Commit graph

6235 commits

Author SHA1 Message Date
gls
5104aceff8 Update security/py-ssh to 1.7.13.
Upstream changes:


## ssh 1.7.13 (2012-02-13)

* #5: Moved a `fcntl` import closer to where it's used to help avoid
  `ImportError` problems on Windows platforms. Thanks to Jason Coombs for the
  catch + suggested fix.
* #4: Updated implementation of WinPageant integration to work on 64-bit
  Windows. Thanks again to Jason Coombs for the patch.
2012-04-13 21:35:18 +00:00
wiz
af91d2f0cd Fix path to rc.subr.
From Sascha Wildner in PR 46323.
2012-04-12 08:21:54 +00:00
wiz
4773e0d7e2 All supported python versions in pkgsrc support eggs, so remove
${PLIST.eggfile} from PLISTs and support code from lang/python.
2012-04-08 20:21:41 +00:00
wiz
4faa202860 Remove python24 and all traces of it from pkgsrc.
Remove devel/py-ctypes (only needed by and supporting python24).
Remove PYTHON_VERSIONS_ACCEPTED and PYTHON_VERSIONS_INCOMPATIBLE
lines that just mirror defaults now.
Miscellaneous cleanup while editing all these files.
2012-04-08 19:08:44 +00:00
dholland
cfc34ea9af Add missing pam.bl3.mk 2012-04-07 22:34:13 +00:00
joerg
24f6e2bdb2 Revert. 2012-04-07 19:38:43 +00:00
joerg
4089256956 Apply patches as intended. 2012-04-07 19:34:15 +00:00
dholland
9c603f48cf Regen properly for patches in last commit. Hi Joerg... 2012-04-07 19:27:23 +00:00
joerg
15b4455bdb Fix build on NetBSD/current. 2012-04-07 13:16:23 +00:00
obache
24cbc6ceba Allow to build with non-native PAM on *BSD. 2012-04-07 01:53:18 +00:00
obache
0f98a68d97 allow to build with skipping harmless warnings. 2012-04-05 04:55:42 +00:00
adam
298424a20e Fix building with clang on i386 (PR#46177) 2012-04-03 15:00:30 +00:00
markd
89116a6c43 Add kde-workspace4 dependency 2012-04-03 08:13:30 +00:00
markd
1b342129e3 add kgpg 2012-03-26 09:27:27 +00:00
markd
fc6a1c2ebd import kgpg - part of KDE SC 4.8.0 (that got missed)
KGpg is a simple interface for GnuPG, a powerful encryption utility. It
can help you set up and manage your keys, import and export keys, view key
signatures, trust status and expiry dates.
2012-03-26 09:26:12 +00:00
taca
6895b0face Bump PKGREVISION reflecting the default Ruby's version change. 2012-03-22 14:25:25 +00:00
hans
fd428a486e Fix build on SunOS with gcc by replacing sunpro arguments with their gcc
counterparts. The wrappers will replace them again for sunpro builds.
2012-03-21 18:24:00 +00:00
gdt
33513d3b30 Split version into sane and excessive parts.
Upstream's version is 0.6.0.X, where X appears to be a large integer
in decimal that corresponds to a git sha1 has.  Such large numbers
violate the assumption, true with just about every previous package,
that version number components will fit in an int --- code that
handles version numbers does not use a multiprecision integer library
like gmp.  To address this, split the version into what would have
been the version under normal procedures (0.6.0), and put the bignum
into ${VERSION_EXCESSIVE}, allowing it be used in DISTNAME but not
PKGNAME.
2012-03-20 23:38:26 +00:00
dholland
9c06a86a8a Add missing PAM buildlink 2012-03-20 16:27:40 +00:00
wiz
6a5c3ce827 Update to 2.12:
* Noteworthy changes in release 2.12 (2012-03-19) [stable]
- Cleanup license headers.
- build: Update gnulib files.
- Corrected DER decoding issue (reported by Matthew Hall).
  Added self check to detect the problem, see tests/Test_overflow.c.
  This problem can lead to at least remotely triggered crashes, see
  further analysis on the libtasn1 mailing list.
2012-03-20 13:07:50 +00:00
taca
2dff5d0eec Add ane enable ruby-rc4. 2012-03-20 13:06:40 +00:00
taca
d94d0cbb32 Importing security/ruby-rc4 version 0.1.5.
RubyRC4 is a pure Ruby implementation of the RC4 algorithm.
2012-03-20 13:05:41 +00:00
markd
8bda9fec69 add ksecrets, kwallet 2012-03-20 05:57:07 +00:00
