Commit graph

11439 commits

Author SHA1 Message Date
nia
2e404ebda6 p5-Crypt-CBC: Update to 3.04.
Fix packaging on 32-bit platforms by disabling int128 dependency.

3.04	 Mon 17 May 2021 10:58:37 AM EDT
        - Fixed bug involving manually-specified IV not being used in some circumstances.
2021-07-02 11:27:21 +00:00
nia
e8059d2f92 go-sftp: remove
deprecated go-package; no users in pkgsrc
2021-07-01 06:04:47 +00:00
wiz
a2f0c9cac5 security/Makefile: + libuecc. 2021-07-01 05:54:12 +00:00
adam
108faa32ba py-asyncssh: updated to 2.7.0
Release 2.7.0 (19 Jun 2021)

Added support for the ProxyCommand config file option and a corresponding proxy_command argument in the SSH connection options, allowing a subprocess to be used to make the connection to the SSH server. When the config option is used, it should be fully compatible with OpenSSH percent expansion in the command to run.
Added support for accessing terminal information as properties in the SSHServerProcess class. As part of this change, both the environment and terminal modes are now available as read-only mappings. Thanks again to velavokr for suggesitng this and submitting a PR with a proposed version of the change.
Fixed terminal information passed to pty_requested() callback to properly reflect requested terminal type, size, and modes. Thanks go to velavokr for reporting this issue and proposing a fix.
Fixed an edge case where a connection object might not be cleaned up properly if the connection request was cancelled before it was fully established.
Fixed an issue where some unit tests weren’t properly closing connection objects before exiting.
2021-06-29 13:36:26 +00:00
gutteridge
8a5b96f219 polkit: fix sandboxed builds
The newly-added autoreconf processing here requires gtkdocize.
2021-06-29 01:58:55 +00:00
pin
78a1644ea0 security/gpg-tui: update to 0.6.2
0.6.2 - 2021-06-27
Changed:
- Bump the Rust version in Dockerfile
- Use entrypoint for the docker container
- Update the docker command for quickly launching the app

0.6.1 - 2021-06-26
Changed:
- Run the container as non-root/dedicated user
- Update the docker alias in README.md

0.6.0 - 2021-06-25
Added:
- Support importing keys from the clipboard (#3)
- Add git-cliff configuration file

Changed:
- Update the keyserver link

Fixed:
- Apply clippy lints
- Update application command tests
2021-06-28 20:03:47 +00:00
nia
2a2102e013 polkit: Add duktape backend. Disable mozjs dependency.
Based on an unmerged merge request by Wu Xiaotian:
https://gitlab.freedesktop.org/polkit/polkit/-/merge_requests/35

Bump PKGREVISION.
2021-06-28 12:38:46 +00:00
wiz
bb2c579f69 keepassxc: update to 2.6.6.
## 2.6.6 (2021-06-11)

### Fixed

- Fix focusing search when pressing hotkey [#6603]
- Trim whitespace from TOTP key input prior to processing [#6604]
- Fix building on macOS [#6598]
- Resolve compiler warnings for unused return values [#6607]

## 2.6.5 (2021-06-07)

### Added

- Show search bar when toolbar is hidden or in overflow [#6279]
- Show countdown for clipboard clearing in status bar [#6333]
- Command line option to lock all open databases [#6511]
- Allow CSV import of bare TOTP secrets [#6211]
- Retain file creation time when saving database [#6576]
- Set permissions of saved attachments to be private to the current user [#6363]
- OPVault: Use Text instead of Name for attribute names [#6334]

### Changed

- Reports: Allow resizing of reports columns [#6435]
- Reports: Toggle showing expired entries [#6534]
- Save Always on Top setting [#6236]
- Password generator can exclude additional lookalike characters (6/G, 8/B) [#6196]

### Fixed

- Allow setting MSI properties in unattended install [#6196]
- Update MainWindow minimum size to enable smaller verticle space [#6196]
- Use application font size when setting default or monospace fonts [#6332]
- Fix notes not clearing in entry preview panel in some cases [#6481]
- macOS: Correct window activation when restoring from tray [#6575]
- macOS: Better handling of minimize after unlock when using browser integration [#6338]
- Linux: Start after the system tray is available on LXQt [#6216]
- Linux: Allow selection of modal dialogs on X11 in Auto-Type [#6204]
- KeeShare: prevent crash when file extension is missing [#6174]
2021-06-28 08:37:22 +00:00
tnn
9defde537e hitch: update to 1.7.0
2020-10-27: Hitch 1.7.0 released. This introduces support for PROXYv2 in --proxy-proxy mode,
adds new command line switches for various settings, and fixes a bug relating to an imbalance
in worker process load distribution, among other things. See the changelog for more information.

2020-08-31: Hitch 1.6.1 released. Fixes an issue in the PROXYv2 handling where we sometimes would
transmit the wrong 'verify' status for client certificate verification. (changelog)
2021-06-27 10:12:10 +00:00
adam
b10ccd73d4 py-oauthlib: updated to 3.1.1
3.1.1 (2021-05-31)
------------------
OAuth2.0 Provider - Bugfixes

  * Fix acceptance of valid IPv6 addresses in URI validation

OAuth2.0 Client - Bugfixes

  * Base OAuth2 Client now has a consistent way of managing the `scope`: it consistently
    relies on the `scope` provided in the constructor if any, except if overridden temporarily
    in a method call. Note that in particular providing a non-None `scope` in
    `prepare_authorization_request` or `prepare_refresh_token` does not override anymore
    `self.scope` forever, it is just used temporarily.
  * MobileApplicationClient.prepare_request_uri and MobileApplicationClient.parse_request_uri_response,
    ServiceApplicationClient.prepare_request_body,
    and WebApplicationClient.prepare_request_uri now correctly use the default `scope` provided in
    constructor.
  * LegacyApplicationClient.prepare_request_body now correctly uses the default `scope` provided in constructor

OAuth2.0 Provider - Bugfixes
  * client_credentials grant: fix log message
  * OpenID Connect Hybrid - fix nonce not passed to add_id_token
  * Different prompt values are now handled according to spec (e.g. prompt=none)
  * OpenID Connect - fix Authorization: Basic parsing

General
  * improved skeleton validator for public vs private client
  * replace mock library with standard unittest.mock
  * build isort integration
  * python2 code removal
  * add python3.8 support
  * bump minimum versions of pyjwt and cryptography
2021-06-25 21:00:12 +00:00
micha
92bc54dc23 security/mdigest: Add additional licenses for statically linked libmdigest 2021-06-25 13:50:45 +00:00
micha
32793c9ab9 security/mdigest: Added version 1.6
mdigest reads the files from the argument list and computes a message
digest hash for the file content.

If the argument list is empty mdigest reads from standard in.
2021-06-25 10:13:57 +00:00
nia
0a5a9233da add security/libuecc
libuecc is a very small generic-purpose Elliptic Curve Cryptography library
compatible with Ed25519.
2021-06-24 13:55:26 +00:00
wiz
76a25c3ca1 security/Makefile: + py-spake2. 2021-06-23 21:07:42 +00:00
wiz
638a0a7d40 security/py-spake2: import py-spake2-0.8
Packaged for wip by Matthias Ferdinand.

This library implements the SPAKE2 password-authenticated key exchange
("PAKE") algorithm. This allows two parties, who share a weak password,
to safely derive a strong shared secret (and therefore build an
encrypted+authenticated channel).
2021-06-23 21:07:29 +00:00
wiz
403e55ce3f security/Makefile: + py-hkdf 2021-06-23 21:05:44 +00:00
wiz
527907fe76 security/py-hkdf: import py-hkdf-0.0.3
Packaged for wip by Matthias Ferdinand.

This module implements the HMAC Key Derivation function, defined at

    http://tools.ietf.org/html/draft-krawczyk-hkdf-01

There are two interfaces: a functional interface, with separate extract
and expand functions as defined in the draft RFC, and a wrapper class
for these functions.
2021-06-23 21:05:17 +00:00
wiz
f54850eaba age: update to 1.0.0rc3.
Never two without three

Maybe™️ actually™️ the last v1.0.0 release candidate!

Encrypted identity files are now supported. Regular passphrase-encrypted
age files can be used with -i, the passphrase will be requested
interactively, and the decrypted file will be read line-by-line as
a standard identity file.

Passphrases can now be requested interactively from the terminal
on Windows even if standard input is in use.

Errors are now tidier and all start with age: error: .
2021-06-23 21:00:24 +00:00
nia
55394cf036 Revbump for MySQL default change 2021-06-23 20:33:06 +00:00
nia
c696cc1eb6 lynis: remove list of operating systems from COMMENT 2021-06-23 20:27:16 +00:00
bacon
156cfcb98f security/munge: Release maintainership
Narrowing my focus to biology packages
2021-06-23 19:44:16 +00:00
schmonz
948eb5a666 Probably make cvm-checkpassword actually work as an alternative
checkpassword. Bump PKGREVISION.
2021-06-23 18:51:03 +00:00
wiz
e61238c406 tor-browser: update to 10.0.18.
This version updates Tor to 0.4.5.9, including important security
fixes.

Warning:

Tor Browser will stop supporting version 2 onion services later
this year. Please see the previously published deprecation timeline.
Migrate your services and update your bookmarks to version 3 onion
services as soon as possible.
2021-06-22 11:25:07 +00:00
spz
7e9ac86133 build fix for NetBSD-8/m68k which calls itself netbsdelf 2021-06-19 11:17:53 +00:00
markd
4641b802ee kauth: more files needed in buildlink. These get k3b building again. 2021-06-16 20:46:56 +00:00
markd
efa2aeb518 kauth: buildlink libexec/kauth/* files. needed for latest cmake 2021-06-16 10:38:05 +00:00
taca
06a582b0a0 security/ruby-metasploit_payloads-mettle: update to 1.0.10
Quote from commit logs:

1.0.10 (2021-06-09)

* Support enumerating platforms for a extension
* Fixup enumerating the extensions for a platform
* Remove an extra word word
2021-06-14 15:31:12 +00:00
taca
5f8dc03c0e security/ruby-metasploit-payloads: update to 2.0.47
Quote from commit logs:

2.0.47 (2021-06-09)

* Support enumerating all extension names
* Support enumerating Meterpreter extension suffixs
* Fix a typo in how suffixes is spelled
* Rename a function and update a regex
2021-06-14 15:27:07 +00:00
adam
dd27eb365c py-certifi: updated to 2021.5.30
2021.5.30:
Unknown changes
2021-06-14 13:29:01 +00:00
adam
17cf3dccf2 py-acme py-certbot*: updated to 1.16.0
Certbot 1.16.0

Changed

DNS plugins based on lexicon now require dns-lexicon >= v3.1.0
Use UTF-8 encoding for renewal configuration files
Windows installer now cleans up old Certbot dependency packages
before installing the new ones to avoid version conflicts.
This release contains a substantial command-line UX overhaul,
based on previous user research. The main goal was to streamline
and clarify output. If you would like to see more verbose output, use
the -v or -vv flags. UX improvements are an iterative process and
the Certbot team welcomes constructive feedback.
Functions certbot.crypto_util.init_save_key and certbot.crypto_util.init_save_csr,
whose behaviors rely on the global Certbot config singleton, are deprecated and will
be removed in a future release. Please use certbot.crypto_util.generate_key and
certbot.crypto_util.generate_csr instead.

Fixed

Fix TypeError due to incompatibility with lexicon >= v3.6.0
Installers (e.g. nginx, Apache) were being restarted unnecessarily after dry-run renewals.
Colors and bold text should properly render in all supported versions of Windows.
2021-06-14 12:15:39 +00:00
pin
8c912f94c2 security/gpg-tui: update to 0.5.0
[0.5.0] - 2021-06-13

Added:
-Support setting the default signing key via options menu

Changed:
-Update Dockerfile about crate dependency location
-Update COMMANDS.md about getting/setting default signing key
-Update README.md about setting the default signing key
2021-06-14 07:39:02 +00:00
adam
aa031aa5d6 py-trustme: updated to 0.8.0
Trustme 0.8.0 (2021-06-08)
Features
It’s now possible to set an expiry date on server certificates, either with --expires-on in the CLI or with not_after in trustme.CA.issue_cert.
Support Python 3.10
Set correct KeyUsage and ExtendedKeyUsage extensions, per CA/B Forum baseline requirements
2021-06-13 18:46:29 +00:00
taca
5d4d06a853 security/sudo: update to 1.9.7p1
1.9.7p1 (2021-06-11)

What's new in Sudo 1.9.7p1

 * Fixed an SELinux sudoedit bug when the edited temporary file
   could not be opened.  The sesh helper would still be run even
   when there are no temporary files available to install.

 * Fixed a compilation problem on FreeBSD.

 * The sudo_noexec.so file is now built as a module on all systems
   other than macOS.  This makes it possible to use other libtool
   implementations such as slibtool.  On macOS shared libraries and
   modules are not interchangeable and the version of libtool shipped
   with sudo must be used.

 * Fixed a few bugs in the getgrouplist() emulation on Solaris when
   reading from the local group file.

 * Fixed a bug in sudo_logsrvd that prevented periodic relay server
   connection retries from occurring in "store_first" mode.

 * Disabled the nss_search()-based getgrouplist() emulation on HP-UX
   due to a crash when the group source is set to "compat" in
   /etc/nsswitch.conf.  This is probably due to a mismatch between
   include/compat/nss_dbdefs.h and what HP-UX uses internally.  On
   HP-UX we now just cycle through groups the slow way using
   getgrent().  Bug #978.
2021-06-13 15:20:52 +00:00
nia
6a221f4ed5 acmesh: update to 2.9.0
ACME v1 is removed.
    Bug fixes.
    fixed --preferred-chain
    more DNS APIs are supported.
2021-06-12 07:04:46 +00:00
abs
6a4fb3e9c9 Add missed "include go-modules.mk" 2021-06-10 15:56:39 +00:00
pin
271a42033a security/gpg-tui: update to 0.4.1
[0.4.1] - 2021-06-09

Fixed:
-Expand tilde character to the home directory (fixes #22)
2021-06-10 11:47:17 +00:00
wiz
5f9c924231 p11-kit: update to 0.24.0.
0.24.0 (stable)
 * Use inclusive language on certificate distrust.  Note: This changes
   the directory and attribute names to distrust certain CAs to
   "blocklist" [PR#324]
 * Fix issues spotted by coverity and ASan [PR#349, PR#351]
 * Integrate gettext with tools more tightly [PR#358]
 * rpc: Forbid use of array of attributes [PR#365, PR#367]
 * Build fixes [PR#342, PR#344, PR#345, PR#353, PR#362, PR#364]
2021-06-10 10:20:50 +00:00
abs
215cff19e1 +security/age 2021-06-09 17:04:26 +00:00
abs
0497c35a07 Added security/age version 1.0.0rc2
age is a simple, modern and secure file encryption tool, format,
and Go library.

