Commit graph

6384 commits

Author SHA1 Message Date
adam
810c47f2a9 Changes 1.10.3:
This is a bugfix release.
* Fix KDC uninitialized pointer vulnerabilities that could lead to a denial of
  service [CVE-2012-1014] or remote code execution [CVE-2012-1015].
* Correctly use default_tgs_enctypes instead of default_tkt_enctypes for TGS
  requests.
2012-08-20 08:16:26 +00:00
ryoon
08d62b2732 Recursive revbump from graphics/libwebp update.
Thank you, obache@.
2012-08-18 08:49:40 +00:00
drochner
0ac7c9c382 sync w/ base pkg 2012-08-15 17:48:44 +00:00
drochner
7f6410c859 update to 0.8.2
changes:
* New SETTIMEOUT command for the qt4 pinentry.
* Wide character support for the curses pinentry.
* Various bug fixes.
2012-08-15 17:47:56 +00:00
wiz
fa1910b167 Update to 1.6 from Jaap Boender in PR 46800:
This update of ocaml-cryptokit to its newest version, 1.6. does
not actually change anything in the functionality of the software.
Upstream, the build system has changed, and there are also a few
changes to the package (most notably, removal of the PLIST.opt in
favour of the PLIST_VARS system)
2012-08-15 08:24:58 +00:00
drochner
a1e371645f update to 2012.55
changes: fix a use-after-free bug which could be used to potentially
execute arbitrary code with root privileges, provided that the user
has been authenticated using a public key and also that a command
restriction is enforced (the "command" option must be used in
the authorized_keys file)
2012-08-13 17:47:26 +00:00
wiz
3ebfad8824 Bump PKGREVISION for fix in librsvg/buildlink3.mk. 2012-08-13 14:25:37 +00:00
pettai
f0e589c0b1 OpenDNSSEC 1.3.10
Bugfixes:
* SUPPORT-30: RRSIGs are left in the signed zone when authoritative RRsets
  become glue [OPENDNSSEC-282].
* OPENDNSSEC-261: Ldns fails to parse RR that seems syntactically correct.
  Was due to memory allocation issues. Provided better log message.
* OPENDNSSEC-285: Signer segfault for 6 or more -v options
* OPENDNSSEC-298: Only unlink existing pidfile on exit if we wrote it.
* OPENDNSSEC-303: Return if open/parse of zonelist.xml fails in ksmutil.c
  update_zones() and cmd_listzone().
* OPENDNSSEC-304: Signer Engine: Check pidfile on startup, if pidfile exists
  and corresponding process is running, then complain and exit.
* Signer seems to hang on a ods-signer command. Shutdown client explicitly
  with shutdown().
* opendnssec.spec file removed
2012-08-13 13:50:06 +00:00
marino
5ccf30c047 security/aide06: Fix regression caused by bison 2.6.x
Bison 2.6.x+ handles the yydebug functionality differently by predefining
YYDEBUG.  The yacc logic is not expecting YYDEBUG to be defined without
an value, so it breaks on an "#if YYDEBUG" macro in a few places.

In order to make this work with pre-2.6 bison as well as current versions,
hard code the inclusion of debug symbols.  It doesn't hurt anything and
it fixes the package.
2012-08-12 09:15:07 +00:00
agc
7202859ef1 add and enable dhbitty 2012-08-11 17:44:46 +00:00
agc
206f0ed215 Import dhbitty-20120812 into the Packages Collection.
dhbitty is a small public key encryption program written in C.  It
	uses elliptic curve Diffie-Hellman in the form of Curve25519 to
	establish a shared secret between two users, and uses that secret to
	symmetrically encrypt and authenticate messages.

	There are no private key files; only passphrases.  Never lose that
	pesky thing again.

	Both the sender and the receiver can decrypt a message.  In fact,
	there is no distinction between sender and receiver.  Both passphrases
	must be strong.

	There is no signing.  A similarly useful form of authentication occurs
	using only DH.  dhbitty attempts to be as simple as possible.  It is
	not optimized, but achieves a comfortable speed for most uses.  It
	does not use floating point numbers, or integers longer than 32 bits.
	It does not contain more algorithms than are needed.

