Commit graph

1628 commits

Author SHA1 Message Date
jmmv
84505d5512 Honour PKG_SYSCONFDIR. Bump PKGREVISION to 2. 2003-05-01 21:32:45 +00:00
jmmv
afe3a13cdd Honour PKG_SYSCONFDIR.
Use OWN_DIRS to handle directories under /var.
Move the logcheck.sh script to where it belongs, the bin directory.
Use buildlink2.
Bump PKGREVISION to 1.
2003-05-01 20:43:41 +00:00
tron
12a7430312 "v0.1" is *not* a correct version number a for NetBSD package. Change it
to "0.1" hence. This fixes PR pkg/21295 by Todd Vierling.
2003-04-28 15:33:13 +00:00
cjep
e62f4c9922 Whitespace police 2003-04-27 20:29:17 +00:00
jmmv
92e726795a Make the PKGVULNDIR variable more generic, so one can choose where to
store the vulnerabilities file.  This variable was already recognized by
audit-packages but not by bsd.pkg.mk which hardcoded DISTDIR.
2003-04-25 20:05:18 +00:00
grant
4a5957fb05 fix last 2003-04-22 09:50:01 +00:00
grant
bed88d5529 add missing trailing / on a master site. 2003-04-22 09:48:44 +00:00
taca
5ad6718994 Update sudo package to 1.6.7.4 (1.6.7p4). This closes PR pkg/21256.
508) Fixed remaining Kerberos V issues with MIT Kerberos V and old Heimdal.
2003-04-22 02:19:12 +00:00
cjep
e8f192b175 Add RCS tag 2003-04-21 20:26:35 +00:00
manu
f22ee5f478 Upgrade to amavis-perl-0.1, which is the first non-snapshot release of
amavis-perl. Fixed milter support for amavis-perl.

NB: the package was named amavis-perl-200xxxxx, now the version is 0.1,
which is lexicographically lower. I wrote v0.1 instead of 0.1 in order
to make 0.1 newer than 200xxxxx
2003-04-17 16:17:53 +00:00
wiz
f65dbbe2f2 Remove a paragraph with the following comment:
# This hack goes away, once we formally de-support NetBSD-1.4.x.
We did that half a year ago.
2003-04-17 12:32:32 +00:00
cjep
8800721eb7 Update of security/smimemsg to 1.5.
Suggested by Robert Elz in PR#18825. Changelog unavailable.
2003-04-13 13:50:14 +00:00
cjep
a23911220d Allow this to build on NetBSD when gtar is installed by only looking for
tar. Do not pass P to tar when testing for removal of leading /'s.
This is a fix for PR#20928.

XXX On Solaris this package will be broken. It probably needs to
XXX depend on gtar in this case.
2003-04-11 22:06:22 +00:00
grant
a3778e0735 add some faster mirrors to MASTER_SITES. 2003-04-10 20:20:55 +00:00
grant
dc40bcec01 make usage of pax more consistent, use -O to bomb on broken archives
(suggested by lukem), group z, r and f flags.

some whitespace cleanup.
2003-04-10 20:10:15 +00:00
wiz
99626117c1 Update to 3.6.1p1. No NEWS file included, only a ChangeLog, and the
relevant changes are > 500 lines, see
ftp://ftp.ca.openbsd.org/pub/OpenBSD/OpenSSH/portable/ChangeLog
Personal selection:
     rekeying bugfixes and automatic rekeying
     bandwidth limitation (scp -l)
     Add a -t life option to ssh-agent that set the default lifetime.
     The default can still be overriden by using -t in ssh-add.
     sftp progress meter support.
     allow usernames with embedded '@', e.g. scp user@vhost@realhost:file /tmp;
     [scp.c]
     1) include stalling time in total time
     2) truncate filenames to 45 instead of 20 characters
     3) print rate instead of progress bar, no more stars
     4) scale output to tty width
2003-04-10 12:34:15 +00:00
grant
afdebcf9a4 make ${PAX} usage consistent:
- group 'zrw' and 'p' args, -s last
- use the && operator consistently
- strip unneeded parens
- some whitespace cleanup
2003-04-10 01:28:03 +00:00
cjep
4411f47d3d Update of security/sudo to 1.6.7p3.
Changes since 1.6.7p2:
* Kerberos V support should work on latest MIT Kerberos V and Heimdal.
2003-04-07 10:44:14 +00:00
taca
647358bbb7 Update sudo package to 1.6.7.2.
Changes since Sudo 1.6.7p1:

 o Fixed an unterminated comment that broke Kerberos V authentication.

 o The krb5-config script is now used to determine Kerberos V
   CPPFLAGS and LDFLAGS/LIBS if it exists.

