Commit graph

4339 commits

Author SHA1 Message Date
gdt
05afd457bf Set INFO_FILES, so that info/dir is handled correctly. May also fix
build on Dragonfly where info file is misinstalled in share/info.
2007-08-08 19:57:32 +00:00
taca
0908d547e2 Update fprot-workstation-bin pacakge to 4.6.8.
Changes are unknown.
2007-08-07 21:42:55 +00:00
adrianp
f8d42e5581 Add CONFLICTS+=pkg_install>=20070714 2007-08-05 21:03:16 +00:00
jnemeth
30ab614638 this package now installs epa.info 2007-08-05 08:38:26 +00:00
tnn
570236364e Add a target configuration for Tru64 with gcc. 2007-08-04 14:29:43 +00:00
shannonjr
6392c19eca Update to Version 2.0.5. Changes:
* Switched license to GPLv3.
 * Fixed bug when using the --p12-charset without --armor.
 * The command --gen-key may now be used instead of the
   gpgsm-gencert.sh script.
 * Changed key generation to reveal less information about the
   machine.  Bug fixes for gpg2's card key generation.
2007-08-04 12:00:02 +00:00
shannonjr
65ba8191db Update to 1.0.2 as required by gnupg 2.0.5. 2007-08-04 11:57:16 +00:00
shannonjr
b3ebc7f35a Update to 0.9.9. Changes:
- Update configuration template, add documentation for Prelude
  generic TCP options.
- Implement modified patch from Pierre Chifflier <chifflier@inl.fr>
  to fix the example log path (fix #224).
- Move IDMEF message normalization in the scheduler, rather than
  doing it upon reception. This remove some load from the server
  and allow Prelude-Manager own IDMEF messages to go through the
  normalizer path.
- Implement heartbeat->analyzer normalization.
- Improve IPv4 / IPv6 address normalization.
  IPv4 mapped IPv6 addresses are now mapped back to IPv4.
  Additionally, the Normalize plugin now provide two additionals option:
   ipv6-only: Map any incoming IPv4 address to IPv6.
   keep-ipv4-mapped-ipv6: do not map IPv4 mapped IPv6 addresses back to IPv4.
- Make a difference between exceptional report plugin failure (example:
  a single message couldn't be processed) and "global" plugin failure
  (example: database server is down). We use a different failover for
  'exceptional' failure, so that we don't try to reinsert a bogus message
  (fix #247).
- Start of a Prelude-Manager manpages (#236).
- Various bug fixes.
2007-08-04 09:31:18 +00:00
shannonjr
ef7b3277bd Update to 0.9.10. Changes:
- Ability to use regular expressions in plugins.rules to define
  monitored sources, this can be very useful when combined to file
globing.
- [SPEEDUP] When the "*" keyword is used, the data is passed to the
upper layer without trying to match anything.
- Fix NULL pointer dereference when a rule reference an existing,
  but empty context (fix #226).
- Remove deprecated use of prelude_client_print_setup_error(),
  directly handled via prelude_perror().
- Make the log parser more robust.
2007-08-04 09:29:29 +00:00
shannonjr
c558e3963d Update to release 0.9.12.1. Changes:
- Implement an Auto-Refresh system (fix #231).  (including code from
  Paul Robert Marino <prmarino1@gmail.com>).
- Ability to filter on missing/offline/online/unknown agents. Make more easier
  to read each agent status in collapsed mode.
- Fix filter load/save/delete issue with translation.
- New 'My account' tabs, under the Settings section (fix #241).
- New messageid and analyzerid parameters, allowing link to a Prewikka alert
  from an external tool (previously required a database query in order to
  retrieve the database event id).
- Don't redirect to user listing once an user preference are recorded. Fix
  changing of another user language by an user with PERM_USER_MANAGEMENT.
  Display target user language rather than current user language.
- Improve the timeline control table layout.
- Fix translation of string possibly using plural.
2007-08-04 09:27:35 +00:00
he
51482b903a Add py-denyhosts, the recently imported package. 2007-08-02 17:28:45 +00:00
he
b2b94c0b3b Import a package for DenyHosts version 2.6, ref.
http://denyhosts.sourceforge.net/


DenyHosts is a script intended to be run by system administrators
to help thwart SSH server attacks (also known as dictionary based
attacks and brute force attacks).