Example

   This is how Alice generates her public key with dhbitty:
$ dhbitty generate alice_public_key.txt
username:passphrase (this is visible!): alice:Keyfiles be damned!
Done.

   Bob will do the same thing:
$ dhbitty generate bob_public_key.txt
username:passphrase (this is visible!): bob:Bob's Spectacular Passphrase
Done.

   Alice will publish her alice_public_key.txt, and Bob will publish his bob_public_key.txt. They can now access each other's
   public keys. (But they should be careful that Eve cannot surreptitiously replace either public key with her own!)

   Alice wants to send files to Bob. She packages them into a .tar archive (or any other type of archive with timestamps), along
   with her message. Then she uses dhbitty:
$ dhbitty encrypt bob_public_key.txt files_to_bob.tar files_to_bob.tar.dhbt
username:passphrase (this is visible!): alice:Keyfiles be damned!
Done.

   Alice sends files_to_bob.tar.dhbt to Bob. Bob will use dhbitty to decrypt this archive:
$ dhbitty decrypt files_to_bob.tar.dhbt files_to_bob.tar
username:passphrase (this is visible!): bob:Bob's Spectacular Passphrase
This is the public key of file's secondary owner:
0002f02b318c307bac07f3148a33c975cea04b79a870f0a5c7771cd38cc1986e
Done.

   Bob can verify that the public key dhbitty just gave him indeed is Alice's public key. He unpacks the now-decrypted archive to
   access the files Alice sent to him.

   In practice, Alice and Bob should use a system like diceware to pick passphrases, in order to be confident of their strength.
   Seven words picked using diceware is a good choice.
2012-08-11 17:43:46 +00:00
jmmv
dbe36493a1 Update to 1.0: use distfile provided by upstream. 2012-08-11 17:09:43 +00:00
marino
06560370f4 security/isakmpd: Mark NOT-FOR-DRAGONFLY
DragonFly users are referred to the security/racoon2 instead.
2012-08-11 14:20:55 +00:00
marino
1f04ab1257 security/mit-krb5: USE_TOOLS+= msgfmt
Note: Nobody that uses git from pkgsrc can install this package.
It conflicts with security/heimdal which is sucked in by dependencies
of scmgit-base.  Since the default way of acquiring pkgsrc on
DragonFly is via git, which is provided by the releases and daily
snapshots, effectively this can't be installed by DragonFly users.

Solving the conflict with heimdal, if possible, would be nice.
2012-08-09 20:15:20 +00:00
drochner
911770e2c6 update to 3.0.22
changes: bugfixes
2012-08-09 18:58:11 +00:00
obache
7cb824b26f Improve detection of __sync_add_and_fetch, avoid compiler optimization.
Fixes PR 46779.
2012-08-07 13:54:21 +00:00
obache
b8d6e4640f Bump PKGREVISION for change of PostgreSQL default version to 9.1. 2012-08-05 10:02:09 +00:00
jperkin
cee83ff46e Avoid conflict between gets() and std::gets().
Fixes build on at least Solaris.
2012-08-02 09:37:32 +00:00
reed
855ebf79de needs newer dbus to build 2012-07-28 21:48:17 +00:00
drochner
69cdaa913c update to 3.0.21
changes
-DTLS improvements
-bugfixes
2012-07-24 18:34:06 +00:00
obache
acbdda68a5 Update ruby-simple_oauth to 0.1.9.
bug fixes.
2012-07-22 12:38:41 +00:00
wiz
8b9c7c315c Remove "WWW: URL" from DESCR. Common in FreeBSD ports, but in pkgsrc the
URL should be as HOMEPAGE in the Makefile.
2012-07-21 20:07:59 +00:00
fhajny
e9bcea3c0a Add back hashes for HPN, dropped in the last commit 2012-07-20 14:17:23 +00:00
adam
4b099cdc54 Changes 7.6.4:
Bug fixes
2012-07-20 09:58:36 +00:00
marino
7c01492829 security/zkt: Fix DragonFly regression
When this package was updated to version 1.1, it stopped building on
DragonFly.  The main issue is that DragonFly doesn't have bind in its
base.  NetBSD does, so it zkt finds it there, but otherwise it needs
the configuration switch --enable-binutil-path to be used.  This was
added for DragonFly to point at ${PREFIX}/sbin.

zkt requires bind to be installed in order to build.  Unlike other
packages like python, postgresql, and ruby where the mk.conf can
define a version otherwise a default is used, no such mechanism
exists to hand the four separate bind packages (at least I don't know
about one).  So the inclusion of bind99 is a hack I'm not too proud
of, but I don't have a better solution.  With it, it builds in clean
environments like pbulk chroot and Tinderbox.  If an individual user
is building from source, they'll be smart enough to comment out this
include if another version of bind is already installed (zkt will
fail on a bind build conflict).