It features small explicit keys, no config options, and UNIX-style
composability

The format specification is at age-encryption.org/v1. age was
designed by @Benjojo12 and @FiloSottile.

An alternative interoperable Rust implementation is available at
github.com/str4d/rage.
2021-06-09 17:03:49 +00:00
pin
0a9f419092 security/gpg-tui: update to 0.4.0
[0.4.0] - 2021-06-07

Changed:
-Extract get_output_file from export_keys method
-Support exporting secret subkeys (#15)
-Update COMMANDS.md about export command
-Update README.md about exporting secret subkeys
2021-06-08 10:20:37 +00:00
manu
db3a7cc491 Update security/crudesaml, cy2-saml and pam-saml to 1.10
Change since 1.9 from the Changelog file

crusdesaml-1.10         2021-06-06
Shutdown/reinit lasso in a process liftime is not supported (Florian Best)
2021-06-08 07:38:18 +00:00
manu
b43b5e24bc Update lasso to 2.7.0
Changes from 2.6.1, from the NEWS file

2.7.0 - June 1st 2021
----------------------
36 commits, 45 files changed, 1945 insertions, 177 deletions

* CVE-2021-28091: Fix signature checking on unsigned response with multiple assertions

  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28091

  When AuthnResponse messages are not signed (which is
  permitted by the specifiation), all assertion's signatures should be
  checked, but currently after the first signed assertion is checked all
  following assertions are accepted without checking their signature, and
  the last one is considered the main assertion.

  This patch :
  * check signatures from all assertions if the message is not signed,
  * refuse messages with assertion from different issuers than the one on
    the message, to prevent assertion bundling event if they are signed.

* Python: improve display of warnings in the binding generator
* replace deprecated index() by strchr() (#51385)
* Fix: new provider reference count is incremented one time too many (#51420)
* docs: update gtk-doc-tools integration (#50441)
* bindings: disable java tests when java is disabled
* Fix: python3 bindings (#51249)
* configure.ac: disable java bindings
* build: update to use origin/main
* debian: add packaging for debian-buster
* jenkins.sh: build against all available python versions (#44287)
* python: do not leak out_pyvalue if method call protocol is not respected (#44287)
* python: do not raise in valid_seq() (#44287)
* python: return NULL if get_list_of_strings() fails (#44287)
* python: return NULL if get_list_of_pygobject fails (#44287)
* python: return NULL if get_list_of_xml_nodes fails (#44287)
* python: return NULL if set_list_of_pygobject fails (#44287)
* python: return NULL if set_list_of_xml_nodes fails (#44287)
* python: return NULL if set_list_of_strings fails (#44287)
* python: return NULL if set_hashtable_of_strings fails (#44287)
* python: return NULL if set_hashtable_of_pygobject fails (#44287)
* python: free internal string buffer if needed in set_list_of_strings (#44287)
* python: check if hashtable is NULL before deallocatio (#44287)n
* python: add a failure label to method wrappers (#44287)
* python: add macro for early return (#44287)
* python: remove newline before method call (#44287)
* python: simplify get_logger_object (#44287)
* python: fix warning about discarded const modifier (#44287)
* python: replace exception by warning on logging path (#44287)
* python: use simpler call format to prevent warning about PY_SSIZE_T_CLEAN (#44287)
* python: remove deprecated PyErr_Warn (#44287)
* python: remove unused PyString_Size (#44287)
* python: Exception.message was removed in python3 (#45995)
* tools: reimplement xmlURIEscapeStr to respect RFC3986 (#45581)
* configure.ac: support php7 interpreter on CentOS 8 (#42299)
2021-06-08 07:34:47 +00:00
adam
677a151201 nettle: updated to 3.7.3
NEWS for the Nettle 3.7.3 release

This is bugfix release, fixing bugs that could make the RSA
decryption functions crash on invalid inputs.

Upgrading to the new version is strongly recommended. For
applications that want to support older versions of Nettle,
the bug can be worked around by adding a check that the RSA
ciphertext is in the range 0 < ciphertext < n, before
attempting to decrypt it.

Thanks to Paul Schaub and Justus Winter for reporting these
problems.

The new version is intended to be fully source and binary
compatible with Nettle-3.6. The shared library names are
libnettle.so.8.4 and libhogweed.so.6.4, with sonames
libnettle.so.8 and libhogweed.so.6.

Bug fixes:

* Fix crash for zero input to rsa_sec_decrypt and
  rsa_decrypt_tr. Potential denial of service vector.

* Ensure that all of rsa_decrypt_tr and rsa_sec_decrypt return
  failure for out of range inputs, instead of either crashing,
  or silently reducing input modulo n. Potential denial of
  service vector.

* Ensure that rsa_decrypt returns failure for out of range
  inputs, instead of silently reducing input modulo n.

* Ensure that rsa_sec_decrypt returns failure if the message
  size is too large for the given key. Unlike the other bugs,
  this would typically be triggered by invalid local
  configuration, rather than by processing untrusted remote
  data.
2021-06-07 18:57:58 +00:00
wiz
e774090a92 tor-browser-noscript: update to 11.2.8.
v 11.2.8
============================================================
x Quiet down unnecessary debug logging (issue #191)
x [L10n] Updated he, de
x Fix meta refresh sometimes ignored on Firefox 78 ESR
  (issue #192, thanks hackerncoder for report)
x Chromium-specific build-time customizations

v 11.2.8rc2
============================================================
x Quiet down unnecessary debug logging (issue #191)
x [L10n] Updated he

v 11.2.8rc1
============================================================
x Fix meta refresh sometimes ignored on Firefox 78 ESR
  (issue #192, thanks hackerncoder for report)
x [l10n] Updated de
x Chromium-specific build-time customizations

v 11.2.7
============================================================
x Better prompt layout (no accidental scrollbar)
x [nscl] Fix regression causing media patches to break some
  pages (thanks l0drex for report, issue #189)

v 11.2.6
============================================================
x [nscl] Various webgl blocking enhancements
x Remove also sticky-positioned elements with click+DEL on
  scriptless pages (thanks skriptimaahinen for RFE)
x [L10n] Updated bn, br, ca, da, de, el, es, fr, he, is, it,
  ja, lt, mk, ms, nb, nl, pl, pt_BR, ru, sq, sv_SE, tr,
  zh_CN, zh_TW
x Fixed race condition causing external CSS not to be
  rendered sometimes when unrestricted CSS is disabled
x Avoid document rewriting for noscript meta refresh
  emulation in most cases
x [nscl] Fixed XHTML pages broken when served with
  application/xml MIME type and no "object" capability
x [nscl] Switch early content script configuration to use
  /nscl/service/DocStartInjection.js
x Configurable "unrestricted CSS" capability to for sites
  where the CSS PP0 mitigation should be disabled
  (e.g TRUSTED)
x [nscl] Fix CSS PP0 mitigation still interfering with some
  WebExtensions (thanks barbaz for report)
x [XSS] Increased sensitivity and specificity of risky
  operator pre-checks

v 11.2.6rc1
============================================================
x [nscl] Various webgl blocking enhancements
x Remove also sticky-positioned elements with click+DEL on
  scriptless pages (thanks skriptimaahinen for RFE)

v 11.2.5rc6
============================================================
x [L10n] Updated bn, br, ca, da, de, el, es, fr, he, is, it,
  ja, lt, mk, ms, nb, nl, pl, pt_BR, ru, sq, sv_SE, tr,
  zh_CN, zh_TW
x Policy retrieval origin fine tuning

v 11.2.5rc5
============================================================
x Fixed hook not taking in account experimental webgl
  contexts (issue #187, thanks roman567e45 for report)

v 11.2.5rc4
============================================================
x Fixed regression in NOSCRIPT emulation (thanks barbaz for
  reporting)

v 11.2.5rc3
============================================================
x Fixed race condition causing external CSS not to be
  rendered sometimes when unrestricted CSS is disabled
x Rename "unchecked CSS" capability to "unrestricted CSS"
x Avoid document rewriting for noscript meta refresh
  emulation in most cases

v 11.2.5rc2
============================================================
x [nscl] Minor fixes from the library
x [nscl] Fixed XHTML pages broken when served with
  application/xml MIME type and no "object" capability
x [nscl] Switch early content script configuration to use
  /nscl/service/DocStartInjection.js
x [nscl] Refactored ContentScriptOnce.js to the library
x Rename the "csspp0" capability to "unchecked_css"

v 11.2.5rc1
============================================================
x Configurable "csspp0" capability to for sites where the
  CSS PP0 mitigation should be disabled (e.g TRUSTED)
x [nscl] Fix CSS PP0 mitigation still interfering with some
  WebExtensions (thanks barbaz for report)
x [XSS] Increased sensitivity and specificity of risky
  operator pre-checks
2021-06-07 14:03:14 +00:00
wiz
49ae550e43 tor-browser: update to 10.0.17.
This version updates Firefox to 78.11esr. This version includes
important security updates to Firefox for Desktop.

Warning:

Tor Browser will stop supporting version 2 onion services later
this year. Please see the previously published deprecation timeline.
Migrate your services and update your bookmarks to version 3 onion
services as soon as possible.
2021-06-07 14:02:16 +00:00
adam
0b09689755 py-authlib: updated to 0.15.4
0.15.4:
Unknown changes
2021-06-07 08:18:10 +00:00
bsiegert
0a27e3832d Revbump all Go packages after go116 update 2021-06-06 12:18:57 +00:00
taca
b8e939b87b security/php-gnupg: update to 1.5.0
pkgsrc change: remove restriction to depeding package, requirement gpgme
package to using gnupg1 PKG_OPTIONS.

Approved by tpaul@.


1.5.0 (2021-04-10)

* Added new README.md

1.5.0RC2 (2021-03-07)

* Fixed build with libgpgme 1.3
* Fixed largefile support on 32-bit platforms
* Fixed tests in PECL archive

1.5.0RC1 (2021-02-14)

* Added support for PHP 8
* Added support for GnuPG 2.1+
* Added argument info for all functions and methods (reflection support)
* Added new function `gnupg_getengineinfo`
* Added new function `gnupg_geterrorinfo`
* Added init array argument for setting home dir and gpg binary file name
* Added additional fields to `gnupg_keyinfo` returned array
* Added parameter to `gnupg_keyinfo` to use `secret_only`
* Fixed `gnupg_deletekey` to use boolean for `allow_secret` parameter
2021-06-06 07:20:05 +00:00
pin
fe8257048b security/gpg-tui: update to 0.3.0
[0.3.0] - 2021-06-05

Added:
-Add packaging status badge to README.md
-Add Matrix room link to social media section in README.md

Changed:
-Display notations of the signatures (#8)
-Update README.md about Docker alias
-Update README.md about the format of notations
-Update the example notation in README.md
-Update the style of flags

Fixed:
-Run container process as unprivileged user
2021-06-05 20:07:17 +00:00
mef
4cffa92eb2 (security/clamav-doc) regen PLIST 2021-06-05 04:18:55 +00:00
mef
524f068712 (security/yara) build fix: ERROR: [check-portability.awk] 2021-06-05 02:58:18 +00:00
gdt
9bab7a4276 security/sudo: Drop MESSAGE (as hints to read docs) 2021-06-04 12:21:55 +00:00
taca
dd00dd1c84 security/clamav: update to 0.103.2
0.103.2 (2021-04-07)

ClamAV 0.103.2 is a security patch release with the following fixes:

* CVE-2021-1386: Fix for UnRAR DLL load privilege escalation.  Affects
  0.103.1 and prior on Windows only.

* CVE-2021-1252: Fix for Excel XLM parser infinite loop.  Affects 0.103.0
  and 0.103.1 only.

* CVE-2021-1404: Fix for PDF parser buffer over-read; possible crash.
  Affects 0.103.0 and 0.103.1 only.

* CVE-2021-1405: Fix for mail parser NULL-dereference crash.  Affects
  0.103.1 and prior.

* Fix possible memory leak in PNG parser.

* Fix ClamOnAcc scan on file-creation race condition so files are scanned
  after their contents are written.

* FreshClam: Deprecate the SafeBrowsing config option.  The SafeBrowsing
  option will no longer do anything.

* For more details, see our blog post from last year about the future of the
  ClamAV Safe Browsing database.

* Tip: If creating and hosting your own safebrowing.gdb database, you can
  use the DatabaseCustomURL option in freshclam.conf to download it.

* FreshClam: Improved HTTP 304, 403, & 429 handling.

* FreshClam: Added back the mirrors.dat file to the database directory.
  This new mirrors.dat file will store:

	- A randomly generated UUID for the FreshClam User-Agent.
	- A retry-after timestamp that so FreshClam won't try to update
          after having received an HTTP 429 response until the Retry-After
          timeout has expired.

* FreshClam will now exit with a failure in daemon mode if an HTTP 403
  (Forbidden) was received, because retrying later won't help any.  The
  FreshClam user will have to take actions to get unblocked.

* Fix the FreshClam mirror-sync issue where a downloaded database is "older
  than the version advertised."

* If a new CVD download gets a version that is older than advertised,
  FreshClam will keep the older version and retry the update so that the
  incremental update process (CDIFF patch process) will update to the latest
  version.
2021-06-03 15:47:34 +00:00
wiz
b4348cc11f polkit: update to 0.119.
Fix some pkglint, including renaming a patch to match the file it applies
to.

This is polkit 0.119.