In short, it does this by monitoring your syslog output for failed
login attempts and tweaking /etc/hosts.deny accordingly, and it can
optionally send and fetch lists of ssh probers from a central server.


Thanks to joerg@ for review and corrections.
2007-08-02 17:27:30 +00:00
gdt
e63906d622 Update to 0.0.14.
* Major changes in 0.0.14

** epa-file can handle remote files over Tramp.

** Workaround for a face initialization bug of GNU Emacs.

** Follow the face naming convention of GNU Emacs.

* Major changes in 0.0.13

** epa-file bug fixes.

*** Fixed a compatibility bug on XEmacs 21.5.

*** Do not mark the buffer as modified.

* Major changes in 0.0.12

** epa-file.el usability improvements.

*** Ask recipients only the first time.

*** Respect epa-armor and epa-textmode.

*** Customizing epa-file-name-regexp now works.

*** Backup files for "*.gpg" are also encrypted.

* Major changes in 0.0.11

** Include the EasyPG Assistant user's manual

** Decode user-id's encoded in UTF-8 with "%" or "\" escape

** If a user attempt to encrypt data to an untrusted recipient, EasyPG
   prompt the key-id (it requires GnuPG version 2.0.2 or later)

** epa-file.el turns off auto-saving by default
2007-07-31 12:32:43 +00:00
taca
56cb208f61 Add a patch from https://bugzilla.mindrot.org/show_bug.cgi?id=1306.
Fix nasty "error: channel 0: chan_read_failed for istate 3" message.

Bump PKGREVISION.
2007-07-31 02:29:38 +00:00
joerg
5ac5c16149 Readd the DragonFly libtool.m4 patches. 2007-07-30 08:41:20 +00:00
jlam
33f30156fb * Add new emulator framework in pkgsrc/mk/emulator that handles all
binary-only packages that require binary "emulation" on the native
  operating system.  Please see pkgsrc/mk/emulator/README for more
  details.

* Teach the plist framework to automatically use any existing
  PLIST.${EMUL_PLATFORM} as part of the default PLIST_SRC definition.

* Convert all of the binary-only packages in pkgsrc to use the
  emulator framework.  Most of them have been tested to install and
  deinstall correctly.  This involves the following cleanup actions:

    * Remove use of custom PLIST code and use PLIST.${EMUL_PLATFORM}
      more consistently.

    * Simplify packages by using default INSTALL and DEINSTALL scripts
      instead of custom INSTALL/DEINSTALL code.

    * Remove "SUSE_COMPAT32" and "PKG_OPTIONS.suse" from pkgsrc.
      Packages only need to state exactly which emulations they support,
      and the framework handles any i386-on-x86_64 or sparc-on-sparc64
      uses.

    * Remove "USE_NATIVE_LINUX" from pkgsrc.  The framework will
      automatically detect when the package is installing on Linux.

  Specific changes to packages include:

    * Bump the PKGREVISIONs for all of the suse100* and suse91* packages
      due to changes in the +INSTALL/+DEINSTALL scripts used in all
      of the packages.

    * Remove pkgsrc/emulators/suse_linux, which is unused by any
      packages.

    * cad/lc -- remove custom code to create the distinfo file for
	all supported platforms; just use "emul-fetch" and "emul-distinfo"
	instead.

    * lang/Cg-compiler -- install the shared libraries under ${EMULDIR}
	instead of ${PREFIX}/lib so that compiled programs will find
	the shared libraries.

    * mail/thunderbird-bin-nightly -- update to latest binary
	distributions for supported platforms.

    * multimedia/ns-flash -- update Linux version to 9.0.48 as the
	older version is no longer available for interactive fetch.

    * security/uvscan -- set LD_LIBRARY_PATH explicitly so that
	it's not necessary to install library symlinks into
	${EMULDIR}/usr/local/lib.

    * www/firefox-bin-flash -- update Linux version to 9.0.48 as the
	older version is no longer available for interactive fetch.
2007-07-29 05:18:36 +00:00
tnn
c6504f63a7 Work around broken pthread_create configure test on HPUX. 2007-07-28 19:29:57 +00:00
seb
fe72e94b96 Clear USE_LANGUAGES, there is no need for it. 2007-07-27 23:24:17 +00:00
seb
121016f080 Add & enable p5-Crypt-RC4 2007-07-27 23:12:08 +00:00
seb
576322c094 Initial import of p5-Crypt-RC4 version 2.02 into The NetBSD
Packages Collection.

