Commit graph

10553 commits

Author SHA1 Message Date
nia
7370f02709 p5-Crypt-Random: Update to 1.52
1.52                                                     December 22, 2018

  * Add a chi square statistical test.  t/chisquare.t

  * Uniform can be passed to the constructor of Crypt::Random::Generator.
    This should be the default, and will likely be in the next release.

  * Fixed minor bugs & typos.


1.51                                                     December 22, 2018

  * Test no longer looks for non-eq of two generated numbers as these can be
    correctly the same if test is run enough number of times.
    https://rt.cpan.org/Ticket/Display.html?id=99880

  * Removed outdated dependency info.
    https://rt.cpan.org/Ticket/Display.html?id=94441

  * Removed /dev/random read from the test, as it can hang when there is
    insufficient entropy.
    https://rt.cpan.org/Ticket/Display.html?id=30423

  * Removed potentially unsafe include in bin/makerandom.
    https://rt.cpan.org/Ticket/Display.html?id=128062
2020-03-22 20:54:36 +00:00
nia
b0eeb94486 p5-Crypt-Rijndael: Update to 1.14
1.14 - 2019-06-14
    * Fix UINT32 and UINT8 for musl libc
2020-03-22 20:50:01 +00:00
rillig
c0d2817632 security/p5-Net-DNS-SEC: remove no-op SUBST block
There is no chance that line 1 contains an include argument, after being
sent through REPLACE_PERL. And even then, including a relative path would
not make sense.
2020-03-22 20:48:34 +00:00
rillig
3afd42faa8 security/mhash: fix file patterns for SUBST
The files in src/ don't reference MD4 at all.
2020-03-22 18:38:27 +00:00
wiz
daf276c903 openssl: update to 1.1.1e.
Major changes between OpenSSL 1.1.1d and OpenSSL 1.1.1e [17 Mar 2020]

      o Fixed an overflow bug in the x64_64 Montgomery squaring procedure
        used in exponentiation with 512-bit moduli (CVE-2019-1551)
2020-03-22 18:23:34 +00:00
tnn
5a3e67a0f0 crypto++: homogenize shared library rules. Don't bomb if ldconfig not found. 2020-03-22 17:52:51 +00:00
tnn
34a262fa92 p5-Crypt-Curve25519: work around namespace conflict 2020-03-22 13:15:13 +00:00
rillig
c4fcced991 security/gnutls: remove unnecessary comment from Makefile 2020-03-22 12:21:59 +00:00
rillig
26518604c6 security/gnutls: remove nonexistent files from REPLACE_BASH 2020-03-22 12:21:12 +00:00
nia
6c2313625a mbedtls1: Remove, unmaintained and unused in pkgsrc 2020-03-22 07:54:22 +00:00
nia
93c36e3f1a mbedtls: doesn't need gmake 2020-03-22 07:47:00 +00:00
tnn
7a351af97d ruby-*: comment out references to deleted rails packages, mark as BROKEN
Someone with ruby clue needs to look at these.
2020-03-21 20:26:17 +00:00
bsiegert
f5efefe062 Revbump all Go packages after go113 update. 2020-03-21 16:57:00 +00:00
adam
2c3f8ea375 gnupg2: updated to 2.2.20
Noteworthy changes in version 2.2.20:
* Protect the error counter against overflow to guarantee that the
  tools can't be tricked into returning success after an error.
* gpg: Make really sure that --verify-files always returns an error.
* gpg: Fix key listing --with-secret if a pattern is given.
* gpg: Fix detection of certain keys used as default-key.
* gpg: Fix default-key selection when a card is available.
* gpg: Fix key expiration and key usage for keys created with a
  creation date of zero.
* gpgsm: Fix import of some CR,LF terminated certificates.
* gpg: New options --include-key-block and --auto-key-import to
  allow encrypted replies after an initial signed message.
* gpg: Allow the use of a fingerprint with --trusted-key.
* gpg: New property "fpr" for use by --export-filter.
* scdaemon: Disable the pinpad if a KDF DO is used.
* dirmngr: Improve finding OCSP certificates.
* Avoid build problems with LTO or gcc-10.
2020-03-21 07:24:30 +00:00
markd
28f8a4b3cc heimdal: fix runpath setting in krb5-config 2020-03-21 00:15:11 +00:00
nia
4b51d9715f *: Convert broken sourceforge HOMEPAGEs back to http 2020-03-20 11:57:53 +00:00
joerg
594b23842b Uses ${TAR} 2020-03-18 18:00:48 +00:00
gdt
aa0bf4bc98 security/heimdal: Prefix kerberos commands by default
It has long been an issue that heimdal installs "su" which shadows
system su and behaves differently.  Now, with openssl 1.1, many people
are getting heimdal installed that did not expect it or ask for it.

(Really, heimdal should be split into libraries and apps, so that
programs can have kerberos support without adding commands to the
user's namespace, but this is vastly easier.)

(In response to on-list complaints, and believing this will not be
contoversial.)
2020-03-18 13:18:57 +00:00
tnn
4a49290f3a openpam: needs pkg-config 2020-03-18 12:20:45 +00:00
ryoon
52e64020c4 acmesh: Update MASTER_SITES and HOMEPAGE 2020-03-17 14:32:03 +00:00
wiz
ca4b0fe8d1 py-google-auth: update to 1.11.3.
Bug Fixes

    fix the scopes so test can pass for a local run (#450) (b2dd77f)
    only add IAM scope to credentials that can change scopes (#451) (82e224b)
2020-03-15 19:56:29 +00:00
wiz
0690560163 libsecret: update to 0.20.2.
0.20.2
 * secret-file-collection: force little-endian in GVariant [!49, #42]
 * Prefer g_info() over g_message() [!48, #40]
 * meson: Don't specify shared_library() [!47]
 * docs: Make sure to set install: true [!46]
2020-03-15 19:53:47 +00:00
tpaul
085cf7b399 security/Makefile: add php-gnupg 2020-03-14 04:42:12 +00:00
tpaul
9227f22b3d security/php-gnupg: Import version 1.4.0
PHP module for interacting with gnupg.
https://www.php.net/manual/en/book.gnupg
2020-03-14 04:40:47 +00:00
wiz
e61340a309 tor-browser: update to 9.0.6
This version is now based on firefox68-esr and builds with the current
rust in pkgsrc.
2020-03-13 17:59:27 +00:00
wiz
9a8a7e8d91 libssh2: add upstream bug report 2020-03-12 17:46:22 +00:00
wiz
f78c83d35b libssh2: fix unportable test(1) operator in Makefile.in
Skip check for Makefile.am.
2020-03-12 17:28:10 +00:00
adam
5647e02927 py-asyncssh: updated to 2.2.0
Release 2.2.0

Added support for U2F/FIDO2 security keys, with the following capabilities:
ECDSA (NISTP256) and Ed25519 key algorithms
Key generation, including control over the application and user the key is associated with and whether touch is required when using the key
Certificate generation, both as a key being signed and a CA key
Resident keys, allowing security keys to be used on multiple machines without any information being stored outside of the key
Access to and management of keys loaded in an OpenSSH ssh-agent
Support for both user and host keys and certificates
Support for “no-touch-required” option in authorized_keys files
Support for “no-touch-required” option in OpenSSH certificates
Compatibility with security key support added in OpenSSH version 8.2
Added login timeout client option and limits on the length and number of banner lines AsyncSSH will accept prior to the SSH version header.
Improved load_keypairs() to read public key files, confirming that they are consistent with their associated private key when they are present.
Fixed issues in the SCP server related to handling filenames with spaces.
Fixed an issue with resuming reading after readuntil() returns an incomplete read.
Fixed a potential issue related to asyncio not reporting sockname/peername when a connection is closed immediately after it is opened.
Made SSHConnection a subclass of asyncio.Protocol to please type checkers.
2020-03-12 16:36:31 +00:00
nia
f1af7ca5d5 gnome-keyring-sharp: Remove - archived upstream, no users in pkgsrc 2020-03-12 16:34:05 +00:00
gdt
fc80f0fbe9 security/mozilla-rootcerts-openssl: Allow in-pkgsrc unprivileged install
This was marked NOT_FOR_UNPRIVILEGED, but that is only appropriate
when the package (abusively, as a pre-existing well-discussed
compromise) writes outside of the pkgsrc prefix.

Patch by Jason Bacon, with general approval on tech-pkg.

ok dholland@
2020-03-12 13:43:35 +00:00
wiz
c260006bda kpcli: depend on p5-Term-ReadLine
which is really p5-Term-ReadLine-Gnu

Bump PKGREVISION
2020-03-12 09:25:44 +00:00
wiz
a6f6163169 *: bump for vala 0.48.0 2020-03-11 09:53:51 +00:00
wiz
4e3b1b97c2 librsvg: update bl3.mk to remove libcroco in rust case
recursive bump for the dependency change
2020-03-10 22:08:37 +00:00
wiz
f669fda471 *: recursive bump for libffi 2020-03-08 16:47:24 +00:00
bsiegert
23f9d8e845 Revbump packages depending on libffi after .so version change.
Requested by Matthias Ferdinand and Oskar on pkgsrc-users.
2020-03-08 16:42:24 +00:00
adam
83e4bd8e52 py-gssapi: updated to 1.6.2
v1.6.2: Meyer (patch 2)

Changelog

Features
Provide wheels for python-3.8 on Windows

Documentation
Expand on documentation of cred stores
2020-03-07 12:13:41 +00:00
wiz
49b4ad653f security/Makefile: + rvault. 2020-03-05 09:49:24 +00:00
wiz
39bf680a7f security/rvault: import rvault-0.1
rvault is a secure and authenticated store for secrets (passwords,
keys, certificates) and small documents.  It uses envelope encryption
with one-time password (OTP) authentication.  The vault can be operated
as a file system in userspace.  It is written in C11 and distributed
under the 2-clause BSD license.

From rmind@
2020-03-05 09:49:09 +00:00
nia
21d6a58e81 security: Remove gpass, dead GNOME 2 app, fails with OpenSSL 1.1 2020-03-01 17:59:32 +00:00
nia
3fdc784b1e security: Remove mixminion - in alpha since 2007, fails with OpenSSL 1.1 2020-03-01 17:40:05 +00:00
nia
9cbd97290e security: Remove sign - fails with OpenSSL 1.1, no release since 2004 2020-03-01 17:35:29 +00:00
nia
20c87f0096 security: Remove stud - abandonware, fails to build with OpenSSL 1.1
From the README:
"Stud is now officially abandonware, thanks for playing."
2020-03-01 17:29:15 +00:00
nia
eae692c7f9 security: Remove sslwrap. Breaks with OpenSSL 1.1, no release since 2000 2020-03-01 17:25:25 +00:00
nia
f80c3dc41b security: Remove p5-OpenSSL. Broken with OpenSSL 1.1, dead upstream.
p5-Net-SSLeay seems more popular in Perl-land.
2020-03-01 17:22:55 +00:00
nia
946296e200 mbedtls: Update to 2.16.5
= mbed TLS 2.16.5 branch released 2020-02-20

Security
   * Fix potential memory overread when performing an ECDSA signature
     operation. The overread only happens with cryptographically low
     probability (of the order of 2^-n where n is the bitsize of the curve)
     unless the RNG is broken, and could result in information disclosure or
     denial of service (application crash or extra resource consumption).
     Found by Auke Zeilstra and Peter Schwabe, using static analysis.
   * To avoid a side channel vulnerability when parsing an RSA private key,
     read all the CRT parameters from the DER structure rather than
     reconstructing them. Found by Alejandro Cabrera Aldaya and Billy Bob
     Brumley. Reported and fix contributed by Jack Lloyd.
     ARMmbed/mbed-crypto#352

Bugfix
   * Fix an unchecked call to mbedtls_md() in the x509write module.
   * Fix a bug in mbedtls_pk_parse_key() that would cause it to accept some
     RSA keys that would later be rejected by functions expecting private
     keys. Found by Catena cyber using oss-fuzz (issue 20467).
   * Fix a bug in mbedtls_pk_parse_key() that would cause it to accept some
     RSA keys with invalid values by silently fixing those values.
2020-02-29 11:45:02 +00:00
wiz
31c3fbed83 scrypt: update to 1.3.0nb2.
Enable libscrypt-kdf.
Add bl3.mk file.
2020-02-28 11:19:53 +00:00
bsiegert
8db2ef453e Update py-ecdsa to 0.15.
Patch from Jonathan Schleifer via PR pkg/54883.

Contains a fix for broken signature verification.
2020-02-27 16:55:07 +00:00
leot
0fcc96d4be sqlmap: Update to 1.4.2
Unfortunately no changelog is provided by upstream.
2020-02-27 16:46:21 +00:00
nia
26391b653f keepassxc: Update to 2.5.3
## 2.5.3 (2020-01-19)

### Fixed

- Fix a possible database lockout when removing a YubiKey from a KDBX 3.1 database [#4147]
- Fix crash if Auto-Type is performed on a new entry [#4150]
- Fix crash when all entries are deleted from a group [#4156]
- Improve the reliability of clipboard clearing on Gnome [#4165]
- Do not check cmd:// URLs for valid URL syntax anymore [#4172]
- Prevent unnecessary merges for databases on network shares [#4153]
- Browser: Prevent native messaging proxy from blocking application shutdown [#4155]
- Browser: Improve website URL matching [#4134, #4177]

### Added

- Browser: Enable support for Chromium-based Edge Browser [#3359]
2020-02-26 16:07:38 +00:00
nia
2286520adf keepass: Update to 2.44
Changes from 2.43 to 2.44:

   New Features:
     * Added option 'Use file transactions for writing [22]configuration
       settings' (turned on by default).
     * If the option 'Do not store data in the Windows clipboard history
       and the cloud clipboard' is turned on (which it is by default),
       KeePass now additionally excludes its clipboard contents from
       processing by Windows' internal ClipboardMonitor component.
     * Added commands to find database files ('File' -> 'Open' -> 'Find
       Files' and 'Find Files (In Folder)').
     * Added 'Edit' menu in the [23]internal text editor (including new
       'Select All' and 'Find' commands with keyboard shortcuts).
     * Added keyboard shortcuts for formatting commands in the internal
       text editor.
     * Added 'Cancel' button in the save confirmation dialog of the
       internal text editor.
     * Added {CLIPBOARD} and {CLIPBOARD-SET:/T/} [24]placeholders, which
       get/set the clipboard content.
     * Added support for [25]importing True Key 4 CSV files.
     * Added command line options for adding/removing scheme-specific URL
       overrides.
     * Added an auto-type event for [26]plugins.
     * When loading a plugin on a Unix-like system fails, the error
       message now includes a hint that the 'mono-complete' package may be
       required.
     * In order to avoid a Windows Input Method Editor (IME) bug
       (resulting in a black screen and/or an IME/CTF process with high
       CPU usage), KeePass now disables the IME on [27]secure desktops.

   Improvements:
     * [28]Auto-Type: improved compatibility with VMware Workstation.
     * Auto-Type into virtual machines: improved compatibility with
       certain guest systems.
     * The option to use the 'Clipboard Viewer Ignore' clipboard format is
       now turned on by default.
     * Improved menu/toolbar item state updating in the internal text
       editor.
     * Improved performance of Spr compilations.
     * Before writing a local configuration file whose path has been
       specified using the '-cfg-local:' [29]command line parameter,
       KeePass now tries to create the parent directory, if it does not
       exist yet.
     * Improved conversion of file URIs to local file paths.
     * Improved compatibility of the list view dialog with plugins.
     * If ChaCha20 is selected as file [30]encryption algorithm, the
       database is now saved in the [31]KDBX 4 format (thanks to
       [32]AMOSSYS).
     * Minor [33]process memory protection improvements.
     * HTML export/printing: KeePass now generates HTML 5 documents
       (instead of XHTML 1.0 documents).
     * HTML export/printing: improved internal CSS.
     * HTML exports do not contain temporary content identifiers anymore.
     * XSL files: HTML output now conforms to HTML 5 instead of XHTML 1.0.
     * XSL files: improved internal CSS.
     * CHM pages are now rendered in the highest standards mode supported
       by Internet Explorer (EdgeHTML mode).
     * Migrated most of the documentation from XHTML 1.0 to HTML 5.
     * Various code optimizations.
     * Minor other improvements.

   Bugfixes:
     * In the internal text editor, the 'Delete' command does not reset
       RTF text formattings anymore.
     * The [34]KeyCreationFlags bit 2^19 (for hiding the passwords) now
       works as intended.
2020-02-26 15:26:05 +00:00
adam
9708037fda py-cryptodome: updated to 3.9.7
3.9.7:
* Make notarization possible again on OS X when using wheels.
2020-02-22 06:50:56 +00:00
rillig
6e1f56ae31 security/heimdal: add back MAKE_JOBS_SAFE=no 2020-02-20 21:01:09 +00:00
nia
c974b78558 mbedtls: Update to 2.16.4
Security
   * Fix side channel vulnerability in ECDSA. Our bignum implementation is not
     constant time/constant trace, so side channel attacks can retrieve the
     blinded value, factor it (as it is smaller than RSA keys and not guaranteed
     to have only large prime factors), and then, by brute force, recover the
     key. Reported by Alejandro Cabrera Aldaya and Billy Brumley.
   * Zeroize local variables in mbedtls_internal_aes_encrypt() and
     mbedtls_internal_aes_decrypt() before exiting the function. The value of
     these variables can be used to recover the last round key. To follow best
     practice and to limit the impact of buffer overread vulnerabilities (like
     Heartbleed) we need to zeroize them before exiting the function.
     Issue reported by Tuba Yavuz, Farhaan Fowze, Ken (Yihang) Bai,
     Grant Hernandez, and Kevin Butler (University of Florida) and
     Dave Tian (Purdue University).
   * Fix side channel vulnerability in ECDSA key generation. Obtaining precise
     timings on the comparison in the key generation enabled the attacker to
     learn leading bits of the ephemeral key used during ECDSA signatures and to
     recover the private key. Reported by Jeremy Dubeuf.
   * Catch failure of AES functions in mbedtls_ctr_drbg_random(). Uncaught
     failures could happen with alternative implementations of AES. Bug
     reported and fix proposed by Johan Uppman Bruce and Christoffer Lauri,
     Sectra.

Bugfix
   * Remove redundant line for getting the bitlen of a bignum, since the variable
     holding the returned value is overwritten a line after.
     Found by irwir in #2377.
   * Support mbedtls_hmac_drbg_set_entropy_len() and
     mbedtls_ctr_drbg_set_entropy_len() before the DRBG is seeded. Before,
     the initial seeding always reset the entropy length to the compile-time
     default.

Changes
   * Add unit tests for AES-GCM when called through mbedtls_cipher_auth_xxx()
     from the cipher abstraction layer. Fixes #2198.
   * Clarify how the interface of the CTR_DRBG and HMAC modules relates to
     NIST SP 800-90A. In particular CTR_DRBG requires an explicit nonce
     to achieve a 256-bit strength if MBEDTLS_ENTROPY_FORCE_SHA256 is set.
2020-02-20 15:27:31 +00:00
adam
800ea77142 py-acme py-certbot: updated to 1.2.0
1.2.0:

Added
Added support for Cloudflare's limited-scope API Tokens
Added support for $hostname in nginx server_name directive

Changed
Add directory field to error message when field is missing.
If MD5 hasher is not available, try it in non-security mode (fix for FIPS systems)
Disable old SSL versions and ciphersuites and remove SSLCompression off setting to follow Mozilla recommendations in Apache.
Remove ECDHE-RSA-AES128-SHA from NGINX ciphers list now that Windows 2008 R2 and Windows 7 are EOLed
Support for Python 3.4 has been removed.

Fixed
Fix collections.abc imports for Python 3.9.
More details about these changes can be found on our GitHub repo.


1.1.0:

Changed
Removed the fallback introduced with 0.34.0 in acme to retry a POST-as-GET request as a GET request when the targeted ACME CA server seems to not support POST-as-GET requests.
certbot-auto no longer supports architectures other than x86_64 on RHEL 6 based systems. Existing certbot-auto installations affected by this will continue to work, but they will no longer receive updates. To install a newer version of Certbot on these systems, you should update your OS.
Support for Python 3.4 in Certbot and its ACME library is deprecated and will be removed in the next release of Certbot. certbot-auto users on x86_64 systems running RHEL 6 or derivatives will be asked to enable Software Collections (SCL) repository so Python 3.6 can be installed. certbot-auto can enable the SCL repo for you on CentOS 6 while users on other RHEL 6 based systems will be asked to do this manually.
2020-02-16 20:23:26 +00:00
adam
c4b63fcd27 py-google-auth: updated to 1.11.2
1.11.2:
Reverts
Revert "fix: update _GOOGLE_OAUTH2_CERTS_URL"

1.11.1:
Bug Fixes
compute engine id token credentials "with_target_audience" method
update _GOOGLE_OAUTH2_CERTS_URL
2020-02-16 14:33:30 +00:00
taca
2a4e61d1ed security/clamav: update to 0.102.2
Update clamav to 0.102.2.

## 0.102.2

ClamAV 0.102.2 is a bug patch release to address the following issues.

- [CVE-2020-3123](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3123):
  An Denial-of-Service (DoS) condition may occur when using the optional credit
  card data-loss-prevention (DLP) feature. Improper bounds checking of an
  unsigned variable resulted in an out-of-bounds read which causes a crash.

- Significantly improved scan speed of PDF files on Windows.

- Re-applied a fix to alleviate file access issues when scanning RAR files in
  downstream projects that use libclamav where the scanning engine is operating
  in a low-privelege process. This bug was originally fixed in 0.101.2 and the
  fix was mistakenly omitted from 0.102.0.

- Fixed an issue wherein freshclam failed to update if the database version
  downloaded is 1 version older than advertised. This situation may occur after
  a new database version is published. The issue affected users downloading the
  whole CVD database file.

- Changed the default freshclam ReceiveTimeout setting to 0 (infinite).
  The ReceiveTimeout had caused needless database update failures for users with
  slower internet connections.

- Correctly display number of kilobytes (KiB) in progress bar and reduced the
  size of the progress bar to accomodate 80-char width terminals.

- Fixed an issue where running freshclam manually causes a daemonized freshclam
  process to fail when it updates because the manual instance deletes the
  temporary download directory. Freshclam temporary files will now download to a
  unique directory created at the time of an update instead of using a hardcoded
  directory created/destroyed at the program start/exit.

- Fix for Freshclam's OnOutdatedExecute config option.

- Fixes a memory leak in the error condition handling for the email parser.

- Improved bound checking and error handling in ARJ archive parser.

- Improved error handling in PDF parser.

- Fix for memory leak in byte-compare signature handler.

- Updates to the unit test suite to support libcheck 0.13.

- Updates to support autoconf 2.69 and automake 1.15.

Special thanks to the following for code contributions and bug reports:

- Antoine Deschênes
- Eric Lindblad
- Gianluigi Tiesi
- Tuomo Soini
2020-02-15 02:40:43 +00:00
rillig
3f99d243b9 security/heimdal: remove MAKE_JOBS_SAFE=no
Heimdal built fine on NetBSD-8.0-x86_64 with MAKE_JOBS=7.
2020-02-13 21:12:21 +00:00
rillig
e636a00e3c security/heimdal: disable check for unknown GNU configure options
Heimdal has bundled libreadline, which has its own configure file with
completely different options.
2020-02-13 21:04:25 +00:00
jperkin
bdc0eb23c9 openssl: Spell x86_64 correctly. 2020-02-12 19:49:23 +00:00
rillig
f64e0028f3 security/openssl: fix the recent fix for building on Solaris and HP-UX 2020-02-12 15:14:57 +00:00
rillig
8b4fff4dbe security/openssl: fix build on Solaris
This fixes PR pkg/54894.
2020-02-11 17:23:11 +00:00
jperkin
15c21264dd openssl: Handle i386 SunOS.
The OpenSSL config script isn't clever enough to detect multiarch platforms so
we need to manually specify the host OS.
2020-02-11 09:58:50 +00:00
he
83e17370ba Update opendnssec2 to version 2.1.6.
Upstream changes:

OpenDNSSEC 2.1.6 - 2020-02-11:

* OPENDNSSEC-913: verify database connection upon every use.
* OPENDNSSEC-944: bad display of date of next transition (regression)
* SUPPORT-250: missing signatures on using combined keys (CSK)
* OPENDNSSEC-945: memory leak per command to enforcer.
* OPENDNSSEC-946: unclean enforcer exit in case of certain config
  problems.
* OPENDNSSEC-411: set-policy command to change policy of zone
  (experimental).  Requestes explicit enforce command to take effect.
2020-02-11 08:00:57 +00:00
leot
9443440ac1 security: Add snallygaster 2020-02-10 14:06:03 +00:00
leot
7351db73e4 snallygaster: Import snallygaster-0.0.4 as security/snallygaster
snallygaster is a tool that looks for files accessible on web servers that
shouldn't be public and can pose a security risk.

Typical examples include publicly accessible git repositories, backup files
potentially containing passwords or database dumps. In addition it contains a
few checks for other security vulnerabilities.
2020-02-10 14:05:36 +00:00
adam
1967939dda libgpg-error: updated to 1.37
Noteworthy changes in version 1.37:
* Fixes a build problems when using Gawk 5.0
* Fixes Bourne shell incompatibilities on Solaris.
* Improves cross-comiling support.
* On Windows strerror_s is now used to emulate strerror_r.
* New error codes to map SQLite primary error codes.
* Now uses poll(2) instead of select(2) in gpgrt_poll if possible.
* Fixes a bug in gpgrt_close.
* Fixes build problem under Cygwin.
* Fixes a few minor portability bugs.
2020-02-10 08:35:12 +00:00
wiz
91959cf377 libsecret: update to 0.20.1.
0.20.1
 * Build fixes [!45]
2020-02-09 13:59:43 +00:00
wiz
23282680f5 gnutls: update to 3.6.12.
* Version 3.6.12 (released 2020-02-01)

** libgnutls: Introduced TLS session flag (gnutls_session_get_flags())
   to identify sessions that client request OCSP status request (#829).

** libgnutls: Added support for X448 key exchange (RFC 7748) and Ed448
   signature algorithm (RFC 8032) under TLS (#86).

** libgnutls: Added the default-priority-string option to system configuration;
   it allows overriding the compiled-in default-priority-string.

** libgnutls: Added support for GOST CNT_IMIT ciphersuite (as defined by
   draft-smyshlyaev-tls12-gost-suites-07).
   By default this ciphersuite is disabled. It can be enabled by adding
   +GOST to priority string. In the future this priority string may enable
   other GOST ciphersuites as well.  Note, that server will fail to negotiate
   GOST ciphersuites if TLS 1.3 is enabled both on a server and a client. It
   is recommended for now to disable TLS 1.3 in setups where GOST ciphersuites
   are enabled on GnuTLS-based servers.

** libgnutls: added priority shortcuts for different GOST categories like
   CIPHER-GOST-ALL, MAC-GOST-ALL, KX-GOST-ALL, SIGN-GOST-ALL, GROUP-GOST-ALL.

** libgnutls: Reject certificates with invalid time fields. That is we reject
   certificates with invalid characters in Time fields, or invalid time formatting
   To continue accepting the invalid form compile with --disable-strict-der-time
   (#207, #870).

** libgnutls: Reject certificates which contain duplicate extensions. We were
   previously printing warnings when printing such a certificate, but that is
   not always sufficient to flag such certificates as invalid. Instead we now
   refuse to import them (#887).

** libgnutls: If a CA is found in the trusted list, check in addition to
   time validity, whether the algorithms comply to the expected level prior
   to accepting it. This addresses the problem of accepting CAs which would
   have been marked as insecure otherwise (#877).

** libgnutls: The min-verification-profile from system configuration applies
   for all certificate verifications, not only under TLS. The configuration can
   be overriden using the GNUTLS_SYSTEM_PRIORITY_FILE environment variable.

** libgnutls: The stapled OCSP certificate verification adheres to the convention
   used throughout the library of setting the 'GNUTLS_CERT_INVALID' flag.

** libgnutls: On client side only send OCSP staples if they have been requested
   by the server, and on server side always advertise that we support OCSP stapling
   (#876).

** libgnutls: Introduced the gnutls_ocsp_req_const_t which is compatible
   with gnutls_ocsp_req_t but const.

** certtool: Added the --verify-profile option to set a certificate
   verification profile. Use '--verify-profile low' for certificate verification
   to apply the 'NORMAL' verification profile.

** certtool: The add_extension template option is considered even when generating
   a certificate from a certificate request.

** API and ABI modifications:
GNUTLS_SFLAGS_CLI_REQUESTED_OCSP: Added
GNUTLS_SFLAGS_SERV_REQUESTED_OCSP: Added
gnutls_ocsp_req_const_t: Added
2020-02-09 13:56:28 +00:00
rillig
f094fd5e50 security/libtasn1: remove unknown configure options
The package does not mention the word "packager" anymore.
2020-02-08 23:57:51 +00:00
nia
9bf183a541 qca2: Update HOMEPAGE 2020-02-08 16:58:08 +00:00
rillig
5a1bf3b381 security/pscan: fix pkglint warnings 2020-02-04 17:25:59 +00:00
rillig
343f595122 security/pscan: update HOMEPAGE, document MASTER_SITES 2020-02-04 17:22:06 +00:00
adam
3088e7d397 py-josepy: updated to 1.3.0
1.3.0:
* Deprecated support for Python 3.4.
* Officially add support for Python 3.8.
2020-02-04 16:36:53 +00:00
fox
513df21203 security/wolfssl: Updates the comment on mutex test failure.
Adds the version of -current where the tests have been fixed.
2020-02-04 11:47:31 +00:00
adam
7aea70d098 py-cryptodome: updated to 3.9.6
3.9.6:

Resolved issues
* Fix building of wheels for OSX by explicitly setting `sysroot` location.