Highlights:
 meson build system added
 CVE-2021-3560 mitigation

Build requirements

 glib, gobject, gio    >= 2.32
 mozjs-78
 gobject-introspection >= 0.6.2 (optional)
 pam (optional)
 ConsoleKit OR systemd

Changes since polkit 0.118:

 Inigo Martinez:
    meson build system added alongside autotools (many thanks!!)

 Matthias Classen:
    properties in text listener

 René Genz:
    typos fixups

 Balázs Úr:
    Update Hungarian translation

 Hendrik Werner:
    meson post-install script mod to avoid calling external processes

 Kevin Backhouse, Jan Rybar:
    CVE-2021-3560 mitigation

Many thanks to all contributors!

Jan Rybar et al.,
June 3, 2021
2021-06-03 14:43:07 +00:00
pin
a68dfa809d security/gpg-tui: update to 0.2.0
[0.2.0] - 2021-06-02

Added:
-Add installation instructions for FreeBSD
-Add Homebrew instructions to README.md
-Add NetBSD instructions to README.md

Changed:
-Update table of contents
-Support xplr for file selection (closes #2)
-Use eprintln macro while printing errors
-Update README.md about the use of xplr
2021-06-03 10:07:37 +00:00
wiz
8255fa2ab5 security/Makefile: sort 2021-06-03 07:43:38 +00:00
pin
faf2bec986 security/gpg-tui: fix mistake 2021-06-02 19:06:17 +00:00
pin
a2cb774102 security/gpg-tui: fix broken build 2021-06-02 17:17:55 +00:00
taca
8bdd9d3e6b security/ruby-rex-text: update to 0.2.34
Quote from commit logs:

0.2.34 (2021-04-08)

* Land #41, Add rand_password method to Rex::Text
2021-06-01 14:44:45 +00:00
taca
a13904d602 security/ruby-rex-socket: update to 0.1.29
Quote from commit logs:

0.1.29 (2021-03-25)

* Land #31, Consistently return nil as the failure indicator

0.1.28 (2021-03-25)

* Land #30, Fix Some RangeWalker issues

0.1.27 (2021-03-24)

* Land #28, RangeWalker Updates To Return Hostnames When Available
2021-06-01 14:42:29 +00:00
taca
573ffbda01 security/ruby-rex-powershell: update to 0.1.90
0.1.90 (2021-04-23)

* Land #30, Implement the rc4 wrapper
2021-06-01 14:35:44 +00:00
adam
5a0df8b479 py-ecdsa: updated to 0.17.0
Relase 0.17.0 (27 May 2021)

New API:
* Keys that use explicit curve parameters can now be read and written.
  Reading of explicit curves can be disabled by using the
  `valid_curve_encodings` keyword argument in `VerifyingKey.from_pem()`,
  `VerifyingKey.from_der()`, `SigningKey.from_pem()`, and
  `SigningKey.from_der()`.
* Keys can now be written with use of explicit curve parameters,
  use `curve_parameters_encoding` keyword argument of `VerifyingKey.to_pem()`,
  `VerifyingKey.to_der()`, `SigningKey.to_pem(), or `SigningKey.to_der()` to
  specify the format. By default `named_curve` will be used, unless the
  curve doesn't have an associated OID (as will be the case for an unsupported
  curve), then `explicit` encoding will be used.
* Allow specifying acceptable point formats when loading public keys
  (this also fixes a minor bug where python-ecdsa would accept raw
  encoding for points in PKCS#8 files). Set of accepted encodings is controlled
  by `valid_encodings` keyword argument in
  `ECDH.load_received_public_key_bytes()`, `VerifyingKey.from_string()`,
  `VerifyingKey.from_pem()`, VerifyingKey.from_der()`.
* `PointJacobi` and `Point` now inherit from `AbstractPoint` that implements
  the methods for parsing points. That added `from_bytes()` and
  `to_bytes()` methods to both of them.
* Curve parameters can now be read and written to PEM and DER files. The
  `Curve` class supports new `to_der()`, `from_der()`, `to_pem()`, and
  `from_pem()` methods.

Doc fix:
* Describe in detail which methods can raise `RSZeroError`, and that
  `SigningKey.sign_deterministic()` won't raise it.

Bug fix:
* Correctly truncate hash values larger than the curve order (only impacted
  custom curves and the curves added in this release).
* Correctly handle curves for which the order is larger than the prime
  (only impacted custom curves and the secp160r1 curve added in this release).
* Fix the handling of `==` and `!=` for `Public_key`, `Private_key`, `Point`,
  `PointJacobi`, `VerifyingKey`, and `SigningKey` so that it behaves
  consistently and in the expected way both in Python 2 and Python 3.
* Implement lock-less algorithm inside PointJacobi for keeping shared state
  so that when calculation is aborted with KeyboardInterrupt, the state doesn't
  become corrupted (this fixes the occasional breakage of ecdsa in interactive
  shells).

New features:
* The `speed.py` script now provides performance for signature verification
  without use of precomputation.
* New curves supported: secp112r1, secp112r2, secp128r1, secp160r1.

Performance:
* Use 2-ary Non-Adjacent Form for the combined multiply-add. This speeds up
  single-shot verify (i.e. without precomputation) by about 4 to 5%.
* Use native Python 3.8 support for calculating multiplicative inverses.

Maintenace:
* Include Python 3.9 in PyPI keywords.
* More realistic branch coverage counting (ignore Python version-specific
  branches).
* Additional test coverage to many parts of the library.
* Migrate to Github Actions for Continuous Testing.
2021-06-01 05:34:51 +00:00
pin
e49cfac023 security/gpg-tui: update to 0.1.5
Added:
-Add dependency installation instructions for Void Linux (#11)

Changed:
-Mention distribution-specific dependencies in README.md (#10)
-Update the formatting of requirements in README.md
-Update README.md about installation for Arch Linux
2021-05-31 20:50:48 +00:00
wiz
13f57a381f gnutls: update to 3.7.2.
* Version 3.7.2 (released 2021-05-29)

** libgnutls: The priority string option %DISABLE_TLS13_COMPAT_MODE was added
   to disable TLS 1.3 middlebox compatibility mode

** libgnutls: The Linux kernel AF_ALG based acceleration has been added.
   This can be enabled with --enable-afalg configure option, when libkcapi
   package is installed (#308).

** libgnutls: Fixed timing of early data exchange. Previously, the client was
   sending early data after receiving Server Hello, which not only negates the
   benefit of 0-RTT, but also works under certain assumptions hold (e.g., the
   same ciphersuite is selected in initial and resumption handshake) (#1146).

** certtool: When signing a CSR, CRL distribution point (CDP) is no longer
   copied from the signing CA by default (#1126).

** libgnutls: The GNUTLS_NO_EXPLICIT_INIT envvar has been renamed to
   GNUTLS_NO_IMPLICIT_INIT to reflect the purpose (#1178). The former is now
   deprecated and will be removed in the future releases.

** certtool: When producing certificates and certificate requests, subject DN
   components that are provided individually will now be ordered by
   assumed scale (e.g. Country before State, Organization before
   OrganizationalUnit).  This change also affects the order in which
   certtool prompts interactively.  Please rely on the template
   mechanism for automated use of certtool! (#1243)

** API and ABI modifications:
gnutls_early_cipher_get: Added
gnutls_early_prf_hash_get: Added
2021-05-31 11:08:45 +00:00
pin
a95a44e689 Add gpg-tui 2021-05-31 07:53:40 +00:00
pin
d561f78cc2 security/gpg-tui: import package
Terminal User Interface for GnuPG.

It aims to ease the key management operations such as listing/exporting/signing
by providing an interface along with the command-line fallback for more complex
operations.
It is not trying to be a full-fledged interface for all the features that gpg
provides but it tries to bring a more interactive approach to key management.
2021-05-31 07:52:43 +00:00
he
2c0ae7f4b6 Upgrade security/vault to version 1.6.5.
Pkgsrc changes:
 * None

Upstream changes:

v1.6.5:
May 20th, 2021

SECURITY:
 * Non-Expiring Leases: Vault and Vault Enterprise renewed
   nearly-expiring token leases and dynamic secret leases with a
   zero-second TTL, causing them to be treated as non-expiring,
   and never revoked. This issue affects Vault and Vault Enterprise
   versions 0.10.0 through 1.7.1, and is fixed in 1.5.9, 1.6.5,
   and 1.7.2 (CVE-2021-32923).

CHANGES:
 * agent: Update to use IAM Service Account Credentials endpoint
   for signing JWTs when using GCP Auto-Auth method [GH-11473]
 * auth/gcp: Update to v0.8.1 to use IAM Service Account Credentials
   API for signing JWTs [GH-11498]

BUG FIXES:
 * core (enterprise): Fix plugins mounted in namespaces being
   unable to use password policies [GH-11596]
 * core: correct logic for renewal of leases nearing their expiration
   time. [GH-11650]
 * secrets/database: Fix marshalling to allow providing numeric
   arguments to external database plugins. [GH-11451]
 * secrets/database: Fixes issue for V4 database interface where
   SetCredentials wasn't falling back to using RotateRootCredentials
   if SetCredentials is Unimplemented [GH-11585]
 * ui: Fix namespace-bug on login [GH-11182]


v1.6.4:
April 21, 2021
Release vault v1.6.4


v1.6.3
February 25, 2021

SECURITY:
 * Limited Unauthenticated License Read: We addressed a security
   vulnerability that allowed for the unauthenticated reading of
   Vault licenses from DR Secondaries. This vulnerability affects
   Vault and Vault Enterprise and is fixed in 1.6.3 (CVE-2021-27668).

CHANGES:
 * secrets/mongodbatlas: Move from whitelist to access list API [GH-10966]

IMPROVEMENTS:
 * ui: Clarify language on usage metrics page empty state [GH-10951]

BUG FIXES:
 * auth/kubernetes: Cancel API calls to TokenReview endpoint when
   request context is closed [GH-10930]
 * core/identity: Fix deadlock in entity merge endpoint. [GH-10877]
 * quotas: Fix duplicate quotas on performance standby nodes. [GH-10855]
 * quotas/rate-limit: Fix quotas enforcing old rate limit quota paths [GH-10689]
   replication (enterprise): Don't write request count data on DR Secondaries.
 * Fixes DR Secondaries becoming out of sync approximately every 30s. [GH-10970]
 * secrets/azure (enterprise): Forward service principal credential
   creation to the primary cluster if called on a performance
   standby or performance secondary. [GH-10902]
2021-05-30 17:37:53 +00:00
taca
8299a54dab security/ruby-oauth: update to 0.5.6
0.5.6 (2021-04-02)

* Add metadata to Gemspec file
* Change default timeout to be the same as Net::HTTP default, 60 seconds
  instead of 30 seconds.
* Add support for PUT requests with Action Controller (#181)
2021-05-30 15:42:22 +00:00
taca
98a445c04c security/ruby-nexpose: update to 7.3.0
pkgsrc change: add "USE_LANGUAGES=	# empty" line.


7.3.0 (2021-04-02)

Fixed bugs:

* Login Failed when update nexpose-client 2.0.2 to 7.2.1 #324

Closed issues:

* Stuck on maintenance mode page #327
* job failure in servicenow #323
* [QUESTION] How to generate Shared Secret via RESTful API? #322
* XML::VulnerabilityDetail/Complete API missing an instances value for
  vulnerabilities #306

Merged pull requests:

* Add a new privilege ManageAdvPolicies #330 (jinq102030)
* Fix HostOrIP for Ruby 2.6.3 #328 (abunn-r7)
* Fix travis builds #326 (gschneider-r7)
* Migrate eso-client to nexpose-client / CSRF header update #309
  (hwilson-r7)
2021-05-30 12:32:29 +00:00
taca
4bf5c8c75a security/ruby-metasploit_payloads-mettle: really update to 1.0.9
Really update to 1.0.9, previous commit was 1.0.8.
2021-05-30 12:28:55 +00:00
taca
08a6ca37f2 security/ruby-metasploit_payloads-mettle: update to 1.0.9
Quote from commit logs:

1.0.7 (2021-03-22)

* Land #210, fix segfault on large tlv buffers

1.0.8 (2021-03-24)

* Land #211, add fs_search to mettle

1.0.9 (2021-04-08)

* Land #212, update dependencies and fix libeio
2021-05-30 12:27:10 +00:00
taca
20357eac26 security/ruby-metasploit-payloads: update to 2.0.46
Quote from commit logs:

2.0.40 (2021-03-30)

* Land #480, Fix #479, fix python meterpreter resolve command

2.0.41 (2021-03-31)

* Land #481, fix request_fs_ls on inaccessible file

2.0.42 (2021-04-11)

* Add stdapi_net_resolve_host(s) support to the PHP meterpreter
* Land #483 - Avoid old PHP array indexing syntax

2.0.43 (2021-04-12)

* Land #482, add stdapi_net_resolve_hosts to php meterpreter

2.0.44 (2021-04-28)

* Land #484, Add stdapi_net_resolve_host(s) for Java

2.0.45 (2021-04-30)

* Land #486, fix python meterpreter http transport comm timeout

2.0.46 (2021-05-10)

* Land #488, fix HttpUserAgent on java/android
2021-05-30 11:48:01 +00:00
taca
3e59ad676f security/ruby-metasploit-model: update to 4.0.2
Quote from commit logs:

4.0.2 (2021-05-05)

* Land #60, Add ruby 3.0 tests

4.0.1 (2021-04-29)

* Land #59, Remove bundle cache

4.0.0 (2021-04-28)

* Land #57, update to Rails 6.x compatible
* update schema comment for automation

3.1.4 (2021-04-28)

* and #58, Replaces travis with GH actions for testing
2021-05-30 11:40:46 +00:00
taca
0203c718d4 security/ruby-metasploit-concern: update to 4.0.2
Quote from commit logs:

4.0.2 (2021-05-05)

* Land #36, Add ruby 3.0 tests

4.0.1 (2021-04-29)

* Land #35, Remove bundle cache

4.0.0 (2021-04-28)

* Land #33, updates to support rails 6.x

3.0.2 (2021-04-28)

* Land #34, Replace travis with gh actions
2021-05-30 11:37:02 +00:00
khorben
dabd5cdf81 ssdeep: update to version 2.14.1
** Version 2.14.1 - 7 Nov 2017

* Bug Fixes

  - Fixed a spelling error.
  - Made relative path mode on Win32 to work.