The Perl 5 module Crypt::RC4 provides a simple implementation of
the RC4 algorithm, developed by RSA Security, Inc.

Disclaimer: Strictly speaking, this module uses the "alleged" RC4
algorithm. The Algorithm known as "RC4" is a trademark of RSA
Security Inc., and this document [the module documentation] makes
no claims one way or another that this is the correct algorithm,
and further, make no claims about the quality of the source code
nor any licensing requirements for commercial use.
2007-07-27 23:10:37 +00:00
gdt
d7922fde3a Fix location of old distfiles in MASTER_SITE (s/old/OLD/). 2007-07-27 17:28:48 +00:00
jlam
ea2890b4d2 Remove a redundant PKGNAME definition (which matches DISTNAME), and add
a fetch location for old distfiles so that we don't need to always keep
this package at the latest release.
2007-07-26 19:34:12 +00:00
joerg
e6c367979b Don't include a reimplementation of strdup, ANSI C is old enough. 2007-07-24 14:26:31 +00:00
tls
e45a7ebbb0 Update sudo to 1.6.9. We don't take the new default of PAM and no other
authentication; that can be enabled by adding pam to the package options
if users desire.
2007-07-23 16:38:36 +00:00
adrianp
f4f2403b78 PATCH_SITES update 2007-07-22 22:26:04 +00:00
tron
885d73992c Compile OpenSSL with supports for threads. This allows an application
to register callbacks which implement locking primitive to make
OpenSSL thread-safe.

Bump package revision because of this change.
2007-07-18 13:11:15 +00:00
njoly
7e256bff90 update to v5.10
changes:

-   More protection : Automatic identification and
    removal of viruses delivering the next generation
    of best-of-breed anti-virus scanning engines.
    It offers improved protection against existing,
    new and potential threats and increases the depth
    and breadth of the protection we provide.

-   It's faster than before : We've listened to our
    customers who asked for a faster Engine and it
    delivers superior performance to current McAfee
    Anti-Virus products on all supported platforms.

-   Support for many more packed-executable formats
    in which known malware is often re-packaged
    for obfuscation purposes.
2007-07-16 20:18:58 +00:00
adrianp
00ea48ba7b Update to 0.47
Mark as not for NetBSD > 1.x
The false positives on NetBSD 2.x and 3.x have been reported upstream
to try and address PR #31813
2007-07-11 20:16:33 +00:00
joerg
80fbcad274 Avoid embedding $NetBSD\$ and similiar constructs in-tree files.
The strings would be picked up for +BUILD_VERSION and create mismatches
when using ident on the same files.
2007-07-10 15:27:57 +00:00
cube
8cc11b7ae6 Fix PLIST [hi xtraeme!]. Bump revision. 2007-07-09 17:32:35 +00:00
minskim
72dbbfe305 Fix configure options when the librack option is given.
This fixes the second problem in PR 36617.
2007-07-09 04:27:55 +00:00
minskim
39cd92b470 Make this build with db4. This fixes the first problem in PR 36617. 2007-07-09 03:51:33 +00:00
heinz
40071f7ab6 The packages supports installation to DESTDIR.
No compiler required.
2007-07-07 13:07:56 +00:00
ghen
3e9bc94618 Install amavisd-agent as well. Bump PKGREVISION. 2007-07-05 08:36:56 +00:00
jlam
4390d56940 Make it easier to build and install packages "unprivileged", where
the owner of all installed files is a non-root user.  This change
affects most packages that require special users or groups by making
them use the specified unprivileged user and group instead.

(1) Add two new variables PKG_GROUPS_VARS and PKG_USERS_VARS to
    unprivileged.mk.  These two variables are lists of other bmake
    variables that define package-specific users and groups.  Packages
    that have user-settable variables for users and groups, e.g. apache
    and APACHE_{USER,GROUP}, courier-mta and COURIER_{USER,GROUP},
    etc., should list these variables in PKG_USERS_VARS and PKG_GROUPS_VARS
    so that unprivileged.mk can know to set them to ${UNPRIVILEGED_USER}
    and ${UNPRIVILEGED_GROUP}.

