Commit graph

48 commits

Author SHA1 Message Date
jperkin
17661ff9a5 Bump PKGREVISION for security/openssl ABI bump. 2016-03-05 11:27:40 +00:00
dholland
3548e8249e Sort. 2015-12-29 06:23:20 +00:00
agc
5293710fb4 Add SHA512 digests for distfiles for security category
Problems found locating distfiles:
	Package f-prot-antivirus6-fs-bin: missing distfile fp-NetBSD.x86.32-fs-6.2.3.tar.gz
	Package f-prot-antivirus6-ws-bin: missing distfile fp-NetBSD.x86.32-ws-6.2.3.tar.gz
	Package libidea: missing distfile libidea-0.8.2b.tar.gz
	Package openssh: missing distfile openssh-7.1p1-hpn-20150822.diff.bz2
	Package uvscan: missing distfile vlp4510e.tar.Z

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
2015-11-04 01:17:40 +00:00
sevan
daa716f686 Protect against a NULL pointer dereference described in:
https://www.altsci.com/ipsec/
Patch obtained from src/crypto/dist/ipsec-tools/src/racoon/gssapi.c
Bump PKGREVISION
2015-05-19 15:45:44 +00:00
tron
c64e9eb269 Recursive PKGREVISION bump for OpenSSL API version bump. 2014-02-12 23:18:26 +00:00
jperkin
becd113253 PKGREVISION bumps for the security/openssl 1.0.1d update. 2013-02-06 23:20:50 +00:00
asau
1a433eae91 Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days. 2012-10-23 18:16:19 +00:00
obache
d8b3ca0f9b reset maintainer, he does not use this package anymore. 2010-11-11 11:42:20 +00:00
spz
39a80d4c97 update to latest release
DESTDIRify
ok'd by manu@
2010-03-06 09:07:15 +00:00
wiz
579796a3e5 Recursive PKGREVISION bump for jpeg update to 8. 2010-01-17 12:02:03 +00:00
joerg
f0bbd1517d Remove @dirrm entries from PLISTs 2009-06-14 18:13:25 +00:00
manu
24c4fb7253 From Sergey Svishchev <svs@ropnet.ru>: ipsec-tools builds fine on FreeBSD 2009-01-10 17:13:01 +00:00
manu
2181a05305 Update to ipsec-tools 0.7.1, fixes CVE-2008-3652
Changes since the 0.6 branch:
0.7.1 - 23 July 2008
        o Fixes a memory leak when invalid proposal received
        o Some fixes in DPD
        o do not set default gss id if xauth is used
        o fixed hybrid enabled builds
        o fixed compilation on FreeBSD8
        o cleanup in network port value manipulation
        o gets ports from SADB_X_EXT_NAT_T_[SD]PORT if present in purge_ipsec_sp
i()
        o Generates a log if cert validation has been disabled by configuration
        o better handling for pfkey socket read errors
        o Fixes in yacc / bison stuff
        o new plog() macro (reduced CPU usage when logging is disabled)
        o Try to works better with huge SPD/SAD
        o Corrected modecfg option syntax
        o Many other various fixes...

0.7     - 09 August 2007
        o Xauth with pre-shared key PSK
        o Xauth with certificates
        o SHA2 support
        o pkcs7 support
        o system accounting (utmp)
        o Darwin support
        o configuration can be reloaded
        o Support for UNIQUE generated policies
        o Support for semi anonymous sainfos
        o Support for ph1id to remoteid matching
        o Plain RSA authentication
        o Native LDAP support for Xauth and modecfg
        o Group membership checks for Xauth and sainfo selection
        o Camellia cipher support
        o IKE Fragment force option
        o Modecfg SplitNet attribute support
        o Modecfg SplitDNS attribute support ( server side )
        o Modecfg Default Domain attribute support
        o Modecfg DNS/WINS server multiple attribute support
2008-08-16 06:55:18 +00:00
tnn
ad6ceadd25 Per the process outlined in revbump(1), perform a recursive revbump
on packages that are affected by the switch from the openssl 0.9.7
branch to the 0.9.8 branch. ok jlam@
2008-01-18 05:06:18 +00:00
ghen
3612dc6014 Update to ipsec-tools 0.6.7.
o Fixed SHA256 detection on some systems
o Fixed a DoS in Informationnal messages processing (CVE-2007-1841).
2007-04-11 06:51:19 +00:00
wiz
601583c320 Whitespace cleanup, courtesy of pkglint.
Patch provided by Sergey Svishchev in private mail.
2007-02-22 19:26:05 +00:00
bad
05972d3b74 Update ipsec-tools to 0.6.6.
Changes since 0.6.3:

0.6.6
	* src/racoon/isakmp_xauth.c: Build fix
	* src/racoon/pfkey.c: Sets NAT-T ports to 0 if no NAT
	  encapsulation in pk_sendgetspi().
	* src/racoon/pfkey.c: Sets NAT-T ports to 0 if no NAT
	  encapsulation in pk_sendupdate().
	* src/racoon/isakmp_xauth.c: fix memory leak
	* src/racoon/{cfparse.y|handler.h}: typos

0.6.5
	* src/racoon/isakmp.c: Fixed zombie PH1 handler when isakmp_send()
	  fails in isakmp_ph1resend()
	* src/racoon/{cfparse.y|ipsec_doi.c}: Temporary fix for /32
	  subnets parsing.
	* src/racoon/isakmp_cfg.c: make software behave as the documentation
	  advertise for INTERNAL_NETMASK4. Keep the old INTERNAL_MASK4 to
	  avoid breaking backward compatibility.
	* src/racoon/session.c: Fixed / cleaned up signal handling.

0.6.4
	* configure.ac src/racoon/plog.c: backported Fred's workaround for
	  %zu problems on (at least) FreeBSD4.
	* src/racoon/session.c: backport: fix possible race conditions in
	  signal handlers (see session.c 1.17).
	* src/libipsec/pfkey_dump.c: fixed compilation when NAT_T
	  disabled (Fred has still some CVS problems).
	* src/libipsec/{libpfkey.h|pfkey_dump.c}: add a sadump_withports
	  function to display SAD entries with their associated ports.
	* src/setkey/{parse.y|setkey.c|setkey.8}: allow to use setkey -p flag
	  in conjunction with -D to show SADs with the port, allow both get and
	  delete commands to use bracketed ports if needed.
	* src/racoon/racoon.conf.5: Style changes
2006-10-25 17:12:18 +00:00
rillig
579e977969 Ran "pkglint --autofix", which corrected some of the quoting issues in
CONFIGURE_ARGS.
2005-12-05 23:55:01 +00:00
rillig
b71a1d488b Fixed pkglint warnings. The warnings are mostly quoting issues, for
example MAKE_ENV+=FOO=${BAR} is changed to MAKE_ENV+=FOO=${BAR:Q}. Some
other changes are outlined in

    http://mail-index.netbsd.org/tech-pkg/2005/12/02/0034.html
2005-12-05 20:49:47 +00:00
tron
e8de42870e Update "ipsec-tools" package to version 0.6.3. Changes since 0.6.1:
- Various bug fixes
- ISAKMP mode config works without Xauth

This update fixes the security vulnerability reported in SA17668.
2005-11-22 16:22:47 +00:00
tron
f6405297d7 Mark this package as only available on NetBSD 3.0 and newer and
Linux 2.6.x and newer.
2005-09-02 17:01:13 +00:00
tron
fb58f4d844 Update "ipsec-tools" package to version 0.6.1. Changes since 0.6.1rc1:
- src/racoon/dnssec.c: fix bogus test on function result
- src/racoon/isakmp.c: Improved in/out SA addresses check in
  purge_remote()
- src/libipsec/{key_debug.c|pfkey.c|pfkey_dump.c}: de-lint, warnings
- src/racoon/privsep.c: Fixed a %d -> %zu in port_check()
2005-08-21 21:58:41 +00:00
tron
1e258b4190 Fix build problem under platforms were "size_t" is not an integer. 2005-08-07 22:21:05 +00:00
tron
9e5e1b7732 Update "ipsec-tools" package to version 0.6.1rc1.
Changes since version 0.6b2:
- NAT-T fixes for situations where NAT-T is not used
- OpenSSL 0.9.8 support
- keys are not restricted to OpenSSL default size anymore
- PKCS7 support
- SHA2 support
2005-08-05 12:04:33 +00:00
wiz
336ed019bf Fix casing of IPsec in COMMENT. 2005-06-01 14:35:31 +00:00
dillo
f81ae835ad Packages have no business modifying PKG_DEFAULT_OPTIONS -- it's a
user settable variable.  Set PKG_SUGGESTED_OPTIONS instead.  Also,
make use of PKG_OPTIONS_LEGACY_VARS.

