Commit graph

9560 commits

Author SHA1 Message Date
wiz
e4e2453b54 security/Makefile: + keepassxc 2018-04-02 08:45:51 +00:00
wiz
358e75bcc4 security/keepassxc: import keepassxc-2.3.0
Based on the wip package by myself with fixes from rillig.

KeePassXC can store your passwords safely and auto-type them into
your everyday websites and applications.
2018-04-02 08:45:24 +00:00
bsiegert
429ee23e50 Revbump all Go packages after 1.10.1 update.
ok wiz@ for committing during freeze
2018-03-30 11:56:19 +00:00
adam
a80e81328f Added missing patch 2018-03-29 15:35:32 +00:00
wiz
6bef8dfa4d openssl: update to 1.0.2o.
Changes between 1.0.2n and 1.0.2o [27 Mar 2018]

  *) Constructed ASN.1 types with a recursive definition could exceed the stack

     Constructed ASN.1 types with a recursive definition (such as can be found
     in PKCS7) could eventually exceed the stack given malicious input with
     excessive recursion. This could result in a Denial Of Service attack. There
     are no such structures used within SSL/TLS that come from untrusted sources
     so this is considered safe.

     This issue was reported to OpenSSL on 4th January 2018 by the OSS-fuzz
     project.
     (CVE-2018-0739)
     [Matt Caswell]
2018-03-29 11:08:44 +00:00
he
4db520a2e5 Apply fix from
https://github.com/opendnssec/opendnssec/pull/713/files
Remove notify handler from netio on zone removal.
Bump PKGREVISION.
2018-03-27 11:40:22 +00:00
wiz
befbf78317 p5-Net-DNS-SEC: update to 1.06.
**** 1.06 March 22, 2018

	Functionally identical to 1.05
	All changes address build/test issues on some platforms
2018-03-25 15:54:01 +00:00
bacon
15c382e8a4 security/munge: Bump PKGREVISION following PLIST fix 2018-03-24 21:29:22 +00:00
bacon
3f84ea81e5 security/munge: Fix PLIST issues, new maintainer bacon@NetBSD.org
Also add LICENSE, patch Linux init scripts, create etc/munge dir
2018-03-24 18:05:58 +00:00
fhajny
389961e421 security/erlang-fast_tls: Update to 1.0.21.
- Updating p1_utils to version 1.0.11.
- Fix compilation with rebar3
2018-03-24 16:07:24 +00:00
fhajny
b0c92ca1f0 security/erlang-epam: Update to 1.0.4.
- Fix compilation with rebar3
2018-03-24 14:29:19 +00:00
fhajny
0e097b55ef security/py-certbot: Update to 0.22.2.
0.22.2
- A type error introduced in 0.22.1 that would occur during challenge
  cleanup when a Certbot plugin raises an exception while trying to
  complete the challenge was fixed.

0.22.1
- The ACME server used with Certbot's --dry-run and --staging flags is
  now Let's Encrypt's ACMEv2 staging server which allows people to
  also test ACMEv2 features with these flags.
- The HTTP Content-Type header is now set to the correct value during
  certificate revocation with new versions of the ACME protocol.
- When using Certbot with Let's Encrypt's ACMEv2 server, it would add
  a blank line to the top of chain.pem and between the certificates in
  fullchain.pem for each lineage. These blank lines have been removed.
- Resolved a bug that caused Certbot's --allow-subset-of-names flag
  not to work.
- Fixed a regression in acme.client.Client that caused the class to
  not work when it was initialized without a ClientNetwork which is
  done by some of the other projects using our ACME library.
2018-03-23 14:37:08 +00:00
taca
f87f34a90e security/ruby-rex-socket: update to 0.1.12
0.1.12 (2018/03/21)

* Land #9, improve SSL certificate generation
* fix is_mac_addr to validate if something is _only_ a mac address
* Improve SSL certificate generation

0.1.11 (2018/02/09)

* Land #8, factor out SSL bits
* Address Brent's comment - drop @@loaded_openssl
* Implement a certificate provider pattern in Socket
* Extract and mixin cert ops from server module
2018-03-23 14:02:24 +00:00
adam
6bfb70eb5b py-cybox: updated to 2.1.0.17
Version 2.1.0.17
- Fix VocabString.is_plain()
- Add Location object and Pools. Update Event to use location, and Observable
  to use Pools.
2018-03-23 12:51:21 +00:00
fhajny
11a26b4395 security/vault: Update to 0.9.6
DEPRECATIONS/CHANGES:

- The AWS authentication backend now allows binds for inputs as either a
  comma-delimited string or a string array. However, to keep consistency with
  input and output, when reading a role the binds will now be returned as
  string arrays rather than strings.
- In order to prefix-match IAM role and instance profile ARNs in AWS auth
  backend, you now must explicitly opt-in by adding a `*` to the end of the
  ARN. Existing configurations will be upgraded automatically, but when
  writing a new role configuration the updated behavior will be used.

FEATURES:

- Replication Activation Enhancements: When activating a replication
  secondary, a public key can now be fetched first from the target cluster.
  This public key can be provided to the primary when requesting the
  activation token. If provided, the public key will be used to perform a
  Diffie-Hellman key exchange resulting in a shared key that encrypts the
  contents of the activation token. The purpose is to protect against
  accidental disclosure of the contents of the token if unwrapped by the wrong
  party, given that the contents of the token are highly sensitive. If
  accidentally unwrapped, the contents of the token are not usable by the
  unwrapping party. It is important to note that just as a malicious operator
  could unwrap the contents of the token, a malicious operator can pretend to
  be a secondary and complete the Diffie-Hellman exchange on their own; this
  feature provides defense in depth but still requires due diligence around
  replication activation, including multiple eyes on the commands/tokens and
  proper auditing.

IMPROVEMENTS:

- api: Update renewer grace period logic. It no longer is static, but rather
  dynamically calculates one based on the current lease duration after each
  renew.
- auth/approle: Allow array input for bound_cidr_list
- auth/aws: Allow using lists in role bind parameters
- auth/aws: Allow binding by EC2 instance IDs
- auth/aws: Allow non-prefix-matched IAM role and instance profile ARNs
- auth/ldap: Set a very large size limit on queries
- core: Log info notifications of revoked leases for all leases/reasons, not
  just expirations
- physical/couchdb: Removed limit on the listing of items
- secret/pki: Support certificate policies
- secret/pki: Add ability to have CA:true encoded into intermediate CSRs, to
  improve compatibility with some ADFS scenarios
- secret/transit: Allow selecting signature algorithm as well as hash
  algorithm when signing/verifying
- server: Make sure `tls_disable_client_cert` is actually a true value rather
  than just set
- storage/dynamodb: Allow specifying max retries for dynamo client
- storage/gcs: Allow specifying chunk size for transfers, which can reduce
  memory utilization
- sys/capabilities: Add the ability to use multiple paths for capability
  checking

BUG FIXES:

- auth/aws: Fix honoring `max_ttl` when a corresponding role `ttl` is not also
  set
- auth/okta: Fix honoring configured `max_ttl` value
- auth/token: If a periodic token being issued has a period greater than the
  max_lease_ttl configured on the token store mount, truncate it. This matches
  renewal behavior; before it was inconsistent between issuance and renewal.
- cli: Improve error messages around `vault auth help` when there is no CLI
  helper for a particular method
2018-03-23 12:00:12 +00:00
adam
4604d1d688 py-cryptography[_vectors]: updated to 2.2.1
2.2.1:
Reverted a change to GeneralNames which prohibited having zero elements, due to breakages.
Fixed a bug in :func:~cryptography.hazmat.primitives.keywrap.aes_key_unwrap_with_padding that caused it to raise InvalidUnwrap when key length modulo 8 was zero.
2018-03-22 11:49:19 +00:00
taca
e102e3da6d security/ruby-rex-powershell: update to 0.1.77
0.1.77					2017/09/23

* Convert double quotes to single quotes to match #{URL}

0.1.76					2017/09/07

* Merge pull request #9 from sempervictus/feature-payload_msil_jit

0.1.75					2017/08/25

* Remove useless failing spec

* Improve use of RandomIdentifier::Generator
* Add MSIL to template constants
* Update spec for MSIL payload
* Implement MSIL payload in Rex gem via template
* Update spec for command
* Finalize quote wrapper
* Rework quote handling
* Cleanup Command single quotes redundant gsub

0.1.74					2017/07/18

* Alternative to IEX in dl_and_exec_string methods
* Command spec - deal with :use_single_quotes
* Output and command improvements for Win10

0.1.73					2017/05/12

* update spec to require Ruby 2.2.0 or greater
2018-03-21 13:42:08 +00:00
taca
d7f298ddcf security/ruby-rex-socket: update to 0.1.10
0.1.10						2017/10/25

* improve cert generation
2018-03-21 13:32:21 +00:00
taca
ba23d01f36 security/ruby-rex-core: update to 0.1.13
0.1.13						2017/07/20

* partially revert 06bfb88
* minor gem cleanups
2018-03-21 13:26:45 +00:00
taca
0b2eb05bda security/ruby-rex-exploitation: update to 0.1.17
0.1.17							2018/02/09

* Add bourne busybox base64 decoder

0.1.16							2017/11/29

* Add user agent regexes to HTTP CmdStagers
2018-03-21 13:23:47 +00:00
taca
3bb4381d8d security/ruby-rex-arch: update to 0.1.13
0.1.13						2017/10/30

* add E500V2 architecture for PPC

0.1.12						2017/08/20

* add license, fixup metadata, unlock unneeded pins
2018-03-21 13:19:52 +00:00
taca
d765fbde11 security/ruby-rex-text: update to 0.2.16
0.2.16						2017/05/12

* update spec to require Ruby 2.2.0 or greater
2018-03-21 13:18:03 +00:00
taca
869b10cc64 security/ruby-nexpose: update to 7.2.0
7.2.0 (2018-01-17)

Closed issues:

* list_vuln_exceptions returns API error #312
* Credentials failure after using Site.copy #307
* XML serialization for VulnException incorrect due to extra whitespace #304
* Nexpose timeout does not seem to work #299

Merged pull requests:

* Update vuln exceptions to use generally available API version #313
  (mhuffman-r7)
* Add a method to add common vuln status filters to report configs #303
  (gschneider-r7)
* Updated for Ruby 2.4 Support #301 (twosevenzero)
2018-03-21 13:10:25 +00:00
wiz
0473185595 p5-Net-DNS-SEC: update to 1.05.
**** 1.05 March 20, Tuesday

Feature
	Support added for Ed25519 and Ed448 algorithms

Fix: rt.cpan.org #124650
	Net::DNS::SEC::Private must not die if attribute is not present
2018-03-21 12:42:37 +00:00
taca
9c3403f80a security/ruby-metasploit_payloads: update to 0.3.7
No proper change log is not available.  Please refer commit log:
<https://github.com/rapid7/mettle/commits/master>.
2018-03-21 12:07:34 +00:00
taca
36d7ad96d2 security/ruby-metasploit-payloads: update to 1.3.31
No proper change log is not available.  Please refer commit log:
<https://github.com/rapid7/metasploit-payloads/commits/master>.
2018-03-21 11:52:59 +00:00
prlw1
cecdc1eaad Update clamav to 0.99.4 (fixes build)
ClamAV 0.99.4 is a hotfix release to patch a set of vulnerabilities.

- fixes for the following CVE's: CVE-2012-6706, CVE-2017-6419,
  CVE-2017-11423, CVE-2018-0202, and CVE-2018-1000085.
- also included are 2 fixes for file descriptor leaks as well fixes for
  a handful of other important bugs, including patches to support g++ 6, C++11.
2018-03-21 06:55:57 +00:00
wiz
00e6694e03 libgpg-error: Honor LDFLAGS.
Fixes RELRO build. Bump PKGREVISION.
2018-03-20 12:39:28 +00:00
adam
53684a7916 py-cryptography[_vectors]: updated to 2.2
2.2:
BACKWARDS INCOMPATIBLE: Support for Python 2.6 has been dropped.
Resolved a bug in HKDF that incorrectly constrained output size.
Added :class:~cryptography.hazmat.primitives.asymmetric.ec.BrainpoolP256R1, :class:~cryptography.hazmat.primitives.asymmetric.ec.BrainpoolP384R1, and :class:~cryptography.hazmat.primitives.asymmetric.ec.BrainpoolP512R1 to support inter-operating with systems like German smart meters.
Added token rotation support to :doc:Fernet </fernet> with :meth:~cryptography.fernet.MultiFernet.rotate.
Fixed a memory leak in :func:~cryptography.hazmat.primitives.asymmetric.ec.derive_private_key.
Added support for AES key wrapping with padding via :func:~cryptography.hazmat.primitives.keywrap.aes_key_wrap_with_padding and :func:~cryptography.hazmat.primitives.keywrap.aes_key_unwrap_with_padding .
Allow loading DSA keys with 224 bit q.
2018-03-19 09:01:46 +00:00
taca
5199f35b3d security/ruby-rbnacl: update to 5.0.0
## 5.0.0 (2017-06-13)

* [#159](https://github.com/cryptosphere/rbnacl/pull/159)
  Support the BLAKE2b Initialize-Update-Finalize API.
  ([@fudanchii])
2018-03-17 14:23:06 +00:00
adam
e971cfb696 libgpg-error: updated to 1.28
changes in version 1.28:

 * The formerly internal yat2m tool is now installed for a native
   build.

 * The new files gpgrt.m4 and gpgrt-config are now installed.  They
   can be used instead of gpg-error.m4 and gpg-error-config.

 * New logging functions similar to those used by GnuPG.

 * New helper functions for platform abstraction.
2018-03-16 09:48:00 +00:00
khorben
e3f36bb15d Output signatures to the standard output for "-"
This is to reflect the behaviour documented in netpgp(1).

Originally submitted on tech-pkg@ as:
[PATCH 09/11] Output signatures to the standard output for "-"

Only modified for consistency with the coding style; as also applied in
NetBSD's src repository.
2018-03-15 20:21:52 +00:00
khorben
ca80201c92 Correct option "--armor" and document alternate option "--detach"
Originally submitted on tech-pkg@ as:
[PATCH 07/11] Correct option "--armor"
[PATCH 08/11] Also document alternate option "--detach"

As also applied in NetBSD's src repository.
2018-03-15 20:14:14 +00:00
khorben
f4c97da9bd Do not use random data for pass-phrases on EOF
Originally submitted on tech-pkg@ as:
[PATCH 04/11] Do not use random data for pass-phrases on EOF

Only modified for consistency with the coding style; as also applied in
NetBSD's src repository.

Tested on NetBSD/amd64.
2018-03-15 20:00:43 +00:00
khorben
bee6262660 Do not truncate pass-phrases without a newline character
This also fixes a crash when the pass-phrase entered is empty.

Originally submitted on tech-pkg@ as:
[PATCH 02/11] Do not truncate pass-phrases without a newline character

Only modified for consistency with the coding style; as also applied in
NetBSD's src repository.

Tested on NetBSD/amd64.
2018-03-15 19:51:08 +00:00
khorben
f688681988 Do not ask for a passphrase when empty
Originally submitted on tech-pkg@ as:
[PATCH 06/11] Do not ask for a passphrase when empty

Only modified for consistency with the coding style; as also applied in
NetBSD's src repository.

Tested on NetBSD/amd64.
2018-03-15 19:37:30 +00:00
jnemeth
7d790bed65 sort 2018-03-15 05:08:07 +00:00
taca
ee58255071 security/ruby-sshkit: update to 1.16.0
## [1.16.0][] (2018-02-03)

  * [#417](https://github.com/capistrano/sshkit/pull/417): Cache key generation for connections becomes slow when `known_hosts` is a valid `net/ssh` options and `known_hosts` file is big. This changes the cache key generation and fixes performance issue - [@ElvinEfendi](https://github.com/ElvinEfendi).
## [1.15.1][] (2017-11-18)

This is a small bug-fix release that fixes problems with `upload!` and `download!` that were inadvertently introduced in 1.15.0.