3.9.5:

Resolved issues
* RSA OAEP decryption was not verifying that all ``PS`` bytes are zero.
* GH-372: fixed memory leak for operations that use memoryviews when `cffi` is not installed.
* Fixed wrong ASN.1 OID for HMAC-SHA512 in PBE2.

New features
* Updated Wycheproof test vectors to version 0.8r12.
2020-02-04 09:36:21 +00:00
fox
b579bbadd2 Added wolfssl to Makefile SUBDIRs 2020-02-03 23:05:10 +00:00
fox
4f0734454b Import of wolfssl v4.3.0 as security/woflssl
WolfSSL is an embedded SSL Library for programmers building security
functionality into their applications and devices.
2020-02-03 23:04:09 +00:00
bsiegert
d2899c876c Re-add a package for go-crypto-acme.
The acme package has a dependency on go-net but go-net depends on
go-crypto. Separate it out to prevent a circular dependency.
2020-02-03 14:51:55 +00:00
bsiegert
92eccf2d3b Update go-crypto to 0.0.20200122.
In addition to about two years of changes, this contains notably the
following security fix:

	When int is 32 bits wide (on 32-bit architectures like 386 and arm), an
	overflow could occur, causing a panic, due to malformed ASN.1 being
	passed to any of the ASN1 methods of String.

	Tested on linux/386 and darwin/amd64.

	This fixes CVE-2020-7919 and was found thanks to the Project Wycheproof
	test vectors.

pkgsrc changes:
Once again, the acme subdirectory was removed as it introduces a circular
dependency with go-net.

Prodded several times by ng0@
2020-02-03 13:14:20 +00:00
kim
99c26d1794 Update to sudo 1.8.31
What's new:

* Fixed CVE-2019-18634, a buffer overflow when the "pwfeedback"
  sudoers option is enabled on systems with uni-directional pipes.

* The "sudoedit_checkdir" option now treats a user-owned directory
  as writable, even if it does not have the write bit set at the
  time of check.  Symbolic links will no longer be followed by
  sudoedit in any user-owned directory.  Bug #912

* Fixed sudoedit on macOS 10.15 and above where the root file system
  is mounted read-only.  Bug #913.

* Fixed a crash introduced in sudo 1.8.30 when suspending sudo
  at the password prompt.  Bug #914.

* Fixed compilation on systems where the mmap MAP_ANON flag
  is not available.  Bug #915.
2020-02-03 07:47:55 +00:00
bsiegert
f6baaa9181 Revbump all Go packages after go113 update. 2020-02-02 14:18:56 +00:00
markd
4e7d1c6199 kwalletmanager: update kde release service to 19.12.1
builds with qt 5.14, other changes unknown.
2020-02-02 03:04:19 +00:00
he
562314c87c Disable the configure check for GOST, don't use built-in sqlite3.
RFC 8624 says "MUST NOT" for signing and "MAY" for sig-checking.
The sqlite3 change is related to the OpenDNSSEC v2 change, to be
consistent with the choice there.

PKGREVISION bumped.
2020-01-31 19:13:07 +00:00
he
87b56a8f0b Insist on using pkgsrc sqlite3; I got SEGV's via call of null pointers
with the built-in sqlite3 on NetBSD 8.0.
Bump PKGREVISION.
2020-01-31 16:08:48 +00:00
wiz
b1c8a7f93d tor-browser: mark BROKEN, needs rust fixes or update. 2020-01-31 11:45:03 +00:00
triaxx
0e4df1dec7 sudo: update master site
TW Aren FTP server seems down and the fetching step hangs for hours.
2020-01-30 21:07:59 +00:00
triaxx
bc20954e21 openpam: fix PR pkg/54907
pkgsrc changes:
---------------
  - Add -lcript to pam_unix.so
  - Bump revision
2020-01-30 11:17:05 +00:00
jaapb
5e6d86a9b2 Added conversion to dune to security/ocaml-safepass
Project still uses jbuilder, so just run a dune upgrade before
building. No upstream changes.
2020-01-29 16:33:18 +00:00
markd
bcc5c0aea3 kf5: update to frameworks 5.66
build with qt5 5.14

All frameworks
  Port from QRegExp to QRegularExpression
  Port from qrand to QRandomGenerator
  Fix compilation with Qt 5.15 (e.g. endl is now Qt::endl,
   QHash insertMulti now requires using QMultiHash...)

Attica
  Don't use a verified nullptr as a data source
  Support multiple children elements in comment elements
  Set a proper agent string for Attica requests

Baloo
  Correctly report if baloo_file is unavailable
  Check cursor_open return value
  Initialise QML monitor values
  Move URL parsing methods from kioslave to query object

Breeze Icons
  Change XHTML icon to be a purple HTML icon
  Merge headphones and zigzag in the center
  Add application/x-audacity-project icon
  Add 32px preferences-system
  Add application/vnd.apple.pkpass icon
  icon for ktimetracker using the PNG in the app repo, to be replaced
  with real breeze SVG
  add kipi icon, needs redone as a breeze theme svg [or just kill off kipi]

Extra CMake Modules
  [android] Fix apk install target
  Support PyQt5 compiled with SIP 5

Framework Integration
  Remove ColorSchemeFilter from KStyle

KDE Doxygen Tools
  Display fully qualified class/namespace name as page header

KCalendarCore
  Improve README.md to have an Introduction section
  Make incidence geographic coordinate also accessible as a property
  Fix RRULE generation for timezones

KCMUtils
  Deprecate KCModuleContainer

KCodecs
  Fix invalid cast to enum by changing the type to int rather than enum

KCompletion
  Deprecate KPixmapProvider
  [KHistoryComboBox] Add method to set an icon provider

KConfig
  kconfig EBN transport protocol cleanup
  Expose getter to KConfigWatcher's config
  Fix writeFlags with KConfigCompilerSignallingItem
  Add a comment pointing to the history of Cut and Delete sharing a shortcut

KConfigWidgets
  Rename "Configure Shortcuts" to "Configure Keyboard Shortcuts"

KContacts
  Align ECM and Qt setup with Frameworks conventions
  Specify ECM dependency version as in any other framework

KCoreAddons
  Add KPluginMetaData::supportsMimeType
  [KAutoSaveFile] Use QUrl::path() instead of toLocalFile()
  Unbreak build w/ PROCSTAT: add missing impl. of KProcessList::processInfo
  [KProcessList] Optimize KProcessList::processInfo
  [KAutoSaveFile] Improve the comment in tempFileName()
  Fix KAutoSaveFile broken on long path

KDeclarative
  [KeySequenceHelper] Grab actual window when embedded
  Add optional subtitle to grid delegate
  [QImageItem/QPixmapItem] Don't lose precision during calculation

KFileMetaData
  Partial fix for accentuated characters in file name on Windows
  Remove unrequired private declarations for taglibextractor
  Partial solution to accept accentuated characters on windows
  xattr: fix crash on dangling symlinks

KIconThemes
  Set breeze as default theme when reading from configuration file
  Deprecate the top-level IconSize() function
  Fix centering scaled icons on high dpi pixmaps

KImageFormats
  pic: Fix Invalid-enum-value undefined behaviour

KIO
  [KFilePlacesModel] Fix supported scheme check for devices
  Embed protocol data also for Windows version of trash ioslave
  Adding support for mounting KIOFuse URLs for applications that don't use KIO
  Add truncation support to FileJob
  Deprecate KUrlPixmapProvider
  Deprecate KFileWidget::toolBar
  [KUrlNavigator] Add RPM support to krarc:
  KFilePlaceEditDialog: fix crash when editing the Trash place
  Add button to open the folder in filelight to view more details
  Show more details in warning dialog shown before starting a
  privileged operation
  KDirOperator: Use a fixed line height for scroll speed
  Additional fields such as deletion time and original path are now
  shown in the file properties dialog
  KFilePlacesModel: properly parent tagsLister to avoid memleak.
  HTTP ioslave: call correct base class in virtual_hook(). The
  base of HTTP ioslave is TCPSlaveBase, not SlaveBase
  Ftp ioslave: fix 4 character time interpreted as year
  Re-add KDirOperator::keyPressEvent to preserve BC
  Use QStyle for determining icon sizes

Kirigami
  ActionToolBar: Only show the overflow button if there are visible
  items in the menu
  Don't build and install app templates on android
  Don't hardcode the margin of the CardsListView
  Add support for custom display components to Action
  Let the other components grow if there's more things on the header
  Remove dynamic item creation in DefaultListItemBackground
  reintroduce the collapse button
  Show application window icon on AboutPage

KItemModels
  Add KColumnHeadersModel

KJS
  Added tests for Math.exp()
  Added tests for various assignment operators
  Test special cases of multiplicate operators (*, / and %)

KNewStuff
  Ensure the dialog title is correct with an uninitialised engine
  Don't show the info icon on the big preview delegate
  Support archive installs with adoption commands
  Send along the config name with requests

KPeople
  Expose enum to the metaobject compiler

KQuickCharts
  Also correct the shader header files
  Correct license headers for shaders

KService
  Deprecate KServiceTypeProfile

KTextEditor
  Add "line-count" property to the ConfigInterface
  Avoid unwanted horizontal scrolling

KWayland
  [plasmashell] Update docs for panelTakesFocus to make it generic
  [plasmashell] Add signal for panelTakesFocus changing

KXMLGUI
  KActionCollection: provide a changed() signal as a replacement for removed()
  Adjust keyboard shortcut configuration window's title

NetworkManagerQt
  Manager: add support for AddAndActivateConnection2
  cmake: Consider NM headers as system includes
  Sync Utils::securityIsValid with NetworkManager

Plasma Framework
  [ToolTip] Round position
  Enable wheel events on Slider {}
  Sync QWindow flag WindowDoesNotAcceptFocus to wayland plasmashell interface
  [calendar] Check out of bounds array access in QLocale lookup
  [Plasma Dialog] Use QXcbWindowFunctions for setting window types Qt
  WindowFlags doesn't know
  [PC3] Complete plasma progress bar animation
  [PC3] Only show progress bar indicator when the ends won't overlap
  [RFC] Fix Display Configuration icon margins
  [ColorScope] Work with plain QObjects again
  [Breeze Desktop Theme] Add monochrome user-desktop icon
  Remove default width from PlasmaComponents3.Button
  [PC3 ToolButton] Have the label take into account complementary color schemes
  Added background colors to active and inactive icon view

QQC2StyleBridge
  [ToolTip] Round position
  Update size hint when font changes

Solid
  Display first / in mounted storage access description
  Ensure mounted nfs filesystems matches their fstab declared counterpart

Sonnet
  The signal done is deprecated in favour of spellCheckDone, now correctly emitted

Syntax Highlighting
  LaTeX: fix brackets in some commands
  TypeScript: add "bigint" primitive type
  Python: improve numbers, add octals, binaries and "breakpoint" keyword
  SELinux: add "glblub" keyword and update permissions list
  Several enhancements to gitolite syntax definition
2020-01-29 11:49:22 +00:00
triaxx
150c7110ec openssl: fix PR pkg/54890
pkgsrc changes:
---------------
  * Make the BUILDLINK_API_DEPENDS of builtin.mk match the one of
    buildlink3.mk.
2020-01-28 07:34:57 +00:00
pho
6bcf164b69 Add missing dependency on converters/base64 2020-01-27 12:56:38 +00:00
rillig
9637f7852e all: migrate homepages from http to https
pkglint -r --network --only "migrate"

As a side-effect of migrating the homepages, pkglint also fixed a few
indentations in unrelated lines. These and the new homepages have been
checked manually.
2020-01-26 17:30:40 +00:00
adam
e9643d1560 py-google-auth: updated to 1.11.0
1.11.0:
Features
add non-None default timeout to AuthorizedSession.request()
distinguish transport and execution time timeouts
2020-01-25 12:49:12 +00:00
jperkin
982c63fe94 *: Remove obsolete BUILDLINK_API_DEPENDS.openssl. 2020-01-25 10:45:10 +00:00
adam
2021229dac py-google-auth: updated to 1.10.2
1.10.2:
Bug Fixes
make collections import compatible across Python versions
2020-01-22 19:32:43 +00:00
adam
8c4cf510d6 py-trustme: updated to 0.6.0
0.6.0:
Features
Allow specifying organization and organization unit in CA and issued certs.
2020-01-22 19:20:32 +00:00
nia
136703252d libsecret: Update for 0.20.0
Needed for updating epiphany.

0.20.0
 * secret-backend: New interface to represent password storage backend [!34]
 * secret-backend: Add local-storage backend [!6]
 * item: Port to GTask [!43]
 * Build fixes [!34, !37, !38, !40, !41, !42, ...]
 * Updated translations

0.19.1
 * service: Fix secret_service_ensure_session_finish error propagation [!36]

0.19.0
 * secret-password: Add necessary functions to migrate from D-Bus based API [!32]
 * egg: Request that secure memory not be dumped to disk [!30]
 * Add version macros [!29]
 * Add missing GType to flags in .gir [!16, !19]
 * paths: Port from GSimpleAsyncResult to GTask [!26]
 * build: Bump meson_version to 0.50 [!18, !35]
 * Build and test fixes [!15, !20, !21, !23, !33, ...]
2020-01-21 14:04:16 +00:00
jperkin
e0bbb4d5f1 openssl: Explicitly disable afalgeng for now.
This is only supported in certain Linux configurations, so will need proper
PLIST logic if it is to be properly handled as an option.  Fixes EL7.
2020-01-20 17:42:53 +00:00
taca
3bd0c2503e security/Makefile: add and enable ruby-gssapi 2020-01-19 14:23:55 +00:00
taca
e89672a144 security/ruby-gssapi: add version 1.3.0 package
Add ruby-gssapi version 1.3.0 package.


Ruby GSSAPI Library

This is a wrapper around the system GSSAPI library (MIT only at this time).
It exposes the low-level GSSAPI methods like gss_init_sec_context and
gss_wrap and also provides an easier to use wrapper on top of this for
common usage scenarios.
2020-01-19 14:23:13 +00:00
taca
cb59c211d0 security/Makefile: add and enable ruby-ed25519 2020-01-19 14:21:25 +00:00
taca
c10aa30521 security/ruby-ed25519: add version 1.2.4 package
Add ruby-ed25519 version 1.2.4 package.


# ed25519.rb

A Ruby binding to the Ed25519 elliptic curve public-key signature system
described in [RFC 8032].

Two implementations are provided: a MRI C extension which uses the "ref10"
implementation from the SUPERCOP benchmark suite, and a pure Java version
based on [str4d/ed25519-java].

Ed25519 is one of two notable algorithms implemented atop the Curve25519
elliptic curve. The [x25519 gem] is a related project of this one,
and implements the X25519 Diffie-Hellman key exchange algorithm on the
Montgomery form of Curve25519.

[RFC 8032]: https://tools.ietf.org/html/rfc8032
[str4d/ed25519-java]: https://github.com/str4d/ed25519-java
[x25519 gem]: https://github.com/crypto-rb/x25519
2020-01-19 14:20:38 +00:00
pho
87e3139b27 Add hs-hackage-security 2020-01-19 01:55:24 +00:00
pho
3505ea90b1 Import hackage-security-0.6.0.0
The hackage security library provides both server and client utilities
for securing the Hackage package server
(http://hackage.haskell.org/). It is based on The Update Framework
(http://theupdateframework.com/), a set of recommendations developed
by security researchers at various universities in the US as well as
developers on the Tor project (https://www.torproject.org/).

The current implementation supports only index signing, thereby
enabling untrusted mirrors. It does not yet provide facilities for
author package signing.
2020-01-19 01:54:46 +00:00
nia
8ce0bd3041 snow: Update to 20130616
2013-06-16 Matthew Kwan <mkwan@darkside.com.au>
 - compress.c: Fixed some fprintf format warnings.
 - Makefile: Added new compile flags.
2020-01-19 00:26:18 +00:00
rillig
b686dd9180 all: migrate several HOMEPAGEs to https
pkglint --only "https instead of http" -r -F

With manual adjustments afterwards since pkglint 19.4.4 fixed a few
indentations in unrelated lines.

This mainly affects projects hosted at SourceForce, as well as
freedesktop.org, CTAN and GNU.
2020-01-18 23:30:43 +00:00
pho
07901a377b Add hs-ed25519 2020-01-18 23:30:42 +00:00
pho
82d0100c0b Import ed25519-0.0.5.0
This package provides a simple, fast, self-contained copy of the
Ed25519 public-key signature system with a clean interface. It also
includes support for detached signatures, and thorough documentation
on the design and implementation, including usage guidelines.
2020-01-18 23:30:04 +00:00
jperkin
26c1bffc9f *: Recursive revision bump for openssl 1.1.1. 2020-01-18 21:48:19 +00:00
jperkin
b3027144f7 rainbowcrack: Missed last USE_OLD_DES_API removal. 2020-01-18 20:18:16 +00:00
pho
17bff0d900 Add hs-cryptohash-sha256 2020-01-18 15:26:22 +00:00
pho
9630eff194 Import cryptohash-sha256-0.11.101.0
A practical incremental and one-pass, pure API to the SHA-256
cryptographic hash algorithm according to FIPS 180-4 with performance
close to the fastest implementations available in other languages.
2020-01-18 15:25:43 +00:00
pho
1477700997 Add hs-SHA 2020-01-17 15:26:16 +00:00
pho
5e30b4a0d1 Import SHA-1.6.4.4 from wip
This library implements the SHA suite of message digest functions,
according to NIST FIPS 180-2 (with the SHA-224 addendum), as well as
the SHA-based HMAC routines. The functions have been tested against
most of the NIST and RFC test vectors for the various functions. While
some attention has been paid to performance, these do not presently
reach the speed of well-tuned libraries, like OpenSSL.
2020-01-17 15:25:41 +00:00
pho
011350cb52 Add hs-x509-system 2020-01-17 14:41:38 +00:00
pho
1ed3a33443 Import x509-system-1.6.6
System X.509 root CA storage handling
2020-01-17 14:40:51 +00:00
pho
0da19f13ed Add hs-tls 2020-01-17 13:38:35 +00:00
pho
9052765fac Import tls-1.5.3
Native Haskell TLS and SSL protocol implementation for server and
client.

This provides a high-level implementation of a sensitive security
protocol, eliminating a common set of security issues through the use
of the advanced type system, high level constructions and common
Haskell features.

Currently implement the SSL3.0, TLS1.0, TLS1.1, TLS1.2 and TLS 1.3
protocol, and support RSA and Ephemeral (Elliptic curve and regular)
Diffie Hellman key exchanges, and many extensions.
2020-01-17 13:38:00 +00:00
pho
7b1785d533 Add hs-x509-validation 2020-01-17 13:07:15 +00:00
pho
6258b29e5d Import x509-validation-1.6.11
X.509 Certificate checks and validations routines.

Follows RFC5280 / RFC6818.
2020-01-17 13:06:38 +00:00
pho
ebebf5ed99 Add hs-x509-store 2020-01-17 12:41:24 +00:00
pho
4416023a60 Import x509-store-1.6.7
X.509 collection accessing and storing methods for certificate, crl,
exception list.
2020-01-17 12:40:40 +00:00
pho
1f8527d038 Add hs-x509 2020-01-17 00:54:04 +00:00
pho
f9216d86f6 Import x509-1.7.5
Read/Write X509 Certificate, CRL and their signed equivalents.

Follows RFC5280 / RFC6818
2020-01-17 00:53:30 +00:00
pho
072afaf575 Add hs-pem 2020-01-17 00:44:53 +00:00
pho
5f0a05fd07 Import pem-0.2.4
Privacy Enhanced Mail (PEM) format reader and writer.
2020-01-17 00:44:22 +00:00
pho
57225c02cc Add hs-cryptonite 2020-01-17 00:18:07 +00:00
pho
3b796d59b2 Import cryptonite-0.26
A repository of cryptographic primitives.

* Symmetric ciphers: AES, DES, 3DES, CAST5, Blowfish, Twofish,
  Camellia, RC4, Salsa, XSalsa, ChaCha.

* Hash: SHA1, SHA2, SHA3, SHAKE, MD2, MD4, MD5, Keccak, Skein, Ripemd,
  Tiger, Whirlpool, Blake2

* MAC: HMAC, KMAC, Poly1305

* Asymmetric crypto: DSA, RSA, DH, ECDH, ECDSA, ECC, Curve25519,
  Curve448, Ed25519, Ed448

* Key Derivation Function: PBKDF2, Scrypt, HKDF, Argon2, BCrypt,
  BCryptPBKDF

* Cryptographic Random generation: System Entropy, Deterministic
  Random Generator

* Data related: Anti-Forensic Information Splitter (AFIS)

If anything cryptographic related is missing from here, submit a pull
request to have it added. This package strive to be a cryptographic
kitchen sink that provides cryptography for everyone.
2020-01-17 00:17:32 +00:00
wiz
80e3e55259 openssl: rc5 patents expired some years ago
Remove its LICENSE line and enable rc5 option by default.
Bump PKGREVISION.
2020-01-16 22:45:45 +00:00
wiz
f0201250bd openssl: add PLIST.Linux for afalg.so
From Michael Forney in PR 54866
2020-01-16 21:58:50 +00:00
jperkin
f76ab4b2d3 openssl: Reduce buildlink ABI/API requirement.
Requested by wiz for NetBSD using older but compatible 1.1.1 releases.
2020-01-16 16:18:19 +00:00
jperkin
9620f18575 libtcpa: We no longer have openssl < 1.1. 2020-01-16 13:34:48 +00:00
jperkin
510dbe5aae *: Remove USE_OLD_DES_API.
OpenSSL 1.1.1d no longer ships des_old.h, and the time for this being
necessary appears to be behind us.
2020-01-16 13:33:50 +00:00
jperkin
953a453a3c openssl: Missed adding PLIST in previous. 2020-01-16 13:31:15 +00:00
jperkin
6a6a869481 openssl: Update to 1.1.1d.
This is a major upgrade to the current LTS release.  1.0.2 and 1.1.0 are now
out of support and should not be used.

pkgsrc changes include a large cleanup of patches and targets, many of which
were clearly bogus, for example a CONFLICTS entry against a package that has
never existed, and one that was removed in 1999.

Tested on SmartOS, macOS, and NetBSD.  Used for the SmartOS pkgsrc-2019Q4 LTS
release.

There are far too many individual changes to list, so the following text is
instead taken from the 1.1.1 blog announcement:

  --------------------------------------------------------------------------

After two years of work we are excited to be releasing our latest version today
- OpenSSL 1.1.1. This is also our new Long Term Support (LTS) version and so we
are committing to support it for at least five years.

OpenSSL 1.1.1 has been a huge team effort with nearly 5000 commits having been
made from over 200 individual contributors since the release of OpenSSL 1.1.0.
These statistics just illustrate the amazing vitality and diversity of the
OpenSSL community. The contributions didn't just come in the form of commits
though. There has been a great deal of interest in this new version so thanks
needs to be extended to the large number of users who have downloaded the beta
releases to test them out and report bugs.

The headline new feature is TLSv1.3. This new version of the Transport Layer
Security (formerly known as SSL) protocol was published by the IETF just one
month ago as RFC8446. This is a major rewrite of the standard and introduces
significant changes, features and improvements which have been reflected in the
new OpenSSL version.

What's more is that OpenSSL 1.1.1 is API and ABI compliant with OpenSSL 1.1.0
so most applications that work with 1.1.0 can gain many of the benefits of
TLSv1.3 simply by dropping in the new OpenSSL version. Since TLSv1.3 works very
differently to TLSv1.2 though there are a few caveats that may impact a
minority of applications. See the TLSv1.3 page on the OpenSSL wiki for more
details.

Some of the benefits of TLSv1.3 include:

 * Improved connection times due to a reduction in the number of round trips
   required between the client and server

 * The ability, in certain circumstances, for clients to start sending
   encrypted data to the server straight away without any round trips with the
   server required (a feature known as 0-RTT or “early data”).

 * Improved security due to the removal of various obsolete and insecure
   cryptographic algorithms and encryption of more of the connection handshake

Other features in the 1.1.1 release include:

 * Complete rewrite of the OpenSSL random number generator to introduce the
   following capabilities:

   * The default RAND method now utilizes an AES-CTR DRBG according to NIST
     standard SP 800-90Ar1.
   * Support for multiple DRBG instances with seed chaining.
   * There is a public and private DRBG instance.
   * The DRBG instances are fork-safe.
   * Keep all global DRBG instances on the secure heap if it is enabled.
   * The public and private DRBG instance are per thread for lock free
     operation

 * Support for various new cryptographic algorithms including:

   * SHA3
   * SHA512/224 and SHA512/256
   * EdDSA (including Ed25519 and Ed448)
   * X448 (adding to the existing X25519 support in 1.1.0)
   * Multi-prime RSA
   * SM2
   * SM3
   * SM4
   * SipHash
   * ARIA (including TLS support)

 * Signficant Side-Channel attack security improvements

 * Maximum Fragment Length TLS extension support

 * A new STORE module, which implements a uniform and URI based reader of
   stores that can contain keys, certificates, CRLs and numerous other objects.

Since 1.1.1 is our new LTS release we are strongly advising all users to
upgrade as soon as possible. For most applications this should be straight
forward if they are written to work with OpenSSL 1.1.0. Since OpenSSL 1.1.0 is
not an LTS release it will start receiving security fixes only with immediate
affect as per our previous announcement and as published in our release
strategy. It will cease receiving all support in one years time.

Our previous LTS release (OpenSSL 1.0.2) will continue to receive full support
until the end of this year. After that it will receive security fixes only. It
will stop receiving all support at the end of 2019. Users of that release are
strongly advised to upgrade to OpenSSL 1.1.1.
2020-01-16 13:30:29 +00:00
wiz
b081fc7056 pius: remove PYPKGPREFIX from PKGNAME to match directory name
It's an enduser program, so it's not necessary to install
multiple versions. ok schmonz@

While here, simplify github usage.
2020-01-16 12:18:31 +00:00
ryoon
1cce5cc18b acmesh: Update to 2.8.5
Changelog:
2.8.5
    fix auto upgrade error message.

2.8.4
    Avoiding autoupdate by checking master hash value.
    more dns api support'
    adapt recent letsencrypt ca http headers changes.
    bugs fixes.

Recommended to upgrade.
2020-01-15 16:30:56 +00:00
wiz
9e359b02d5 pius: fix installation
Switch from egg.mk to distutils.mk, the latter works.
Add perl dependency for pius-party-worksheet.

