Commit graph

8342 commits

Author SHA1 Message Date
agc
e68cd12527 Update netpgpverify and libnetpgpverify to 20160616
+ bring over joerg's printflike change from the netpgpverify
version in src/crypto

+ add a test for cleartext signatures with version information
to complement the one with no version information
2016-06-15 16:45:10 +00:00
agc
26b259a92a Update netpgpverify and libnetpgpverify to 20160615:
Simplify the method of finding the end of the versioning information
in the signature - back up to the "\n" character at the end of the
signature start:

	"-----BEGIN PGP SIGNATURE-----\n"

and then find the "\n\n" character sequence to denote the start of the
signature itself. The previous version worked, but this is more efficient.
2016-06-15 03:34:15 +00:00
agc
30362ddc5d Update netpgpverify (and libnetpgpverify) to 20160614
+ handle signatures created by gpg with "--no-emit-version", don't assume
there will always be a version string.

+ add a test for above

Fixes security PR/51240.

Thanks to xnox@ubuntu.com for reporting the error
2016-06-14 18:00:59 +00:00
kamil
b1b2ddea35 Add security/py-aes 2016-06-14 07:59:09 +00:00
kamil
5c86f11853 Import pyaes-1.6.0 as security/py-aes
A pure-Python implmentation of the AES block cipher algorithm and the common
modes of operation (CBC, CFB, CTR, ECB and OFB).

Features:
 - Supports all AES key sizes
 - Supports all AES common modes
 - Pure-Python (no external dependancies)
 - BlockFeeder API allows streams to easily be encrypted and decrypted
 - Python 2.x and 3.x support (make sure you pass in bytes(), not strings for
   Python 3)
2016-06-14 07:58:40 +00:00
youri
98a3c4fbc0 mate-polkit: Disable introspection by default. 2016-06-13 23:28:36 +00:00
youri
25d5376b5a polkit: Disable introspection by default. 2016-06-13 23:06:46 +00:00
taca
e2c7a9c651 Update clamav to 0.99.2, based on patch vy Matthias Ferdinand
on pkgsrc-users.


Changes from 0.99.1 to 0.99.2 are available only with ChangeLog and it
is too many to write here.  Please refer ChangeLog file.

0.99.1
------

ClamAV 0.99.1 contains a new feature for parsing Hancom Office files
including extracting and scanning embedded objects. ClamAV 0.99.1
also contains important bug fixes. Please see ChangeLog for details.
2016-06-12 16:06:01 +00:00
wiz
5d41044c2a mprotect fixes. Bump PKGREVISION. 2016-06-11 12:59:48 +00:00
alnsn
f3643ea496 Add an option to build without openssl. Fix pkg/50936. Improve PIE build. 2016-06-10 23:15:36 +00:00
he
499fe2d466 Follow joerg's advice, use i386 as PLIST variable and revert to
just one PLIST.  Installs cleanly on NetBSD/i386 and NetBSD/amd64.
2016-06-09 08:20:43 +00:00
he
07bd9da859 Separate out files only installed on SunOS.
Make a temporary hack for non-SunOS, not yet fully verified;
this somehow needs to mirror what the package's configure.py
figures out, and expressing that properly and portably in
pkgsrc seems hard.
2016-06-09 07:20:57 +00:00
markd
fa12bf2741 Add py-kerberos, py-urllib2-kerberos, remove py-Kerberos 2016-06-09 02:20:45 +00:00
markd
4da8fee291 Add py-urllib2-kerberos 0.1.6
Kerberos over HTTP Negotiate/SPNEGO support for urllib2
2016-06-09 02:18:52 +00:00
markd
7878798f48 Add py-kerberos 1.2.4
This Python package is a high-level wrapper for Kerberos (GSSAPI)
operations.  The goal is to avoid having to build a module that
wraps the entire Kerberos.framework, and instead offer a limited
set of functions that do what is needed for client/server Kerberos
authentication based on RFC 4559.
2016-06-09 02:06:18 +00:00
wiz
86a78fce2e Bump PKGREVISION for perl-5.24. 2016-06-08 19:22:13 +00:00
wiz
57199de455 Switch to MASTER_SITES_PYPI. 2016-06-08 17:43:20 +00:00
jperkin
36e6903fd8 Remove the stability entity, it has no meaning outside of an official context. 2016-06-08 10:16:50 +00:00
jperkin
13a8dd759b Change the service_bundle name to "export" to reduce diffs between the
original manifest.xml file and the output from "svccfg export".
2016-06-08 10:02:24 +00:00
jperkin
a377258fbc Add or fix manpath entries to use the correct path. 2016-06-08 09:58:04 +00:00
jperkin
31ffe7cbb6 Change the service_bundle name to "export" to reduce diffs between the
original manifest.xml file and the output from "svccfg export".
2016-06-08 09:46:01 +00:00
he
2121e37c2f Update OpenDNSSEC to version 1.4.10.
News:

  This release fix targets stability issues which have had a history
  and had been hard to reproduce.  Stability should be improved,
  running OpenDNSSEC as a long term service.

  Changes in TTL in the input zone that seem not to be propagated,
  notifies to slaves under load that where not handled properly and
  could lead to assertions.  NSEC3PARAM that would appear duplicate
  in the resulting zone, and crashes in the signer daemon in seldom
  race conditions or re-opening due to a HSM reset.

  No migration steps needed when upgrading from OpenDNSSEC 1.4.9.

  Also have a look at our OpenDNSSEC 2.0 beta release, its impending
  release will help us forward with new development and signal phasing
  out historic releases.

Fixes:

 * SUPPORT-156 OPENDNSSEC-771: Multiple NSEC3PARAM records in signed
   zone.  After a resalt the signer would fail to remove the old
   NSEC3PARAM RR until a manual resign or incoming transfer.  Old
   NSEC3PARAMS are removed when inserting a new record, even if
   they look the same.

 * OPENDNSSEC-725: Signer did not properly handle new update while
   still distributing notifies to slaves.  An AXFR disconnect looked
   not to be handled gracefully.