### Breaking changes

  * None

### Bug fixes

  * [#410](https://github.com/capistrano/sshkit/pull/410): fix NoMethodError when using upload!/download! with Pathnames - [@UnderpantsGnome](https://github.com/UnderpantsGnome)
  * [#411](https://github.com/capistrano/sshkit/pull/410): fix upload!/download! when using relative paths outside of `within` blocks -  [@Fjan](https://github.com/Fjan)

## [1.15.0][] (2017-11-03)

### New features

  * [#408](https://github.com/capistrano/sshkit/pull/408): upload! and download! now respect `within` - [@sj26](https://github.com/sj26)

### Potentially breaking changes

  * `upload!` and `download!` now support remote paths which are
    relative to the `within` working directory. They were previously documented
    as only supporting absolute paths, but relative paths still worked relative
    to the remote working directory. If you rely on the previous behaviour you
    may need to adjust your code.
2018-03-14 15:33:33 +00:00
wiz
d16a80e1ea p5-Net-SSLeay: update to 1.85.
1.85 2018-03-14
	Preparations for transferring maintenace to a new maintainer
	Fixed test failure in t/local/33_x509_create_cert.t for some version of OpenSSL.
	Fixed free() error that causes "Free to wrong pool ..." merssage on Windows.
	Reported and patched by Steffen Ullrich.
2018-03-14 07:56:50 +00:00
adam
e9297cb104 py-paramiko: updated to 2.4.1
2.4.1:
[Bug] Ed25519 auth key decryption raised an unexpected exception when given a unicode password string (typical in python 3). Report by Theodor van Nahl and fix by Pierce Lopez.
[Bug] Add newer key classes for Ed25519 and ECDSA to paramiko.__all__ so that code introspecting that attribute, or using from paramiko import * (such as some IDEs) sees them. Thanks to @patriksevallius for the patch.
[Bug] Fix a security flaw (CVE-2018-7750) in Paramiko’s server mode (emphasis on server mode; this does not impact client use!) where authentication status was not checked before processing channel-open and other requests typically only sent after authenticating. Big thanks to Matthijs Kooijman for the report.
2018-03-13 18:35:29 +00:00
adam
7a317429e3 py-asyncssh: updated to 1.12.1
Release 1.12.1:
Implemented a fix for CVE-2018-7749, where a modified SSH client could request that an AsyncSSH server perform operations before authentication had completed. Thanks go to Matthijs Kooijman for discovering and reporting this issue and helping to review the fix.
Added a non-blocking collect_output() method to SSHClientProcess to allow applications to retrieve data received on an output stream without blocking. This call can be called multiple times and freely intermixed with regular read calls with a guarantee that output will always be returned in order and without duplication.
Updated debug logging implementation to make it more maintainable, and to fix an issue where unprocessed packets were not logged in some cases.
Extended the support below for non-ASCII characters in comments to apply to X.509 certificates, allowing an optional encoding to be passed in to get_comment() and set_comment() and a get_comment_bytes() function to get the raw comment bytes without performing Unicode decoding.
Fixed an issue where a UnicodeDecodeError could be reported in some cases instead of a KeyEncryptionError when a private key was imported using the wrong passphrase.
Fixed the reporting of the MAC algorithm selected during key exchange to properly report the cipher name for GCM and Chacha ciphers that don’t use a separate MAC algorithm. The correct value was being returned in queries after the key exchange was complete, but the logging was being done before this adjustment was made.
Fixed the documentation of connection_made() in SSHSession subclasses to properly reflect the type of SSHChannel objects passed to them.
2018-03-13 18:32:23 +00:00
fhajny
2887a6fc50 security/py-certbot: Update to 0.22.0
### Added

- Support for obtaining wildcard certificates and a newer version of the ACME
  protocol such as the one implemented by Let's Encrypt's upcoming ACMEv2
  endpoint was added to Certbot and its ACME library. Certbot still works with
  older ACME versions and will automatically change the version of the protocol
  used based on the version the ACME CA implements.
- The Apache and Nginx plugins are now able to automatically install a wildcard
  certificate to multiple virtual hosts that you select from your server
  configuration.
- The `certbot install` command now accepts the `--cert-name` flag for
  selecting a certificate.
- `acme.client.BackwardsCompatibleClientV2` was added to Certbot's ACME library
  which automatically handles most of the differences between new and old ACME
  versions. `acme.client.ClientV2` is also available for people who only want
  to support one version of the protocol or want to handle the differences
  between versions themselves.
- certbot-auto now supports the flag --install-only which has the script
  install Certbot and its dependencies and exit without invoking Certbot.
- Support for issuing a single certificate for a wildcard and base domain was
  added to our Google Cloud DNS plugin. To do this, we now require your API
  credentials have additional permissions, however, your credentials will
  already have these permissions unless you defined a custom role with fewer
  permissions than the standard DNS administrator role provided by Google.
  These permissions are also only needed for the case described above so it
  will continue to work for existing users. For more information about the
  permissions changes, see the documentation in the plugin.

### Changed

- We have broken lockstep between our ACME library, Certbot, and its plugins.
  This means that the different components do not need to be the same version
  to work together like they did previously. This makes packaging easier
  because not every piece of Certbot needs to be repackaged to ship a change to
  a subset of its components.
- Support for Python 2.6 and Python 3.3 has been removed from ACME, Certbot,
  Certbot's plugins, and certbot-auto. If you are using certbot-auto on a RHEL
  6 based system, it will walk you through the process of installing Certbot
  with Python 3 and refuse to upgrade to a newer version of Certbot until you
  have done so.
- Certbot's components now work with older versions of setuptools to simplify
  packaging for EPEL 7.

### Fixed

- Issues caused by Certbot's Nginx plugin adding multiple ipv6only directives
  has been resolved.
- A problem where Certbot's Apache plugin would add redundant include
  directives for the TLS configuration managed by Certbot has been fixed.
- Certbot's webroot plugin now properly deletes any directories it creates.
2018-03-13 10:08:51 +00:00
wiz
c57215a7b2 Recursive bumps for fontconfig and libzip dependency changes. 2018-03-12 11:15:24 +00:00
dholland
37f77ef120 Fix (mis)use of __NetBSD_Prereq__ per PR 38051. 2018-03-12 00:29:24 +00:00
bsiegert
9f189bf98d Remove go-crypto-acme. Replacement: go-crypto.
The two packages have been re-merged after the removal of a circular
dependency.
2018-03-11 20:49:04 +00:00
bsiegert
7761eabef2 Update go-crypto to 0.0.20180308. No changelog from upstream.
The circular dependency that prompted splitting this package is no longer
an issue, as acme now depends on context instead of golang.org/x/net/context.
Thus, this package now contains what used to be go-crypto-acme and conflicts
with it.
2018-03-11 20:43:33 +00:00
maya
92b3a24b9a p5-Data-Password-passwdqc: new package
Data::Password::passwdqc provides an object oriented Perl interface
to Openwall Project's passwdqc. It allows you to check password
strength and also lets you generate quality controllable random
password.
2018-03-11 12:08:18 +00:00
maya
2f53b69f4c p5-Crypt-SMIME: new package
p5-Crypt-SMIME is a perl5 module that provides a class for handling S/MIME
messages.  It can sign, verify, encrypt and decrypt messages.
2018-03-11 11:09:16 +00:00
jmcneill
41048bcac4 Provide PRIi64 definition where it doesn't exist (like IRIX). 2018-03-11 04:52:03 +00:00
schmonz
17c3062682 Find the user agreement URL again, via upstream patch. Bump PKGREVISION. 2018-03-10 17:18:42 +00:00
adam
b96bd51f51 py-cryptodome: updated to 3.5.1
3.5.1:
Fix mismatch with declaration and definition of addmul128.
2018-03-09 08:07:44 +00:00
adam
3af5d443eb py-ntlm-auth: updated to 1.1.0
1.1.0:
Removed DES code as the license was found to be incorrect from the source
Added new DES code not based on the original
Fixed up some deprecation warnings
Changed tests from running unittest to py.test
Changed licence from GPL to MIT as code is not all my own
2018-03-08 12:45:34 +00:00
adam
cf41cc84b2 py-cryptodome: updated to 3.5.0
New features
* Import and export of ECC curves in compressed form.
* The initial counter for a cipher in CTR mode can be a byte string (in addition to an integer).
* Faster PBKDF2 for HMAC-based PRFs (at least 20x for short passwords, more for longer passwords). Thanks to Christian Heimes for pointing out the implementation was under-optimized.
* The salt for PBKDF2 can be either a string or bytes.

Resolved issues
* Without libgmp, modular exponentiation (since v3.4.8) crashed on 32-bit big-endian systems.

Breaks in compatibility
* Removed support for Python < 2.6.
2018-03-08 08:15:02 +00:00
adam
64d070a4ed py-libnacl: added version 1.6.1
This library is used to gain direct access to the functions exposed by Daniel
J. Bernstein's nacl library via libsodium. It has been constructed to maintain
extensive documentation on how to use nacl as well as being completely
portable. The file in libnacl/__init__.py can be pulled out and placed directly
in any project to give a single file binding to all of nacl.
2018-03-08 08:13:03 +00:00
adam
78d31a15b5 sudo: updated to 1.8.22
What's new in Sudo 1.8.22

* Commands run in the background from a script run via sudo will
  no longer receive SIGHUP when the parent exits and I/O logging
  is enabled.

* A particularly offensive insult is now disabled by default.

* The description of "sudo -i" now correctly documents that
  the "env_keep" and "env_check" sudoers options are applied to
  the environment.

* Fixed a crash when the system's host name is not set.

* The sudoers2ldif script now handles #include and #includedir
  directives.

* Fixed a bug where sudo would silently exit when the command was
  not allowed by sudoers and the "passwd_tries" sudoers option
  was set to a value less than one.

* Fixed a bug with the "listpw" and "verifypw" sudoers options and
  multiple sudoers sources.  If the option is set to "all", a
  password should be required unless none of a user's sudoers
  entries from any source require authentication.

* Fixed a bug with the "listpw" and "verifypw" sudoers options in
  the LDAP and SSSD back-ends.  If the option is set to "any", and
  the entry contained multiple rules, only the first matching rule
  was checked.  If an entry contained more than one matching rule
  and the first rule required authentication but a subsequent rule
  did not, sudo would prompt for a password when it should not have.

* When running a command as the invoking user (not root), sudo
  would execute the command with the same group vector it was
  started with.  Sudo now executes the command with a new group
  vector based on the group database which is consistent with
  how su(1) operates.

* Fixed a double free in the SSSD back-end that could occur when
  ipa_hostname is present in sssd.conf and is set to an unqualified
  host name.

* When I/O logging is enabled, sudo will now write to the terminal
  even when it is a background process.  Previously, sudo would
  only write to the tty when it was the foreground process when
  I/O logging was enabled.  If the TOSTOP terminal flag is set,
  sudo will suspend the command (and then itself) with the SIGTTOU
  signal.

* A new "authfail_message" sudoers option that overrides the
  default "N incorrect password attempt(s)".

* An empty sudoRunAsUser attribute in the LDAP and SSSD backends
  will now match the invoking user.  This is more consistent with
  how an empty runas user in the sudoers file is treated.

* Documented that in check mode, visudo does not check the owner/mode
  on files specified with the -f flag.

* It is now an error to specify the runas user as an empty string
  on the command line.  Previously, an empty runas user was treated
  the same as an unspecified runas user.

* When "timestamp_type" option is set to "tty" and a terminal is
  present, the time stamp record will now include the start time
  of the session leader.  When the "timestamp_type" option is set
  to "ppid" or when no terminal is available, the start time of
  the parent process is used instead.  This significantly reduces
  the likelihood of a time stamp record being re-used when a user
  logs out and back in again.

* The sudoers time stamp file format is now documented in the new
  sudoers_timestamp manual.

* The "timestamp_type" option now takes a "kernel" value on OpenBSD
  systems.  This causes the tty-based time stamp to be stored in
  the kernel instead of on the file system.  If no tty is present,
  the time stamp is considered to be invalid.

* Visudo will now use the SUDO_EDITOR environment variable (if
  present) in addition to VISUAL and EDITOR.
2018-03-07 09:17:06 +00:00
bsiegert
9ab6e4ca7b Revbump all Go packages after Go 1.10 update. 2018-03-04 15:52:12 +00:00
wiz
5f64f1a1f8 p5-Mozilla-CA: update to 20180117.
20180301
  - Update from Mozilla repository to 2018-01-17
  - Update bundled mk-ca-bundle.pl from upstream.
2018-03-04 15:32:37 +00:00
ryoon
40e672d253 Fix PLIST substitution. Noticed by leot@. Thank you 2018-03-04 09:05:57 +00:00
ryoon
b48dc3d8e0 Update to 2.1
* Depend on security/mozilla-rootcerts-1.0.20180111
2018-03-04 01:44:07 +00:00
ryoon
3f51cc8dad Update to 1.0.20180111
* Based on NSS 3.35 beta 1
2018-03-04 01:42:31 +00:00
minskim
a0e5b0126b security/R-digest: Update to 0.6.15
Notable changes since 0.6.12:
* R/digest.R: Support serializeVersion format
* sha1() handles empty matrices
* sha1() gains an `algo` argument
* sha1() handles raw class
* R/sha1.R (sha1.POSIXlt): Unclass POSIXlt object
2018-02-28 18:12:31 +00:00
wiz
cd8788b7b0 munge: update to 0.5.13 to fix build with openssl-1.1.
munge-0.5.13 (2017-09-26):
- Added support for OpenSSL 1.1.0. (#54)
- Added support for UID/GID values >= 2^31.
- Added support for getentropy() and getrandom().
- Added --trusted-group cmdline opt to munged.
- Added --log-file and --seed-file cmdline opts to munged. (#57)
- Changed default MAC algorithm to SHA-256.
- Fixed autoconf installation directory variable substitution. (#47)
- Fixed all gcc, clang, and valgrind warnings.
- Improved resilience and unpredictability of PRNG.
- Improved hash table performance.
- Removed libmissing dependency from libmunge. (#49)

munge-0.5.12 (2016-02-25):
- Changed project homepage to <https://dun.github.io/munge/>.
- Changed RPM specfile from sysvinit to systemd. (#33)
- Added --max-ttl cmdline opt to munged. (#28)
- Added --pid-file cmdline opt to munged. (#41)
- Added support for "make dist" and "make distcheck". (#45)
- Fixed group-writable permissions error for logfile on Ubuntu. (#31)
- Fixed packaging with missing pkgconfig munge.pc file. (#25)
- Fixed packaging with missing systemd service & tmpfiles.d config. (#34)
- Fixed recursive make command in makefiles. (#40)
2018-02-28 09:20:29 +00:00
wiz
d57b783ad9 p5-CryptX: update to 0.058.
0.058   2018-02-27
        - fix: decode_b58b + invalid input
2018-02-28 08:46:04 +00:00
fhajny
505ecb928a security/vault: Simplify Makefile, enable a basic test target. 2018-02-27 12:32:35 +00:00
fhajny
bc5c88a95d security/vault: Update to 0.9.5
## 0.9.5 (February 26th, 2018)

IMPROVEMENTS:

- auth: Allow sending default_lease_ttl and max_lease_ttl values when enabling
  auth methods.
- secret/database: Add list functionality to `database/config` endpoint
- physical/consul: Allow setting a specific service address
- replication: When bootstrapping a new secondary, if the initial cluster
  connection fails, Vault will attempt to roll back state so that
  bootstrapping can be tried again, rather than having to recreate the
  downstream cluster. This will still require fetching a new secondary
  activation token.

BUG FIXES:

- auth/aws: Update libraries to fix regression verifying PKCS#7 identity
  documents
- listener: Revert to Go 1.9 for now to allow certificates with non-DNS names
  in their DNS SANs to be used for Vault's TLS connections
- replication: Fix issue with a performance secondary/DR primary node losing
  its DR primary status when performing an update-primary operation
- replication: Fix issue where performance secondaries could be unable to
  automatically connect to a performance primary after that performance
  primary has been promoted to a DR primary from a DR secondary
- ui: Fix behavior when a value contains a `.`

## 0.9.4 (February 20th, 2018)

SECURITY:

- Role Tags used with the EC2 style of AWS auth were being improperly parsed;
  as a result they were not being used to properly restrict values.
  Implementations following our suggestion of using these as defense-in-depth
  rather than the only source of restriction should not have significant
  impact.