(2) Modify packages to use PKG_GROUPS_VARS and PKG_USERS_VARS.
2007-07-04 20:54:31 +00:00
jlam
a6f8cbe795 pkgsrc basically follows the BSD man page hierarchy. Install the su
and visudo manpages in man/man1, and the sudoers manpage in man/man5.
Remove the platform-specific PLISTs that only differed in the location
of the man pages.

Bump the PKGREVISION to 5.
2007-07-04 20:37:50 +00:00
xtraeme
46e2be0d50 Update to 2.5.2:
BUG FIXES

- in a milter setup log_id was left undefined, which resulted in log lines
  without id, and a SQL constraint violation "Column 'am_id' cannot be null"
  when logging to SQL was enabled. The bug was introduced in 2.5.1;
  problem reported by Martin Svensson;

- suppress a quarantining attempt if the message also needs to be archived
  to the same location (same sql key or same local filename);
  reported by Wazir Shpoon;

- adjust $socketname in amavisd-release to match its default counterpart
  in amavisd (i.e. /var/amavis/amavisd.sock); reported by Stanley Appel;

And more... please review the Changelog file.
2007-07-03 14:21:06 +00:00
joerg
043fc2f0ed Fix CVS ID. 2007-07-02 08:36:12 +00:00
tls
d4bffa6d45 On some hosts, this package's configure script fails to detech Heimdal
(in fact, it's not clear that there is a good way to do so).  The resulting
configuration works fine *except* if it encounters a host that has 3DES
but no DES service keys in its keytab.

Fix this by explicitly passing 0 ("default enctype") to Kerberos.
2007-07-02 06:04:01 +00:00
joerg
a5a7bfecb1 Don't run clear. Pass down OPSYS and don't run uname -s again. 2007-06-30 18:49:38 +00:00
joerg
275fc7e74e Force inclusion of RDTSC for now. The package makes no attempt to handle
it, CPUs without are rare and detection at runtime is non-trivial.
If this ever becomes an issue, more involved magic should be requested
upstream.
2007-06-30 18:08:34 +00:00
joerg
9d6c5ad043 configure script is perl, run it with perl. 2007-06-30 16:12:03 +00:00
joerg
f622125847 Must be restricted to PHP4 as adodb is not available for PHP5. 2007-06-30 13:47:38 +00:00
jlam
04e13269d6 Use -[ogm] instead of -[OGM] when passing permissions options to the
install script.  The latter are special install-sh script options that
check whether the invoking user is the root user or not, which is
completely unnecessary.
2007-06-26 15:05:50 +00:00
tls
1194ad7ee6 Add file omitted from previous commit. 2007-06-25 23:53:28 +00:00
tls
36ca7970b3 Fix privilege-escalation vulnerability with PKG_OPTIONS.sudo=kerberos:
cleanse environment of variables that alter behavior of Kerberos library
so the user can't override the default keytab location, and do *not*
ignore missing keytab errors.  Prevents root compromise via spoofed KDC
on systems with Kerberos libraries but no host key in keytab, no keytab,
or keytab overidden via environment.

Don't insist that the keytab key be DES -- some Kerberos sites are 3DES/AES
only.

Somewhat less invasive than the fix Todd incorporated into the 1.6.9 branch
of sudo (presently beta) but equivalent (though not as clean).
2007-06-25 09:53:42 +00:00
minskim
7afa15017c Do not declare static functions in headers. 2007-06-23 08:25:30 +00:00
gdt
4c80c2d36b Remove RESTRICTED comment about US export control. (While lots of
things are restricted, pkgsrc's labeling rules aren't intended to
address export control issues, and there are vast numbers of packages
with apparently similar export control status and no RESTRICTED.)
2007-06-22 14:20:01 +00:00
minskim
ef19331d18 Set "install" as a .PHONY target so that it works on case-insensitive
filesystems.
2007-06-21 18:33:19 +00:00
hubertf
3abcb13260 Don't pull in <net/bpf.h> on MacOS, it's already pulled in
via libpcap.

XXX Still needs PREFER.libpcap=pkgsrc in mk.conf to build, but it's a step
forward.
2007-06-17 01:40:51 +00:00