Commit graph

5812 commits

Author SHA1 Message Date
wiz
711e87b5b6 Update to 1.2.17, for security reasons.
* Preparations for 1.2.17 release
* Fixed security issue with libxslt (CVE-2011-1425, reported by Nicolas Gregoire)
* Fixed pkcs12 file loading (based on patch from Andre de Souza Pinto)
* Fixed comments (based on patch from Wolfgang Woehl)
* Fixed extra quotes in configure (bug #631258)
* Fixed configure issue with empty --with-libxml/libxsl and config scripts in /bin directory
* Fixed gcrypt init/shutdown (patch from Roumen)
2011-04-01 12:27:45 +00:00
wiz
fb63343f4a Fix PKGNAME to have "60" instead of "6", to avoid making it appear very
old and triggering a vulnerability match. Suggested by obache.

Reset PKGREVISION, since the version is newer than the old one.
Set LICENSE.
2011-04-01 11:43:57 +00:00
agc
b7ed882699 Be consistent in the way we quote the '#' character 2011-03-31 18:37:33 +00:00
agc
2549c32ff0 The '#' character is kinda special to makefiles - re-work the comment field
so that we don't have any '#' chars in it.

Avoids the following:

	% grep COMMENT Makefile
	COMMENT=       Cryptographic store accessible through a PKCS#11 interface
	% pkg_info softhsm
	Information for softhsm-1.2.0:

	Comment:
	Cryptographic store accessible through a PKCS
2011-03-31 18:30:32 +00:00
obache
1e7f02c434 * fix make target dependency to man page aliases (arg_printusage.3) will be
always installed.
* add user-destdir installation support.
2011-03-24 05:38:01 +00:00
obache
ffefd2eaf8 Use bsdtar for extract, or result in corrupted file name with certain tar.
Bump PKGREVISION.
2011-03-24 03:04:16 +00:00
zafer
7b73b144cb update PLIST. arg_printusage.3 is gone. 2011-03-23 20:56:49 +00:00
obache
e6516f444d revert unwanted commit accidently. 2011-03-23 08:11:37 +00:00
obache
327c7852d9 remove needless assignment, it break strict-aliasing. 2011-03-23 08:10:33 +00:00
obache
aa5f18f2bc bsd.fast.prefs.mk should not be included from packages. 2011-03-23 07:49:47 +00:00
tez
cb053519d0 Kerberos V5 is an authentication system developed at MIT. It is a network
authentication protocol designed to provide strong authentication for
client/server applications by using secret-key cryptography. (Kerberos
5 is discussed in RFC 1510.)

This package provides MIT Kerberos applications and servers for telnet,
the r-services and ftp.  These were recently split from the mit-krb5
package due to upstream making the same split.
2011-03-23 00:01:38 +00:00
tez
e02c424c99 remove 3 more old patches that got missed 2011-03-22 23:35:59 +00:00
tez
dc3953a58d Update MIT Kerberos to v1.8.3 with the latest security patches up to and
including MITKRB5-SA-2011-003.

Please see http://web.mit.edu/kerberos/ for the change logs since v1.4.2

Note that the r-services, telnetd and ftpd services and the related client
applications are now in a separate pacakge security/mit-krb5-appl.
2011-03-22 23:31:04 +00:00
tez
fefcb23d19 add mit-krb5-appl (split out of mit-krb5) 2011-03-22 23:20:49 +00:00
abs
bf4ca8e37c looks like "make mps" may have been missed... 2011-03-22 23:09:10 +00:00
taca
fe38f30ddc Update sudo pacakge to 1.7.5.
* pkgsrc change: trying to use user-destdir.


What's new in Sudo 1.7.5?

 * When using visudo in check mode, a file named "-" may be used to
   check sudoers data on the standard input.

 * Sudo now only fetches shadow password entries when using the
   password database directly for authentication.

 * Password and group entries are now cached using the same key
   that was used to look them up.  This fixes a problem when looking
   up entries by name if the name in the retrieved entry does not
   match the name used to look it up.  This may happen on some systems
   that do case insensitive lookups or that truncate long names.

 * GCC will no longer display warnings on glibc systems that use
   the warn_unused_result attribute for write(2) and other system calls.