FEATURES:

- ChaCha20-Poly1305 support in `transit`: You can now encrypt and decrypt
  with ChaCha20-Poly1305 in `transit`. Key derivation and convergent
  encryption is also supported.
- Okta Push support in Okta Auth Backend: If a user account has MFA
  required within Okta, an Okta Push MFA flow can be used to successfully
  finish authentication.
- PKI Improvements: Custom OID subject alternate names can now be set,
  subject to allow restrictions that support globbing. Additionally, Country,
  Locality, Province, Street Address, and Postal Code can now be set in
  certificate subjects.
- Manta Storage: Joyent Triton Manta can now be used for Vault storage
- Google Cloud Spanner Storage: Google Cloud Spanner can now be used for
  Vault storage

IMPROVEMENTS:

- auth/centrify: Add CLI helper
- audit: Always log failure metrics, even if zero, to ensure the values appear
  on dashboards
- cli: Disable color when output is not a TTY
- cli: Add `-format` flag to all subcommands
- cli: Do not display deprecation warnings when the format is not table
- core: If over a predefined lease count (256k), log a warning not more than
  once a minute. Too many leases can be problematic for many of the storage
  backends and often this number of leases is indicative of a need for
  workflow improvements.
- secret/nomad: Have generated ACL tokens cap out at 64 characters
- secret/pki: Country, Locality, Province, Street Address, and Postal Code can
  now be set on certificates
- secret/pki: UTF-8 Other Names can now be set in Subject Alternate Names in
  issued certs; allowed values can be set per role and support globbing
- secret/pki: Add a flag to make the common name optional on certs
- secret/pki: Ensure only DNS-compatible names go into DNS SANs; additionally,
  properly handle IDNA transformations for these DNS names
- secret/ssh: Add `valid-principles` flag to CLI for CA mode
- storage/manta: Add Manta storage
- ui (Enterprise): Support for ChaCha20-Poly1305 keys in the transit engine.

BUG FIXES:
- api/renewer: Honor increment value in renew auth calls
- auth/approle: Fix inability to use limited-use-count secret IDs on
  replication performance secondaries
- auth/approle: Cleanup of secret ID accessors during tidy and removal of
  dangling accessor entries
- auth/aws-ec2: Avoid masking of role tag response
- auth/cert: Verify DNS SANs in the authenticating certificate
- auth/okta: Return configured durations as seconds, not nanoseconds
- auth/okta: Get all okta groups for a user vs. default 200 limit
- auth/token: Token creation via the CLI no longer forces periodic token
  creation. Passing an explicit zero value for the period no longer create
  periodic tokens.
- command: Fix interpreted formatting directives when printing raw fields
- command: Correctly format output when using -field and -format flags at the
  same time
- command/rekey: Re-add lost `stored-shares` parameter
- command/ssh: Create and reuse the api client
- command/status: Fix panic when status returns 500 from leadership lookup
- identity: Fix race when creating entities
- plugin/gRPC: Fixed an issue with list requests and raw responses coming from
  plugins using gRPC transport
- plugin/gRPC: Fix panic when special paths are not set
- secret/pki: Verify a name is a valid hostname before adding to DNS SANs
- secret/transit: Fix auditing when reading a key after it has been backed up
  or restored
- secret/transit: Fix storage/memory consistency when persistence fails
- storage/consul: Validate that service names are RFC 1123 compliant
- storage/etcd3: Fix memory ballooning with standby instances
- storage/etcd3: Fix large lists (like token loading at startup) not being
  handled
- storage/postgresql: Fix compatibility with versions using custom string
  version tags
- storage/zookeeper: Update vendoring to fix freezing issues
- ui (Enterprise): Decoding the replication token should no longer error and
  prevent enabling of a secondary replication cluster via the ui.
- plugin/gRPC: Add connection info to the request object
2018-02-27 11:20:42 +00:00
sborrill
f8073327d7 lynis: update to 2.6.2
Changes:
--------
* Bugfix for Arch Linux (binary detection)
* Textual changes for several tests
* Update of tests database
2018-02-26 17:42:54 +00:00
triaxx
5dfdf4c47d Update to 0.34
* Change file is inconsistent: no information about this release available
* Homepage and repository are dead: tarball reached and archived on
  ftp.NetBSD.org thands to OpenPKG repository
* Configurations files are installed in VARBASE because CSPHOME must be
  writable since CA tree is built in this directory
* Fix deprecated use of unescaped '{'
* Clean Makefile
2018-02-26 12:32:41 +00:00
adam
f0709fe1af gnupg2: updated to 2.2.5
version 2.2.5:

* gpg: Allow the use of the "cv25519" and "ed25519" short names in
  addition to the canonical curve names in --batch --gen-key.

* gpg: Make sure to print all secret keys with option --list-only
  and --decrypt.

* gpg: Fix the use of future-default with --quick-add-key for
  signing keys.

* gpg: Select a secret key by checking availability under gpg-agent.

* gpg: Fix reversed prompt texts for --only-sign-text-ids.

* gpg,gpgsm: Fix detection of bogus keybox blobs on 32 bit systems.

* gpgsm: Fix regression since 2.1 in --export-secret-key-raw which
  got $d mod (q-1)$ wrong.  Note that most tools automatically fixup
  that parameter anyway.

* ssh: Fix a regression in getting the client'd PID on *BSD and
  macOS.

* scd: Support the KDF Data Object of the OpenPGP card 3.3.

* scd: Fix a regression in the internal CCID driver for certain card
  readers.

* scd: Fix a problem on NetBSD killing scdaemon on gpg-agent
  shutdown.

* dirmngr: Improve returned error description on failure of DNS
  resolving.

* wks: Implement command --install-key for gpg-wks-server.

* Add option STATIC=1 to the Speedo build system to allow a build
  with statically linked versions of the core GnuPG libraries.  Also
  use --enable-wks-tools by default by Speedo builds for Unix.
2018-02-26 09:05:45 +00:00
adam
948a92f8bc py-m2crypto: updated to 0.29.0
0.29.0:
- Fix building on Windows (all tests fix on Win32 and Win64 on all
  supported combinations of versions of OpenSSL and Python)
- Fixes of some small bugs
2018-02-26 08:46:03 +00:00
adam
3662185f5b revbump after x264-devel update 2018-02-26 08:19:25 +00:00
triaxx
c7d3369d37 Update to 0.34 2018-02-26 08:00:08 +00:00
wiz
8477fe4e12 p5-Net-SFTP: update to 0.12.
0.12  2017.06.27
    - put function was broken when trying to send 64 Kbyte chunks
      send only 8 Kbytes at a time
    - offset variable should be 64 bit
2018-02-25 18:59:56 +00:00
wiz
a38e20acb6 p5-Net-OpenSSH: update to 0.77.
0.77  Feb 15, 2018
	- Fix regression broking password authentication (bug report
          by Russell Shingleton).


0.76  Feb 8, 2018
        - Allow passing "file_from" and "from0" options into "rsync"
          (bug report and patch by Slaven Rezic, fixes #rt124357)
        - Document how to manipulate port forwardings.
        - Rename sample directory to examples (fixes #rt122042
          reported by Karen Etheridge).

0.75_02  Jul 18, 2017
        - Add support for "master_pty_force" and "get_master_pty_log"
          features.
        - Add support for "subsystem" feature.

0.75_01  Mar 3, 2017
        - Use an opaque digest as the last part of the multiplexing
          socket path in order to reduce its size (bug report by
          Sombrerero_Loco at PerlMonks).
        - Improve ctl_path/ctl_dir handling catching more errors
          earlier.
        - Add support for stdin_keep_open feature (bug report by
          fwalters at PerlMonks).
2018-02-25 18:57:11 +00:00
wiz
0e6ab98fb8 p5-Net-DNS-SEC: update to 1.04.
**** 1.04 February 15, 2018

Feature
	Cryptographic library access re-engineered using PerlXS
	directly instead of CPAN Crypt::OpenSSL::(DSA|EDSA|RSA)
	distributions which have fallen into disrepair.
2018-02-25 18:56:14 +00:00
wiz
5d9dbe6cda p5-Crypt-OpenSSL-RSA: fix build with openssl-1.1.
Bump PKGREVISION.
2018-02-25 18:53:48 +00:00
wiz
b98bb4138b p5-IO-Socket-SSL: update to 2.056.
2.056 2018/02/19
- Intercept - fix creation of serial number: base it on binary digest instead of
  treating hex fingerprint as binary. Allow use of own serial numbers again.
- t/io-socket-ip.t - skip test if no IPv6 support on system RT#124464
- update PublicSuffix
2.055 2018/02/15
- use SNI also if hostname was given all-uppercase
- Utils::CERT_create - don't add authority key for issuer since Chrome does
  not like this
- Intercept:
  - change behavior of code based cache to better support synchronizing
    within multiprocess/threaded setups
  - don't use counter for serial number but somehow base it on original
    certificate in order to avoid conflicts with reuse of serial numbers
    after restart
- RT#124431 - better support platforms w/o IPv6
- RT#124306 - spelling fixes in documentation
2.054 2018/01/22
- added missing test certificates to MANIFEST
2.053 2018/01/21
- small behavior fixes
  - if SSL_fingerprint is used and matches don't check for OCSP
  - Utils::CERT_create - small fixes to properly specific purpose, ability to
    use predefined complex purpose but disable some features
- update PublicSuffix
- updates for documentation, especially regarding pitfalls with forking or using
  non-blocking sockets. Spelling fixes.
- test fixes and improvements
  - stability improvements for live tests
  - regenerate certificate in certs/ and make sure they are limited to the
    correct purpose. Checkin program used to generate certificates.
  - adjust tests since certificates have changed and some tests used
    certificates intended for client authentication as server certificates,
    which now no longer works
2018-02-25 18:47:31 +00:00
wiz
e143867422 p5-CryptX: update to 0.057.
0.057   2018-01-31
        - significant speed-up (more stuff handled on XS level)
        - Crypt::Checksum is deprecated in favour of Crypt::Checksum::Adler32|CRC32
2018-02-25 18:45:05 +00:00
adam
98c419ded4 py-crcmod: cleanups 2018-02-23 06:34:08 +00:00
adam
a72bf303d7 py-gssapi: updated to 1.4.1
1.4.1:
Features
Support most of the GGF Extensions

Tooling
Exit successfully when no docs change

Documentation
Fix typo in Name documentation
2018-02-22 09:11:18 +00:00
wiz
01fc2de33b base: move PHP_VERSIONS_ACCEPTED before inclusion of phpversion.mk 2018-02-21 12:25:23 +00:00
fhajny
418c5e041b Import Net::SFTP 0.11 as security/p5-Net-SFTP.
This is Net::SFTP, a module implementing a client for the Secure
File Transfer Protocol.
2018-02-20 14:08:29 +00:00
fhajny
03baf2ce65 Import duo_unix 1.10.1 as security/duo_unix.
Duo two-factor authentication for Unix systems.
2018-02-16 07:20:56 +00:00
wiz
ea1a66745e liboauth: update to 1.0.3nb7.
Support building with openssl-1.1.
2018-02-15 15:21:49 +00:00
wiz
2276779963 openct: fix path to libusb buildlink3 file 2018-02-15 07:30:11 +00:00
wiz
8f568c47d0 caff: update to 2.7.
Bugfix release.
2018-02-11 16:06:42 +00:00
schmonz
efd4af3dde Pass --libpath=${SSLBASE}/lib to fix configure on CentOS 7. 2018-02-11 03:37:22 +00:00
khorben
b69741eca1 Import global switch for libusb's implementation [2/2]
This switch is meant to be used by packages requiring an implementation of the
former libusb (as in devel/libusb). The original implementation can be
chosen by setting LIBUSB_TYPE to "native".

The alternative implementation libusb-compat (as in devel/libusb-compat) wraps
libusb1 (in devel/libusb1). This implementation can be chosen by setting
LIBUSB_TYPE to "compat". On NetBSD, it has the advantage of not requiring root
privileges to locate and use USB devices without a kernel driver.

This second part switches packages using libusb to this framework. It does not
change compilation options or dependencies at this point.

Compile-tested on most packages affected and available on NetBSD/amd64.
2018-02-10 13:53:46 +00:00
adam
5459e99b34 py-m2crypto: updated to 0.28.2
0.28.0:
- Mainly port to Python 3 (supporting 2.6, 2.7, 3.3, 3.4, 3.5, 3.6)
- Some lame efforts to make setup.py build --openssl work better (needs
  more real testing on Mac OS X)
- Fix licence: it is MIT, not BSD
- Fix and add tests for SWIG/_aes.i module
- Improve somehow situation on Mac OS X (some testing, improve setup.py,
  testsuite should fully pass)
- Bundle-in unittest2 for Python 2.6 (dealing with the need for
  specific version of unittest2 package was too complicated)
- Remove all PGP modules
2018-02-09 08:44:50 +00:00
jperkin
453cf432d6 kwallet: Fix build, handle categories file correctly. 2018-02-08 13:49:03 +00:00
adam
a3d65dd7ac py-asyncssh: updated to 1.12.0
Release 1.12.0:
Enhanced AsyncSSH logging framework to provide detailed logging of events in the connection, channel, key exchange, authentication, sftp, and scp modules. Both high-level information logs and more detailed debug logs are available, and debug logging supports multiple debug levels with different amounts of verboseness. Logger objects are also available on various AsyncSSH classes to allow applications to report their own log events in a manner that can be tied back to a specific SSH connection or channel.
Added support for begin_auth() to be a coroutine, so asynchronous operations can be performed within it to load state needed to perform SSH authentication.
Adjusted key usage flags set on generated X.509 certificates to be more RFC compliant and work around an issue with OpenSSL validation of self-signed non-CA certificates.
Updated key and certificate comment handling to be less sensitive to the encoding of non-ASCII characters. The get_comment() and set_comment() functions now take an optional encoding paramter, defaulting to UTF-8 but allowing for others encodings. There’s also a get_comment_bytes() function to get the comment data as bytes without performing Unicode decoding.
Updated AsyncSSH to be compatible with beta release of Python 3.7.
Updated code to address warnings reported by the latest version of pylint.
Cleaned up various formatting issues in Sphinx documentation.
Significantly reduced time it takes to run unit tests by decreasing the rounds of bcrypt encryption used when unit testing encrypted OpenSSH private keys.
Added support for testing against uvloop in Travis CI.
2018-02-08 08:26:59 +00:00
maya
0c4346cbff bearssl: update to 0.5. From Charlotte Koch.
Added support for the BoarSSL / Twrch test framework.
Header files now include the ritual mantras that make them compatible with C++.
Better Makefile behaviour with Clang (FreeBSD compatibility).
Worked around a bug of GCC 4.8 and 4.9 in 32-bit x86 mode.
Incoming application data after initiating closure is now properly ignored.
Some instances of (critical) Certificate Policies extensions are now ignored (when it is safe to do so).
Fixed some behavioural bugs with regards to renegotiation (all were failing safe).
Added encoded OID for hash functions in the public API, to help with using RSA signatures in non-SSL contexts.
Fixed bug in AES/CBC decryption on x86 with AES-NI opcode (this was breaking decryption with AES/CBC cipher suites and TLS 1.0 only).
Added an explicit stack buffer initialisation (some provably harmless accesses to uninitialised data were performed, Valgrind was not happy).
Fixed bug in the search tree for the cache of SSL sessions (occasional lock-ups).
Fixed bug in modular reduction in the special field for P-256 (this was infrequently breaking ECDSA signatures).
Added support for exporting keying material (RFC 5705).
Added new general-purpose API for AEAD implementations (in non-SSL contexts) and an AES/GCM implementation that follows that API.
Added a function to forget saved session parameter in the LRU cache.
Added a new ChaCha20 implementation that uses SSE2 on x86 architectures (both 32-bit and 64-bit).
2018-02-07 11:52:56 +00:00
adam
41cf6fff98 py-cryptodome: updated to 3.4.11
3.4.11:
Resolved issues
* GH-121. the record list was still not correct due to PEP3147
  and __pycache__ directories.

3.4.10:
Resolved issues
* When creating ElGamal keys, the generator wasn't a square residue:
  ElGamal encryption done with those keys cannot be secure under
  the DDH assumption.

3.4.9:
New features
* More meaningful error messages while importing an ECC key.