Bump PKGREVISION.
2020-01-15 13:07:46 +00:00
adam
053c3a85a0 py-google-auth: updated to 1.10.1
1.10.1:
Bug Fixes
google.auth.compute_engine.metadata: add retry to google.auth.compute_engine._metadata.get()
always pass body of type bytes to google.auth.transport.Request
2020-01-15 09:02:19 +00:00
wiz
ad761281b6 keepassxc: update to 2.5.2.
## 2.5.2 (2020-01-04)

### Added

- Browser: Show UI warning when entering invalid URLs [#3912]
- Browser: Option to use an entry only for HTTP auth [#3927]

### Changed

- Disable the user interface when merging or saving the database [#3991]
- Ability to hide protected attribute after reveal [#3877]
- Remove mention of "snaps" in Windows and macOS [#3879]
- CLI: Merge parameter for source database key file (--key-file-from) [#3961]
- Improve GUI tests reliability on Hi-DPI displays [#4075]
- Disable deprecation warnings to allow building with Qt 5.14+ [#4075]
- OPVault: Use 'otp' attribute for TOTP field imports [#4075]

### Fixed

- Fix crashes when saving a database to cloud storage [#3991]
- Fix crash when pressing enter twice while opening database [#3885]
- Fix handling of HTML when displayed in the entry preview panel [#3910]
- Fix start minimized to tray on Linux [#3899]
- Fix Auto Open with key file only databases [#4075]
- Fix escape key closing the standalone password generator [#3892]
- macOS: Fix monospace font usage in password field and notes [#4075]
- macOS: Fix building on macOS 10.9 to 10.11 [#3946]
- Fix TOTP setup dialog not closing on database lock [#4075]
- Browser: Fix condition where additional URLs are ignored [#4033]
- Browser: Fix subdomain matching to return only relevant site entries [#3854]
- Secret Service: Fix multiple crashes and incompatibilities [#3871, #4009, #4074]
- Secret Service: Fix searching of entries [#4008, #4036]
- Secret Service: Fix behavior when exposed group is recycled [#3914]
- CLI: Release the database instance before exiting interactive mode [#3889]
- Fix (most) memory leaks in tests [#3922]

## 2.5.1 (2019-11-11)

### Added

- Add programmatic use of the EntrySearcher [#3760]
- Explicitly clear database memory upon locking even if the object is not deleted immediately [#3824]
- macOS: Add ability to perform notarization of built package [#3827]

### Changed

- Reduce file hash checking to every 30 seconds to correct performance issues [#3724]
- Correct formatting of notes in entry preview widget [#3727]
- Improve performance and UX of database statistics page [#3780]
- Improve interface for key file selection to discourage use of the database file [#3807]
- Hide Auto-Type sequences column when not needed [#3794]
- macOS: Revert back to using Carbon API for hotkey detection [#3794]
- CLI: Do not show protected fields by default [#3710]

### Fixed

- Secret Service: Correct issues interfacing with various applications [#3761]
- Fix building without additional features [#3693]
- Fix handling TOTP secret keys that require padding [#3764]
- Fix database unlock dialog password field focus [#3764]
- Correctly label open databases as locked on launch [#3764]
- Prevent infinite recursion when two databases AutoOpen each other [#3764]
- Browser: Fix incorrect matching of invalid URLs [#3759]
- Properly stylize the application name on Linux [#3775]
- Show application icon on Plasma Wayland sessions [#3777]
- macOS: Check for Auto-Type permissions on use instead of at launch [#3794]

## 2.5.0 (2019-10-26)

### Added

- Add 'Paper Backup' aka 'Export to HTML file' to the 'Database' menu [#3277]
- Add statistics panel with information about the database (number of entries, number of unique passwords, etc.) to the Database Settings dialog [#2034]
- Add offline user manual accessible via the 'Help' menu [#3274]
- Add support for importing 1Password OpVault files [#2292]
- Implement Freedesktop.org secret storage DBus protocol so that KeePassXC can be used as a vault service by libsecret [#2726]
- Add support for OnlyKey as an alternative to YubiKeys (requires yubikey-personalization >= 1.20.0) [#3352]
- Add group sorting feature [#3282]
- Add feature to download favicons for all entries at once [#3169]
- Add word case option to passphrase generator [#3172]
- Add support for RFC6238-compliant TOTP hashes [#2972]
- Add UNIX man page for main program [#3665]
- Add 'Monospaced font' option to the notes field [#3321]
- Add support for key files in auto open [#3504]
- Add search field for filtering entries in Auto-Type dialog [#2955]
- Complete usernames based on known usernames from other entries [#3300]
- Parse hyperlinks in the notes field of the entry preview pane [#3596]
- Allow abbreviation of field names in entry search [#3440]
- Allow setting group icons recursively [#3273]
- Add copy context menu for username and password in Auto-Type dialog [#3038]
- Drop to background after copying a password to the clipboard [#3253]
- Add 'Lock databases' entry to tray icon menu [#2896]
- Add option to minimize window after unlocking [#3439]
- Add option to minimize window after opening a URL [#3302]
- Request accessibility permissions for Auto-Type on macOS [#3624]
- Browser: Add initial support for multiple URLs [#3558]
- Browser: Add entry-specific browser integration settings [#3444]
- CLI: Add offline HIBP checker (requires a downloaded HIBP dump) [#2707]
- CLI: Add 'flatten' option to the 'ls' command [#3276]
- CLI: Add password generation options to `Add` and `Edit` commands [#3275]
- CLI: Add XML import [#3572]
- CLI: Add CSV export to the 'export' command [#3278]
- CLI: Add `-y --yubikey` option for YubiKey [#3416]
- CLI: Add `--dry-run` option for merging databases [#3254]
- CLI: Add group commands (mv, mkdir and rmdir) [#3313].
- CLI: Add interactive shell mode command `open` [#3224]


### Changed

- Redesign database unlock dialog [ #3287]
- Rework the entry preview panel [ #3306]
- Move notes to General tab on Group Preview Panel [#3336]
- Enable entry actions when editing an entry and cleanup entry context menu  [#3641]
- Improve detection of external database changes  [#2389]
- Warn if user is trying to use a KDBX file as a key file [#3625]
- Add option to disable KeePassHTTP settings migrations prompt [#3349, #3344]
- Re-enabled Wayland support (no Auto-Type yet) [#3520, #3341]
- Add icon to 'Toggle Window' action in tray icon menu [#3244]
- Merge custom data between databases only when necessary [#3475]
- Improve various file-handling related issues when picking files using the system's file dialog [#3473]
- Add 'New Entry' context menu when no entries are selected [#3671]
- Reduce default Argon2 settings from 128 MiB and one thread per CPU core to 64 MiB and two threads to account for lower-spec mobile hardware [ #3672]
- Browser: Remove unused 'Remember' checkbox for HTTP Basic Auth [#3371]
- Browser: Show database name when pairing with a new browser [#3638]
- Browser: Show URL in allow access dialog [#3639]
- CLI: The password length option `-l` for the CLI commands `Add` and `Edit` is now `-L` [#3275]
- CLI: The `-u` shorthand for the `--upper` password generation option has been renamed to `-U` [#3275]
- CLI: Rename command `extract` to `export`. [#3277]

### Fixed

- Improve accessibility for assistive technologies [#3409]
- Correctly unlock all databases if `--pw-stdin` is provided [#2916]
- Fix password generator issues with special characters [#3303]
- Fix KeePassXC interrupting shutdown procedure [#3666]
- Fix password visibility toggle button state on unlock dialog [#3312]
- Fix potential data loss if database is reloaded while user is editing an entry [#3656]
- Fix hard-coded background color in search help popup [#3001]
- Fix font choice for password preview [#3425]
- Fix handling of read-only files when autosave is enabled [#3408]
- Handle symlinks correctly when atomic saves are disabled [#3463]
- Enable HighDPI icon scaling on Linux [#3332]
- Make Auto-Type on macOS more robust and remove old Carbon API calls [#3634, [#3347)]
- Hide Share tab if KeePassXC is compiled without KeeShare support and other minor KeeShare improvements [#3654, [#3291, #3029, #3031, #3236]
- Correctly bring window to the front when clicking tray icon on macOS [#3576]
- Correct application shortcut created by MSI Installer on Windows [#3296]
- Fix crash when removing custom data [#3508]
- Fix placeholder resolution in URLs [#3281]
- Fix various inconsistencies and platform-dependent compilation bugs [#3664, #3662, #3660, #3655, #3649, #3417, #3357, #3319, #3318, #3304]
- Browser: Fix potential leaking of entries through the browser integration API if multiple databases are opened [#3480]
- Browser: Fix password entropy calculation [#3107]
- Browser: Fix Windows registry settings for portable installation [#3603]
2020-01-14 22:32:17 +00:00
schmonz
eb677ef5e7 Add missing gnupg{,2} dependencies, and patch some paths. Ride
recent import.
2020-01-13 20:52:04 +00:00
schmonz
816600aad1 Add and enable pius. 2020-01-13 20:40:14 +00:00
schmonz
64438e68d2 Add pius, the PGP Individual User Signer. It helps attendees of PGP
keysigning parties. It allows you to quickly and easily sign each UID on
a set of PGP keys. It is designed to take the pain out of the
sign-all-the-keys part of PGP Keysigning Party while adding security to
the process.
2020-01-13 20:39:29 +00:00
ryoon
eedd1e806f *: Recursive revbump from devel/boost-libs 2020-01-12 20:19:52 +00:00
bsiegert
5220c156ea Revbump Go packages after Go default version bump. 2020-01-10 13:32:09 +00:00
wiz
78444582ff *: py-cachetools only supports python 3.x now, pass down to dependencies 2020-01-09 14:21:06 +00:00
adam
baec18424b py-google-auth: updated to 1.10.0
1.10.0:
Features
send quota project id in x-goog-user-project for OAuth2 credentials

1.9.0:
Features
add timeout parameter to AuthorizedSession.request()
2020-01-08 11:41:50 +00:00
adam
627995668b py-asn1crypto: updated to 1.3.0
1.3.0
- Added `encrypt_key_pref` (`1.2.840.113549.1.9.16.2.11`) to
  `cms.CMSAttributeType()`, along with related structures
- Added Brainpool curves from RFC 5639 to `keys.NamedCurve()`
- Fixed `x509.Certificate().subject_directory_attributes_value`
- Fixed some incorrectly computed minimum elliptic curve primary key
  encoding sizes in `keys.NamedCurve()`
- Fixed a `TypeError` when trying to call `.untag()` or `.copy()` on a
  `core.UTCTime()` or `core.GeneralizedTime()`, or a value containing one,
  when using Python 2
2020-01-08 11:37:49 +00:00
mef
04baf85dbf (security/lua-sec) Updated 0.6 to 0.9
--------------------------------------------------------------------------
LuaSec 0.9
---------------
This version includes:

* Add DNS-based Authentication of Named Entities (DANE) support
* Add __close() metamethod
* Fix deprecation warnings with OpenSSL 1.1
* Fix special case listing of TLS 1.3 EC curves
* Fix general_name leak in cert:extensions()
* Fix unexported 'ssl.config' table
* Replace $(LD) with $(CCLD) variable
* Remove multiple definitions of 'ssl_options' variable
* Use tag in git format: v0.9

--------------------------------------------------------------------------
LuaSec 0.8.2
---------------
This version includes:

* Fix unexported 'ssl.config' table (backported)

--------------------------------------------------------------------------
LuaSec 0.8.1
---------------
This version includes:

* Fix general_name leak in cert:extensions() (backported)

--------------------------------------------------------------------------
LuaSec 0.8
---------------
This version includes:

* Add support to ALPN
* Add support to TLS 1.3
* Add support to multiple certificates
* Add timeout to https module (https.TIMEOUT)
* Drop support to SSL 3.0
* Drop support to TLS 1.0 from https module
* Fix invalid reference to Lua state
* Fix memory leak when get certficate extensions

--------------------------------------------------------------------------
LuaSec 0.7.2
---------------
This version includes:

* Fix unexported 'ssl.config' table (backported)

--------------------------------------------------------------------------
LuaSec 0.7.1
---------------
This version includes:

* Fix general_name leak in cert:extensions() (backported)

--------------------------------------------------------------------------
LuaSec 0.7
---------------
LuaSec depends  on OpenSSL, and  integrates with LuaSocket to  make it
easy to add secure connections to any Lua applications or scripts.

Documentation: https://github.com/brunoos/luasec/wiki

This version includes:

* Add support to OpenSSL 1.1.0
* Add support to elliptic curves list
* Add ssl.config that exports some OpenSSL information
* Add integration with luaossl
2020-01-06 23:55:47 +00:00
pho
fd37d437dc Fix build on NetBSD 8.1 2020-01-06 12:04:12 +00:00
nia
f3e83a26fc security: Remove seahorse-plugins.
Old GNOME 2 component. This is no longer part of GNOME.
Plugins for GNOME are no longer maintained alongside the seahorse client.
2020-01-04 14:04:29 +00:00
gutteridge
d5099a16be mate-polkit: tweak $DISTNAME
Prepare to bump the default $VERSION in meta-pkg/mate to 1.22.2 (now
the most common version amongst the packages and the effective release
we're at).
2020-01-02 22:47:56 +00:00
sevan
9d1cf377ce Upgrade to OpenSSL 1.0.2u
Major changes between OpenSSL 1.0.2t and OpenSSL 1.0.2u [20 Dec 2019]

Fixed an an overflow bug in the x64_64 Montgomery squaring procedure used
in exponentiation with 512-bit moduli (CVE-2019-1551)
2020-01-02 20:31:05 +00:00
pho
2cffcbc7c7 Add dependency on devel/zlib 2020-01-02 11:40:05 +00:00
leot
249ddc9adf sqlmap: Update to 1.4
Unfortunately no changelog is provided by upstream.
2020-01-01 15:50:30 +00:00
kim
24f7b29a8a Update to sudo 1.8.30
Notable changes:

* The version string no longer has the word "beta" in it.
2020-01-01 01:47:29 +00:00
ng0
60cf554ea9 security/doas: update to version 6.2p4
Changelog picked from https://github.com/slicer69/doas/releases:

6.2p4:
* Keeping environment variables with keepenv
  On some platforms (seemingly Linux and macOS) it is possible for
  repeated calls to getpwuid() can over-write the original struct
  passwd structure. (This behaviour may vary depending on which
  C library is used. This can lead to the original user's
  environment data being overwritten by the target user's, even
  when "keepenv" is specified in the doas.conf file.
  We now do a deep copy of the original and target users' struct
  passwd information to avoid over-writing the original on platforms
  where libc uses a static area for all calls.
2020-01-01 01:30:19 +00:00
wiz
19838d46ba libssh: update to 0.93.
version 0.9.3 (released 2019-12-10)
  * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution
  * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state
  * SSH-01-006 General: Various unchecked Null-derefs cause DOS
  * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys
  * SSH-01-010 SSH: Deprecated hash function in fingerprinting
  * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS
  * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access
  * SSH-01-001 State Machine: Initial machine states should be set explicitly
  * SSH-01-002 Kex: Differently bound macros used to iterate same array
  * SSH-01-005 Code-Quality: Integer sign confusion during assignments
  * SSH-01-008 SCP: Protocol Injection via unescaped File Names
  * SSH-01-009 SSH: Update documentation which RFCs are implemented
  * SSH-01-012 PKI: Information leak via uninitialized stack buffer
2019-12-31 12:27:03 +00:00
rhialto
8fb3b56efe security/sslsplit: update to 0.5.5. 2019-12-30 22:17:29 +00:00
triaxx
ca0d886671 py-certbot-dns-digitalocean: sort PLIST 2019-12-30 20:58:30 +00:00
triaxx
e4a43216e5 security: added py-certbot-dns-digitalocean version 1.0.0 2019-12-30 19:44:33 +00:00
triaxx
c8e5cdb1f8 py-cerbot: add py-certbot-dns-digitalocean in comments 2019-12-30 19:43:56 +00:00
triaxx
75c589223d py-certbot-dns-digitalocean: added version 1.0.0
DigitalOcean DNS Authenticator plugin for Certbot
2019-12-30 19:41:31 +00:00
kim
c90f2a226c Update to sudo 1.8.30beta3
* Portability fixes from pkgsrc have been merged upstream

* Add runas_check_shell flag to require a runas user to have a valid
  shell. Not enabled by default.

* Add a new flag "allow_unknown_runas_id" to control matching of unknown
  IDs. Previous, sudo would always allow unknown user or group IDs if
  the sudoers entry permitted it. This included the "ALL" alias. With
  this change, the admin must explicitly enable support for unknown IDs.

* Transparently handle the "sudo sudoedit" problem. Some admin are
  confused about how to give users sudoedit permission and many users
  try to run sudoedit via sudo instead of directly. If the user runs
  "sudo sudoedit" sudo will now treat it as plain "sudoedit" after
  issuing a warning. If the admin has specified a fully-qualified path
  for sudoedit in sudoers, sudo will treat it as just "sudoedit" and
  match accordingly. In visudo (but not sudo), a fully-qualified path
  for sudoedit is now treated as an error.

* When restoring old resource limits, try to recover if we receive
  EINVAL. On NetBSD, setrlimit(2) can return EINVAL if the new soft
  limit is lower than the current resource usage. This can be a problem
  when restoring the old stack limit if sudo has raised it.

* Restore resource limits before executing the askpass program. Linux
  with docker seems to have issues executing a program when the stack
  size is unlimited. Bug #908

* macOS does not allow rlim_cur to be set to RLIM_INFINITY for
  RLIMIT_NOFILE. We need to use OPEN_MAX instead as per the macOS
  setrlimit manual. Bug #904

* Use 64-bit resource limits on AIX.
2019-12-28 20:43:56 +00:00
wiz
b2f69cab7d racoon2: update to 20180701nb3.
Install config files in examples directory.
Fixes installation which did not use DESTDIR.
2019-12-28 12:50:19 +00:00
markd
8058f44cf9 botan-devel: don't accidentally detect and use sphinx 2019-12-22 22:33:15 +00:00
joerg
7475eb7fea Use -fopenmp instead of hard-coding libgomp. 2019-12-22 22:29:39 +00:00
joerg
7c1201663f sodium no longer provides crypto_uint*, so provide ones local. 2019-12-22 22:28:54 +00:00
gutteridge
e74d5a65d8 libprelude: fix build with GNU awk >= 5.0
Rename the awk variable "namespace" to "name_space", since the former
is now a reserved word with GNU awk 5.0, and was causing parsing
errors.
2019-12-20 22:11:02 +00:00
joerg
fb38e15089 Deal with bind vs std::bind conflict. 2019-12-19 22:23:19 +00:00
joerg
d92def3ecd Add missing dependency for lrelease. 2019-12-19 22:22:50 +00:00
joerg
1b26e77727 Avoid using a non-literal string as format string. 2019-12-19 22:22:33 +00:00
kim
061cab795f Don't touch RLIMIT_STACK for now, see https://gnats.netbsd.org/51158 2019-12-19 16:59:44 +00:00
kim
4f18f8f89c Fix setrlimit(3): Invalid argument
The new code that unlimits many resources appears to have been problematic
on a number of fronts. Fetched the current version of src/limits.c from
the sudo hg repo. RLIMIT_STACK (i.e. "3") is no longer set to RLIM_INFINITY.

Added code to output the name of the limit instead of its number.
2019-12-18 15:56:10 +00:00
joerg
ec8ee45ae1 Fix build with libc++ having less namespace pollution. 2019-12-18 12:40:22 +00:00
taca
8cb487404d Drop php71 support
Drop php71 support mechanically.
2019-12-16 16:30:13 +00:00
taca
52d74d7170 security/php-pecl-mcrypt: update to 1.0.3
Update php-pecl-mcrypt to 1.0.3.

o pkgsr change: allow build on php74.

1.0.3 (2019-09-17)

* Addressed Windows build issues
2019-12-16 00:10:37 +00:00
adam
4dbbbd83f6 sudo: updated to 1.8.29
Major changes between version 1.8.29 and 1.8.28p1:

The cvtsudoers command will now reject non-LDIF input when converting from LDIF format to sudoers or JSON formats.
The new log_allowed and log_denied sudoers settings make it possible to disable logging and auditing of allowed and/or denied commands.
The umask is now handled differently on systems with PAM or login.conf. If the umask is explicitly set in sudoers, that value is used regardless of what PAM or login.conf may specify. However, if the umask is not explicitly set in sudoers, PAM or login.conf may now override the default sudoers umask.
For make install, the sudoers file is no longer checked for syntax errors when DESTDIR is set. The default sudoers file includes the contents of /etc/sudoers.d which may not be readable as non-root.
Sudo now sets most resource limits to their maximum value to avoid problems caused by insufficient resources, such as an inability to allocate memory or open files and pipes.
Fixed a regression introduced in sudo 1.8.28 where sudo would refuse to run if the parent process was not associated with a session. This was due to sudo passing a session ID of -1 to the plugin.
2019-12-15 18:42:09 +00:00
taca
9cbfc66951 security/php-sodium: allow build on php74
Allow build on php74.
2019-12-15 18:02:30 +00:00
adam
03a6dbb3f1 py-pydeep: updated to 0.4
0.4:
Unknown changes
2019-12-15 11:24:52 +00:00
adam
f0e7f75464 py-google-auth: updated to 1.8.2
1.8.2:
Bug Fixes
revert "feat: send quota project id in x-goog-user-project header for OAuth2 credentials"

1.8.1:
Bug Fixes
revert "feat: add timeout to AuthorizedSession.request()

1.8.0:
Features
add to_json method to google.oauth2.credentials.Credentials
add timeout to AuthorizedSession.request()
send quota project id in x-goog-user-project header for OAuth2 credentials
2019-12-15 11:22:34 +00:00
adam
d721e9ae15 py-acme/py-cerbot-*: updated to 1.0.0
Certbot 1.0.0

Removed:
* The docs extras for the certbot-apache and certbot-nginx packages
  have been removed.

Changed:
* certbot-auto has deprecated support for systems using OpenSSL 1.0.1 that are
  not running on x86-64. This primarily affects RHEL 6 based systems.
* Certbot's config_changes subcommand has been removed
* certbot.plugins.common.TLSSNI01 has been removed.
* Deprecated attributes related to the TLS-SNI-01 challenge in
  acme.challenges and acme.standalone
  have been removed.
* The functions certbot.client.view_config_changes,
  certbot.main.config_changes,
  certbot.plugins.common.Installer.view_config_changes,
  certbot.reverter.Reverter.view_config_changes, and
  certbot.util.get_systemd_os_info have been removed
* Certbot's register --update-registration subcommand has been removed
* When possible, default to automatically configuring the webserver so all requests
  redirect to secure HTTPS access. This is mostly relevant when running Certbot
  in non-interactive mode. Previously, the default was to not redirect all requests.
2019-12-15 09:48:37 +00:00
ng0
6b418c5bef security/doas: resolve PR pkg/54717.
patch in the correct installed location of the config file
in the manpages.
2019-12-14 11:19:54 +00:00
khorben
fa909dc998 security/py-yara: Update to 3.11.0
Coordinated with leot@ and he@ while investigating CVE-2019-19648.
2019-12-14 10:50:10 +00:00
khorben
90d1d13438 security/yara: Update to 3.11.0
Coordinated with leot@ and he@ while investigating CVE-2019-19648.

The changes listed for this version include:

 * Duplicated string modifiers are now an error.
 * More flexible xor modifier.
 * Implement private strings (#1096)
 * Add field_offsets to dotnet module.
 * Implement crc32 functions in hash module.
 * Improvements to rich_signature functions in pe module.
 * Implement sandboxed API using SAPI
 * BUGFIX: Some regexp character classes not matching correctly when used with nocase modifier (#1117)
 * BUGFIX: Reduce the number of ERROR_TOO_MANY_RE_FIBERS errors for certain hex pattern containing large jumps (#1107)
 * BUGFIX: Buffer overrun in dotnet module (#1108)
 * BUGFIX: Segfault in certain Windows versions (#1068)
 * BUGFIX: Memory leak while attaching to a process fails (#1070)

Changes for version 3.10.0:

 * Optimize integer range loops by exiting earlier when possible.
 * Cache the result of PE module's imphash function in order to improve performance.
 * Harden virtual machine against malicious code.
 * BUGFIX: xor modifier not working as expected if not accompanied by ascii (#1053).
 * BUGFIX: \s and \S character classes in regular expressions now include vertical tab, new line, carriage return and form feed characters.
 * BUGFIX: Regression bug in hex strings containing wildcards (#1025).
 * BUGFIX: Buffer overrun in elf module.
 * BUGFIX: Buffer overrun in dotnet module

Changes for version 3.9.0:

 * Improve scan performance for certain strings.
 * Reduce stack usage.
 * Prevent inadvertent use of compiled rules by forcing the use of -C when using yara command-line tool.
 * BUGFIX: Buffer overflow in "dotnet" module.
 * BUGFIX: Internal error when running multiple instances of YARA in Mac OS X. (#945)
 * BUGFIX: Regexp regression when using nested quantifiers {x,y} for certain values of x and y. (#1018)
 * BUGFIX: High RAM consumption in "pe" module while parsing certain files.(0c8b461)
 * BUGFIX: Denial of service when using "dex" module. Found by the Cisco Talos team. (#1023)
 * BUGFIX: Issues with comments inside hex strings.

Changes for version 3.8.1:

 * BUGFIX: Some combinations of boolean command-line flags were broken in version 3.8.0.
 * BUGFIX: While reporting errors that occur at the end of the file, the file name appeared as null.
 * BUGFIX: dex module now works in big-endian architectures.
 * BUGFIX: Keep ABI compatibility by keeping deprecated functions visible.

Changes for version 3.8.0:

 * Scanner API
 * New xor modifier for strings
 * New fields and functions in PE module.
 * Add functions min and max to math module.
 * Make compiled.
 * yara and yaracsupport reading rules from stdin by using - as the file name.
 * Rule compilation is faster.
 * BUGFIX: Regression in regex engine. /ba{3}b/ was matching baaaab.
 * BUGFIX: Function yr_compiler_add_fd() was reading only the first 1024 bytes of the file.
 * BUGFIX: Wrong calculation of sha256 hashes in Windows when using native crypto API.
 * Lots of more bug fixes.

Changes for version 3.7.1:

 * Fix regression in include directive (issue #796)
 * Fix bug in PE checksum calculation causing wrong results in some cases.
2019-12-14 10:46:08 +00:00
bsiegert
924057ee4f Revbump all Go packages after Go 1.12.14 update. 2019-12-13 07:43:47 +00:00
adam
4b8204dfd6 py-certifi: updated to 2019.11.28
2019.11.28:
Unknown changes
2019-12-11 14:27:54 +00:00
adam
f7b4ad9609 py-paramiko: updated to 2.7.1
2.7.1:
[Bug] Fix a bug in support for ECDSA keys under the newly supported OpenSSH key format. Thanks to Pierce Lopez for the patch.
[Bug] The new-style private key format (added in 2.7) suffered from an unpadding bug which had been fixed earlier for Ed25519 (as that key type has always used the newer format). That fix has been refactored and applied to the base key class, courtesy of Pierce Lopez.

2.7.0:
[Feature]: Add new convenience classmethod constructors to SSHConfig: from_text, from_file, and from_path. No more annoying two-step process!
[Feature] Implement most ‘canonical hostname’ ssh_config functionality (CanonicalizeHostname, CanonicalDomains, CanonicalizeFallbackLocal, and CanonicalizeMaxDots; CanonicalizePermittedCNAMEs has not yet been implemented). All were previously silently ignored. Reported by Michael Leinartas.
[Feature] Implement support for the Match keyword in ssh_config files. Previously, this keyword was simply ignored & keywords inside such blocks were treated as if they were part of the previous block. Thanks to Michael Leinartas for the initial patchset.

Note
This feature adds a new optional install dependency, Invoke, for managing Match exec subprocesses.

[Feature]: A couple of outright SSHConfig parse errors were previously represented as vanilla Exception instances; as part of recent feature work a more specific exception class, ConfigParseError, has been created. It is now also used in those older spots, which is naturally backwards compatible.
[Feature] Implement support for OpenSSH 6.5-style private key files (typically denoted as having BEGIN OPENSSH PRIVATE KEY headers instead of PEM format’s BEGIN RSA PRIVATE KEY or similar). If you were getting any sort of weird auth error from “modern” keys generated on newer operating system releases (such as macOS Mojave), this is the first update to try.

Major thanks to everyone who contributed or tested versions of the patch, including but not limited to: Kevin Abel, Michiel Tiller, Pierce Lopez, and Jared Hobbs.

[Bug]: Perform deduplication of IdentityFile contents during ssh_config parsing; previously, if your config would result in the same value being encountered more than once, IdentityFile would contain that many copies of the same string.
[Bug]: Paramiko’s use of subprocess for ProxyCommand support is conditionally imported to prevent issues on limited interpreter platforms like Google Compute Engine. However, any resulting ImportError was lost instead of preserved for raising (in the rare cases where a user tried leveraging ProxyCommand in such an environment). This has been fixed.
[Bug]: ssh_config token expansion used a different method of determining the local username ($USER env var), compared to what the (much older) client connection code does (getpass.getuser, which includes $USER but may check other variables first, and is generally much more comprehensive). Both modules now use getpass.getuser.
[Support]: Explicitly document which ssh_config features we currently support. Previously users just had to guess, which is simply no good.
[Support]: Additional installation extras_require “flavors” (ed25519, invoke, and all) have been added to our packaging metadata; see the install docs for details.
2019-12-11 10:43:53 +00:00
manu
91233a576f Update gnupg-pkcs11-scd to 0.9.2
Changelog since 0.7.0

2019-01-05 - Version 0.9.2

 * Fixu Windows build issues, thanks Luka Logar.
 * Use pin-cache configuration, thanks Luka Logar.
 * Support openssl-1.1, thanks Thorsten Alteholz, W. Michael Petullo.

2017-09-26 - Version 0.9.1

 * Support unix domain socket credentials on FreeBSD.
 * Introduce GNUPG_PKCS11_SOCKETDIR to instruct where sockets are created.
 * Make proxy systemd service work again per change of systemd behavior.

2017-08-25 - Version 0.9.0

 * Avoid dup of stdin/stdout so that the terminate assuan hack operational
   again.
 * Introduce gnupg-pkcs11-scd-proxy to allow isolation of the PKCS#11
   provider.
 * Lots of cleanups.

2017-07-15 - Version 0.8.0

 * Support multiple tokens via serial numbers by hashing token id into
   serial number.
   Implementation changes the card serial number yet again, executing
   gpg --card-status should resync.

2017-04-18 - Version 0.7.6

 * Add --homedir parameter.
 * Rework serial responses for gnupg-2.1.19.

2017-03-01 - Version 0.7.5

 * Fix issue with decrypting padded data, thanks to smunaut.
 * Catchup with gnupg-2.1 changes which caused inability to support
   both gpg and gpgsm. Implementation had to change card serial
   number, as a result current keys of gpg will look for the
   previous serial card.
   emulate-openpgpg option is obsoleted and removed.

   ACTION REQUIRED
   in order to assign new card serial number to existing keys.
   backup your ~/.gnupg.
   delete all PKCS#11 secret keys using:
       gpg --delete-secret-keys $KEY then
   Then refresh keys using:
       gpg --card-edit
   In <gnupg-2.1.19 the keys should be re-generated using:
       admin
       generate
   Do not replace keys!
   gpg will learn the private keys of the new card and attach to
   the existing public keys.
 * Support gnupg-2.1 features of using existing keys, keys
   should not be explicitly specified in configuration file
   any more.

2017-01-18 - Version 0.7.4

 * Fix gpg change in serialno attribute.
 * Sync with gnupg-2.1, thanks to Moritz Bechler.