 * SUPPORT-171: Signer would sometimes hit an assertion using DNS
   output adapter when .ixfr was missing or corrupt but .backup file
   available.  Above two issues also in part addresses problems
   with seemingly corrected backup files (SOA serial).  Also an
   crash on badly configured DNS output adapters is averted.

 * The signer daemon will now refuse to start when failed to open
   a listen socket for DNS handling.

 * OPENDNSSEC-478 OPENDNSSEC-750 OPENDNSSEC-581 OPENDNSSEC-582
   SUPPORT-88: Segmentation fault in signer daemon when opening and
   closing hsm multiple times.  Also addresses other concurrency
   access by avoiding a common context to the HSM (a.k.a. NULL
   context).

 * OPENDNSSEC-798: Improper use of key handles across hsm reopen,
   causing keys not to be available after a re-open.

 * SUPPORT-186: IXFR disregards TTL changes, when only TTL of an
   RR is changed.  TTL changes should be treated like any other
   changes to records.  When OpenDNSSEC now overrides a TTL value,
   this is now reported in the log files.
2016-06-08 08:35:10 +00:00
he
a61613614e Try to reconcile PLIST with what's installed, taking care to preserve
the PLIST.x86* entries.  The sse2 entries are however gone, but a few
new ones have appeared (md4_x86_32.h etc.)  Installs cleanly now on
NetBSD/i386 6.1.5.
2016-06-08 08:19:52 +00:00
pgoyette
7a2efab269 bin/freshclam also needs paxctl +m
Bump revision
2016-06-06 22:49:36 +00:00
wiz
a48f20dadc Updated py-oauthlib to 1.1.2.
1.1.2 (2016-06-01)
------------------
* (Fix) Query strings should be able to include colons.
* (Fix) Cast body to a string to ensure that we can perform a regex substitution on it.
2016-06-06 12:03:26 +00:00
wiz
5cd3c99ffd Updated py-cryptography to 1.4.
1.4 - 2016-06-04
~~~~~~~~~~~~~~~~

* Support for OpenSSL 0.9.8 has been removed. Users on older versions of
  OpenSSL will need to upgrade.
* Added :class:`~cryptography.hazmat.primitives.kdf.kbkdf.KBKDFHMAC`.
* Added support for ``OpenSSH`` public key serialization.
* Added support for SHA-2 in RSA
  :class:`~cryptography.hazmat.primitives.asymmetric.padding.OAEP` when using
  OpenSSL 1.0.2 or greater.
* Added "one shot"
  :meth:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey.sign`
  and
  :meth:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey.verify`
  methods to RSA keys.
2016-06-06 11:58:09 +00:00
taca
4c2193a4c4 Add fix for CVE-2015-8325 from upstream.
Bump PKGREVISION.
2016-06-06 08:55:35 +00:00
alnsn
ce67af7320 Update to luasec-0.6. Switch to MASTER_SITE_GITHUB.
Notable changes between 0.5 and 0.6:

Options from OpenSSL 1.0.2f
Use "any" protocol, but SSL.
Merge pull request #20 from Zash/zash/checkissued
    Method for checking if one certificate issued another
Merge pull request #68 from ignacio/master
    Enables building with LuaRocks and MS compilers
Enables building with LuaRocks and MS compilers
Merge pull request #56 from gleydsonsoares/Makefile-tweaks
    Makefile tweaks
Keep 'sslv23' for compability, but deprected. (it will be removed in the next version)
Merge pull request #62 from gleydsonsoares/update_protocol_samples
    add TLS_method / rename "sslv23" to "any" / update protocol samples.
update protocol samples(bring "tlsv1_2" to clients and "any" to servers)
for consistency and readability, rename "sslv23" to "any" since that it is related to {TLS, SSLv23}methods that handles all supported protocols.
add TLS_method(). for now, keep SSLv23_method() for compatibility.
Update samples (using 'tlsv1').
Merge pull request #55 from gleydsonsoares/ifndef-OPENSSL_NO_SSL3
    guard SSLv3_method() with #ifndef OPENSSL_NO_SSL3
Add lsec_testcontext().
bump MACOSX_VERSION
fix typo; s,intall,install,
guard SSLv3_method() with #ifndef OPENSSL_NO_SSL3
Set flags to compile with internal inet_ntop() by default.
Tag "alpha" explicit.
MinGW progress.
Merge pull request #53 from hishamhm/master
Reuse tag in the LuaSec upstream repository.
Merge pull request #26 from Tieske/master
    Update rockspec to fix Windows build
Alternative implementation to inet_ntop() for old versions of Windows.
Do not hardcode ar
added batch files to generate sample certs on Windows
Perform all validation before allocating structures
Validate signatures too.
    API changes to root:issued([intermediate]*, cert)
Fix inet_ntop() on Windows.
Merge branch 'master' of https://github.com/brunoos/luasec
Merge branch 'moteus_rock'
added bindir to lib section, as mingw links against dll's to be found in bindir
updated defines in rockspec
Merge branch 'master' of github.com:Tieske/luasec into moteus_rock
use winsock 2
Don't set globals from C.
Fix unpack().
Stop using module().
Change to luaL_newlib().
Remove luaL_optint() and luaL_checkint().
BSD headers.
Merge pull request #21 from Zash/zash/iPAddress-fix
    iPAddress encoding
Stop if we don't have a string.
Changed for strict compiles.
Fix for LibreSSL/OPENSSL_NO_COMP
Problem on Win64, since double does not represent SOCKET_INVALID exactly.
