Commit graph

3384 commits

Author SHA1 Message Date
reed
cc6080db97 Add a license. Used exact same license as used for source code,
but changed the name of the copyright holder.

I provided the original man page in PR #21865.
2005-06-07 21:37:30 +00:00
dillo
cfba2ea655 Add a file format version to pkg-vulnerabilities, and check for
its compatiblity.  Bump version to 1.35

Done during the freeze to have the support on the branch.
Okayed by wiz.
2005-06-07 19:17:01 +00:00
adrianp
56e056de69 - Remove reference to bsd.prefs.mk as it's not needed
- Problem spotted by wiz@
2005-06-04 19:30:05 +00:00
kristerw
fd9e1ca345 Correct the PLIST for non-i386 machines.
Bump PKGREVISION.
2005-06-04 00:35:28 +00:00
jlam
dac1d1994f This buildlink3.mk wasn't adding to BUILDLINK_DEPENDS like it was
supposed to.
2005-06-01 22:34:10 +00:00
jlam
fcb7da800b Remove mk/autoconf.mk and mk/automake.mk and replace their usage with
USE_TOOLS and any of "autoconf", "autoconf213", "automake" or
"automake14".  Also, we don't need to call the auto* tools via
${ACLOCAL}, ${AUTOCONF}, etc., since the tools framework takes care
to symlink the correct tool to the correct name, so we can just use
aclocal, autoconf, etc.
2005-06-01 20:07:59 +00:00
wiz
e9a28c1b56 There is no ipv6 category.
XXX: should there be one, replacing USE_INET6?
2005-06-01 18:18:09 +00:00
jlam
95fd1f6ec9 Massive cleanup of buildlink3.mk and builtin.mk files in pkgsrc.
Several changes are involved since they are all interrelated.  These
changes affect about 1000 files.

The first major change is rewriting bsd.builtin.mk as well as all of
the builtin.mk files to follow the new example in bsd.builtin.mk.
The loop to include all of the builtin.mk files needed by the package
is moved from bsd.builtin.mk and into bsd.buildlink3.mk.  bsd.builtin.mk
is now included by each of the individual builtin.mk files and provides
some common logic for all of the builtin.mk files.  Currently, this
includes the computation for whether the native or pkgsrc version of
the package is preferred.  This causes USE_BUILTIN.* to be correctly
set when one builtin.mk file includes another.

The second major change is teach the builtin.mk files to consider
files under ${LOCALBASE} to be from pkgsrc-controlled packages.  Most
of the builtin.mk files test for the presence of built-in software by
checking for the existence of certain files, e.g. <pthread.h>, and we
now assume that if that file is under ${LOCALBASE}, then it must be
from pkgsrc.  This modification is a nod toward LOCALBASE=/usr.  The
exceptions to this new check are the X11 distribution packages, which
are handled specially as noted below.

The third major change is providing builtin.mk and version.mk files
for each of the X11 distribution packages in pkgsrc.  The builtin.mk
file can detect whether the native X11 distribution is the same as
the one provided by pkgsrc, and the version.mk file computes the
version of the X11 distribution package, whether it's built-in or not.

The fourth major change is that the buildlink3.mk files for X11 packages
that install parts which are part of X11 distribution packages, e.g.
Xpm, Xcursor, etc., now use imake to query the X11 distribution for
whether the software is already provided by the X11 distribution.
This is more accurate than grepping for a symbol name in the imake
config files.  Using imake required sprinkling various builtin-imake.mk
helper files into pkgsrc directories.  These files are used as input
to imake since imake can't use stdin for that purpose.

The fifth major change is in how packages note that they use X11.
Instead of setting USE_X11, package Makefiles should now include
x11.buildlink3.mk instead.  This causes the X11 package buildlink3
and builtin logic to be executed at the correct place for buildlink3.mk
and builtin.mk files that previously set USE_X11, and fixes packages
that relied on buildlink3.mk files to implicitly note that X11 is
needed.  Package buildlink3.mk should also include x11.buildlink3.mk
when linking against the package libraries requires also linking
against the X11 libraries.  Where it was obvious, redundant inclusions
of x11.buildlink3.mk have been removed.
2005-06-01 18:02:37 +00:00
wiz
336ed019bf Fix casing of IPsec in COMMENT. 2005-06-01 14:35:31 +00:00
yyamano
e835184507 Make this build on Darwin. This fixes PR pkg/29147. 2005-06-01 02:49:39 +00:00
salo
415ae56473 Build on DragonFly. From Joerg Sonnenberger. 2005-05-31 21:02:10 +00:00
wiz
0e53081d3c Update to 1.2.4:
* Version 1.2.4 (2005-05-28)
- Corrected some bugs that could affect 64 bit systems.
- Some corrections in the header files to include the prototype
  of memmem properly (affected 64 bit systems). Report and patch
  by Yoann Vandoorselaere <yoann@prelude-ids.org>.
- Introduced the --fix-key option to certtool, which can be used to
  regenerate the (optional) parameters in a private key. It should
  be used together with --key-info.
- Corrected a bug in certificate chain verification that could lead
  to marking a trusted chain as non trusted, if the last certificate in
  the chain was a self signed one.
- Gnulib portability files were updated.
- License were updated to reflect new FSF address.
2005-05-31 17:48:30 +00:00
dillo
02adf507ac Rename option prefix-cmds to kerberos-prefix-cmds. Backwards
compatibility provided via PKG_OPTIONS_LEGACY_OPTS.
2005-05-31 11:31:07 +00:00
dillo
d6bfbe8582 Rename option PAM to pam (so all options are lower case). Backwards
compatibility provided via PKG_OPTIONS_LEGACY_OPTS.
2005-05-31 11:24:32 +00:00
dillo
f81ae835ad Packages have no business modifying PKG_DEFAULT_OPTIONS -- it's a
user settable variable.  Set PKG_SUGGESTED_OPTIONS instead.  Also,
make use of PKG_OPTIONS_LEGACY_VARS.

Reviewed by wiz.
2005-05-31 10:01:36 +00:00
heinz
4ee346495e Expanded patch-aa with a few #if cases.
This still works on NetBSD (1.6.2 tested) but also fixes the include error
on Linux (Debian 3 tested) and Solaris (9 tested).
Although DragonFlyBSD, FreeBSD and OpenBSD should work as before I have
not tried to build the package there.
Feedback whether it builds/works on Darwin/MacOS is also welcome.
2005-05-28 00:42:31 +00:00
heinz
8c30589598 Fixed type error on Solaris (tested with Solaris 9). 2005-05-28 00:38:38 +00:00
zuntum
b098e354e2 Update security/apg to version 2.2.3.
Changes from previous pkgsrc version 2.1.0 include:

  apg-2.2.3
      Fixed version info (-v).

  apg-2.2.2
      Fixed permissions for source distribution.

  apg-2.2.1
      Changed manpages of apg and apgd.

  apg-2.2.0
      Added polish translation for APG PHP frontend.
      Added option -p (see apg(1) apgd(8)).
      Added option -t (see apg(1) apgd(8)).
      Added option -l (see apg(1)).
      Changed format of the bloom-filter file. Added
      converter utility to convert old format to the
      new one (bfconvert).
      Added option -i (see apgbfm(1)).
      Fixed some bugs.
      Some compatibility changes.
      Changed default apg options.

Update provided by Leonard Schmidt <lems@gmx.net> in PR#30345, thanks!
2005-05-27 10:32:01 +00:00
markd
cf74ba9b0d Add enough ANSI C prototypes to tcpd.h to keep mysql4-server happy. 2005-05-26 02:25:22 +00:00
reed
f52deedaf1 Fix typo introduced on August 4 that stopped wtmp logging under Linux
and maybe other platforms.

Bump PKGREVISION.
2005-05-25 23:17:11 +00:00
reed
2e01995076 Noticed that the PAM +DISPLAY message was not displayed
and extra pam file was not included in +CONTENTS.

So moved the include of options.mk to after the PLIST_SRC and
MESSAGE_SRC are defined as empty.
(MESSAGE_SRC is redefined if Interix and if PAM PKG_OPTION was enabled
then this still needs to be fixed.)
2005-05-25 19:37:18 +00:00
wiz
8e24884a04 Add RMD160 checksum. 2005-05-25 13:06:04 +00:00
jlam
920592c1cb Remove extremely stupid and naive tests for whether YACC is "bison -y"
and LEX is "flex".  They break when full paths are passed to the
configure script via YACC and LEX (!!).
2005-05-23 21:24:17 +00:00
jlam
49bef90a54 AIDE wants flex, not just any old "lex". 2005-05-23 21:18:53 +00:00
jlam
c897d2aa42 Remove redundant USE_TOOLS+=bison lines. 2005-05-23 21:18:09 +00:00
rillig
f795c2e475 Removed trailing white-space. 2005-05-23 08:26:03 +00:00
jlam
585534220c Remove USE_GNU_TOOLS and replace with the correct USE_TOOLS definitions:
USE_GNU_TOOLS	-> USE_TOOLS
	awk		-> gawk
	m4		-> gm4
	make		-> gmake
	sed		-> gsed
	yacc		-> bison
2005-05-22 20:07:36 +00:00
jlam
9f94b112f0 Remove the old tools framework and references to _USE_NEW_TOOLS. 2005-05-22 19:11:12 +00:00
dillo
c93f327f0f fix quoting. bump version to 1.34.
reviewed by wiz and agc.
2005-05-21 16:36:37 +00:00
jlam
f35b224a50 SUBST_FILES.* must be relative to ${WRKSRC}. 2005-05-21 04:10:17 +00:00
rh
267b55ed6a Make this compile with gcc4. 2005-05-21 01:44:10 +00:00
augustss
f424b9ebb8 Add py-mcrypt, a Python front end to the mcrypt library. 2005-05-20 18:10:54 +00:00
jmmv
980d24aa63 Update to 0.7.8:
seahorse 0.7.8
--------------

    * HKP key server support.
    * Reworked drag-and-drop. Now works between Seahorse windows.
    * Added a dialog for adding key servers simply and correctly.
    * Add option to agent 'Authorize' window to turn off prompting
      for authorization [Adam Schriber]
    * Handle empty passwords properly in agent [Adam Schreiber]
    * Keep agent window on top [Adam Schreiber]
    * Removed libeel dependency.
    * Better keyboard handling in the recipients dialog.
    * Fix some rare gnome-vfs problems.
    * Many smaller bug fixes.

seahorse 0.7.7
--------------

    * Working keyserver sync (including upload) support.
    * Compatibility with GNOME 2.10.
    * Nautilus plugin now works with Nautilus 2.10 [Fernando Herrera]
    * Cleaned up and simplified columns in the Key Manager.
    * Fix problems with entering expiry dates.
    * Remove 'Text Mode' option. Clarify 'ASCII Armor' option.
    * Removed lots of 'jargon' from the interface.
    * Can now drag keys from a key list to nautilus.
    * Many smaller bug fixes.

