Commit graph

1132 commits

Author SHA1 Message Date
hubertf
61d744da8d Enable IPv6 - see the dancing Kame! 2000-12-19 13:58:16 +00:00
jlam
aa21263716 Add build dependency on perl, needed for apxs. 2000-12-19 07:49:41 +00:00
kim
29e535883b Highlights from the upgrade to tidy-20000804:
- fixed script element handling in framesets
- detect repeated attributes e.g. in tables
- supports Gnu Emacs error parsing
- Word 2000 cleanup
- HTML syntax fixes
2000-12-18 20:20:10 +00:00
jlam
714d2c98a1 Make this default file more useful with regard to accepting URIs to
CGI programs.  Also add a comment about syntax of this file.
2000-12-18 00:16:26 +00:00
jlam
2241a81cb3 Honor CFLAGS passed in from environment during build. Improve the INSTALL
script and add a DEINSTALL script in handling the config file.
2000-12-17 22:21:44 +00:00
jlam
9c8a02f29b Make this package look more like php3 by installing a php binary for use as
a CGI executable for HTTP servers without a SAPI module.
2000-12-17 21:33:55 +00:00
jlam
d4d1b7c68c Remove from lang category 2000-12-17 21:04:20 +00:00
jlam
302522ff27 Add and enable php4-imap. 2000-12-17 19:56:31 +00:00
jlam
c80e17dfec php4-imap: PHP4 extension module for IMAP server access 2000-12-17 19:01:29 +00:00
jlam
1f3aa491dd Use the installed c-client linkage.c to determine which drivers and
authenticators are linked into the imap extension module.
2000-12-17 18:59:44 +00:00
jlam
ff3652914c Patch to find imap-uw libraries and headers in correct location. 2000-12-17 17:18:49 +00:00
jlam
be0250fb02 Add 'www' to common CATEGORIES.
Patches to find imap-uw headers and libraries in correct location.
2000-12-17 17:18:01 +00:00
tron
9e9715af35 Depend on SuSE 6.3 or newer instead of 6.3 only. 2000-12-17 14:32:33 +00:00
enami
b10718e2c9 Regen. 2000-12-17 14:29:09 +00:00
tron
16f3f6a508 Add dependences on "suse_compat" package required after update to SuSE 6.4. 2000-12-17 13:21:55 +00:00
tron
c652d35f64 Version 6.4 of the "suse_libpng" package is enough to run "opera". 2000-12-17 13:21:19 +00:00
jlam
8ae1eb5dad Add and enable php4, php4-gd, and php4-pgsql. 2000-12-17 09:27:24 +00:00
jlam
d833c7ea56 Update ap-php4 to 4.0.3pl1nb1. Changes from version 4.0.3pl1:
* Move most of Makefile logic into ../php4/Makefile.common.
	* Move patches and files into ../php4.
	* Depend on php-4.0.3pl1.

The version number bump was necessary as php4 conflicts with the old
ap-php4-4.0.3pl1 package.
2000-12-17 09:26:08 +00:00
tron
19b7a00e70 Add missing dependence on the SuSE base package. 2000-12-17 09:26:03 +00:00
jlam
862497bcf5 php4-pgsql: PHP4 extension module for PostgreSQL database access 2000-12-17 09:21:20 +00:00
jlam
4894c4450f php4-gd: PHP4 extension module to the GD graphics library 2000-12-17 09:20:32 +00:00
jlam
016127de8f Create a php4 package upon which both HTTP/PHP4 servers and PHP4 extension
modules depend.  Move most of the guts of the ap-php4 package into this
one.
2000-12-17 09:19:32 +00:00
abs
6630f65fe0 Put back a.out toolchain workaround - when the toolchain fix has been pulled
up configure should conditionalise the workaround on a broken ld.
2000-12-16 14:22:08 +00:00
martin
3b01cb008a Back out patch-ab revision 1.12 again.
Charles fixed the a.out toolchain bug (in ld) that caused the problems this
change tried to work around. Update your toolchain if it breaks for you.
(Pullup of the toolchain changes to 1.4 and 1.5 has already been requested.)
2000-12-16 09:45:57 +00:00
hubertf
32e7505da2 Make this fit our rc.d start/stop scheme 2000-12-16 09:45:44 +00:00
hubertf
13ba66975d Create localstatedir etc. 2000-12-16 09:45:18 +00:00
martin
09dbfcdd9c Regen 2000-12-15 08:25:30 +00:00
martin
ff408e614d Ouch, accidently removed r1.12 with last commit - back that part out,
sorry.
2000-12-15 08:23:46 +00:00
martin
daafe24eed Updated to Mozilla-0.6, work done by Taya; some minor cleanup (removing
bogus patches). Changes are numerous, see the homepage for details.
2000-12-15 07:16:21 +00:00
abs
6609447e92 Fix build on a.out - for a.out only disable
MKSHLIB_FORCE_ALL='-Wl,--whole-archive' and
	MKSHLIB_UNFORCE_ALL='-Wl,--no-whole-archive'
The a.out toolchain ignores --no-whole-archive, and linking mozilla-bin
attempts to an ill fated
    "collect2 ... --whole-archive ... --no-whole-archive ... -lgcc ... -lgcc"
Analysis by Richard Earnshaw in PR/11703
2000-12-14 18:18:50 +00:00
kleink
5f073ab9aa Update ap-auth-ldap to 1.5.2; changelog excerpt below.
Changes Between Major Revisions