Resolved issues
* GH-123 and #125. The SSE2 command line switch was not always passed on 32-bit x86 platforms.
* GH-121. The record list (--record) was not always correctly filled for the
  pycryptodomex package.
2018-02-07 10:44:51 +00:00
wiz
3e33c190bb py-crcmod: fix typo in variable
Fixes download.
2018-02-04 16:21:19 +00:00
fhajny
cbd3d9e306 Update security/py-{acme,certbot} to 0.21.1.
- When creating an HTTP to HTTPS redirect in Nginx, we now ensure the
  Host header of the request is set to an expected value before
  redirecting users to the domain found in the header. The previous way
  Certbot configured Nginx redirects was a potential security issue
- Fixed a problem where Certbot's Apache plugin could fail HTTP-01
  challenges if basic authentication is configured for the domain you
  request a certificate for.
- certbot-auto --no-bootstrap now properly tries to use Python 3.4 on
  RHEL 6 based systems rather than Python 2.6.
2018-02-02 15:36:08 +00:00
jperkin
4e0edfb4fb botan-devel: Leave pkgsrc to handle security features. Fix SunOS. 2018-02-02 13:56:35 +00:00
jperkin
20648607ff libressl: Leave pkgsrc to handle security features. 2018-02-02 13:46:00 +00:00
jperkin
a1ec7a4bab stunnel: Leave pkgsrc to handle security features. 2018-02-02 09:41:04 +00:00
jperkin
2c66eee1cd libssh: Leave pkgsrc to handle security features. 2018-02-02 09:31:29 +00:00
jperkin
d1faa97e15 libprelude: Don't break std::mktime. 2018-01-31 12:55:29 +00:00
markd
0d68fa453c security: add qgpgme 2018-01-31 11:37:16 +00:00
markd
116bd96761 qgpgme: Add version 1.10.0
Qt bindings for GPGme
2018-01-31 11:36:14 +00:00
markd
ac8fb0942e security: add qca2-qt5{,-gnupg,-ossl} 2018-01-31 09:16:33 +00:00
markd
774f5d18f0 qca2{,-qt5}{,-gnupg,-ossl}: update to 2.1.0
New in 2.1.0
  - Ported to Qt5 (Qt4 also supported)
  - New building system. CMake instead of qmake
  - Added CTR symetric cipher support to qca core
  - Added no padding encryption algorithm to qca core
  - qcatool2 renamed to qcatool
  - fixed crash in qcatool when only options provided on command line without
    any commands
  - Use plugins installation path as hard-coded runtime plugins search path
  - Added new functiion pluginPaths
  - Added functions to get runtime QCA version
  - Fixed 'no watch file' warnings in FileWatch
  - Added EME_PKCS1v15_SSL Encryption Algorithm
  - New implementation of SafeTimer to prevent crashes
  - Updated certificates for unittests
  - RSA Keys are permutable, can encrypt with private and decrypt with public
  - Add unloadProvider() function for symmetry with insertProvider()
  - Overloaded "makeKey" to derive a password depending on a time factor
  - Remove pointer to deinit() routine from QCoreApplication at deinitialization
  - Fix a couple of crashes where all plugins might not be available
  - Fix operating on keys with unrelated expired subkeys
  - Fixed timers in Synchronizer class
  - Dropped randomunittest
  - Fixed many unittests
  - qca-gnupg: internal refactoring
  - qca-gnupg: try both gpg and gpg2 to find gnupg executable
  - qca-gnupg: fixed some encodings problem
  - qca-ossl: no DSA_* dl groups in FIPS specification
  - qca-ossl: added missed signatures to CRLContext
  - qca-ossl: fixed certs time zone
  - qca-nss: fixed KeyLenght for Cipher
  - qca-botan: fixed getting result size for ciphers
2018-01-31 09:14:55 +00:00
adam
bd032ccec8 py-cryptodome: updated to 3.4.8
3.4.8:

New features
* Added a native extension in pure C for modular exponentiation, optimized for SSE2 on x86.
  In the process, we drop support for the arbitrary arithmetic library MPIR
  on Windows, which is painful to compile and deploy.
  The custom  modular exponentiation is 130% (160%) slower on an Intel CPU in 32-bit (64-bit) mode,
  compared to MPIR. Still, that is much faster that CPython's own `pow()` function which
  is 900% (855%) slower than MPIR. Support for the GMP library on Unix remains.
* Added support for *manylinux* wheels.
* Support for Python 3.7.

Resolved issues
* The DSA parameter 'p' prime was created with 255 bits cleared
  (but still with the correct strength).
* Not all docs were included in the tar ball.
* ECDSA verification failed for DER encoded signatures.
* Human-friendly messages for padding errors with ECB and CBC.
2018-01-31 07:57:25 +00:00
bsiegert
f918d62e6f New package, py-crcmod.
The software in this package is a Python module for generating objects that
compute the Cyclic Redundancy Check (CRC). There is no attempt in this package
to explain how the CRC works. There are a number of resources on the web that
give a good explanation of the algorithms.

This package allows the use of any 8, 16, 24, 32, or 64 bit CRC. You can
generate a Python function for the selected polynomial or an instance of the
Crc class which provides the same interface as the md5 and sha modules from the
Python standard library. A Crc class instance can also generate C/C++ source
code that can be used in another application.

Part of PR pkg/52941.
2018-01-30 19:07:48 +00:00
fhajny
d76039b62f Update security/vault to 0.9.3.
## 0.9.3 (January 28th, 2018)

A regression from a feature merge disabled the Nomad secrets backend in 0.9.2.
This release re-enables the Nomad secrets backend; it is otherwise identical to
0.9.2.

## 0.9.2 (January 26th, 2018)

SECURITY:

* Okta Auth Backend: While the Okta auth backend was successfully verifying
  usernames and passwords, it was not checking the returned state of the
  account, so accounts that had been marked locked out could still be used to
  log in. Only accounts in SUCCESS or PASSWORD_WARN states are now allowed.
* Periodic Tokens: A regression in 0.9.1 meant that periodic tokens created by
  the AppRole, AWS, and Cert auth backends would expire when the max TTL for
  the backend/mount/system was hit instead of their stated behavior of living
  as long as they are renewed. This is now fixed; existing tokens do not have
  to be reissued as this was purely a regression in the renewal logic.
* Seal Wrapping: During certain replication states values written marked for
  seal wrapping may not be wrapped on the secondaries. This has been fixed,
  and existing values will be wrapped on next read or write. This does not
  affect the barrier keys.

DEPRECATIONS/CHANGES:

* `sys/health` DR Secondary Reporting: The `replication_dr_secondary` bool
  returned by `sys/health` could be misleading since it would be `false` both
  when a cluster was not a DR secondary but also when the node is a standby in
  the cluster and has not yet fully received state from the active node. This
  could cause health checks on LBs to decide that the node was acceptable for
  traffic even though DR secondaries cannot handle normal Vault traffic. (In
  other words, the bool could only convey "yes" or "no" but not "not sure
  yet".) This has been replaced by `replication_dr_mode` and
  `replication_perf_mode` which are string values that convey the current
  state of the node; a value of `disabled` indicates that replication is
  disabled or the state is still being discovered. As a result, an LB check
  can positively verify that the node is both not `disabled` and is not a DR
  secondary, and avoid sending traffic to it if either is true.
* PKI Secret Backend Roles parameter types: For `ou` and `organization`
  in role definitions in the PKI secret backend, input can now be a
  comma-separated string or an array of strings. Reading a role will
  now return arrays for these parameters.
* Plugin API Changes: The plugin API has been updated to utilize golang's
  context.Context package. Many function signatures now accept a context
  object as the first parameter. Existing plugins will need to pull in the
  latest Vault code and update their function signatures to begin using
  context and the new gRPC transport.

FEATURES:

* **gRPC Backend Plugins**: Backend plugins now use gRPC for transport,
  allowing them to be written in other languages.
* **Brand New CLI**: Vault has a brand new CLI interface that is significantly
  streamlined, supports autocomplete, and is almost entirely backwards
  compatible.
* **UI: PKI Secret Backend (Enterprise)**: Configure PKI secret backends,
  create and browse roles and certificates, and issue and sign certificates via
  the listed roles.

IMPROVEMENTS:

* auth/aws: Handle IAM headers produced by clients that formulate numbers as
  ints rather than strings [GH-3763]
* auth/okta: Support JSON lists when specifying groups and policies [GH-3801]
* autoseal/hsm: Attempt reconnecting to the HSM on certain kinds of issues,
  including HA scenarios for some Gemalto HSMs.
  (Enterprise)
* cli: Output password prompts to stderr to make it easier to pipe an output
  token to another command [GH-3782]
* core: Report replication status in `sys/health` [GH-3810]
* physical/s3: Allow using paths with S3 for non-AWS deployments [GH-3730]
* physical/s3: Add ability to disable SSL for non-AWS deployments [GH-3730]
* plugins: Args for plugins can now be specified separately from the command,
  allowing the same output format and input format for plugin information
  [GH-3778]
* secret/pki: `ou` and `organization` can now be specified as a
  comma-separated string or an array of strings [GH-3804]
* plugins: Plugins will fall back to using netrpc as the communication protocol
  on older versions of Vault [GH-3833]

BUG FIXES:

* auth/(approle,aws,cert): Fix behavior where periodic tokens generated by
  these backends could not have their TTL renewed beyond the system/mount max
  TTL value [GH-3803]
* auth/aws: Fix error returned if `bound_iam_principal_arn` was given to an
  existing role update [GH-3843]
* core/sealwrap: Speed improvements and bug fixes (Enterprise)
* identity: Delete group alias when an external group is deleted [GH-3773]
* legacymfa/duo: Fix intermittent panic when Duo could not be reached
  [GH-2030]
2018-01-30 16:37:35 +00:00
mef
2c03bffcc1 Updated security/easy-rsa to 3.0.5
3.0.5
   * Fix #17 & #58: use AES256 for CA key
        * Also, don't use read -s, use stty -echo

3.0.4
    * Remove use of egrep (#154)
    * Integrate with Travis-CI (#165)
    * Remove "local" from variable assignment (#165)
        * Other changes related to Travis-CI fixes
        * Assign values to variables defined previously w/local
    * Finally(?) fix the subjectAltName issues I presented earlier (really
    fixes #168
2018-01-30 14:34:06 +00:00
mef
93b44c5830 security/xmlsec1 updated 1.2.19 to 1.2.25
on 12 Sep 2017 xmlsec-1_2_25 XMLSec release 1.2.25
on 20 Apr 2017 xmlsec-1_2_24 XMLSec release 1.2.24

2016-10-15 Aleksey Sanin  <aleksey@aleksey.com>
	* 1.2.23 release

2016-10-14 Aleksey Sanin  <aleksey@aleksey.com>
	* Fixed gcrypto RSA/DSA keys params ordering

2016-10-12 Aleksey Sanin  <aleksey@aleksey.com>
	* Better X509Data templates

2016-10-07 Aleksey Sanin  <aleksey@aleksey.com>
	* Fixed memory leak caused by xmlGetProp (patch from Dafan Zhai)
	* Fixed KW transforms (overlapping buffer error) for OpenSSL 1.1.0
	* Fixed pkg-config detection

2016-09-27 Aleksey Sanin  <aleksey@aleksey.com>
	* Added initial support OpenSSL 1.1.0 (patch from Andrzej Siewior)

2016-09-19 Aleksey Sanin  <aleksey@aleksey.com>
	* Fixed signing with RSA SHA2 via mscrypto (patch from PepaRokos)

2016-07-08 Aleksey Sanin  <aleksey@aleksey.com>
	* Fixed mscrypto undeclared XMLSEC_DEFAULT_CRYPTO (patch from vmiklos)

2016-05-31 Aleksey Sanin  <aleksey@aleksey.com>
	* Fixed mismatched conditional for XMLSEC_NO_ECDSA (patch from Eric Sproul)

2016-05-20 Aleksey Sanin  <aleksey@aleksey.com>
	* Fixed openssl cert depth verification param usage (patch from R-Tur)

2016-04-22 Aleksey Sanin  <aleksey@aleksey.com>
	* Fixed stdin/stdout in xmlsec1 app

2016-04-20 Aleksey Sanin  <aleksey@aleksey.com>
	* Restored SOAP support for Lasso
	* 1.2.22 release

2016-04-12 Aleksey Sanin  <aleksey@aleksey.com>
        * 1.2.21 release

2016-02-17 Aleksey Sanin  <aleksey@aleksey.com>
        * Added OOXML Relationships Transform Algorithm (patch from Miklos Vajna)

2016-02-06 Aleksey Sanin  <aleksey@aleksey.com>
        * Deprecated XMLSEC_CRYPTO define in favor of xmlSecGetDefaultCrypto() function

2016-02-05 Aleksey Sanin  <aleksey@aleksey.com>
        * Revamped manpages/documentation build to completely pass 'make distcheck' tests

2016-01-28 Aleksey Sanin  <aleksey@aleksey.com>
        * Added OpenSSL 1.1.0 API support (major refactoring for block ciphers and DSA/ECDSA signatures)

2016-01-28 Aleksey Sanin  <aleksey@aleksey.com>
        * Migrated to GitHub (https://github.com/lsh123/xmlsec)

2015-03-10 Aleksey Sanin  <aleksey@aleksey.com>
        * Removed support for legacy OpenSSL 0.9.6 (last release: March, 2004) and 0.9.7 (last release: February, 2007)

2014-10-2014 Aleksey Sanin  <aleksey@aleksey.com>
        * Added experimental GOST2012 support (patch from Nikolay Shaplov)

2014-06-04 Aleksey Sanin  <aleksey@aleksey.com>
        * Fixed several compaints from Clang and Coverity (based on patches from Simo Sorce)

2014-02-25 Aleksey Sanin  <aleksey@aleksey.com>
        * Removed XKMS support -- it was never completed and not worth keeping

2013-05-23 Aleksey Sanin  <aleksey@aleksey.com>
        * 1.2.20 release

2014-05-23  Aleksey Sanin  <aleksey@aleksey.com>
        * fix build on MacOSX (bug #680307)
        * update certs for examples (bug #674572)
        * update test certs to be valid till 2114
        * don't create files on xmlsec-mscrypto when loading the key (bug #633924)
        * clarify min OpenSSL requirements

2014-05-23  Aleksey Sanin  <aleksey@aleksey.com>
        * better detect private keys on ext RSA engines (bug #728213)
        * fixed CRL check

2014-02-17  Aleksey Sanin  <aleksey@aleksey.com>
        * fixes for RH 6x

2013-07-19  Aleksey Sanin  <aleksey@aleksey.com>
        * fixed switch - added missed break keywords (bug #704574)

2013-06-03  Aleksey Sanin  <aleksey@aleksey.com>
        * fix memory leak in converting cert subject

2013-05-09  Aleksey Sanin  <aleksey@aleksey.com>
        * disable network access during internal xml transform parser

2013-04-12  Aleksey Sanin  <aleksey@aleksey.com>
        * fix typo (fixed bug 695605)

2013-03-28  Aleksey Sanin  <aleksey@aleksey.com>
        * disable ECDSA if needed (Daniel)

2013-03-24  Aleksey Sanin  <aleksey@aleksey.com>
        * docs rebuild
2018-01-30 13:25:19 +00:00
sborrill
08169e7809 lynis: update to 2.6.1
Changes:
--------
* Tests can have more than 1 required OS (e.g. Linux OR NetBSD)
* Added 'system-groups' option to profile (Enterprise users)
* Overhaul of default profile and migrate to new style (setting=value)
* Show warning if old profile options are used
* Improved detection of binaries
* New group 'usb' for tests related to USB devices

Tests:
------
* [FILE-6363] - New test for /var/tmp (sticky bit)
* [MAIL-8802] - Added exim4 process name to improve detection of Exim
* [NETW-3030] - Changed name of dhcp client name process and added udhcpc
* [SSH-7408] - Restored UsePrivilegeSeparation
* [TIME-3170] - Added chrony configuration file for NetBSD
2018-01-30 08:43:02 +00:00
he
5598fadd14 Fix the examples directory in MESSAGE to match where it is...
Bump PKGREVISION.
2018-01-29 09:48:45 +00:00
wiz
bff4597ffc Bump PKGREVISION for gdbm shlib major bump 2018-01-28 20:10:34 +00:00
wiz
691456c467 py-certifi: update to 2018.1.18.
Changes not found.
2018-01-28 16:38:18 +00:00
wiz
58a2a977a7 recursive bump after mpfr shlib major bump 2018-01-28 16:24:10 +00:00
bouyer
1e7228e2f0 Fix PLIST after clamav update 2018-01-28 13:22:53 +00:00
markd
63d72509a0 kauth: allow overriding the dbus install directory 2018-01-27 19:08:12 +00:00
roy
8115ceeee2 Import keychain-2.8.5 with the following improvements:
*  gnupg socket support
  *  better portability
2018-01-27 10:00:15 +00:00
bouyer
27605b8608 Fix memory/file descriptor leak in cli_scanscript().
Bump PKGREVISION.
2018-01-26 16:26:57 +00:00
bouyer
44650970f1 Reset PKGREVISION, ride previous package version bump. 2018-01-26 16:24:32 +00:00
jperkin
d24a7ffc58 sbd: Specify c++03 to avoid conflicts with std::bind. 2018-01-26 13:36:43 +00:00
bouyer
5905717e06 Update clamav and clamav-doc to 0.99.3. Changes since 0.99.2:
Security release fixing CVE-2017-12374, CVE-2017-12375, CVE-2017-12376,
CVE-2017-12377, CVE-2017-12378, CVE-2017-12379, CVE-2017-12380.
Also included are 2 minor fixes to properly detect openssl install locations on FreeBSD 11, and prevent false warnings about zlib 1.2.1# version numbers.
2018-01-26 12:20:16 +00:00
markd
52de0eb5b4 libssh: fix options.mk for current cmake based build 2018-01-25 19:52:38 +00:00
markd
e9c46ca027 kf5: strip -fvisibility=hidden in all kf5 packages
as it breaks the plugin mechanism due to not being able to
resolve various symbols
2018-01-24 19:06:06 +00:00
jperkin
41e1164ae6 qca2: Don't override QMAKE_MACOSX_DEPLOYMENT_TARGET. 2018-01-23 12:57:04 +00:00
fhajny
74add85d4c Update security/py-{acme,certbot} to 0.21.0.
### Added

- Support for the HTTP-01 challenge type was added to our Apache and Nginx
  plugins.
- IPv6 support was added to the Nginx plugin.
- Support for automatically creating server blocks based on the default server
  block was added to the Nginx plugin.
- The flags --delete-after-revoke and --no-delete-after-revoke were added
  allowing users to control whether the revoke subcommand also deletes the
  certificates it is revoking.