I suspect DragonFly is rather unique in not having bind in base, so
for now this is left as a DragonFly-specific section.  Something
like net/bind99/builtin.mk could possibly be used to determine if
no builtin bind is available and thus follow DragonFly approach.  I
shall leave it to others to decide.
2012-07-18 20:44:38 +00:00
marino
3c58e1e2a1 security/openvas-libraries: Fix regression due to upgrade to gnutils 3.0
GNUTLS deprecated gnutils_transport_set_lowat function in version 2.12.0
and finally removed it with version 3.0, breaking any packages that
still reference it.

The lowat feature is now disabled permanently I think.
The patch uses the GNUTLS_VERSION_NUMBER macro to appropriately conceal
the function reference.  The same patch is widely seen on the 'net with
other packages that use gnutls like OpenVAS.
2012-07-18 09:52:44 +00:00
jperkin
42b919c077 Fix install on at least Solaris. 2012-07-18 09:48:10 +00:00
cheusov
f91e90a6cf Take maintainership. FUKAUMI Naoki didn't object. 2012-07-17 23:19:19 +00:00
cheusov
14ace21090 starttls.{el,elc} files are not provided by the package anymore. The problem
is starttls's implementation is incompatible with emacs 22, 23 and probably
24 too, as a result sending emails with ssl/tls authorization fail due to
this
conflict.  emacs-21 has its own starttls.el too and I believe it is also
sufficient. I wonder if someone still uses emacs-20 and its smtpmail.el for
sending emails. This change was tested on NetBSD-6 and emacs-{22,23}.

starttls package now DEPENDS on emacs-[0-9]*, that is any emacs flavour is
good enough

Set LICENSE to gnu-gpl-v2

++pkgrevision
2012-07-17 18:08:02 +00:00
marino
aeba6e8356 security/libgpg-error: Disable NLS on i386-DragonFly
It seems that I386 DragonFly (x86_64 is okay), invoking libintl's
bindtextdomain causes pkgsrc's libintl to segfault on a thread
locking operation.  Anything linking with libgpg-error on i386
will consequently core dump.

Recognizing this treating the symptom, this patch disabled NLS on
I386 DragonFly.
2012-07-17 16:01:10 +00:00
adam
087f302985 MASTER_SITES cosmetic change 2012-07-16 19:13:23 +00:00
adam
e0d8895900 Changes 1.10.2:
This is a bugfix release.
* Fix an interop issue with Windows Server 2008 R2 Read-Only Domain Controllers.
* Update a workaround for a glibc bug that would cause DNS PTR queries to occur
  even when rdns = false.
* Fix a kadmind denial of service issue (null pointer dereference), which could
  only be triggered by an administrator with the "create" privilege.
  [CVE-2012-1013]

Changes 1.10.1:
This is a bugfix release.
* Fix access controls for KDB string attributes [CVE-2012-1012]
* Make the ASN.1 encoding of key version numbers interoperate with Windows
  Read-Only Domain Controllers
* Avoid generating spurious password expiry warnings in cases where the KDC
  sends an account expiry time without a password expiry time.
2012-07-16 19:12:33 +00:00
cheusov
caf662e3db Fix a segfault of starttls(1) when run without arguments
Add LICENSE
++pkgrevision
2012-07-15 11:12:21 +00:00
wiz
0e2c441278 Recursive bump for startup-notification* dependency change, requested
by Obache.
2012-07-15 08:22:46 +00:00
wiz
fb2cb2d652 Update to 0.4.6, from Jaap Boender.
0.4.6 (2011-10-16)
=====
* Added write_certificate function.
* Remove support for SSLv2, which was dropped upstream (thanks Dario Teixeira).
* Added support for compiling under Win32 (thanks David Allsopp), see
  README.win32.
* Check for pthreads in configure.