 * If a PAM account management module denies access, sudo now prints
   a more useful error message and stops trying to validate the user.

 * Fixed a potential hang on idle systems when the sudo-run process
   exits immediately.

 * Sudo now includes a copy of zlib that will be used on systems
   that do not have zlib installed.

 * The --with-umask-override configure flag has been added to enable
   the "umask_override" sudoers Defaults option at build time.

 * Sudo now unblocks all signals on startup to avoid problems caused
   by the parent process changing the default signal mask.

 * LDAP Sudoers entries may now specify a time period for which
   the entry is valid.  This requires an updated sudoers schema
   that includes the sudoNotBefore and sudoNotAfter attributes.
   Support for timed entries must be explicitly enabled in the
   ldap.conf file.  Based on changes from Andreas Mueller.

 * LDAP Sudoers entries may now specify a sudoOrder attribute that
   determines the order in which matching entries are applied.  The
   last matching entry is used, just like file-based sudoers.  This
   requires an updated sudoers schema that includes the sudOrder
   attribute.  Based on changes from Andreas Mueller.

 * When run as sudoedit, or when given the -e flag, sudo now treats
   command line arguments as pathnames.  This means that slashes
   in the sudoers file entry must explicitly match slashes in
   the command line arguments.  As a result, and entry such as:
	user ALL = sudoedit /etc/*
   will allow editing of /etc/motd but not /etc/security/default.

 * NETWORK_TIMEOUT is now an alias for BIND_TIMELIMIT in ldap.conf for
   compatibility with OpenLDAP configuration files.

 * The LDAP API TIMEOUT parameter is now honored in ldap.conf.

 * The I/O log directory may now be specified in the sudoers file.

 * Sudo will no longer refuse to run if the sudoers file is writable
   by root.

 * Sudo now performs command line escaping for "sudo -s" and "sudo -i"
   after validating the command so the sudoers entries do not need
   to include the backslashes.

 * Logging and email sending are now done in the locale specified
   by the "sudoers_locale" setting ("C" by default).  Email send by
   sudo now includes MIME headers when "sudoers_locale" is not "C".

 * The configure script has a new option, --disable-env-reset, to
   allow one to change the default for the sudoers Default setting
   "env_reset" at compile time.

 * When logging "sudo -l command", sudo will now prepend "list "
   to the command in the log line to distinguish between an
   actual command invocation in the logs.

 * Double-quoted group and user names may now include escaped double
   quotes as part of the name.  Previously this was a parse error.

 * Sudo once again restores the state of the signal handlers it
   modifies before executing the command.  This allows sudo to be
   used with the nohup command.

 * Resuming a suspended shell now works properly when I/O logging
   is not enabled (the I/O logging case was already correct).
2011-03-22 14:52:08 +00:00
pettai
f93bc52bf9 OpenDNSSEC 1.2.1:
* ldns 1.6.9 is required for bugfixes.
* dnsruby-1.52 required for bugfixes.

Bugfixes:
* Auditor: 'make check' now works when srcdir != builddir.
* Auditor: Include the 'make check' files in the tarball.
* Enforcer: Fix the migration script for SQLite.
* Enforcer: Increase size of keypairs(id) field in MySQL to allow more than
  32767 keys; see MIGRATION for details.
* Enforcer: Minor change to NOT_READY_KEY error message.
* libhsm: Increase the maximum number of attached HSM:s from 10 to 100.
* ods-ksmutil: Send trivial MySQL messages to stdout when exporting zonelist
  etc. Otherwise the resulting XML needs to be edited by hand.
* ods-control: Fix for Bourne shell.
* Signer Engine: Prevent race condition when setting up the workers and
  the command handler.
* Signer Engine: Check if the signature exists before recycling it.
* Signer Engine: Quit when there are errors in the configuration.
* Signer Engine: Enable core dump on failure.
* Signer Engine: Explicitly close down log msg with null.
* Signer Engine: Backup state after writing output.
* Signer Engine: Allow update of serial if internal structure is not
  initialized.
2011-03-21 15:52:25 +00:00
obache
0e34bf4d9d Add user-destdir installatin support. 2011-03-20 06:36:30 +00:00
obache
95d6edf97d Add user-destdir installation support. 2011-03-20 06:29:52 +00:00
obache
9434547e77 Add user-destdir installation support. 2011-03-20 06:17:58 +00:00
dholland
967c4c323b Update ap-modsecurity2 to 2.5.13, partly from Matthew Sporleder in
PR 44745, rest by me.