seahorse 0.7.6
--------------

    * Compatible with GPG 1.4
    * Initial LDAP key server searching and importing support.
    * Show descriptive icons (eg: secret, public keys) in the main
      Key Manager window. [Adam Schreiber]
    * Monitor keyring and refresh key list automatically across
      processes, such as gedit plugin, recipient selection etc...
    * Decryption 'Open With' in nautilus for PGP encrypted and
      signed files. [Adam Schreiber]
    * Added Backup Keyrings functionality. [Adam Schreiber]
    * Prompt for signer when no default key is selected.
    * Display UIDs properly in the seahorse-agent status window.
    * Allow selection of a signing key in the Recipients dialog.
    * More usable HIG friendly Key Properties dialog [Jim Pharis]
    * Fix problems with 0 length files being created on error.
    * Gnome HIG compliancy fixes
    * Allow deletion of UIDs from the Key Manager window.
    * Show all UIDs in the Recipient selection dialog.
    * Prompt before overwriting files.
    * More efficient operations on large files.
    * Enable gedit plugin by default.
    * Many smaller bug fixes.
2005-05-19 21:14:11 +00:00
gavan
019698e51a Add missing line continuation 2005-05-17 21:53:20 +00:00
jschauma
42001457bc When checking for the library, accept either libwrap.so or libwrap.a since
apparently some systems only have .a (pointed out by adrianp@).
2005-05-17 18:04:49 +00:00
adrianp
84903d88d4 - Update to 2.4
> Some highlights in this release:
>
>  - Previously unreleased exploits (20 others added since 2.3)
>     + Solaris KCMS Arbitary File Read
>     + Solaris snmpXdmid AddComponent Overflow
>     + Metasploit Framework Payload Handler
>     + Microsoft Message Queueing Service MSO5-017
>     + Minishare 1.41 Buffer Overflow
>
>  - Addition of the new SunRPC and XDR Perl API
>     + Allows for clean RPC exploit development
>     + Used by two new exploit modules (KCMS and snmpXdmid)
>     + Updated sadmind exploit uses the new API
>
>  - Includes the new win32 PassiveX payload system
>     + Loads an arbitary ActiveX through Internet Explorer
>     + PassiveX payload loads the next stage over HTTP
>     + HTTP transport emulates a standard TCP connection
>     + Interact with cmd.exe, VNC, or Meterpreter over HTTP
>     + Uses Internet Explorer settings for proxy access
>     + Fully-functional on systems with Internet Explorer 6
>     + Extensive documentation is available online:
>         * http://www.uninformed.org/?v=1&a=3&t=pdf
>
>  - Stability improvements and numerous bugs fixes
>     + The msfweb interface is slightly less of a memory pig
>     + Many exploits have been updated and improved
>     + New external references added to the exploit modules
>
>  - General improvements to the payload system
>     + Brand new "shelldemo" binary for the impurity stager
>     + Size reductions to win32_bind, win32_reverse, and others
>     + Can now make standalone executables with msfpayload
>     + Interact with metasploit payloads via payload_handler.pm
2005-05-17 17:23:59 +00:00
jlam
7c87c3a627 This package needs gzcat to extract the .tar.gz file inside the original
.tar file.  Also, fix the yacc silliness while we're here.
2005-05-16 16:32:28 +00:00
jlam
7425b543e8 Note that gtar is required by the package. 2005-05-16 01:15:30 +00:00
jschauma
b18397b36c Unbreak this under IRIX by not demanding gawk. This is a hack:
Apparently, for as of yet undetermined reasons, gawk as built on IRIX
under pkgsrc croaks on regular expressions including a
combination of alpha- and numerical matches, such as the rather
trivial /^[ \t]*[0-9]+/
Let's use the system's AWK (ie nawk) for this package to avoid
breaking hundreds of dependents.
Speculation: somehow the regular expression library used to build
gawk conflicts with the systems regular expression library or
some such.
Note: gawk from SGIs freeware collection depends on expat -- why
is that? Does that have anything to do with anything?
2005-05-15 22:22:48 +00:00
jlam
c757d1423e Avoid crazy YACC hacks when using the new tools framework. 2005-05-15 19:05:54 +00:00
adrianp
91e691f24e - Add a note in the Makefile about upgrading this package. 2005-05-15 17:11:04 +00:00
jlam
ac6724aa7c gzcat is needed, so note it as such for the new tools framework. 2005-05-15 04:26:24 +00:00
jlam
e72c295eb5 Fix PLIST by adding missing compile_et.1. 2005-05-13 03:54:35 +00:00
jlam
f7c716c601 Pass the install-time definition of variables that specify the locations
of the example config files through to sub-make processes.  Since
courier-authlib uses GNU automake, we need to set AM_MAKEFLAGS to the
correct value.  This fixes the installation of the *.dist files into
${PREFIX}/share/examples/courier-authlib.
2005-05-13 03:26:44 +00:00
jlam
0dbd0c0762 Rename MAKE_VARS to MAKEVARS so that it more closely resembles
"MAKEFLAGS".  Both "MAKEVARS" and "MAKEFLAGS" affect the package-level
make process, not the software's own make process.
2005-05-11 22:08:18 +00:00
jlam
4fd08abc6e I mixed up MAKE_FLAGS with MAKEFLAGS. The latter is what we actually use
to pass make flags to bmake.
2005-05-11 22:03:52 +00:00
peter
afa2f73a31 Update to 20050511. Changes:
Updated to OpenBSD 3.7 pf:
* Support limiting TCP connections by establishment rate, automatically
  adding flooding IP addresses to tables and flushing states
  (max-src-conn-rate, overload <table>, flush global).
* Improved functionality of tags (tag and tagged for translation rules,
  tagging of all packets matching state entries).
* Improved diagnostics (error messages and additional counters from pfctl -si).
* New keyword set skip on to skip filtering on arbitrary interfaces,
  like loopback.
* Several bugfixes improving stability.

ALTQ is now also supported by using the option 'altq', see the homepage
for information about how to apply the kernel patch.

Approved by: Thomas Klausner <wiz@NetBSD.org>
2005-05-11 22:01:28 +00:00
manu
61bb9d3011 Updated ipsec-tools to 0.6b2.
Multiple bug fixes, the most important being NAT-T now working with
multiple endpoints behind the same NAT.
2005-05-10 12:39:28 +00:00
jschauma
c2a9909f72 In addition to checking for the header, also check for the library,
specifically, check in /usr/lib${ABI}, since it's possible that
on multi-ABI platforms only one version is installed, in which case we'd
need to build and install the other from pkgsrc.
2005-05-10 02:41:15 +00:00
jlam
67ca8c8715 Don't assign to PKG_OPTIONS.<pkg> which has special meaning to the
options framework.  Rename PKG_OPTIONS.* to PKG_BUILD_OPTIONS.*.
2005-05-09 05:14:08 +00:00
jlam
03e9337879 Teach bsd.pkg.mk to create a phase-specific "makevars.mk" file that
caches variable definitions that were computed by make.  These variables
are specified by listing them in MAKE_VARS, e.g.,

	.if !defined(FOO)
	FOO!=	very_time_consuming_command
	.endif
	MAKE_VARS+=	FOO

bsd.pkg.mk will include only the one generated during the most recent
phase.  A particular phase's makevars.mk file consists of variable
definitions that are a superset of all of the ones produced in previous
phases of the build.

The caching is useful because bsd.pkg.mk invokes make recursively,
which in the example above has the potential to run the very time-consuming
command each time unless we cause FOO to be defined for the sub-make
processes.  We don't cache via MAKE_FLAGS because MAKE_FLAGS isn't
consistently applied to every invocation of make, and also because
MAKE_FLAGS can overflow the maximum length of a make variable very
quickly if we add many values to it.

One important and desirable property of variables cached via MAKE_VARS
is that they only apply to the current package, and not to any
dependencies whose builds may have been triggered by the current
package.

The makevars.mk files are generated by new targets fetch-vars,
extract-vars, patch-vars, etc., and these targets are built during
the corresponding real-* target to ensure that they are being invoked
with PKG_PHASE set to the proper value.

Also, remove the variables cache file that bsd.wrapper.mk was generating
since the new makevars.mk files provide the same functionality at a
higher level.  Change all WRAPPER_VARS definitions that were used by
the old wrapper-phase cache file into MAKE_VARS definitions.
2005-05-09 05:06:55 +00:00
jlam
949a7c95f1 PKG_OPTIONS.<pkg> isn't a good approximation to PKG_OPTIONS for the
package because PKG_OPTION.<pkg> could contain negative options, which
are never part of PKG_OPTIONS.  Instead, use the show-var target to
display the value.  We cache it in WRAPPER_VARS and in MAKE_FLAGS to
prevent reinvoking the show-var target recursively.
2005-05-08 12:03:56 +00:00
wiz
2392e577cd Refer doc/pkgsrc.html instead of Packages.txt (HOMEPAGE variable). 2005-05-07 22:24:04 +00:00
wiz
73b1f62fd4 Refer doc/pkgsrc.txt instead of Packages.txt. 2005-05-07 22:14:02 +00:00
xtraeme
905f0fcfd2 Added security/pam-mysql from pkgsrc-wip. 2005-05-05 20:18:50 +00:00
xtraeme
697697f9b0 Initial import of pam-mysql 0.5 from pkgsrc-wip, originally packaged
by David Ferlier with minor changes by me.

This is a module that allows people to login to PAM aware applications
by authenticating to a MySQL db. Now configurable in terms of which
host the database reside upon, which table and username and password
column to interrogate.
2005-05-05 20:16:42 +00:00
reed
aab4e1c0e6 The amavismilter rc.d script is only installed when milter option
is enabled.

(Noticed in K. Walfridsson's NetBSD 3.0_BETA/x86_64 bulk build results
which were reviewed by wiz.)
2005-05-05 14:53:05 +00:00
wiz
199f90370f Sort. 2005-05-03 15:40:57 +00:00
reed
a342cc6cba Remove the auto-registration of rc.d scripts. RCD_SCRIPTS_EXAMPLEDIR is
no longer a custom option.

Add rc.d scripts to the PLIST.
2005-05-02 22:49:09 +00:00
shannonjr
ed9ef274de Complying with request from Jeremy C. Reed, "Can you remove the
INSTALL_SCRIPT step and set RCD_SCRIPTS=dirmngr instead?"
2005-05-02 22:33:37 +00:00
reed
ee8be9d0c1 RCD_SCRIPTS_EXAMPLEDIR is no longer customizable.
And always is defined as share/examples/rc.d
which was the default before.

This rc.d scripts are not automatically added to PLISTs now also.
So add to each corresponding PLIST as required.

This was discussed on tech-pkg in late January and late April.

Todo: remove the RCD_SCRIPTS_EXAMPLEDIR uses in MESSAGES and elsewhere
and remove the RCD_SCRIPTS_EXAMPLEDIR itself.
2005-05-02 20:33:57 +00:00
salo
1d67064db3 Bump BUILDLINK_RECOMMENDED after latest security update. (hi wiz!) 2005-05-02 19:48:37 +00:00
wiz
6c22cd8774 Update to 1.2.3:
* Version 1.2.3
- Corrected bug in record packet parsing that could lead
  to a denial of service attack.
- Corrected bug in RSA key export. Previously exported keys
  can be fixed using certtool. Use certtool -k <infile >outfile
- API and ABI modifications:
    gnutls_x509_privkey_fix(): Add.

* Version 1.2.2 (2005-04-25)
- gnutls_error_to_alert() now considers
  GNUTLS_E_UNEXPECTED_HANDSHAKE_PACKET.
- Fixed error in session resuming that could cause a crash in a session.
- Fixed pkcs12 friendly name and local key identifier decoding.
- Internal cleanups, removed duplicate typedef/struct definitions,
  and made source code include external include file, to check
  function prototypes during compile time.
- API and ABI modifications:
  No changes since last version.  At least not intentional, but due
  to the include header changes, there may be inadvertant changes,
  please let us know if you find any.
2005-05-02 12:59:24 +00:00
drochner
27eeb36dd4 minor cleanup: disable openssl use (not used at runtime), disable PAM
explicitely so that it os not autodetected on -current
2005-05-02 11:10:38 +00:00
drochner
a1c0a94254 +lsh2 2005-04-30 12:25:29 +00:00
drochner
0271a0b85b Move the freshly update lsh-2.0.1 into a separate pkg and leave
security/lsh at 1.4.3.
lsh-2.0.1 has interoperability problems with openssh servers
(always gets "Invalid server signature" errors).
lsh-1.4.3 is not affected by CAN-2003-0826. Add a patch to address
CAN-2005-0814 and bump PKGREVISION.
2005-04-30 12:23:42 +00:00
rillig
83ea962e56 Added compatibility patch for ISO C90. Approved by wiz. 2005-04-29 22:17:13 +00:00
kristerw
cabe5ad111 Make this package find the compiler after bl3 were enabled. 2005-04-29 16:59:02 +00:00
drochner
d4ec42c6fe update to 0.45
changes:
- Makefile no longer appends 'static' to statically linked binaries
- Add optional SSH_ASKPASS support to the client
- Respect HOST_LOOKUP option
- Fix accidentally removed "return;" statement which was removed in 0.44
  (causing clients which sent an empty terminal-modes string to fail to
  connect - including pssh, ssh.com, danger hiptop). (patches
  independently from Paul Fox, David Horwitt and Sven-Ola Tuecke)
- Read "y/n" response for fingerprints from /dev/tty directly so that dbclient
  will work with scp.
2005-04-29 16:14:41 +00:00
wiz
3a4887c254 Add CONFLICTS with lsh (common man page). 2005-04-28 14:11:13 +00:00
wiz
a41ad46647 Update to 2.0.1:
News for the 2.0.1 release

	Fixed denial of service bug in lshd.