 o Backed out changes to mkinstalldirs from autoconf 2.57 that
   caused problems on Tru64 Unix.
2003-04-03 15:46:45 +00:00
thorpej
2b4efbf6e4 Don't try to use asm on any version of Darwin. 2003-04-01 17:58:59 +00:00
wiz
5319633bb2 Update to 1.6.7p1 (1.6.7.1):
478) Wildcards now work correctly in the env_keep Defaults directive.
479) Added support for non-root timestamp dirs.  This allows the timestamp
     dir to be shared via NFS (though this is not recommended).
480) Removed double printing of bad environment variable table in -V mode.
481) configure script has been regenerated with autoconf 2.5.7.
     This required some changes to configure.in.
482) Fixed a compilation problem on SunOS; thanks to Alek O. Komarnitsky.
483) SecurID 5.0 API support from Michael Stroucken.
484) Restore state of signal handlers to what we had upon startup.
     Fixes a problem when using sudo with nohup; thanks to Paul Markham.
485) Revamp set_perms() to use setresuid() or setreuid() when available
     in preference to POSIX stuff since they allow us to properly
     implement "stay_setuid" whereas POSIX does not really.
486) In strict mode sudo did not throw an error for undefined User_Aliases.
487) Fixed a Makefile bug on IRIX.
488) Write the prompt *after* turning off echo to avoid some password
     characters being echoed on heavily-loaded machines with fast typists.
489) Added %U and %H escapes in the prompt and fixed treatment of %%.
490) Visudo will now add a final newline to sudoers if the user's editor
     not add one before EOF.
491) The lexer state is now reset to its initial value on EOF.
     Previously, the state was not reset between parser invocations
     which could cause problems for visudo in rare cases.
492) Added support for Defaults that apply based on the RunasUser.
493) Sudo now includes copies of strlc{at,py} and uses them throughout.
494) Sudo is now careful to avoid interger overflow when allocating
     memory.  This is one of those "should not happen" situations.
495) Added a configure option (--with-stow) to make sudo compatible
     with GNU stow.
496) auth/kerb5.c now compiles under Heimdal.
497) The volatile prefix is used in the hopes of preventing compilers
     from optimizing away memory zeroing.  Unfortunately, this results
     in some warnings from gcc.
498) Better Kerberos IV/V support in the configure script.
499) Fixed a logic thinko in the SIGCHLD handler that caused problems
     with rlogin on HP-UX.
500) configure now adds -R to LDFLAGS when it adds -L for Solaris and
     SVR4.  There is a configure option, --with-rpath, to control this.
501) On AIX, configure will pass extra directory paths to the linker
     via the -blibpath ld option.  This is only active when additional
     library paths are used.  It may be disabled via the
     --without-blibpath configure option.
502) The --with-skey and --with-opie configure options now take
     an optional directory argument that should have an include and
     lib dir for the skey/opie include file and library respectively.
503) Fixed false positives in the overflow detection of expand_prompt().
2003-04-01 16:07:21 +00:00
jmmv
0916498c1b Place WRKSRC where it belongs, to make pkglint happy; ok'ed by wiz. 2003-03-29 12:40:00 +00:00
wiz
f2c0357f0b Remove unnecessary empty lines. 2003-03-28 21:24:22 +00:00
wiz
28a4483bc7 NO_PATCH is deprecated, says pkglint. Remove it. 2003-03-28 21:14:10 +00:00
jschauma
d928b8f223 De-confusify: Let emulators/suse_*/Makefile.* _not_ include bsd.pkg.mk, but rather
make all packages that use linux emulation include bsd.pkg.mk as the
last files just like any normal package.
2003-03-26 04:05:37 +00:00
grant
6d16b9adea grammar tweak 2003-03-25 17:27:49 +00:00
grant
27ac8ca77c use RCD_SCRIPTS. 2003-03-25 15:51:50 +00:00
lukem
15fbb8b0eb both: use pidfile
sfssd: support "reload"
sfssd: call sfskey gen with "-K -l sfs_host_key" to prevent interactive Q's

bump PKGREVISION (to 2)
2003-03-25 06:45:00 +00:00
ad
39ce4f0452 Update MASTER_SITES. 2003-03-23 22:33:23 +00:00
lukem
6ef8b32307 use PKG_SYSCONFSUBDIR=sfs
use /var/sfs instead of /usr/pkg/var/sfs
use OWN_DIRS_PERMS
bump PKGREVISION
2003-03-23 14:28:31 +00:00
jmc
ada44c37a8 Correct DEPENDS line to proper format 2003-03-22 23:02:55 +00:00
jmc
bb93d6e717 Correct DEPENDS line to proper format 2003-03-22 22:09:02 +00:00
lukem
851f4d0dac remove entries which aren't installed (and I couldn't find any
reference to them in the distribution, either):
	bin/fake-agent
	bin/rpc_pcl
	bin/rpc_psrv
	bin/smkdirall
	bin/smount
	bin/snfsfstab
	bin/snfshost
	bin/snfsmount
	bin/snfspsrv
	bin/snfsumount
	bin/snfsuser
	bin/sumount
	bin/sumountall
	etc/rpc_pcl.conf
	lib/perl5/site_perl/5.6.1/SNFS.pm
	lib/perl5/site_perl/5.6.1/auto/SNFS/autosplit.ix
2003-03-22 22:07:22 +00:00
jmmv
efcc873fa4 Install an rc.d script; closes PR pkg/20841 and PR pkg/20842 by David Ferlier.
Sort the Makefile a bit.  Install a default configuration file in place.
Bump PKGREVISION to 1.
2003-03-22 11:00:16 +00:00
seb
c387ecacba * Add patch from http://www.openssl.org/news/secadv_20030317.txt:
Researchers have discovered a timing attack on RSA keys, to which
OpenSSL is generally vulnerable, unless RSA blinding has been turned
on.