- Add a parameter to server:sni(), so that we can accept an unknown name, using the initial context.
- Add the method :getsniname() to retrieve the SNI hostname used.
Updated (and renamed) rockspec Windows
Encode iPAddress fields in human readable form
Don't try to encode IP addresses as UTF-8
Return early if ASN1 string is invalid
Push nil if unable to encode ASN1 string as UTF-8
Return human readable error message from cert:issued()
SNI support.
SNI support.
Merge pull request #17 from Zash/zash/checkkey
    Verify that certificate and key belong together
Merge pull request #19 from Zash/zash/pubkey
    Zash/pubkey
Add cert:pubkey() to methods registry
Add cert:issued(leafcert) for checking chains
Check if private key matches cert only if both key and cert are set
Check that certificate matches private key
Add method for extracting public key, type and size from x509 objects
2016-06-04 21:48:11 +00:00
jym
918d2f284e Update to 5.32. Changelog:
Version 5.32, 2016.05.03, urgency: HIGH
* Security bugfixes
  - OpenSSL DLLs updated to version 1.0.2h.
    https://www.openssl.org/news/secadv_20160503.txt
* New features
  - New "socket = a:IPV6_V6ONLY=yes" option to only bind IPv6.
  - Memory leak detection.
  - Improved compatibility with the current OpenSSL 1.1.0-dev tree.
  - Added/fixed Red Hat scripts (thx to Andrew Colin Kissa).
* Bugfixes
  - Workaround for a WinCE sockets quirk (thx to Richard Kraemer).
  - Fixed data alignment on 64-bit MSVC (thx to Yuris W. Auzins).
2016-06-03 23:12:06 +00:00
bsiegert
5a25d08d74 Update pgpdump to 0.31.
0.31 2016/05/09

* Fixing a buffer overrun.

0.30 2016/04/13

* Security fix: https://github.com/kazu-yamamoto/pgpdump/pull/16
2016-06-03 20:20:08 +00:00
fhajny
e5fe8c4892 Avoid dependency on /usr/ucb on SunOS, fixes install on at least
SmartOS. Sort PLIST with LANG=C.
2016-06-03 11:52:42 +00:00
fhajny
1b00af5bcf Update security/py-certbot to 0.8.0.
Changes in 0.8.0

- The main new feature in this release is the register subcommand
  which can be used to register an account with the Let's Encrypt
  CA. Additionally, you can run certbot register
  --update-registration to change the e-mail address associated
  with your registration.

Full commit log since 0.7.0:

  https://github.com/certbot/certbot/compare/v0.7.0...v0.8.0

Changes in 0.7.0:
- --must-staple to request certificates from Let's Encrypt with the
  OCSP must staple extension
- automatic configuration of OSCP stapling for Apache
- requesting certificates for domains found in the common name
  of a custom CSR
- a number of bug fixes

Full commit log since 0.6.0

  https://github.com/certbot/certbot/compare/v0.6.0...v0.7.0
2016-06-03 11:30:14 +00:00
agc
3bec3c2cc4 Update netpgpverify to 20160313
+ minor cosmetic change to bn.h to also define BN_mod_sub, missed in
  previous
2016-06-03 00:11:10 +00:00
jperkin
6ba2b9485f Explicitly disable extended glob(3C) support on SunOS, despite it
being available on newer illumos, as it simplifies PLIST.glob.
2016-06-02 16:01:12 +00:00
jperkin
587a26dc1b Make perl a runtime dependency, it is used by c_rehash. Reported by
Jorge Schrauwen in joyent/pkgsrc#354.

Bump PKGREVISION.
2016-06-02 07:47:46 +00:00
joerg
d018e83e15 Tell configure where to look for Botan. 2016-06-01 13:41:14 +00:00
wiz
5690dde468 Fix MASTER_SITES. 2016-06-01 12:30:45 +00:00
joerg
696c5539a0 Use library pattern on the BSDs as well. 2016-05-31 21:37:12 +00:00
joerg
a429c5375e Deal with lack of TR1 support in libc++ by using the C++11 directly
then.
2016-05-31 21:36:17 +00:00
pgoyette
3d61f3a41a Seems that clamd needs to disable mprotect. Bump pkg revision. 2016-05-30 12:25:36 +00:00
khorben
15ac7eeb4a Update security/py-yara to version 3.4.0
The changes include:

 * Short-circuit evaluation for conditions
 * New yr_rules_save_stream/yr_rules_load_stream APIs.
 * load() and save() methods in yara-python accept file-like objects
 * Improvements to the PE and ELF modules
 * Some performance improvements
 * New command-line option --print-module-data
 * Multiple bug fixes.
2016-05-26 14:44:17 +00:00
khorben
0b0fadad04 Update security/yara to version 3.4.0
The changes include:

 * Short-circuit evaluation for conditions
 * New yr_rules_save_stream/yr_rules_load_stream APIs.
 * load() and save() methods in yara-python accept file-like objects
 * Improvements to the PE and ELF modules
 * Some performance improvements
 * New command-line option --print-module-data
 * Multiple bug fixes.
2016-05-26 14:41:48 +00:00
wiz
51af7871d8 Switch to ImageMagick6 to fix build. Bump PKGREVISION. 2016-05-26 11:44:00 +00:00
markd
4aa792d218 Add kf5 packages 2016-05-26 09:13:16 +00:00
markd
dad1a6d229 Add KDE Frameworks 5.21.0 packages:
kauth - Abstraction to system policy and authentication features
kdesu - Integration with su for elevated privileges
kwallet - Secure and unified container for user passwords
2016-05-26 09:09:24 +00:00
markd
928dd00097 Add gpgmepp 2016-05-26 06:39:50 +00:00