	Fixed a bug in lsh-make-seed, which could make the program go
	into an infinite loop on read errors.

	lsh now asks for passwords also in quite (-q) mode, as
	described in the manual.

	Control character filtering used to sometimes consider newline
	as a dangerous control character. Now newlines should be
	displayed normally.

	Removed support for the non-standard alias
	"diffie-hellman-group2-sha1". The standardized name is for
	this key exchange method is "diffie-hellman-group14-sha1".

News for the 2.0 release

	Several programs have new default behaviour:

	* lshd enables X11 forwarding by default (lsh still does not).

	* lsh-keygen generates RSA rather than DSA keys by default.

	* lsh-writekey encrypts the private key by default, using
	  aes256-cbc. Unless the --server flag is used.

	Improved the lcp script. It is now installed by default.

	Implemented the client side of "keyboard-interactive" user
	authentication.

	Support keyexchange with
	diffie-hellman-group14-sha1/diffie-hellman-group2-sha1 (the
	standardized name is at the moment not decided).

	Fixes to the utf8 encoder, and in particular interactions
	between utf8 and control character filtering.

News for the 1.5.5 release

	Added SOCKS-style proxying to lsh and lshg. See the new -D
	command line option. Supports both SOCKS-4 and SOCKS-5.

	The lsh client no longer sets its stdio file descriptors into
	non-blocking mode, which should avoid a bunch of problems. As
	a consequence, the --cvs-workaround command line option has
	been deleted.

	In the user lookup code, lshd now ignores the shadow database
	if getspnam returns NULL.

	In the server pty setup code, use the group "system" as a
	fallback if the group "tty" doesn't exist. This is the case on
	AIX. (There are however more problems on AIX, which makes it
	uncertain that lshd will work out of the box).

	Deleted the --ssh1-fallback option for lshd. I hope ssh1 is
	dead by now; if it isn't, you have to run ssh1d and lshd on
	different ports.

	Deleted code for bug-compatibility with ancient versions of
	Datafellow's SSH2. There are zero bug-compatibility hacks in
	this version.

News for the 1.5.4 release

	Added logging of tcpip-forward requests.

	Includes nettle-1.9, which have had some portability fixes and
	optimizations. In particular, arcfour on x86 should be much
	faster.

	Implemented flow control on the raw ssh connection. Enforce
	limits on the amount of buffered data waiting to be written to
	the socket.

	Moved all destructive string operations to a separate file
	lsh_string.c, which has exclusive rights of accessing string
	internals. Should make the code more robust, as buffer size
	and index calculations elsewhere in the code should hit an
	assert in lsh_string.c before doing damage.

	Some general simplification and cleanup of the code.

News for the 1.5.3 release

	Fixed heap buffer overrun with potential remote root
	compromise. Initial bug report by Bennett Todd.

	Fixed a similar bug in the check for channel number allocation
	failure in the handling of channel_open, and in the
	experimental client SRP code.

	lshd now has an experimental mode similar to telnet, where it
	accepts the 'none' authentication method and automatically
	disables services such as X and TCP forwarding. This can be
	useful in environment where it's required that /bin/login or
	some other program handle authentication and session setup
	(e.g. handle security contexts and so on).

News for the 1.5.2 release

	Encrypted private keys works again.

	New client escape sequence RET ~ ?, which lists all available
	escape sequences. Also fixed the werror functions so that they
	use \r\n to terminate lines when writing to a tty in raw mode.

	Implemented handling of multiple --interface options to lshd.
	As a side effect, The -p option must now be given before
	--interface to have any effect.

	Connecting to machines with multiple IP-adresses is smarter,
	it connects to a few addresses at a time, in parallel.

	Fixed a file descriptor leak in the server tcpip forwarding
	code.

	Lots of portability fixes.

News for the 1.5.1 release

	Incompatible change to key format, to comply with the current
	spki structure draft. You can use the script lsh-upgrade to
	copy and convert the information in the old .lsh/known-hosts
	to the new file .lsh/host-acls. The new code uses libspki.

	Fixed IPv6 bug reported by Simon Kowallik.

	lshd now does the equivalence of ulimit -n unlimited, this is
	inherited by processes started upon client requests. If you
	don't want this, you should use /etc/{profile,login,whatever}
	to set limits for your users. Do note that PAM-based solutions
	will NOT work as PAM is used from a separate process that
	terminates as soon as the authentication is finished (this of
	course goes for environment variables too).

	lsh and and lshg now parses options from LSHFLAGS and
	LSHGFLAGS, these are parsed before and can be overridden by
	the command line.

News for the 1.5 release

	Implemented the server side of X11 forwarding. Try lshd
	--x11-forward. There's one known bug: The server may start
	sending data on the session channel (typically your first
	shell prompt) before it has sent the reply to the client's
	"shell" or "exec" request. lsh will complain about, and ignore
	that data.

	As part of the X11 hacking, the socket code have been
	reorganized.

	Deleted one of the ipv6 configure tests. Now lsh will happily
	build ipv6 support even if ipv6 is not available at run-time
	on the build machine.

	Fixed bug preventing -c none from working.

	Another bug fix, call setsid even in the non-pty case.

	Various bug fixes.
2005-04-28 14:10:04 +00:00
hira
a572fbecb4 Remove USE_BUILDLINK3 (typo). 2005-04-27 20:48:32 +00:00
shannonjr
e220456334 Removed USE_BUILDLINK3
We don't need this any longer -- it's now default.
2005-04-25 09:54:04 +00:00
shannonjr
e5d8b0747b Added missing USE_BUILDLINK3 to Makefile 2005-04-25 09:37:09 +00:00
shannonjr
d0df8b31e6 Added missiong USE_BUILDLINK3 2005-04-25 09:30:49 +00:00
adrianp
7438336746 - Note addition of amap-5.0 2005-04-24 12:16:19 +00:00
adrianp
bfe10126f3 Amap is a next-generation scanning tool, it identifies applications and
services even if they are not listening on the default port by creating
a bogus-communication.

This is amap-5.0
2005-04-24 12:10:47 +00:00
adrianp
a549e9d4a1 - Replace /usr/pkg hard reference with ${PREFIX} 2005-04-24 10:42:49 +00:00
shannonjr
9ea89880c0 Revised to use gpg instead of gpg2 for OPENPGP when building gpgsm
following GNUPG recomendations: "Note that GnuPG 1.4 and 1.9 are not yet
in sync and thus features and bug fixes done in 1.4 are not available
in 1.9.  *Please keep on using 1.4.x for OpenPGP*; 1.9.x and 1.4.x may
be installed simultaneously."
2005-04-23 12:44:58 +00:00
shannonjr
ebdfc38fef Update to 1.9.16.
GnuPG 1.9 is the development version of GnuPG; it is based on some old
GnuPG 1.3 code and the previous NewPG package.  It will eventually
lead to a GnuPG 2.0 release.  Note that GnuPG 1.4 and 1.9 are not yet
in sync and thus features and bug fixes done in 1.4 are not available
in 1.9.  *Please keep on using 1.4.x for OpenPGP*; 1.9.x and 1.4.x may
be installed simultaneously.

You should use GnuPG 1.9 if you want to use the gpg-agent or gpgsm
(the S/MIME variant of gpg).  The gpg-agent is also helpful when using
the stable gpg version 1.4 (as well as the old 1.2 series).

This is mainly a bug fix release but comes with some new features as
well:

 * gpg-agent does now support the ssh-agent protocol and thus allows
   to use the pinentry as well as the OpenPGP smartcard with ssh.

 * New tool gpg-connect-agent as a general client for the gpg-agent.

 * New tool symcryptrun as a wrapper for certain encryption tools.

 * The gpg tool is not anymore build by default because those gpg
   versions available in the gnupg 1.4 series are far more matured.
2005-04-23 12:38:05 +00:00
shannonjr
2843bb1a1e Update from 0.9.0 to 0.9.1. This is a bug fix release. 2005-04-23 12:28:04 +00:00
shannonjr
2e5cdad2a5 Update from 0.9.10 to 0.9.11. This is part of a multi-package update
for S/MIME capability involving gnupg-devel and dirmngr also. The
changes to this pkg are bug fixes.
2005-04-23 12:25:05 +00:00
lha
dfc55f5279 Update to Heimdal 0.6.4. While I'm here, claim maintainership of this
package. Also please pkglint. Changes in heimdal 0.6.4 include:

 * fix vulnerabilities in telnet
 * rshd: encryption without a separate error socket should now work
 * telnet now uses appdefaults for the encrypt and forward/forwardable
   settings
 * bug fixes
2005-04-21 14:35:47 +00:00
wiz
1c8bce53ca lha agreed to maintain this package. 2005-04-21 14:00:36 +00:00
itojun
3378e7ca3b racoon development have stopped. use security/ipsec-tools. 2005-04-21 10:23:09 +00:00
heinz
f5bdaed4b1 Updated to version 0.12
OWN_DIRS was incorrectly used (did not work when PKG_CONFIG=no).
INSTALLATION_DIRS creates the directories now and the PLIST removes them.

Needs at least net/p5-Net-DNS 0.44 (see changes below).
--

Changes since 0.11
==================
   FEAT: Added utility function key_difference() to Net::DNS::SEC. See
         perlpod for details. I needed this in other software and
         figured they are generic enough to make them available
         through this module.

   FEAT: Modified some functions to use DNSKEY and RRSIG instead off
         KEY and SIG.
         - Net::DNS::Keyset now uses DNSKEY and RRSIG.
	 - the demo function getkeyset.pl now uses DNSKEY too.

   FEAT: Added the possibility to create a keyset out of two arrays of
         dnskey and rrsig object.

   FEAT: Added some helperfunctions to Net::DNS::SEC::Private to read X509
         formated private keys and dump them into bind format.
	 This functionality has not been tested well.

   BUG : When reading a RRSIG from a packet the signame would not have
         a trailing dot.

   FEAT:  Removed critical dependency on bubblebabble. It is available to
          DS if installed but not critically dependend.

   BUG: - Fixed minor in signing unknown RR types.

   FEAT: - Prelimanary support for draf-ietf-dnssec-nsec-rdata-02. This
	   depends on support for unknown RR types (Net::DNS version
           0.44)

   FEAT: - To be able to deal with argument supplied as either mnemonics or
           by value the Net::DNS::SEC::argument method was created. It can
           be used as a class method but it is also inherited by
	   Net::DNS::RR::RRSIG and Net::DNS::RR::DNSKEY.
2005-04-20 16:22:38 +00:00
wiz
8004616d39 Move WRKSRC line to where it belongs nowadays. 2005-04-20 14:36:14 +00:00
wiz
721e19e8f5 Add RCS Id. 2005-04-20 14:34:45 +00:00
wiz
0132b38bff Drop trailing whitespace. 2005-04-20 14:34:31 +00:00
wiz
e8e50312e4 Drop trailing whitespace, |fmt. 2005-04-20 14:34:20 +00:00
wiz
7ba101619a Sort. 2005-04-20 14:33:54 +00:00
wiz
5f39c8217e Sort bl3 inclusions. 2005-04-20 14:33:30 +00:00
wiz
91892109f4 Add missing include for zlib/bl3; from pancake in PR 30016. 2005-04-20 14:32:48 +00:00
wiz
89a2fbb9fb Remove xdm-krb4; does not build on 2.0.
On NetBSD, there's a more elegant way using PAM nowadays, too.
Ok'd by wennmach@.
2005-04-19 09:51:24 +00:00
adrianp
90d038a41d - Note import of hydra 2005-04-17 12:22:26 +00:00
adrianp
6a62162baa THC-Hydra the best parallized login hacker is available: for Samba,
FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP NNTP, VNC, ICQ, Socks5,
PCNFS, Cisco and more. Includes SSL support and is part of Nessus.
2005-04-17 12:19:54 +00:00
adrianp
b48b945a9c - Note addition of libssh 2005-04-17 11:37:03 +00:00
adrianp
d896afd496 The ssh library was designed to be used by programmers needing a working
SSH implementation by the mean of a library. The complete control of the
client is made by the programmer.