pkgsrc changes:
   - fix up deps
   - fix Apache module handling
   - DESTDIR support

XXX: The DESTDIR support has to bypass apxs because as far as I can tell
XXX: apxs -i doesn't know how to handle DESTDIRs. Various Apache modules
XXX: do this in various different ways. Someone(TM) should teach apxs -i
XXX: about DESTDIRs and fix up all the abuse. The infrastructure for
XXX: Apache modules could use some rototilling as well.

29 Nov 2010 - 2.5.13
--------------------

 * Cleaned up some mlogc code and debugging output.

 * Remove the ability to use a relative path to a piped audit logger
   (i.e. mlogc) as Apache does not support it in their piped loggers
   and it was breaking Windows and probably other platforms that
   use spaces in filesystem paths.  Discovered by Tom Donovan.

 * Fix memory leak freeing regex.  Discovered by Tom Donovan.

 * Fix some portability issues on Windows.

 * Fixed Geo lookup concurrent connections bug

 * Fixed Skip/SkipAfter chain bug

 * Added new setvar Lua API to be used into Lua scripts

 * Added PCRE messages indicates each rule that exceed match limits

 * Added new Base64 transformation function called base64DecodeEx, which
   can decode base64 data skipping special characters.

 * Add SecReadStateLimit to limit the number of concurrent threads in BUSY connections per ip address

 * Fixed redirect action was not expanding macros in chained rules



04 Feb 2010 - 2.5.12
--------------------

 * Fixed SecUploadFileMode to set the correct mode.

 * Fixed nolog,auditlog/noauditlog/nolog controls for disruptive actions.

 * Added additional file info definitions introduced in APR 0.9.5 so that
   build will work with older APRs (IBM HTTP Server v6).

 * Added SecUploadFileLimit to limit the number of uploaded file parts that
   will be processed in a multipart POST.  The default is 100.

 * Fixed path normalization to better handle backreferences that extend
   above root directories.  Reported by Sogeti/ESEC R&D.

 * Trim whitespace around phrases used with @pmFromFile and allow
   for both LF and CRLF terminated lines.

 * Allow for more robust parsing for multipart header folding.  Reported
   by Sogeti/ESEC R&D.

 * Fixed failure to match internally set TX variables with regex
   (TX:/.../) syntax.

 * Fixed failure to log full internal TX variable names and populate
   MATCHED_VAR* vars.

 * Enabled PCRE "studying" by default.  This is now a configure-time option.

 * Added PCRE match limits (SecPcreMatchLimit/SecPcreMatchLimitRecursion) to
   aide in REDoS type attacks.  A rule that goes over the limits will set
   TX:MSC_PCRE_LIMITS_EXCEEDED.  It is intended that the next major release
   of ModSecurity (2.6.x) will move these flags to a dedicated collection.

 * Reduced default PCRE match limits reducing impact of REDoS on poorly
   written regex rules.  Reported by Sogeti/ESEC R&D.

 * Fixed memory leak in v1 cookie parser.  Reported by Sogeti/ESEC R&D.

 * Now support macro expansion in numeric operators (@eq, @ge, @lt, etc.)

 * Update copyright to 2010.

 * Reserved 700,000-799,999 IDs for Ivan Ristic.

 * Fixed SecAction not working when CONNECT request method is used
   (MODSEC-110). [Ivan Ristic]

 * Do not escape quotes in macro resolution and only escape NUL in setenv
   values.


04 Nov 2009 - 2.5.11
--------------------

 * Added a new multipart flag, MULTIPART_INVALID_QUOTING, which will be
   set true if any invalid quoting is found during multipart parsing.

 * Fixed parsing quoted strings in multipart Content-Disposition headers.
   Discovered by Stefan Esser.

 * Cleanup persistence database locking code.

 * Added warning during configure if libcurl is found linked against
   gnutls for SSL.  The openssl lib is recommended as gnutls has
   proven to cause issues with mutexes and may crash.

 * Cleanup some mlogc (over)logging.

 * Do not log output filter errors in the error log.