Typically, it will not have been, because it is not easily possible to
do so when using OpenSSL to provide SSL or TLS.

The enclosed patch switches blinding on by default. Applications that
wish to can remove the blinding with RSA_blinding_off(), but this is
not generally advised. It is also possible to disable it completely by
defining OPENSSL_NO_FORCE_RSA_BLINDING at compile-time.

The performance impact of blinding appears to be small (a few
percent).

This problem affects many applications using OpenSSL, in particular,
almost all SSL-enabled Apaches. You should rebuild and reinstall
OpenSSL, and all affected applications.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0147 to this issue.

* Add patch from http://www.openssl.org/news/secadv_20030319.txt:

Czech cryptologists Vlastimil Klima, Ondrej Pokorny, and Tomas Rosa
have come up with an extension of the "Bleichenbacher attack" on RSA
with PKCS #1 v1.5 padding as used in SSL 3.0 and TLS 1.0.  Their
attack requires the attacker to open millions of SSL/TLS connections
to the server under attack; the server's behaviour when faced with
specially made-up RSA ciphertexts can reveal information that in
effect allows the attacker to perform a single RSA private key
operation on a ciphertext of its choice using the server's RSA key.
Note that the server's RSA key is not compromised in this attack.

* Bump PKGREVISION.
2003-03-21 18:40:48 +00:00
jlam
3180d742a7 Add and enable cy2-{login,ntlm}. 2003-03-19 22:29:30 +00:00
jlam
4ab2bc5741 Initial import of security/cy2-ntlm.
This is the Cyrus SASL plugin that implements the NTLM (MS Windows NT)
authentication mechanism.
2003-03-19 22:28:53 +00:00
jlam
cf0f11028c Initial import of security/cy2-login.
This is the Cyrus SASL plugin that implements the LOGIN authentication
mechanism.  It's recommended that it only be used if absolutely necessary
since it is not a secure authentication scheme.
2003-03-19 22:28:23 +00:00
jlam
cc05368605 Rearrange the Makefile logic so that we can easily create Cyrus SASL 2.x
plugin packages.
2003-03-19 22:25:05 +00:00
jlam
be64260afd ${SASLSOCKETDIR} is removed by the DEINSTALL script, so remove this
redundant command.
2003-03-19 22:24:21 +00:00
jlam
ee14a59286 cyrus-sasl2 libraries have no library dependencies on PAM. 2003-03-19 22:22:34 +00:00
jlam
d99c1918d2 Add and enable cy-login 2003-03-19 21:11:03 +00:00
jlam
6dc0b0eaf3 Initial import of security/cy-login.
This is the Cyrus SASL plugin that implements the LOGIN authentication
mechanism.  It's recommended that it only be used if absolutely necessary
since it is not a secure authentication scheme.
2003-03-19 21:09:46 +00:00
jlam
1bcf64119a Add a section to deal with SASL plugins, and clarify where this file
should be included in package Makefiles.
2003-03-19 21:07:54 +00:00
jlam
11f6e9458c Rearrange some of the Makefile logic so that we can create Cyrus SASL
plugin packages.
2003-03-19 21:02:00 +00:00
agc
2708558756 Add and enable sfs. 2003-03-17 21:02:37 +00:00
agc
0b1292b249 Initial import of sfs-0.7.2 into the NetBSD Packages Collection.
Based on the sfs-0.6 package provided by Michael Santos in PR 18528.

SFS is a secure, global network file system with completely
decentralized control. SFS lets you access your files from anywhere
and share them with anyone, anywhere. Anyone can set up an SFS
server, and any user can access any server from any client. SFS
lets you share files across administrative realms without involving
administrators or certification authorities.
2003-03-17 21:01:47 +00:00
jlam
3ef633718c (1) Publicly export the value of _OPSYS_RPATH_NAME as RPATH_FLAG;
Makefiles simply need to use this value often, for better or for
    worse.

(2) Create a new variable FIX_RPATH that lists variables that should
    be cleansed of -R or -rpath values if ${_USE_RPATH} is "no".  By
    default, FIX_RPATH contains LIBS, X11_LDFLAGS, and LDFLAGS, and
    additional variables may be appended from package Makefiles.
2003-03-14 19:37:30 +00:00
salo
d1a8d95ec0 Updated to latest stable version 0.3.15.
Changes:

- The progress status is sent via the progress callbacks in
  gpgme_op_edit.
- Bug fix for signing operations with explicit signer settings
  for the CMS protocol.
2003-03-11 00:11:31 +00:00
wiz
bcfe715990 Update to 1.22.
This release changes the output format slightly to improve integration with
other tools, and improves the RPM packaging.
2003-03-09 18:11:05 +00:00