With libssh, you can remotely execute programs, transfer files, use a
secure and transparent tunnel for your remote programs. With its Secure
FTP implementation, you can play with remote files easily, without
third-party programs others than libcrypto (from openssl).
2005-04-17 11:34:16 +00:00
salo
5a0bc23770 Bump BUILDLINK_RECOMMENDED for latest security fix. (hi jlam!) 2005-04-16 14:32:53 +00:00
jlam
d2d9d446c5 Remove unused section... MIT krb5 apparently now detects NetBSD's utmpx
implementation correctly on NetBSD>=2.0.
2005-04-14 23:07:55 +00:00
rillig
685962fb63 Fixed the patched to use the <ctype.h> functions correctly, that is:
isalpha((unsigned char)*s) instead of isalpha((int)*s). Also replaced
WRKSRC with BUILD_DIRS, which is more appropriate. Approved by jlam.
2005-04-13 16:45:46 +00:00
tv
7671a5504e Nuke USE_BUILDLINK3 (some files missed in megacommit). 2005-04-12 15:11:18 +00:00
jlam
28d13b9541 The FTP daemon is always named "kftpd" regardless of whether prefix-cmds
is a PKG_OPTION.
2005-04-11 22:44:54 +00:00
tv
f816d81489 Remove USE_BUILDLINK3 and NO_BUILDLINK; these are no longer used. 2005-04-11 21:44:48 +00:00
jlam
6b8a7f8090 Patch from http://web.mit.edu/kerberos/advisories/2005-001-patch_1.4.txt
which fixes MITKRB5-SA-2005-001 (CAN-2005-0468 & CAN-2005-0469) relating
to buffer overflows in the telnet client.  Bump PKGREVISION to 1.
2005-04-10 07:46:50 +00:00
jlam
73ac75cebe Remove the examples directory on deinstallation. 2005-04-10 07:45:31 +00:00
jlam
46c042ccc9 Updated security/mit-krb5 to krb5-1.4. Changes from version 1.3.6 include:
* Merged Athena telnetd changes for creating a new option for requiring
    encryption.
* Add implementation of the RPCSEC_GSS authentication flavor to the RPC
    library.
* The kadmind4 backwards-compatibility admin server and the v5passwdd
    backwards-compatibility password-changing server have been removed.
* Thread safety for krb5 libraries.
* Yarrow code now uses AES.
* Merged Athena changes to allow ftpd to require encrypted passwords.
* Incorporate gss_krb5_set_allowable_enctypes() and
    gss_krb5_export_lucid_sec_context(), which are needed for NFSv4.
* Fix heap buffer overflow in password history mechanism.
    [MITKRB5-SA-2004-004]
2005-04-10 07:15:24 +00:00
wiz
92528d7df9 Update to 1.0.2:
Noteworthy changes in version 1.0.2 (2004-12-28)
------------------------------------------------

 * Changed the license of the library to the GNU Lesser General Public
   License (LGPL), version 2.1 or later.
2005-04-08 15:59:01 +00:00
wiz
373dc70217 Update to 1.2.1:
* Version 1.2.1 (2005-04-04)
- gnutls_bye() will no longer fail when RDWR is used and application
  data are available for reading.
- Added more strict checks for the SRP parameters (g,n), when they
  are not in the included list.
- Added warning to certtool when MD5 is being used for digital
  signatures.
- Optimizations ("-O2 -finline-functions") are not enabled by default,
  instead the standard autoconf defaults are used.  Use `./configure
  CFLAGS="-O2 -finline-functions"' to get the old optimizations.
- Added the option --get-dh-params to certtool, in order to get the
  included in the library primes and generators.
- Improved the semantics of GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT, to
  allow only trusted Version 1 CAs and introduced
  GNUTLS_VERIFY_ALLOW_ANY_X509_V1_CA_CRT which has the old semantics.
- Nettle self tests now build properly, reported by Pierre
- Eliminated some memory leaks in DHE and RSA-EXPORT cipher suites.
  Reported by Yoann Vandoorselaere
- Added the functions:
    gnutls_x509_crt_list_import(),
    gnutls_x509_crq_get_attribute_by_oid(),
    gnutls_x509_crq_set_attribute_by_oid() and
    gnutls_x509_crt_set_extension_by_oid().
- If the library has been compiled with features disabled, a warning is
  issued during the compilation of any program.
2005-04-08 15:50:41 +00:00
xtraeme
60cc7034de Update to 0.58.
Changes:

# Wildcards (mput/mget) and recursive file transfer in PSFTP.
# You can now save your session details from the Change Settings
  dialog box, after you've started your session.
# Various improvements to Unicode support, including:

    * support for right-to-left and bidirectional text (Arabic,
      Hebrew etc). Thanks to arabeyes.org for design and most of
      the implementation.
    * support for Arabic text shaping, again thanks to arabeyes.org.
    * support for Unicode combining characters.

# Support for the xterm 256-colour control sequences.
# Port forwardings can now be reconfigured in mid-session.
# Support for IPv6. Thanks to unfix.org for having patiently maintained
  the patch for this until we were finally ready to integrate it.
# More configurability and flexibility in SSH-2 key exchange. In
  particular, PuTTY can now initiate repeat key exchange during the
  session, which means that if your server doesn't initiate it (OpenSSH
  is known not to bother) you can still have the cryptographic benefits.
# Bug fix: display artefacts caused by characters overflowing their
  character cell should now all be gone. (This would probably have
  bothered Windows ClearType users more than anyone else.)
# Bug fix: keepalives are now supported everywhere. (Previously they
  were supported by Windows GUI PuTTY, but were missing in Plink, PSFTP
  and the Unix port.)
# Miscellaneous improvements for CJK/IME users; many thanks to Hung-Te
  Lin for assistance.
2005-04-06 21:51:13 +00:00
adrianp
77c9fe3738 - Remove the nessus-update-plugins patch I included a while ago. Nessus
now use their own binary for fetching updated plugin files from the
  nessus.org site.
2005-04-05 22:15:55 +00:00
wiz
e68dc83eae Sort. 2005-04-05 10:40:46 +00:00
wiz
e8e0488c1e Convert to bl3, untested. 2005-04-05 10:34:19 +00:00
adam
1d24cdc539 Changes 2.2.4:
* Fixed several bugs which may impact scanning performance
* Reduced CPU usage
* A new SMB API to log into the remote Windows host
2005-04-04 09:31:46 +00:00
minskim
425981e03b Avoid calling makeinfo because the distfile contains pre-built .info
files.  This makes the package build on platforms without makeinfo.
Patch provided by Darrin B. Jewell in PR pkg/29869.
2005-04-03 04:50:21 +00:00
adrianp
66ad9d61c4 - Update SnortSnarf to 050314.1
- Grab maintainership
- Use SUBST_SED framework replacing patch-aa
- Change HOMEPAGE for project
- Origional update submitted by Dave Tyson in PR# 29753, thanks !

> * Changed hard coded reference links to the Snort.org SID database to
>   reflect changes to snort.org - MFR
2005-04-02 13:02:27 +00:00
adrianp
b953d22a3c - Update scanssh from 2.0 to 2.1
> Minor improvements to open proxy detection.
> Ability to scan via SOCKS proxies.
2005-04-02 11:55:29 +00:00
jdolecek
628028210b Add package for main QCA library - Cross-platform crypto API for QT.
This is required by PSI 0.9.3.

Package provided by Piotr Kalinowski in PR pkg/29277
2005-04-02 11:23:30 +00:00
jdolecek
04374df8a1 update the COMMENT to reflect this is just a TLS plugin 2005-04-02 11:21:43 +00:00
cube
f51a99f68c Update to 1.6.8pl7.
Changes:

557) Added a set of missing braces needed for MacOS X / Darwin.
558) Define LDAP_OPT_SUCCESS for those without it.
559) Warn if the user tries to use the -u option when not running a command.
560) Better PAM error handling and messages.
561) Fixed setting of $USER when env_reset is enabled.
2005-03-30 12:08:15 +00:00
wiz
07d62ffe48 Update to 0.57:
PuTTY 0.57, released today, fixes two security holes which can
allow a malicious SFTP server to execute code of its choice on a
PSCP or PSFTP client connecting to it. We recommend everybody
upgrade to 0.57 as soon as possible.
2005-03-29 14:40:09 +00:00
jlam
e8b16d2e6e Remove security/cyrus-sasl and security/cy-login. These packages
tracked the Cyrus SASL 1.5.x releases, which are no longer maintained.
Adjust packages to use security/cyrus-sasl2 instead for SASL support.
This closes PR pkg/28218 and PR pkg/29736.
2005-03-28 09:39:56 +00:00
bad
91beba98da Don't need to provide a definition of QMAKE in the environment any longer.
qt3-tools/buildlink3.mk does that now.
2005-03-25 10:20:59 +00:00
adam
2f0e778247 Changes 0.9.2:
- Added SNEFRU128, SNEFRU256. Reintroduced MD2.
- Fixes to .spec file and clean-ups of documentation
- Fixed typecasts, memory leaks and compiler warnings
2005-03-25 09:31:50 +00:00
jlam
da2fc85390 Don't check for USE_BUILDLINK3 anymore in these files. These are included
by other package Makefiles, and with the deprecation of USE_BUILDLINK3
support in the infrastructure files, these had the potential to break
existing packages.
2005-03-24 22:42:58 +00:00
wiz
b8e0eb28f4 Remove FreeBSD RCS Ids. pkgsrc has diverged too much for syncing to be
useful.
2005-03-24 21:12:50 +00:00
reed
0b69fc27e2 Depend on bash>=2 instead of bash>=2.05.2.7.
Okayed by maintainer.

Sometime ago, I had noticed my bash was too old, but I found
it was good enough for this.
2005-03-24 17:23:42 +00:00
agc
32d24069d4 Add and enable systrace-policies 2005-03-24 17:12:46 +00:00
agc
61003172f9 Initial import of the collection of systrace(1) policies from hairyeyeball.
The files in this archive are example systrace policy files,
	which can be used to raise the security levels of your
	computer by using the systrace(1) utility.  These example
	policies can be used as a base for custom policies, or as
	learning material.
2005-03-24 17:11:45 +00:00
jlam
81611d789e Strip off any leading "-Wl," in the compiler and linker flags before
the courier Makefile adds it to all of the flags again.  This avoids
situations where you end up with a flag that looks like "-Wl,-Wl,...".
This should fix the problem noted in pkg/29777.
2005-03-24 07:13:14 +00:00
manu
996dcfad79 Missing installed files inPLIST 2005-03-23 17:27:17 +00:00
manu
7c1a540aa7 Upgrade to ipsec-tools 0.6b1.
New features:
- PAM support
- privilege separation
2005-03-23 16:49:39 +00:00
jlam
aa151ceb8b Update security/openssl to openssl-0.9.7f.
Pkgsrc changes from version 0.9.7e include:

  *) Install the man pages with names that are less likely to collide
     with other packages' man pages.
  *) Support PKG_OPTIONS of "idea", "mdc2" and "rc5" to allow building
     with patented algorithms.  By default, this package still builds
     without patented algorithms.

Major changes from version 0.9.7e include:

  *) Prompt for pass phrases when appropriate for PKCS12 input format.
  *) Back-port of selected performance improvements from development
     branch, as well as improved support for PowerPC platforms.
  *) Add lots of checks for memory allocation failure, error codes to indicate
     failure and freeing up memory if a failure occurs.
  *) Add new -passin argument to dgst.
  *) Make an explicit check during certificate validation to see that
     the CA setting in each certificate on the chain is correct.
2005-03-23 09:06:38 +00:00
wiz
215694b4d2 Update to 1.4.1:
Noteworthy changes in version 1.4.1 (2005-03-15)
------------------------------------------------

    * New --rfc2440-text option which controls how text is handled in
      signatures.  This is in response to some problems seen with
      certain PGP/MIME mail clients and GnuPG version 1.4.0.  More
      details about this are available at
      <http://lists.gnupg.org/pipermail/gnupg-users/2005-January/024408.html>.