markd
e7119ee591 Add gpgmepp 15.12.2
GpgME++ is a C++ wrapper (or C++ bindings) for the GnuPG project's
gpgme (GnuPG Made Easy) library, version 0.4.4 and later.

It is fairly complete, with some minor things still missing (in
particular, the key edit interface). It is mostly tested using
external event loops, for which its design is optimised.
2016-05-26 06:39:11 +00:00
markd
554fc51896 Add polkit-qt5 2016-05-26 06:23:36 +00:00
markd
f1c203a195 Add polkit-qt5 0.112.0
Polkit-Qt is a library that lets developers use the Polkit API through a
nice Qt-styled API. It is mainly a wrapper around QAction and
QAbstractButton that lets you integrate those two component easily with
Polkit.

This package provides Qt5 libraries.
2016-05-26 06:22:54 +00:00
fhajny
586c5082ba Enable hitch 2016-05-25 20:19:45 +00:00
fhajny
66e75d67d3 Import hitch-1.2.0 as security/hitch (based on wip/hitch).
Hitch is a libev-based high performance SSL/TLS proxy by Varnish
Software.
2016-05-25 20:15:34 +00:00
fhajny
b1794d130d Enable py-certbot and py-acme 2016-05-25 18:19:30 +00:00
fhajny
9b1019e53d Import certbot 0.6.0 as security/py-certbot.
Certbot, previously the Let's Encrypt Client, is EFF's tool to
obtain certs from Let's Encrypt, and (optionally) autoenable HTTPS
on your server. It can also act as a client for any other CA that
uses the ACME protocol.
2016-05-25 18:18:16 +00:00
kre
326bb93eb4 Update MASTER_SITES to match current layout at the master site.
OK wiz@
2016-05-23 06:52:54 +00:00
youri
59c10a0e93 + mate-polkit 2016-05-21 21:51:42 +00:00
leot
d6dd9563fd Remove commented lang/spidermonkey/bl3 line.
Actually polkit needs spidermokey17 (but also supports the - older -
spidermonkey185, but not spidermonkey-1.8.0rc1).
2016-05-21 19:27:47 +00:00
youri
2c6130f986 Import mate-polkit-1.14.0 as security/mate-polkit.
PolicyKit-mate provides an Authentication Agent for PolicyKit that
integrates well with the MATE desktop environment

See http://www.freedesktop.org/wiki/Software/PolicyKit for lots of
documentation, mailing lists, etc. about PolicyKit.

See also the file HACKING for notes of interest to developers working
on PolicyKit-mate.

Report bugs against PolicyKit-mate at github

 https://github.com/mate-desktop/mate-polkit/issues

MATE polkit is a fork of GNOME polkit.
2016-05-21 19:12:27 +00:00
richard
94971f4752 post-extract chmod no longer necessary 2016-05-21 05:38:40 +00:00
youri
08e09390ac Update include for pkgsrc. 2016-05-20 18:46:10 +00:00
youri
7d00789b8c + polkit 2016-05-20 18:40:17 +00:00
youri
2dd17306a2 Import polkit-0.113nb1 as security/polkit.
PolicyKit is a toolkit for defining and handling authorizations.  It
is used for allowing unprivileged processes to speak to privileged
processes.
2016-05-20 18:39:33 +00:00
joerg
4d84444490 Bump revisions for Botan update. 2016-05-19 22:12:09 +00:00
joerg
8df8d78b0b Update Botan to 1.10.12, the latest pre-C++11 version.
Includes various security fixes.
2016-05-19 22:10:24 +00:00
joerg
79c4f01de5 Update to Botan 1.11.29:
- CVE-2016-2849: side channel attack against DSA and ECDSA
- CVE-2016-2850: failure to enforce TLS policies could lead to weaker
  algorithms being choosen
- CVE-2016-2195: heap overflow in ECC point decoding
- CVE-2016-2196: heap overflow in P-521 reduction
- CVE-2016-2194: DOS against the modular reduction
- CVE-2015-7824: padding oracle attack against TLS CBC
- CVE-2015-7825: DOS due to certificate chains
- CVE-2015-7826: wildcard certifications verification failures
- CVE-2015-7827: protection against PKCS#1 side channel issues
- CVE-2015-5726: potential DOS with invalid zero-length BER
- CVE-2015-5727: unbound memory use with BER
- deprecation or removal of various insecure crypto primitives
- TLS heartbeat removed
- various other bugfixes and improvements.
2016-05-19 21:58:43 +00:00
alnsn
a50b999605 Pass CFLAGS and LDFLAGS to imake. Fixes MKPIE build. 2016-05-18 21:16:25 +00:00
he
62a5a4ce68 Undo previous, contaminated testing environment, py-cryptography isn't
needed after all.
2016-05-18 12:43:00 +00:00
he
50f7bbee01 Add missing dependency on py-cryptography. Without this, usage fails
with "ImportError: No module named cryptography.hazmat.backends" from
paramiko/transport.py.
2016-05-18 12:01:53 +00:00
fhajny
9a7d622e2e Use REAL_ROOT_USER/REAL_ROOT_GROUP instead of ROOT_USER/ROOT_GROUP
for all pkgsrc dir/file ownership rules. Fixes unprivileged
user/group names from leaking into binary packages, manifest as
non-fatal chown/chgrp failure messages at pkg_add time.

Bump respective packages' PKGREVISION.
2016-05-17 10:32:06 +00:00
ryoon
cc2e0435ac Fix netbsd-6 build
Patch from nonaka@, thank you.
2016-05-15 07:39:12 +00:00
ryoon
deb6c7a1b7 Fix _gcry_sha1_transform_amd64_avx undefined reference error
under NetBSD/amd64 6 and CentOS 6.

* Explicitly disable AVX and AVX2 for GCC 4.4 and 4.5
2016-05-14 23:16:43 +00:00
wiz
2abe10bb4f Updated py-cryptography to 1.3.2.
1.3.2 - 2016-05-04
~~~~~~~~~~~~~~~~~~