2011-07-30 -- Version 0.7.3

 * Use assuan_sock_init, bug#3382372.

2011-04-09 -- Version 0.7.2

 * Some cleanups, thanks to Timo Schulz.
 * Sync hashing algorithms for OpenPGP.

2011-03-16 -- Version 0.7.1

 * Sync with gnupg-2.0.17.
2019-12-11 01:44:37 +00:00
adam
cd291e58da gnupg2: updated to 2.2.19
Noteworthy changes in version 2.2.19:

* gpg: Fix double free when decrypting for hidden recipients.
  Regression in 2.2.18.

* gpg: Use auto-key-locate for encryption even for mail addressed
  given with angle brackets.

* gpgsm: Add special case for certain expired intermediate
  certificates.
2019-12-09 18:44:52 +00:00
sevan
41b29db7af Update to the latest certdata.txt version available in Mozilla repo. 2019-12-07 18:29:31 +00:00
nia
a743d901b9 gnutls: Update to 3.6.11.1
Not sure of 3.6.11.1's specific changes - possibly fixing an incorrectly
generated tarball?

These changes from apply:

* Version 3.6.11 (released 2019-12-01)

** libgnutls: Use KERN_ARND for the system random number generator on NetBSD.
   This syscall provides an endless stream of random numbers from the kernel's
   ChaCha20-based random number generator, without blocking or requiring an open file
   descriptor.

** libgnutls: Corrected issue with TLS 1.2 session ticket handling as client
   during resumption (#841).

** libgnutls: gnutls_base64_decode2() succeeds decoding the empty string to
   the empty string. This is a behavioral change of the API but it conforms
   to the RFC4648 expectations (#834).

** libgnutls: Fixed AES-CFB8 implementation, when input is shorter than
   the block size. Fix backported from nettle.

** certtool: CRL distribution points will be set in CA certificates even when
   non self-signed (#765).

** gnutls-cli/serv: added raw public-key handling capabilities (RFC7250).
   Key material can be set via the --rawpkkeyfile and --rawpkfile flags.

** API and ABI modifications:
No changes since last version.
2019-12-06 14:00:08 +00:00
nros
900911c257 Drop ftp.cyrusimap.org from MASTER_SITES
ftp.cyrusimap.org has been down for months. Asked about this on the
cyrus-info mailinglist months ago with no responses. So lets drop it from
MASTER_SITES.
The directory old on the ftp is also available in the http download so I
added that to MASTER_SITES as well.
2019-12-05 10:57:54 +00:00
taca
59e744eaa5 security/clamav: update to 0.102.1
Update clamav to 0.102.1.


## 0.102.1

ClamAV 0.102.1 is a security patch release to address the following issues.

- Fix for the following vulnerability affecting 0.102.0 and 0.101.4 and prior:
  - [CVE-2019-15961](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15961)
    A Denial-of-Service (DoS) vulnerability may occur when scanning a specially
    crafted email file as a result of excessively long scan times. The issue is
    resolved by implementing several maximums in parsing MIME messages and by
    optimizing use of memory allocation.

- Build system fixes to build clamav-milter, to correctly link with libxml2 when
  detected, and to correctly detect fanotify for on-access scanning feature
  support.

- Signature load time is significantly reduced by changing to a more efficient
  algorithm for loading signature patterns and allocating the AC trie.
  Patch courtesy of Alberto Wu.

- Introduced a new configure option to statically link libjson-c with libclamav.
  Static linking with libjson is highly recommended to prevent crashes in
  applications that use libclamav alongside another JSON parsing library.

- Null-dereference fix in email parser when using the `--gen-json` metadata
  option.

- Fixes for Authenticode parsing and certificate signature (.crb database) bugs.

Special thanks to the following for code contributions and bug reports:

- Alberto Wu
- Joran Dirk Greef
- Reio Remma
2019-12-03 12:55:16 +00:00
adam
eaeedc9379 py-asyncssh: updated to 2.1.0
Release 2.1.0:
Added support in the SSHProcess redirect mechanism to accept asyncio StreamReader and StreamWriter objects, allowing asyncio streams to be plugged in as stdin/stdout/stderr in an SSHProcess.
Added support for key handlers in the AsyncSSH line editor to trigger signals being delivered when certain “hot keys” are hit while reading input.
Improved cleanup of unreturned connection objects when an error occurs or the connection request is canceled or times out.
Improved cleanup of SSH agent client objects to avoid triggering a false positive warning in Python 3.8.
Added an example to the documentation for how to create reverse-direction SSH client and server connections.
Made check of session objects against None explicit to avoid confusion on user-defined sessions that implement __len__ or __bool__.

Release 2.0.1:
Some API changes which should have been included in the 2.0.0 release were missed. This release corrects that, but means that additional changes may be needed in applications moving to 2.0.1. This should hopefully be the last of such changes, but if any other issues are discovered, additional changes will be limited to 2.0.x patch releases and the API will stabilize again in the AsyncSSH 2.1 release. See the next bullet for details about the additional incompatible change.
To be consistent with other connect and listen functions, all methods on SSHClientConnection which previously returned None on listen failures have been changed to raise an exception instead. A new ChannelListenError exception will now be raised when an SSH server returns failure on a request to open a remote listener. This change affects the following SSHClientConnection methods: create_server, create_unix_server, start_server, start_unix_server, forward_remote_port, and forward_remote_path.
Restored the ability for SSHListener objects to be used as async context managers. This previously worked in AsyncSSH 1.x and was unintentionally broken in AsyncSSH 2.0.0.
Added support for a number of additional functions to be called from within an “async with” statement. These functions already returned objects capable of being async context managers, but were not decorated to allow them to be directly called from within “async with”. This change applies to the top level functions create_server, listen, and listen_reverse and the SSHClientConnection methods create_server, create_unix_server, start_server, start_unix_server, forward_local_port, forward_local_path, forward_remote_port, forward_remote_path, listen_ssh, and listen_reverse_ssh,
Fixed a couple of issues in loading OpenSSH-format certificates which were missing a trailing newline.
Changed load_certificates() to allow multiple certificates to be loaded from a single byte string argument, making it more consistent with how load_certificates() works when reading from a file.

Release 2.0.0:
NEW MAJOR VERSION: See below for potentially incompatible changes.
Updated AsyncSSH to use the modern async/await syntax internally, now requiring Python 3.6 or later. Those wishing to use AsyncSSH on Python 3.4 or 3.5 should stick to the AsyncSSH 1.x releases.
Changed first argument of SFTPServer constructor from an SSHServerConnection (conn) to an SSHServerChannel (chan) to allow custom SFTP server implementations to access environment variables set on the channel that SFTP is run over. Applications which subclass the SFTPServer class and implement an __init__ method will need to be updated to account for this change and pass the new argument through to the SFTPServer parent class. If the subclass has no __init__ and just uses the connection, channel, and env properties of SFTPServer to access this information, no changes should be required.
Removed deprecated “session_encoding” and “session_errors” arguments from create_server() and listen() functions. These arguments were renamed to “encoding” and “errors” back in version 1.16.0 to be consistent with other AsyncSSH APIs.
Removed get_environment(), get_command(), and get_subsystem() methods on SSHServerProcess class. This information was made available as “env”, “command”, and “subsystem” properties of SSHServerProcess in AsyncSSH 1.11.0.
Removed optional loop argument from all public AsyncSSH APIs, consistent with the deprecation of this argument in the asyncio package in Python 3.8. Calls will now always use the event loop which is active at the time of the call.
Removed support for non-async context managers on AsyncSSH connections and processes and SFTP client connections and file objects. Callers should use “async with” to invoke the async the context managers on these objects.
Added support for SSHAgentClient being an async context manager. To be consistent with other connect calls, connect_agent() will now raise an exception when no agent is found or a connection failure occurs, rather than logging a warning and returning None. Callers should catch OSError or ChannelOpenError exceptions rather than looking for a return value of None when calling this function.
Added set_input() and clear_input() methods on SSHLineEditorChannel to change the value of the current input line when line editing is enabled.
Added is_closing() method to the SSHChannel, SSHProcess, SSHWriter, and SSHSubprocessTransport classes. mirroring the asyncio BaseTransport and StreamWriter methods added in Python 3.7.
Added wait_closed() async method to the SSHWriter class, mirroring the asyncio StreamWriter method added in Python 3.7.
2019-12-01 11:45:35 +00:00
markd
af9dbe06e6 kwalletmanager: update to 19.08.3 qt5/kf5 version 2019-11-30 19:40:13 +00:00
hauke
a7801cb35d Update security/stunnel to 5.56. Upstream says
### Version 5.56, 2019.11.22, urgency: HIGH
* New features
  - Various text files converted to Markdown format.
* Bugfixes
  - Support for realpath(3) implementations incompatible
    with POSIX.1-2008, such as 4.4BSD or Solaris.
  - Support for engines without PRNG seeding methods (thx to
    Petr Mikhalitsyn).
  - Retry unsuccessful port binding on configuration
    file reload.
  - Thread safety fixes in SSL_SESSION object handling.
  - Terminate clients on exit in the FORK threading model.
2019-11-30 17:27:09 +00:00
ng0
4f631830c6 security/doas: assign myself as maintainer. 2019-11-29 15:27:42 +00:00
adam
7a42bb05c0 py-backports.ssl_match_hostname: updated to 3.7.0.1
3.7.0.1:
Match Python 3.7
2019-11-28 13:47:00 +00:00
bsiegert
4046981edf libssh: fix build on Solaris.
From Joern Clausen in PR pkg/54694.
2019-11-28 09:25:52 +00:00
ryoon
f06ac4d5a6 Update to 2.2.18
Changelog:
Noteworthy changes in version 2.2.18 (2019-11-25)
-------------------------------------------------

  * gpg: Changed the way keys are detected on a smartcards; this
    allows the use of non-OpenPGP cards.  In the case of a not very
    likely regression the new option --use-only-openpgp-card is
    available.  [#4681]

  * gpg: The commands --full-gen-key and --quick-gen-key now allow
    direct key generation from supported cards.  [#4681]

  * gpg: Prepare against chosen-prefix SHA-1 collisions in key
    signatures.  This change removes all SHA-1 based key signature
    newer than 2019-01-19 from the web-of-trust.  Note that this
    includes all key signature created with dsa1024 keys.  The new
    option --allow-weak-key-signatues can be used to override the new
    and safer behaviour.  [#4755,CVE-2019-14855]

  * gpg: Improve performance for import of large keyblocks.  [#4592]

  * gpg: Implement a keybox compression run.  [#4644]

  * gpg: Show warnings from dirmngr about redirect and certificate
    problems (details require --verbose as usual).

  * gpg: Allow to pass the empty string for the passphrase if the
    '--passphase=' syntax is used.  [#4633]

  * gpg: Fix printing of the KDF object attributes.

  * gpg: Avoid surprises with --locate-external-key and certain
    --auto-key-locate settings.  [#4662]

  * gpg: Improve selection of best matching key.  [#4713]

  * gpg: Delete key binding signature when deletring a subkey.
    [#4665,#4457]

  * gpg: Fix a potential loss of key sigantures during import with
    self-sigs-only active.  [#4628]

  * gpg: Silence "marked as ultimately trusted" diagnostics if
    option --quiet is used.  [#4634]

  * gpg: Silence some diagnostics during in key listsing even with
    option --verbose.  [#4627]

  * gpg, gpgsm: Change parsing of agent's pkdecrypt results.  [#4652]

  * gpgsm: Support AES-256 keys.

  * gpgsm: Fix a bug in triggering a keybox compression run if
    --faked-system-time is used.

  * dirmngr: System CA certificates are no longer used for the SKS
    pool if GNUTLS instead of NTBTLS is used as TLS library.  [#4594]

  * dirmngr: On Windows detect usability of IPv4 and IPv6 interfaces
    to avoid long timeouts.  [#4165]

  * scd: Fix BWI value for APDU level transfers to make Gemalto Ezio
    Shield and Trustica Cryptoucan work.  [#4654,#4566]

  * wkd: gpg-wks-client --install-key now installs the required policy
    file.
2019-11-27 12:17:08 +00:00
sevan
32442fec93 Update to v1.0.2t
Changes between 1.0.2s and 1.0.2t [10 Sep 2019]

   *) For built-in EC curves, ensure an EC_GROUP built from the curve name is
      used even when parsing explicit parameters, when loading a serialized key
      or calling `EC_GROUP_new_from_ecpkparameters()`/
      `EC_GROUP_new_from_ecparameters()`.
      This prevents bypass of security hardening and performance gains,
      especially for curves with specialized EC_METHODs.
      By default, if a key encoded with explicit parameters is loaded and later
      serialized, the output is still encoded with explicit parameters, even if
      internally a "named" EC_GROUP is used for computation.
      [Nicola Tuveri]

  *) Compute ECC cofactors if not provided during EC_GROUP construction. Before
     this change, EC_GROUP_set_generator would accept order and/or cofactor as
     NULL. After this change, only the cofactor parameter can be NULL. It also
     does some minimal sanity checks on the passed order.
     (CVE-2019-1547)
     [Billy Bob Brumley]

  *) Fixed a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey.
     An attack is simple, if the first CMS_recipientInfo is valid but the
     second CMS_recipientInfo is chosen ciphertext. If the second
     recipientInfo decodes to PKCS #1 v1.5 form plaintext, the correct
     encryption key will be replaced by garbage, and the message cannot be
     decoded, but if the RSA decryption fails, the correct encryption key is
     used and the recipient will not notice the attack.
     As a work around for this potential attack the length of the decrypted
     key must be equal to the cipher default key length, in case the
     certifiate is not given and all recipientInfo are tried out.
     The old behaviour can be re-enabled in the CMS code by setting the
     CMS_DEBUG_DECRYPT flag.
     (CVE-2019-1563)
     [Bernd Edlinger]

  *) Document issue with installation paths in diverse Windows builds

     '/usr/local/ssl' is an unsafe prefix for location to install OpenSSL
     binaries and run-time config file.
     (CVE-2019-1552)
     [Richard Levitte]
2019-11-26 22:22:45 +00:00
wiz
f339f153e3 py-asn1-modules: update to 0.2.8.
Use github distfile because pypi one is missing.

Revision 0.2.8, released 16-11-2019
-----------------------------------

- Improve test routines for modules that use certificate extensions
- Improve test for RFC3709 with a real world certificate
- Added RFC7633 providing TLS Features Certificate Extension
- Added RFC7229 providing OIDs for Test Certificate Policies
- Added tests for RFC3280, RFC3281, RFC3852, and RFC4211
- Added RFC6960 providing Online Certificate Status Protocol (OCSP)
- Added RFC6955 providing Diffie-Hellman Proof-of-Possession Algorithms
- Updated the handling of maps for use with openType for RFC 3279
- Added RFC6486 providing RPKI Manifests
- Added RFC6487 providing Profile for X.509 PKIX Resource Certificates
- Added RFC6170 providing Certificate Image in the Internet X.509 Public
  Key Infrastructure, and import the object identifier into RFC3709.
- Added RFC6187 providing Certificates for Secure Shell Authentication
- Added RFC6482 providing RPKI Route Origin Authorizations (ROAs)
- Added RFC6664 providing S/MIME Capabilities for Public Keys
- Added RFC6120 providing Extensible Messaging and Presence Protocol
  names in certificates
- Added RFC4985 providing Subject Alternative Name for expression of
  service names in certificates
- Added RFC5924 providing Extended Key Usage for Session Initiation
  Protocol (SIP) in X.509 certificates
- Added RFC5916 providing Device Owner Attribute
- Added RFC7508 providing Securing Header Fields with S/MIME
- Update RFC8226 to use ComponentPresentConstraint() instead of the
  previous work around
- Add RFC2631 providing OtherInfo for Diffie-Hellman Key Agreement
- Add RFC3114 providing test values for the S/MIME Security Label
- Add RFC5755 providing Attribute Certificate Profile for Authorization
- Add RFC5913 providing Clearance Attribute and Authority Clearance
  Constraints Certificate Extension
- Add RFC5917 providing Clearance Sponsor Attribute
- Add RFC4043 providing Internet X.509 PKI Permanent Identifier
- Add RFC7585 providing Network Access Identifier (NAI) Realm Name
  for Certificates
- Update RFC3770 to support openType for attributes and reported errata
- Add RFC4334 providing Certificate Extensions and Attributes for
  Authentication in PPP and Wireless LAN Networks
2019-11-26 13:10:44 +00:00
adam
a040e464d5 py-cryptodome: updated to 3.9.4
3.9.4:
Resolved issues
* Prevent ``key_to_english`` from creating invalid data when fed with
  keys of length not multiple of 8.
* Fix blocking RSA signing/decryption when key has very small factor.
2019-11-25 06:18:14 +00:00
adam
98f10ed772 py-passlib: updated to 1.7.2
1.7.2:
This release rolls up assorted bug & compatibility fixes since 1.7.1.

New Features

* .. py:currentmodule:: passlib.hash
  :class:`argon2`: Now supports Argon2 "ID" and "D" hashes (assuming new enough backend library).
  Now defaults to "ID" hashes instead of "I" hashes, but this can be overridden via ``type`` keyword.

* .. py:currentmodule:: passlib.hash
  :class:`scrypt`: Now uses python 3.6 stdlib's :func:`hashlib.scrypt` as backend,
  if present
2019-11-24 11:36:53 +00:00
gdt
1a6204f237 security/openssl: Fix recent use of empty()
Should resolve build on SmartOS.
(Amazingly, the wrong expression worked fine on NetbSD with gcc when
it was tested.)
2019-11-24 01:45:12 +00:00
gdt
2a81e96cdb security/openssl: Check for compling with gcc and clang correctly 2019-11-23 19:44:16 +00:00
mef
1bdf4398f9 Recursive revbump based on devel/cmocka 1.1.3 -> 1.1.5 2019-11-23 08:45:45 +00:00
prlw1
608c252f55 Substitute CLAMAV_DBDIR (the point of patch-etc.clam*.conf.sample) 2019-11-19 16:20:24 +00:00
taca
b1b021dc82 security/ruby-sshkit: update to 1.20.0
Update ruby-sshkit package to 1.20.0.


## [1.20.0][] (2019-08-03)

  * [#468](https://github.com/capistrano/sshkit/pull/468): Make `upload!` take a `:verbosity` option like `exec` does - [@grosser](https://github.com/grosser)

## [1.19.1][] (2019-07-02)

  * [#465](https://github.com/capistrano/sshkit/pull/456): Fix a regression in 1.19.0 that prevented `~` from being used in Capistrano paths, e.g. `:deploy_to`, etc. - [@grosser](https://github.com/grosser)

## [1.19.0][] (2019-06-30)

  * [#455](https://github.com/capistrano/sshkit/pull/455): Ensure UUID of commands are stable in logging - [@lazyatom](https://github.com/lazyatom)
  * [#453](https://github.com/capistrano/sshkit/pull/453): `as` and `within` now properly escape their user/group/path arguments, and the command nested within an `as` block is now properly escaped before passing to `sh -c`. In the unlikely case that you were manually escaping commands passed to SSHKit as a workaround, you will no longer need to do this. See [#458](https://github.com/capistrano/sshkit/issues/458) for examples of what has been fixed. - [@grosser](https://github.com/grosser)
  * [#460](https://github.com/capistrano/sshkit/pull/460): Handle IPv6 addresses without port - [@will-in-wi](https://github.com/will-in-wi)

## [1.18.2][] (2019-02-03)

  * [#448](https://github.com/capistrano/sshkit/pull/448): Fix misbehaving connection eviction loop when disabling connection pooling - [Sebastian Cohnen](https://github.com/tisba)

## [1.18.1][] (2019-01-26)

  * [#447](https://github.com/capistrano/sshkit/pull/447): Fix broken thread safety by widening critical section - [Takumasa Ochi](https://github.com/aeroastro)
2019-11-18 15:52:19 +00:00
taca
ac02e257ae security/ruby-ruby-openid: update to 2.9.2
Update ruby-ruby-openid package to version 2.9.2.


## 2.9.2

* Perform all checks before verifying endpoints.
  [#126](https://github.com/openid/ruby-openid/pull/126)

## 2.9.1

* Updated CHANGELOG.md

## 2.9.0

* Remove deprecated `autorequire` from gemspec.
  [#123](https://github.com/openid/ruby-openid/pull/123)
* Rescue from `Yadis::XRI::XRIHTTPError` on discovery.
  [#106](https://github.com/openid/ruby-openid/pull/106)
* Avoid SSRF for claimed_id request.
  [#121](https://github.com/openid/ruby-openid/pull/121)
* Updated documentation.
  [#115](https://github.com/openid/ruby-openid/pull/115), [#116](https://github.com/openid/ruby-openid/pull/116), [#117](https://github.com/openid/ruby-openid/pull/117), [#118](https://github.com/openid/ruby-openid/pull/118)
* Reduce warnings output in test runs.
  [#119](https://github.com/openid/ruby-openid/pull/119)
* Drop deprecated option from gemspec.
  [#120](https://github.com/openid/ruby-openid/pull/120)
* Remove circular require.
  [#113](https://github.com/openid/ruby-openid/pull/113)
* Updated Travis CI config with Ruby 2.6
  [#114](https://github.com/openid/ruby-openid/pull/114)
* Simplify Bundler require; remove need for extra `:require`.
  [#112](https://github.com/openid/ruby-openid/pull/112)

## 2.8.0

* Fix `admin/mkassoc` script.
  See https://github.com/openid/ruby-openid/pull/103
* Allow specifying timeout for `OpenID::StandardFetcher` in environment variables.
  See https://github.com/openid/ruby-openid/pull/109
* Fixed some documentation.
  See https://github.com/openid/ruby-openid/pull/111
* Fixed example server.
  See https://github.com/openid/ruby-openid/pull/91
* Fixed tests.
  See https://github.com/openid/ruby-openid/pull/86
* Misc. changes to the CI setup.
  See
  - https://github.com/openid/ruby-openid/pull/110
  - https://github.com/openid/ruby-openid/pull/108
  - https://github.com/openid/ruby-openid/pull/107
2019-11-18 15:44:37 +00:00
adam
abbb30096f py-asn1: updated to 0.4.8
Revision 0.4.8:
- Added ability of combining `SingleValueConstraint` and
  `PermittedAlphabetConstraint` objects into one for proper modeling
  `FROM ... EXCEPT ...` ASN.1 clause.
2019-11-18 10:52:39 +00:00
adam
75e4c8d2cb py-OpenSSL: updated to 19.1.0
19.1.0:
Backward-incompatible changes:
- Removed deprecated ContextType, ConnectionType, PKeyType, X509NameType, X509ReqType, X509Type, X509StoreType, CRLType, PKCS7Type, PKCS12Type, and NetscapeSPKIType aliases.
  Use the classes without the Type suffix instead.
- The minimum cryptography version is now 2.8 due to issues on macOS with a transitive dependency.

Deprecations:
- Deprecated OpenSSL.SSL.Context.set_npn_advertise_callback, OpenSSL.SSL.Context.set_npn_select_callback, and OpenSSL.SSL.Connection.get_next_proto_negotiated.
  ALPN should be used instead.

Changes:
- Support bytearray in SSL.Connection.send() by using cffi's from_buffer.
- The OpenSSL.SSL.Context.set_alpn_select_callback can return a new NO_OVERLAPPING_PROTOCOLS sentinel value
  to allow a TLS handshake to complete without an application protocol.
2019-11-18 10:51:31 +00:00
mef
58111ab329 regen distinfo 2019-11-17 21:44:34 +00:00
adam
f652dd6343 py-certbot: updated to 0.40.1
0.40.1:

Changed
Added back support for Python 3.4 to Certbot components and certbot-auto due to a bug when requiring Python 2.7 or 3.5+ on RHEL 6 based systems.
More details about these changes can be found on our GitHub repo.

0.40.0:

Changed
We deprecated support for Python 3.4 in Certbot and its ACME library. Support for Python 3.4 will be removed in the next major release of Certbot. certbot-auto users on RHEL 6 based systems will be asked to enable Software Collections (SCL) repository so Python 3.6 can be installed. certbot-auto can enable the SCL repo for you on CentOS 6 while users on other RHEL 6 based systems will be asked to do this manually.
--server may now be combined with --dry-run. Certbot will, as before, use the staging server instead of the live server when --dry-run is used.
--dry-run now requests fresh authorizations every time, fixing the issue where it was prone to falsely reporting success.
Updated certbot-dns-google to depend on newer versions of google-api-python-client and oauth2client.
The OS detection logic again uses distro library for Linux OSes
certbot.plugins.common.TLSSNI01 has been deprecated and will be removed in a future release.
CLI flags --tls-sni-01-port and --tls-sni-01-address have been removed.
The values tls-sni and tls-sni-01 for the --preferred-challenges flag are no longer accepted.
Removed the flags: --agree-dev-preview, --dialog, and --apache-init-script
acme.standalone.BaseRequestHandlerWithLogging and acme.standalone.simple_tls_sni_01_server have been deprecated and will be removed in a future release of the library.
certbot-dns-rfc2136 now use TCP to query SOA records.

Fixed
More details about these changes can be found on our GitHub repo.
2019-11-14 18:28:17 +00:00
adam
a9fd5884d4 py-google-auth: updated to 1.7.1
1.7.1:
Bug Fixes
* change 'internal_failure' condition to also use `error' field
2019-11-14 10:41:31 +00:00
adam
b770b1efcf py-argon2-cffi: updated to 19.2.0
19.2.0:
Backward-incompatible changes:
- Python 3.4 is not supported anymore.
  It has been unsupported by the Python core team for a while now and its PyPI downloads are negligible.
  It's very unlikely that ``argon2-cffi`` will break under 3.4 anytime soon, but we don't test it and don't ship binary wheels for it anymore.

Changes:
- The dependency on ``enum34`` is now protected using a PEP 508 marker.
  This fixes problems when the sdist is handled by a different interpreter version than the one running it.
2019-11-13 21:12:20 +00:00
adam
849a3cbedb py-trustme: updated to 0.5.3
Trustme 0.5.3:
Features
Added :attr:`CA.from_pem` to import an existing certificate authority; this allows migrating to trustme step-by-step.
2019-11-13 20:29:12 +00:00
wiz
6c1561fbd1 py-google-auth: update to 1.7.0.
v1.7.0

Implementation Changes

    Add retry loop for fetching authentication token if any 'Internal Failure' occurs (#368)
    Use cls parameter instead of class (#341)

New Features

    Add support for impersonated_credentials.Sign, IDToken (#348)
    Add downscoping to OAuth2 credentials (#309)

Dependencies

    Update dependency cachetools to v3 (#357)
    Update dependency rsa to v4 (#358)
    Set an upper bound on dependencies version (#352)
    Require a minimum version of setuptools (#322)

Documentation

    Add busunkim96 as maintainer (#373)
    Update user-guide.rst (#337)
    Fix typo in jwt docs (#332)
    Clarify which SA has Token Creator role (#330)

Internal / Testing Changes

    Change 'name' to distribution name (#379)
    Fix system tests, move to Kokoro (#372)
    Blacken (#375)
    Rename nox.py -> noxfile.py (#369)
    Add initial renovate config (#356)
    Use new pytest api to keep building with pytest 5 (#353)
2019-11-13 15:23:34 +00:00
adam
fbf99eeac8 py-mohawk: updated to 1.1.0
1.1.0:
Support passing file-like objects (those implementing .read(n)) as the content parameter for Resources. See mohawk.Sender for details.
2019-11-13 15:06:44 +00:00
wiz
57ade7f4c2 libssh: update to 0.92.
version 0.9.2 (released 2019-11-07)
  * Fixed libssh-config.cmake
  * Fixed issues with rsa algorithm negotiation (T191)
  * Fixed detection of OpenSSL ed25519 support (T197)
2019-11-13 11:49:08 +00:00
adam
b7390b9032 py-cryptodome: updated to 3.9.3
3.9.3:
* Align stack of functions using SSE2 intrinsics to avoid crashes,
  when compiled with gcc on 32-bit x86 platforms.

3.9.2:
New features
* Add Python 3.8 wheels for Mac.

Resolved issues
* Avoid allocating arrays of ``__m128i`` on the stack, to cope with buggy compilers.
* Remove blanket ``-O3`` optimization for gcc and clang, to cope with buggy compilers.
* Fix typing stubs for signatures.
* Deal with gcc installations that don't have ``x86intrin.h``.
2019-11-13 06:58:34 +00:00
markd
95420de397 KDE Frameworks update to 5.64.0
5.62.0

KWallet
  fix starting kwalletmanager, the desktop file name has a '5' in it

5.63.0

KWallet
  HiDPI support
2019-11-11 08:47:46 +00:00
adam
c95ce3bc7c py-cryptodome: updated to 3.9.1
3.9.1:
New features
* Add Python 3.8 wheels for Linux and Windows.

Resolved issues
* Minor speed-up when importing RSA.
2019-11-09 21:34:56 +00:00
adam
1b4a672dfe py-google-auth-oauthlib: updated to 0.4.1
0.4.1
Implementation Changes
Don't auto-generate code_verifier by default.