    * New "import-unusable-sigs" and "export-unusable-sigs" tags for
      --import-options and --export-options.  These are off by
      default, and cause GnuPG to not import or export key signatures
      that are not usable (e.g. expired signatures).

    * New experimental HTTP, HTTPS, FTP, and FTPS keyserver helper
      that uses the cURL library <http://curl.haxx.se> to retrieve
      keys.  This is disabled by default, but may be enabled with the
      configure option --with-libcurl.  Without this option, the
      existing HTTP code is used for HTTP, and HTTPS, FTP, and FTPS
      are not supported.

      [enabled with the "curl" option for the package]

    * When running a --card-status or --card-edit and a public key is
      available, missing secret key stubs will be created on the fly.
      Details of the key are listed too.

    * The implicit packet dumping in double verbose mode is now sent
      to stderr and not to stdout.

    * Added countermeasures against the Mister/Zuccherato CFB attack
      <http://eprint.iacr.org/2005/033>.

    * Add new --edit-key command "bkuptocard" to allow restoring a
      card key from a backup.

    * The "fetch" command of --card-edit now retrieves the key using
      the default keyserver if no URL has been stored on the card.

    * New configure option --enable-noexecstack.

Also, gpgkeys_mailto is not installed any longer, dropping the
dependency on perl.
2005-03-22 17:50:55 +00:00
jmmv
bc301ce848 Bump revision due to update of eel2 to 2.10.0. 2005-03-22 16:13:34 +00:00
jmmv
46db697b11 Update to 0.4.2:
* AIX portability fixes
* Translation updates
2005-03-22 15:58:49 +00:00
jlam
790794b486 Update security/courier-authlib to courier-authlib-0.55. Changes from
version 0.54 include:

    * authsystem.passwd.in: Explicitly set LC_ALL to en_US
    * SASL: Added CRAM-SHA256 authentication method (experimental).
    * courierauthdebug.h: Macro dprintf conflicts with new glibc.
2005-03-22 03:53:33 +00:00
wiz
cf28360a68 Add and enable dsniff-nox11. 2005-03-22 01:07:32 +00:00
wiz
5c0172691c Split parts of Makefile into Makefile.common for use by dsniff-nox11.
Only build webspy in this package, and depend on dsniff to get the
other tools. Bump PKGREVISION.
2005-03-22 01:07:07 +00:00
wiz
c8ab14f8dc Initial import of dsniff-nox11, the tools from dsniff that don't
need X11. Addresses PR 25703 by Jukka Salmi.
2005-03-22 01:05:16 +00:00
wiz
ddb31685dc Do not open files opened for reading in RW mode. Helps in using
cfs over coda. From Greg Troxel in PR 28479. PKGREVISION++
2005-03-21 18:08:31 +00:00
jmmv
2dee0083a6 Fix build by avoiding conflicts between the included tun files and the ones
provided by libdnet.  This was broken during the last update of libdnet to
0.10, as the previous versions did not include the tun stuff.
2005-03-20 16:38:10 +00:00
jmmv
7cdc08d2d9 Use BUILDLINK_PREFIX.libdnet rather than PREFIX to locate libdnet. 2005-03-20 16:37:04 +00:00
ben
31abab19ec Update fprot-workstation-bin to version 4.5.4. This addresses PR#29747.
Version 4.5.4 is a bugfix release.
Fixed a string error in the updater.
Fixed a race condition in f-protd where f-protd would report
	'Bad file number' on accept() under high loads.
Fixed a crash issue with malformed word macros.
Fixed a memory corruption in the x86 emulation code.
Modified check-updates.pl to automatically detect f-prot version number.
2005-03-20 14:14:26 +00:00
fredb
ebdd47a6ac Extend "fshcompat.py" to work with python24, using patch submitted by
lukem in PR pkg/29704. Reviewed by recht.
2005-03-20 12:51:54 +00:00
wiz
7328a4a638 Update to 5.2.1. Provided by Stefan Krüger in PR 28740.
5.2 - merged in changes for 5.01 - 5.0.4
    - added support for using encoding parameters and key derivation parameters
      with public key encryption (implemented by OAEP and DL/ECIES)
    - added Camellia, SHACAL-2, Two-Track-MAC, Whirlpool, RIPEMD-320,
      RIPEMD-128, RIPEMD-256, Base-32 coding
    - added ThreadUserTimer for timing thread CPU usage
    - added option for password-based key derivation functions
      to iterate until a mimimum elapsed thread CPU time is reached
    - added option (on by default) for DEFLATE compression to detect
      uncompressible files and process them more quickly
    - improved compatibility and performance on 64-bit platforms,
      including Alpha, IA-64, x86-64, PPC64, Sparc64, and MIPS64
    - fixed ONE_AND_ZEROS_PADDING to use 0x80 instead 0x01 as padding.
    - fixed encoding/decoding of PKCS #8 privateKeyInfo to properly
      handle optional attributes

5.2.1 - fixed bug in the "dlltest" DLL testing program
      - fixed compiling with STLport using VC .NET
      - fixed compiling with -fPIC using GCC
      - fixed compiling with -msse2 on systems without memalign()
      - fixed inability to instantiate PanamaMAC
      - fixed problems with inline documentation
2005-03-19 16:48:21 +00:00
jlam
b4bcbe1138 Avoid possibly linking everything against -lintl when PostgreSQL
support is built into courier-authlib -- -lintl is only needed by the
authpgsql authentication module.  This avoids problems when linking
clients with -lcourierauth and the linker thinks -lintl is needed when
it really doesn't.  Bump the PKGREVISION to 3.
2005-03-18 20:20:48 +00:00
taca
51b67861b8 Add and enable ruby16-digest package. 2005-03-18 05:26:05 +00:00
taca
4e98e9dcb5 Importing security/ruby16-digest package which I forgot to import,
it is needed by ruby16 package.

Now this package includes some fixes for IRIX, too.
2005-03-18 05:25:32 +00:00
wiz
d7b95a192c Update HOMEPAGE and MASTER_SITES. 2005-03-17 15:48:38 +00:00
rillig
b2b26b7830 Added patches for gcc-2.95.3 that properly order declarations and code.
Approved by wiz.
2005-03-16 12:04:12 +00:00
rillig
f6ce795bd8 Added proper CFLAGS quoting. Approved by wiz. 2005-03-16 12:03:06 +00:00
tv
0d32597e47 There's no need to manually format and install a nroffed manpage.
Install the source and let man(1) do it.

(Since this code is actually all commented out, no PKGREVISION bump.)
2005-03-14 20:23:50 +00:00
tv
642acf8e6a Make build on Interix, sharing some of the OS-specific oddities with _WIN32. 2005-03-10 15:38:33 +00:00
wiz
91fab19321 Sort. 2005-03-10 10:05:31 +00:00
bad
205c9fc93b Make it explicit that the package doesn't install any authentication mechanisms
and what the likely, but opaque, error message is in that case.
2005-03-08 18:22:39 +00:00
tv
71e2654fa3 nb5: Rework Interix support, based on work done by Interop Systems
*before* a BSD-with-advertising license was added to their diffs, and other
work done personally by me.

sshd now works.  Most permissions checks work properly.  Privsep is off by
default, and the sshd user is not created, on Interix until some problems
with privsep are fixed (perhaps by abstracting the auth functionality out
to openpam).
2005-03-07 23:29:49 +00:00
bad
237cf6898e Because LIBTOOLIZE_PLIST is "yes" by default we must list only the .la file
in the PLIST.
2005-03-07 20:49:24 +00:00
uebayasi
9fc677698c Fix quoting. 2005-03-07 10:03:13 +00:00
taca
0f010b9a66 Bump PKGREVISION with introduce of ruby16-base/ruby18-base pacakge. 2005-03-06 17:19:05 +00:00
taca
4feb8883ce Add and enable ruby-digest and ruby-openssl. 2005-03-06 17:04:53 +00:00
taca
079f54e1fd Revive separated ruby packages, ruby-dbm, ruby-zlib, ruby-digest and
ruby-openssl with bump PKGREVISION.
2005-03-06 16:52:39 +00:00
taca
cf24692f45 Cosmetic change with pkglint(1). 2005-03-06 13:05:38 +00:00
tv
69c509bf6b Make p5-GnuPG-Interface and pgpenvelope work again by switching to the
Class::MethodMaker v1 compatibility interface in Class::MakeMethods.
Bump PKGREVISION.
2005-03-04 20:57:50 +00:00
agc
9fcba1c468 Update gpg2dot to version 1.4.
Fixes from Christoph Badura, who tested on gnupg-1.2.

This new version works with gnupg-1.4.0 as well as older versions of gpg,
and uses the --list-sigs argument as well as the --with-colons arguments
to gpg.
2005-03-03 22:43:49 +00:00
adrianp
80ff133fe0 - Change to my NetBSD.org address 2005-03-02 23:00:32 +00:00
jlam
915339f298 The path to the Courier authdaemond socket was improperly being set to
the wrong value.  Fix it so that the default is now correctly set to be
/var/authdaemond/socket.  Bump the PKGREVISION to 1.
2005-03-02 15:52:26 +00:00
shannonjr
40fcb8eaf0 Problem: Dirmngr depends on pth. With an explicit buildlink to pth, the
package builds and works correctly. This approach was taken prior to
this change. The is a problem because  pth installs pthread.h in
${LOCALBASE}/include. This causes problems for things like Ada tasking
that depend on native pthreads when also linking against libraries in
pkgsrc (eg., gmp).

This change solve the problem by building a static pth library locally
and linking against it.
2005-03-02 14:59:35 +00:00
bad
59d53dc973 Add fwbuilder to the list of sub directories. 2005-02-28 22:11:14 +00:00
adrianp
954e64ac83 - Update to 0.6.8
> $Id: CHANGES,v 1.25 2005/02/20 16:02:21 sm Exp $
> version 0.6.8 (beta) - Sun Feb 20 2004
>    * added detection for openssl 0.9.8
>    * removed crlDistributionPoint for Root-CA
>    * added patch for multiple OUs
>      Thanks to Uwe Arndt <arndt@uni-koblenz.de>
>    * added patch for multiple subjectAltName extensions
>      Thanks to Peter Marschall <peter@adpm.de>
2005-02-28 22:01:22 +00:00
adam
6f581244b1 Changes 1.7.1:
* Fixed bug which caused hostnames containing hyphens to fail with an error.

* Improved mapping of ID numbers to names in decode.  This allows sparse IDs
  ranges (e.g. 1,2,3,65000) to be supported, which means that we can now decode
  XAUTH authentication method amongst other things.

* Added SO_BROADCAST option to UDP socket to allow sending to broadcast
  addresses.  Previously this gave a permission denied error.
2005-02-28 16:04:28 +00:00
wiz
a7a14cb51d Update to 0.2.5:
* Version 0.2.5 (released 2005-02-08)

** Added self test of EXTERNAL mechanism.

** Vietnamese translation added, thanks to Clytie Siddall.

* Version 0.2.4 (released 2005-01-01)

** The CRAM-MD5 mechanism is now preferred over DIGEST-MD5.
This decision was based on recent public research that suggest MD5 is
broken, while HMAC-MD5 not immediately compromised, and the lack of
public analysis on what consequences the MD5 break have for
DIGEST-MD5.  Support for CRAM-SHA1 is under investigation, to enable
users to avoid MD5 completely

** Fixed a bug that prevented SMTP client from working.

** New configure option --disable-obsolete to remove backwards compatibility.
This is mostly intended to be used when compiling for platforms with
constrained memory/space resources.