### Changed

- We deprecated support for Python 2.6 and Python 3.3 in Certbot and its ACME
  library.
- We split our implementation of JOSE (Javascript Object Signing and
  Encryption) out of our ACME library and into a separate package named josepy.
- We updated the ciphersuites used in Apache to the new values recommended by
  Mozilla

### Fixed

- An issue with our Apache plugin on Gentoo due to differences in their
  apache2ctl command have been resolved.
2018-01-22 13:37:25 +00:00
fhajny
95130c03ad Import josepy-1.0.1 as security/py-josepy.
JOSE protocol implementation in Python using cryptography.
2018-01-22 13:30:08 +00:00
leot
3ac4a82005 sqlmap: Update security/sqlmap to 1.2
Changes
(unfortunately upstream does not provide any changelog, this is based by
reading commit messages):
1.2
---
- Misc improvements and bug fixes

1.1.11
------
- Add support for Apache SHA1
- Add support for Joomla password
- Add support for vBulletin password hashes
- Add support for DJANGO_MD5 and DJANGO_SHA1
- Add WAF script for Wordfence
- Add WAF script for DOSarrest
- Misc improvements and bug fixes

1.1.10
------
- Polish translation
- Add support for blind-based charset dump
- Misc improvements and bug fixes
2018-01-21 21:46:34 +00:00
roy
2aa9c0a5d5 Update to keychain-2.8.4:
Uses id instead of whoami for better portability.
  GPG2 support, support for busybox ps and various optimizations.
2018-01-21 16:03:29 +00:00
markd
6c0ee424db Pass --disable-pinentry-fltk to configure to fix build when fltk installed 2018-01-20 11:06:13 +00:00
abs
a37d2c3937 Pass --disable-pinentry-fltk to configure to fix build when fltk installed 2018-01-19 13:36:42 +00:00
wiz
8408a2413f p5-Net-SSLeay: switch TEST_DEPENDS back to BUILD_DEPENDS
In pbulk with PKGSRC_RUN_TESTS, test dependencies are not installed
but expected.
2018-01-19 09:44:36 +00:00
adam
fe6e1fcfa9 py-requests-kerberos: updated to 0.12.0
0.12.0:
- Add support for channel binding tokens (assumes pykerberos support >= 1.2.1)
- Add support for kerberos message encryption (assumes pykerberos support >= 1.2.1)
- Misc CI/test fixes
2018-01-19 09:10:04 +00:00
sborrill
1a63599d49 lynis: update to 2.6.0
Changes:
--------
* Binary paths are now sorted
* Greek language added
* systemd detection improved
* VirtualBox detection extended
* Several code enhancements

Tests:
------
* [PHP-2379] - Small enhancement to resolve error on screen in some cases
* [MALW-3280] - Improved detection for BitDefender tooling
2018-01-18 16:42:40 +00:00
sborrill
d0ee27ce4d Make sure .orig files aren't installed 2018-01-18 16:26:05 +00:00
sborrill
71777ca9c3 Fix path in patch 2018-01-18 13:22:18 +00:00
markd
e92e325fbb kwallet: remove old patch 2018-01-18 05:10:44 +00:00
jnemeth
1902c33594 add and enable lynis 2018-01-18 04:57:22 +00:00
markd
41773c874e kf5: update to 5.41.0
16 months worth of updates. requires qt5>=5.7
2018-01-17 20:00:20 +00:00
markd
9e510201d4 kwalletmanager: PLIST changes for polkit-qt update 2018-01-17 18:59:53 +00:00
markd
1211c9a350 polkit-qt: update to 0.112.0
matching the polkit-qt5 version, and switching to polkit.
2018-01-17 18:48:26 +00:00
wiz
48f3fc592b p5-Net-SSLeay: update to 1.84.
Use TEST_DEPENDS.

1.84 2018-01-17
	Fixed an error in t/local/04_basic.t causing a test failure if
	Test::Exception not installed. Reported by Joel Berger.

1.83 2018-01-16
	Fixed a problem with exporting OPENSSL_NO_NEXTPROTONEG even though they are not availble on LibreSSL.
	Patch patch-SSLeay_xs-NO_NPN from Alexander Bluhm.
	Patch from Heikki Vatiainen adds support for SSL_set_default_passwd_cb* for
	OpenSSL 1.1.0f and later. LibreSSL does not support these functions, at
	least yet.
	Patch from Heikki Vatiainen adds new functions related to SSL_CTX_new.
	Patch from Heikki Vatiainen adds two new functions introduced in OpenSSL 1.1.0, a number
	of constants and a couple of const qualifiers to SSLeay.xs. Tests and
	documentation .pod were also updated.
	Patch from Heikki Vatiainen adds one new OpenSSL 1.1.0 function and has a minor fix for
	LibreSSL version detection:
	*   Added support for SSL_use_certificate_chain_file
     	function introduced in OpenSSL 1.1.0.
	*   Fixed LibreSSL version detection to correctly parse
     	LibreSSL minor version.
	Patch from Steffen Ulrich to fix memory leaks in OCSP handling. Thanks.
	Patch from Heikki Vatiainen adds new functions for certificate verification introduced in
	OpenSSL 1.02, a number of constants, new test data files, new tests and
	updates to .pod documentation.
	The new functions provide access to the built-in wildcard check
	functionality available in OpenSSL 1.0.2 and later.
	The patch also adds new tests for the new functions and updates some of
	the current tests for CTX_set_default_passwd_cb* functions.
	Added X509_STORE_CTX_new and X509_verify_cert.
	SSL_OCSP_response_verify now clears the error queue if OCSP_basic_verify fails but the
	intermediate certificate succeeds. Patch from Stefan Ullrich.
2018-01-17 08:52:51 +00:00
fhajny
1869f5db99 Update security/fast_tls to 1.0.20.
Version 1.0.20
- Include uthash.h in hex package

Version 1.0.19
- Fix couple memory leaks
- Switch hashmap to uthash library
- Use system allocator in openssl
- Update ciphers and option to safer defaults
2018-01-16 12:16:22 +00:00
jperkin
d525a984c7 openssl: Don't set LD_LIBRARY_PATH during build. 2018-01-16 09:48:46 +00:00
sborrill
f94537ebc1 lynis: add 2.5.9
Lynis is an open source security auditing tool. Used by system
administrators, security professionals, and auditors, to evaluate the
security defenses of their Linux and Unix-based systems. It runs on the host
itself, so it performs more extensive security scans than vulnerability
scanners.
2018-01-15 12:38:37 +00:00
jnemeth
0f612ec608 set sane default location for config file 2018-01-15 09:26:23 +00:00
maya
ea36019c88 sudo: avoid segfault if hostname is empty
from andrew hall in pr pkg/52923
PKGREVISION++
2018-01-14 15:29:38 +00:00
jaapb
2db819ded7 Recursive revbump associated with the update to OCaml 4.06. 2018-01-10 16:53:07 +00:00
jaapb
072d2bf47a Updated package security/ocaml-ssl to version 0.5.5.
This introduces compatibility with OCaml 4.06 (or rather safe-string)
and honours LDFLAGS during build.
2018-01-10 16:44:16 +00:00
wiz
215c1a4e0d pinentry-gtk2: update to 1.1.0.
See pinentry.
2018-01-10 12:30:00 +00:00
wiz
2e3cf37d6f pinentry: update to 1.1.0.
Noteworthy changes in version 1.1.0 (2017-12-03)
------------------------------------------------

 * A FLTK1.3-based pinentry has been contributed.

 * A TQt3-based pinentry has been contributed.

 * New option --ttyalert for pinentry-curses to alert the user.

 * Don't show "save passphrase" checkbox if secret service is
   unavailable.

 * The GTK Pinentry shows on Linux some information anout the process
   which invoked the Pinentry.

 * The GTK Pinentry does not anymore show tooltips when keyboard
   grabbing is enabled.

 * Fixed various minor problems.
2018-01-10 12:29:38 +00:00
adam
0d28a725ec py-argon2_cffi: updated to 18.1.0
18.1.0:
- It is now possible to use the ``argon2_cffi`` bindings against an Argon2 library that is provided by the system.
2018-01-10 09:39:10 +00:00
adam
0665b4cc80 Better -install_name on Darwin 2018-01-10 09:36:54 +00:00
wiz
c009f26104 p5-GnuPG-Interface: Add comment about gnupg2 support patch. 2018-01-09 10:22:47 +00:00
rillig
17e39f419d Fix indentation in buildlink3.mk files.
The actual fix as been done by "pkglint -F */*/buildlink3.mk", and was
reviewed manually.

There are some .include lines that still are indented with zero spaces
although the surrounding .if is indented. This is existing practice.
2018-01-07 13:03:53 +00:00
fhajny
40781a6508 Update security/erlang-fast_tls to 1.0.18.
- Do not report badly formed Client Hello as a TLS error
- Report meaningful error when SNI callback fails
- Add Server Name Indication support for server connections
- Libressl only offer pre 1.1 api even if it present version > 1.1
- Fix crash on Mac OS X High Sierra due to replacement of system
  OpenSSL with BoringSSL
2018-01-03 20:48:28 +00:00
rillig
7a5e496e68 Added missing LICENSE variable. 2018-01-03 01:04:54 +00:00
jperkin
e671c7d641 policykit-gnome: Disable gtk-doc, requires gtkdoc-mktmpl. 2018-01-02 10:45:54 +00:00
fhajny
3abc583dc2 Update security/vault to 0.9.1.
DEPRECATIONS/CHANGES:

- AppRole Case Sensitivity: In prior versions of Vault, `list` operations
  against AppRole roles would require preserving case in the role name, even
  though most other operations within AppRole are case-insensitive with
  respect to the role name. This has been fixed; existing roles will behave as
  they have in the past, but new roles will act case-insensitively in these
  cases.
- Token Auth Backend Roles parameter types: For `allowed_policies` and
  `disallowed_policies` in role definitions in the token auth backend, input
  can now be a comma-separated string or an array of strings. Reading a role
  will now return arrays for these parameters.
- Transit key exporting: You can now mark a key in the `transit` backend as
  `exportable` at any time, rather than just at creation time; however, once
  this value is set, it still cannot be unset.
- PKI Secret Backend Roles parameter types: For `allowed_domains` and
  `key_usage` in role definitions in the PKI secret backend, input
  can now be a comma-separated string or an array of strings. Reading a role
  will now return arrays for these parameters.
- SSH Dynamic Keys Method Defaults to 2048-bit Keys: When using the dynamic
  key method in the SSH backend, the default is now to use 2048-bit keys if no
  specific key bit size is specified.
- Consul Secret Backend lease handling: The `consul` secret backend can now
  accept both strings and integer numbers of seconds for its lease value. The
  value returned on a role read will be an integer number of seconds instead
  of a human-friendly string.
- Unprintable characters not allowed in API paths: Unprintable characters are
  no longer allowed in names in the API (paths and path parameters), with an
  extra restriction on whitespace characters. Allowed characters are those
  that are considered printable by Unicode plus spaces.

FEATURES:

- Transit Backup/Restore: The `transit` backend now supports a backup
  operation that can export a given key, including all key versions and
  configuration, as well as a restore operation allowing import into another
  Vault.
- gRPC Database Plugins: Database plugins now use gRPC for transport,
  allowing them to be written in other languages.
- Nomad Secret Backend: Nomad ACL tokens can now be generated and revoked
  using Vault.
- TLS Cert Auth Backend Improvements: The `cert` auth backend can now
  match against custom certificate extensions via exact or glob matching, and
  additionally supports max_ttl and periodic token toggles.

IMPROVEMENTS:

- auth/cert: Support custom certificate constraints
- auth/cert: Support setting `max_ttl` and `period`
- audit/file: Setting a file mode of `0000` will now disable Vault from
  automatically `chmod`ing the log file
- auth/github: The legacy MFA system can now be used with the GitHub auth
  backend
- auth/okta: The legacy MFA system can now be used with the Okta auth backend
- auth/token: `allowed_policies` and `disallowed_policies` can now be specified
  as a comma-separated string or an array of strings
- command/server: The log level can now be specified with `VAULT_LOG_LEVEL`
- core: Period values from auth backends will now be checked and applied to the
  TTL value directly by core on login and renewal requests
- database/mongodb: Add optional `write_concern` parameter, which can be set
  during database configuration. This establishes a session-wide write
  concern for the lifecycle of the mount
- http: Request path containing non-printable characters will return 400 - Bad
  Request
- mfa/okta: Filter a given email address as a login filter, allowing operation
  when login email and account email are different
- plugins: Make Vault more resilient when unsealing when plugins are
  unavailable
- secret/pki: `allowed_domains` and `key_usage` can now be specified
  as a comma-separated string or an array of strings
- secret/ssh: Allow 4096-bit keys to be used in dynamic key method
- secret/consul: The Consul secret backend now uses the value of `lease` set
  on the role, if set, when renewing a secret.
- storage/mysql: Don't attempt database creation if it exists, which can help
  under certain permissions constraints

BUG FIXES:

- api/status (enterprise): Fix status reporting when using an auto seal
- auth/approle: Fix case-sensitive/insensitive comparison issue
- auth/cert: Return `allowed_names` on role read
- auth/ldap: Fix incorrect control information being sent
- core: Fix seal status reporting when using an autoseal
- core: Add creation path to wrap info for a control group token
- core: Fix potential panic that could occur using plugins when a node
  transitioned from active to standby
- core: Fix memory ballooning when a connection would connect to the cluster
  port and then go away -- redux!
- core: Replace recursive token revocation logic with depth-first logic, which
  can avoid hitting stack depth limits in extreme cases
- core: When doing a read on configured audited-headers, properly handle case
  insensitivity
- core/pkcs11 (enterprise): Fix panic when PKCS#11 library is not readable
- database/mysql: Allow the creation statement to use commands that are not yet
  supported by the prepare statement protocol
- plugin/auth-gcp: Fix IAM roles when using `allow_gce_inference`
2018-01-02 09:35:44 +00:00
maya
e48d11bf83 Remove traces of crypto restrictions from packages.
ok for idea riastradh.
2018-01-02 05:37:22 +00:00
rillig
b381c6e2f3 Sort PLIST files.
Unsorted entries in PLIST files have generated a pkglint warning for at
least 12 years. Somewhat more recently, pkglint has learned to sort
PLIST files automatically. Since pkglint 5.4.23, the sorting is only
done in obvious, simple cases. These have been applied by running:

  pkglint -Cnone,PLIST -Wnone,plist-sort -r -F
2018-01-01 22:29:15 +00:00
adam
983847f667 Revbump after boost update 2018-01-01 21:18:06 +00:00
rillig
982cef7323 Cleaned up PLIST files.
The actual cleanup has been done by pkglint:
* Added missing identifier comments
* Replaced ${PKGMANDIR} with a simple man, since the infrastructure does
  all the magic for PLISTs
2018-01-01 18:33:32 +00:00
rillig
4760eca917 Replaced $(ROUND) with ${CURLY} variable references.
This has been a pkglint warning for several years now, and pkglint can even
fix it automatically. And it did for this commit.