markd
4ce6318654 Add ksecrets and kwallet. Part of KDE SC 4.8.0 2012-03-20 05:55:33 +00:00
pettai
4e133030cc pam-krb5 4.5
* Suppress the notice that the password is being changed because it's
    expired if force_first_pass or use_first_pass is set in the password
    stack, indicating that it's stacked with another module that's also
    doing password changes.  This is arguable, but without this change the
    notification message of why the password is being changed shows up
    confusingly in the middle of the password change interaction.
  * Some old versions of Heimdal (0.7.2 in OpenBSD 4.9, specifically)
    reportedly return KRB5KDC_ERR_KEY_EXP for accounts with expired
    keys even if the supplied password is wrong.  Work around this by
    confirming that the PAM module can obtain tickets for kadmin/changepw
    before returning a password expiration error instead of an invalid
    password error.
  * The location of the temporary root-owned ticket cache created during
    the authentication process is now also controlled by the ccache_dir
    option (but not the ccache option) rather than forced to be in /tmp.
    This will allow system administrators to configure an alternative
    cache directory so that pam-krb5 can continue working when /tmp is
    full.
  * Report more specific errors in syslog if authorization checks (such as
    .k5login checks) fail.
  * Pass a NULL principal to krb5_set_password with MIT client libraries
    to prefer the older change password protocol for compatibility with
    older KDCs.  This is not necessary on Heimdal since Heimdal's
    krb5_set_password tries both protocols.
  * Improve logging and authorization checks when defer_pwchange is set
    and a user authenticates with an expired password.
  * When probing for Kerberos libraries, always add any supplemental
    libraries found to that point to the link command.  This will fix
    configure failures on platforms without working transitive shared
    library dependencies.
  * Close some memory leaks where unparsed Kerberos principal names were
    never freed.
  * Restructure the code to work with OpenPAM's default PAM build
    machinery, which exports a struct containing module entry points
    rather than public pam_sm_* functions.
  * In debug logging, report symbolic names for PAM flags on PAM function
    entry rather than the numeric PAM flags.  This helps with automated
    testing and with debugging PAM problems on different operating
    systems.
  * Include <krb5/krb5.h> if <krb5.h> is missing, which permits finding
    the header file on NetBSD systems.
  * Replace the Kerberos compatibility layer with equivalent but
    better-structured code from rra-c-util 4.0.
  * Avoid krb5-config and use manual library probing if --with-krb5-lib or
    --with-krb5-include were given to configure.  This avoids having to
    point configure at a nonexistent krb5-config to override its results.
  * Use PATH_KRB5_CONFIG instead of KRB5_CONFIG to locate krb5-config in
    configure, to avoid a conflict with the variable used by the Kerberos
    libraries to find krb5.conf.
  * Change references to Kerberos v5 to just Kerberos in the documentation.
  * Update to rra-c-util 4.0
  * Update to C TAP Harness 1.9
2012-03-19 19:31:24 +00:00
dholland
2a8593c947 Makefile is not MAKE_JOBS_SAFE as shipped. Patch it up, since it doesn't
appear to require or be using gmake.
2012-03-19 03:07:45 +00:00
dholland
da6bd51025 Makefile is not MAKE_JOBS_SAFE as shipped. Patch it up, since it doesn't
appear to require or be using gmake.
2012-03-19 02:12:28 +00:00
pettai
f5a56fca3d 1.12.1 (2/7/12)
- Minor bug fix release
    - Fix perl Validator module so it compiles after a header move
    - Make all OSes use the new dnssec-check gui as they should have