* Updated Windows and OS X wheels to be compiled against OpenSSL 1.0.2h.
* Fixed an issue preventing ``cryptography`` from compiling against
  LibreSSL 2.3.x.
2016-05-12 14:08:29 +00:00
wiz
6792f55ec4 Remove non-responding mirror. 2016-05-08 22:37:23 +00:00
joerg
5e119fca76 Requires PCRE to build. 2016-05-07 10:09:07 +00:00
wen
c411988224 Update to 0.06
Upstream changes:
0.06    2015/02/06
        - fix for #77911 Patch to add more functions
        - new constructors: new, rand, pseudo_rand, rand_range
        - new methods: ucmp, num_bits, num_bytes, rshift, lshift, swap
        - improved pod documentation (added missing functions)
        - XS code cleanup

0.05    2015/02/04
        - fix for #84369 Win32 compatibility patch
        - fix for #100993 Memory not reclaimed when CTX object goes out of scope
        - fix for #86561 typo fixes
        - fix for #82959 Error in synopsis: Crypt::OpenSSL::Bignum->new_from_hex("0x3e8") returns "0"
        - fix for #81537 to_bin method returns garbage when value is zero
2016-05-07 05:11:05 +00:00
jaapb
d6a48a8b82 Updated package to newest version, 1.10. Changes include:
- Add all SHA-2 hash functions: SHA-224, SHA-384 and SHA-512
  in addition to the existing SHA-256.  (Closes: #1223)
- Add support for CTR (Counter) chaining mode.
- Fix compilation error with OCaml 4.03+dev.
- Avoid using some obsolete OCaml stdlib functions.
2016-05-06 14:14:28 +00:00
fhajny
8fc88c5094 Enable security/vault 2016-05-06 13:41:40 +00:00
fhajny
3cec925f9f Import vault-0.5.2 as security/vault.
Vault is a tool for securely accessing secrets. A secret is
anything that you want to tightly control access to, such as API
keys, passwords, certificates, and more. Vault provides a unified
interface to any secret, while providing tight access control and
recording a detailed audit log.
2016-05-06 13:35:52 +00:00
tron
6ce7c76568 Don't attempt to build "keyanalyze" and friends. We don't install those
programs anyway and it breaks the build under at least Mac OS X.
After this change we also don't need various "auto*" tools during
the build phase.
2016-05-05 20:07:36 +00:00
wiz
b01d5a975a Updated gnupg21 to 2.1.12.
Noteworthy changes in version 2.1.12 (2016-05-04)
-------------------------------------------------

 * gpg: New --edit-key sub-command "change-usage" for testing
   purposes.

 * gpg: Out of order key-signatures are now systematically detected
   and fixed by --edit-key.

 * gpg: Improved detection of non-armored messages.

 * gpg: Removed the extra prompt needed to create Curve25519 keys.

 * gpg: Improved user ID selection for --quick-sign-key.

 * gpg: Use the root CAs provided by the system with --fetch-key.

 * gpg: Add support for the experimental Web Key Directory key
   location service.

 * gpg: Improve formatting of Tofu messages and emit new Tofu specific
   status lines.

 * gpgsm: Add option --pinentry-mode to support a loopback pinentry.

 * gpgsm: A new pubring.kbx is now created with the header blob so
   that gpg can detect that the keybox format needs to be used.

 * agent: Add read support for the new private key protection format
   openpgp-s2k-ocb-aes.

 * agent: Add read support for the new extended private key format.

 * agent: Default to --allow-loopback-pinentry and add option
   --no-allow-loopback-pinentry.

 * scd: Changed to use the new libusb 1.0 API for the internal CCID
   driver.

 * dirmngr: The dirmngr-client does now auto-detect the PEM format.

 * g13: Add experimental support for dm-crypt.

 * w32: Tofu support is now available with the Speedo build method.

 * w32: Removed the need for libiconv.dll.

 * The man pages for gpg and gpgv are now installed under the correct
   name (gpg2 or gpg - depending on a configure option).

 * Lots of internal cleanups and bug fixes.
2016-05-05 12:09:31 +00:00
jaapb
9718550454 Recursive revbump associated with ocaml update. 2016-05-05 11:45:36 +00:00
wiz
217897c135 Updated py35-oauthlib to 1.1.1.
1.1.1 (2016-05-01)

    (Enhancement) Better sanitisation of Request objects __repr__.
2016-05-05 11:43:06 +00:00
wiz
f25810746b Updated libgpg-error to 1.22.
Noteworthy changes in version 1.22 (2016-04-25) [C18/A18/R0)
-----------------------------------------------

 * New functions and macros to to provide iconv(3) on Windows.

 * Support for LeakSanitizer with the gpgrt_annotate_leaked_object
   inline function.

 * Interface changes relative to the 1.21 release:
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 GPG_ERR_DB_CORRUPTED             NEW.
 gpgrt_annotate_leaked_object     NEW inline func.
 GPGRT_ENABLE_W32_ICONV_MACROS    NEW.
 gpgrt_w32_iconv_open             NEW.
 gpgrt_w32_iconv_close            NEW.
 gpgrt_w32_iconv                  NEW.
2016-05-05 11:34:49 +00:00
wiz
6ab46800f0 Updated caff to 2.3.
No changelog found, but changes look like caff will take
over more from the users default config.
2016-05-05 11:15:57 +00:00
jperkin
f080b77840 Update security/openssl to version 1.0.2h.
Changes between 1.0.2g and 1.0.2h [3 May 2016]

*) Prevent padding oracle in AES-NI CBC MAC check

   A MITM attacker can use a padding oracle attack to decrypt traffic
   when the connection uses an AES CBC cipher and the server support
   AES-NI.

   This issue was introduced as part of the fix for Lucky 13 padding
   attack (CVE-2013-0169). The padding check was rewritten to be in
   constant time by making sure that always the same bytes are read and
   compared against either the MAC or padding bytes. But it no longer
   checked that there was enough data to have both the MAC and padding
   bytes.

   This issue was reported by Juraj Somorovsky using TLS-Attacker.
   (CVE-2016-2107)
   [Kurt Roeckx]

*) Fix EVP_EncodeUpdate overflow

   An overflow can occur in the EVP_EncodeUpdate() function which is used for
   Base64 encoding of binary data. If an attacker is able to supply very large
   amounts of input data then a length check can overflow resulting in a heap
   corruption.

   Internally to OpenSSL the EVP_EncodeUpdate() function is primarly used by
   the PEM_write_bio* family of functions. These are mainly used within the
   OpenSSL command line applications, so any application which processes data
   from an untrusted source and outputs it as a PEM file should be considered
   vulnerable to this issue. User applications that call these APIs directly
   with large amounts of untrusted data may also be vulnerable.