 * Moved output filter to run before other stock filters (mod_deflate,
   mod_cache, mod_expires, mod_filter) to avoid analyzing modified data
   in the response.  Patch originally submitted by Ivan Ristic.



18 Sep 2009 - 2.5.10
--------------------

 * Cleanup mlogc so that it builds on Windows.

 * Added more detailed messages to replace "Unknown error" in filters.

 * Added SecAuditLogDirMode and SecAuditLogFileMode to allow fine tuning
   auditlog permissions (especially with mpm-itk).

 * Cleanup SecUploadFileMode implementation.

 * Cleanup build scripts.

 * Fixed crash on configuration if SecMarker is used before any rules.

 * Fixed SecRuleUpdateActionById so that it will work on chain starters.

 * Cleanup build system for mlogc.

 * Allow mlogc to periodically flush memory pools.

 * Using nolog,auditlog will now log the "Message:" line to the auditlog, but
   nothing to the error log.  Prior versions dropped the "Message:" line from
   both logs.  To do this now, just use "nolog" or "nolog,noauditlog".

 * Forced mlogc to use SSLv3 to avoid some potential auto negotiation
   issues with some libcurl versions.

 * Fixed mlogc issue seen on big endian machines where content type
   could be listed as zero.

 * Removed extra newline from audit log message line when logging XML errors.
   This was causing problems parsing audit logs.

 * Fixed @pm/@pmFromFile case insensitivity.


 * Truncate long parameters in log message for "Match of ... against ...
   required" messages.

 * Correctly resolve chained rule actions in logs.

 * Cleanup some code for portability.

 * AIX does not support hidden visibility with xlc compiler.

 * Allow specifying EXTRA_CFLAGS during configure to override gcc specific
   values for non-gcc compilers.

 * Populate GEO:COUNTRY_NAME and GEO:COUNTRY_CONTINENT as documented.

 * Handle a newer geo database more gracefully, avoiding a potential crash for
   new countries that ModSecurity is not yet aware.

 * Allow checking &GEO "@eq 0" for a failed @geoLookup.

 * Fixed mlogc global mutex locking issue and added more debugging output.

 * Cleaned up build dependencies and configure options.
2011-03-19 21:18:06 +00:00
dholland
90d1e258b0 Sort. 2011-03-19 21:16:27 +00:00
obache
a7b0e8d368 * additional missing clean up after removal of libxml option.
* pass to configure more preferred variables.
2011-03-19 13:31:52 +00:00
obache
2f4b7052f5 * improve fetch message
* add user-destdir installation support
* fixes installation on platforms where ROOT_USER != "root".
2011-03-19 11:54:30 +00:00
obache
077bd21498 Only suggest download of DEFAULT_DISTFILES, or other files may need to be
downloaded from other sites than MASTER_SITES.
2011-03-19 11:46:59 +00:00
obache
183089e2e9 Add user-destdir installation support. 2011-03-19 11:14:30 +00:00
obache
397383768c Convert to usual style of "used by" comment. 2011-03-19 10:37:26 +00:00
obache
0d3afda122 * MAKE_JOBS_SAFE=no
* Note commented-out LICENSE (GNU EMACS GENERAL PUBLIC LICENSE)
* Add user-destdir installation support.
2011-03-19 09:36:47 +00:00
obache
de08c01198 * LICENSE=original-bsd
* Add user-destdir installation support.
* Let to binary package same as installed from source
Bump PKGREVISION.
2011-03-19 09:18:02 +00:00
obache
ccff2ae0f5 LICENSE=gnu-gpl-v2 2011-03-19 08:31:26 +00:00
obache
9dd0cc1f2b Marked as USER_DESTDIR ready. 2011-03-19 08:29:20 +00:00
zafer
98e09dec3c service suspended. prevent timeout. fetch from backup. 2011-03-18 20:28:21 +00:00
zafer
a95b6659f6 update master_sites 2011-03-18 20:26:02 +00:00
pettai
784cd3140c 1.8:
- New Features:
    - zonesigner, rollerd
                    - Made changes so that these tools are more compatible
                      with recent versions of Bind
                    - The zone_errors configuration parameter allows a zone-
                      specific maximum to be set.  Once exceeded, that zone
                      will be skipped rather than allowing rollover to continue.
    - blinkenlights
                    - Recognizes when rollerd abruptly quits, so error messages
                      aren't spewed interminably.
    - ZonFile::Fast - Fixed parsing of DS records containing spaces and
                      parsing of mname and rname SOA fields
                    - Added support for parsing KEY records
    - keyrec.pm     - Made changes to properly lock keyrec files before
                      writing to them.
                    - Begun process of deprecating keyrec_open().
    - mapper:       - added a new option: --node-size for mapping
                      complex zones.
    - dnspktflow:   - added two new options:
                      --layout-style for selecting the layout style to use
                      --node-size for mapping complex zones.
                    - Add new (default) option to cluster
                      authoritative nodes together to help better
                      understand the relationships between traffic
                      patterns and authoritative name server/zone arrangement.
    - libval:       - Now distributed with the Root TA.
                    - Added stricter checks for openssl SHA-256 support in
                      configure.
                    - Added several improvements that allow the validator to
                      lookup information within provably insecure zones that
                      do not handle EDNS0 requests nicely. This includes
                      adding support for turning off EDNS0 when traversing a
                      name hierarchy that leads to a provably insecure zone,
                      EDNS0 fallback support, and additional checks to check
                      the sanity of response data.
                    - Fixed certain bugs in CNAME handling and in the
                      validation of proofs accompanying wildcard responses,
                      referrals and alias chains.
                    - Fixed support for RSADSA and RSASHA-512 signature
                      validation.
    - Mac OSX:      - Added a Ports file for mac ports
                    - updated the fink build spec