** DIGEST-MD5 rewritten and enabled by default (see lib/NEWS for details).

** Command line tool now query for realm, hostname and service name properly.

** Documentation updates and improvements.

** Self test improvements.

** Update of gnulib files.
2005-02-28 13:29:31 +00:00
peter
b5362e6d00 Fix installation on NetBSD 1.6.
Reviewed by wiz@
2005-02-27 17:33:44 +00:00
jlam
b9aef33c1b Install some documentation files for courier-authlib, but only install the
relevant ones depending on the options chosen.  This fixes PR pkg/29465.
Bump the PKGREVISION to 2.
2005-02-26 22:14:01 +00:00
jmmv
f9fabef92a Update to 0.4.1:
* Support for slaving lifecycle to a file descriptor
* Translation updates
2005-02-26 17:23:37 +00:00
bad
d86cccf8b6 Upgrade fwbuilder and libfwbuilder to 2.0.6.
The main change is support for printing policies and NAT rules for
firewall objects.  Also improvments in the iptables compiler and lots
of bug fixes, to numerous to mentions.  See the release notes at:
http://www.fwbuilder.org/archives/cat_release_notes.html#000185
2005-02-26 11:52:04 +00:00
jlam
55ecced35d Correct path to courier-authlib in comment. 2005-02-26 08:14:11 +00:00
wiz
c28c96be32 Work around broken dependency handling by explicitly setting timezone
to UTC. Fixes PR 29530.
2005-02-25 15:23:24 +00:00
agc
d81d19f8e0 Add RMD160 digests. 2005-02-24 12:51:41 +00:00
bad
8a6f6cfbe8 Add RMD160 digests. 2005-02-24 11:34:22 +00:00
bad
f007c3ab9b Initial import of fwbuilder-2.0.5.
Firewall Builder is a multi-platform firewall configuration and
management tool.  It consists of a GUI and a set of policy compilers for
various firewall platforms.  Firewall Builder uses an object-oriented
approach, it helps administrators maintain a database of network
objects and allows policy editing using simple drag-and-drop
operations.  Firewall Builder currently supports

	iptables,
	IP Filter,
	ipfw,
	OpenBSD PF, and
	Cisco PIX

fwbuilder provides the GUI frontend and the policy compilers.
2005-02-24 11:03:22 +00:00
bad
bcfc15b19c Replace libfwbuilder with version 2.0.5 as the previous version wasn't
useful.

Firewall Builder is a multi-platform firewall configuration and
management tool.  It consists of a GUI and a set of policy compilers for
various firewall platforms.  Firewall Builder uses an object-oriented
approach, it helps administrators maintain a database of network
objects and allows policy editing using simple drag-and-drop
operations.  Firewall Builder currently supports

	iptables,
	IP Filter,
	ipfw,
	OpenBSD PF, and
	Cisco PIX

libfwbuilder provides the back-end functionality in a library.
2005-02-24 10:59:56 +00:00
wiz
84f80908e8 Revert previous, fixed in perl5/module.mk. 2005-02-23 10:43:36 +00:00
adam
231d4d79e7 Changes 2.5.2:
Cross-platform fix for checksumming code. This is
*incompatible* with version 2.5.1. As a temporary
workaround, setting "bugcompatibility 251" will maintain
compatibility with release 2.5.1 for little-endian platforms
(e.g. Intel). This will be removed from the final production
release.

Upgrade to Inno Setup 4.

More documentation fixes.

Increased the default thread stack size to 64k and
added "threadstacksize" for debug/test purposes.

Fix handling of HTTP/1.1 responses from proxies.

Added acceptconnecttimeout (supersedes "connecttimeout")
along with connectattempts, serverconnecttimeout and
targetconnecttimeout.

Fixed bug with "clienthost" not being honoured when Zebedee
was used as a service.
2005-02-22 16:26:57 +00:00
wiz
7b9ad1bf25 Override MAKE_PARAMS returned set by perl5/module.mk; fixes build on -current. 2005-02-22 15:34:46 +00:00
adam
5a2133d2cd Changes 2.1.20:
* Bug-fixes
2005-02-21 22:10:18 +00:00
hubertf
9a981bcfbe Sign over maintainership to tech-pkg@ 2005-02-21 20:26:08 +00:00
jlam
25788569a2 Fix the authdaemond rc.d script to invoke the correct script to start
the authentication daemon.  Fix provided by Inseo Park in private mail.
Also, honor VARBASE.  Bump the PKGREVISION to 1.
2005-02-21 17:08:39 +00:00
taca
32cac2b0a5 Remove ruby-openssl package since it is included in ruby18 package now. 2005-02-21 15:44:05 +00:00
taca
5e07c19b5e Remove ruby-digest package since it is included in ruby16/ruby18 package now. 2005-02-21 15:43:44 +00:00
taca
c8d7c2377e Delete databases/ruby-dbm, devel/ruby-zlib, security/ruby-digest and
security/ruby-openssl.
2005-02-21 15:37:55 +00:00
adam
b60b462f2a Changes 2.2.3:
Nessus 2.2.3 contains a new option called "silent dependencies" which can be
used to filter out the noise generated by some plugins not directly enabled by
the user. It also contains a slightly more intuitive GUI which now contains
a "Credentials" tab to put Windows and SSH usernames and passwords.
2005-02-21 10:08:22 +00:00
grant
395f2b26c7 when linking shared libssl on Solaris, make sure the rpath is
included so it can find libcrypto.
2005-02-20 05:42:51 +00:00
manu
6c4d4ca60c Fix file installation, add missing samples config files 2005-02-20 01:03:30 +00:00
wiz
be89ba1f29 Add PKGVULNDIR to BUILD_DEFS. 2005-02-19 11:22:05 +00:00
wiz
60e3561abd [Changes for 0.44 - 2004-12-16]
* Add "pmfiles.dat" to legacy manifest_skip routine to accomodate
  early Win32 hacks.  Reported by Steve Hay via Michael Schwern.

[Changes for 0.43 - 2004-12-16]

* Updated t/0-signature.t to be more friendly with Test::More;
  contributed by Michael Schwern.

* Add $Timeout (default 3 seconds) to control the timeout for
  probing connections to the key server.

* Take account of the .ts files produced by newer MakeMakers
  in the suggested MANIFEST.SKIP list.

[Changes for 0.42 - 2004-11-20]

* Move under SVK version control management; ditch keyword tags.

* Michael Schwern pointed out that during development, the
  "signature.t" file would keep failing.

* Documented how to generate SIGNATURE files as part of "make dist",
  for Module::Install, ExtUtils::MakeMaker and Module::Build users .
2005-02-19 10:35:00 +00:00
wiz
43b8b344dc Update to 1.2.0. From the release announcement:
We are pleased to announce the availability of GnuTLS 1.2.0!

This release is the result of the 23 development releases made on the
development branch (1.1.x).

Major changes compared to the 1.0 branch include:

* Moved SRP password authentication from the GnuTLS-extra library
  (licensed under GPL) to the core library (licensed under LGPL).

* The API has been cleaned up, and data types now use a '_t' suffix.

* Fixes to handle denial of service problem when verifying long
  certificate chains.

* The manual has been converted to Texinfo and is consequently
  available in many formats, see:
  <http://josefsson.org/gnutls/manual/>

* A reference API manual has been added, and is available in HTML and
  DevHelp formats, thanks to GTK-DOC, see:
  <http://josefsson.org/gnutls/reference/gnutls-gnutls.html>

The 1.2.0 version is intended to be stable, and to be a drop-in
replacement of the stable 1.0.x branch.

We encourage developers to move to the 1.2 branch as soon as possible,
since we will now spend less time improving version 1.0.x.

We are not planning to open a 1.3 development branch soon, because
there are no plans to start work on any major new feature today.
Instead, we will continue to carefully improve the quality of this
release over time.

Improving GnuTLS is costly, but you can help!  We are looking for
organizations that find GnuTLS useful and wish to contribute back.
You can contribute by reporting bugs, improve the software, or donate
money or equipment.
2005-02-19 00:14:23 +00:00
jlam
6db647b41a Update security/courier-authlib to 0.54. Changes from version 0.53
include:

	* userdb/makeuserdb.in: Report dangling symlinks.
2005-02-18 22:12:43 +00:00
wiz
b0cc900624 Update to 0.96:
- Makefile's error messages now correct if output is
	  redirected (patch from Ilya Zakharevich).
	- Non-blocking connects/accepts now work (Problem found by
	  Uri Guttman).
	- new_from_fd() now works.
	- getline() and <> in scalar context now return undef
	  instead of '' when the read failed.  (Problem found by
	  Christian Gilmore).
	- Broken pipe signals are now ignored during socket close
	  to prevent a SSL shutdown message from killing the parent
	  program.  (Problem found by Christian Gilmore).
	- Tests should proceed much more quickly, and a semi-race was
	  fixed, meaning that on slow machines the tests should be
	  more reliable.
	- Check for Scalar::Util and Weakref now uses default
	  $SIG{__DIE__} instead of a potentially user-altered one
	  (suggestion from Olaf Schneider).  This only applies to Perl 5.6.0 & above.
	- Session caching support (patch from Marko Asplund).
	- set_default_context() added to alter the behavior of
	  modules that use IO::Socket::SSL from the main program.
	- get_ssl_object() renamed to _get_ssl_object() to reflect
	  the fact that it's only supposed to be used internally
	  (not that you should have cared, of course).
	- Added patch for Net::SSLeay to take advantage of
	  client-side session caching. (i.e. use 1.26 of Net-SSLeay)
2005-02-18 13:12:12 +00:00
wiz
9a26620291 Update to (inofficial) 1.26 needed by p5-IO-Socket-SSL-0.96:
(1.26)** 30.4.2004
      - added get1_session()
2005-02-18 13:10:40 +00:00
manu
c3622e01df Upgraded ipsec-tools to release version 0.5 2005-02-18 09:53:40 +00:00
peter
3c07d3e676 Accidently committed the wrong distinfo. 2005-02-17 23:12:02 +00:00
peter
383019eeb5 Get rid of the invalid extern for malloc and include stdlib.h for the
prototype. Suggested by Thomas Klausner.

Should fix PR pkg/29362 from A L Meyers.
2005-02-17 23:10:45 +00:00
tv
b1b07cb30c Apparently autoconf 2.5x has some very sane reasons for not using a
cache file by default; one of them is that recursion isn't re-parsing
the values correctly (and hosing up on multiple spaces in things like
CPPFLAGS).  Amusingly enough, this hosage does not happen with a site
cache file such as the one generated by autoswc.

The switch to using :Q on these variables tripped over this stupidity bug,
so turn off the Cyrus configure.in stupidity where it tries to force use
of a cache file.

Fixes PR pkg/29375 and PR pkg/29380.
2005-02-15 12:32:38 +00:00
agc
696d63a6c2 Update audit-packages to 1.33:
In download-vulnerability-list, first set the PKGVULNDIR, then create
the directory if it doesn't already exist.

Pointed out by Geert Hendrickx on tech-pkg@
2005-02-11 16:51:16 +00:00
jlam
1d3e7c56d6 Rearrange so that the MAINTAINER and HOMEPAGE are stored with the
package Makefile instead of Makefile.common.  Also, fix the HOMEPAGE
for the courier-authlib component of the Courier package.
2005-02-10 03:50:03 +00:00
jlam
44d6ffd14a Add a buildlink3.mk file for use by other package Makefiles. 2005-02-10 03:47:12 +00:00
jlam
77e84fa689 Add and enable courier-authlib. 2005-02-10 03:22:52 +00:00
jlam
3b060f2811 Import courier-authlib-0.53 as security/courier-authlib.
The Courier authentication library provides authentication services for
other Courier applications.  In this context, the term "authentication"
refers to the following functions:

    1. Take a userid or a loginid, and a password. Determine whether the
       loginid and the password are valid.
    2. Given a userid, obtain the following information about the userid:

         A. The account's home directory.
         B. The numeric system userid and groupid that owns all files
            associated with this account.
         C. The location of the account's maildir.
         D. Any maildir quota defined for this account. See the Courier
            documentation for more information on maildir quotas.
         E. Other miscellaneous account-specific options.

    3. Change the password associated with a loginid.
    4. Obtain a complete list of all loginids.
2005-02-10 03:21:30 +00:00
jlam
49e316c551 Update security/openpam to 20050201 (Feterita). Changes from version
20040210 (Eelgrass) include:

 - BUGFIX: Correct numerous markup errors, invalid cross-references,
   and other issues in the manual pages, with kind assistance from
   Ruslan Ermilov <ru@freebsd.org>.

 - BUGFIX: Avoid multiple evaluation of macro arguments in ENTERX()
   and RETURNX() macros.

 - BUGFIX: Remove an unnecessary and non-portable pointer cast in
   pam_get_data(3).