Only in lang/mercury, two passes of autofixing were necessary because there
were nested variables.
2018-01-01 18:16:35 +00:00
wiz
67ea766c4c apache22: remove, it was eol'd in June 2017
Remove packages that only work with apache22.
Remove apache22 references.
2018-01-01 10:23:04 +00:00
wiz
ef622598f1 p5-Digest-SHA3: update to 1.03.
1.03  Mon Dec 25 00:08:10 MST 2017
	- added "--ignore-missing" and "--strict" options to sha3sum
		-- consistent with GNU coreutils
		-- ref. rt.cpan.org #123897

1.02  Fri Dec  8 22:44:46 MST 2017
	- added "tag" option (BSD-style checksums) to sha3sum
		-- consistent with GNU sha1sum, sha224sum, etc.
		-- thanks to Christopher Tubbs for suggestion
	- modified SHA3.pm to use XSLoader
		-- falls back to DynaLoader if necessary
2017-12-30 14:52:09 +00:00
wiz
d58aa3e988 p5-Digest-SHA: update to 6.01.
6.01  Mon Dec 25 00:08:08 MST 2017
	- added "--ignore-missing" and "--strict" options to shasum
		-- consistent with GNU coreutils
		-- ref. rt.cpan.org #123897
	- removed PERL_CORE preambles from test scripts
		-- preambles no longer needed for core testing
		-- thanks to Chris Williams for patch
		-- ref. rt.cpan.org #123863

6.00  Fri Dec  8 22:44:44 MST 2017
	- added "tag" option (BSD-style checksums) to shasum
		-- consistent with GNU sha1sum, sha224sum, etc.
		-- thanks to Christopher Tubbs for suggestion
	- modified SHA.pm to use XSLoader
		-- falls back to DynaLoader if necessary
	- decoupled Digest::SHA and Digest::SHA::PurePerl
		-- scripts/tests in each module now fully independent
		-- Digest::SHA::PurePerl to be phased out eventually
			-- past versions will remain available
2017-12-30 14:51:31 +00:00
wiz
ae3c6af700 p5-CryptX: update to 0.056.
0.056   2017-12-22
        - new Crypt::Stream::Rabbit
2017-12-30 14:50:46 +00:00
adam
cf6c6ad3b9 argon2: updated to 20171227
20171227:
Added ABI version number
AVX2/AVX-512F optimizations of BLAMKA
Set Argon2 version number from the command line
New bindings
Minor bug and warning fixes (no security issue)
2017-12-30 11:34:12 +00:00
plunky
b6fad88afb fix install: use INSTALL_SCRIPT for scripts 2017-12-28 07:01:46 +00:00
ryoon
10404af4e6 Fix RELRO build
* Fix pasto
2017-12-25 03:23:21 +00:00
wiz
4942fbd2c3 pyca: comment out dead sites 2017-12-24 10:12:10 +00:00
adam
76efedc93b py-keyring: updated to 10.5.1
10.5.1:
Prevent AttributeError on import when Debian has created broken dbus installs.
2017-12-21 14:06:32 +00:00
ryoon
c0820bea5d Revert PKGNAME change from gnupg2 to gnupg 2017-12-21 13:30:40 +00:00
ryoon
3ff89625b8 Restore PKGNAME to gnupg2 2017-12-21 13:15:21 +00:00
adam
f5a2246b38 gpgme: updated to 1.10.0
Noteworthy changes in version 1.10.0:
 * Now returns more specific error codes for decryption to distinguish
   between bad passphrase, user canceled, and no secret key.
 * Now returns key origin information if available.
 * Added context flag "auto-key-retrieve" to selectively enable the
   corresponding gpg option.
 * Added flag is_de_vs to decryption and verify results.
 * py: Use SEEK_SET as default for data.seek.
 * cpp: Various new APIs.
 * Reduced spawn overhead on Linux again.  Added new configure option
   --disable-linux-getdents to disable this feature for very old
   Linux versions.
 * Improved the Python bindings build system.
 * Made the test suite less fragile.
2017-12-21 09:47:31 +00:00
adam
8f7a6189ab gnupg2: updated to 2.2.4
Noteworthy changes in version 2.2.4:
  * gpg: Change default preferences to prefer SHA512.
  * gpg: Print a warning when more than 150 MiB are encrypted using a
    cipher with 64 bit block size.
  * gpg: Print a warning if the MDC feature has not been used for a
    message.
  * gpg: Fix regular expression of domain addresses in trust
    signatures.
  * agent: New option --auto-expand-secmem to help with high numbers
    of concurrent connections.  Requires libgcrypt 1.8.2 for having
    an effect.
  * dirmngr: Cache responses of WKD queries.
  * gpgconf: Add option --status-fd.
  * wks: Add commands --check and --remove-key to gpg-wks-server.
  * Increase the backlog parameter of the daemons to 64 and add
    option --listen-backlog.
  * New configure option --enable-run-gnupg-user-socket to first try a
    socket directory which is not removed by systemd at session end.
2017-12-21 09:45:41 +00:00
adam
8d144214f8 libassuan2: updated to 2.5.1
Noteworthy changes in version 2.5.1:
 * Fix c+p error in the previous usleep fix.

Noteworthy changes in version 2.5.0:
 * New function to change the system hooks for the socket
   interface.
 * Fix the use of the internal usleep in the nPth implementation.
 * Interface changes relative to the 2.4.0 release:
 assuan_sock_set_system_hooks   NEW.
2017-12-21 09:44:14 +00:00
jnemeth
032298222a sort 2017-12-21 07:12:39 +00:00
leot
431fc65a5d security/Makefile: Add py-keyrings.alt 2017-12-19 11:55:52 +00:00
leot
af61e5c32a py-keyrings.alt: Import py-keyrings.alt-2.3 as security/py-keyrings.alt
Alternate keyring backend implementations for use with the
keyring (security/py-keyring) package.

Packaged by myself in pkgsrc-wip.
2017-12-19 11:55:12 +00:00
jdolecek
b63a4ef664 Update php-ssh2 to current version 1.1.2, mainly for PHP 7.x support
Changes since 0.13:

1.1.2	- Version 1.1.2 is same as 1.1 except this release contains this
  changelog
- Fixed bug #72988 (Libor M.)
- Fixed bug #73198 (Langemeijer)
- Fixed php_url_parse issue (Remi Collet)
- fix Invalid write of size 1 (Remi Collet)
- Fixed bug #73819 (Mitch Hagstrand)
- Fixed bug #73410 (Mitch Hagstrand)
- Travis CI (Mitch Hagstrand)
- Various other fixes on PHP 7 code and code cleanup (Mitch Hagstrand,
  Libor M., Anatol Belski)
1.1.1	- Version 1.1.1 is same as 1.1 except this release contains this
  changelog
- Fixed bug #72988 (Libor M.)
- Fixed bug #73198 (Langemeijer)
- Fixed php_url_parse issue (Remi Collet)
- fix Invalid write of size 1 (Remi Collet)
- Fixed bug #73819 (Mitch Hagstrand)
- Fixed bug #73410 (Mitch Hagstrand)
- Travis CI (Mitch Hagstrand)
- Various other fixes on PHP 7 code and code cleanup (Mitch Hagstrand,
  Libor M., Anatol Belski)
1.1	-
1.0	- Release for PHP 7 (Sean DuBois)
- Made win32 builds depend on zlib and openssl extensions (Credomane Evonguard)
- Add blocking call to php_ssh2_direct_tcpip (Credomane Evonguard)
- Added explicit ssh2_disconnect function (Credomane Evonguard)
- Fixed bug #72150 - Fixing segfault when passing env variables (Krakjoe)
2017-12-19 10:07:41 +00:00
jdolecek
a5d52cdc21 reimport php-ssh2 as php-ssh2-0, to prepare for update of php-ssh2 to newer version which doesn't support PHP 5.6 any more 2017-12-19 10:04:06 +00:00
jperkin
e1ffb01531 lasso: Don't overwrite user CFLAGS.
Also remove patched configure.ac, we don't do that if we're also patching
configure as it doesn't achieve anything and can cause timestamp issues.
2017-12-18 15:33:59 +00:00
adam
e60cba6d43 py-asn1crypto: updated to 0.24.0
0.24.0
- `x509.Certificate().self_signed` will no longer return `"yes"` under any
  circumstances. This helps prevent confusion since the library does not
  verify the signature. Instead a library like oscrypto should be used
  to confirm if a certificate is self-signed.
- Added various OIDs to `x509.KeyPurposeId()`
- Added `x509.Certificate().private_key_usage_period_value`
- Added structures for parsing common subject directory attributes for
  X.509 certificates, including `x509.SubjectDirectoryAttribute()`
- Added `algos.AnyAlgorithmIdentifier()` for situations where an
  algorithm identifier may contain a digest, signed digest or encryption
  algorithm OID
- Fixed a bug with `x509.Certificate().subject_directory_attributes_value`
  not returning the correct value
- Fixed a bug where explicitly-tagged fields in a `core.Sequence()` would
  not function properly when the field had a default value
- Fixed a bug with type checking in `pem.armor()`
2017-12-17 16:54:02 +00:00
tnn
cc41a24d91 libassuan2: add MASTER_SITE mirror 2017-12-17 16:48:23 +00:00
fhajny
0d401ab265 Enable security/erlang-jose 2017-12-14 21:05:45 +00:00
fhajny
0475e21e84 Import jose-1.8.4 as security/erlang-jose.
JSON Object Signing and Encryption (JOSE) for Erlang and Elixir.
2017-12-14 21:04:40 +00:00
tron
6a78edf09a openssl: Fix packaging under macOS
The last change for fixing packaging under macOS did not work when
the object directory resides on a case insensitive file-system.
2017-12-14 20:44:20 +00:00
fhajny
83e05c2803 Update security/erlang-fast_tls to 1.0.17.
- Fix case clause introduced after migration to NIF.
2017-12-14 20:44:14 +00:00
jperkin
d18dbcfde9 openssl: Avoid case-sensitive issue on Darwin. Bump PKGREVISION. 2017-12-14 09:18:47 +00:00
adam
6980d27a2c libassuan2: updated to 2.4.5
Noteworthy changes in version 2.4.5:
* Avoid a blocking close on Windows with nPth.
2017-12-14 08:52:17 +00:00
adam
44d7df9449 libgcrypt: updated to 1.8.2
Noteworthy changes in version 1.8.2:

 * Bug fixes:
   - Do not use /dev/srandom on OpenBSD.
   - Fix test suite failure on systems with large pages.
   - Fix test suite to not use mmap on Windows.
   - Fix fatal out of secure memory status in the s-expression parser
     on heavy loaded systems.

 * Other:
   - Backport the auto expand secmem feature from master for use by
     the forthcoming GnuPG 2.2.4.
2017-12-14 08:49:54 +00:00
adam
0d997cbf47 libsodium: updated to 1.0.16
Version 1.0.16
 - Signatures computations and verifications are now way faster on
64-bit platforms with compilers supporting 128-bit arithmetic (gcc,
clang, icc). This includes the WebAssembly target.
 - New low-level APIs for computations over edwards25519:
`crypto_scalarmult_ed25519()`, `crypto_scalarmult_ed25519_base()`,
`crypto_core_ed25519_is_valid_point()`, `crypto_core_ed25519_add()`,
`crypto_core_ed25519_sub()` and `crypto_core_ed25519_from_uniform()`
(elligator representative to point).
 - `crypto_sign_open()`, `crypto_sign_verify_detached() and
`crypto_sign_edwards25519sha512batch_open` now reject public keys in
non-canonical form in addition to low-order points.
 - The library can be built with `ED25519_NONDETERMINISTIC` defined in
order to use synthetic nonces for EdDSA. This is disabled by default.
 - Webassembly: `crypto_pwhash_*()` functions are now included in
non-sumo builds.
 - `sodium_stackzero()` was added to wipe content off the stack.
 - Android: support new SDKs where unified headers have become the
default.
 - The Salsa20-based PRNG example is now thread-safe on platforms with
support for thread-local storage, optionally mixes bits from RDRAND.
 - CMAKE: static library detection on Unix systems has been improved
 - Argon2 and scrypt are slightly faster on Linux.
2017-12-14 08:39:09 +00:00
tsutsui
00b0af46a2 ruby-oauth: update to 0.5.4.
Upstream changes (from HISTORY):

=== 0.5.4 2017-12-08

* Fixes UnknownRequestType on Rails 5.1 for ActionDispatch::Request (xprazak2)
* Various cleanups (charliesome)
2017-12-09 19:18:47 +00:00
fhajny
b26be6dc85 Update security/openssl to 1.0.2n.
Read/write after SSL object in error state (CVE-2017-3737)
==========================================================

Severity: Moderate

OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state"
mechanism. The intent was that if a fatal error occurred during a handshake then
OpenSSL would move into the error state and would immediately fail if you
attempted to continue the handshake. This works as designed for the explicit
handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()),
however due to a bug it does not work correctly if SSL_read() or SSL_write() is
called directly. In that scenario, if the handshake fails then a fatal error
will be returned in the initial function call. If SSL_read()/SSL_write() is
subsequently called by the application for the same SSL object then it will
succeed and the data is passed without being decrypted/encrypted directly from
the SSL/TLS record layer.

In order to exploit this issue an application bug would have to be present that
resulted in a call to SSL_read()/SSL_write() being issued after having already
received a fatal error.

rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)
=========================================================

Severity: Low

There is an overflow bug in the AVX2 Montgomery multiplication procedure
used in exponentiation with 1024-bit moduli. No EC algorithms are affected.
Analysis suggests that attacks against RSA and DSA as a result of this defect
would be very difficult to perform and are not believed likely. Attacks
against DH1024 are considered just feasible, because most of the work
necessary to deduce information about a private key may be performed offline.
The amount of resources required for such an attack would be significant.
However, for an attack on TLS to be meaningful, the server would have to share
the DH1024 private key among multiple clients, which is no longer an option
since CVE-2016-0701.

This only affects processors that support the AVX2 but not ADX extensions
like Intel Haswell (4th generation).
2017-12-09 18:02:02 +00:00
fhajny
f3aa8b64a1 Update security/py-{acme,certbot} to 0.20.0.
0.20.0 - 2017-12-06

- Certbot's ACME library now recognizes URL fields in challenge
  objects in preparation for Let's Encrypt's new ACME endpoint.
- The Apache plugin now parses some distro specific Apache
  configuration files on non-Debian systems allowing it to get a
  clearer picture on the running configuration.
- Certbot better reports network failures by removing information
  about connection retries from the error output.
- An unnecessary question when using Certbot's webroot plugin
  interactively has been removed.
- Certbot's NGINX plugin no longer sometimes incorrectly reports that
  it was unable to deploy a HTTP->HTTPS redirect when requesting
  Certbot to enable a redirect for multiple domains.
- Problems where the Apache plugin was failing to find directives and
  duplicating existing directives on openSUSE have been resolved.
- An issue running the test shipped with Certbot and some our DNS
  plugins with older versions of mock have been resolved.
- On some systems, users reported strangely interleaved output
  depending on when stdout and stderr were flushed.