0.4.5 (2011-03-01)
=====
* Use pthread mutexes for locking thread-safe version of ssl.

0.4.4 (2010-01-06)
=====
* Use SSL_CTX_use_certificate_chain_file instead of
  SSL_CTX_use_certificate_file.
* Added support for --enable-debugging configure option.
* Don't link with unix library and don't build in custom mode.

0.4.3 (2008-12-18)
=====
* Don't use blocking sections in finalizers since it causes segfaults (thanks
  Grégoire Henry and Stéphane Glondu).
2012-07-14 21:23:49 +00:00
chs
ec74df8fa6 update required version to 2.4, the new gnutls needs it. 2012-07-09 04:50:12 +00:00
sbd
8b9d50ff08 Add missing zlib buildlink.
Bump PKGREVISION.
2012-07-08 09:56:09 +00:00
sno
808519a68a Updating package for Perl 5 module Digest::MD5 in security/p5-Digest-MD5
from 2.51nb1 to 2.52.

Upstream changes:
2012-06-08   Gisle Aas <gisle@ActiveState.com>

   Gisle Aas (3):
      Wrong version number in the changelog
      The t/threads.t was missing from the MANIFEST
      Update expected digests for files

   Andrew Fresh (1):
      Remove double the

   Lyle Hopkins (1):
      Digest::Perl::MD5 OO fallback didn't work [RT#66634]

   Peter J. Acklam (1):
      Fix typos (spelling errors) in cpan/Digest-MD5/*

   Shlomi Fish (1):
      Modernize the code in the POD.

   Zefram (1):
      Makes Digest::MD5 work on Perl 5.6 [RT#75032]
2012-07-06 13:22:13 +00:00
sno
ca67bdba9e Updating package for Perl 5 module IO::Socket::SSL in
security/p5-IO-Socket-SSL from 1.74 to 1.76.

Upstream changes:
v1.76 2012.06.18
- no longer depend on Socket.pm 1.95 for inet_pton, but use Socket6.pm if
  no current Socket.pm is available. Thanks to paul[AT]city-fan[DOT]org
  for pointing out the problem and providing first patch
v1.75 2012.06.15
- made it possible to explicitly disable TLSv11 and TLSv12 in SSL_version
2012-07-06 13:19:11 +00:00
drochner
5dec50dedb revbump for libpreluse requirement bump 2012-07-05 16:09:18 +00:00
drochner
cd66720cd6 revursive revbump for gnutls update 2012-07-05 16:07:18 +00:00
drochner
cd9b627226 more PKGREV bumps for gnutls update 2012-07-05 15:44:06 +00:00
drochner
c844dabc0e make this build with gnutls-3, bump PKGREV 2012-07-05 15:42:55 +00:00
drochner
341d76d0e0 update to 3.4.1
This switches to the gnome-3.4 branch
(Seems to be source and binary compatible to the 2.32 one, no need
to keep the old version.)
2012-07-04 20:10:25 +00:00
schwarz
d5c2804398 patch away special paths for MacOS X since they are not supported by pkgsrc.
Treat MacOS X just like any other UNIX system.
2012-07-03 18:37:55 +00:00
schwarz
199abe63c8 added LICENSE information 2012-07-03 18:36:56 +00:00
drochner
a6f7292569 update to 3.0,20
This switches to the new stable release branch.
2012-07-02 18:53:02 +00:00
drochner
f33839ff50 update to 2.0.3
changes:
-fix for pipe servers
-build system improvements
2012-07-02 16:59:40 +00:00
drochner
0568b1ca8d update to 1.12.20
changes: bugfixes:
-Fixed memory leak in PKCS #8 key import
-Check key identifiers when checking for an issuer

pkgsrc note: This is just a last checkpoint on the 2.x branch, in case
 it will be needed for the Q2 branch. Will update to 3.x RSN.
2012-07-02 16:30:01 +00:00
adam
866b730e71 Revbump after updating boost 2012-07-02 13:37:35 +00:00