1.12                                                            (1/26/12)
 - New Features:

    - libval:       - Made improvements to support IPv6,
                      added the ability to fetch IPv6 glue
                    - Fixed the EDNS0 fallback behavior.
                    - Tidied up the locking semantics in libval.
                    - Added support for hard-coding validator configuration
                      information that gets used in the absence of other
                      configuration data. This feature allows the
                      validator library to be self-contained in
                      environments where setting up configuration data at
                      specific locations in the file system is not always
                      feasible.
                    - The library has been ported to the Android OS

    - rollerd:      - Added support for phase-specific commands. This allows
                      the zone operator to customize processing of the rollerd
                      utility during different rollerd phases.
                    - Added support for zone groups.  This allows a collection
                      of zones to be controlled as a group, rather each of
                      those zones individually.
                    - Improved the manner in which rollerd indexes the zones
                      being managed, with the significantly decreased access
                      times for rollerd's data files.  This results in rollerd
                      being able to support a lot more zones with a single
                      rollerd instance.
                    - rollctl and the rollover GUI programs may have new
                      commands to allow for immediate termination of rollerd.

    - apps          - Added patch to enable local validation in NTP, with
                      the ability to handle a specific chicken and egg problem
                      related to the interdependency between DNSSEC and an
                      accurate system clock.

                    - Added a patch to enable DNSSEC validation in Qt
                      based applications

    - dnssec-check  - Completely rewritten GUI with many new features
                    - Now contains the ability to submit the results
                      to a central DNSSEC-Tools repository.  The
                      results will be analyzed and published on a
                      regular basis.  Please help us get started by
                      running dnssec-check on your networks!  Note
                      that it explains that it only sends hashed IP
                      addresses to our servers and the reports
                      generated will be aggregation summaries of the
                      data collected.
                    - It now runs on both Android and Harmattan (N9) devices

    - maketestzone  - Now produces zones with wildcards and changes to
                      NSEC  record signatures

    - dnssec-nodes  - parses unbound log files
                    - Initial work porting to Android

    - dnssec-system-tray
                    - parses unbound log files

1.11                                                            (9/30/11)
 - New Features:

    - libval:       - Significant improvements and bug fixes to the
                      asynchronous support.
                    - Added asynchronous version of val_getaddr_info.
                    - Some reworking of the asynchronous API and callbacks.
                      Note the asynchronous api is still under development and
                      subject to changes that break backwards compatibility.

    - rollerd:      - Added an experimental time-based method for queuing
                      rollover operations.  This original method (full list
                      of all zones) is the default queuing method, but the
                      new method can be used by editing the rollerd script.
                      rollctl and rollrec.pm were also modified to support
                      this change.
                    - Added support for merging a set of rollrec files.
                      rollctl and rollrec.pm were also modified to support
                      this change.

    - dnssec-nodes  - This graphical DNS debugging utility was greatly enhanced
                    - Now parses both bind and libval log files
                    - Multiple log files can be watched
                    - Node's represent multiple data sets
                      internally, which are independently displayed
                      and tracked.
                    - Added support for searching for and
                      highlighting DNS data and DNSSEC status
                      results

    - dnssec-system-tray
                    - This utility can now report on BOGUS responses
                      detected in both libval and bind log files.
                    - Summary window revamped to group similar
                      messages together.

 Plus many more minor features and bug fixes
2012-03-18 19:23:27 +00:00
pettai
f395e4f141 OpenDNSSEC 1.3.7
* OPENDNSSEC-215: Signer Engine: Always recover serial from backup,
  even if it is corrupted, preventing unnecessary serial decrementals.
* OPENDNSSEC-217: Enforcer: Tries to detect pidfile staleness, so that
  the daemon will start after a power failure.