Internal / Testing Changes
Add renovate.json
2019-11-07 13:35:35 +00:00
adam
c8448a859f py-requests-oauthlib: updated to 1.3.0
1.3.0:
- Instagram compliance fix
- Added ``force_querystring`` argument to fetch_token() method on OAuth2Session
2019-11-07 13:34:36 +00:00
jnemeth
c6dd6fb5a5 add and enable opendnssec2 2019-11-07 03:28:19 +00:00
wiz
7eaef31fa1 libssh: update to 0.91.
version 0.9.1 (released 2019-10-25)
  * Added support for Ed25519 via OpenSSL
  * Added support for X25519 via OpenSSL
  * Added support for localuser in Match keyword
  * Fixed Match keyword to be case sensitive
  * Fixed compilation with LibreSSL
  * Fixed error report of channel open (T75)
  * Fixed sftp documentation (T137)
  * Fixed known_hosts parsing (T156)
  * Fixed build issue with MinGW (T157)
  * Fixed build with gcc 9 (T164)
  * Fixed deprecation issues (T165)
  * Fixed known_hosts directory creation (T166)
2019-11-06 14:37:39 +00:00
wiz
292f0cbf9f *: recursive bump for vala-0.46 2019-11-06 14:34:29 +00:00
he
11aaeb64d4 Make a separate package for OpenDNSSEC version 2.1.5.
OpenDNSSEC version 2 is not a drop-in replacement for OpenDNSSEC version 1.
See lib/opendnssec/README.md for migration instructions if you were
previously using version 1.

Upstream changes since OpenDNSSEC version 1.4.x:


OpenDNSSEC 2.1.5 - 2019-11-05

* SUPPORT-245: Resolve memory leak in signer introduced in 2.1.4.
* SUPPORT-244: Don't require Host and Port to be specified in conf.xml
  when migrating with a MySQL-based enforcer database backend.
* Allow for MySQL database to pre-exist when performing a migration,
  and be a bit more verbose during migration.
* New -f argument to ods-enforcer key list to show the full list of key states,
  similar to combinining -d and -v.
* Fix AllowExtraction tag in configuration file definition (thanks to raixie1A).
* SUPPORT-242: Skip over EDNS cookie option (thanks to Håvard Eidne and
  Ulrich-Lorenz Schlueter).
* SUPPORT-240: Prevent exit of enforcer daemon upon interrupted interaction
  with CLI commands.
* Correct some error messages (thanks to Jonas Berlin).


OpenDNSSEC 2.1.4 - 2019-05-16

* SUPPORT-229: Missing signatures for key new while signatures for old key
  still present under certain kasp policies, leading to bogus zones.
  Root cause for bug existed but made prominent since 2.1.3 release.
* OPENDNSSEC-942: time leap command for signer for debugging purposes
  only, not to be used on actual deployments.
* OPENDNSSEC-943: support build on MacOS with missing pthread barriers
* SUPPORT-229: fixed for too early retivement of signatures upon double
  rrsig key roll signing strategy.
* Strip build directory from doxygen docs
* remove bashisms from ods-kasp2html.in
* upgrade developer build scripts to softhsm-2.5.0 update some platform
  dependent files (only for developers).
* The ods-signer and ods-signerd man page should be in section 8 not 22
  Note that this might mean that package managers should remove the older
  man pages from the old location.


OpenDNSSEC 2.1.3 - 2017-08-10

* OPENDNSSEC-508: Tag <RolloverNotification> was not functioning correctly
* OPENDNSSEC-901: Enforcer would ignore <ManualKeyGeneration/> tag in conf.xml
* OPENDNSSEC-906: Tag <AllowExtraction> tag included from late 1.4 development
* OPENDNSSEC-894: repair configuration script to allow excluding the build of
                  the enforcer.
* OPENDNSSEC-890: Mismatching TTLs in record sets would cause bogus signatures.
* OPENDNSSEC-886: Improper time calculation on 32 bits machine causes purge
                  time to be skipped.
* OPENDNSSEC-904 / SUPPORT-216 autoconfigure fails to properly identify
                  functions in ssl library on certain distributions
                  causing tsig unknown algorithm hmac-sha256
* OPENDNSSEC-908: Warn when TTL exceeds KASP's MaxZoneTTL instead of capping.


OpenDNSSEC 2.1.1 - 2017-04-28

* OPENDNSSEC-882: Signerd exit code always non-zero.
* OPENDNSSEC-889: MySQL migration script didn't work for all database and
  MySQL versions.
* OPENDNSSEC-887: Segfault on extraneous <Interval> tag.
* OPENDNSSEC-880: Command line parsing for import key command failed.
* OPENDNSSEC-890: Bogus signatures upon wrong zone input when TTLs for
  same rrset are mismatching.


OpenDNSSEC 2.1.0 - 2017-02-22

* If listening port for signer is not set in conf file, the default value
  "15354" is used.
* Enforce and signconf tasks are now scheduled individually per zone. Resign
  per policy.
* OPENDNSSEC-450: Implement support for ECDSA P-256, P-384, GOST.
  Notice: SoftHSMv1 only supports RSA. SoftHSMv2 can be compiled with
  support for these.
* zone delete removes tasks associated with zone from queue.
* Show help for ods-enforcer-db-setup
* OPENDNSSEC-778: Double NSEC3PARAM record after resalt.
* In the kasp file, KSK/ZSK section, the algorithm length MUST be set now.
* signer clear <zone> would assert when signconf wasn't read yet.
* The <Interval> tag had been deprecated, and is now no longer allowed to
  be specified in the conf.xml for the Enforcer.
* OPENDNSSEC-864: ods-signer didn't print help. Also --version and --socket
  options where not processed.
* OPENDNSSEC-869: ds-seen command did not give error on badly formatted keytag.
* OPENDNSSEC-681: After fork() allow child process to pass error messages to
  parent so they can be printed to the console in case of failed start.
* OPENDNSSEC-849: Crash on free of part of IXFR structure.
* OPENDNSSEC-759: Reduce HSM access during ods-signerd start. Daemon should
  start quicker and earlier available for user input.
* OPENDNSSEC-479: Transferring zones and sending notifies through
  a bound socket , using the same interface as listener.
* Key cache is now shared between threads.
* OPENDNSSEC-858: Don't print "completed in x seconds" to stderr for enforcer
  commands.
* Various memory leaks
* OPENDNSSEC-601: signer and enforcer working dir would not properly
  fallback to default when not specified.
* OPENDNSSEC-503: Speed up initial signing and algorithm rollover.
* A bash autocompletion script is included in contrib for ods-enforcer and
  ods-signer.
* SUPPORT-208: Strip comment from key export.
* OPENDNSSEC-552: On key export don't print SHA1 DS by default.
  (introduced --sha1 option to key export.) Usage of sha1 is deprecated and
  will be removed from future versions of OpenDNSSEC.


OpenDNSSEC 2.0.1 - 2016-07-21

* Fixed crash and linking issue in ods-migrate.
* Fixed case where 2.0.0 could not read backup files from 1.4.10.
* Fixed bug in migration script where key state wasn't transformed properly.


OpenDNSSEC 2.0.0-1

* include db creation scripts in dist tarball needed for migration from 1.4.


OpenDNSSEC 2.0.0 - 2016-07-07

* OpenDNSSEC-99: Skip "are you sure" messages. Add --force and -f flag to
  ods-enforcer-db-setup and hsmutil purge
* OPENDNSSEC-808: Crash on query with empty query section (thanks
  Havard Eidnes)
* OpenDNSSEC-771: Signer. Do not log warning on deleting a missing
  NSEC3PARAM RR.
* OPENDNSSEC-801: Set AA flag on outgoing AXFR.
* SUPPORT-191: Regression, Must accept notify without SOA (thanks
  Christos Trochalakis)


OpenDNSSEC 2.0b1 - 2016-04-14

First public release of OpenDNSSEC.  Initial pre-releases have been
made to a smaller audience, this pre-release is explicitly made available
to all.  At this moment, there are no known functional bugs.  There are
naturally issues, especially to make working with OpenDNSSEC easier, however
none should prevent you to use OpenDNSSEC in production for the average
case, even though this is a pre-release.  Which is because of the still
limited documentation, and is not being run in production yet.

* The enforcer can no longer be run on a single policy at a time
  anymore.  An enforce run will always process all zones.
* The key generate method is at this time not available.
* The key export method will not allow you to export keys for all zones
  at once (--all flag) or for a particular type of key (--keystate).
  It will not export ZSK keys.
* The zonelist.xml in etc/opendnssec is no longer updated automatically,
  and by default works as if the --no-xml flag was specified.  Use
  --xml to the zone add command to update the zonelist.xml.  If updating
  the zonelist fails, the zone will still be added and not updated in
  the xml with future zone adds.
* Plugins directory renamed to contrib.
* Default signer working directory renamed from tmp to signer.
* Configure option --with-database-backend renamed --with-enforcer-database
* Zones on a manual rollover policy will not get a key assigned to them
  immediately.


OpenDNSSEC 2.0.0a5

Project transfer to NLnetLabs, performing code drop as-is for evaluation
purposes only.


OpenDNSSEC 2.0.0a4 (EnforcerNG branch)

* SUPPORT-72: Improve logging when failed to increment serial in case
  of key rollover and serial value "keep" [OPENDNSSEC-461].
* SUPPORT-114: libhsm: Optimize storage in HSM by deleting the public
  key directly if SkipPublicKey is used [OPENDNSSEC-573].
* OPENDNSSEC-106: Add 'ods-enforcerd -p <policy>' option. This prompts the
  enforcer to run once and only process the specified policy and associated
  zones.
* OPENDNSSEC-330: NSEC3PARAM TTL can now be optionally configured in kasp.xml.
  Default value remains PT0S.
* OPENDNSSEC-390: ods-ksmutil: Add an option to the 'ods-ksmutil key ds-seen'
  command so the user can choose not to notify the enforcer.
* OPENDNSSEC-430: ods-ksmutil: Improve 'zone add' - Zone add command
  could warn if a specified zone file or adapter file does not exits.
* OPENDNSSEC-431: ods-ksmutil: Improve 'zone add' - Support default <input>
  and <output> values for DNS adapters.
* OPENDNSSEC-454: ods-ksmutil: Add option for 'ods-ksmutil key import' to
  check if there is a matching key in the repository before import.
* OPENDNSSEC-281: Enforcer NG: Commandhandler sometimes unresponsive.
* OPENDNSSEC-276, Enforcer NG: HSM initialized after fork().
* OPENDNSSEC-330: Signer Engine: NSEC3PARAM TTL is default TTL again, to
  prevent bad caching effects on resolvers.
* OPENDNSSEC-428: Add option for 'ods-ksmutil key generate' to take
  number of zones as a parameter
* OPENDNSSEC-515: Signer Engine: Don't replace tabs in RR with whitespace.

Bugfixes:
* OPENDNSSEC-435: Signer Engine: Fix a serious memory leak in signature
  cleanup.
* OPENDNSSEC-463: Signer Engine: Duration PT0S is now printed correctly.
* OPENDNSSEC-466: Signer Engine: Created bad TSIG signature when falling back
  to AXFR.
* OPENDNSSEC-467: Signer Engine: After ods-signer clear, signer should not use
  inbound serial.


OpenDNSSEC 2.0.0a3 (EnforcerNG branch) - 2012-06-18
Bugfixes:
* SUPPORT-66: Signer Engine: Fix file descriptor leak in case of TCP write
  error [OPENDNSSEC-427].
* SUPPORT-71: Signer Engine: Fix double free crash in case of HSM connection
  error during signing [OPENDNSSEC-444].
* OPENDNSSEC-401: 'ods-signer sign <zone> --serial <nr>' command produces seg
  fault when run directly on command line (i.e. not via interactive mode)
* OPENDNSSEC-440: 'ods-ksmutil key generate' and the enforcer can create
  too many keys if there are keys already available and the KSK and ZSK use
  same algorithm and length
* OPENDNSSEC-424: Signer Engine: Respond to SOA queries from file instead
  of memory. Makes response non-blocking.
* OPENDNSSEC-425 Change "hsmutil list" output so that the table header goes
  to stdout not stderr
* OPENDNSSEC-438: 'ods-ksmutil key generate' and the enforcer can create
  too many keys for <SharedKeys/> policies when KSK and ZSK use same
  algorithm and length
* OPENDNSSEC-443: ods-ksmutil: Clean up of hsm connection handling
* Signer Engine: Improved Inbound XFR checking.
* Signer Engine: Fix double free corruption in case of adding zone with
  DNS Outbound Adapters and NotifyCommand enabled.
* Enforcer: Limit number of pregenerated keys when using <SharedKeys>.
* Enforcer: MySQL database backend implemented.
* Enforcer: New directive <MaxZoneTTL> to make safe assumptions about
  zonefile.
* Enforcer: New zone add command, allow specifying adapters.
* Enforcer: New zone del command, use --force for still signed zones.
* Enforcer: Pre-generate keys on the HSM.
* Enforcer: SQLite database backend implemented.
* OPENDNSSEC-247: Signer Engine: TTL on NSEC3 was not updated on SOA
  Minimum change.

Bugfixes:
* OPENDNSSEC-481: libhsm: Fix an off-by-one length check error.
* OPENDNSSEC-482: libhsm: Improved cleanup for C_FindObjects.
2019-11-06 13:44:38 +00:00
ng0
32270bbf5f Add security/go-xxhash version 2.1.0
Go implementation of the 64-bit xxHash algorithm (XXH64).

This implementation provides a fast pure-Go implementation
and an even faster assembly implementation for amd64.
2019-11-06 11:26:49 +00:00
he
b6e5076c82 Add softhsm2. 2019-11-06 10:15:32 +00:00
he
5667fac09c Add SoftHSM version 2.5.0.
SoftHSM2 is not a drop-in replacement for SoftHSM version 1, so this
is added as a separate package.  See softhsm2-migrate(1) for
migration instructions.

Upstream changes since SoftHSM version 1.x:

SoftHSM 2.5.0 - 2018-09-24

* Issue #323: Support for EDDSA with vendor defined mechanisms.
  (Patch from Francis Dupont)
* Issue #362: CMake Build System Support for SoftHSM.
  (Patch from Constantine Grantcharov)
* Issue #368: Support migrating 32-bit SoftHSMv1 DB on 64-bit system (LP64).
* Issue #385: Default is not to build EDDSA since it has not been released in
  OpenSSL.
* Issue #387: Windows: Add VS2017 detection to Configure.py.
  (Patch from Jaroslav Imrich)
* Issue #412: Replace PKCS11 headers with a version from p11-kit.
  (Patch from Alexander Bokovoy)

Bugfixes:
* Issue #366: Support cross-compilation.
  (Patch from Michael Weiser)
* Issue #377: Duplicate symbol error with custom p11test.
* Issue #386: Use RDRAND in OpenSSL if that engine is available.
* Issue #388: Update DBTests.cpp to fix x86 test failure.
  (Patch from tcely)
* Issue #393: Not setting CKA_PUBLIC_KEY_INFO correctly.
  (Patch from pkalapat)
* Issue #401: Wrong key and keyserver mentioned in installation documentation.
  (Patch from Berry A.W. van Halderen)
* Issue #408: Remove mutex callbacks after C_Finalize().
  (Patch from Alexander Bokovoy)


SoftHSM 2.4.0 - 2018-02-27

* Issue #135: Support PKCS#8 for GOST.
* Issue #140: Support for CKA_ALLOWED_MECHANISMS.
  (Patch from Brad Hess)
* Issue #141: Support CKA_ALWAYS_AUTHENTICATE for private key objects.
* Issue #220: Support for CKM_DES3_CMAC and CKM_AES_CMAC.
* Issue #226: Configuration option for Windows build to enable build with
  static CRT (/MT).
* Issue #325: Support for CKM_AES_GCM.
* Issue #334: Document that initialized tokens will be reassigned to another
  slot (based on the token serial number).
* Issue #335: Support for CKM_RSA_PKCS_PSS.
  (Patch from Nikos Mavrogiannopoulos)
* Issue #341: Import AES keys with softhsm2-util.
  (Patch from Pavel Cherezov)
* Issue #348: Document that OSX needs pkg-config to detect cppunit.
* Issue #349: softhsm2-util will check the configuration and report any
  issues before loading the PKCS#11 library.

Bugfixes:
* Issue #345: Private objects are presented to security officer in search
  results.
* Issue #358: Race condition when multiple applications are creating and
  reading object files.


SoftHSM 2.3.0 - 2017-07-03

* Issue #130: Upgraded to PKCS#11 v2.40.
  * Minor changes to some return values.
  * Added CKA_DESTROYABLE to all objects. Used by C_DestroyObject().
  * Added CKA_PUBLIC_KEY_INFO to certificates, private, and public key
    objects. Will be accepted from application, but SoftHSM will
    currently not calculate it.
* Issue #142: Support for CKM_AES_CTR.
* Issue #155: Add unit tests for SessionManager.
* Issue #189: C_DigestKey returns CKR_KEY_INDIGESTIBLE when key
  attribute CKA_EXTRACTABLE = false. Whitelist SHA algorithms to allow
  C_DigestKey in this case.
* Issue #225: Show slot id after initialization.
* Issue #247: Run AppVeyor (Windows CI) for each PR and merge.
* Issue #257: Set CKA_DECRYPT/CKA_ENCRYPT flags on key import to true.
  (Patch from Martin Domke)
* Issue #261: Add support for libeaycompat lib for FIPS on Windows.
  (Patch from Matt Hauck)
* Issue #262: Support importing ECDSA P-521 in softhsm-util.
* Issue #276: Support for Botan 2.0.
* Issue #279: Editorial changes from Mountain Lion to Sierra.
  (Patch from Mike Neumann)
* Issue #283: More detailed error messages when initializing SoftHSM.
* Issue #285: Support for LibreSSL.
  (Patch from Alon Bar-Lev)
* Issue #286: Update .gitignore.
  (Patch from Alon Bar-Lev)
* Issue #291: Change to enable builds and reports on new Jenkinks
  environment.
* Issue #293: Detect cppunit in autoconf.
  (Patch from Alon Bar-Lev)
* Issue #309: CKO_CERTIFICATE and CKO_PUBLIC_KEY now defaults to
  CKA_PRIVATE=false.
* Issue #314: Update README with information about logging.
* Issue #330: Adjust log levels for failing to enumerate object store.
  (Patch from Nikos Mavrogiannopoulos)

Bugfixes:
* Issue #216: Better handling of CRYPTO_set_locking_callback() for OpenSSL.
* Issue #265: Fix deriving shared secret with ECC.
* Issue #280: HMAC with sizes less than L bytes is strongly discouraged.
  Set a lower bound equal to L bytes in ulMinKeySize and check it when
  initializing the operation.
* Issue #281: Fix test of p11 shared library.
  (Patch from Lars Silvén)
* Issue #289: Minor fix of 'EVP_CipherFinal_ex'.
  (Patch from Viktor Tarasov)
* Issue #297: Fix build with cppunit.
  (Patch from Ludovic Rousseau)
* Issue #302: Export PKCS#11 symbols from the library.
  (Patch from Ludovic Rousseau)
* Issue #305: Zero pad key to fit the block in CKM_AES_KEY_WRAP.
* Issue #313: Detecting CppUnit when using Macports.
  (Patch from mouse07410)


SoftHSM 2.2.0 - 2016-12-05

* Issue #143: Delete a token using softhsm2-util.
* Issue #185: Change access mode bits for /var/lib/softhsm/tokens/
  to 1777. All users can now create tokens, but only access their own.
  (Patch from Rick van Rein)
* Issue #186: Reinitializing a token will now keep the token, but all
  token objects are deleted, the user PIN is removed and the token
  label is updated.
* Issue #190: Support for OpenSSL 1.1.0.
* Issue #198: Calling C_GetSlotList with NULL_PTR will make sure that
  there is always a slot with an uninitialized token available.
* Issue #199: The token serial number will be used when setting the slot
  number. The serial number is set after the token has been initialized.
  (Patch from Lars Silvén)
* Issue #203: Update the command utils to use the token label or serial
  to find the token and its slot number.
* Issue #209: Possibility to test other PKCS#11 implementations with the
  CppUnit test.
  (Patch from Lars Silvén)
* Issue #223: Mark public key as non private by default.
  (Patch from Nikos Mavrogiannopoulos)
* Issue #230: Install p11-kit module, to disable use --disable-p11-kit.
  (Patch from David Woodhouse)
* Issue #237: Add windows continuous integration build.
  (Patch from Peter Polacko)

Bugfixes:
* Issue #201: Missing new source file and test configuration in the
  Windows build project.
* Issue #205: ECDSA P-521 support for OpenSSL and better test coverage.
* Issue #207: Fix segmentation faults in loadLibrary function.
  (Patch from Jaroslav Imrich)
* Issue #215: Update the Homebrew install notes for OSX.
* Issue #218: Fix build warnings.
* Issue #235: Add the libtool install command for OSX.
  (Patch from Mark Wylde)
* Issue #236: Use GetEnvironmentVariable instead of getenv on Windows.
  (Patch from Jaroslav Imrich)
* Issue #239: Crash on module unload with OpenSSL.
  (Patch from David Woodhouse)
* Issue #241: Added EXTRALIBS to Windows utils project.
  (Patch from Peter Polacko)
* Issue #250: C++11 not detected.
* Issue #255: API changes in Botan 1.11.27.
* Issue #260: Fix include guard to check WITH_FIPS.
  (Patch from Matt Hauck)
* Issue #268: p11test fails on 32-bit systems.
* Issue #270: Build warning about "converting a string constant".
* Issue #272: Fix C++11 check to look for unique_ptr.
  (Patch from Matt Hauck)


SoftHSM 2.1.0 - 2016-03-14

* Issue #136: Improved guide and build scripts for Windows.
  (Thanks to Jaroslav Imrich)
* Issue #144: The password prompt in softhsm2-util can now be
  interrupted (ctrl-c).
* Issue #166: Add slots.removable config option.
  (Patch from Sumit Bose)
* Issue #180: Windows configure script improvements.
  (Patch from Arnaud Grandville)

Bugfixes:
* Issue #128: Prioritize the return values in C_GetAttributeValue.
  (Patch from Nicholas Wilson)
* Issue #129: Fix errors reported by Visual Studio 2015.
  (Patch from Jaroslav Imrich)
* Issue #132: Handle the CKA_CHECK_VALUE correctly for certificates
  and symmetric key objects.
* Issue #154: Fix the Windows build and destruction order of objects.
  (Patch from Arnaud Grandville)
* Issue #162: Not possible to create certificate objects containing
  CKA_CERTIFICATE_CATEGORY, CKA_NAME_HASH_ALGORITHM, or
  CKA_JAVA_MIDP_SECURITY_DOMAIN.
* Issue #163: Do not attempt decryption of empty byte strings.
  (Patch from Michal Kepien)
* Issue #165: Minor changes after a PVS-Studio code analysis, and
  C_EncryptUpdate crash if no ciphered data is produced.
  (Patch from Arnaud Grandville)
* Issue #169: One-byte buffer overflow in call to EVP_DecryptUpdate.
* Issue #171: Problem while closing library that is initialized but
  improperly finalized.
* Issue #173: Adjust return values for the template parsing.
* Issue #174: C_DeriveKey() error with leading zero bytes.
* Issue #177: CKA_NEVER_EXTRACTABLE set to CK_FALSE on objects
  created with C_CreateObject.
* Issue #182: Resolve compiler warning.
  (Patch from Josh Datko)
* Issue #184: Stop discarding the global OpenSSL libcrypto state.
  (Patch from Michal Trojnara)
* SOFTHSM-123: Fix library cleanup on BSD.


SoftHSM 2.0.0 - 2015-07-17

* SOFTHSM-121: Test cases for C_DecryptUpdate/C_DecryptFinal.
* Support C_DecryptUpdate/C_DecryptFinal for symmetric algorithms.
  (Patch from Thomas Calderon)

Bugfixes:
* SOFTHSM-120: Segfault after renaming variables.


SoftHSM 2.0.0b3 - 2015-04-17

* SOFTHSM-113: Support for Botan 1.11.15
* SOFTHSM-119: softhsm2-util: Support ECDSA key import
  (Patch from Magnus Ahltorp)
* SUPPORT-139: Support deriving generic secrets, DES, DES2, DES3, and AES.
  Using DH, ECDH or symmetric encryption.

Bugfixes:
* SOFTHSM-108: A marked as trusted certificate cannot be imported.
* SOFTHSM-109: Unused parameter and variable warnings.
* SOFTHSM-110: subdir-objects warnings from autoreconf.
* SOFTHSM-111: Include FIPS-NOTES.md in dist.
* SOFTHSM-112: CKM_AES_KEY_WRAP* conflict in pkcs11.h.
* SOFTHSM-114: Fix memory leak in a test script.
* SOFTHSM-115: Fix static analysis warnings.
* SUPPORT-154: A marked as non-modifiable object cannot be generated.
* SUPPORT-155: auto_ptr is deprecated in C++11, use unique_ptr.
* SUPPORT-157: Derived secrets were truncated after encryption and
  could thus not be decrypted.
* Mutex should call MutexFactory wrapper functions.
  (Patch from Jerry Lundstrom)
* Return detailed error message to loadLibrary().
  (Patch from Petr Spacek)


SoftHSM 2.0.0b2 - 2014-12-28

* SOFTHSM-50: OpenSSL FIPS support.
* SOFTHSM-64: Updated build script for Windows.
* SOFTHSM-100: Use --free with softhsm2-util to initialize the first
  free token.
* SOFTHSM-103: Allow runtime configuration of log level.
* SOFTHSM-107: Support for CKM_<symcipher>_CBC_PAD.
* Add support for CKM_RSA_PKCS_OAEP key un/wrapping.
  (Patch from Petr Spacek)
* Use OpenSSL EVP interface for AES key wrapping.
  (Patch from Petr Spacek)
* Allow reading configuration file from user's home directory.
  (Patch from Nikos Mavrogiannopoulos)

Bugfixes:
* SOFTHSM-102: C_DeriveKey() uses OBJECT_OP_GENERATE.
* Coverity found a number of issues.


SoftHSM 2.0.0b1 - 2014-09-10

* SOFTHSM-84: Check that all mandatory attributes are given during
  the creation process.
* SOFTHSM-92: Enable -fvisibility=hidden on per default
* SUPPORT-137: Implement C_EncryptUpdate and C_EncryptFinal
  (Patch from Martin Paljak)
* Add support for CKM_RSA_PKCS key un/wrapping
  (Patch from Petr Spacek)

Bugfixes:
* SOFTHSM-66: Attribute handling when using multiple threads
* SOFTHSM-93: Invalid C++ object recycling.
* SOFTHSM-95: umask affecting the calling application.
* SOFTHSM-97: Check if Botan has already been initialized.
* SOFTHSM-98: Handle mandatory attributes for DSA, DH, and ECDSA
  correctly.
* SOFTHSM-99: Binary encoding of GOST values.
* SUPPORT-136: softhsm2-keyconv creates files with sensitive material
  in insecure way.


SoftHSM 2.0.0a2 - 2014-03-25

* SOFTHSM-68: Display a better configure message when there is a
  version of Botan with a broken ECC/GOST/OID implementation.
* SOFTHSM-70: Improved handling of the database backend.
* SOFTHSM-71: Supporting Botan 1.11.
* SOFTHSM-76: Do not generate RSA keys smaller than 1024 bit when
  using the Botan crypto backend.
* SOFTHSM-83: Support CKA_VALUE_BITS for CKK_DH private key object.
* SOFTHSM-85: Rename libsofthsm.so to libsofthsm2.so and prefix the
  command line utilties with softhsm2-.
* SOFTHSM-89: Use constants and not strings for signaling algorithms.
* SUPPORT-129: Possible to use an empty template in C_GenerateKey.
  The class and key type are inherited from the generation mechanism.
  Some mechanisms do however require a length attribute. [SOFTHSM-88]
* SUPPORT-131: Support RSA-PSS using SHA1, SHA224, SHA256, SHA384,
  or SHA512. [SOFTHSM-87]

Bugfixes:
* SOFTHSM-39: Fix 64 bit build on sparc sun4v.
* SOFTHSM-69: GOST did not work when you disabled ECC.
* SOFTHSM-78: Correct the attribute checks for a number of objects.
* SOFTHSM-80: Prevent segfault in OpenSSL GOST HMAC code.
* SOFTHSM-91: Fix a warning from static code analysis.
* Fixed a number of memory leaks.


SoftHSM 2.0.0a1 - 2014-02-10

This is the first alpha release of SoftHSMv2. It focuses on a higher
level of security by encrypting sensitive information and using
unswappable memory. There is also a more generalized crypto backend,
where you can use Botan or OpenSSL.
2019-11-06 10:11:41 +00:00
rillig
e155a5488b security/pinentry: fix unknown configure option 2019-11-05 18:55:18 +00:00
taca
c1e1a007b3 security/ruby-net-scp: update to 2.0.0
Update to ruby-net-scp to 2.0.0.

o pkgsr change:

  * Add "USE_LANGUAGES=	# none".


=== 2.0.0

* NetSSH 5.* support
2019-11-05 15:28:43 +00:00
taca
991f7405c2 security/ruby-net-ssh: really update to 5.2.0
Really update to 5.2.0, previous was 5.1.0.
2019-11-05 15:25:14 +00:00
taca
937a28d4f7 security/ruby-net-ssh: update to 5.2.0
Update ruby-net-ssh to 5.2.0.

o pkgsr change:

  * Add "USE_LANGUAGES=	# none".