  Changes from 1.4 to 1.6

     * All changes and bugfixes in the 1.4 releases.
     * Completely rewrote the LDAP caching algorithms (see [1]the
       documentation on caching for more information). Here are the
       highlights of the changes:
          + All cache sizes are measured in terms of cache entries.
            Warning!! This affects the AuthLDAPCacheSize directive!! In
            version 1.4 and before, this directive specified the size in
            megabytes. Now, it specifies the size in cache entri es. If
            you currently have this directive in a config file, it is
            probably set way too high, and will use a significant amount
            of server memory.
          + Deprecated the AuthLDAPCacheCompareOps directive. Apache will
            still accept the directive, but it has no effect, other than
            to generate a warning in the Apache logs.
          + The cache no longer grows without bounds. For servers with a
            very active cache, this should make a big difference with
            memory usage.
          + No longer use the cache management routines from the LDAP
            SDK. All LDAP operations are now cached, using a cache that's
            specially designed for auth_ldap's authentication methods.
          + If Apache has been compiled with MM support and auth_ldap has
            been compiled with -DWITH_SHARED_LDAP_CACHE then the cache is
            shared across all server instances.
          + Added a content handler that can be used to display the cache
            statistics. To use it, add the following directives:
<Location /server/auth-ldap-info>
  SetHandler auth-ldap-info
</Location>
     * Added support for a require dn directive, and a
       AuthLDAPCompareDNOnServer directive. See the documentation for
       more information.
     * auth_ldap now allows the user to specify any attribute when
       checking for group membership, by using the AuthLDAPGroupAttribute
       directive. If this directive is not specified, the default
       continues to be member and uniqueMember. Patch courtesy of
       Graham Leggett.
     * Added another directive, AuthLDAPGroupAttributeIsDN, which says
       whether to use the DN that was retrieved from the LDAP search, or
       to use the username passed by the client when doing group
       authorization. This directive, in conjuction with the previous
       one, allows us to use things like posixGroups for checks:
AuthLDAPGroupAttribute memberuid
AuthLDAPGroupAttributeIsDN off
             * Ensure that auth_ldap will follow referrals under
       OpenLDAP. This behavior was turned off in previous versions.
     * Allow auth_ldap to dereference aliases, using the new
       AuthLDAPDereferenceAliases directive. By default, this directive
       is set to always.
     * Now use ldap_init() when using OpenLDAP. Unless your OpenLDAP is
       really old, this probably won't affect you.
2000-12-14 12:27:51 +00:00
hubertf
bea616fd4a add some mirrors, and pull in suse_libpng 2000-12-13 21:07:27 +00:00
jdolecek
b258ae212a fix the dependency on suse_libpng 2000-12-13 21:06:03 +00:00
jdolecek
439b26aa8f Update opera to 4.0b4
PNG is now supported, asynchronous DNS is claimed to be more stable,
couple of SSL crashes were fixed; otherwise the changes are primarily
UI fixes.
However, Asynchronous DNS seems to ignore stuff in /etc/hosts now.
2000-12-13 21:04:32 +00:00
taca
70e636c13d - Add a patch from http://www.squid-cache.org/Versions/v2/2.3/bugs/ for
fixing "CARP assertion on sum of load factors" bug.
- Update package name to squid-2.3s4nb3.
2000-12-13 16:03:39 +00:00
jwise
a024161d9c Update jakarta-tomcat to 3.1.1. This is a security fix release, and the
vulnerabilities file will be updated.

Changes from jakarta-tomcat-3.1:

===============================================================================
6.  SECURITY VULNERABILITIES FIXED IN TOMCAT 3.1.1


6.1 Administrative Application Enabled By Default

The administrative application (at context path "/admin") was enabled by
default in Tomcat 3.1, which allowed unauthenticated remote users to add and
remove appliations from a running Tomcat 3.1 installation if it was left
installed.

To avoid such problems, the administrative application has been removed from
the binary distribution of Tomcat 3.1.1.  It can be installed if desired by:
- Downloading the source distribution of Tomcat 3.1.1.
- Modifying the "build.xml" file to remove the commenting around the
  logic that creates the adminstrative application.
- Running the build.sh or build.bat script.


6.2 Case Sensitive Matches on Static Resources

In Tomcat 3.1, matches against the filenames of static resources was done in a
case insensitive manner on case insensitive platforms (such as Microsoft
Windows).  This can cause sensitive information to be exposed to remote users
who experiment with differently cased request URIs.