Bugfixes:
* ods-hsmutil: Fixed a small memory leak when printing a DNSKEY.
* OPENDNSSEC-216: Signer Engine: Fix duplicate NSEC3PARAM bug.
* OPENDNSSEC-218: Signer Engine: Prevent endless loop in case the locators
  in the signer backup files and the HSM are out of sync.
* OPENDNSSEC-225: Fix problem with pid found when not existing.
* SUPPORT-21: HSM SCA 6000 in combination with OpenCryptoki can return RSA key
  material with leading zeroes. DNSSEC does not allow leading zeroes in key
  data. You are affected by this bug if your DNSKEY RDATA e.g. begins with
  "BAABA". Normal keys begin with e.g. "AwEAA". OpenDNSSEC will now sanitize
  incoming data before adding it to the DNSKEY. Do not upgrade to this version
  if you are affected by the bug. You first need to go unsigned, then do the
  upgrade, and finally sign your zone again. SoftHSM and other HSM:s will not
  produce data with leading zeroes and the bug will thus not affect you.


OpenDNSSEC 1.3.6

* OPENDNSSEC-33: Signer Engine: Check HSM connection before use, attempt to
  reconnect if it is not valid.
* OPENDNSSEC-178: Signer Engine: Instead of waiting an arbitrary amount of
  time, let worker wait with pushing sign operations until the queue is
  non-full.
* Signer Engine: Adjust some log messages.

Bugfixes:
* ods-control: Wrong exit status if Enforcer was already running.
* OPENDNSSEC-56: ods-ksmutil had the wrong option for config file in the
  help usage text.
* OPENDNSSEC-207: Signer Engine: Fix communication from a process not
  attached to a shell.
* OPENDNSSEC-209: Signer Engine: Make output file adapter atomic by writing
  signed file to an intermediate file first.
2012-03-18 17:38:46 +00:00
pettai
8fadef65fe SoftHSM 1.3.2
* Update the README with information on moving the database
  between different architectures.

Bugfixes:
* Fix the destruction order of the Singleton objects.
2012-03-18 15:11:07 +00:00
taca
cbc94c1215 Update ruby-net-ssh to 2.3.0.
=== 2.3.0 / 11 Jan 2012

* Support for hmac-sha2 and diffie-hellman-group-exchange-sha256 [Ryosuke Yamazaki]

=== 2.2.2 / 04 Jan 2012

* Fixed: Connection hangs on ServerVersion.new(socket, logger) [muffl0n]
* Avoid dying when unsupported auth mechanisms are defined [pcn]
2012-03-17 17:01:16 +00:00
gdt
b24bcab513 fix distinfo; patch-aa is gone 2012-03-16 00:15:15 +00:00
gdt
1d3af63e6e Set license (GPLv2, or boutique license not in pkgsrc/licenses). 2012-03-16 00:14:36 +00:00
gdt
3dd441ca12 Update to 0.6.0.1206569328141510525648634803928199668821045408958.
(Yes, that ridiculous version number really is what upstream calls it.)

No NEWS entry, but announcement includes:

2012-03-13  Zooko Wilcox-O'Hearn  <zooko@zooko.com>

      * src/pycryptopp/_version.py: release pycryptopp-0.6.0
      * add Ed25519 signatures (#75)
      * add XSalsa20 cipher (#40)
      * switch from darcs to git for revision control
      * pycryptopp version numbers now include a decimal encoding of *
      * reorganize the source tree and the version number generation
      * aesmodule.cpp: validate size of IV and throw exception if it
        is not 16 (#70)
      * fixed compile errors with gcc-4.7.0 (#78)
      * fixed compile errors concerning "CryptoPP::g_nullNameValuePairs" (#77)
      * suppress warnings from valgrind with new OpenSSL 1.0.1 on Fedora (#82)
      * raise Python exception instead of uncaught C++ exception
        (resulting in abort) when deserializing malformed RSA keys (#83)
2012-03-16 00:12:35 +00:00
adam
60b47b99bf Changes 2.12.17:
* libgnutls: Corrections in record packet parsing.
* libgnutls: Fixes in SRP authentication.
* libgnutls: Added function to force explicit reinitialization of PKCS 11
  modules. This is required on the child process after a fork.
* libgnutls: PKCS 11 objects that do not have ID no longer crash listing.
* API and ABI modifications: gnutls_pkcs11_reinit: Added
2012-03-15 16:41:48 +00:00
obache
34a560cbb0 Bump PKGREVISION from default python to 2.7. 2012-03-15 11:53:20 +00:00
cegger
ae0d1bedcd configure script expects darwin-ppc-cc and not darwin-powerpc-cc.
'should be ok' joerg@
2012-03-14 22:48:58 +00:00
wiz
d8c2433036 Update MASTER_SITES' and HOMEPAGE'.
From patch by Bug Hunting.

Add 'isc' to licenses.
2012-03-14 14:20:38 +00:00
pettai
5f6dc1fe5d Imported pam-yubico, libyubikey, ykclient and ykpers 2012-03-13 15:36:37 +00:00
pettai
0be5726288 The Yubico PAM module provides an easy way to integrate the Yubikey
into your existing user authentication infrastructure.

Imported from pkgsrc-wip
2012-03-13 15:32:47 +00:00
pettai
8cc051e0ad The YubiKey Personalization package contains a library and
command line tool used to personalize (i.e., set a AES key) YubiKeys.

Imported from pkgsrc-wip
2012-03-13 15:30:07 +00:00
pettai
70e8c3639b Backout bad (over)import 2012-03-13 15:25:33 +00:00
pettai
6e24b666b5 This package implements online validation of Yubikey OTPs. It is written in C
and provides a shared library for use by other software.

Imported from pkgsrc-wip
2012-03-13 15:15:15 +00:00
pettai
70b02003bf This package make up the low-level C software development kit for the
Yubico authentication device, the Yubikey.

Imported from pkgsrc-wip
2012-03-13 15:12:36 +00:00
fhajny
629defae17 On SunOS, heimdal never builds hcrypto when pkgsrc OpenSSL used. 2012-03-13 09:04:49 +00:00
fhajny
7dd210d5b0 Adding PLIST.SunOS 2012-03-13 08:01:01 +00:00
taca
80d56c141a Update openssl pacakge to 0.9.8u.
Changes between 0.9.8t and 0.9.8u [12 Mar 2012]

  *) Fix MMA (Bleichenbacher's attack on PKCS #1 v1.5 RSA padding) weakness
     in CMS and PKCS7 code. When RSA decryption fails use a random key for
     content decryption and always return the same error. Note: this attack
     needs on average 2^20 messages so it only affects automated senders. The
     old behaviour can be reenabled in the CMS code by setting the
     CMS_DEBUG_DECRYPT flag: this is useful for debugging and testing where
     an MMA defence is not necessary.
     Thanks to Ivan Nestlerode <inestlerode@us.ibm.com> for discovering
     this issue. (CVE-2012-0884)
     [Steve Henson]

  *) Fix CVE-2011-4619: make sure we really are receiving a
     client hello before rejecting multiple SGC restarts. Thanks to
     Ivan Nestlerode <inestlerode@us.ibm.com> for discovering this bug.
     [Steve Henson]
2012-03-13 03:11:32 +00:00
fhajny
eb88b46c25 Value of _FILE_OFFSET_BITS corrected. Disabled static linking for Solaris 10
and later (no longer supports static linking).
2012-03-12 14:18:44 +00:00
shattered
3efad7a2c2 PR/39656 -- Use /var/heimdal as hdbdir, not /var. 2012-03-11 11:30:06 +00:00
fhajny
4d6a0dc9b3 Force --with-waitfunc=wait3 on SunOS, fixes several courier-* packages. 2012-03-09 15:15:30 +00:00