** Version 2.14 - 12 Sep 2017

* New Features

  - Optimizations to the fuzzy hashing engine. (hash generator can run as twice
    as fast and comparison can run 1.5 through 5 times faster [heavily depends
    on the data and platform] than the previous release)

* Bug Fixes

  - Fixed issue when certain memory allocation is failed.
2021-05-30 01:41:28 +00:00
khorben
844d337080 yara: update to version 4.1.1
YARA v4.1.1

 * BUGFIX: Accept the "+" character as valid in DLL names (#1501).
 * BUGFIX: Buffer overrun in "macho" module.
 * BUGFIX: Undefined behavior in Windows implementation of yr_filemap_xxx functions (#1302).
 * BUGFIX: Crash due to consecutive jumps in hex strings (#1492).

The yara-python repository does not offer a corresponding release.
2021-05-30 01:22:05 +00:00
khorben
db4a295540 {,py-}yara: update to version 4.1.0
Since version 3.11.0:

YARA v4.1.0

 * New operators icontains, endswith, iendswith, startswith, istartswith.
 * Accept \t escape sequence in text strings.
 * Add --no-follow-links command-line option to yara.
 * Prevent yara from following links to "." (@1D2D).
 * Implemented non-blocking scanning API (@simonhf).
 * When a string causes too many matches, YARA raises a warning instead of failing (@wxsBSD).
 * BUGFIX: The use of --timeout could hang yara when scanning directories or lists of files (#1481).
 * BUGFIX: Incorrect parsing of PE certificates (#1443).
 * BUGFIX: Short-circuit evaluation not working fine with undefined expressions.

YARA v4.1.0-rc2

 * Don't raise warnings for non-ASCII strings.

YARA v4.1.0-rc1

 * New operators icontains, endswith, iendswith, startswith, istartswith.
 * Raise warnings for non-ascii strings.
 * Accept \t escape sequence in text strings.
 * Add --no-follow-links command-line option to yara.
 * Prevent yara from following links to "." (@1D2D).
 * Implemented non-blocking scanning API (@simonhf).
 * When a string causes too many matches, YARA raises a warning instead of failing.

YARA v4.0.5

 * BUGFIX: Fix bug in "macho" module introduced in v4.0.4.

YARA v4.0.4

 * BUGFIX: Multiple out-of-bounds reads in "macho" module.

Credits to Luis Merino from X41 D-SEC GmbH for reporting these issues.

YARA v4.0.3

 * BUGFIX: Multiple out-of-bounds read in "dotnet" module.

YARA v4.0.2

 * BUGFIX: Use-after-free bug in PE module (#1287).
 * BUGFIX: Incorrect errors in rules when a single rule is badly formatted (#1294).
 * BUGFIX: Assertion failed with rules that have invalid syntax (#1295).
 * BUGFIX: Integer overflow causing missed matches on files larger than 2GB (#1304).
 * BUGFIX: Crashes in Mac OS while scanning binaries with a signature that can't be verified (#1309).

YARA v4.0.1

 * Update sandboxed API (#1276).
 * BUGFIX: Fix regression in exports parsing in PE module (2bf67e6).
 * BUGFIX: Fix unaligned accesses in ARM (e1654ae).

YARA v4.0.0

 * New string modifiers base64 and base64wide (#1185).
 * New string modifier private (#1096).
 * Iterators for dictionaries and arrays (#1141).
 * Multiple API changes.
 * Memory footprint greatly reduced, specially when compiling large numbers of rules.
 * New commmand-line option --scan-list (#1261).
 * Added pdb_path field to "pe" module.
 * Added export_details array to "pe" module.
 * Added exports_index functions to "pe" module.
 * Improvements to "cuckoo" module.
 * BUGFIX: PE files with multiple signatures are parsed correctly (#940).
 * BUGFIX: Fix PE rich header parsing (#1164).
 * BUGFIX: Buffer overruns in "dotnet" module (#1167, #1173).
2021-05-30 01:16:28 +00:00
khorben
353cd86569 libpe, pev: introduce a Makefile.common 2021-05-30 00:49:51 +00:00
khorben
4c97a49812 pev: update to version 0.81
* libpe is now packaged separately (it is no longer shipped in the sources)
2021-05-29 23:28:36 +00:00
khorben
e8f3376701 Add libpe 2021-05-29 23:24:06 +00:00
khorben
de97a04c29 libpe: package version 0.81
libpe is the PE library used by pev - the PE file toolkit purely written in C
and available to many platforms. The features include:

 * Support for both 32 and 64-bits PE files.
 * ssdeep support (built-in libfuzzy).
 * Disassemble support (built-in libudis86).
 * Imphash support.
 * Crypographic digests calculation (using OpeenSSL).
2021-05-29 23:23:42 +00:00
wen
a9e3a31f2b Update to 1.41
Update MASTER_SITES and HOMEPAGE

Upstream changes:
 Changes for version 1.41 - 2021-02-01

    Adopt new repo structure. See http://savage.net.au/Ron/html/My.Workflow.for.Building.Distros.html.
    Reformat Makefile.PL.
    Add t/00.*.
    Update POD to change RT to github.
2021-05-29 10:58:31 +00:00
wen
aeb2023e10 Update to 0.13
Upstream changes:
0.13 2021-05-03T15:37:39Z

    - use --installed option while executing brew --prefix (PR#9 @skaji++)

0.12 2021-03-05T08:54:55Z

    - backport from Net::SSLeay 1.90 (PR#7)
    - use `brew --prefix` for OPENSSL_PREFIX if available (PR#8)
2021-05-29 10:44:26 +00:00
wen
339c95560d Update to 0.20
Upstream changes:
0.20    2021/03/18
        - fix #7 Add function to get signature size
        - fix #8 Allocate buffer for 2048 bit keys
2021-05-29 10:39:30 +00:00
adam
1522e1618b sudo: updated to 1.9.7
What's new in Sudo 1.9.7

 * The "fuzz" Makefile target now runs all the fuzzers for 8192
   passes (can be overridden via the FUZZ_RUNS variable).  This makes
   it easier to run the fuzzers in-tree.  To run a fuzzer indefinitely,
   set FUZZ_RUNS=-1, e.g. "make FUZZ_RUNS=-1 fuzz".

 * Fixed fuzzing on FreeBSD where the ld.lld linker returns an
   error by default when a symbol is multiply-defined.

 * Added support for determining local IPv6 addresses on systems
   that lack the getifaddrs() function.  This now works on AIX,
   HP-UX and Solaris (at least).

 * Fixed a bug introduced in sudo 1.9.6 that caused "sudo -V" to
   report a usage error.  Also, when invoked as sudoedit, sudo now
   allows a more restricted set of options that matches the usage
   statement and documentation.

 * Fixed a crash in sudo_sendlog when the specified certificate
   or key does not exist or is invalid.

 * Fixed a compilation error when sudo is configured with the
   --disable-log-client option.

 * Sudo's limited support for SUCCESS=return entries in nsswitch.conf
   is now documented.

 * Sudo now requires autoconf 2.70 or higher to regenerate the
   configure script.

 * sudo_logsrvd now has a relay mode which can be used to create
   a hierarchy of log servers.  By default, when a relay server is
   defined, messages from the client are forwarded immediately to
   the relay.  However, if the "store_first" setting is enabled,
   the log will be stored locally until the command completes and
   then relayed.

 * Sudo now links with OpenSSL by default if it is available unless
   the --disable-openssl configure option is used or both the
   --disable-log-client and --disable-log-server configure options
   are specified.

 * Fixed configure's Python version detection when the version minor
   number is more than a single digit, for example Python 3.10.

 * The sudo Python module tests now pass for Python 3.10.

 * Sudo will now avoid changing the datasize resource limit
   as long as the existing value is at least 1GB.  This works around
   a problem on 64-bit HP-UX where it is not possible to exactly
   restore the original datasize limit.

 * Fixed a race condition that could result in a hang when sudo is
   executed by a process where the SIGCHLD handler is set to SIG_IGN.

 * Fixed an out-of-bounds read in sudoedit and visudo when the
   EDITOR, VISUAL or SUDO_EDITOR environment variables end in an
   unescaped backslash.  Also fixed the handling of quote characters
   that are escaped by a backslash.

 * Fixed a bug that prevented the "log_server_verify" sudoers option
   from taking effect.

 * The sudo_sendlog utility has a new -s option to cause it to stop
   sending I/O records after a user-specified elapsed time.  This
   can be used to test the I/O log restart functionality of sudo_logsrvd.

 * Fixed a crash introduced in sudo 1.9.4 in sudo_logsrvd when
   attempting to restart an interrupted I/O log transfer.

 * The TLS connection timeout in the sudoers log client was previously
   hard-coded to 10 seconds.  It now uses the value of log_server_timeout.

 * The configure script now outputs a summary of the user-configurable
   options at the end, separate from output of configure script tests.

 * Corrected the description of which groups may be specified via the
   -g option in the Runas_Spec section.
2021-05-27 05:40:44 +00:00
nia
17043132dc seahorse: needs gdbus-codegen 2021-05-26 12:29:50 +00:00
adam
fa145f3af0 py-google-auth: updated to 1.30.1
1.30.1

Bug Fixes

allow user to customize context aware metadata path in _mtls_helper
fix function name in signing error message
2021-05-25 05:35:52 +00:00
wiz
6eae1297d5 *: recursive bump for perl 5.34 2021-05-24 19:49:01 +00:00
ryoon
a6744f44fa security: Enable olm 2021-05-23 07:16:44 +00:00
ryoon
d0f7529c1b security/olm: import olm-3.2.2 from wip/olm
An implementation of the Double Ratchet cryptographic ratchet described by
https://whispersystems.org/docs/specifications/doubleratchet/, written in C and
C++11 and exposed as a C API.

This library also includes an implementation of the Megolm cryptographic
ratchet.
2021-05-23 07:15:24 +00:00
schmonz
8ef8a3e1f5 Update to 3.3.3, syncing with LibreSSL. No known changes. 2021-05-22 09:12:31 +00:00
triaxx
d9b3d4d62a erlang-fast_tls: Remove useless variable from MAKE_ENV
pkgsrc changes:
---------------
  * Actually REBAR is already defined in MAKE_FLAGS of lang/erlang/modules.
  * Bump revision.
2021-05-21 10:48:55 +00:00
triaxx
4189ee687c erlang-fast_tls: Update to 1.1.12
pkgsrc changes:
---------------
  o Add a patch to localize the path of rebar by defining the REBAR
    variable in MAKE_ENV.

upstream changes:
-----------------
Version 1.1.12
  o Updating p1_utils to version 1.0.22.

Version 1.1.11
  o Add missing applicaitons in fast_tls.app
2021-05-21 07:49:52 +00:00
triaxx
63ed23ec22 erlang-p1_acme: Update to 1.0.12
upstream changes:
-----------------
Version 1.0.12
  o Updating yconf to version 1.0.11.

Version 1.0.11
  o Updating yconf to version 1.0.10.
  o Add missing applicaitons to p1_acme.app
2021-05-20 15:45:28 +00:00
wiz
d94ebb971e libtasn1: update to 4.17.0.
* Noteworthy changes in release 4.17.0 (2021-05-13) [stable]
- Print deprecation messages for deprecated macros, thanks to Tim Rühsen.
- Fix some clang issues due to illegal pointers, thanks to Stefan Weil.
- Restore handling of SIZE nodes, thanks to Dmitry Baryshkov.
- Fix memory leak caught by oss-fuzz, thanks to Dmitry Baryshkov.
- Gtk-doc fixes, thanks to Dmitry Baryshkov.
- Fix bugs unveiled by Static Analysis, reported by Simo Sorce.
- Update gnulib files and many build fixes.
2021-05-20 10:05:11 +00:00
wiz
0e9fb19b45 gcr: add readlink to tools
Needed on Solaris 10. Reported by Claes Nästén in PR 56183
2021-05-17 14:39:59 +00:00
adam
6a4122f901 py-libtaxii: updated to 1.1.119
1.1.119
- Writing content blocks should not be dependent on value of "more"
2021-05-17 10:23:09 +00:00
nia
03f99c452b apg: do not use -lnsl on linux 2021-05-14 12:00:34 +00:00
nia
1755ec8c92 dsniff: needs bdb 2021-05-14 11:59:25 +00:00
nia
1126557397 duo-unix: explicitly disable lib64 2021-05-14 11:57:09 +00:00
nia
b1e3136f91 ecap_clamav_adapter: needs openssl 2021-05-14 11:55:16 +00:00
nia
e8e0494f24 erlang-epam: needs pam 2021-05-14 11:54:50 +00:00
nia
dd807ae4e5 libpwquality: needs zlib 2021-05-14 11:54:10 +00:00
nia
6df3ed5f86 pam_ssh_agent_auth: needs pam 2021-05-14 11:52:15 +00:00
nia
568f5e484c rvault: needs fuse, pkg-config 2021-05-14 11:51:39 +00:00
nia
af998040b5 pleaser: needs pam 2021-05-14 11:50:31 +00:00
nia
0ce2b8f779 sslsplit: needs zlib 2021-05-14 11:48:28 +00:00
nia
b87ef40a5d yara: needs flex 2021-05-14 11:47:57 +00:00
nia
9f23bbf73a softhsm2: needs openssl 2021-05-14 11:47:29 +00:00
adam
39c6f53ec8 py-acme py-certbot*: updated to 1.15.0
1.15.0 - 2021-05-04
More details about these changes can be found on our GitHub repo.
2021-05-14 08:24:05 +00:00
adam
07611e6f11 py-asyncssh: updated to 2.6.0
Release 2.6.0 (1 May 2021)

Added support for the HostKeyAlias client config option and a corresponding host_key_alias option, allowing known_hosts lookups and host certificate validation to be done against a different hoetname than what is used to make the connection. Thanks go to Pritam Baral for contributing this feature!

Added the capability to specify client channel options as connection options, allowing them to be set in a connect() call or as values in SSHClientConnectionOptions. These values will act as defaults for any sessions opened on the connection but can still be overridden via arguments in the create_session() call.