0.19.0 - 2017-10-04

- Certbot now has renewal hook directories where executable files can
  be placed for Certbot to run with the renew subcommand.
- After revoking a certificate with the revoke subcommand, Certbot
  will offer to delete the lineage associated with the certificate.
- When using Certbot's Google Cloud DNS plugin on Google Compute
  Engine, you no longer have to provide a credential file to Certbot
  if you have configured sufficient permissions for the instance which
  Certbot can automatically obtain using Google's metadata service.
- When deleting certificates interactively using the delete
  subcommand, Certbot will now allow you to select multiple lineages
  to be deleted at once.
- Certbot's Apache plugin no longer always parses Apache's
  sites-available on Debian based systems and instead only parses
  virtual hosts included in your Apache configuration.
- The plugins subcommand can now be run without root access.
- certbot-auto now includes a timeout when updating itself so it no
  longer hangs indefinitely when it is unable to connect to the
  external server.
- An issue where Certbot's Apache plugin would sometimes fail to
  deploy a certificate on Debian based systems if mod_ssl wasn't
  already enabled has been resolved.
- A bug in our Docker image where the certificates subcommand could
  not report if certificates maintained by Certbot had been revoked
  has been fixed.
- Certbot's RFC 2136 DNS plugin (for use with software like BIND) now
  properly performs DNS challenges when the domain being verified
  contains a CNAME record.
2017-12-09 16:39:03 +00:00
taca
a4b6c28585 security/php-oauth: Allow build with php71 and php72 2017-12-09 02:38:23 +00:00
jdolecek
8347875131 fix pasto 2017-12-06 21:48:40 +00:00
jdolecek
b51cc9a339 php-sodium expect dir name as parameter to --with-sodium, so use
BUILDLINK_PREFIX.libsodium; hopefully will fix bulk build, locally it builds
just fine without this for some reason
2017-12-06 21:47:18 +00:00
adam
f5ce11ceda py-gssapi: updated to 1.3.0
1.3.0:

Features
* Support RFC 5587: Extended GSS Mechanism Inquiry APIs
* Support RFC 5801: Using GSSAPI Mechanisms in SASL

Bugfixes
* Fix potential infinite recursion in GSSError#display_status when there is an error displaying the error
* Read the linker path during setup to support properly building with Heimdal on Debian
* Fix OID inequality comparison

Tooling
* k5test and gssapi-console now live in their own projects. They can be found at pythongssapi/k5test and pythongssapi/gssapi-console, respectively, and are available on PyPI as k5test and gssapi_console
2017-12-06 12:19:43 +00:00
triaxx
298769ee90 gnupg2: add missing -lintl LDFLAGS for FreeBSD 2017-12-05 22:29:53 +00:00
wiz
327733d070 easy-rsa: remove DIST_SUBDIR, not necessary 2017-12-04 07:19:55 +00:00
jnemeth
453d769fd2 Fix version number. Since this is brand new and didn't create a
proper package, don't bother with PKGREVISION bump.
2017-12-04 06:55:56 +00:00
jnemeth
bcc39c82dd add and enable easy-rsa 2017-12-04 06:19:37 +00:00
jnemeth
e9cb7c49f2 Import easy-rsa 3.0.3.
This is a shell script to aid with creating a Certificate Authority
and certificates for use with an OpenVPN server.  See
http://openvpn.net/howto.html for usage instructions along with
the documentation provided in this package.
2017-12-04 06:15:23 +00:00
wiz
f9a0b2e810 p5-Crypt-OpenSSL-Bignum: update to 0.09.
0.09    2017/12/01
        - fix #4 License is not specified in metadata
        - fix #6 Strip \n and \r out of $lib and $inc
        - fix #7 Fix building with OpenSSL 1.1.0
2017-12-03 08:42:23 +00:00
adam
baba6f3d16 pyOpenSSL: updated to 17.5.0
17.5.0:
Backward-incompatible changes:
* The minimum cryptography version is now 2.1.4.

Changes:
* Fixed a potential use-after-free in the verify callback and resolved a memory leak when loading PKCS12 files with cacerts.
* Added Connection.export_keying_material for RFC 5705 compatible export of keying material.
2017-12-01 08:53:17 +00:00
adam
8977d31a36 Revbump after textproc/icu update 2017-11-30 16:45:00 +00:00
adam
02d465109d py-cryptography[_vectors]: updated to 2.1.4
2.1.4:
Added X509_up_ref for an upcoming pyOpenSSL release.
2017-11-30 08:23:27 +00:00
adam
e0914ac83f py-cybox: updated to 2.1.0.16
Version 2.1.0.16
- Re-packaged 2.1.0.15 with newer setuptools to fix broken wheel.

Version 2.1.0.15
- Fully support PDFFile object.
- Add URI property to Artifact object.
- Support Object 'description' field.
- Add UnixUserAccount object.
- Fix error when PropertyTypes have 'delimiter' but no value.
- Allow setting 'condition' on Artifact object's RawArtifact propety.
- Support adding SSDEEP hashes.
- Don't include properties when adding Related Objects with inline=False.
- Handle 'event' property of Observables correctly.
2017-11-30 08:16:19 +00:00
adam
389d9c3efd py-gssapi: updated to 1.2.3
1.2.3:
Bug fixes.
2017-11-30 08:07:33 +00:00
triaxx
f6a5b5c9fa Add missing .mo files to PLIST
Since the last update, translations have been added but the additional files
have not been included into PLIST. The build failed in such a case:
PKG_OPTIONS.sudo= +nls
PKG_DEVELOPER= yes
2017-11-30 07:39:33 +00:00
wiz
6335d0d614 p5-CryptX: update to 0.055.
0.055   2017-11-28
        - new Crypt::Cipher::IDEA
        - new Crypt::Cipher::Serpent
        - new Crypt::Stream::Salsa20
        - new Crypt::Stream::Sosemanuk
        - added CCM object oriented interface: new-add-add-done
        - fix #39 accept CFLAGS and CPPFLAGS from the environment
        - fix #40 typos in POD
        - fix HMAC+SHA3 (now compliant with NIST test vectors)
2017-11-29 13:52:24 +00:00
wiz
1bde520d11 nettle: update to 3.4.
NEWS for the Nettle 3.4 release

	This release fixes bugs and adds a few new features. It also
	addresses an ABI compatibility issue affecting Nettle-3.1 and
	later, see below.

	Bug fixes:

	* Fixed an improper use of GMP mpn_mul, breaking curve2559 and
	  eddsa on certain platforms. Reported by Sergei Trofimovich.

	* Fixed memory leak when handling invalid signatures in
	  ecdsa_verify. Fix contributed by Nikos Mavrogiannopoulos.

	* Fix compilation error with --enable-fat om ARM. Fix
	  contributed by Andreas Schneider.

	* Reorganized the way certain data items are made available.

	  Short version: Nettle header files now define the symbols
	  nettle_hashes, nettle_ciphers, and nettle_aeads, as
	  preprocessor macros invoking a corresponding accessor
	  function. For backwards ABI compatibility, the symbols are
	  still present in the compiled libraries, and with the same
	  sizes as in nettle-3.3.

	New features:

	* Support for RSA-PSS signatures, contributed by Daiki Ueno.

	* Support for the HKDF key derivation function, defined by RFC
	  5869. Contributed by Nikos Mavrogiannopoulos.

	* Support for the Cipher Feedback Mode (CFB), contributed by
	  Dmitry Eremin-Solenikov.

	* New accessor functions: nettle_get_hashes,
	  nettle_get_ciphers, nettle_get_aeads, nettle_get_secp_192r1,
	  nettle_get_secp_224r1, nettle_get_secp_256r1,
	  nettle_get_secp_384r1, nettle_get_secp_521r1.

	  For source-level compatibility with future versions,
	  applications are encouraged to migrate to using these
	  functions instead of referring to the corresponding data
	  items directly.

	Miscellaneous:

	* The base16 and base64 functions now use the type char * for
	  ascii data, rather than uint8_t *. This eliminates the last
	  pointer-signedness warnings when building Nettle. This is a
	  minor API change, and applications may need to be adjusted,
	  but the ABI is unaffected on all platforms I'm aware of.

	* The contents of the header file nettle/version.h is now
	  architecture independent, except in --enable-mini-gmp
	  configurations.

	ABI issue:

	  Since the breakage was a bit subtle, let me document it
	  here. The nettle and hogweed libraries export a couple of
	  data symbols, and for some of these, the size was never
	  intended to be part of the ABI. E.g.,

	    extern const struct nettle_hash * const nettle_hashes[];

	  which is an NULL-terminated array.

	  It turns out the sizes nevertheless may leak into the ABI, and
	  that increasing the sizes can break old executables linked
	  with a newer version of the library.

	  When linking a classic non-PIE executable with a shared
	  library, we get ELF relocations of type R_X86_64_COPY for
	  references to data items. These mean that the linker allocates
	  space for the data item in the data segment of executable, at
	  a fixed address determined at link-time, and with size
	  extracted from the version of the .so-file seen when linking.

	  At load time, the run time linker then copies the contents of
	  the symbol from the .so file to that location, and uses the
	  copy instead of the version loaded with the .so-file. And if
	  the data item in the .so file used at load time is larger than
	  the data item seen at link time, it is silently truncated in
	  the process.

	  So when SHA3 hashes were was added to the nettle_hashes array
	  in the nettle-3.3 release, this way of linking produces a
	  truncated array at load time, no longer NULL-terminated.

	  We will get similar problems for planned extensions of the
	  internal struct ecc_curve, and exported data items like

	    extern const struct ecc_curve nettle_secp_256r1;

	  where the ecc_curve struct is only forward declared in the
	  public headers. To prepare, applications should migrate to
	  using the new function nettle_get_secp_256r1, and similarly
	  for the other curves.

	  In some future version, the plan is to add a leading
	  underscore to the name of the actual data items. E.g.,
	  nettle_hashes --> _nettle_hashes, breaking the ABI, while
	  keeping the nettle_get_hashes function and the nettle_hashes
	  macro as the supported ways to access it. We will also
	  rename nettle_secp_256r1 --> _nettle_secp_256r1, breaking
	  both ABI and API.

	  Note that data items like nettle_sha256 are *not* affected,
	  since the size and layout of this struct is considered part
	  of the ABI, and R_X86_64_COPY-relocations then work fine.
2017-11-28 14:06:12 +00:00
adam
1de52f5415 py-asn1: updated to 0.4.2
Revision 0.4.2:
---------------
- Fixed explicit tag splitting in chunked encoding mode at
  OctetString and BitString encoders

Revision 0.4.1:
---------------
- ANY DEFINED BY clause support implemented
- Encoders refactored to take either a value (as ASN.1 object)
  or a Python value plus ASN.1 schema
- BitString decoder optimised for better performance when running on
  constructed encoding
- Constructed types' .getComponentBy*() methods accept the default
  parameter to return instead if schema object is to be returned
- Constructed types' .getComponentBy*() methods accept the instantiate
  parameter to disable automatic inner component instantiation
- The ASN.1 types' __repr__ implementation reworked for better readability
  at the cost of not being eval-compliant
- Most ASN.1 types' __str__ magic methods (except for OctetString and
  character types) reworked to call .prettyPrint() rather than
  .prettyPrint calling __str__ as it was before. The intention is
  to eventually deprecate .prettyPrint() in favor of str().
  The other related change is that str() of enumerations and boolean
  types will return string label instead of number.
- Fixed Choice.clear() to fully reset internal state of the object
- Sphinx documentation rearranged, simplified and reworded
- The isValue singleton is now the only way to indicate ASN.1 schema
  as opposed to ASN.1 schema instance. The legacy None initializer
  support has been removed.
- Changed Null object initialization behaviour: previous default
  value ('') is not set anymore. Thus Null() call produces a
  ASN.1 schema object, while Null('') - value object.
- Migrated all docs and references from SourceForge
- Imports PEP8'ed
- Fixed ASN.1 encoder not to omit empty substrate produced for inner
  component if the inner component belongs to the simple class (as
  opposed to constructed class)
- Fixed CER/DER encoders to respect tagged CHOICE when ordering
  SET components
- Fixed ASN.1 types not to interfere with the Pickle protocol
- Fixed Sequence/SequenceOf types decoding heuristics in schema-less
  decoding mode
2017-11-28 09:14:34 +00:00
bsiegert
7de6e0e8c0 Add 2fa version 20171122.
From DESCR:

2fa is a two-factor authentication agent.

"2fa -add name" adds a new key to the 2fa keychain with the given name. It
prints a prompt to standard error and reads a two-factor key from standard
input. Two-factor keys are short case-insensitive strings of letters A-Z and
digits 2-7.

"2fa name" prints a two-factor authentication code from the key with the
given name.

With no arguments, "2fa" prints two-factor authentication codes from all
known time-based keys.

The default time-based authentication codes are derived from a hash of the
key and the current time, so it is important that the system clock have at
least one-minute accuracy.

The keychain is stored unencrypted in the text file "$HOME/.2fa".
2017-11-27 18:47:09 +00:00
adam
a72fe48f3a py-keyring: updated to 10.5.0
10.5.0
* Added ``--list-backends`` option to command-line interface.
* Removed ``logger`` from ``keyring``.
* Set the appid for SecretService & KWallet to something meaningful.
2017-11-27 13:05:44 +00:00
wiz
9aa66467e1 botan-devel: follow redirects 2017-11-26 10:40:05 +00:00
wiz
9d1c527d4f botan: follow redirects 2017-11-26 10:39:37 +00:00
bsiegert
7a2c6a3e34 Update openssl to 1.0.2m.
This is a recommended security update.

Changes between 1.0.2l and 1.0.2m [2 Nov 2017]

 *) bn_sqrx8x_internal carry bug on x86_64

    There is a carry propagating bug in the x86_64 Montgomery squaring
    procedure. No EC algorithms are affected. Analysis suggests that attacks
    against RSA and DSA as a result of this defect would be very difficult to
    perform and are not believed likely. Attacks against DH are considered just
    feasible (although very difficult) because most of the work necessary to
    deduce information about a private key may be performed offline. The amount
    of resources required for such an attack would be very significant and
    likely only accessible to a limited number of attackers. An attacker would
    additionally need online access to an unpatched system using the target
    private key in a scenario with persistent DH parameters and a private
    key that is shared between multiple clients.

    This only affects processors that support the BMI1, BMI2 and ADX extensions
    like Intel Broadwell (5th generation) and later or AMD Ryzen.

    This issue was reported to OpenSSL by the OSS-Fuzz project.
    (CVE-2017-3736)
    [Andy Polyakov]

 *) Malformed X.509 IPAddressFamily could cause OOB read

    If an X.509 certificate has a malformed IPAddressFamily extension,
    OpenSSL could do a one-byte buffer overread. The most likely result
    would be an erroneous display of the certificate in text format.

    This issue was reported to OpenSSL by the OSS-Fuzz project.
    (CVE-2017-3735)
    [Rich Salz]

Changes between 1.0.2k and 1.0.2l [25 May 2017]

 *) Have 'config' recognise 64-bit mingw and choose 'mingw64' as the target
    platform rather than 'mingw'.
    [Richard Levitte]
2017-11-24 20:34:23 +00:00
adam
c2a31e9a69 gnupg2: updated to 2.2.3
changes in version 2.2.3:
* gpgsm: Fix initial keybox creation on Windows.
* dirmngr: Fix crash in case of a CRL loading error.
* Fix the name of the Windows registry key.
* gpgtar: Fix wrong behaviour of --set-filename.
* gpg: Silence AKL retrieval messages.
* agent: Use clock or clock_gettime for calibration.
* agent: Improve robustness of the shutdown pending state.
2017-11-24 12:33:10 +00:00
wiz
187f1ab0c5 py-certifi: update to 2017.11.5.
The usual certificate updates.
2017-11-23 20:41:06 +00:00
wiz
20f7c989fe recursive bump for libxkbcommon removal from at-spi2-core 2017-11-23 17:19:40 +00:00
gson
d0312922fa Fix files in .destdir but not in PLIST, modelled after
devel/py-backports.functools_lru_cache.
2017-11-23 15:05:03 +00:00
adam
9bbf669736 py-OpenSSL: updated to 17.4.0
17.4.0:
Re-added a subset of the OpenSSL.rand module. This subset allows conscientious users to reseed the OpenSSL CSPRNG after fork.
Corrected a use-after-free when reusing an issuer or subject from an X509 object after the underlying object has been mutated.
2017-11-23 10:12:33 +00:00
markd
a082c7802d py-backports.ssl_match_hostname: depend on py-backports 2017-11-22 11:00:24 +00:00
adam
3f1222ff57 libassuan2: updated to 2.4.4
Changes in version 2.4.4:
* New configure option --disable-doc.
* Fix the use of nanosleep.
* Portability fixes for OpenBSD and macOS.
* Portability fix for systems not defining INADDR_LOOPBACK.
* Improve descriptor passing test to fix a Cygwin build problem.
2017-11-17 11:15:18 +00:00
adam
f89b220f4b py-asyncssh: updated to 1.11.1
Release 1.11.1:
Switched to using PBKDF2 implementation provided by PyCA, replacing a much slower pure-Python implementation used in earlier releases.
Improved support for file-like objects in process I/O redirection, properly handling objects which don’t support fileno() and allowing both text and binary file objects based on whether they have an ‘encoding’ member.
Changed PEM parser to be forgiving of trailing blank lines.
Updated documentation to note lack of support in OpenSSH for send_signal(), terminate(), and kill() channel requests.
Updated unit tests to work better with OpenSSH 7.6.
Updated Travis CI config to test with more recent Python versions.
2017-11-17 09:07:02 +00:00
fhajny
ec8c91d026 Update security/vault to 0.9.0.
DEPRECATIONS/CHANGES:

- API HTTP client behavior: When calling `NewClient` the API no longer
  modifies the provided client/transport.
- AWS EC2 client nonce behavior: The client nonce generated by the
  backend that gets returned along with the authentication response
  will be audited in plaintext.
- AWS Auth role options: The API will now error when trying to create
  or update a role with the mutually-exclusive options
  `disallow_reauthentication` and `allow_instance_migration`.
- SSH CA role read changes: When reading back a role from the `ssh`
  backend, the TTL/max TTL values will now be an integer number of
  seconds rather than a string. This better matches the API elsewhere
  in Vault.
- SSH role list changes: When listing roles from the `ssh` backend via
  the API, the response data will additionally return a `key_info` map
  that will contain a map of each key with a corresponding object
  containing the `key_type`.
- More granularity in audit logs: Audit request and response entires
  are still in RFC3339 format but now have a granularity of
  nanoseconds.
- High availability related values have been moved out of the
  `storage` and `ha_storage` stanzas, and into the top-level
  configuration. `redirect_addr` has been renamed to `api_addr`.
- A new `seal` stanza has been added to the configuration file, which
  is optional and enables configuration of the seal type to use for
  additional data protection, such as using HSM or Cloud KMS solutions
  to encrypt and decrypt data.