 - many other miscellaneous bug fixes and improvements.
2011-03-12 20:07:19 +00:00
pettai
a51d2a9e99 Fix build + installation errors. 2011-03-12 19:55:41 +00:00
pettai
d094eca2ca zkt 1.0 -- 15. June 2010
* feat  "/dev/urandom" check added to checkconfig()
* feat  Config compability switch (-C) added to zkt-conf
* feat  zkt-ls has a new switch -s to change sorting of domains from
        subdomain before parent to subdomain below the parent
* feat  "zkt-ls -T" prints only parent trust anchor

zkt 1.0rc1 -- 1. Apr 2010 (The 1.0 release was sponsored by DOMINIC(r) )

* feat  Several config parameter are printed now in a more consistent and
        user friendly form.
        SerialFormat "Incremental" could be abbreviated as "inc" on input.
* bug   use of AC_ARG_ENABLE macros changed in a way that it is possible
        to use it as a "--disable-FEATURE" switch.
* port  no longer checking for malloc() in configue script.
        Mainly because it checks only if malloc(0) is allowed and we do
        not need this.
* port  --disable-color-mode added to configure script
* bug   Makro PRINT_AGE_OF_YEAR renamed to PRINT_AGE_WITH_YEAR in configure.ac
* misc  man page zkt-keyman added
* misc  New command zkt-keyman added as replacement for dnssec-zkt's key
        management functionality
* misc  man page zkt-ls added
* port  Check for ncurses added to Makefile.in
* misc  Color mode (Option -C) added to zkt-ls (experimental)
        New source file tcap.c.
* misc  Deprecate "single linked list" version of ZKT. The binary tree
        version is the default for years, so the VERSION string does no
        longer contain a "T".  Now, if someone insist on the single link
        list version (configure --disable-tree) a "S" is added to the
        version string.
        Anyway, the code for the single link list version does no longer
        have the same functionality and will be removed in one of the later
        releases.
* misc  New command zkt-ls added as replacement for dnssec-zkt's key
        listing functionality
* func  New key algorithms RSASHA256 and RSAHSHA512 added to dki.[ch]
        and zconf.c
        New parameter NSEC3 added. Now it's possible to configure
        an NSEC3_OPTOUT zone.
* bug   Token parsing function gettok() fixed to recognize tokens
        with dashes ("zone-statistics" was seen as "zone").
        Thanks to Andreas Baess for finding this bug.
* bug   Fixed bug in (re)salting dynamic zones.
        sig_zone() and gensalt() needs parameter change for this
* func  New option -a added to zkt-conf
* func  In zconf.c CONF_TIMEINT parameter are now able to recognize
        "unset" values (which is represented internaly as 0)
* func  Set Max_TTL to sig lifetime for dynamic zones or if Max_TTL
        is less than 1.
        max_ttl checks in checkconfig() fixed.
* func  printconfigdiff() added to zconf.c and used by zkt-conf.
        Now local configs are printed as diff to site wide config.
* misc  man page zkt-signer.8 changed to new command syntax
* func  Per domain logging added. Use parameter LogDomainDir to
        enable it. For more details see file README.logging.
* func  distribute.sh supports new action type "distkeys" but is
        currently not used
* misc  LOG_FNAMETMPL changed and moved from config_zkt.h to log.h
* misc  Default soa serial format changed from "Incremental"
        to "Unixtime"
* func  dnssec-signer command renamed to zkt-signer. Man page updated.
* func  New command zkt-conf added as replacement for dnssec-zkt -Z
* misc  timeint2str() is now global (zconf.c)
* func  zfparse.c - a rudimentary zone file parser
        scans minimum and maximum ttl values; adds $INCLUDE dnskey.db