Added support for dynamically updating SSH options set up in a listen() or listen_reverse() call. A new SSHAcceptor class is now returned by these calls which has an update() method which takes the same keyword arguments as SSHClientConnectionOptions or SSHServerConnectionOptions, allowing you to update any of the options on an existing listener except those involved in setting up the listening sockets themselves. Updates will apply to future connections accepted by that listener.

Added support for a number of algorithms supported by the ssh.com Tectia SSH client/server:

Key exchange:

diffie-hellman-group14-sha256@ssh.com (enabled by default)
diffie-hellman-group14-sha224@ssh.com (available but not default)
diffie-hellman-group15-sha256@ssh.com
diffie-hellman-group15-sha384@ssh.com
diffie-hellman-group16-sha384@ssh.com
diffie-hellman-group16-sha512@ssh.com
diffie-hellman-group18-sha512@ssh.com
HMAC:

hmac-sha256-2@ssh.com (all enabled by default)
hmac-sha224@ssh.com
hmac-sha256@ssh.com
hmac-sha384@ssh.com
hmac-sha512@ssh.com
RSA public key algorithms:

ssh-rsa-sha224@ssh.com (all enabled by default)
ssh-rsa-sha256@ssh.com
ssh-rsa-sha384@ssh.com
ssh-rsa-sha512@ssh.com
Encryption:

seed-cbc@ssh.com (available but not default)
Added a new ‘ignore-failure’ value to the x11_forwarding argument in create_session(). When specified, AsyncSSH will attempt to set up X11 forwarding but ignore failures, behaving as if forwarding was never requested instead of raising a ConnectionOpenError.

Extended support for replacing certificates in an SSHKeyPair, allowing alternate certificates to be used with SSH agent and PKCS11 keys. This provides a way to use X.509 certificates with an SSH agent key or OpenSSH certificates with a PKCS11 key.

Extended the config file parser to support ‘=’ as a delimiter between keywords and arguments. While this syntax appears to be rarely used, it is supported by OpenSSH.

Updated Fido2 support to use version 0.9.1 of the fido2 package, which included some changes that were not backward compatible with 0.8.1.

Fixed problem with setting config options with percent substitutions to ‘none’. Percent subsitution should not be performed in this case. Thanks go to Yuqing Miao for finding and reporting this issue!

Fixed return type of filenames in SFTPClient scandir() and readlink() when the argument passed in is a Path value. Previously, the return value in this case was bytes, but that was only meant to apply when the input argument was passed as bytes.

Fixed a race condition related to closing a channel before it is fully open, preventing a client from potentially hanging forever if a session was closed while the client was still attempting to request a PTY or make other requests as part of opening the session.

Fixed a potential race condition related to making parallel calls to SFTPClient makedirs() which try to create the same directory or a common parent directory.

Fixed RFC 4716 parser to allow colons in header values.

Improved error message when AsyncSSH is unable to get the local username on a client. Thanks go to Matthew Plachter for reporting this issue.
2021-05-13 17:46:51 +00:00
nia
56f4570852 lua-sec: remove commented out line 2021-05-13 10:16:19 +00:00
nia
4ae1e9eaa3 lua-sec: update to 1.0.1
LuaSec 1.0.1
---------------
This version includes:


* Fix luaL_buffinit() can use the stack and broke buffer_meth_receive()
2021-05-13 10:15:47 +00:00
thor
8c8bec669c security/mit-krb5: detect post-1.5 versions on GNU/Linux in builtin.mk
This might need proper reworking to safely detect the krb5 version
and/or header location without guessing. Asking krb5-config might
be a solution also to tell between heimdal and mit-krb5 from
--version output.
2021-05-13 09:06:15 +00:00
adam
26fde89a20 py-google-auth: updated to 1.30.0
1.30.0 (2021-04-23)

Features
add reauth support to async user credentials for gcloud. This internal feature is for gcloud developers only.
2021-05-12 18:17:35 +00:00
adam
7b84a7d487 py-trustme: updated to 0.7.0
0.7.0:
Unknown changes
2021-05-12 16:13:48 +00:00
ryoon
178b385748 2fa: Update to 1.2.0
Changelog:
* go modulized
* Depend on github.com/atotto/clipboard
2021-05-12 14:19:03 +00:00
thor
95984e5ac7 security/heimdal: provide krb5-gssapi.pc as symlink
This is needed for example for qt5-qtbase to pick up a pkgsrc-installed
heimdal instead of possibly a mix of system mit-krb5 libs with pkgsrc
headers, for its network auth that recently got GSSAPI.

It makes sense to provide the same pkg-config package name if heimdal and
mit-krb5 should be transparently compatible at that front.
2021-05-09 16:04:34 +00:00
bsiegert
3e1d064718 go-crypto-acme: remove.
Nothing depends on this. The only binary included is a testing utility that
is not terribly useful.
2021-05-09 15:10:02 +00:00
taca
f518276f36 security/Makefile: add and enable ruby-rotp 2021-05-09 14:05:39 +00:00
taca
263f993010 security/ruby-rotp: add version 6.2.0 package
Add ruby-rotp package version 6.2.0 required by Redmine 4.2.


The Ruby One Time Password Library

A ruby library for generating and validating one time passwords (HOTP &
TOTP) according to RFC 4226 and RFC 6238.

ROTP is compatible with Google Authenticator available for Android and
iPhone and any other TOTP based implementations.

Many websites use this for multi-factor authentication, such as GMail,
Facebook, Amazon EC2, WordPress, and Salesforce.  You can find a more
complete list here:
https://en.wikipedia.org/wiki/Google_Authenticator#Usage.
2021-05-09 14:04:36 +00:00
bsiegert
27674931d1 go-oauth2: remove.
Nothing depends on this any more, and it is not useful on its own.
2021-05-09 10:05:26 +00:00
taca
c859fce87d security/Makefile: add and enable ruby-certified 2021-05-09 04:41:27 +00:00
taca
af270851e6 security/ruby-certified: add version 1.0.0 package
Required by new version of textproc/ruby-kramdown-rfc2629.


Ensure net/https uses OpenSSL::SSL::VERIFY_PEER to verify SSL
certificates and provides certificate bundle in case OpenSSL cannot
find one.
2021-05-09 04:40:49 +00:00
bsiegert
2af0bedf36 Revbump all Go packages after go116 update 2021-05-08 15:02:22 +00:00
wiz
9978f43890 courier-authlib: fix options
Fix post-install target handling. Fix file name for ldap config.
Clean up pkglint.
2021-05-06 08:45:00 +00:00
pho
75b5efd5a0 security: +hs-tls-session-manager 2021-05-05 16:01:18 +00:00
pho
e7c476f1bb Import tls-session-manager-0.0.4
TLS session manager with limitation, automatic pruning, energy saving
and replay resistance
2021-05-05 16:00:30 +00:00
he
a26a086ead Update OpenDNSSEC version 2 to 2.1.9.
Upstream changes:

OpenDNSSEC 2.1.9 - 2021-05-03

* OPENDNSSEC-955: Prevent concurrency between C_Login/C_OpenSession and
  C_FindObject in PKCS#11 operations as some HSMs do not like this and
  the key may (transiently) not be available.
* OPENDNSSEC-956: Harden the signing procedure to still sign zones for
  which there are unused keys specified in the signconf.  These are
  included by the enforcer because there may be (outdated) signatures
  for them, but the signer doesn't need this reference anymore in 2.1.
  However this was left in for backwards compatibility (probably).
2021-05-04 07:37:19 +00:00
pho
4d74cf7192 *: Bump PKGREVISION for ghc-9.0.1 2021-05-03 19:00:52 +00:00
nia
ab8a1fb4af *: Use the tools framework for gdbus-codegen 2021-05-02 11:06:12 +00:00
nia
773cde7da8 *: Use the tools framework for itstool
Now it should be more obvious when a package needs it as a dependency,
as it will fail loudly if it isn't declared as a tool.

While here, some duplicate dependencies on itstool were removed from the
MATE packages
2021-05-02 10:24:47 +00:00
nia
1c6f4ee105 Recursive revbump for security/mbedtls 2021-05-02 08:16:40 +00:00
nia
6cd044a35e mbedtls: update to 2.26.0
This release of Mbed TLS provides bug fixes, minor enhancements and new features. This release includes fixes for security issues.
API changes

    Renamed the PSA Crypto API output buffer size macros to bring them in line
    with version 1.0.0 of the specification.
    The API glue function mbedtls_ecc_group_of_psa() now takes the curve size
    in bits rather than bytes, with an additional flag to indicate if the
    size may have been rounded up to a whole number of bytes.
    Renamed the PSA Crypto API AEAD tag length macros to bring them in line
    with version 1.0.0 of the specification.

Default behavior changes

    In mbedtls_rsa_context objects, the ver field was formerly documented
    as always 0. It is now reserved for internal purposes and may take
    different values.

New deprecations

    PSA_KEY_EXPORT_MAX_SIZE, PSA_HASH_SIZE, PSA_MAC_FINAL_SIZE,
    PSA_BLOCK_CIPHER_BLOCK_SIZE, PSA_MAX_BLOCK_CIPHER_BLOCK_SIZE and
    PSA_ALG_TLS12_PSK_TO_MS_MAX_PSK_LEN have been renamed, and the old names
    deprecated.
    PSA_ALG_AEAD_WITH_DEFAULT_TAG_LENGTH and PSA_ALG_AEAD_WITH_TAG_LENGTH
    have been renamed, and the old names deprecated.

Features

    The PSA crypto subsystem can now use HMAC_DRBG instead of CTR_DRBG.
    CTR_DRBG is used by default if it is available, but you can override
    this choice by setting MBEDTLS_PSA_HMAC_DRBG_MD_TYPE at compile time.
    Fix #3354.
    Automatic fallback to a software implementation of ECP when
    MBEDTLS_ECP_xxx_ALT accelerator hooks are in use can now be turned off
    through setting the new configuration flag MBEDTLS_ECP_NO_FALLBACK.
    The PSA crypto subsystem can now be configured to use less static RAM by
    tweaking the setting for the maximum amount of keys simultaneously in RAM.
    MBEDTLS_PSA_KEY_SLOT_COUNT sets the maximum number of volatile keys that
    can exist simultaneously. It has a sensible default if not overridden.
    Partial implementation of the PSA crypto driver interface: Mbed TLS can
    now use an external random generator instead of the library's own
    entropy collection and DRBG code. Enable MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG
    and see the documentation of mbedtls_psa_external_get_random() for details.
    Applications using both mbedtls_xxx and psa_xxx functions (for example,
    applications using TLS and MBEDTLS_USE_PSA_CRYPTO) can now use the PSA
    random generator with mbedtls_xxx functions. See the documentation of
    mbedtls_psa_get_random() for details.
    In the PSA API, the policy for a MAC or AEAD algorithm can specify a
    minimum MAC or tag length thanks to the new wildcards
    PSA_ALG_AT_LEAST_THIS_LENGTH_MAC and
    PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG.

Security

    Fix a security reduction in CTR_DRBG when the initial seeding obtained a
    nonce from entropy. Applications were affected if they called
    mbedtls_ctr_drbg_set_nonce_len(), if they called
    mbedtls_ctr_drbg_set_entropy_len() with a size that was 3/2 times the key
    length, or when the entropy module uses SHA-256 and CTR_DRBG uses AES-256.
    In such cases, a random nonce was necessary to achieve the advertised
    security strength, but the code incorrectly used a constant instead of
    entropy from the nonce.
    Found by John Stroebel in #3819 and fixed in #3973.
    Fix a buffer overflow in mbedtls_mpi_sub_abs() when calculating
    |A| - |B| where |B| is larger than |A| and has more limbs (so the
    function should return MBEDTLS_ERR_MPI_NEGATIVE_VALUE). Only
    applications calling mbedtls_mpi_sub_abs() directly are affected:
    all calls inside the library were safe since this function is
    only called with |A| >= |B|. Reported by Guido Vranken in #4042.
    Fix an errorneous estimation for an internal buffer in
    mbedtls_pk_write_key_pem(). If MBEDTLS_MPI_MAX_SIZE is set to an odd
    value the function might fail to write a private RSA keys of the largest
    supported size.
    Found by Daniel Otte, reported in #4093 and fixed in #4094.
    Fix a stack buffer overflow with mbedtls_net_poll() and
    mbedtls_net_recv_timeout() when given a file descriptor that is
    beyond FD_SETSIZE. Reported by FigBug in #4169.
    Guard against strong local side channel attack against base64 tables by
    making access aceess to them use constant flow code.

Bugfix

    Fix use-after-scope error in programs/ssl/ssl_client2.c and ssl_server2.c
    Fix memory leak that occured when calling psa_close_key() on a
    wrapped key with MBEDTLS_PSA_CRYPTO_SE_C defined.
    Fix an incorrect error code if an RSA private operation glitched.
    Fix a memory leak in an error case in psa_generate_derived_key_internal().
    Fix a resource leak in CTR_DRBG and HMAC_DRBG when MBEDTLS_THREADING_C
    is enabled, on platforms where initializing a mutex allocates resources.
    This was a regression introduced in the previous release. Reported in
    #4017, #4045 and #4071.
    Ensure that calling mbedtls_rsa_free() or mbedtls_entropy_free()
    twice is safe. This happens for RSA when some Mbed TLS library functions
    fail. Such a double-free was not safe when MBEDTLS_THREADING_C was
    enabled on platforms where freeing a mutex twice is not safe.
    Fix a resource leak in a bad-arguments case of mbedtls_rsa_gen_key()
    when MBEDTLS_THREADING_C is enabled on platforms where initializing
    a mutex allocates resources.
    Fixes a bug where, if the library was configured to include support for
    both the old SE interface and the new PSA driver interface, external keys were
    not loaded from storage. This was fixed by #3996.
    This change makes 'mbedtls_x509write_crt_set_basic_constraints'
    consistent with RFC 5280 4.2.1.9 which says: "Conforming CAs MUST
    include this extension in all CA certificates that contain public keys
    used to validate digital signatures on certificates and MUST mark the
    extension as critical in such certificates." Previous to this change,
    the extension was always marked as non-critical. This was fixed by
    #3698.

Changes

    A new library C file psa_crypto_client.c has been created to contain
    the PSA code needed by a PSA crypto client when the PSA crypto
    implementation is not included into the library.
    On recent enough versions of FreeBSD and DragonFlyBSD, the entropy module
    now uses the getrandom syscall instead of reading from /dev/urandom.