Reviewed by wiz.
2005-05-31 10:01:36 +00:00
rillig
f795c2e475 Removed trailing white-space. 2005-05-23 08:26:03 +00:00
manu
61bb9d3011 Updated ipsec-tools to 0.6b2.
Multiple bug fixes, the most important being NAT-T now working with
multiple endpoints behind the same NAT.
2005-05-10 12:39:28 +00:00
tv
f816d81489 Remove USE_BUILDLINK3 and NO_BUILDLINK; these are no longer used. 2005-04-11 21:44:48 +00:00
manu
996dcfad79 Missing installed files inPLIST 2005-03-23 17:27:17 +00:00
manu
7c1a540aa7 Upgrade to ipsec-tools 0.6b1.
New features:
- PAM support
- privilege separation
2005-03-23 16:49:39 +00:00
agc
d81d19f8e0 Add RMD160 digests. 2005-02-24 12:51:41 +00:00
manu
6c4d4ca60c Fix file installation, add missing samples config files 2005-02-20 01:03:30 +00:00
manu
c3622e01df Upgraded ipsec-tools to release version 0.5 2005-02-18 09:53:40 +00:00
kim
98d6a371a1 Use PKG_SYSCONFDIR 2005-01-12 15:31:11 +00:00
kleink
8be1cc1fa8 Add (unsigned char) cast to ctype functions; taken from the NetBSD trunk. 2004-12-12 23:51:10 +00:00
grant
8a80fe2c61 add additional libraries required by libradius. 2004-11-11 12:13:24 +00:00
grant
0f647aba80 include libradius/buildlink3.mk only if we're including radius
support.
2004-11-11 11:51:12 +00:00
grant
1e934ed277 include some additional header files on FreeBSD >= 5. 2004-11-11 11:50:20 +00:00
grant
4a59de2530 allow radius support to be disabled by moving it to PKG_OPTIONS.
no PKGREVISION bump as it is still enabled by default.
2004-11-11 11:49:15 +00:00
manu
4f1a3d93e9 Remove lex and yacc generated files before building: they might not
match with the libraries installed on the system.
2004-11-11 10:53:08 +00:00
manu
b64820bb7a Add patches checksum 2004-11-10 17:26:04 +00:00
manu
23a264a1c2 Fix minor LP64 problems 2004-11-10 16:53:51 +00:00
manu
4ec03a3954 Disable nat-t by default as the kernel does not have support for it
without an unofficial patch yet.
2004-11-10 16:44:51 +00:00
xtraeme
51d1842897 This package needs openssl bl3.mk... and it needs NAT-T kernel option
to build...
2004-11-10 09:11:34 +00:00
xtraeme
3249738914 No need to set BUILDLINK_DEPMETHOD.libradius-linux?= build here... 2004-11-10 08:49:32 +00:00
xtraeme
5756006b0e * Fix HOMEPAGE.
* No need to use LIBTOOL_OVERRIDE.
* Remove unneeded ${EXAMPLESDIR} (??!!) after bl3.mk includes
* Remove unneeded BUILD_DEPEND, because this pkg uses bl3

Still libradius is broken...
2004-11-10 08:43:44 +00:00
manu
5203dfadb5 racoon speaks IKE (ISAKMP/Oakley) key management protocol, to
establish IPsec security association with other hosts.

This is based on KAME racoon, with some enhancements such as
NAT-Traversal (needs a kernel patch), hybrid authentication,
ISAKMP mode config, RADIUS support, IKE fragmentation and others.

Ipsec-tools' racoon is able to act as a VPN server for the
Cisco VPN client using hybrid authentication.
2004-11-09 22:42:20 +00:00