zkt 0.99d -- Not released

* func  Option SIG_DnsKeyKSK for DNSKEY signing with KSK only added
* misc  BIND 9.7 compability
2011-03-12 16:46:05 +00:00
drochner
8453b39053 add some clarification about the difference between OpenSSL and GnuTLS,
and guidance for users of the latter
2011-03-11 21:00:06 +00:00
adam
35f76384c9 Changes 1.2.0:
* New functions to allow the creation of X.509 certificates.
* Interface changes relative to the 1.1.0 release:
  ksba_certreq_set_serial          NEW
  ksba_certreq_set_issuer          NEW
  ksba_certreq_set_validity        NEW
  ksba_certreq_set_siginfo         NEW
2011-03-11 07:22:05 +00:00
adam
52c0bdfed6 Fix building on Mac OS X; added LICENCE 2011-03-11 07:20:45 +00:00
drochner
e91c6066f8 update to 0.53.1
changes:
-misc fixes and improvements
-build against system libtommath/crypt
2011-03-10 10:20:16 +00:00
drochner
17f4165529 build shared lib, bump PKGREV 2011-03-10 09:52:24 +00:00
drochner
4d3e3d06e8 fix installed pkgconfig .pc file: Don't refer to zlib.pc -- this
fails with system libz. We propagate a dependency per bl3 file,
this should be sufficient.
bump PKGREV
2011-03-09 10:52:25 +00:00
adam
98fcd08aea Changes 2.10.5:
* libgnutls: Corrected verification of finished messages.
* libgnutls: Corrected signature generation and verification in the Certificate
  Verify message when in TLS 1.2.
* pkg-config gnutls.pc improvements.
* API and ABI modifications: No changes since last version.
2011-03-07 13:45:34 +00:00
adam
4770c13b25 buildlink3.mk fix 2011-03-05 11:49:12 +00:00
obache
e6dc88986e Use AC_LINK_IFELSE instead of AC_COMPILE_IFELSE for __thread,
or unwanted detect of TLS support on NetBSD-5.1.
2011-03-04 11:34:12 +00:00
adam
598f61710d Changes 1.3.0:
* GPGME does not come with an internal libassuan version anymore.
  The external libassuan 1.1.0 release or later is required.  For
  application programmers on systems that can resolve inter-library
  dependencies at runtime, this is a transparent change.
* New engine GPGME_PROTOCOL_G13 to support the new g13 tool.
* New engine GPGME_PROTOCOL_UISERVER to support UI Servers.
* New API to change the passpgrase of a key.
2011-03-03 11:39:47 +00:00
kleink
de28ab2458 Remove security/libksba04. Nothing uses this anymore, there's
security/libksba tracking stable releases, and the distfile is gone.
2011-03-01 15:40:22 +00:00
wiz
e2f84ad43f Reset maintainer for retired developers. 2011-02-28 14:52:37 +00:00
wiz
f09b8dbca6 Let's assume for now that everything that worked with python-2.6 also
works with python-2.7.
2011-02-25 09:47:18 +00:00
obache
b6dee17ddc Use --format-executable to avoid conflicts with ruby variants each other.
Bump PKGREVISION.
2011-02-25 06:35:23 +00:00