   This issue was reported by Guido Vranken.
   (CVE-2016-2105)
   [Matt Caswell]

*) Fix EVP_EncryptUpdate overflow

   An overflow can occur in the EVP_EncryptUpdate() function. If an attacker
   is able to supply very large amounts of input data after a previous call to
   EVP_EncryptUpdate() with a partial block then a length check can overflow
   resulting in a heap corruption. Following an analysis of all OpenSSL
   internal usage of the EVP_EncryptUpdate() function all usage is one of two
   forms. The first form is where the EVP_EncryptUpdate() call is known to be
   the first called function after an EVP_EncryptInit(), and therefore that
   specific call must be safe. The second form is where the length passed to
   EVP_EncryptUpdate() can be seen from the code to be some small value and
   therefore there is no possibility of an overflow. Since all instances are
   one of these two forms, it is believed that there can be no overflows in
   internal code due to this problem. It should be noted that
   EVP_DecryptUpdate() can call EVP_EncryptUpdate() in certain code paths.
   Also EVP_CipherUpdate() is a synonym for EVP_EncryptUpdate(). All instances
   of these calls have also been analysed too and it is believed there are no
   instances in internal usage where an overflow could occur.

   This issue was reported by Guido Vranken.
   (CVE-2016-2106)
   [Matt Caswell]

*) Prevent ASN.1 BIO excessive memory allocation

   When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio()
   a short invalid encoding can casuse allocation of large amounts of memory
   potentially consuming excessive resources or exhausting memory.

   Any application parsing untrusted data through d2i BIO functions is
   affected. The memory based functions such as d2i_X509() are *not* affected.
   Since the memory based functions are used by the TLS library, TLS
   applications are not affected.

   This issue was reported by Brian Carpenter.
   (CVE-2016-2109)
   [Stephen Henson]

*) EBCDIC overread

   ASN1 Strings that are over 1024 bytes can cause an overread in applications
   using the X509_NAME_oneline() function on EBCDIC systems. This could result
   in arbitrary stack data being returned in the buffer.

   This issue was reported by Guido Vranken.
   (CVE-2016-2176)
   [Matt Caswell]

*) Modify behavior of ALPN to invoke callback after SNI/servername
   callback, such that updates to the SSL_CTX affect ALPN.
   [Todd Short]

*) Remove LOW from the DEFAULT cipher list.  This removes singles DES from the
   default.
   [Kurt Roeckx]

*) Only remove the SSLv2 methods with the no-ssl2-method option. When the
   methods are enabled and ssl2 is disabled the methods return NULL.
   [Kurt Roeckx]
2016-05-03 14:51:16 +00:00
prlw1
104960e18b revbump for libsoup's ABI issue 2016-05-03 11:40:00 +00:00
wiz
f269daa22a Reset maintainer (observer now). 2016-05-03 10:54:52 +00:00
agc
b25a1e3218 Add codecrypt, version 1.7.5 to the Packages Collection.
codecrypt is a program like gnupg (or netpgp) that uses only
quantum-computer-resistant algorithms

	This is a GnuPG-like unix program for encryption and signing that uses
	only quantum-computer-resistant algorithms:

	+ McEliece cryptosystem (compact QC-MDPC variant) for encryption
	+ Hash-based Merkle tree algorithm (FMTSeq variant) for digital
	signatures

	Stream ciphers used:  ChaCha20, XSynd stream cipher, RC4 (for initial
	simplicity of implementation)

	CRHFs used:
	+ Cubehash variants were selected for implementation ease, really
	clean design, quite good speed and flexibility of parameter choices.
	KeyID's are CUBE256 hashes of serialized public key.
	+ ripemd128 for small hashes
	+ tiger192 is used as an alternative for Cubehash for 192bit hashes
	+ There's always a variant with SHA-256, SHA-384 or SHA-512.

	Signature algorithms:
	+ FMTSeq with many possibilities and combinations of aforementioned CRHFs

	Encryption:
	MDPC McEliece on quasi-cyclic matrices - decoding is (slightly)
	vulnerable to timing attacks.
2016-04-30 19:27:43 +00:00
fhajny
10d343a747 Update security/erlang-fast_tls to 1.0.3.
Version 1.0.3
- Do not call internal erlang erl_exit function (Christophe Romain)

Version 1.0.2
- Add support for cafile option (Evgeny Khramtsov)
- Better error checks (Michael Santos)
2016-04-29 18:14:24 +00:00
fhajny
7624d3776f Enable/disable updated/removed Erlang packages. 2016-04-25 20:39:15 +00:00
fhajny
ebb587fa9c Remove superseded ejabberd dependencies (Erlang modules). 2016-04-25 20:37:16 +00:00
fhajny
e51fba46e4 Import p1_oauth2-0.6.1 as security/erlang-p1_oauth2.
This library is designed to simplify the implementation of the
server side of OAuth2. It provides no support for developing
clients.
2016-04-25 14:30:45 +00:00
fhajny
69b5af400a Import fast_tls-1.0.1 as security/erlang-fast_tls.
Fast TLS is a native TLS / SSL driver for Erlang / Elixir. It is
based on OpenSSL, a proven and efficient TLS implementation. It
is designed for efficiency, speed and compliance.
2016-04-25 14:28:42 +00:00
wiz
2309572dea Updated p5-IO-Socket-SSL to 2.027.
2.027 2016/04/20
- only added Changes for 2.026
2.026 2016/04/20
- update default server and client ciphers based on recommendation of
  Mozilla and what the current browsers use. Notably this finally disables
  RC4 for the client (was disabled for server long ago) and adds CHACHA20.
2016-04-24 06:30:22 +00:00
jperkin
e8dba3b83a Use --disable-pclmul-support on Linux and SunOS i386, the inline assembly
does not compile on either.
2016-04-22 08:28:46 +00:00
jperkin
f359ef2dec Fix MANDIR handling. 2016-04-21 10:44:40 +00:00
leot
80f1cf36fa Update security/py-OpenSSL to 16.0.0.
Changes:
16.0.0 (2016-03-19)
-------------------
This is the first release under full stewardship of PyCA.
We have made *many* changes to make local development more pleasing.
The test suite now passes both on Linux and OS X with OpenSSL 0.9.8,
1.0.1, and 1.0.2.  It has been moved to `py.test <https://pytest.org/>`_,
all CI test runs are part of `tox <https://testrun.org/tox/>`_ and
the source code has been made fully `flake8
<https://flake8.readthedocs.org/>`_ compliant.