To avoid such problems, Tomcat 3.1.1 performs filename comparisons for static
resources in a case sensitive manner, even on Windows.  This means that your
hyperlinks must specify the correct case, or a 404 error will be returned.

Because this can cause significant conversion problems for existing
applications deployed on Tomcat 3.1, a configuration option is provided to
temporarily turn off case sensitive matching.  Edit the file "conf/web.xml"
and modify the value for the "caseSensitive" initialization parameter to the
default file-serving servlet.

WARNING:  CHANGING THIS SETTING WILL RE-INTRODUCE THE SECURITY VULNERABILITY
PRESENT IN TOMCAT 3.1 -- IT IS *STRONGLY* RECOMMENDED THAT YOU CORRECT YOUR
URLS TO MATCH CORRECTLY INSTEAD OF USING THIS OPTION.  Note:  All later
versions of Tomcat perform filename matches in a case sensitive manner.


6.3 Snoop Servlet Mappings in Example Application

In the deployment descriptor for the example application delivered with
Tomcat 3.1, a "snoop" servlet was mapped to URL patterns "/snoop" and
"*.snp".  Theses mappings (in particular the second one) could cause exposure
of sensitive information on the internal organization of your web application
(for example, when a non-existent page "foo.snp" is requested).

To avoid these problems, the offending mappings have been commented out.


6.4 Show Source Vulnerability

The example application delivered with Tomcat 3.1 included a mechanism to
display the source code for the JSP page examples.  This mechanism could
be used to bypass the restrictions on displaying sensitive information in
the WEB-INF and META-INF directories.  This vulnerability has been removed.


6.5 Requesting Unknown JSP Pages

In Tomcat 3.1, the error message in response to a request for an unknown JSP
page would include the absolute disk file pathname of the corresponding file
which could not be found, which exposes sensitive information about how your
application is deployed.  The error message has been adjusted to include only
the context-relative path of the JSP page which could not be found.


6.6 Session ID Vulnerability

The algorithm used to calculate session identifiers for new sessions was
subject to attack by attempting to guess what the next session identifier will
be, and therefore hijack the session.  In addition, the generated identifier
exposed sensitive information (the number of sessions that have been created
since this web application was started.

To avoid these problems, the session identifier generation algorithm has been
replaced by the algorithm used in Tomcat 3.2, which is not subject to these
attacks, and does not expose session count information.


6.7 Server Shutdown Vulnerability

In Tomcat 3.1, it was possible to establish a remote network connection to the
AJP12 connector and cause Tomcat to shut itself down.  Now, this network
connection must be created from the same server that Tomcat is running on.

NOTE:  While this is more secure than Tomcat 3.1 (and mirrors the protection
provided by Tomcat 3.2), it is still vulnerable to attack by users who can
create socket connections from the server.  Suitable use of firewalls and
"TCP Wrappers" applications are suggested around the APJ12 port.
2000-12-13 03:49:30 +00:00
wiz
a32b3a5655 Unify Makefiles -- mostly headers: remove FreeBSD Ids.
Consistent 4 character indentation of SUBDIR entries.
2000-12-12 01:30:36 +00:00
jlam
b8de91e261 Introduce APACHE_USER: the user allowed to execute the suexec wrapper
if apache was build with APACHE_SUEXEC == YES.
2000-12-11 00:03:07 +00:00
wiz
38400cc75f Update to 4.0.3pl1, inspired by Jared D. McNeill's pkg/11665. 2000-12-08 13:16:13 +00:00
jlam
d86eaea283 Correct a typo (pksrc --> pkgsrc). 2000-12-07 21:16:09 +00:00
jtb
fade4ac464 Add and enable "haskell-cgi". 2000-12-06 22:09:24 +00:00
jtb
da1898a4e2 Initial import of new "haskell-cgi" package:
CGI module for the Hugs Haskell 98 interpreter
2000-12-06 22:05:56 +00:00
jlam
3e27aea52c Make the DEINSTALL/INSTALL script logic to handle configuration files
match the one for security/sudo.
2000-12-06 07:55:14 +00:00
tv
a839e766ae Add p5-HTML-Format. 2000-12-04 02:24:03 +00:00
tv
54e2a6792f A perl formatter for outputting to other formats of text. 2000-12-04 02:19:12 +00:00
tv
3a8ba3540e Update to 3.08 (2.04 no longer on CPAN) 2000-12-04 01:58:18 +00:00
tv
8c17823049 Update to 3.03 (3.02 is not even in CPAN anymore). 2000-12-04 01:52:54 +00:00
fredb
964806d26f Regen. 2000-12-01 16:29:38 +00:00
fredb
29e74e24cb Make that <machine/endian.h>, so this works on 1.4.x systems,
too. Closes PR pkg/11621.
2000-12-01 16:22:54 +00:00
jtb
1be0837d82 Add and enable "w3". Fixes PR pkg/11387 by Jason Beegan. 2000-12-01 06:22:11 +00:00