 - BUGFIX: Fix identical typos in PAM_ACCT_EXPIRED case in
   pam_strerror(3) and gendoc.pl.

 - ENHANCE: Minor overhaul of the autoconf / build system.

 - ENHANCE: Add openpam_free_envlist(3).
2005-02-10 02:55:38 +00:00
ben
246ac13948 Update fprot-workstation-bin to version 4.5.3.
This addresses PR#29271.
Changes include:

Version 4.5.3 adds a new commandline switch to f-protd, '-fullreport'
and new possible summary codes (see man page for details).

Version 4.5.2 is a bugfix release; f-protd would misidentify .pdf files
and block them from being delivered.

Version 4.5.1 is a bugfix release to fix a bug in scan-mail.pl where
scan-mail.pl would exit after first scan request on some unix platforms,
because of differing signal mechanism between BSD and SysV

Version 4.5.0 contains various bugfixes and improvements to the
documentation and software.

o       check-updates.pl has been modified. It now identifies itself with a
        unique user-agent string containing information on OS, kernel and
        architecture.
o       contains a major overhaul of the virus scanning engine
        (new engine version 3.16.1).  These changes improve its
        detection capabilities.  The engine can now better detect and
        handle executable packers, often used by malware authors to conceal
        malicious code.
o       includes a more generic JPEG GDI+ exploit detection
o       includes EMF/WMF image format exploit detection
o       encrypted executables inside archives are now reported as
        "could be a suspicious file (encrypted program in archive)",
        previously reported as "could be a security risk".
o       The argument switch "-archive" has been changed to support the form
        "-archive=n" where n is a non-negative integer. This causes f-prot
        to scan only n levels deep into nested archives of supported types in
        order to protect against 'arhcive-bombs'.
        The old form "-archive" is still supported, although depreciated, and
        implies n==5. See the man page for details.
o       Minor modifications in the DTD for the f-prot daemon XML.
o       Bugfix where f-prot would return IO_ERROR when attempting to scan
        unsupported partial archive files, e.g. .z01 files
o       Improved RAR support. F-Prot fully supports rar versions 1.5, 2.0 and
        2.6 and partially supports rar 2.9 (doesn't support RAR Virtual
        Machine and the PPM model features)
2005-02-09 15:21:06 +00:00
markd
4200ac9b06 Disable gnupg's new iconv code on platforms that have problems with it
in the default locale (NetBSD < 2.0 and Solaris).
OK'ed by wiz.
Fixes PR pkg/28895.
2005-02-09 11:35:50 +00:00
jlam
bccaba8d4b Instantly deprecate USE_PAM from pkgsrc as its value is being set from
within NetBSD-current's bsd.own.mk, which conflicts with its usage in
pkgsrc.  The package that use USE_PAM have been converted to use the
bsd.options.mk framework.  This should fix PR pkg/29257.
2005-02-07 11:35:41 +00:00
adrianp
0c68e0f862 Fix BUILDLINK_DEPENDS.libnet for bulk-builds 2005-02-05 16:11:47 +00:00
jlam
fe2f1774b5 Modify openssl/Makefile so that it's easier to test the -STABLE and
-SNAP OpenSSL snapshots.
2005-02-02 23:43:42 +00:00
martti
bba2516f76 Updated keychain to 2.5.1
Don't accidentally inherit a forwarded agent when
  inheritwhich=local-once.  Move the --stop warning after the version
  splash.

  Add inheritance support via --inherit.  Add parameters to --stop for
  more control.  Change the default behavior of keychain to inherit if
  there's no keychain agent running ("--inherit local-once"), and
  refrain from killing other agents unless "--stop others" is
  specified.
2005-02-01 18:40:28 +00:00
wiz
552f4e9088 Update to 2.2.1, provided by the maintainer, Julian Dunn, in PR 29183.
Release notes:
                                                          December 22, 2004
amavisd-new-2.2.1 release notes


SECURITY:

- add support for the pax(1) archive decoder, which can handle tar/cpio/pax
  archives (including legacy format variants). Due to limitations in cpio
  (and in Archive::Tar), for security reasons it is preferred to decode
  such archives with pax and no longer with cpio; please add a line:
    $pax = 'pax';
  to amavisd.conf and verify that the program pax is installed on the system
  (and in the jail if running in chroot);

- perform additional tests at startup time on the proper protection
  of the configuration file;

- add file name extensions wmf, emf and grp to the example list of
  banned extension, according to recent Microsoft security bulletins;
  suggested by Stephane Lentz;

- introduces 'clean but inconclusive' av scanner result to avoid a specialized
  or quick partial av scanner like jpeg checker to claim mail is clean
  when all other general purpose av scanners fail (see below);


INCOMPATIBILITY:

- removed some legacy $*_ldap variables, as they are no longer needed;

  These variables were still declared but ignored in 2.2.0 for compatibility
  with older amavisd.conf files. Such variables need to be removed from
  the amavisd.conf if they are still present there from older versions,
  otherwise Perl will complain with 'Global symbol ... requires explicit
  package name";


OTHER FIXES:

- files_to_scan and decompose_mail are now able to remove unexpected
  directories which may have been left behind by some failed decoding
  and were causing temporary failures and mail delivery retries;
  error recovery problem after failed unarj reported by Ralf Hildebrandt;

- error recovery code in files_to_scan and rmdir_recursively now tries to
  change protection on directories and files, and retry if the first attempt
  to access them fails because of denied permission;

- pre-load some additional Perl modules needed by SA when running in chroot;

- add module Net::LDAP::Search to a list of pre-fetched modules;
  omission pointed out by Paul Jacobson;

- when quarantining is disabled by keeping $QUARANTINEDIR undefined,
  the log entry and administrator notification message inappropriately
  suggested that mail was quarantined, which in fact (appropriately)
  it was not. Setting $QUARANTINEDIR='' did work as expected.
  Reported by Sascha Lucas;

- avoid the use of Encode::is_utf8 due to a Perl bug (still present in 5.8.5)
  where Encode::is_utf8 on tainted utf8 character string produces false;

- modify safe_encode() to guarantee the result is a string of octets,
  not a string of UTF-8 characters; it saves some unnecessary work in
  further processing and keeps MIME::Entity from UTF swamp when running
  in chroot; problem pointed out by Branko F. Gracnar;

- avoid braindead Perl default where an empty regexp implies the last
  successfully matched regexp, which (if not being very careful) brings in
  some completely unrelated last-executed regular expression;

- change kill 'TERM' into kill 'KILL' when a forked process within run_command
  and run_command_consumer gets into deep trouble, to avoid exit handlers
  being invoked in the subprocess (which could lead to two processes trying
  to clean the same set of temporary files);

- in an old sendmail setup using the amavis(.c) helper program without
  LDA arguments, avoid inappropriate warning:
    "WARN: no recips left (forgot to set $forward_method=undef using milter?)
  and return status 0 instead of 99 when message is to be blocked, as the
  helper program amavis(.c) does not recognize status 99 in this situation
  and inappropriately passed it on to sendmail; reported by The Mindflayer;

- the @bypass_header_checks_maps is now able to also bypass the bad header
  checks as provided by MIME::Parser; inconsitency reported by CRivera;

- avoid some Perl warning messages; thanks to Bill Landry;


CHANGES AND MINOR NEW FEATURES:

- add configuration variable @newvirus_admin_maps (and $newvirus_admin,
  along with corresponding SQL field 'newvirus_admin') which works like
  the existing @virus_admin_maps (and $virus_admin), except that it sends
  virus administrator notification to specified e-mail address only for newly
  encountered viruses which have not yet been encountered since the amavisd
  startup. It makes use of by-virusname counters in the SNMP counters
  database. If more than one child process starts working on infected
  message containing a not-yet-accounted-for virus, there might be more
  than one 'first time' notification, this is not a malfunction. Both
  the @newvirus_admin_maps and the @virus_admin_maps may be enabled,
  each (possibly both) would receive their notifications as appropriate.

  A useful setting is to globally enable only the new virus notifications,
  and additionally enable _all_ administrator notifications for internally
  originating mail only (by the use of policy banks);

- provide separate configuration variables @banned_admin_maps and
  @bad_header_admin_maps, along with corresponding SQL fields
  'banned_admin' and 'bad_header_admin'; their function was previously
  covered by @virus_admin_maps, which now only still controls administrator
  notifications in case of viruses;

- introduces 'clean but inconclusive' av scanner result to avoid a specialized
  or quick partial av scanner like jpeg checker to claim mail is clean
  when all other general purpose av scanners fail:

  in av scanner entries (lists @av_scanners and @av_scanners_backup) give
  an extended meaning to undefined fourth argument (the 'match for clean'
  list or regexp). The interpretation of the fourth argument is now:

  4. an array ref of av scanner exit status values, or a regexp (to be
     matched against scanner output), indicating NO VIRUSES found;
     a special case is a value undef, which does not claim file to be clean
     (i.e. it never matches, similar to []), but suppresses a failure warning;
     to be used when the result is inconclusive (useful for specialized and
     quick partial scanners such as jpeg checker);

  Also modified example jpeg checker entry in amavisd.conf accordingly.

- NOD32 av scanner: changed @av_scanners entry to match the new version
  of the scanner; thanks to Nejc Skoberne;

- added @av_scanners entry for File::Scan;

- when preparing a SQL SELECT clause for white/blacklisting lookup,
  take into account a relative position of ? and %k in the
  $sql_select_white_black_list template to improve flexibility
  of specifying the clause; suggested by Matt Petteys;

- reduce the log level of some more common and harmless log messages;

- macro %p and the log entry now reports full policy bank path,
  not just the last loaded policy bank name;

- added LDAP attributes amavisWarnVirusRecip, amavisWarnBannedRecip,
  and amavisWarnBadHeaderRecip; by Joel Nimety and Michael Hall;

- renamed LDAP attribute name amavisSpamModifiesSubject to
  amavisSpamModifiesSubj in order to match the documented LDAP schema;
  noticed by Kees Bos, patch by Michael Hall;

- add support for ripOLE decoder, which attempt to extract embedded documents
  from MS OLE documents (MS Office) (http://www.pldaniels.com/ripole/,
  by Paul L Daniels)); ripOLE is still experimental/alpha code;
  To be make amavisd-new find the installed program 'ripole', add the:
    $ripole = 'ripole';
  to the amavisd.conf; suggested by David Wilson and Noel Jones;

- allow multiple occurrences of command line option:  -c config_file
  and execute the provided configuration files one after the other;
  based on a subset of functionality provided as a patch by Davor Ocelic;

- a slight improvement (in default $map_full_type_to_short_type_re)
  in classifying mpeg and some other multimedia files;

- several minor code cleanups;

- add a recommendation by Daniel J McDonald to a documentation file INSTALL:
    If different UID is preferred for an AV scanner, a solution for
    ClamAV is to add user clamav to the amavis group, and then add
    AllowSupplementaryGroups to clamd.conf;

- enclosed a simple demonstrational Perl program amavis.pl, which is
  functionally much like the amavis.c helper program, but talks the new
  AM.PDP protocol with the amavisd daemon. See README.protocol for the
  description of AM.PDP protocol. To be placed in amavisd.conf:
    $protocol='AM.PDP';  $unix_socketname='/var/amavis/amavisd.sock';
  Usage: amavis.pl sender recip1 recip2 ...  < message.txt

- documentation updates;
2005-02-01 17:39:24 +00:00
wiz
4656f67ae7 Commit some fixes from the maintainer:
python-2.4 is not usable for this package.
The python wrapper scripts' names have changed, adapt patch-aa.

Bump PKGREVISION.
2005-01-30 21:56:24 +00:00
kim
0dfef04fbd Remove "--disable-setreuid" -- the configure scripts seems to have
adequate logic for determining when to use setreuid.

This makes sudoedit work on NetBSD again.

Closes PR pkg/28998
2005-01-30 21:36:53 +00:00
adrianp
a4672a284b Force all current packages using the libnet 1.0.x tree to use a
verision of libnet <= 1.0.1b.  This will prevent the case where the user
has installed the libnet 1.1.x branch and then tries to install an application
that is not compatible with the 1.1.x tree.