=== 5.2.0

=== 5.2.0.rc3

  * Fix check_host_ip read from config
  * Support ssh-ed25519 in kown hosts

=== 5.2.0.rc2

  * Read check_host_ip from ssh config files

=== 5.2.0.rc1

  * Interpret * and ? in know_hosts file [Romain Tartière, #660]
  * New :check_host_ip so ip checking can be disabled in known hosts [Romain Tartière, #656]

=== 5.1.0

=== 5.1.0.rc1

  * Support new OpenSSH private key format for rsa - bcrypt for rsa (ed25519 already supported) [#646]
  * Support IdentityAgent is ssh config [Frank Groeneveld, #645]
  * Improve Match processin in ssh config [Aleksandrs Ļedovskis, #642]
  * Ignore signature verification when verify_host_key is never [Piotr Kliczewski, #641]
  * Alg preference was changed to prefer stronger encryptions  [Tray, #637]
2019-11-05 15:22:32 +00:00
rillig
9fd786bb11 security: align variable assignments
pkglint -Wall -F --only aligned --only indent -r

No manual corrections.
2019-11-04 21:12:51 +00:00
rillig
c18ce611ff mk: make BROKEN a list of lines, like PKG_FAIL_REASON
Packages defined the variable BROKEN inconsistently. Some added quotes,
like they are required in PKG_FAIL_REASON, some omitted them.

Now all packages behave the same, and pkglint will flag future mistakes.
2019-11-04 17:47:29 +00:00
wiz
d17284ce9c libtasn1: honor LDFLAGS 2019-11-04 08:13:50 +00:00
rillig
7942fb23fc security/log2timeline: remove ignored lines from package Makefile
Since the variables assignments all use the = operator instead of +=, all
except the last one are ignored. These are not needed anyway since Perl
modules don't need to have a correct interpreter.
2019-11-02 13:58:32 +00:00
triaxx
8f0bd114d9 sudo: add missing files in PLIST
pkgsrc changes:
---------------
* Add missing locale files in PLIST.
* Bump revision.
2019-10-31 14:43:13 +00:00
nia
7bd4fee3a5 kpcli: Update to 3.3
2019-Aug-16 v3.3 - Allow open and save with key-only authentication,
		    as requested in SF bug #35.
		 - Prevent "multiple entries titled" warning in the
		    /_found/ area, as reports in SF bug #36.
		 - Fix two bugs affecting Windows, as reported in
		    SourceForge patch #11.
		 - Mark /_found entries as "*OLD" when listed, if
		    they reside in a group named old. Addresses an
		    issue where searches turn up "old" accounts.
2019-10-31 14:09:09 +00:00
jperkin
0730e40706 clamav: Fix install with the milter option enabled. 2019-10-31 11:22:15 +00:00
nia
46a67727a4 keepassxc: Add SUPERSEDES 2019-10-29 15:46:54 +00:00
nia
096260f134 Remove security/keepassx0 successor security/keepassxc 2019-10-29 09:17:37 +00:00
bouyer
b5525405d9 Add qt5-qtkeychain 2019-10-28 18:51:37 +00:00
agc
57a461e2ef Import libstark-20191018 into the packages collection
The libSTARK library implements scalable and transparent argument of
	knowledge (STARK) systems.  These systems can be executed with, or
	without, zero knowledge (ZK), and may be designed as either
	interactive or non-interactive protocols.  The theoretical
	constructions which this library implements are described in detail in
	the zk-STARK paper:

	Scalable, transparent, and post-quantum secure computational integrity
	Eli Ben-Sasson and Iddo Bentov and Yinon Horesh and Michael Riabzev

		https://eprint.iacr.org/2018/046
2019-10-28 17:46:58 +00:00
bouyer
610f273032 Add qt5-qtkeychain version 0.9.1
QtKeychain is a Qt API to store passwords and other secret data
securely. How the data is stored depends on the platform.
2019-10-27 18:20:00 +00:00
kamil
b5ec61edb7 xca: Switch from qt4 to qt5
Address a selection of warnings from pkglint.
Fix perl usage.

Drop options as they were qt4 specific.
2019-10-27 12:08:29 +00:00
nia
fdbb1b2c90 Remove security/keepassx successor security/keepassxc 2019-10-25 11:14:32 +00:00
spz
5d78b2305b update libtasn1 to version 4.14:
* Noteworthy changes in release 4.14 (released 2019-07-21) [stable]
- New #defines for version checking: ASN1_VERSION_MAJOR, ASN1_VERSION_MINOR,
  ASN1_VERSION_PATCH, ASN1_VERSION_NUMBER. The next release will switch
  to semantic version semantics.
- Simplify ordering of SET OF elements by using qsort().
- Marked explicitly const uses of asn1_node with the introduction
  of the (compatible) asn1_node_const type.
- Limit recursion in _asn1_expand_object_id() to detect infinite
  recursion in incorrect .asn files (#4).
- asn1_array2tree(): fixed thread safety issues.
- Several fixes in gtk-doc generation.

fixes CVE-2018-1000654
2019-10-25 06:03:12 +00:00
he
41e9b98616 Upgrade security/vault to version 1.2.3.
Pkgsrc changes:
 * Fix == in shell script test.
 * Add some patches to make this build on NetBSD.

Upstream changes:

## 1.2.3 (September 12, 2019)

FEATURES:
 * Oracle Cloud (OCI) Integration: Vault now support using Oracle
   Cloud for storage, auto unseal, and authentication.

IMPROVEMENTS:
 * auth/jwt: Groups claim matching now treats a string response
   as a single element list [JWT-63]
 * auth/kubernetes: enable better support for projected tokens
   API by allowing user to specify issuer [GH-65]
 * auth/pcf: The PCF auth plugin was renamed to the CF auth plugin,
   maintaining full backwards compatibility [GH-7346]
 * replication: Premium packages now come with unlimited performance
   standby nodes

BUG FIXES:
 * agent: Allow batch tokens and other non-renewable tokens to be
   used for agent operations [GH-7441]
 * auth/jwt: Fix an error where newer (v1.2) token_* configuration
   parameters were not being applied to tokens generated using
   the OIDC login flow [JWT-67]
 * seal/transit: Allow using Vault Agent for transit seal operations
   [GH-7441]
 * storage/couchdb: Fix a file descriptor leak [GH-7345]
 * ui: Fix a bug where the status menu would disappear when trying
   to revoke a token [GH-7337]
 * ui: Fix a regression that prevented input of custom items in
   search-select [GH-7338]
 * ui: Fix an issue with the namespace picker being unable to
   render nested namespaces named with numbers and sorting of
   namespaces in the picker [GH-7333]

## 1.2.2 (August 15, 2019)

CHANGES:
 * auth/pcf: The signature format has been updated to use the
   standard Base64 encoding instead of the URL-safe variant.
   Signatures created using the previous format will continue to
   be accepted [PCF-27]
 * core: The http response code returned when an identity token
   key is not found has been changed from 400 to 404

IMPROVEMENTS:
 * identity: Remove 512 entity limit for groups [GH-7317]

BUG FIXES:
 * auth/approle: Fix an error where an empty token_type string
   was not being correctly handled as TokenTypeDefault [GH-7273]
 * auth/radius: Fix panic when logging in [GH-7286]
 * ui: the string-list widget will now honor multiline input [GH-7254]
 * ui: various visual bugs in the KV interface were addressed [GH-7307]
 * ui: fixed incorrect URL to access help in LDAP auth [GH-7299]

1.2.1 (August 6th, 2019)

BUG FIXES:
 * agent: Fix a panic on creds pulling in some error conditions
   in aws and alicloud auth methods [GH-7238]
 * auth/approle: Fix error reading role-id on a role created
   pre-1.2 [GH-7231]
 * auth/token: Fix sudo check in non-root namespaces on create
   [GH-7224]
 * core: Fix health checks with perfstandbyok=true returning the
   wrong status code [GH-7240]
 * ui: The web CLI will now parse input as a shell string, with
   special characters escaped [GH-7206]
 * ui: The UI will now redirect to a page after authentication
   [GH-7088]
 * ui (Enterprise): The list of namespaces is now cleared when
   logging out [GH-7186]

## 1.2.0 (July 30th, 2019)

CHANGES:
 * Token store roles use new, common token fields for the values
   that overlap with other auth backends. period, explicit_max_ttl,
   and bound_cidrs will continue to work, with priority being
   given to the token_ prefixed versions of those parameters. They
   will also be returned when doing a read on the role if they
   were used to provide values initially; however, in Vault 1.4
   if period or explicit_max_ttl is zero they will no longer be
   returned. (explicit_max_ttl was already not returned if empty.)
 * Due to underlying changes in Go version 1.12 and Go > 1.11.5,
   Vault is now stricter about what characters it will accept in
   path names. Whereas before it would filter out unprintable
   characters (and this could be turned off), control characters
   and other invalid characters are now rejected within Go's HTTP
   library before the request is passed to Vault, and this cannot
   be disabled. To continue using these (e.g. for already-written
   paths), they must be properly percent-encoded (e.g. \r becomes
   %0D, \x00 becomes %00, and so on).
 * The user-configured regions on the AWSKMS seal stanza will now
   be preferred over regions set in the enclosing environment.
   This is a breaking change.
 * All values in audit logs now are omitted if they are empty.
   This helps reduce the size of audit log entries by not reproducing
   keys in each entry that commonly don't contain any value, which
   can help in cases where audit log entries are above the maximum
   UDP packet size and others.
 * Both PeriodicFunc and WALRollback functions will be called if
   both are provided. Previously WALRollback would only be called
   if PeriodicFunc was not set. See GH-6717 for details.
 * Vault now uses Go's official dependency management system, Go
   Modules, to manage dependencies. As a result to both reduce
   transitive dependencies for API library users and plugin authors,
   and to work around various conflicts, we have moved various
   helpers around, mostly under an sdk/ submodule. A couple of
   functions have also moved from plugin helper code to the api/
   submodule. If you are a plugin author, take a look at some of
   our official plugins and the paths they are importing for
   guidance.
 * AppRole uses new, common token fields for values that overlap
   with other auth backends. period and policies will continue to
   work, with priority being given to the token_ prefixed versions
   of those parameters. They will also be returned when doing a
   read on the role if they were used to provide values initially.
 * In AppRole, "default" is no longer automatically added to the
   policies parameter. This was a no-op since it would always be
   added anyways by Vault's core; however, this can now be explicitly
   disabled with the new token_no_default_policy field.
 * In AppRole, bound_cidr_list is no longer returned when reading
   a role
 * rollback: Rollback will no longer display log messages when it
   runs; it will only display messages on error.
 * Database plugins will now default to 4 max_open_connections
   rather than 2.

FEATURES:
 * Integrated Storage: Vault 1.2 includes a tech preview of a new
   way to manage storage directly within a Vault cluster. This
   new integrated storage solution is based on the Raft protocol
   which is also used to back HashiCorp Consul and HashiCorp Nomad.
 * Combined DB credential rotation: Alternative mode for the
   Combined DB Secret Engine to automatically rotate existing
   database account credentials and set Vault as the source of
   truth for credentials.
 * Identity Tokens: Vault's Identity system can now generate
   OIDC-compliant ID tokens. These customizable tokens allow
   encapsulating a signed, verifiable snapshot of identity
   information and metadata. They can be use by other applications-even
   those without Vault authorization-as a way of establishing
   identity based on a Vault entity.
 * Pivotal Cloud Foundry plugin: New auth method using Pivotal
   Cloud Foundry certificates for Vault authentication.
 * ElasticSearch database plugin: New ElasticSearch database plugin
   issues unique, short-lived ElasticSearch credentials.
 * New UI Features: An HTTP Request Volume Page and new UI for
   editing LDAP Users and Groups have been added.
 * HA support for Postgres: PostgreSQL versions >= 9.5 may now
   but used as and HA storage backend.
 * KMIP secrets engine (Enterprise): Allows Vault to operate as
   a KMIP Server, seamlessly brokering cryptographic operations
   for traditional infrastructure.
 * Common Token Fields: Auth methods now use common fields for
   controlling token behavior, making it easier to understand
   configuration across methods.
 * Vault API explorer: The Vault UI now includes an embedded API
   explorer where you can browse the endpoints avaliable to you
   and make requests. To try it out, open the Web CLI and type
   api.

IMPROVEMENTS:
 * agent: Allow EC2 nonce to be passed in [GH-6953]
 * agent: Add optional namespace parameter, which sets the default
   namespace for the auto-auth functionality [GH-6988]
 * agent: Add cert auto-auth method [GH-6652]
 * api: Add support for passing data to delete operations via
   DeleteWithData [GH-7139]
 * audit/file: Dramatically speed up file operations by changing
   locking/marshaling order [GH-7024]
 * auth/jwt: A JWKS endpoint may now be configured for signature
   verification [JWT-43]
 * auth/jwt: A new verbose_oidc_logging role parameter has been
   added to help troubleshoot OIDC configuration [JWT-57]
 * auth/jwt: bound_claims will now match received claims that are
   lists if any element of the list is one of the expected values
   [JWT-50]
 * auth/jwt: Leeways for nbf and exp are now configurable, as is
   clock skew leeway [JWT-53]
 * auth/kubernetes: Allow service names/namespaces to be configured
   as globs [KUBEAUTH-58]
 * auth/token: Allow the support of the identity system for the
   token backend via token roles [GH-6267]
 * auth/token: Add a large set of token configuration options to
   token store roles [GH-6662]
 * cli: path-help now allows -format=json to be specified, which
   will output OpenAPI [GH-7006]
 * cli: Add support for passing parameters to vault delete operations
   [GH-7139]
 * cli: Add a log-format CLI flag that can specify either "standard"
   or "json" for the log format for the vault servercommand.
   [GH-6840]
 * cli: Add -dev-no-store-token to allow dev servers to not store
   the generated token at the tokenhelper location [GH-7104]
 * identity: Allow a group alias' canonical ID to be modified
 * namespaces: Namespaces can now be created and deleted from
   performance replication secondaries
 * plugins: Change the default for max_open_connections for DB
   plugins to 4 [GH-7093]
 * replication: Client TLS authentication is now supported when
   enabling or updating a replication secondary
 * secrets/database: Cassandra operations will now cancel on client
   timeout [GH-6954]
 * secrets/kv: Add optional delete_version_after parameter, which
   takes a duration and can be set on the mount and/or the metadata
   for a specific key [GH-7005]
 * storage/postgres: LIST now performs better on large datasets
   [GH-6546]
 * storage/s3: A new path parameter allows selecting the path
   within a bucket for Vault data [GH-7157]
 * ui: KV v1 and v2 will now gracefully degrade allowing a write
   without read workflow in the UI [GH-6570]
 * ui: Many visual improvements with the addition of Toolbars
   [GH-6626], the restyling of the Confirm Action component
   [GH-6741], and using a new set of glyphs for our Icon component
   [GH-6736]
 * ui: Lazy loading parts of the application so that the total
   initial payload is smaller [GH-6718]
 * ui: Tabbing to auto-complete in filters will first complete a
   common prefix if there is one [GH-6759]
 * ui: Removing jQuery from the application makes the initial JS
   payload smaller [GH-6768]

BUG FIXES:
 * audit: Log requests and responses due to invalid wrapping token
   provided [GH-6541]
 * audit: Fix bug preventing request counter queries from working
   with auditing enabled [GH-6767
 * auth/aws: AWS Roles are now upgraded and saved to the latest
   version just after the AWS credential plugin is mounted.
   [GH-7025]
 * auth/aws: Fix a case where a panic could stem from a malformed
   assumed-role ARN when parsing this value [GH-6917]
 * auth/aws: Fix an error complaining about a read-only view that
   could occur during updating of a role when on a performance
   replication secondary [GH-6926]
 * auth/jwt: Fix a regression introduced in 1.1.1 that disabled
   checking of client_id for OIDC logins [JWT-54]
 * auth/jwt: Fix a panic during OIDC CLI logins that could occur
   if the Vault server response is empty [JWT-55]
 * auth/jwt: Fix issue where OIDC logins might intermittently fail
   when using performance standbys [JWT-61]
 * identity: Fix a case where modifying aliases of an entity could
   end up moving the entity into the wrong namespace
 * namespaces: Fix a behavior (currently only known to be benign)
   where we wouldn't delete policies through the official functions
   before wiping the namespaces on deletion
 * secrets/database: Escape username/password before using in
   connection URL [GH-7089]
 * secrets/pki: Forward revocation requests to active node when
   on a performance standby [GH-7173]
 * ui: Fix timestamp on some transit keys [GH-6827]
 * ui: Show Entities and Groups in Side Navigation [GH-7138]
 * ui: Ensure dropdown updates selected item on HTTP Request
   Metrics page

## 1.1.4/1.1.5 (July 25th/30th, 2019)

NOTE:

Although 1.1.4 was tagged, we realized very soon after the tag was
publicly pushed that an intended fix was accidentally left out. As
a result, 1.1.4 was not officially announced and 1.1.5 should be
used as the release after 1.1.3.

IMPROVEMENTS:
 * identity: Allow a group alias' canonical ID to be modified
 * namespaces: Improve namespace deletion performance [GH-6939]
 * namespaces: Namespaces can now be created and deleted from
   performance replication secondaries

BUG FIXES:
 * api: Add backwards compat support for API env vars [GH-7135]
 * auth/aws: Fix a case where a panic could stem from a malformed
   assumed-role ARN when parsing this value [GH-6917]
 * auth/ldap: Add use_pre111_group_cn_behavior flag to allow
   recovering from a regression caused by a bug fix starting in
   1.1.1 [GH-7208]
 * auth/aws: Use a role cache to avoid separate locking paths
   [GH-6926]
 * core: Fix a deadlock if a panic happens during request handling
   [GH-6920]
 * core: Fix an issue that may cause key upgrades to not be cleaned
   up properly [GH-6949]
 * core: Don't shutdown if key upgrades fail due to canceled
   context [GH-7070]
 * core: Fix panic caused by handling requests while vault is
   inactive
 * identity: Fix reading entity and groups that have spaces in
   their names [GH-7055]
 * identity: Ensure entity alias operations properly verify
   namespace [GH-6886]
 * mfa: Fix a nil pointer panic that could occur if invalid Duo
   credentials were supplied
 * replication: Forward step-down on perf standbys to match HA
   behavior
 * replication: Fix various read only storage errors on performance
   standbys
 * replication: Stop forwarding before stopping replication to
   eliminate some possible bad states
 * secrets/database: Allow cassandra queries to be cancled [GH-6954]
 * storage/consul: Fix a regression causing vault to not connect
   to consul over unix sockets [GH-6859]
 * ui: Fix saving of TTL and string array fields generated by Open
   API [GH-7094]

## 1.1.3 (June 5th, 2019)

IMPROVEMENTS:
 * agent: Now supports proxying request query parameters [GH-6772]
 * core: Mount table output now includes a UUID indicating the
   storage path [GH-6633]
 * core: HTTP server timeout values are now configurable [GH-6666]
 * replication: Improve performance of the reindex operation on
   secondary clusters when mount filters are in use
 * replication: Replication status API now returns the state and
   progress of a reindex

BUG FIXES:
 * api: Return the Entity ID in the secret output [GH-6819]
 * auth/jwt: Consider bound claims when considering if there is at least one
   bound constraint [JWT-49]
 * auth/okta: Fix handling of group names containing slashes [GH-6665]
 * cli: Add deprecated stored-shares flag back to the init command [GH-6677]
 * cli: Fix a panic when the KV command would return no data [GH-6675]
 * cli: Fix issue causing CLI list operations to not return proper format when
   there is an empty response [GH-6776]
 * core: Correctly honor non-HMAC request keys when auditing requests [GH-6653]
 * core: Fix the `x-vault-unauthenticated` value in OpenAPI for a number of
   endpoints [GH-6654]
 * core: Fix issue where some OpenAPI parameters were incorrectly listed as
   being sent as a header [GH-6679]
 * core: Fix issue that would allow duplicate mount names to be used [GH-6771]
 * namespaces: Fix behavior when using `root` instead of `root/` as the
   namespace header value
 * pki: fix a panic when a client submits a null value [GH-5679]
 * replication: Properly update mount entry cache on a secondary to apply all
   new values after a tune
 * replication: Properly close connection on bootstrap error
 * replication: Fix an issue causing startup problems if a namespace policy
   wasn't replicated properly
 * replication: Fix longer than necessary WAL replay during an initial reindex
 * replication: Fix error during mount filter invalidation on DR
   secondary clusters
 * secrets/ad: Make time buffer configurable [AD-35]
 * secrets/gcp: Check for nil config when getting credentials [SGCP-35]
 * secrets/gcp: Fix error checking in some cases where the returned value could
   be 403 instead of 404 [SGCP-37]
 * secrets/gcpkms: Disable key rotation when deleting a key [GCPKMS-10]
 * storage/consul: recognize `https://` address even if schema not specified
   [GH-6602]
 * storage/dynamodb: Fix an issue where a deleted lock key in DynamoDB (HA)
   could cause constant switching of the active node [GH-6637]
 * storage/dynamodb: Eliminate a high-CPU condition that could occur if an
   error was received from the DynamoDB API [GH-6640]
 * storage/gcs: Correctly use configured chunk size values [GH-6655]
 * storage/mssql: Use the correct database when pre-created schemas exist
   [GH-6356]
 * ui: Fix issue with select arrows on drop down menus [GH-6627]
 * ui: Fix an issue where sensitive input values weren't being saved to the
   server [GH-6586]
 * ui: Fix web cli parsing when using quoted values [GH-6755]
 * ui: Fix a namespace workflow mapping identities from external namespaces by
   allowing arbitrary input in search-select component [GH-6728]
 * core: Fix issue that would allow duplicate mount names to be used [GH-6771]
 * namespaces: Fix behavior when using `root` instead of `root/` as the
   namespace header value
 * pki: fix a panic when a client submits a null value [GH-5679]
 * replication: Properly update mount entry cache on a secondary to apply all
   new values after a tune
 * replication: Properly close connection on bootstrap error
 * replication: Fix an issue causing startup problems if a namespace policy
   wasn't replicated properly
 * replication: Fix longer than necessary WAL replay during an initial reindex
 * replication: Fix error during mount filter invalidation on DR
   secondary clusters
 * secrets/ad: Make time buffer configurable [AD-35]
 * secrets/gcp: Check for nil config when getting credentials [SGCP-35]
 * secrets/gcp: Fix error checking in some cases where the returned value could
   be 403 instead of 404 [SGCP-37]
 * secrets/gcpkms: Disable key rotation when deleting a key [GCPKMS-10]
 * storage/consul: recognize `https://` address even if schema not specified
   [GH-6602]
 * storage/dynamodb: Fix an issue where a deleted lock key in DynamoDB (HA)
   could cause constant switching of the active node [GH-6637]
 * storage/dynamodb: Eliminate a high-CPU condition that could occur if an
   error was received from the DynamoDB API [GH-6640]
 * storage/gcs: Correctly use configured chunk size values [GH-6655]
 * storage/mssql: Use the correct database when pre-created schemas exist
   [GH-6356]
 * ui: Fix issue with select arrows on drop down menus [GH-6627]
 * ui: Fix an issue where sensitive input values weren't being saved to the
   server [GH-6586]
 * ui: Fix web cli parsing when using quoted values [GH-6755]
 * ui: Fix a namespace workflow mapping identities from external namespaces by
   allowing arbitrary input in search-select component [GH-6728]

## 1.1.2 (April 18th, 2019)

This is a bug fix release containing the two items below. It is otherwise
unchanged from 1.1.1.

BUG FIXES:
 * auth/okta: Fix a potential dropped error [GH-6592]
 * secrets/kv: Fix a regression on upgrade where a KVv2 mount could fail to be
   mounted on unseal if it had previously been mounted but not written to
   [KV-31]

## 1.1.1 (April 11th, 2019)

SECURITY:
 * Given: (a) performance replication is enabled; (b) performance standbys are
   in use on the performance replication secondary cluster; and (c) mount
   filters are in use, if a mount that was previously available to a secondary
   is updated to be filtered out, although the data would be removed from the
   secondary cluster, the in-memory cache of the data would not be purged on
   the performance standby nodes. As a result, the previously-available data
   could still be read from memory if it was ever read from disk, and if this
   included mount configuration data this could result in token or lease

BUG FIXES:
 * agent: Allow auto-auth to be used with caching without having to define any
   sinks [GH-6468]
 * agent: Disallow some nonsensical config file combinations [GH-6471]
 * auth/ldap: Fix CN check not working if CN was not all in uppercase [GH-6518]
 * auth/jwt: The CLI helper for OIDC logins will now open the
   browser to the correct URL when running on Windows [JWT-37]
 * auth/jwt: Fix OIDC login issue where configured TLS certs weren't
   being used [JWT-40]
 * auth/jwt: Fix an issue where the `oidc_scopes` parameter was
   not being included in the response to a role read request [JWT-35]
 * core: Fix seal migration case when migrating to Shamir and a seal block
   wasn't explicitly specified [GH-6455]
 * core: Fix unwrapping when using namespaced wrapping tokens [GH-6536]
 * core: Fix incorrect representation of required properties in OpenAPI output
   [GH-6490]
 * core: Fix deadlock that could happen when using the UI [GH-6560]
 * identity: Fix updating groups removing existing members [GH-6527]
 * identity: Properly invalidate group alias in performance secondary [GH-6564]
 * identity: Use namespace context when loading entities and groups to ensure
   merging of duplicate entries works properly [GH-6563]
 * replication: Fix performance standby election failure [GH-6561]
 * replication: Fix mount filter invalidation on performance standby nodes
 * replication: Fix license reloading on performance standby nodes
 * replication: Fix handling of control groups on performance standby nodes
 * replication: Fix some forwarding scenarios with request bodies using
   performance standby nodes [GH-6538]
 * secret/gcp: Fix roleset binding when using JSON [GCP-27]
 * secret/pki: Use `uri_sans` param in when not using CSR parameters [GH-6505]
 * storage/dynamodb: Fix a race condition possible in HA configurations
   that could leave the cluster without a leader [GH-6512]
 * ui: Fix an issue where in production builds OpenAPI model
   generation was failing, causing any form using it to render
   labels with missing fields [GH-6474]
 * ui: Fix issue nav-hiding when moving between namespaces [GH-6473]
 * ui: Secrets will always show in the nav regardless of access to
   cubbyhole [GH-6477]
 * ui: fix SSH OTP generation [GH-6540]
 * ui: add polyfill to load UI in IE11 [GH-6567]
 * ui: Fix issue where some elements would fail to work properly if using ACLs
   with segment-wildcard paths (`/+/` segments) [GH-6525]

## 1.1.0 (March 18th, 2019)

CHANGES:
 * auth/jwt: The `groups_claim_delimiter_pattern` field has been removed. If the
   groups claim is not at the top level, it can now be specified as a
   [JSONPointer](https://tools.ietf.org/html/rfc6901).
 * auth/jwt: Roles now have a "role type" parameter with a default type of
   "oidc". To configure new JWT roles, a role type of "jwt" must be explicitly
   specified.
 * cli: CLI commands deprecated in 0.9.2 are now removed. Please see the CLI
   help/warning output in previous versions of Vault for updated commands.
 * core: Vault no longer automatically mounts a K/V backend at the "secret/"
   path when initializing Vault
 * core: Vault's cluster port will now be open at all times on HA standby nodes
 * plugins: Vault no longer supports running netRPC plugins. These were
   deprecated in favor of gRPC based plugins and any plugin built since 0.9.4
   defaults to gRPC. Older plugins may need to be recompiled against the latest
   Vault dependencies.

FEATURES:
 * **Vault Agent Caching**: Vault Agent can now be configured to act as a
   caching proxy to Vault. Clients can send requests to Vault Agent and the
   request will be proxied to the Vault server and cached locally in Agent.
   Currently Agent will cache generated leases and tokens and keep them
   renewed. The proxy can also use the Auto Auth feature so clients do not need
   to authenticate to Vault, but rather can make requests to Agent and have
   Agent fully manage token lifecycle.
 * **OIDC Redirect Flow Support**: The JWT auth backend now supports OIDC
   roles. These allow authentication via an OIDC-compliant provider via the
   user's browser. The login may be initiated from the Vault UI or through
   the `vault login` command.
 * **ACL Path Wildcard**: ACL paths can now use the `+` character to enable
   wild card matching for a single directory in the path definition.
 * **Transit Auto Unseal**: Vault can now be configured to use the Transit
   Secret Engine in another Vault cluster as an auto unseal provider.