Who should update

We recommend all users should update to take advantage of the bug fixes contained in this release at an appropriate point in their development lifecycle.
2021-05-02 08:16:13 +00:00
schmonz
fb116dabc7 Update to 3.3.2. From the (OpenBSD 6.9 LibreSSL) changelog:
# New Features

- Support for DTLSv1.2.
- Continued rewrite of the record layer for the legacy stack.
- Numerous bugs and interoperability issues were fixed in the new
  verifier. A few bugs and incompatibilities remain, so this release
  uses the old verifier by default.
- The OpenSSL 1.1 TLSv1.3 API is not yet available.


# Portable Improvements

- Added '--enable-libtls-only' build option, which builds and
  installs a statically-linked libtls, skipping libcrypto and libssl.
  This is useful for systems that ship with OpenSSL but wish to also
  package libtls.
- Update getentropy on Windows to use Cryptography Next Generation
  (CNG). wincrypt is deprecated and no longer works with newer Windows
  environments, such as in Windows Store apps.


# API and Documentation Enhancements

- Add a number of RPKI OIDs from RFC 6482, 6484, 6493, 8182, 8360,
  draft-ietf-sidrops-rpki-rta, and draft-ietf-opsawg-finding-geofeeds.
- Add support for
  [SSL_get_shared_ciphers(3)](https://man.openbsd.org/SSL_get_shared_ciphers.3)
  with TLSv1.3.
- Add DTLSv1.2 methods.
- Implement SSL_is_dtls(3) and use it internally in place of the
  SSL_IS_DTLS macro.
- Provide
  [EVP_PKEY_new_CMAC_KEY(3)](https://man.openbsd.org/EVP_PKEY_new_CMAC_KEY.3).
- Add missing prototype for
  [d2i_DSAPrivateKey_fp(3)](https://man.openbsd.org/d2i_DSAPrivateKey_fp.3) to x509.h.
- Add DTLSv1.2 to [openssl(1)](https://man.openbsd.org/openssl.1)
  s_server and s_client protocol message logging.
- Provide
  [SSL_use_certificate_chain_file(3)](https://man.openbsd.org/SSL_use_certificate_chain_file.3).
- Provide
  [SSL_set_hostflags(3)](https://man.openbsd.org/SSL_set_hostflags.3)
  and
  [SSL_get0_peername(3)](https://man.openbsd.org/SSL_get0_peername.3).
- Provide various DTLSv1.2 specific functions and defines.
- Document meaning of '*' in the genrsa output.
- Updated documentation for
  SSL_get_shared_ciphers(3)](https://man.openbsd.org/SSL_get_shared_ciphers.3).
- Add documentation for
  [SSL_get_finished(3)](https://man.openbsd.org/SSL_get_finished.3).
- Document
  [EVP_PKEY_new_CMAC_key(3)](https://man.openbsd.org/EVP_PKEY_new_CMAC_key.3).
- Document
  [SSL_use_certificate_chain_file(3)](https://man.openbsd.org/SSL_use_certificate_chain_file.3).
- Document
  [SSL_set_hostflags(3)](https://man.openbsd.org/SSL_set_hostflags.3)
  and
  [SSL_get0_peername(3)](https://man.openbsd.org/SSL_get0_peername.3).
- Update [SSL_get_version(3)](https://man.openbsd.org/SSL_get_version.3)
  manual for DTLSv.1.2 support.
- Make supported protocols and options for DHE params more prominent in
  [tls_config_set_protocols(3)](https://man.openbsd.org/tls_config_set_protocols.3).
- Various documentation improvements around TLS methods.


# Compatibility Changes

- Make [openssl(1)](https://man.openbsd.org/openssl.3) s_server ignore
  -4 and -6 for compatibility with OpenSSL.
- Set SO_REUSEADDR on the server socket in the
  [openssl(1)](https://man.openbsd.org/openssl.1) ocsp command.
- Send a host header with OCSP queries to make
  [openssl(1)](https://man.openbsd.org/openssl.1) ocsp work with some
  widely used OCSP responders.
- Add ability to [ocspcheck(8)](https://man.openbsd.org/ocspcheck.8) to
  parse a port in the specified OCSP URL.
- Implement auto chain for the TLSv1.3 server since some software
  relies on this.
- Implement key exporter for TLSv1.3.
- Align
  [SSL_get_shared_ciphers(3)](https://man.openbsd.org/SSL_get_shared_ciphers.3)
  with OpenSSL. This takes into account that it never returned server
  ciphers, so now it will fail when called from the client side.
- Sync cert.pem with Mozilla NSS root CAs except "GeoTrust Global CA".
- Make
  [SSL{_CTX,}_get_{min,max}_proto_version(3)](https://man.openbsd.org/SSL_CTX_get_min_proto_version.3)
  return a version of zero if the minimum or maximum has been set to
  zero to match OpenSSL's behavior.
- Add DTLSv1.2 support to
  [openssl(1)](https://man.openbsd.org/openssl.1) s_client/s_server.


# Testing and Proactive Security

- Malformed ASN.1 in a certificate revocation list or a timestamp
  response token can lead to a NULL pointer dereference.
- Pull in fix for
  [EVP_CipherUpdate(3)](https://man.openbsd.org/EVP_CipherUpdate.3)
  overflow from OpenSSL.
- Use EXFLAG_INVALID to handle out of memory and parse errors in
  x509v3_cache_extensions().
- Refactor and clean up
  [ocspcheck(8)](https://man.openbsd.org/ocspcheck.8) and add
  regression tests.


# Internal Improvements

- Further cleanup of the DTLS record handling.
- Continue the replacement of the TLSv1.2 record layer by reimplementing
  the read side of the TLSv1.2 record handling.
- Replace DTLSv1_enc_data() with TLSv1_1_enc_data().
- Merge d1_{clnt,srvr}.c into ssl_{clnt,srvr}.c.
- Add const to ssl_ciphers and tls1[23]_sigalgs* to push them into
  .data.rel.ro and .rodata, respectively.
- Add a const qualifier to srtp_known_profiles.
- Simplify TLS method by removing the client and server specific methods
  internally.
- Avoid casting away const in ssl_ctx_make_profiles().
- Avoid explicitly conditioning an assert on DTLS1_VERSION to make the
  assert work for newer DTLS versions.
- Merge SSL_ENC_METHOD into SSL_METHOD_INTERNAL.
- Add a flag to mark DTLS methods as DTLS to have an easy way to
  recognize DTLS methods that avoids inspecting the version number.
- Mark a few more internal static tables const.
- Switch finish{,_peer}_md_len from an int to a size_t.
- Use EVP_MD_MAX_MD_SIZE instead of 2 * EVP_MD_MAX_MD_SIZE as size for
  cert_verify_md[], finish_md[] and peer_finish_md[]. The factor 2 was a
  historical artefact.
- Free struct members in tls13_record_layer_free() in their natural
  order for reviewability.
- Use consistent names in tls13_{client,server}_finished_{recv,send}().
- Add tls13_secret_{init,cleanup}() and use them throughout the TLSv1.3
  code base.
- Move the read MAC key into the TLSv1.2 record layer.
- Make tls12_record_layer_free() NULL safe.
- Split the record protection from the TLSv1.2 record layer.
- Clean up sequence number handling in the new TLSv1.2 record layer.
- Clean up sequence number handling in DTLS.
- Clean up dtls1_reset_seq_numbers().
- Factor out code for explicit IV length, block size and MAC length from
  tls12_record_layer_open_record_protected_cipher().
- Provide record layer overhead for DTLS.
- Provide functions to determine if TLSv1.2 record protection is
  engaged.
- Add code to handle change of cipher state in the new TLSv1.2
  record layer.
- Mop up now unused dtls1_build_sequence_numbers() function.
- Allow setting a keypair on a tls context without specifying the
  private key, and fake it internally in libtls. This removes the need
  for privsep engines like relayd to use bogus keys.
- Skip the private key check for fake private keys.
- Move the private key setup from tls_configure_ssl_keypair() to a
  helper function with proper error checking.
- Change the internal tls_configure_ssl_keypair() function to return -1
  instead of 1 on failure.
- Move sequence numbers into the new TLSv1.2 record layer.
- Move AEAD handling into the new TLSv1.2 record layer.
- Factor out legacy stack version checks.
- Correct handshake MAC/PRF for various TLSv1.2 cipher suites which were
  originally added with the default handshake MAC and PRF rather than
  the SHA256 handshake MAC and PRF.
- Absorb ssl3_get_algorithm2() into ssl_get_handshake_evp_md().
- Use dtls1_record_retrieve_buffered_record() to load buffered
  application data.
- Enforce read ahead with DTLS.
- Remove bogus DTLS checks that disabled ECC and OCSP.
- Clean up and simplify dtls1_get_cipher().
- Group HelloVerifyRequest decoding and add missing check for
  trailing data.
- Revise HelloVerifyRequest handling for DTLSv1.2.
- Handle DTLS1_2_VERSION in various places.
- Rename the "truncated" label into "decode_err" and the "f_err" label
  into "fatal_err".
- Factor out and change some of the legacy client version code.
- Simplify version checks in the TLSv1.3 client. Ensure that the server
  announced TLSv1.3 and nothing higher and check that the legacy_version
  is set to TLSv1.2 as required by RFC 8446.
- Only use TLS versions internally rather than both TLS and DTLS
  versions since the latter are the one's complement of the human
  readable version numbers, which means that newer versions
  decrease in value.
- Identify DTLS based on the version major value.
- Move handling of cipher/hash based cipher suites into the new
  record layer.
- Add tls12_record_protection_unused() and call it from CCS functions.
- Move key/IV length checks closer to usage sites. Also add explicit
  checks against
  [EVP_CIPHER_{iv,key}_length()](https://man.openbsd.org/EVP_CIPHER_iv_length.3).
- Replace two handrolled tls12_record_protection_engaged().
- Improve internal version handling: add handshake fields for our
  minimum version, our maximum version and the TLS version negotiated
  during the handshake. Convert most of the internal code to use these
  version fields.
- Guard against future internal use of
  TLS1_get_{client,}_version() macros.
- Remove the internal ssl_downgrade_max_version() function which is no
  longer needed.
- Add support for DTLSv1.2 version handling.
- Remove no longer needed read ahead workarounds in the s_client
  and s_server.
- Split TLSv1.3 record protection from record layer.
- Move the TLSv1.3 handshake struct inside the shared handshake struct.
- Fully initialize rrec in tls12_record_layer_open_record_protected() to
  avoid confusing some static analyzers.
- Use tls_set_errorx() on OCSP_basic_verify() failure since the latter
  does not set errno.
- Convert openssl(1) x509 to new option handling and do the usual clean
  up that goes along with it.
- Add SSL_HANDSHAKE_TLS12 for TLSv1.2 specific handshake data.
- Rename new_cipher to cipher to align naming with keyblock or other
  parts of the handshake data.
- Move the TLSv1.2 record number increment into the new record layer.
- Move finished and peer finished into the handshake struct.
- Remove pointless assignment in SSL_get0_alpn_selected().
- Add some error checking to openssl(1) x509.


# Bug Fixes

- Move point-on-curve check to set_affine_coordinates to avoid verifying
  ECDSA signatures with unchecked public keys.
- Fix [SSL_is_server(3)](https://man.openbsd.org/SSL_is_server.3) to
  behave as documented by re-introducing the client-specific methods.
- Avoid undefined behavior due to memcpy(NULL, NULL, 0).
- Make SSL_get{,_peer}_finished() work when used with TLSv1.3.
- Correct the return value type from ERR_peek_error() to a long.
- Avoid use of uninitialized in ASN1_time_parse() which could happen on
  parsing UTCTime if the caller did not initialize the passed struct tm.
- Destroy the mutex in a tls_config object on tls_config_free().
- Free alert_data and phh_data in tls13_record_layer_free(). These could
  leak if [SSL_shutdown(3)](https://man.openbsd.org/SSL_shutdown.3) or
  [tls_close(3)](https://man.openbsd.org/tls_close.3) were called after
  closing the underlying socket().
- Gracefully handle root certificates being both trusted and untrusted.
- Handle X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE in the new verifier.
- Use the legacy verifier when building auto chains for TLS.
- Search the intermediates only after searching the root certs in the
  new verifier to avoid problems with the legacy callback.
- Bail out early after finding a single chain in the new verifier, if we
  have been called via the legacy verifier API.
- Set (invalid and likely incomplete) chain on the xsc on chain build
  failure prior to calling the callback. This is required by various
  callers, including auto chain.
- Remove direct assignment of aead_ctx to avoid a leak.
- Fail early in legacy exporter if the master secret is not available to
  avoid a segfault if it is called when the handshake is not completed.
- Only print the certificate file once on verification failure.
- Fix an off-by-one in x509_verify_set_xsc_chain() to make sure that the
  new validator checks for EXFLAG_CRITICAL in
  x509_vfy_check_chain_extension() for all untrusted certs in the chain.
  Take into account that the root is not necessarily trusted.
- Avoid passing last and depth to x509_verify_cert_error() on ENOMEM.
- Fix two bugs in the legacy verifier that resulted from refactoring
  of [X509_verify_cert(3)](https://man.openbsd.org/X509_verify_cert.3)
  for the new verifier: a return value was incorrectly treated as
  boolean, making it insufficient to decide whether validation should
  carry on or not.
- Fix checks for memory caps of constraints names. There are internal
  caps on the number of name constraints and other names, that the new
  name constraints code allocates per cert chain. These limits were
  checked too late, making them only partially effective.
- Fix a copy-paste error - skid was confused with an akid when checking
  for EXFLAG_INVALID. This broke OCSP validation with certain mirrors.
- Avoid a use-after-scope in tls13_cert_add().
- Avoid mangled output in BIO_debug_callback().
- Fix client initiated renegotiation by replacing use of
  s->internal-type with s->server.
- Avoid transcript initialization when sending a TLS HelloRequest,
  fixing server initiated renegotiation.
- Avoid leaking param->name in x509_verify_param_zero().
- Avoid a leak in an error path in openssl(1) x509.
- When sending an alert in TLSv1.3, only set its error code when no
  other error was set previously. Certain clients rely on specific
  SSL_R_ error codes to identify that they are dealing with a self
  signed cert.
- When switching from the TLSv1.3 stack to the legacy stack include a
  TLS record header. This is necessary if there is more than one
  handshake message in the TLS plaintext record.
- Fix resource handling on error in OCSP_request_add0_id().
- Make sure there is enough room for stashing the handshake message when
  switching to the legacy TLS stack.
- Fix a memory leak in the openssl(1) s_client.
- Unbreak DTLS retransmissions for flights that include a CCS.
- If x509_verify() fails, ensure that the error is set on both the
  x509_verify_ctx() and its store context to make some failures visible
  from SSL_get_verify_result().
- Use the X509_STORE_CTX get_issuer() callback from the new X.509
  verifier to fix hashed certificate directories.
- Only check
  [BIO_should_read(3)](https://man.openbsd.org/BIO_should_read.3) on
  read and
  [BIO_should_write(3)](https://man.openbsd.org/BIO_should_write.3) on
  write. Previously,
  [BIO_should_write(3)](https://man.openbsd.org/BIO_should_write.3) was
  also checked after read and
  [BIO_should_read(3)](https://man.openbsd.org/BIO_should_read.3) after
  write which could cause stalls in software that uses the same BIO for
  read and write.
- In [openssl(1)](https://man.openbsd.org/openssl.1) verify, also check
  for error on the store context since the return value of
  [X509_verify_cert(3)](https://man.openbsd.org/X509_verify_cert.3) is
  unreliable in presence of a callback that returns 1 too often.
- Handle additional certificate error cases in the new X.509 verifier.
  Keep track of the errors encountered if a verify callback tells the
  verifier to continue and report them back via the error on the store
  context. This mimics the behavior of the old verifier that would
  persist the first error encountered while building the chain.
- Report specific failures for "self signed certificates" in a way
  compatible with the old verifier since software relies on the
  error code.
- Plug a large memory leak in the new verifier caused by calling
  X509_policy_check(3) repeatedly.
- Avoid leaking memory in x509_verify_chain_dup().
2021-05-01 08:07:24 +00:00
wiz
d9dce1b84c p5-CryptX: update to 0.071.
0.071   2021-03-30
        - fix #67 (better handling of PEM decoding failures)