We hope to have lowered the barrier for contributions significantly
but are open to hear about any remaining frustrations.

Backward-incompatible changes:
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
- Python 3.2 support has been dropped.
  It never had significant real world usage and has been dropped
  by our main dependency ``cryptography``.  Affected users should
  upgrade to Python 3.3 or later.

Deprecations:
^^^^^^^^^^^^^
- The support for EGD has been removed.
  The only affected function ``OpenSSL.rand.egd()`` now uses
  ``os.urandom()`` to seed the internal PRNG instead.  Please see
  `pyca/cryptography#1636
  <https://github.com/pyca/cryptography/pull/1636>`_ for more
  background information on this decision.  In accordance with our
  backward compatibility policy ``OpenSSL.rand.egd()`` will be
  *removed* no sooner than a year from the release of 16.0.0.
  Please note that you should `use urandom
  <http://sockpuppet.org/blog/2014/02/25/safely-generate-random-numbers/>`_
  for all your secure random number needs.
- Python 2.6 support has been deprecated.
  Our main dependency ``cryptography`` deprecated 2.6 in version
  0.9 (2015-05-14) with no time table for actually dropping it.
  pyOpenSSL will drop Python 2.6 support once ``cryptography``
  does.

Changes:
^^^^^^^^
- Fixed ``OpenSSL.SSL.Context.set_session_id``,
  ``OpenSSL.SSL.Connection.renegotiate``,
  ``OpenSSL.SSL.Connection.renegotiate_pending``, and
  ``OpenSSL.SSL.Context.load_client_ca``.
  They were lacking an implementation since 0.14.  `#422
  <https://github.com/pyca/pyopenssl/pull/422>`_
- Fixed segmentation fault when using keys larger than 4096-bit to sign data.
  `#428 <https://github.com/pyca/pyopenssl/pull/428>`_
- Fixed ``AttributeError`` when ``OpenSSL.SSL.Connection.get_app_data()``
  was called before setting any app data.
  `#304 <https://github.com/pyca/pyopenssl/pull/304>`_
- Added ``OpenSSL.crypto.dump_publickey()`` to dump ``OpenSSL.crypto.PKey``
  objects that represent public keys, and ``OpenSSL.crypto.load_publickey()``
  to load such objects from serialized representations.
  `#382 <https://github.com/pyca/pyopenssl/pull/382>`_
- Added ``OpenSSL.crypto.dump_crl()`` to dump a certificate revocation
  list out to a string buffer.
  `#368 <https://github.com/pyca/pyopenssl/pull/368>`_
- Added ``OpenSSL.SSL.Connection.get_state_string()`` using the
  OpenSSL binding ``state_string_long``.
  `#358 <https://github.com/pyca/pyopenssl/pull/358>`_
- Added support for the ``socket.MSG_PEEK`` flag to
  ``OpenSSL.SSL.Connection.recv()`` and
  ``OpenSSL.SSL.Connection.recv_into()``.
  `#294 <https://github.com/pyca/pyopenssl/pull/294>`_
- Added ``OpenSSL.SSL.Connection.get_protocol_version()`` and
  ``OpenSSL.SSL.Connection.get_protocol_version_name()``.
  `#244 <https://github.com/pyca/pyopenssl/pull/244>`_
- Switched to ``utf8string`` mask by default.
  OpenSSL formerly defaulted to a ``T61String`` if there were UTF-8
  characters present.  This was changed to default to ``UTF8String``
  in the config around 2005, but the actual code didn't change it
  until late last year.  This will default us to the setting that
  actually works.  To revert this you can call
  ``OpenSSL.crypto._lib.ASN1_STRING_set_default_mask_asc(b"default")``.
  `#234 <https://github.com/pyca/pyopenssl/pull/234>`_
2016-04-20 16:05:57 +00:00
leot
a2600d7825 Fix security/dsniff* build on NetBSD-current due recent route(4) change
(due the deprecation of RTF_LLINFO).

Bump PKGREVISION.

Reviewed by <ozaki-r>.
2016-04-18 08:34:35 +00:00
wiz
bb1fab099c Update libgcrypt to 1.7.0.
Noteworthy changes in version 1.7.0 (2016-04-15)  [C21/A1/R0]
------------------------------------------------

 * New algorithms and modes:

   - SHA3-224, SHA3-256, SHA3-384, SHA3-512, and MD2 hash algorithms.

   - SHAKE128 and SHAKE256 extendable-output hash algorithms.

   - ChaCha20 stream cipher.

   - Poly1305 message authentication algorithm

   - ChaCha20-Poly1305 Authenticated Encryption with Associated Data
     mode.

   - OCB mode.

   - HMAC-MD2 for use by legacy applications.

 * New curves for ECC:

   - Curve25519.

   - sec256k1.

   - GOST R 34.10-2001 and GOST R 34.10-2012.

 * Performance:

   - Improved performance of KDF functions.

   - Assembler optimized implementations of Blowfish and Serpent on
     ARM.

   - Assembler optimized implementation of 3DES on x86.

   - Improved AES using the SSSE3 based vector permutation method by
     Mike Hamburg.

   - AVX/BMI is used for SHA-1 and SHA-256 on x86.  This is for SHA-1
     about 20% faster than SSSE3 and more than 100% faster than the
     generic C implementation.

   - 40% speedup for SHA-512 and 72% for SHA-1 on ARM Cortex-A8.