IMPROVEMENTS:
 * auth/jwt: A default role can be set. It will be used during
   JWT/OIDC logins if a role is not specified.
 * auth/jwt: Arbitrary claims data can now be copied into token &
   alias metadata.
 * auth/jwt: An arbitrary set of bound claims can now be configured for a role.
 * auth/jwt: The name "oidc" has been added as an alias for the
   jwt backend. Either name may be specified in the `auth enable` command.
 * command/server: A warning will be printed when 'tls_cipher_suites'
   includes a blacklisted cipher suite or all cipher suites are blacklisted
   by the HTTP/2 specification [GH-6300]
 * core/metrics: Prometheus pull support using a new sys/metrics
   endpoint. [GH-5308]
 * core: On non-windows platforms a SIGUSR2 will make the server log a dump of
   all running goroutines' stack traces for debugging purposes [GH-6240]
 * replication: The initial replication indexing process on newly
   initialized or upgraded clusters now runs asynchronously
 * sentinel: Add token namespace id and path, available in rules as
   token.namespace.id and token.namespace.path
 * ui: The UI is now leveraging OpenAPI definitions to pull in
   fields for various forms.  This means, it will not be necessary to add
   fields on the go and JS sides in the future.  [GH-6209]

BUG FIXES:
 * auth/jwt: Apply `bound_claims` validation across all login paths
 * auth/jwt: Update `bound_audiences` validation during non-OIDC
   logins to accept any matched audience, as documented and handled
   in OIDC logins [JWT-30]
 * auth/token: Fix issue where empty values for token role update call were
   ignored [GH-6314]
 * core: The `operator migrate` command will no longer hang on empty key names
   [GH-6371]
 * identity: Fix a panic at login when external group has a nil alias [GH-6230]
 * namespaces: Clear out identity store items upon namespace deletion
 * replication/perfstandby: Fixed a bug causing performance standbys to wait
   longer than necessary after forwarding a write to the active node
 * replication/mountfilter: Fix a deadlock that could occur when mount filters
   were updated [GH-6426]
 * secret/kv: Fix issue where a v1âv2 upgrade could run on a performance
   standby when using a local mount
 * secret/ssh: Fix for a bug where attempting to delete the last ssh role
   in the zeroaddress configuration could fail [GH-6390]
 * secret/totp: Uppercase provided keys so they don't fail base32 validation
   [GH-6400]
 * secret/transit: Multiple HMAC, Sign or Verify operations can now be
   performed with one API call using the new `batch_input` parameter [GH-5875]
 * sys: `sys/internal/ui/mounts` will no longer return secret or auth mounts
   that have been filtered. Similarly, `sys/internal/ui/mount/:path` will
   return a error response if a filtered mount path is requested. [GH-6412]
 * ui: Fix for a bug where you couldn't access the data tab after clicking on
   wrap details on the unwrap page [GH-6404]
 * ui: Fix an issue where the policies tab was erroneously hidden [GH-6301]
 * ui: Fix encoding issues with kv interfaces [GH-6294]

## 1.0.3.1 (March 14th, 2019) (Enterprise Only)

SECURITY:

 * A regression was fixed in replication mount filter code introduced in Vault
   1.0 that caused the underlying filtered data to be replicated to
   secondaries. This data was not accessible to users via Vault's API but via a
   combination of privileged configuration file changes/Vault commands it could
   be read.  Upgrading to this version or 1.1 will fix this issue and cause the
   replicated data to be deleted from filtered secondaries. More information
   was sent to customer contacts on file.

## 1.0.3 (February 12th, 2019)

CHANGES:
 * New AWS authentication plugin mounts will default to using the generated
   role ID as the Identity alias name. This applies to both EC2 and IAM auth.
   Existing mounts that explicitly set this value will not be affected but
   mounts that specified no preference will switch over on upgrade.
 * The default policy now allows a token to look up its associated identity
   entity either by name or by id [GH-6105]
 * The Vault UI's navigation and onboarding wizard now only displays items that
   are permitted in a users' policy [GH-5980, GH-6094]
 * An issue was fixed that caused recovery keys to not work on
   secondary clusters when using a different unseal mechanism/key
   than the primary. This would be hit if the cluster was rekeyed
   or initialized after 1.0. We recommend rekeying the recovery
   keys on the primary cluster if you meet the above requirements.

FEATURES:
 * **cURL Command Output**: CLI commands can now use the `-output-curl-string`
   flag to print out an equivalent cURL command.
 * **Response Headers From Plugins**: Plugins can now send back headers that
   will be included in the response to a client. The set of allowed headers can
   be managed by the operator.

IMPROVEMENTS:
 * auth/aws: AWS EC2 authentication can optionally create entity aliases by
   role ID [GH-6133]
 * auth/jwt: The supported set of signing algorithms is now configurable [JWT
   plugin GH-16]
 * core: When starting from an uninitialized state, HA nodes will now attempt
   to auto-unseal using a configured auto-unseal mechanism after the active
   node initializes Vault [GH-6039]
 * secret/database: Add socket keepalive option for Cassandra [GH-6201]
 * secret/ssh: Add signed key constraints, allowing enforcement of key types
   and minimum key sizes [GH-6030]
 * secret/transit: ECDSA signatures can now be marshaled in JWS-compatible
   fashion [GH-6077]
 * storage/etcd: Support SRV service names [GH-6087]
 * storage/aws: Support specifying a KMS key ID for server-side encryption
   [GH-5996]

BUG FIXES:
 * core: Fix a rare case where a standby whose connection is entirely torn down
   to the active node, then reconnects to the same active node, may not
   successfully resume operation [GH-6167]
 * cors: Don't duplicate headers when they're written [GH-6207]
 * identity: Persist merged entities only on the primary [GH-6075]
 * replication: Fix a potential race when a token is created and then used with
   a performance standby very quickly, before an associated entity has been
   replicated. If the entity is not found in this scenario, the request will
   forward to the active node.
 * replication: Fix issue where recovery keys would not work on secondary
   clusters if using a different unseal mechanism than the primary.
 * replication: Fix a "failed to register lease" error when using performance
   standbys
 * storage/postgresql: The `Get` method will now return an Entry object with
   the `Key` member correctly populated with the full path that was requested
   instead of just the last path element [GH-6044]

## 1.0.2 (January 15th, 2019)

SECURITY:
 * When creating a child token from a parent with `bound_cidrs`, the list of
   CIDRs would not be propagated to the child token, allowing the child token
   to be used from any address.

CHANGES:
 * secret/aws: Role now returns `credential_type` instead of `credential_types`
   to match role input. If a legacy role that can supply more than one
   credential type, they will be concatenated with a `,`.
 * physical/dynamodb, autoseal/aws: Instead of Vault performing environment
   variable handling, and overriding static (config file) values if found, we
   use the default AWS SDK env handling behavior, which also looks for
   deprecated values. If you were previously providing both config values and
   environment values, please ensure the config values are unset if you want to
   use environment values.
 * Namespaces (Enterprise): Providing "root" as the header value for
   `X-Vault-Namespace` will perform the request on the root namespace. This is
   equivalent to providing an empty value. Creating a namespace called "root" in
   the root namespace is disallowed.

FEATURES:
 * **InfluxDB Database Plugin**: Use Vault to dynamically create
   and manage InfluxDB users

IMPROVEMENTS:
 * auth/aws: AWS EC2 authentication can optionally create entity aliases by
   image ID [GH-5846]
 * autoseal/gcpckms: Reduce the required permissions for the GCPCKMS autounseal
   [GH-5999]
 * physical/foundationdb: TLS support added. [GH-5800]

BUG FIXES:
 * api: Fix a couple of places where we were using the `LIST` HTTP verb
   (necessary to get the right method into the wrapping lookup function) and
   not then modifying it to a `GET`; although this is officially the verb Vault
   uses for listing and it's fully legal to use custom verbs, since many WAFs
   and API gateways choke on anything outside of RFC-standardized verbs we fall
   back to `GET` [GH-6026]
 * autoseal/aws: Fix reading session tokens when AWS access key/secret key are
   also provided [GH-5965]
 * command/operator/rekey: Fix help output showing `-delete-backup` when it
   should show `-backup-delete` [GH-5981]
 * core: Fix bound_cidrs not being propagated to child tokens
 * replication: Correctly forward identity entity creation that originates from
   performance standby nodes (Enterprise)
 * secret/aws: Make input `credential_type` match the output type (string, not
   array) [GH-5972]
 * secret/cubbyhole: Properly cleanup cubbyhole after token revocation [GH-6006]
 * secret/pki: Fix reading certificates on windows with the file
   storage backend [GH-6013]
 * ui (enterprise): properly display perf-standby count on the
   license page [GH-5971]
 * ui: fix disappearing nested secrets and go to the nearest parent
   when deleting a secret - [GH-5976]
 * ui: fix error where deleting an item via the context menu would fail if the
   item name contained dots [GH-6018]
 * ui: allow saving of kv secret after an errored save attempt [GH-6022]
 * ui: fix display of kv-v1 secret containing a key named "keys" [GH-6023]

## 1.0.1 (December 14th, 2018)

SECURITY:
 * Update version of Go to 1.11.3 to fix Go bug
   https://github.com/golang/go/issues/29233 which corresponds to
   CVE-2018-16875
 * Database user revocation: If a client has configured custom revocation
   statements for a role with a value of `""`, that statement would be executed
   verbatim, resulting in a lack of actual revocation but success for the
   operation. Vault will now strip empty statements from any provided; as a
   result if an empty statement is provided, it will behave as if no statement
   is provided, falling back to the default revocation statement.

CHANGES:
 * secret/database: On role read, empty statements will be returned as empty
   slices instead of potentially being returned as JSON null values. This makes
   it more in line with other parts of Vault and makes it easier for statically
   typed languages to interpret the values.

IMPROVEMENTS:
 * cli: Strip iTerm extra characters from password manager input [GH-5837]
 * command/server: Setting default kv engine to v1 in -dev mode can now be
   specified via -dev-kv-v1 [GH-5919]
 * core: Add operationId field to OpenAPI output [GH-5876]
 * ui: Added ability to search for Group and Policy IDs when creating Groups
   and Entities instead of typing them in manually

BUG FIXES:
 * auth/azure: Cache azure authorizer [15]
 * auth/gcp: Remove explicit project for service account in GCE authorizer [58]
 * cli: Show correct stored keys/threshold for autoseals [GH-5910]
 * cli: Fix backwards compatibility fallback when listing plugins [GH-5913]
 * core: Fix upgrades when the seal config had been created on early versions
   of vault [GH-5956]
 * namespaces: Correctly reload the proper mount when tuning or reloading the
   mount [GH-5937]
 * secret/azure: Cache azure authorizer [19]
 * secret/database: Strip empty statements on user input [GH-5955]
 * secret/gcpkms: Add path for retrieving the public key [5]
 * secret/pki: Fix panic that could occur during tidy operation when malformed
   data was found [GH-5931]
 * secret/pki: Strip empty line in ca_chain output [GH-5779]
 * ui: Fixed a bug where the web CLI was not usable via the `fullscreen`
   command - [GH-5909]
 * ui: Fix a bug where you couldn't write a jwt auth method config [GH-5936]

## 0.11.6 (December 14th, 2018)

This release contains the three security fixes from 1.0.0 and 1.0.1 and the
following bug fixes from 1.0.0/1.0.1:

 * namespaces: Correctly reload the proper mount when tuning or reloading the
   mount [GH-5937]
 * replication/perfstandby: Fix audit table upgrade on standbys [GH-5811]
 * replication/perfstandby: Fix redirect on approle update [GH-5820]
 * secrets/kv: Fix issue where storage version would get incorrectly downgraded
   [GH-5809]

It is otherwise identical to 0.11.5.

## 1.0.0 (December 3rd, 2018)

SECURITY:
 * When debugging a customer incident we discovered that in the case of
   malformed data from an autoseal mechanism, Vault's master key could be
   logged in Vault's server log. For this to happen, the data would need to be
   modified by the autoseal mechanism after being submitted to it by Vault but
   prior to encryption, or after decryption, prior to it being returned to
   Vault. To put it another way, it requires the data that Vault submits for
   encryption to not match the data returned after decryption. It is not
   sufficient for the autoseal mechanism to return an error, and it cannot be
   triggered by an outside attacker changing the on-disk ciphertext as all
   autoseal mechanisms use authenticated encryption. We do not believe that
   this is generally a cause for concern; since it involves the autoseal
   mechanism returning bad data to Vault but with no error, in a working Vault
   configuration this code path should never be hit, and if hitting this issue
   Vault will not be unsealing properly anyways so it will be obvious what is
   happening and an immediate rekey of the master key can be performed after
   service is restored. We have filed for a CVE (CVE-2018-19786) and a CVSS V3
   score of 5.2 has been assigned.

CHANGES:
 * Tokens are now prefixed by a designation to indicate what type of token they
   are. Service tokens start with `s.` and batch tokens start with `b.`.
   Existing tokens will still work (they are all of service type and will be
   considered as such). Prefixing allows us to be more efficient when consuming
   a token, which keeps the critical path of requests faster.
 * Paths within `auth/token` that allow specifying a token or accessor in the
   URL have been removed. These have been deprecated since March 2016 and
   undocumented, but were retained for backwards compatibility. They shouldn't
   be used due to the possibility of those paths being logged, so at this point
   they are simply being removed.
 * Vault will no longer accept updates when the storage key has invalid UTF-8
   character encoding [GH-5819]
 * Mount/Auth tuning the `options` map on backends will now upsert any provided
   values, and keep any of the existing values in place if not provided. The
   options map itself cannot be unset once it's set, but the keypairs within the
   map can be unset if an empty value is provided, with the exception of the
   `version` keypair which is handled differently for KVv2 purposes.
 * Agent no longer automatically reauthenticates when new credentials are
   detected. It's not strictly necessary and in some cases was causing
   reauthentication much more often than intended.
 * HSM Regenerate Key Support Removed: Vault no longer supports destroying and
   regenerating encryption keys on an HSM; it only supports creating them.
   Although this has never been a source of a customer incident, it is simply a
   code path that is too trivial to activate, especially by mistyping
   `regenerate_key` instead of `generate_key`.
 * Barrier Config Upgrade (Enterprise): When upgrading from Vault 0.8.x, the
   seal type in the barrier config storage entry will be upgraded from
   "hsm-auto" to "awskms" or "pkcs11" upon unseal if using AWSKMS or HSM seals.
   If performing seal migration, the barrier config should first be upgraded
   prior to starting migration.
 * Go API client uses pooled HTTP client: The Go API client now uses a
   connection-pooling HTTP client by default. For CLI operations this makes no
   difference but it should provide significant performance benefits for those
   writing custom clients using the Go API library. As before, this can be
   changed to any custom HTTP client by the caller.
 * Builtin Secret Engines and Auth Methods are integrated deeper into the
   plugin system. The plugin catalog can now override builtin plugins with
   custom versions of the same name. Additionally the plugin system now
   requires a plugin `type` field when configuring plugins, this can be "auth",
   "database", or "secret".

FEATURES:
 * **Auto-Unseal in Open Source**: Cloud-based auto-unseal has been migrated
   from Enterprise to Open Source. We've created a migrator to allow migrating
   between Shamir seals and auto unseal methods.
 * **Batch Tokens**: Batch tokens trade off some features of service tokens for no
   storage overhead, and in most cases can be used across performance
   replication clusters.
 * **Replication Speed Improvements**: We've worked hard to speed up a lot of
   operations when using Vault Enterprise Replication.
 * **GCP KMS Secrets Engine**: This new secrets engine provides a Transit-like
   pattern to keys stored within GCP Cloud KMS.
 * **AppRole support in Vault Agent Auto-Auth**: You can now use AppRole
   credentials when having Agent automatically authenticate to Vault
 * **OpenAPI Support**: Descriptions of mounted backends can be served directly
   from Vault
 * **Kubernetes Projected Service Account Tokens**: Projected Service Account
   Tokens are now supported in Kubernetes auth
 * **Response Wrapping in UI**: Added ability to wrap secrets and easily copy
   the wrap token or secret JSON in the UI

IMPROVEMENTS:
 * agent: Support for configuring the location of the kubernetes service account
   [GH-5725]
 * auth/token: New tokens are indexed in storage HMAC-SHA256 instead of SHA1
 * secret/totp: Allow @ character to be part of key name [GH-5652]
 * secret/consul: Add support for new policy based tokens added in Consul 1.4
   [GH-5586]
 * ui: Improve the token auto-renew warning, and automatically begin renewal
   when a user becomes active again [GH-5662]
 * ui: The unbundled UI page now has some styling [GH-5665]
 * ui: Improved banner and popup design [GH-5672]
 * ui: Added token type to auth method mount config [GH-5723]
 * ui: Display additonal wrap info when unwrapping. [GH-5664]
 * ui: Empty states have updated styling and link to relevant actions and
   documentation [GH-5758]
 * ui: Allow editing of KV V2 data when a token doesn't have capabilities to
   read secret metadata [GH-5879]

BUG FIXES:
 * agent: Fix auth when multiple redirects [GH-5814]
 * cli: Restore the `-policy-override` flag [GH-5826]
 * core: Fix rekey progress reset which did not happen under certain
   circumstances. [GH-5743]
 * core: Migration from autounseal to shamir will clean up old keys [GH-5671]
 * identity: Update group memberships when entity is deleted [GH-5786]
 * replication/perfstandby: Fix audit table upgrade on standbys [GH-5811]
 * replication/perfstandby: Fix redirect on approle update [GH-5820]
 * secrets/azure: Fix valid roles being rejected for duplicate ids despite
   having distinct scopes
   [[GH-16]](https://github.com/hashicorp/vault-plugin-secrets-azure/pull/16)
 * storage/gcs: Send md5 of values to GCS to avoid potential corruption
   [GH-5804]
 * secrets/kv: Fix issue where storage version would get incorrectly downgraded
   [GH-5809]
 * secrets/kv: Disallow empty paths on a `kv put` while accepting empty paths
   for all other operations for backwards compatibility
   [[GH-19]](https://github.com/hashicorp/vault-plugin-secrets-kv/pull/19)
 * ui: Allow for secret creation in kv v2 when cas_required=true [GH-5823]
 * ui: Fix dr secondary operation token generation via the ui [GH-5818]
 * ui: Fix the PKI context menu so that items load [GH-5824]
 * ui: Update DR Secondary Token generation command [GH-5857]
 * ui: Fix pagination bug where controls would be rendered once for each
   item when viewing policies [GH-5866]
 * ui: Fix bug where `sys/leases/revoke` required 'sudo' capability to show
   the revoke button in the UI [GH-5647]
 * ui: Fix issue where certain pages wouldn't render in a namespace [GH-5692]

## 0.11.5 (November 13th, 2018)

BUG FIXES:
 * agent: Fix issue when specifying two file sinks [GH-5610]
 * auth/userpass: Fix minor timing issue that could leak the presence of a
   username [GH-5614]
 * autounseal/alicloud: Fix issue interacting with the API (Enterprise)
 * autounseal/azure: Fix key version tracking (Enterprise)
 * cli: Fix panic that could occur if parameters were not provided [GH-5603]
 * core: Fix buggy behavior if trying to remount into a namespace
 * identity: Fix duplication of entity alias entity during alias transfer
   between entities [GH-5733]
 * namespaces: Fix tuning of auth mounts in a namespace
 * ui: Fix bug where editing secrets as JSON doesn't save properly [GH-5660]
 * ui: Fix issue where IE 11 didn't render the UI and also had a broken form
   when trying to use tool/hash [GH-5714]

## 0.11.4 (October 23rd, 2018)

CHANGES:
 * core: HA lock file is no longer copied during `operator migrate` [GH-5503].
   We've categorized this as a change, but generally this can be considered
   just a bug fix, and no action is needed.

FEATURES:
 * **Transit Key Trimming**: Keys in transit secret engine can now be trimmed to
   remove older unused key versions
 * **Web UI support for KV Version 2**: Browse, delete, undelete and destroy
   individual secret versions in the UI
 * **Azure Existing Service Principal Support**: Credentials can
   now be generated against an existing service principal

IMPROVEMENTS:
 * core: Add last WAL in leader/health output for easier debugging [GH-5523]
 * identity: Identity names will now be handled case insensitively by default.
   This includes names of entities, aliases and groups [GH-5404]
 * secrets/aws: Added role-option max_sts_ttl to cap TTL for AWS STS
   credentials [GH-5500]
 * secret/database: Allow Cassandra user to be non-superuser so long as it has
   role creation permissions [GH-5402]
 * secret/radius: Allow setting the NAS Identifier value in the generated
   packet [GH-5465]
 * secret/ssh: Allow usage of JSON arrays when setting zero addresses [GH-5528]
 * secret/transit: Allow trimming unused keys [GH-5388]
 * ui: Support KVv2 [GH-5547], [GH-5563]
 * ui: Allow viewing and updating Vault license via the UI
 * ui: Onboarding will now display your progress through the chosen tutorials
 * ui: Dynamic secret backends obfuscate sensitive data by default and
   visibility is toggleable

BUG FIXES:
 * agent: Fix potential hang during agent shutdown [GH-5026]
 * auth/ldap: Fix listing of users/groups that contain slashes [GH-5537]
 * core: Fix memory leak during some expiration calls [GH-5505]
 * core: Fix generate-root operations requiring empty `otp` to be provided
   instead of an empty body [GH-5495]
 * identity: Remove lookup check during alias removal from entity [GH-5524]
 * secret/pki: Fix TTL/MaxTTL check when using `sign-verbatim` [GH-5549]
 * secret/pki: Fix regression in 0.11.2+ causing the NotBefore value of
   generated certificates to be set to the Unix epoch if the role value was not
   set, instead of using the default of 30 seconds [GH-5481]
 * storage/mysql: Use `varbinary` instead of `varchar` when creating HA tables
   [GH-5529]

## 0.11.3 (October 8th, 2018)

SECURITY:
 * Revocation: A regression in 0.11.2 (OSS) and 0.11.0 (Enterprise) caused
   lease IDs containing periods (`.`) to not be revoked properly. Upon startup
   when revocation is tried again these should now revoke successfully.

IMPROVEMENTS:
 * auth/ldap: Listing of users and groups return absolute paths [GH-5537]
 * secret/pki: OID SANs can now specify `*` to allow any value [GH-5459]

BUG FIXES:
 * auth/ldap: Fix panic if specific values were given to be escaped [GH-5471]
 * cli/auth: Fix panic if `vault auth` was given no parameters [GH-5473]
 * secret/database/mongodb: Fix panic that could occur at high load [GH-5463]
 * secret/pki: Fix CA generation not allowing OID SANs [GH-5459]
2019-10-23 15:00:05 +00:00
khorben
18cdbfecb9 Update pev to version 0.80
The new patches fix compatibility with OpenSSL 1.1.0, and attempt to fix
the build on FreeBSD, NetBSD, and OpenBSD. It does not link on NetBSD
(like the previous version, 0.70) but it does on macOS.

There was no changelog upstream.
2019-10-22 16:37:05 +00:00
adam
43ce47ef3e Fix sphinx-build binary name 2019-10-21 22:15:10 +00:00
adam
f66cb4f2e3 Switch sphinx to versioned deps. 2019-10-21 21:55:03 +00:00
wiz
f858f15b2b heimdal: fix build on OpenSSL 1.1 systems by disabling OpenSSL.
heimdal includes a copy of the relevant functions itself.

Add a comment that the dependency should be re-enabled when updating
this package.

Bump PKGREVISION.
2019-10-21 16:21:44 +00:00
adam
4c687771a4 py-cryptography[_vectors]: updated to 2.8
2.8:
* Updated Windows, macOS, and ``manylinux1`` wheels to be compiled with
  OpenSSL 1.1.1d.
* Added support for Python 3.8.
* Added class methods
  :meth:`Poly1305.generate_tag
  <cryptography.hazmat.primitives.poly1305.Poly1305.generate_tag>`
  and
  :meth:`Poly1305.verify_tag
  <cryptography.hazmat.primitives.poly1305.Poly1305.verify_tag>`
  for Poly1305 sign and verify operations.
* Deprecated support for OpenSSL 1.0.1. Support will be removed in
  ``cryptography`` 2.9.
* We now ship ``manylinux2010`` wheels in addition to our ``manylinux1``
  wheels.
* Added support for ``ed25519`` and ``ed448`` keys in the
  :class:`~cryptography.x509.CertificateBuilder`,
  :class:`~cryptography.x509.CertificateSigningRequestBuilder`,
  :class:`~cryptography.x509.CertificateRevocationListBuilder` and
  :class:`~cryptography.x509.ocsp.OCSPResponseBuilder`.
* ``cryptography`` no longer depends on ``asn1crypto``.
* :class:`~cryptography.x509.FreshestCRL` is now allowed as a
  :class:`~cryptography.x509.CertificateRevocationList` extension.
2019-10-21 11:17:47 +00:00
bsiegert
cb070cf0eb Revbump all Go packages after lang/go112 update 2019-10-18 14:58:43 +00:00
maya
07bce2a592 sudo: correct fallback for no sysconf(_SC_RTSIG_MAX).
Thanks nros for the heads up.
2019-10-16 20:25:21 +00:00
adam
238c5a558e py-asn1crypto: updated to 1.2.0
1.2.0
- Added `asn1crypto.load_order()`, which returns a `list` of unicode strings
  of the names of the fully-qualified module names for all of submodules of
  the package. The module names are listed in their dependency load order.
  This is primarily intended for the sake of implementing hot reloading.

1.1.0
- Added User ID (`0.9.2342.19200300.100.1.1`) to `x509.NameType()`
- Added various EC named curves to `keys.NamedCurve()`
2019-10-16 14:38:58 +00:00
maya
4c1e09bdb9 *: bind912 -> bind914
Thanks taca for the heads up.
2019-10-16 09:37:27 +00:00
ng0
6e5a329340 security/doas: Update to 6.2p2
Significant items from https://github.com/slicer69/doas/releases:
doas 6.2p2
* Introducing macOS support
  Due to the dedicated work by Gordon Bergling, the doas
  command now builds and runs on macOS. This release
  contains no functionality changes, just the ability to
  build and run on macOS.
2019-10-15 12:24:01 +00:00
maya
02b189e68b sudo: update to 1.8.28. fixes CVE-2019-14287
Sudo will now only set PAM_TTY to the empty string when no terminal is present on Solaris and Linux. This workaround is only needed on those systems which may have PAM modules that misbehave when PAM_TTY is not set.

The mailerflags sudoers option now has a default value even if sendmail support was disabled at configure time. Fixes a crash when the mailerpath sudoers option is set but mailerflags is not. Bug #878.

Sudo will now filter out last login messages on HP-UX unless it a shell is being run via sudo -s or sudo -i. Otherwise, when trusted mode is enabled, these messages will be displayed for each command.

On AIX, when the user's password has expired and PAM is not in use, sudo will now allow the user to change their password. Bug #883.

Sudo has a new -B command line option that will ring the terminal bell when prompting for a password.

Sudo no longer refuses to prompt for a password when it cannot determine the user's terminal as long as it can open /dev/tty. This allows sudo to function on systems where /proc is unavailable, such as when running in a chroot environment.

The env_editor sudoers flag is now on by default. This makes source builds more consistent with the packages generated by sudo's mkpkg script.

Sudo no longer ships with pre-formatted copies of the manual pages. These were included for systems like IRIX that don't ship with an nroff utility. There are now multiple Open Source nroff replacements so this should no longer be an issue.

Fixed a bad interaction with configure's --prefix and --disable-shared options. Bug #886.

More verbose error message when a password is required and no terminal is present. Bug #828.

Command tags, such as NOPASSWD, are honored when a user tries to run a command that is allowed by sudoers but which does not actually exist on the file system. Bug #888.

Asturian translation for sudoers from translationproject.org.

I/O log timing files now store signal suspend and resume information in the form of a signal name instead of a number.

Fixed a bug introduced in 1.8.24 that prevented sudo from honoring the value of ipa_hostname from sssd.conf, if specified, when matching the host name.

Fixed a bug introduced in 1.8.21 that prevented the core dump resource limit set in the pam_limits module from taking effect. Bug #894.

Fixed parsing of double-quoted Defaults group and netgroup bindings.

The user ID is now used when matching sudoUser attributes in LDAP. Previously, the user name, group name and group IDs were used when matching but not the user ID.

Sudo now writes PAM messages to the user's terminal, if available, instead of the standard output or standard error. This prevents PAM output from being intermixed with that of the command when output is sent to a file or pipe. Bug #895.

Sudoedit now honors the umask and umask_override settings in sudoers. Previously, the user's umask was used as-is.

Fixed a bug where the terminal's file context was not restored when using SELinux RBAC. Bug #898.