FEATURES:

- RSA Support for Transit Backend: Transit backend can now generate
  RSA keys which can be used for encryption and signing.
- Identity System: Now in open source and with significant
  enhancements, Identity is an integrated system for understanding
  users across tokens and enabling easier management of users directly
  and via groups.
- External Groups in Identity: Vault can now automatically assign
  users and systems to groups in Identity based on their membership in
  external groups.
- Seal Wrap / FIPS 140-2 Compatibility (Enterprise): Vault can now
  take advantage of FIPS 140-2-certified HSMs to ensure that Critical
  Security Parameters are protected in a compliant fashion.
- Control Groups (Enterprise): Require multiple members of an Identity
  group to authorize a requested action before it is allowed to run.
- Cloud Auto-Unseal (Enterprise): Automatically unseal Vault using AWS
  KMS and GCP CKMS.
- Sentinel Integration (Enterprise): Take advantage of HashiCorp
  Sentinel to create extremely flexible access control policies - even
  on unauthenticated endpoints.
- Barrier Rekey Support for Auto-Unseal (Enterprise): When using
  auto-unsealing functionality, the `rekey` operation is now
  supported; it uses recovery keys to authorize the master key rekey.
- Operation Token for Disaster Recovery Actions (Enterprise): When
  using Disaster Recovery replication, a token can be created that can
  be used to authorize actions such as promotion and updating primary
  information, rather than using recovery keys.
- Trigger Auto-Unseal with Recovery Keys (Enterprise): When using
  auto-unsealing, a request to unseal Vault can be triggered by a
  threshold of recovery keys, rather than requiring the Vault process to
  be restarted.
- UI Redesign (Enterprise): All new experience for the Vault
  Enterprise UI. The look and feel has been completely redesigned to
  give users a better experience and make managing secrets fast and
  easy.
- UI: SSH Secret Backend (Enterprise): Configure an SSH secret
  backend, create and browse roles. And use them to sign keys or
  generate one time passwords.
- UI: AWS Secret Backend (Enterprise): You can now configure the AWS
  backend via the Vault Enterprise UI. In addition you can create
  roles, browse the roles and Generate IAM Credentials from them
  in the UI.

IMPROVEMENTS:

- api: Add ability to set custom headers on each call
- command/server: Add config option to disable requesting client
  certificates
- core: Disallow mounting underneath an existing path, not just over
- physical/file: Use `700` as permissions when creating directories.
  The files themselves were `600` and are all encrypted, but this
  doesn't hurt.
- secret/aws: Add ability to use custom IAM/STS endpoints
- secret/cassandra: Work around Cassandra ignoring consistency levels
  for a user listing query
- secret/pki: Private keys can now be marshalled as PKCS#8
- secret/pki: Allow entering URLs for `pki` as both comma-separated
  strings and JSON arrays
- secret/ssh: Role TTL/max TTL can now be specified as either a string
  or an integer
- secret/transit: Sign and verify operations now support a `none` hash
  algorithm to allow signing/verifying pre-hashed data
- secret/database: Add the ability to glob allowed roles in the
  Database Backend
- ui (enterprise): Support for RSA keys in the transit backend
- ui (enterprise): Support for DR Operation Token generation,
  promoting, and updating primary on DR Secondary clusters

BUG FIXES:

- api: Fix panic when setting a custom HTTP client but with a nil
  transport
- api: Fix authing to the `cert` backend when the CA for the client
  cert is not known to the server's listener
- auth/approle: Create role ID index during read if a role is missing
  one
- auth/aws: Don't allow mutually exclusive options
- auth/radius: Fix logging in in some situations
- core: Fix memleak when a connection would connect to the cluster
  port and then go away
- core: Fix panic if a single-use token is used to step-down or seal
- core: Set rather than add headers to prevent some duplicated headers
  in responses when requests were forwarded to the active node
- physical/etcd3: Fix some listing issues due to how etcd3 does prefix
  matching
- physical/etcd3: Fix case where standbys can lose their etcd client
  lease
- physical/file: Fix listing when underscores are the first component
  of a path
- plugins: Allow response errors to be returned from backend plugins
- secret/transit: Fix panic if the length of the input ciphertext was
  less than the expected nonce length
- ui (enterprise): Reinstate support for generic secret backends -
  this was erroneously removed in a previous release
2017-11-16 11:31:12 +00:00
wiz
e8c35c6fdf pkcs11-helper: fix HOMEPAGE 2017-11-15 22:18:52 +00:00
wiz
26c015927f openct: update HOMEPAGE 2017-11-15 22:16:17 +00:00
taca
8736d55d43 security/php-pecl-mcrypt: enable php72
It should support php72.  (Not tested yet.)
2017-11-15 22:01:22 +00:00
he
f1c7f60ae0 Update {py-,}yara to version 3.7.0.
Pkgsrc changes:
 * adapt PLIST
 * remove patch which no longer applies
 * apply patches for proper value domain for isxxxx() functions/macros

Upstream changes:
 * time module (Wesley Shields)
 * yara command-line tool now accept multiple rule files
 * Allow a configurable limit for the number of strings per rule
   (option --max-strings-per-rule)
 * Implement integrity check for compiled rules
 * Implement API for customizingimport statement (@edhoedt)
 * Scan process memory in FreeBSD and OpenBDS (Hilko Bengen)
 * BUGFIX: Negated character classes not working with case-insensitive
   regexps (#765)
 * BUGFIX: Multiple bugs while parsing ELF files (Nate Rosenblum)
 * BUGFIX: Out-of-bounds access while parsing PE files.
 * BUGFIX: Memory leaks while parsing invalid rules.
2017-11-15 18:22:22 +00:00
adam
3c8b84aa91 py-paramiko: updated to 2.4.0
2.4.0:

[Feature]: Add a new passphrase kwarg to SSHClient.connect so users may disambiguate key-decryption passphrases from password-auth passwords. (This is a backwards compatible change; password will still pull double duty as a passphrase when passphrase is not given.)
[Support]: Drop Python 2.6 and Python 3.3 support; now only 2.7 and 3.4+ are supported. If you’re unable to upgrade from 2.6 or 3.3, please stick to the Paramiko 2.3.x (or below) release lines.
[Support]: Include LICENSE file in wheel archives.
[Support]: Updated the test suite & related docs/metadata/config to be compatible with pytest instead of using the old, custom, crufty unittest-based test.py.

This includes marking known-slow tests (mostly the SFTP ones) so they can be filtered out by inv test‘s default behavior; as well as other minor tweaks to test collection and/or display (for example, GSSAPI tests are collected, but skipped, instead of not even being collected by default as in test.py.)

[Support]: Update tearDown of client test suite to avoid hangs due to eternally blocking accept() calls on the internal server thread (which can occur when test code raises an exception before actually connecting to the server.)
2017-11-15 09:24:14 +00:00
jdolecek
6c5a2917bb Add php-sodim - php module for libsodium library, new module for PHP 7.2 2017-11-15 08:58:35 +00:00
jperkin
189631356f logcheck: Remove unnecessary TMPDIR handling to be MAKE_JOBS safe. 2017-11-10 10:34:51 +00:00
snj
27438d56bb dropbear: update to 2017.75
Changes:
- Security: Fix double-free in server TCP listener cleanup
  A double-free in the server could be triggered by an authenticated
  user if dropbear is running with -a (Allow connections to forwarded
  ports from any host)
  This could potentially allow arbitrary code execution as root by an
  authenticated user.  Affects versions 2013.56 to 2016.74. Thanks to
  Mark Shepard for reporting the crash.
  CVE-2017-9078 https://secure.ucc.asn.au/hg/dropbear/rev/c8114a48837c

- Security: Fix information disclosure with ~/.ssh/authorized_keys
  symlink.  Dropbear parsed authorized_keys as root, even if it were
  a symlink. The fix is to switch to user permissions when opening
  authorized_keys

  A user could symlink their ~/.ssh/authorized_keys to a root-owned
  file they couldn't normally read. If they managed to get that file
  to contain valid authorized_keys with command= options it might be
  possible to read other contents of that file.
  This information disclosure is to an already authenticated user.
  Thanks to Jann Horn of Google Project Zero for reporting this.
  CVE-2017-9079 https://secure.ucc.asn.au/hg/dropbear/rev/0d889b068123

- Generate hostkeys with dropbearkey atomically and flush to disk with
  fsync. Thanks to Andrei Gherzan for a patch.

- Fix out of tree builds with bundled libtom
  Thanks to Henrik Nordström and Peter Krefting for patches.
2017-11-09 19:00:25 +00:00
adam
f9b487b590 gnupg2: updated to 2.2.2
changes in version 2.2.2:
  * gpg: Avoid duplicate key imports by concurrently running gpg
    processes.
  * gpg: Fix creating on-disk subkey with on-card primary key.
  * gpg: Fix validity retrieval for multiple keyrings.
  * gpg: Fix --dry-run and import option show-only for secret keys.
  * gpg: Print "sec" or "sbb" for secret keys with import option
    import-show.
  * gpg: Make import less verbose.
  * gpg: Add alias "Key-Grip" for parameter "Keygrip" and new
    parameter "Subkey-Grip" to unattended key generation.
  * gpg: Improve "factory-reset" command for OpenPGP cards.
  * gpg: Ease switching Gnuk tokens into ECC mode by using the magic
    keysize value 25519.
  * gpgsm: Fix --with-colon listing in crt records for fields > 12.
  * gpgsm: Do not expect X.509 keyids to be unique.
  * agent: Fix stucked Pinentry when using --max-passphrase-days.
  * agent: New option --s2k-count.
  * dirmngr: Do not follow https-to-http redirects.
  * dirmngr: Reduce default LDAP timeout from 100 to 15 seconds.
  * gpgconf: Ignore non-installed components for commands
    --apply-profile and --apply-defaults.
  * Add configure option --enable-werror.
2017-11-09 08:02:30 +00:00
wiz
ceb650d278 p5-Net-SSLeay: update to 1.82.
1.82 2017-10-31
	Added support for building under Linuxbrew (a linuxbrew version of MacOS Homebrew)
	Patch from Matthew Altus, that implements SSL_CTX_set_psk_client_callback() and SSL_set_psk_client_callback().
	Patch to build with LibreSSL has no support for NPN
	Also skip the NPN test if the SSL library is LibreSSL.
	Fixed a problem with a variable declaration in ssleay_session_secret_cb_invoke reported by Graham Ollis.
	Significant patch set from Open System Consultants:
	- Bugfix: tlsext_status_cb_invoke(...): free ocsp_response only when allocated.
 	- The same callback is used on a server side for OCSP stapling and in that
  	 case ocsp_response is NULL and not used.
	 - New feature: Added a binding SSL_set_session_ticket_ext_cb(ssl,callback,data)
	 - A callback used by EAP-FAST/EAP-TEAT to parse and process TLS session ticket.
	 - Tests are in t/local/65_ticket_sharing_2.t
	 - New feature: Added a binding SSL_set_session_ticket_ext(ssl,ticket)
	 - Used by EAP-FAST/EAP-TEAP to define TLS session ticket value.
	 - Tests are in t/local/65_ticket_sharing_2.t
	 - Bugfix: tlsext_ticket_key_cb_invoke(...): allow SHA256 HMAC key to be 32 bytes
	 instead of 16 bytes (which OpenSSL will pad with zeros up to 32 bytes).
	 - New feature: Added following bindings:
	 - X509_get_ex_data(cert,idx)
	 - X509_get_ex_new_index(argl,argp,new_func,dup_funL,free_func)
	 - X509_get_app_data(cert)
	 - X509_set_ex_data(cert,idx,data)
	 - X509_set_app_data(cert,arg)
	 - X509_STORE_CTX_get_ex_new_index(argl,argp,new_func,dup_func,free_func)
	 - X509_STORE_CTX_get_app_data(x509_store_ctx)
	 - X509_STORE_CTX_set_app_data(x509_store_ctx,arg)
	 - New feature: Added an implementation for SSL_get_finished(ssl,buf,count=2*EVP_MAX_MD_SIZE)
	 - Tests are in t/local/43_misc_functions.t
	 - New feature: Added an implementation for SSL_get_peer_finished(ssl,buf,count=2*EVP_MAX_MD_SIZE)
	 - Tests are in t/local/43_misc_functions.t
	 - Bugfix: SSL_get_keyblock_size(s): Calculate key block size correctly also with AEAD ciphers
	 which don’t use digest functions.
	 - New feature: Added a binding SSL_set_tlsext_status_ocsp_resp(ssl,staple)
	 - Used by a server side to include OCSP staple in ServerHello.
	 - Bugfix: SSL_OCSP_response_verify(ssl,rsp,svreq,flags): check that chain and last are not NULL
	 before trying to use them.
	 - Bugfix: inc/Module/Install/PRIVATE/Net/SSLeay.pm: Don’t quote include and lib paths.
2017-11-08 21:08:48 +00:00
wiz
9330a0b877 p5-IO-Socket-SSL: update to 2.052.
2.052 2017/10/22
- disable NPN support if LibreSSL>=2.6.1 is detected since they've replaced the
  functions with dummies instead of removing NPN completly or setting
  OPENSSL_NO_NEXTPROTONEG
- t/01loadmodule.t shows more output helpful in debugging problems
- update fingerprints for extenal tests
- update documentation to make behavior of syswrite more clear
2017-11-08 21:07:32 +00:00
wiz
fa1dc4bc14 p5-Digest-SHA3: update to 1.01.
1.01  Sun Oct 22 16:04:22 MST 2017
	- added optional $lsb argument for add_bits() method
		-- many public vectors in least-significant-bit format
			-- using $lsb flag results in simpler test code
	- further minor optimizations in add_bits() and tests
2017-11-08 21:04:21 +00:00
wiz
923f1caff1 keychain: follow redirect 2017-11-06 13:27:21 +00:00
adam
e273a2072d py-cryptography[_vectors]: updated to 2.1.3
2.1.3:
Updated Windows, macOS, and manylinux1 wheels to be compiled with OpenSSL 1.1.0g.
2017-11-03 10:36:12 +00:00
minskim
aad293fd54 security/yara: Needs OpenSSL to build 2017-11-01 19:29:30 +00:00
adam
79f750fbb6 py-requests-ntlm: updated to 1.1.0
1.1.0:
Correct behaviour when parsing a UPN passed in as the username
Enhanced the CBT hashes when using a certificate that has a hash algorithm that is greater than sha256
2017-10-31 08:27:55 +00:00
adam
49230339d5 py-ntlm-auth: updated to 1.0.6
Changes 1.0.6:
* More changes to packaging to better handle copyright and licensing
2017-10-31 08:27:03 +00:00
adam
270030f46c py-asyncssh: added version 1.11.0
AsyncSSH is a Python package which provides an asynchronous client and server
implementation of the SSHv2 protocol on top of the Python 3.4+ asyncio
framework.
2017-10-30 18:21:20 +00:00
adam
960b446f05 py-gssapi: enable all Python versions; fixed PLIST for different KRB5_TYPE 2017-10-30 18:17:13 +00:00
adam
8aab303a9a py-m2crypto: updated to 0.27.0
0.27.0:
- Fix licence: it is MIT, not BSD
- At least minimal support of SNI in httpslib.
- Small bugfixes and cleanups.
- More effort to make build system more robust (now should work even on
  Debian LTS).
- Restore m2.rsa_set_e() and m2.rsa_set_n().
- Make sure that every exceptional return throws and exception and vice
  versa.
2017-10-26 07:08:10 +00:00
adam
1be5bf6c36 Updated HOMEPAGE 2017-10-25 06:38:53 +00:00
adam
ee968357b5 py-cryptography[_vectors]: updated to 2.1.2
2.1.2:
Corrected a bug with the manylinux1 wheels where OpenSSL's stack was marked executable.
2017-10-25 03:53:05 +00:00