0.070   2021-02-12
        - fix #66 remove -flto=auto (Makefile.PL)
        - fix #65 typo in docs (lib/Crypt/Cipher.pm)
        - bundled libtomcrypt update branch:develop (commit:910d6252 2021-01-19)
2021-04-28 07:36:39 +00:00
wiz
b3744d4be4 p5-Net-SSLeay: update to 1.90.
1.90 2021-01-21
	- New stable release incorporating all changes from developer releases
	  1.89_01 to 1.89_05.
	- Summary of major changes since version 1.88:
	  - Formalised libssl version support policy: all stable versions of OpenSSL
	    in the 0.9.8 - 1.1.1 branches (with the exception of 0.9.8 - 0.9.8b) and
	    all stable releases of LibreSSL in the 2.0 - 3.1 series are supported.
	    The LibreSSL 3.2 series is not yet fully supported because its TLSv1.3
	    implementation is not currently libssl-compatible.
	  - Added support for LibreSSL on Windows when built with Visual C++.
	  - Exposed P_X509_CRL_add_extensions, several SSL_CIPHER functions, and
	    several stack functions.
	  - Fixed crashes in the callback functions CTX_set_next_proto_select_cb and
	    CTX_set_alpn_select_cb.
	  - The test suite is now compatible with OpenSSL 1.1.1e onwards, as well as
	    OpenSSL security level 2 (the default on many Linux distributions).

1.89_05 2021-01-21
	- Expose SSL_get_ciphers. Thanks to github user dylc5190.
	- Expose SSL_CIPHER_get_version and fix SSL_CIPHER_description
	  and SSL_CIPHER_get_bits. Also fixed and enhanced
	  documentation for these and related SSL_CIPHER functions.
	- Clarify libssl version support policy: all stable versions of OpenSSL in
	  the 0.9.8 - 1.1.1 branches (with the exception of 0.9.8 - 0.9.8b) and all
	  stable releases of LibreSSL in the 2.0 - 3.1 series are supported.
	- Direct bug reports to the GitHub repository, since rt.cpan.org will shut
	  down on 2021-03-01.

1.89_04 2021-01-13
	- Fix crashes in the callback functions CTX_set_next_proto_select_cb() and
	  CTX_set_alpn_select_cb() caused by the use of a pointer returned by
	  SSL_select_next_proto() which may already have been freed under certain
	  circumstances. Fixes GH-222. Thanks to dylc5190 for the report.
	- Remove the dependency on the AES128-SHA cipher suite in the test script
	  64_ticket_sharing.t. Fixes GH-231.
	- Remove checks and warnings in Makefile.PL relating to the use of RSAref,
	  which was removed from OpenSSL in version 0.9.7.

1.89_03 2020-12-12
	- Expose the following functions:
	  - X509_STORE_CTX_get0_cert, X509_STORE_CTX_get1_chain
	  - sk_X509_pop, sk_X509_shift, sk_X509_unshift,
	  - sk_X509_insert, sk_X509_delete, sk_x509_value, sk_X509_num
	  Thanks to Dan Freed.
	- Correct the minimum OpenSSL version required for the following functions
	  to be made available (previously they were all declared to be present in
	  1.1.0-pre1, which caused Net::SSLeay to crash at run-time when built
	  against OpenSSL versions between 1.1.0-pre1 and 1.1.0-pre3):
	  - CTX_set_max_proto_version (added in 1.1.0-pre2)
	  - CTX_set_min_proto_version (added in 1.1.0-pre2)
	  - SESSION_up_ref (added in 1.1.0-pre4)
	  - set_max_proto_version (added in 1.1.0-pre2)
	  - set_min_proto_version (added in 1.1.0-pre2)
	- Correct the minimum OpenSSL version required for get_SSL_CTX and SSL_ctrl
	  to be made available (previously they were declared to be present from
	  0.9.8f onwards, when in reality they are available in all 0.9.8 versions).
	- Replace the PKI used by the test suite with one generated by the
	  generate-test-pki helper script. All entities in the new PKI have 2048-bit
	  RSA private keys and CSRs, certificates and CRLs with SHA-256 digests,
	  allowing the test suite to execute under OpenSSL security level 2 (now the
	  default security level for OpenSSL in many Linux distributions).
	- Initialise libssl consistently in the test suite.
	- Don't rely on the availability of specific SSL/TLS protocol versions or
	  cipher suites in the test suite; instead, dynamically select from any of
	  the available protocol versions and cipher suites permitted by libssl.
	  Fixes RT#132425. Thanks to Graham Ollis for the initial report of the test
	  suite failing on Ubuntu 20.04 with the Ubuntu-packaged OpenSSL, whose
	  configuration forbids the use of TLSv1.1 and below at run-time by default.

1.89_02 2020-08-07
	- Add support for the P_X509_CRL_add_extensions function. Thanks to
	  Manuel Mausz for the patch.
	- X509_get_subjectAltNames now knows how to return
	  GEN_RID. The returned value is an ASN OID in text format
	  with current maximum length of 2500 characters. Updated
	  t/local/33_x509_create_cert.t to use GEN_RID and all other
	  supported types with certificate request and signed
	  certificate. These relate to GitHub issue GH-149 opened by
	  s482dcaw.
	- Support for 64-bit Windows versions of OpenSSL from 1.0.0-beta1
	  through to 1.0.0b has been withdrawn due to malfunctions occurring in
	  Perl programs that use fork(). This mainly affects users of Strawberry
	  Perl x64 5.12.3.20180709, which ships with OpenSSL 1.0.0-beta4.
	  Affected users should build Net-SSLeay against OpenSSL 1.0.0c or
	  above; users of Strawberry Perl x64 5.12.3.20180709 may instead find
	  it easier to upgrade to Strawberry Perl x64 5.14.4.1 or above. See
	  https://github.com/radiator-software/p5-net-ssleay/issues/189 for more
	  information.

1.89_01 2020-03-22
	- Fix the repository URL in Makefile.PL (git:// rather than git@),
	  which was preventing it from being added to META.json. Thanks to
	  Dan Book.
	- When building Net-SSLeay, exit if an OpenSSL executable cannot be
	  found in PATH. Fixes RT#131060. Thanks to Nigel Horne for the report.
	- Remove non-OCSP external tests, many of which unnecessarily duplicate
	  local tests or fail for reasons outside of our control. Fixes
	  RT#129542. Thanks to Andreas Vögele for the bug report that
	  ultimately led to this change.
	- Add support for LibreSSL on Windows when built with Visual C++.
	  Thanks to Graham Ollis for the patch.
	- In SSL_CTX_free() and SSL_free(), clean callback-related data from
	  the global hash after freeing ctx, not before. This allows callbacks
	  to be executed during freeing. Thanks to Steffen Ullrich for the
	  patch.
	- t/local/07_sslecho.t started failing with OpenSSL 1.1.1e. Updated
	  the test file with missing calls to Net::SSLeay::shutdown(). Also
	  added one call in SSLeay.pm sslcat() function. Enabling SSLeay trace
	  level 3 showed 'unexpected eof while reading' errors which were added
	  to OpenSSL with commit db943f43. This fixes GitHub issue GH-160
	  reported by Brett T. Warden.
	- t/local/01_pod.t now requires Test::Pod 1.41 to work with Pod syntax
	  used with Net::SSLeay 1.88 and later. This fixes GitHub issue GH-147
	  reported by Ulrik Haugen.
2021-04-27 12:17:13 +00:00
wiz
449d161c49 p5-IO-Socket-SSL: update to 2.070.
2.070 2021/02/26
- changed bugtracker in Makefile.PL to github, away from obsolete rt.cpan.org
2.069 2021/01/22
- IO::Socket::Utils CERT_asHash and CERT_create now support subject and issuer
  with multiple same parts (like multiple OU). In this case an array ref instead
  of a scalar is used as hash value.
  https://github.com/noxxi/p5-io-socket-ssl/issues/95
2021-04-27 12:15:23 +00:00
wiz
269951909f p5-GnuPG-Interface: update to 1.02.
1.02 - 2021-04-09
 - Work around an issue with CLI options for deleting secret keys in gpg 2.2

1.01 - 2021-01-26
 - Make $gnupg->call('foo') update the internal GnuPG version number.
 - Localize tainted PATH env to make exec happy
2021-04-27 12:13:11 +00:00
wiz
01f3798020 p5-Digest-HMAC: update to 1.04nb10.
Version 1.04: 2021-04-01

   No-change release updating maintainer to ARODLAND
2021-04-27 12:08:24 +00:00
wiz
917bec3094 p5-Crypt-Twofish: update to 2.18.
2.18    2020-11-25      Abhijit Menon-Sen <ams@toroid.org>

    * Fix Makefile.PL to use -I. when executing tab/tables.pl, so that
      it can find tab/misc.h (suggested by Tim V)
2021-04-27 12:07:25 +00:00
wiz
af66d1fc3d p5-Crypt-Rijndael: update to 1.16.
1.16 - 2021-04-01
   * Add non-blocksized encoding support to streaming modes
   * Explicitly use downgraded strings

1.15 - 2020-10-10
   * Use standard uint8_t and uint32_t from stdint.h
2021-04-27 12:06:11 +00:00
wiz
6175361929 p5-Crypt-CBC: update to 3.03.
3.03    Sun 18 Apr 2021 10:54:19 PM EDT
	- Fixed bug which caused an extraneous block of garbage data to be appended to encrypted
	  string when "nopadding" specified and plaintext is even multiple of blocksize.

3.02
	- CTR mode now requires the Math::Int128 module, which gives a ~5x performance
	  boost over Math::BigInt.

3.01
	- Warn when the deprecated opensslv1 PBKDF (key derivation function) is used
	  for encryption. Turn off with -nodeprecate=>1 or by choosing a different
	  PBKDF, such as -pbkdf=>'pbkdf2'.
	- Fix a regression when passing the legacy -salt=>1 argument.

3.00    Sun Feb  7 10:28:08 EST 2021
        - Released version 3.00 in recognition of multiple new features
	  and cleanups.

2.37    Sun Feb  7 10:20:17 EST 2021
        - Added better argument checking.
	- Fixed long-standing standard padding bug: plaintext ending with
	  bytes between 0x00 and 0x0A would be truncated in some conditions.
	- Fixed Rijndael_compat padding.

