017-09-02 22:02:24 +00:00
tron
e1828fe91f Fix bad merge on patch file which broke the build under macOS Sierra. 2017-09-02 18:15:42 +00:00