Over time the list of these applications that require the 1.0.x branch
will be reduced as they are updated to later versions that support the
libnet 1.1.x branch.

This addresses PR# 29056 opened by diro (at) nixsys.bz, thanks for the PR !
2005-01-28 23:35:59 +00:00
taca
ea1acba768 Oops, make sure to bump PKG_REVISION. 2005-01-28 14:19:35 +00:00
taca
c3ffe35cf7 Add RUBY_HAS_ARCHLIB which have machine dependent extention libraries.
Bump PKG_REVISION.
2005-01-28 14:08:01 +00:00
adam
855e8f78ae Changes 0.2.13:
- Version number in libtasn1.h updated properly.

Changes 0.2.12:
- Manual converted to Texinfo format.
- Manual in GTK-DOC and DevHelp formats added.
- Man pages for all functions added.
- Various internal cleanups.
2005-01-27 15:47:57 +00:00
recht
367eed19fe Build Python with thread support by default and turn the existing
python*-pth packages into meta-packages which will install the non-pth
packages. Bump PKGREVISIONs on the non-pth versions to propagate the
thread change, but leave the *-pth versions untouched to not affect
existing installations.
Sync all PYTHON_VERSIONS_AFFECTED lines in package Makefiles.
2005-01-23 20:41:45 +00:00
taca
427bde23af Update to Ruby 1.8.2 base and thses changes:
o Use Ruby's version instead of its own (old) version.
2005-01-23 17:36:03 +00:00
taca
e794da07d3 Update Ruby 1.8.2.
This is basically bug fix release, but official changes aren't provided
yet.  Please refer ChangeLog.

Here is pkgsrc changes:

o Set RUBY_HAS_ARCHLIB=yes for Ruby packages including archtecture depending
  extention library in order to depend more specific Ruby.

o Now install database for ri(1).  Fix PR pkg/28566.

o Net::IMAP

	* lib/net/imap.rb (u8tou16): fixed typo. fixed: [ruby-list:40546]

o NKF:

	* ext/nkf/nkf-utf8/nkf.c (reinit): should initialize all static
	  variables.  fixed: [ruby-list:40445]

	* ext/nkf/lib/kconv.rb (Kconv::RegexpEucjp): second byte is up to
	  0xfe.

	* ext/nkf/lib/kconv.rb (Kconv#kconv): should handle UTF8 and UTF16
	  properly.

o WEBrick

	* lib/webrick/httpauth/htpasswd.rb (WEBrick::Htpasswd#reload):
	  raise NotImplementedError if password is encrypted by digest
	  algorithms. This patch is contributed by sheepman. [ruby-list:40467]

	* lib/webrick/httpauth/digestauth.rb
	  (WEBrick::HTTPAuth::DigestAuth#_authenticate): fix digest calculation.
	  This patch is contributed by sheepman. [ruby-list:40482]

	* lib/webrick/{httpauth.rb,httpauth/basicauth.rb,httpproxy.rb}: use
	  pack/unpack-template char "m" instead of lib/base64.rb to do base64
	  encoding/decoding. fixed: [ruby-dev:25336]
2005-01-23 17:33:19 +00:00
peter
4e1dc0755d Fix homepage, pointed out by Jeremy C. Reed. 2005-01-23 14:40:12 +00:00
peter
ef4ddc4ffd Renamed tls to tcl-tls. 2005-01-22 19:50:06 +00:00
peter
91bbc38de5 Reimported as security/tcl-tls. 2005-01-22 19:46:11 +00:00
peter
431dac437d Reimport as security/tcl-tls, suggested by Christoph Badura.
TLS (aka SSL) Channel - can be layered on any bi-directional Tcl_Channel.

Both client and server-side sockets are possible, and this code should work
on any platform as it uses a generic mechanism for layering on SSL and Tcl.
2005-01-22 19:45:23 +00:00
adrianp
c5ff2b94e8 Note addition of tinyca-0.6.7 2005-01-22 18:14:01 +00:00
adrianp
1eb806789c TinyCA is a simple graphical userinterface written in Perl/Gtk to manage a
small CA (Certification Authority). TinyCA works as a frontend for openssl.

This is tinyca-0.6.7
2005-01-22 18:11:56 +00:00
jlam
1bff0aabdb Pass -DSYSCONFDIR="$sysconfdir" in the Makefile instead of the configure
script to avoid bizarre quoting problems within the configure script.
This also fixes the definition of SYSCONFDIR in the compiled library.
Bump the PKGREVISION to 1.
2005-01-22 16:22:25 +00:00
kristerw
625d996cd8 Fix C99-isms to make this pkg build with gcc 2.95. 2005-01-22 16:05:37 +00:00
ben
4c8d18d16a Make tct build and run on NetBSD 2.0 and bump PKGREVISION.
This does not add support for ffsv2 filesystems nor superblocks.
This addresses PR#28357.
2005-01-22 15:59:58 +00:00
peter
ec22270650 Add tls. 2005-01-22 13:22:46 +00:00
peter
02b0c1902f Initial import of tls-1.5.0 into the NetBSD Packages Collection.
TLS (aka SSL) Channel - can be layered on any bi-directional Tcl_Channel.

Both client and server-side sockets are possible, and this code should work
on any platform as it uses a generic mechanism for layering on SSL and Tcl.
2005-01-22 13:21:43 +00:00
frueauf
5244a79935 really depend on nessus-libraries>=2.2.2a since >=2.2.0 does not work
on alpha as seen in pr pkg/28969. libnasl 2.2.2a needs nessus-libraries 2.2.2a
to compile properly.
2005-01-19 18:45:33 +00:00
frueauf
6412b63256 Add patch for libnessus/share_fd.c to compile with gcc shipped with
NetBSD 1.5.4_ALPHA (missing __func__ definition).
2005-01-19 16:39:47 +00:00
frueauf
5919629d4c Remove nb1 from version as pointed out by Bernd Ernesti. 2005-01-19 08:40:10 +00:00
peter
9897bbb2de Do a "flush all" in the stop command. From Miles Nordin. 2005-01-18 17:36:53 +00:00
peter
cfe080c5fe Update to 20050118.
Changes:
* Updated the ALTQ patch, now works correctly on NetBSD 2.0 release.
  Thanks to Miles Nordin for helping and testing.

* Write struct "pcap_sf_pkthdr" instead of "pcap_pkthdr". Fixes
  an LP64 specific problem with reading the pflog with tcpdump(8).

* Applied patch to pf.c from OPENBSD_3_6 branch:
  ICMP state entries use the ICMP ID as port for the unique state key. When
  checking for a usable key, construct the key in the same way. Otherwise,
  a colliding key might be missed or a state insertion might be refused even
  though it could be inserted. The second case triggers the endless loop
  fixed by 1.474, possibly allowing a NATed LAN client to lock up the kernel.
  Report and test data by Srebrenko Sehic.

* Applied patch to pf_lkm.c from NetBSD HEAD:
  pfil4_wrapper: clear M_CANFASTFWD which is not compatible with pf.

* Applied patch to pf_ioctl.c from OPENBSD_3_6 branch:
  replace finer-grained spl locking in pfioctl() with a single broad lock
  around the entire body. this resolves the (misleading) panics in
  pf_tag_packet() during heavy ioctl operations (like when using authpf)
  that occur because softclock can interrupt ioctl on i386 since SMP.

* Applied patch to pf.c from OPENBSD_3_6 branch:
  IPv6 packets can contain headers (like options) before the TCP/UDP/ICMP6
  header. pf finds the first TCP/UDP/ICMP6 header to filter by traversing
  the header chain. In the case where headers are skipped, the protocol
  checksum verification used the wrong length (included the skipped headers),
  leading to incorrectly mismatching checksums. Such IPv6 packets with
  headers were silently dropped. Reported by Bernhard Schmidt.

* Applied patch to pfctl_optimize.c from OPENBSD_3_6 branch:
  &&/|| inversion would try to merge IP addresses with non-addresses into a
  single table causing a ruleset load error and eventually a double-free.

* Applied patch to pf.c from OPENBSD_3_6 branch:
  Initialise init_addr in pf_map_addr() in the PF_POOL_ROUNDROBIN,
  prevents a possible endless loop in pf_get_sport() with 'static-port'

* Fix to if_events.diff from Miles Nordin <carton at Ivy dot NET>:
  Call free after removing the element from the list, not before.
  Fixes panic with "unaligned access" on Alpha.
2005-01-18 17:35:27 +00:00
drochner
942ff705df update to 0.44
changes:
-IPv6 support
-client added
-bugfixes
XXX dropbear wants to use /dev/random per default now which makes it
unusable on systems w/o entropy source. I've patched it back to
/dev/urandom. There might be security concerns.
2005-01-18 17:30:59 +00:00
tv
90181e27b6 It's not very useful to include <sys/select.h> in only one source file
when other source files depend on fd_set being defined in a local header.

(Required on Interix, which does not expose <sys/select.h>/<sys/time.h>
automagically via other system headers as some OS's do by default.)
2005-01-18 13:11:38 +00:00
grant
96c2b7ecc2 when building with SunPro on x86, do not use -fast argument to cc(1)
because:

- its behaviour changes between releases
- it uses build-host specific instructions where possible,
  specifically on >= Solaris 9 update 6 and Sun Studio 9 (sse, sse2)

this breaks using the binary pkg when installed on systems with a
less capable processor. instead, just use -xO5 so the binary pkg will
work everywhere.
2005-01-18 10:25:17 +00:00
shannonjr
54a417ed58 Update to release 1.9.15. This is a bug fix release. 2005-01-17 18:32:47 +00:00
jlam
9215761d4a OpenPAM doesn't really need perl during the build... it's only there
to regenerate some documentation files, but the regen is unnecessary.
Fix the post-tools target that created a dummy perl -- it was failing
because ${TRUE} may not be an actual executable (it could be a shell
builtin) and thus symlinking to it may not work.
2005-01-17 16:55:21 +00:00
wiz
cc5da6a0f9 According to the bulk builds, this needs perl;
add USE_PERL5=build.
2005-01-17 16:14:23 +00:00
adrianp
42a4419309 Upgrade to 2.3
- Complete overhaul of the Framework payload collection
+ Win32 ordinal-stagers are now included (92-byte reverse connect)
+ A handful of new sparc payloads have been added (sol, linux, bsd)
+ Reliability problems have been resolved in bsd, linux, and win32
+ New udp-based linux shell stagers and shell payloads
+ New size-optimized Mac OS X encoders and payloads

- Includes the win32 version of the Meterpreter
+ Dynamically load new features over the network w/o disk access
+ In-memory dll injection of the basic meterpreter shell
+ Current extensions include Fs, Process, Net, and Sys
+ Extensive documentation is available online:
* http://metasploit.com/projects/Framework/docs/meterpreter.pdf

- Complete rewrite of the 'msfweb' user interface
+ Generate and encode stand-alone shellcode from the web interface
+ The interface is skinnable and includes three different themes
+ Streaming HTTP is used to provide a 100% web-based shell
+ Ability to set advanced options in the web interface

- Massive speed enhancements in msfconsole and msfweb
+ Snappier response and quicker load times on older systems
+ Optimizations made to various sort/search algorithms
+ Modules are no longer reloaded after each exploit

- New exploits
+ Microsoft WINS Service Memory Overwrite (MS04-045)
+ Samba trans2open() Buffer Overflow (Mac OS X)
+ 4D WebSTAR FTP Server Buffer Overflow (Mac OS X)
+ Veritas Name Service Registration Buffer Overflow
+ AOL Instant Messenger 'goaway' Buffer Overflow
+ IPSwitch IMail IMAPD 'delete' Buffer Overflow
+ Seattle Labs Mail Server POP3 Buffer Overflow
+ UoW IMAPD Buffer Overflow (sparc, ia32)
+ IRIX lpdsched Remote Command Execution
+ CDE dtspcd Buffer Overflow (Solaris)
+ IIS 4.0 ism.dll HTR Buffer Overflow
+ IIS w3who.dll ISAPI Buffer Overflow
2005-01-14 23:36:38 +00:00
adrianp
bf43b23fd4 - Updated to v1.0 (No CHANGELOG available)
- Use options.mk framework for python and rrdtool support
2005-01-14 21:44:33 +00:00