   - 60-90% speedup for Whirlpool on x86.

   - 300% speedup for RIPE MD-160.

   - Up to 11 times speedup for CRC functions on x86.

 * Other features:

   - Improved ECDSA and FIPS 186-4 compliance.

   - Support for Montgomery curves.

   - gcry_cipher_set_sbox to tweak S-boxes of the gost28147 cipher
     algorithm.

   - gcry_mpi_ec_sub to subtract two points on a curve.

   - gcry_mpi_ec_decode_point to decode an MPI into a point object.

   - Emulation for broken Whirlpool code prior to 1.6.0.  [from 1.6.1]

   - Flag "pkcs1-raw" to enable PCKS#1 padding with a user supplied
     hash part.

   - Parameter "saltlen" to set a non-default salt length for RSA PSS.

   - A SP800-90A conforming DRNG replaces the former X9.31 alternative
     random number generator.

   - Map deprecated RSA algo number to the RSA algo number for better
     backward compatibility. [from 1.6.2]

   - Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
     See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
     [from 1.6.3]

   - Fixed data-dependent timing variations in modular exponentiation
     [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
      are Practical]. [from 1.6.3]

   - Flag "no-keytest" for ECC key generation.  Due to a bug in
     the parser that flag will also be accepted but ignored by older
     version of Libgcrypt. [from 1.6.4]

   - Speed up the random number generator by requiring less extra
     seeding. [from 1.6.4]

   - Always verify a created RSA signature to avoid private key leaks
     due to hardware failures. [from 1.6.4]

   - Mitigate side-channel attack on ECDH with Weierstrass curves
     [CVE-2015-7511].  See http://www.cs.tau.ac.IL/~tromer/ecdh/ for
     details. [from 1.6.5]

 * Internal changes:

   - Moved locking out to libgpg-error.

   - Support of the SYSROOT envvar in the build system.

   - Refactor some code.

   - The availability of a 64 bit integer type is now mandatory.

 * Bug fixes:

   - Fixed message digest lookup by OID (regression in 1.6.0).

   - Fixed a build problem on NetBSD

   - Fixed memory leaks in ECC code.

   - Fixed some asm build problems and feature detection bugs.

 * Interface changes relative to the 1.6.0 release:
   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   gcry_cipher_final               NEW macro.
   GCRY_CIPHER_MODE_CFB8           NEW constant.
   GCRY_CIPHER_MODE_OCB            NEW.
   GCRY_CIPHER_MODE_POLY1305       NEW.
   gcry_cipher_set_sbox            NEW macro.
   gcry_mac_get_algo               NEW.
   GCRY_MAC_HMAC_MD2               NEW.
   GCRY_MAC_HMAC_SHA3_224          NEW.
   GCRY_MAC_HMAC_SHA3_256          NEW.
   GCRY_MAC_HMAC_SHA3_384          NEW.
   GCRY_MAC_HMAC_SHA3_512          NEW.
   GCRY_MAC_POLY1305               NEW.
   GCRY_MAC_POLY1305_AES           NEW.
   GCRY_MAC_POLY1305_CAMELLIA      NEW.
   GCRY_MAC_POLY1305_SEED          NEW.
   GCRY_MAC_POLY1305_SERPENT       NEW.
   GCRY_MAC_POLY1305_TWOFISH       NEW.
   gcry_md_extract                 NEW.
   GCRY_MD_FLAG_BUGEMU1            NEW [from 1.6.1].
   GCRY_MD_GOSTR3411_CP            NEW.
   GCRY_MD_SHA3_224                NEW.
   GCRY_MD_SHA3_256                NEW.
   GCRY_MD_SHA3_384                NEW.
   GCRY_MD_SHA3_512                NEW.
   GCRY_MD_SHAKE128                NEW.
   GCRY_MD_SHAKE256                NEW.
   gcry_mpi_ec_decode_point        NEW.
   gcry_mpi_ec_sub                 NEW.
   GCRY_PK_EDDSA                   NEW constant.
   GCRYCTL_GET_TAGLEN              NEW.
   GCRYCTL_SET_SBOX                NEW.
   GCRYCTL_SET_TAGLEN              NEW.
2016-04-18 06:19:57 +00:00
kamil
31423ed178 Fix build on recent NetBSD-current
The RTM_RESOLVE symbol has been removed after the following change in
src/sys/net/route.h:
    revision 1.98
    date: 2016-04-04 09:37:07 +0200;  author: ozaki-r;  state: Exp;  lines: +8 -6;  commitid: r0chxU5ZkTdAqh1z;
    Separate nexthop caches from the routing table

Bump PKGREVISION to 1
2016-04-17 15:33:13 +00:00
wiz
a53066ad3b Update p5-Crypt-OpenPGP to 1.12.
1.12  2015-08-16 CPAN Day release
    - Add NoVersion parameter to CO::Armour->armour (GH#26)

1.11  2015-07-20
    - Check that Crypt::OpenPGP::Cipher->new succeeded, RT#14033.
    - Fix GH#7, when false data was discarded (@Camspi).

1.10  2015-07-06
    - Update GnuPG defaults (@bk2204).
    - Fix error propagation on generating RSA key (@niner).

1.09  2015-07-02
    - Require Digest::SHA instead of Digest::SHA1, RT#82316 (@bk2204).

1.08  2014-11-20
    - Move distribution to Dist::Zilla.
    - Require Alt::Crypt::RSA::BigInt instead of Crypt::RSA.
    - Apply a patch from RT#82314 (@bk2204, @kmx).
    - Add a test case from GH#7, yet to be fixed (@throughnothing).

1.07  2014-06-23
    - Reformatted Changes as per CPAN::Changes::Spec.
    - Fixed hash randomisation bug (RT#81442).
    - Documentation now references most recent "OpenPGP Message Format" RFC.
    - Fixed typo in Pod (@dsteinbrunner).
    - Improved ASCII armor detection (@gwillen).
2016-04-17 09:33:24 +00:00