2.36    Wed 03 Feb 2021 09:19:06 AM EST
        - Add support for OFB, CFB and CTR chain modes.
	- New dependency: Math::BigInt

2.35    Sun Jan 31 22:02:42 EST 2021
        - Add support for PBKDF2 key derivation algorithm
	- New dependencies: Digest::SHA, Crypt::PBKDF2, Crypt::Cipher::AES

2.34    Fri Jan 29 18:08:12 EST 2021
        - Support for openssl SHA-256 key derivation algorithm
2021-04-27 10:51:00 +00:00
wiz
94313f8dab security/Makefile: + p5-Crypt-PBKDF2 2021-04-27 10:43:45 +00:00
wiz
acbcf5322a p5-Crypt-PBKDF2: clean up Makefile 2021-04-27 10:43:06 +00:00
wiz
2566380758 security/p5-Crypt-PBKDF2: import p5-Crypt-PBKDF2-0.161520
PBKDF2 is a secure password hashing algorithm that uses the techniques
of "key strengthening" to make the complexity of a brute-force
attack arbitrarily high. PBKDF2 uses any other cryptographic hash
or cipher (by convention, usually HMAC-SHA1, but Crypt::PBKDF2 is
fully pluggable), and allows for an arbitrary number of iterations
of the hashing function, and a nearly unlimited output hash size
(up to 2**32 - 1 times the size of the output of the backend hash).
The hash is salted, as any password hash should be, and the salt
may also be of arbitrary size.
2021-04-27 10:42:40 +00:00
pin
b69c24819d security/pleaser: update to 0.4.1
Upstream provides no changelog, but NetBSD fixes have been merged.
Drop patch
2021-04-25 19:58:20 +00:00
wiz
481c563948 libdes: remove dead download link 2021-04-25 05:56:29 +00:00
wiz
edb9e3aabf pgp5: remove dead download link 2021-04-25 05:54:07 +00:00
wiz
4a236aa0a3 pam-ldap: remove dead links 2021-04-25 05:52:44 +00:00
pin
3da5d46e6e security/pleaser: update to 0.4.0
-No changelog provided upstream.
2021-04-24 18:52:58 +00:00
pho
09f2fa703e Update to hackage-security-0.6.0.1
* Fix bug in non-default -lukko build-configuration (#242)
* Add support for template-haskell-2.16.0.0 (#240)
2021-04-24 13:32:21 +00:00
pho
c210c57f2c Update to cryptohash-sha-256-0.11.102.0
* Add Eq instance for Ctx
* Add start and startlazy producing Ctx
* Introduce new use-cbits cabal flag in order to add support for
  FFI-less cryptohash-sha256-pure pass-thru
2021-04-24 13:25:14 +00:00
pho
875c8df363 Fix build with GHC 9 2021-04-24 13:21:53 +00:00
pho
7c206174d0 Update PLIST 2021-04-24 13:18:32 +00:00
pho
5cb8cf3708 Update PLIST 2021-04-24 13:08:44 +00:00
pho
fb30ffb91b Update to tls-1.5.5
Version 1.5.5
* QUIC support #419 #427 #428 #430 #433 #441
* Server ECDSA for P-256 #436
* Sort ciphersuites based on hardware-acceleration support #439
* Sending no_application_protocol #440
* Internal improvements #426 #431

Version 1.5.4
* Restore interoperability with early Java 6 #422
* Test cleanups for timeout and async usage #416
2021-04-24 13:06:02 +00:00
pho
61e1c86504 Update PLIST 2021-04-24 12:58:20 +00:00
pho
8ec5745cf7 Update to cryptonite-0.28
0.28
* Add hash constant time capability
* Prevent possible overflow during hashing by hashing in 4GB chunks

0.27
* Optimise AES GCM and CCM
* Optimise P256R1 implementation
* Various AES-NI building improvements
* Add better ECDSA support
* Add XSalsa derive
* Implement square roots for ECC binary curve
* Various tests and benchmarks
2021-04-24 12:55:43 +00:00
wiz
21e3684801 *: remove dead download links 2021-04-24 11:44:50 +00:00
wiz
7897265537 pam-dbm: remove
This is security related software last updated in 2003 with no upstream.
I couldn't find anyone else packaging this.
2021-04-24 11:02:51 +00:00
wiz
3b7aeddeb0 pgp5: remove dead download link 2021-04-24 00:27:13 +00:00
pho
335a312279 Update PLIST 2021-04-23 03:59:26 +00:00
adam
59ee103321 py-google-auth: updated to 1.29.0
v1.29.0

Features
add reauth feature to user credentials

Bug Fixes
Allow multiple audiences for id_token.verify_token
2021-04-22 13:56:50 +00:00
nia
c54ea0d550 openssl: add note on updating 2021-04-22 09:59:37 +00:00
nros
a03ebc143b Fix c++17 and openssl on solaris/illumos
gcc on solaris/illumos defines __STDC_VERSION__ in c++ mode where _Noreturn
does not exist.
This causes breakage when building c++17 programs that use openssl.
2021-04-22 09:32:39 +00:00
adam
da0a125726 revbump for boost-libs 2021-04-21 13:24:06 +00:00
adam
9d0e79c401 revbump for textproc/icu 2021-04-21 11:40:12 +00:00
wiz
bda00d494f smtpd: remove
Mail-related security software that hasn't been touched since 1997
should not be used.
2021-04-21 09:15:08 +00:00
nia
6e2ea1baf5 stunnel: update to 5.59
### Version 5.59, 2021.04.05, urgency: HIGH
* Security bugfixes
  - OpenSSL DLLs updated to version 1.1.1k.
* New features
  - Client-side "protocol = ldap" support (thx to Bart
    Dopheide and Seth Grover).
* Bugfixes
  - The test suite fixed not to require external connectivity.
  - Fixed paths in generated manuals (thx to Tatsuki Makino).
  - Fixed configuration reload when compression is used.
  - Fixed compilation with early releases of OpenSSL 1.1.1.
2021-04-21 09:02:32 +00:00
adam
ff1b1666ef libgcrypt: updated to 1.9.3
Noteworthy changes in version 1.9.3 (2021-04-19)
------------------------------------------------

 * Bug fixes:
   - Fix build problems on i386 using gcc-4.7.
   - Fix checksum calculation in OCB decryption for AES on s390.
   - Fix a regression in gcry_mpi_ec_add related to certain usages of
     curve 25519.
   - Fix a symbol not found problem on Apple M1.
   - Fix for Apple iOS getentropy peculiarity.
   - Make keygrip computation work for compressed points.

* Performance:
   - Add x86_64 VAES/AVX2 accelerated implementation of Camellia.
   - Add x86_64 VAES/AVX2 accelerated implementation of AES.
   - Add VPMSUMD acceleration for GCM mode on PPC.

 * Internal changes.
   - Harden MPI conditional code against EM leakage.
   - Harden Elgamal by introducing exponent blinding.
   - Fix memory leaks in the error code paths of EdDSA.
2021-04-21 08:28:31 +00:00
pin
0c59914cdf security/lxqt-openssh-askpass: update to 0.17.0
lxqt-openssh-askpass-0.17.0 / 2021-04-15
========================================
  * Updated README.md.
2021-04-20 18:29:35 +00:00
pin
7ec78410a8 security/lxqt-sudo: update to 0.17.0
lxqt-sudo-0.17.0 / 2021-04-15
=============================
  - Handled Qt5.15's deprecations.
2021-04-20 18:28:19 +00:00
pin
11754e328d security/lxqt-policykit: update to 0.17.0
lxqt-policykit-0.17.0 / 2021-04-15
==================================
  - Completely moved to Qt5 signal/slot syntax.
  - A better memory handling in PolicykitAgent.
  - Code cleanup.
  - Improved code readability.
2021-04-20 18:23:38 +00:00
wiz
c3e5c57b0b tor-browser-https-everywhere: update to 2021.4.15.
2021.4.15
* Add DuckDuckGo Smarter Encryption update channel
* Bloom filter for rulesets
* Firefox Fenix option page updates for Android users
* Move to Python 3 from Python 3.6
* Fix undefined type access
* Fix empty default types
2021-04-20 16:23:49 +00:00
leot
57d50dda9f amass: Update to 3.11.13
Changes:
3.11.13
-------
 - Update user_guide.md
 - Removed the previous CI/CD configuration

3.11.12
-------
 - format: write characterization tests for parse.go
 - Moved the DNS resolvers package to another repository
 - Increased speed of the Google certificate transparency data source
 - Addressing crash during cleanup issue #599
 - Added the Security Weekly interview information

3.11.11
-------
 - Improved data source service performance
 - Addressing #519 by noticing expired contexts quickly

3.11.10
-------
 - Support for the AMASS_CONFIG environment variable
2021-04-17 11:07:03 +00:00
leot
71a2738860 sqlmap: Update to 1.5.4
Changes:
1.5.4
-----
No changelog shared by upstream but according commit messages mostly bug fixes.
2021-04-17 10:33:20 +00:00
ryoon
633bec58e9 *: Recursive revbump from devel/nss 2021-04-15 11:23:03 +00:00
adam
49008cacac py-acme py-certbot*: updated to 1.14.0
Certbot 1.14.0

Changed

certbot-auto no longer checks for updates on any operating system.
The module acme.magic_typing is deprecated and will be removed in a future release.
Please use the built-in module typing instead.
The DigitalOcean plugin now creates TXT records for the DNS-01 challenge with a lower 30s TTL.

Fixed

Don't output an empty line for a hidden certificate when certbot certificates is being used
in combination with --cert-name or -d.
2021-04-15 05:16:35 +00:00
wiz
ae12fea0c1 *: bump for vala 0.52 2021-04-14 07:28:16 +00:00
dholland
c40b549999 PR pkg/56100: security/libgcrypt fails on NetBSD/m68k
Extend the m68k assembler syntax probe to recognize NetBSD targets.
2021-04-13 17:38:12 +00:00
nia
ac81f93ac2 honeyd: update to 1.5c, fix build with "new" libevent
i would post a changelog, but loading the honeyd forum fails with this:

SQL ERROR [ mysql4 ]

Table './phpbb2/phpbb3_sessions' is marked as crashed and should be repaired [145]

An sql error occurred while fetching this page. Please contact an administrator if this problem persists.

This release is from 2007.
2021-04-13 15:42:27 +00:00
nia
95837a61bd remove security/sfs
upstream has disappeared, this doesn't build with modern C++ compilers,
and i can't find any other packages from which to steal packages to fix
it in any other packaging systems.
2021-04-13 15:19:55 +00:00
nia
5cff77dd41 remove security/srp_client
development appears stalled upstream and this does not support current
openssl or SSP.
2021-04-13 15:15:45 +00:00
nia
6b34740005 security: expand COMMENT 2021-04-12 14:29:46 +00:00
nia
efc6bdfb67 libsecret: vala is build-time dependency 2021-04-12 13:21:00 +00:00
kim
8d0965f8b9 security/priv: Document why we would want to avoid "autoreconf -fi" 2021-04-11 07:10:06 +00:00
kim
0ae04c850a security/priv: Avoid calling "autoreconf -fi" during pre-configure. 2021-04-11 06:52:54 +00:00
taca
55e4deeefd security/ruby-rex-exploitation: remove dependency to ruby-rexml
Dro dependency to ruby-rexml since all ruby*-base contains ruby-rexml
package.
2021-04-11 00:10:55 +00:00
nia
92fdc2daed pam_ssh_agent_auth: update to 0.10.4
- fixed build with openssl 1.1.
- grabbed some fixes from FreeBSD.
- now uses the new GITHUB_SUBMODULES - thx ryoon!
2021-04-10 09:10:11 +00:00
nia
36d051e224 remove security/rainbowcrack
appears to be closed source now, patches for modern openssl support
are not available.
2021-04-10 08:48:25 +00:00
nia
28e50b3233 remove security/qore-asn1-module
development of this module appears to have been inactive upstream for
years so there's no support for modern openssl available.

the other packaging systems with a package for this are macports and
opensuse, neither of which have patches.
2021-04-10 08:44:49 +00:00
nia
6921e0ed3b pkcs11-helper: update to 1.27
- fixes build with openssl 1.1
- add support for mbedtls as an option
- avoids regenerating autoconf bits

2020-11-17 - Version 1.27

* core: handle PIN expiration after C_Login as C_Login may take a while
* core: return explict success when plugin&play and no threading and no
  safefork, thanks to Tunnelblick

2020-01-21 - Version 1.26

* openssl: build with openssl ec disabled
* openssl: support RSA_NO_PADDING padding, thanks to Selva Nair
* core: reduce mutex lock scope of add/remove provider, thanks to Frank Morgner
* core: improve the fork fixup sequence

2018-08-16 - Version 1.25.1

 * core: build with threading disabled

2018-08-04 - Version 1.25

 * core: do not attempt to initialize provider with fork mode is not safe. Too
   many providers do not follow the PKCS#11 spec.

2018-06-15 - Version 1.24

 * build: support libressl-2.7

2018-06-02 - Version 1.23

 * build: cleanups.
 * openssl: rework support 1.1.

2017-02-12 - Version 1.22

 * spec: minor cleanups.

2017-01-06 - Version 1.21

 * mbedtls: fix missing logic if issur certificate, thanks to Steffan Karger

2016-12-08 - Version 1.20

 * polarssl: support polarssl-1.3, thanks to Steffan Karger.
 * certificate: ignore certificate object without CKA_ID.
 * openssl: fix memory leak, thanks to ASPj.
 * openssl: support 1.1 and libressl, thanks to Daiki Ueno.

2013-10-11 - Version 1.11

 * openssl: support generic pkey.
 * openssl: add dsa support.
 * openssl: add ecdsa support, thanks for Sanaullah for testing.
2021-04-10 08:39:23 +00:00
nia
8826abafab remove security/engine-pkcs11
this was merged into security/libp11
2021-04-10 08:26:42 +00:00
nia
4e64aba61a libp11: update to 0.4.11
- fixed installation location of openssl engine
- avoid regenerating autoconf bits

New in 0.4.11; 2020-10-11; Michał Trojnara
* Fixed "EVP_PKEY_derive:buffer too small" EC errors (Luka Logar)
* Fixed various memory leaks (Mateusz Kwiatkowski)
* Fixed Windows VERSIONINFO (Pavol Misik)
* Fixed builds with OpenSSL older than 1.0.2 (Michał Trojnara)
* Fixed a double free in EVP_PKEY_meth_free() (Mikhail Durnev)
* Added CKA_VALUE_LEN to EC key derivation template (Michał Trojnara)
* Fixed handling keys without label attribute (efternavn)
* Updated the tests (Anderson Toshiyuki Sasaki)
* Made ECDH-derived keys extractable (Bent Bisballe Nyeng)
* Added support for pin-source within PKCS#11 URI (Stanislav Levin)
* Improved LibreSSL compatibility (patchMonkey156)
* Fixed handling RSA private keys in BIND (Stanislav Levin)
* Added macOS testing support (Stanislav Levin)
* Fixed engine object search algorithm (Anderson Toshiyuki Sasaki)
2021-04-10 08:25:08 +00:00
nia
e27d345973 remove security/credns
unmaintained upstream, no support for current openssl
only other package is freebsd ports, where it's marked BROKEN
2021-04-10 08:17:36 +00:00
nia
933faacb3c validns: fix building with openssl 1.1 2021-04-10 08:16:09 +00:00
wiz
14c07cf0ce *: bump PKGREVISION for nss linking fix 2021-04-09 06:54:56 +00:00
markd
9f17ade459 kde applications release: update to 20.12.3
10 months worth of updates.
2021-04-07 12:28:14 +00:00
adam
ea29598953 py-google-auth-oauthlib: updated to 0.4.4
0.4.4

Bug Fixes

add redirect_uri_trailing slash param to run_local_server
2021-04-05 19:53:03 +00:00