Fixed a security issue where a sudo user may be able to run a command as root when the Runas specification explicitly disallows root access as long as the ALL keyword is listed first. This vulnerability has been assigned CVE-2019-14287
2019-10-14 20:05:58 +00:00
szptvlfn
f235633419 BUILD_DEPENDS -> TEST_DEPENDS 2019-10-14 12:54:23 +00:00
rillig
44e41e372f security/pyca: fix location of HTML documentation 2019-10-12 20:47:00 +00:00
rillig
e55e2af1da security/opencdk: fix location of HTML documentation 2019-10-12 20:43:11 +00:00
adam
f0d5e1bf8f py-asn1crypto: updated to 1.0.1
1.0.1

Fix an absolute import in keys to a relative import

1.0.0

Backwards Compatibility Breaks
cms.KeyEncryptionAlgorithmId().native now returns the value "rsaes_pkcs1v15" for OID 1.2.840.113549.1.1.1 instead of "rsa"
Removed functionality to calculate public key values from private key values. Alternatives have been added to oscrypto.
keys.PrivateKeyInfo().unwrap() is now oscrypto.asymmetric.PrivateKey().unwrap()
keys.PrivateKeyInfo().public_key is now oscrypto.asymmetric.PrivateKey().public_key.unwrap()
keys.PrivateKeyInfo().public_key_info is now oscrypto.asymmetric.PrivateKey().public_key.asn1
keys.PrivateKeyInfo().fingerprint is now oscrypto.asymmetric.PrivateKey().fingerprint
keys.PublicKeyInfo().unwrap() is now oscrypto.asymmetric.PublicKey().unwrap()
keys.PublicKeyInfo().fingerprint is now oscrypto.asymmetric.PublicKey().fingerprint

Enhancements
Significantly improved parsing of core.UTCTime() and core.GeneralizedTime() values that include timezones and fractional seconds
util.timezone has a more complete implementation
core.Choice() may now be constructed by a 2-element tuple or a 1-key dict
Added x509.Certificate().not_valid_before and x509.Certificate().not_valid_after
Added core.BitString().unused_bits
Added keys.NamedCurve.register() for non-mainstream curve OIDs
No longer try to load optional performance dependency, libcrypto, on Mac or Linux
ocsp.CertStatus().native will now return meaningful unicode string values when the status choice is "good" or "unknown". Previously both returned None due to the way the structure was designed.
Add support for explicit RSA SSA PSS (1.2.840.113549.1.1.10) to keys.PublicKeyInfo() and keys.PrivateKeyInfo()
Added structures for nested SHA-256 Windows PE signatures to cms.CMSAttribute()
Added RC4 (1.2.840.113549.3.4) to algos.EncryptionAlgorithmId()
Added secp256k1 (1.3.132.0.10) to keys.NamedCurve()
Added SHA-3 and SHAKE OIDs to algos.DigestAlgorithmId() and algos.HmacAlgorithmId()
Added RSA ES OAEP (1.2.840.113549.1.1.7) to cms.KeyEncryptionAlgorithmId()
Add IKE Intermediate (1.3.6.1.5.5.8.2.2) to x509.KeyPurposeId()
x509.EmailAddress() and x509.DNSName() now handle invalidly-encoded values using tags for core.PrintableString() and core.UTF8String()
Add parameter structue from RFC 5084 for AES-CCM to algos.EncryptionAlgorithm()
Improved robustness of parsing broken core.Sequence() and core.SequenceOf() values

Bug Fixes
Fixed encoding of tag values over 30
core.IntegerBitString() and core.IntegerOctetString() now restrict values to non-negative integers since negative values are not implemented
When copying or dumping a BER-encoded indefinite-length value, automatically force re-encoding to DER. To ensure all nested values are always DER-encoded, .dump(True) must be called.
Fix UnboundLocalError when calling x509.IPAddress().native on an encoded value that has a length of zero
Fixed passing class_ via unicode string name to core.Asn1Value()
Fixed a bug where EC private keys with leading null bytes would be encoded in keys.ECPrivateKey() more narrowly than RFC 5915 requires
Fixed some edge-case bugs in util.int_to_bytes()
x509.URI() now only normalizes values when comparing
Fixed BER-decoding of indefinite length core.BitString()
Fixed DER-encoding of empty core.BitString()
Fixed a missing return value for core.Choice().parse()
Fixed core.Choice().contents working when the chosen alternative is a core.Choice() also
Fixed parsing and encoding of nested core.Choice() objects
Fixed a bug causing core.ObjectIdentifier().native to sometimes not map the OID
2019-10-11 16:16:45 +00:00
prlw1
570e39d8ca remove pkgrevision 2019-10-10 15:43:44 +00:00
prlw1
81299c4f8a Update clamav to 0.102.0
* The On-Access Scanning feature has been migrated out of clamd and
  into a brand new utility named clamonacc, which is disabled in this
  package as it is for Linux only.
* The freshclam database update utility has undergone a significant
  update. This includes:
     + Added support for HTTPS.
     + Support for database mirrors hosted on ports other than 80.
     + Removal of the mirror management feature (mirrors.dat).
     + An all new libfreshclam library API.
* Added support for extracting ESTsoft .egg archives. This feature is
  new code developed from scratch using ESTsoft's Egg-archive
  specification and without referencing the UnEgg library provided by
  ESTsoft. This was necessary because the UnEgg library's license
  includes restrictions limiting the commercial use of the UnEgg library.

Full release notes available at:
https://github.com/Cisco-Talos/clamav-devel/blob/rel/0.102/NEWS.md
2019-10-10 15:41:29 +00:00
ryoon
a62e21ed32 Update to 2.8.3
Changelog:
Letsencrypt CA recent changed the CDN provider, which resulted
in hanging issues.
Any downstream package should update.
This is important.
2019-10-10 13:23:58 +00:00
adam
9ce1493c8f py-asn1-modules: updated to 0.2.7
Revision 0.2.7:
- Added maps for use with openType to RFC 3565
- Added RFC2985 providing PKCS#9 Attributes
- Added RFC3770 providing Certificate Extensions and Attributes for
  Authentication in PPP and Wireless LAN Networks
- Added RFC5914 providing Trust Anchor Format
- Added RFC6010 providing CMS Content Constraints (CCC) Extension
- Added RFC6031 providing CMS Symmetric Key Package Content Type
- Added RFC6032 providing CMS Encrypted Key Package Content Type
- Added RFC7030 providing Enrollment over Secure Transport (EST)
- Added RFC7292 providing PKCS #12, which is the Personal Information
  Exchange Syntax v1.1
- Added RFC8018 providing PKCS #5, which is the Password-Based
  Cryptography Specification, Version 2.1
- Automatically update the maps for use with openType for RFC3709,
  RFC6402, RFC7191, and RFC8226 when the module is imported
- Added RFC6211 providing CMS Algorithm Identifier Protection Attribute
- Added RFC8449 providing Certificate Extension for Hash Of Root Key
- Updated RFC2459 and RFC5280 for TODO in the certificate extension map
- Added RFC7906 providing NSA's CMS Key Management Attributes
- Added RFC7894 providing EST Alternative Challenge Password Attributes
- Updated the handling of maps for use with openType so that just doing
  an import of the modules is enough in most situations; updates to
  RFC 2634, RFC 3274, RFC 3779, RFC 4073, RFC 4108, RFC 5035, RFC 5083,
  RFC 5084, RFC 5480, RFC 5940, RFC 5958, RFC 6019, and RFC 8520
- Updated the handling of attribute maps for use with openType in
  RFC 5958 to use the rfc5652.cmsAttributesMap
- Added RFC5990 providing RSA-KEM Key Transport Algorithm in the CMS
- Fixed malformed `rfc4210.RevRepContent` data structure layout
- Added RFC5934 providing Trust Anchor Management Protocol (TAMP)
- Added RFC6210 providing Experiment for Hash Functions with Parameters
- Added RFC5751 providing S/MIME Version 3.2 Message Specification
- Added RFC8494 providing Multicast Email (MULE) over ACP 142
- Added RFC8398 providing Internationalized Email Addresses in
  X.509 Certificates
- Added RFC8419 providing Edwards-Curve Digital Signature Algorithm
  (EdDSA) Signatures in the CMS
- Added RFC8479 providing Storing Validation Parameters in PKCS#8
- Added RFC8360 providing Resource Public Key Infrastructure (RPKI)
  Validation Reconsidered
- Added RFC8358 providing Digital Signatures on Internet-Draft Documents
- Added RFC8209 providing BGPsec Router PKI Profile
- Added RFC8017 providing PKCS #1 Version 2.2
- Added RFC7914 providing scrypt Password-Based Key Derivation Function
- Added RFC7773 providing Authentication Context Certificate Extension
2019-10-10 07:47:53 +00:00
nros
aeed7a5f89 ftp is currently down, add the https download location 2019-10-09 09:38:10 +00:00
triaxx
a1ff13750d libgpg-error: fix PR pkg/54609
pkgsrc changes:
---------------
* Apply upstream patches that will be removed in next release
  (https://github.com/gpg/libgpg-error/commit/7865041)
* Bump revision
2019-10-08 06:36:13 +00:00
nros
183164410c Fix clamav install when PKG_SYSCONFDIR not set to ${PREFIX}/etc
Use PKG_SYSCONFDIR when moving files to EGDIR.
Fixes install when PKG_SYSCONFDIR is set to something else than
${PREFIX}/etc
2019-10-05 20:52:52 +00:00
nia
a9cedae2ce gnutls: Update to 3.6.10
* Version 3.6.10 (released 2019-09-29)

** libgnutls: Added support for deterministic ECDSA/DSA (RFC6979)
   Deterministic signing can be enabled by setting
   GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE when calling gnutls_privkey_sign_*()
   functions (#94).

** libgnutls: add gnutls_aead_cipher_encryptv2 and gnutls_aead_cipher_decryptv2
   functions that will perform in-place encryption/decryption on data buffers (#718).

** libgnutls: Corrected issue in gnutls_session_get_data2() which could fail under
   TLS1.3, if a timeout callback was not set using gnutls_transport_set_pull_timeout_function()
   (#823).

** libgnutls: added interoperability tests with gnutls 2.12.x; addressed
   issue with large record handling due to random padding (#811).

** libgnutls: the server now selects the highest TLS protocol version,
   if TLS 1.3 is enabled and the client advertises an older protocol version first (#837).

** libgnutls: fix non-PIC assembly on i386 (#818).

** libgnutls: added support for GOST 28147-89 cipher in CNT (GOST counter) mode
   and MAC generation based on GOST 28147-89 (IMIT). For description of the
   modes see RFC 5830. S-Box is id-tc26-gost-28147-param-Z (TC26Z) defined in
   RFC 7836.

** certtool: when outputting an encrypted private key do not insert the textual description
   of it. This fixes a regression since 3.6.5 (#840).

** API and ABI modifications:
gnutls_aead_cipher_encryptv2: Added
gnutls_aead_cipher_decryptv2: Added
GNUTLS_CIPHER_GOST28147_TC26Z_CNT: Added
GNUTLS_MAC_GOST28147_TC26Z_IMIT: Added
2019-10-04 17:25:53 +00:00
agc
7137d02e07 Bump netpgpverify and libnetpgpverify to 20191003 - fix problem
pointed out by mrg and gcc8:

+ don't read an automatic array element we haven't already written
2019-10-03 20:18:12 +00:00
adam
281c00a6f2 py-acme/py-certbot: updated to 0.39.0
0.39.0:

Added
Support for Python 3.8 was added to Certbot and all of its components.
Support for CentOS 8 was added to certbot-auto.

Changed
Don't send OCSP requests for expired certificates
Return to using platform.linux_distribution instead of distro.linux_distribution in OS fingerprinting for Python < 3.8
Updated the Nginx plugin's TLS configuration to keep support for some versions of IE11.

Fixed
Fixed OS detection in the Apache plugin on RHEL 6.
2019-10-02 17:36:43 +00:00
triaxx
fe5a9cc38a py-certbot: update to 0.38nb3
pkgsrc changes
--------------
* s/wip/devel/ for py-distro dependency (wip was for test only but
  committed by inattention)
2019-10-02 10:40:56 +00:00
wiz
6db311f6d6 py-certbot: wip dependencies are not allowed in main pkgsrc 2019-10-02 08:38:42 +00:00
nia
dacf71ed96 mbedtls: Update to 2.16.3
= mbed TLS 2.16.3 branch released 2019-09-06

Security
   * Fix a missing error detection in ECJPAKE. This could have caused a
     predictable shared secret if a hardware accelerator failed and the other
     side of the key exchange had a similar bug.
   * The deterministic ECDSA calculation reused the scheme's HMAC-DRBG to
     implement blinding. Because of this for the same key and message the same
     blinding value was generated. This reduced the effectiveness of the
     countermeasure and leaked information about the private key through side
     channels. Reported by Jack Lloyd.
   * When writing a private EC key, use a constant size for the private
     value, as specified in RFC 5915. Previously, the value was written
     as an ASN.1 INTEGER, which caused the size of the key to leak
     about 1 bit of information on average and could cause the value to be
     1 byte too large for the output buffer.

API Changes
   * The new function mbedtls_ecdsa_sign_det_ext() is similar to
     mbedtls_ecdsa_sign_det() but allows passing an external RNG for the
     purpose of blinding.

Bugfix
   * Fix to allow building test suites with any warning that detects unused
     functions. Fixes #1628.
   * Fix typo in net_would_block(). Fixes #528 reported by github-monoculture.
   * Remove redundant include file in timing.c. Fixes #2640 reported by irwir.
   * Fix Visual Studio Release x64 build configuration by inheriting
     PlatformToolset from the project configuration. Fixes #1430 reported by
     irwir.
   * Enable Suite B with subset of ECP curves. Make sure the code compiles even
     if some curves are not defined. Fixes #1591 reported by dbedev.
   * Fix misuse of signed arithmetic in the HAVEGE module. #2598
   * Update test certificates that were about to expire. Reported by
     Bernhard M. Wiedemann in #2357.
   * Fix the build on ARMv5TE in ARM mode to not use assembly instructions
     that are only available in Thumb mode. Fix contributed by Aurelien Jarno
     in #2169.
   * Fix undefined memset(NULL) call in test_suite_nist_kw.
   * Make NV seed test support MBEDTLS_ENTROPY_FORCE_SHA256.
   * Fix propagation of restart contexts in restartable EC operations.
     This could previously lead to segmentation faults in builds using an
     address-sanitizer and enabling but not using MBEDTLS_ECP_RESTARTABLE.
   * Fix memory leak in in mpi_miller_rabin(). Contributed by
     Jens Wiklander <jens.wiklander@linaro.org> in #2363
   * Improve code clarity in x509_crt module, removing false-positive
     uninitialized variable warnings on some recent toolchains (GCC8, etc).
     Discovered and fixed by Andy Gross (Linaro), #2392.
   * Zero length buffer check for undefined behavior in
     mbedtls_platform_zeroize(). Fixes ARMmbed/mbed-crypto#49.
   * Fix bug in endianness conversion in bignum module. This lead to
     functionally incorrect code on bigendian systems which don't have
     __BYTE_ORDER__ defined. Reported by Brendan Shanks. Fixes #2622.

Changes
   * Make it easier to define MBEDTLS_PARAM_FAILED as assert (which config.h
     suggests). #2671
   * Make `make clean` clean all programs always. Fixes #1862.

= mbed TLS 2.16.2 branch released 2019-06-11

Security
   * Make mbedtls_ecdh_get_params return an error if the second key
     belongs to a different group from the first. Before, if an application
     passed keys that belonged to different group, the first key's data was
     interpreted according to the second group, which could lead to either
     an error or a meaningless output from mbedtls_ecdh_get_params. In the
     latter case, this could expose at most 5 bits of the private key.

Bugfix
   * Server's RSA certificate in certs.c was SHA-1 signed. In the default
     mbedTLS configuration only SHA-2 signed certificates are accepted.
     This certificate is used in the demo server programs, which lead the
     client programs to fail at the peer's certificate verification
     due to an unacceptable hash signature. The certificate has been
     updated to one that is SHA-256 signed. Fix contributed by
     Illya Gerasymchuk.
   * Fix private key DER output in the key_app_writer example. File contents
     were shifted by one byte, creating an invalid ASN.1 tag. Fixed by
     Christian Walther in #2239.
   * Fix potential memory leak in X.509 self test. Found and fixed by
     Junhwan Park, #2106.
   * Reduce stack usage of hkdf tests. Fixes #2195.
   * Fix 1-byte buffer overflow in mbedtls_mpi_write_string() when
     used with negative inputs. Found by Guido Vranken in #2404. Credit to
     OSS-Fuzz.
   * Fix bugs in the AEAD test suite which would be exposed by ciphers which
     either used both encrypt and decrypt key schedules, or which perform padding.
     GCM and CCM were not affected. Fixed by Jack Lloyd.
   * Fix incorrect default port number in ssl_mail_client example's usage.
     Found and fixed by irwir. #2337
   * Add missing parentheses around parameters in the definition of the
     public macro MBEDTLS_X509_ID_FLAG. This could lead to invalid evaluation
     in case operators binding less strongly than subtraction were used
     for the parameter.
   * Add a check for MBEDTLS_X509_CRL_PARSE_C in ssl_server2, guarding the crl
     sni entry parameter. Reported by inestlerode in #560.
   * Add DER-encoded test CRTs to library/certs.c, allowing
     the example programs ssl_server2 and ssl_client2 to be run
     if MBEDTLS_FS_IO and MBEDTLS_PEM_PARSE_C are unset. Fixes #2254.
   * Fix missing bounds checks in X.509 parsing functions that could
     lead to successful parsing of ill-formed X.509 CRTs. Fixes #2437.
   * Fix multiple X.509 functions previously returning ASN.1 low-level error
     codes to always wrap these codes into X.509 high level error codes before
     returning. Fixes #2431.

Changes
   * Return from various debugging routines immediately if the
     provided SSL context is unset.
   * Remove dead code from bignum.c in the default configuration.
     Found by Coverity, reported and fixed by Peter Kolbus (Garmin). Fixes #2309.
   * Add test for minimal value of MBEDTLS_MPI_WINDOW_SIZE to all.sh.
     Contributed by Peter Kolbus (Garmin).
   * Change wording in the `mbedtls_ssl_conf_max_frag_len()`'s documentation to
     improve clarity. Fixes #2258.
   * Replace multiple uses of MD2 by SHA-256 in X.509 test suite. Fixes #821.

= mbed TLS 2.16.1 branch released 2019-03-19

Features
   * Add MBEDTLS_REMOVE_3DES_CIPHERSUITES to allow removing 3DES ciphersuites
     from the default list (enabled by default). See
     https://sweet32.info/SWEET32_CCS16.pdf.

Bugfix
   * Fix a compilation issue with mbedtls_ecp_restart_ctx not being defined
     when MBEDTLS_ECP_ALT is defined. Reported by jwhui. Fixes #2242.
   * Run the AD too long test only if MBEDTLS_CCM_ALT is not defined.
     Raised as a comment in #1996.
   * Reduce the stack consumption of mbedtls_mpi_fill_random() which could
     previously lead to a stack overflow on constrained targets.
   * Add `MBEDTLS_SELF_TEST` for the mbedtls_self_test functions
     in the header files, which missed the precompilation check. #971
   * Fix clobber list in MIPS assembly for large integer multiplication.
     Previously, this could lead to functionally incorrect assembly being
     produced by some optimizing compilers, showing up as failures in
     e.g. RSA or ECC signature operations. Reported in #1722, fix suggested
     by Aurelien Jarno and submitted by Jeffrey Martin.
   * Fix signed-to-unsigned integer conversion warning
     in X.509 module. Fixes #2212.
   * Reduce stack usage of `mpi_write_hlp()` by eliminating recursion.
     Fixes #2190.
   * Remove a duplicate #include in a sample program. Fixed by Masashi Honma #2326.
   * Remove the mbedtls namespacing from the header file, to fix a "file not found"
     build error. Fixed by Haijun Gu #2319.
   * Fix returning the value 1 when mbedtls_ecdsa_genkey failed.
   * Fix false failure in all.sh when backup files exist in include/mbedtls
     (e.g. config.h.bak). Fixed by Peter Kolbus (Garmin) #2407.
   * Ensure that unused bits are zero when writing ASN.1 bitstrings when using
     mbedtls_asn1_write_bitstring().
   * Fix issue when writing the named bitstrings in KeyUsage and NsCertType
     extensions in CSRs and CRTs that caused these bitstrings to not be encoded
     correctly as trailing zeroes were not accounted for as unused bits in the
     leading content octet. Fixes #1610.

Changes
   * Include configuration file in all header files that use configuration,
     instead of relying on other header files that they include.
     Inserted as an enhancement for #1371
   * Add support for alternative CSR headers, as used by Microsoft and defined
     in RFC 7468. Found by Michael Ernst. Fixes #767.
   * Fix configuration queries in ssl-opt.h. #2030
   * Ensure that ssl-opt.h can be run in OS X. #2029
   * Reduce the complexity of the timing tests. They were assuming more than the
     underlying OS actually guarantees.
   * Re-enable certain interoperability tests in ssl-opt.sh which had previously
     been disabled for lack of a sufficiently recent version of GnuTLS on the CI.
   * Ciphersuites based on 3DES now have the lowest priority by default when
     they are enabled.

= mbed TLS 2.16.0 branch released 2018-12-21

Features
   * Add a new config.h option of MBEDTLS_CHECK_PARAMS that enables validation
     of parameters in the API. This allows detection of obvious misuses of the
     API, such as passing NULL pointers. The API of existing functions hasn't
     changed, but requirements on parameters have been made more explicit in
     the documentation. See the corresponding API documentation for each
     function to see for which parameter values it is defined. This feature is
     disabled by default. See its API documentation in config.h for additional
     steps you have to take when enabling it.

API Changes
   * The following functions in the random generator modules have been
     deprecated and replaced as shown below. The new functions change
     the return type from void to int to allow returning error codes when
     using MBEDTLS_<MODULE>_ALT for the underlying AES or message digest
     primitive. Fixes #1798.
     mbedtls_ctr_drbg_update() -> mbedtls_ctr_drbg_update_ret()
     mbedtls_hmac_drbg_update() -> mbedtls_hmac_drbg_update_ret()
   * Extend ECDH interface to enable alternative implementations.
   * Deprecate error codes of the form MBEDTLS_ERR_xxx_INVALID_KEY_LENGTH for
     ARIA, CAMELLIA and Blowfish. These error codes will be replaced by
     the more generic per-module error codes MBEDTLS_ERR_xxx_BAD_INPUT_DATA.
   * Additional parameter validation checks have been added for the following
     modules - AES, ARIA, Blowfish, CAMELLIA, CCM, GCM, DHM, ECP, ECDSA, ECDH,
     ECJPAKE, SHA, Chacha20 and Poly1305, cipher, pk, RSA, and MPI.
     Where modules have had parameter validation added, existing parameter
     checks may have changed. Some modules, such as Chacha20 had existing
     parameter validation whereas other modules had little. This has now been
     changed so that the same level of validation is present in all modules, and
     that it is now optional with the MBEDTLS_CHECK_PARAMS flag which by default
     is off. That means that checks which were previously present by default
     will no longer be.

New deprecations
   * Deprecate mbedtls_ctr_drbg_update and mbedtls_hmac_drbg_update
     in favor of functions that can return an error code.

Bugfix
   * Fix for Clang, which was reporting a warning for the bignum.c inline
     assembly for AMD64 targets creating string literals greater than those
     permitted by the ISO C99 standard. Found by Aaron Jones. Fixes #482.
   * Fix runtime error in `mbedtls_platform_entropy_poll()` when run
     through qemu user emulation. Reported and fix suggested by randombit
     in #1212. Fixes #1212.
   * Fix an unsafe bounds check when restoring an SSL session from a ticket.
     This could lead to a buffer overflow, but only in case ticket authentication
     was broken. Reported and fix suggested by Guido Vranken in #659.
   * Add explicit integer to enumeration type casts to example program
     programs/pkey/gen_key which previously led to compilation failure
     on some toolchains. Reported by phoenixmcallister. Fixes #2170.
   * Fix double initialization of ECC hardware that made some accelerators
     hang.
   * Clarify documentation of mbedtls_ssl_set_own_cert() regarding the absence
     of check for certificate/key matching. Reported by Attila Molnar, #507.
2019-10-01 17:44:11 +00:00
ryoon
df7a51c086 Update to 0.73
Changelog:
Vulnerabilities fixed in this release include:

 - On Windows, the listening sockets used for local port forwarding
   were opened in a mode that did not prevent other processes from
   also listening on the same ports and stealing some of the incoming
   connections.

 - In the PuTTY terminal, bracketed paste mode was broken in 0.72, in
   a way that made the pasted data look like manual keyboard input. So
   any application relying on the bracketing sequences to protect
   against malicious clipboard contents would have been misled.

 - An SSH-1 server could trigger an access to freed memory by sending
   the SSH1_MSG_DISCONNECT message. Not known to be exploitable.

Other bug fixes include:

 - Windows Plink no longer crashes on startup when it tries to tell
   you it's reusing an existing SSH connection.

 - Windows PuTTY now updates its terminal window size correctly if the
   screen resolution changes while it's maximised.

 - If you display the coloured error messages from gcc in the PuTTY
   terminal, there is no longer a missing character if a colour change
   happens exactly at the end of a line.

 - If you use the 'Clear Scrollback' menu option or escape sequence
   while text in the scrollback is selected, it no longer causes an
   assertion failure.
2019-10-01 15:22:41 +00:00
nia
6d4756a72c gnutls: No longer a GNU project 2019-10-01 14:34:08 +00:00
wiz
47baed0b3f py-certbot: bump PKGREVISION for added dependency 2019-10-01 13:53:45 +00:00
triaxx
6e0e275eb9 py-certbot: fix PR pkg/54588
pkgsrc changes:
---------------
* Add devel/py-distro as a runtime dependency. Certbot claims >=1.0.1 but
  non-linux distribution are supported only from 1.2.0.
2019-10-01 13:29:58 +00:00
maya
1c6836d293 gnutls: backport upstream commit to avoid text relocations on i386.
Regenerate asm files with -fPIC

PR pkg/54555: security/gnutls 3.6.9 runs afoul of PAX MPROTECT and
text relocations on netbsd-9/i386

Bump PKGREVISION.
2019-09-30 09:51:16 +00:00
bsiegert
866c85b303 Revbump all Go packages after 1.12.10 update.
ok wiz@ for PMC
2019-09-26 20:10:39 +00:00
wiz
666b611d27 base: remove
Last update in 2009, homepage not reachable; only builds with php-5.6
but one of it's dependencies is per default built against a newer php,
so this can't even build.
2019-09-26 09:39:24 +00:00
wiz
0dfe8ac295 R-askpass: skip interpreter check for two mac-only files 2019-09-26 00:49:07 +00:00
adam
8035cad0cc py-keyring: mark as incompatible with Python 2.7 2019-09-25 13:06:12 +00:00
adam
2a69beb126 py-hsm: updated to 1.2.1
Version 1.2.1:
* Fixup release: Remove minimum version for sqlalchemy dependency which was
    set too high.
* yhsm-yubikey-ksm: Add --proxy/--proxies argument for logging proxies
    requests.

Version 1.2.0:
* yhsm-validation-server: Support OATH TOTP.
* yhsm-init-oath-token: Handle keys with length != 20.
* yhsm-yubikey-ksm: Allow passing soft-HSM keys via stdin by passing "-" as
    device argument.
* yhsm-yubikey-ksm: Allow passing --db-url via environment variable.
* Moved utils, yubikey-ksm and validation-server to be included when
    installing using pip.
* Use entry_point scripts generated by setuptools.
* Moved man pages to man/ directory.
* Bugfix: Fix AEAD generation on Windows by writing in binary mode.
* Bugfix: Support AEADs generated on Windows using pyhsm <= 1.1.1.
* Bugfix: Avoid installing unit test package.
* Bugfix: yhsm-import-keys: Fix --aes-key argument used when importing
    without a YubiHSM.

Version 1.1.1:
* Fixup release.

Version 1.1.0:
* Restructured the repository and build process.
* Use Semantic Versioning (semver.org).
* Added support for a "soft" HSM in yhsm-yubikey-ksm, yhsm-import-keys
    and yhsm-generate-keys.

Version 1.0.4l:
* Documentation is now in asciidoc format.
* yhsm-yubikey-ksm: Fix bug when the same public ID occured for multiple
    keyhandles.
2019-09-20 17:13:26 +00:00
adam
83c88ab8ec py-keyrings.alt: updated to 3.1.1
3.1.1
Trap AttributeError in Gnome backend as in some environments
it seems that will happen.
Fix issue where a backslash in the service name would cause
errors on Registry backend on Windows.

3.1
``keyrings.alt`` no longer depends on the ``keyring.util.escape``
module.

3.0
``keyrings`` namespace should now use the pkgutil native technique
rather than relying on pkg_resources.

2.4
File based backends now reject non-string types for passwords.
2019-09-20 16:51:25 +00:00
adam
69ee079d35 py-keyring: updated to 19.2.0
19.2.0
* Add support for get_credential() with the SecretService backend
2019-09-20 16:39:31 +00:00
nia
04343d76c3 libssh: update patch 2019-09-18 19:35:08 +00:00
tnn
c143041f8b gnutls: fix PLIST 2019-09-18 19:00:13 +00:00
ng0
6d0c556d8c security/gnutls: Add ability to link against libunbound for DANE support. 2019-09-18 15:27:05 +00:00
ryoon
7917e25af2 Recursive revbump from audio/pulseaudio 2019-09-18 14:17:03 +00:00
perseant
9f4542308b Update ccid to version 1.4.27, including link requirement in pcsc-lite.
Closes PR security/54556.
2019-09-17 23:09:42 +00:00
nros
d039c8d6d4 Fix compilation of gnutls with compilers missing __get_cpuid_count
Fix compilation of gnutls with compilers missing __get_cpuid_count.
Taken from upstream and fixed in version 3.6.10 .
Fixes compilation on NetBSD 8 without setting GCC_REQD.
2019-09-16 17:01:46 +00:00
wiz
5dcb749317 scrypt: update to 1.3.0.
Significant changes since 1.2.1:
* In addition to the scrypt command-line utility, a library "libscrypt-kdf"
  can now be built and installed by passing the --enable-libscrypt-kdf option
  to configure.
* On x86 CPUs which support them, RDRAND and SHA extensions are used to
  provide supplemental entropy and speed up hash computations respectively.
* When estimating the amount of available RAM, scrypt ignores RLIMIT_DATA on
  systems which have mmap.
* A new command "scrypt info encfile" prints information about an encrypted
  file without decrypting it.
2019-09-16 05:13:28 +00:00