Commit graph

4339 commits

Author SHA1 Message Date
tron
9bb2b9aba2 Fix typo in "SUBST_MESSAGE.dl". 2007-05-03 14:23:42 +00:00
wiz
b7b52054dd Update to 1.05:
v1.05
        - make session cache working even if the IO::Socket::SSL object
          was not created with IO::Socket::SSL->new but with
          IO::Socket::SSL->start_SSL on an established socket
2007-05-03 12:30:20 +00:00
adam
cb94155e14 Changes 2.6.5:
* Added all of the patches on Sourceforge, plus those included by Red Hat's Fedora Extras
2007-04-30 19:28:34 +00:00
adam
3b6225abc6 Changes 2.5.8:
* Stuff from the Fedora Extras crew
2007-04-30 19:26:23 +00:00
adam
72871c2545 Changes 0.9.9:
- Added patch for sigbus error on unaligned data, when doing rapid copies.

Changes 0.9.8.1:
- Another round of bugfixes
2007-04-30 19:06:47 +00:00
tron
8ea759f724 Update home-page URL. 2007-04-30 12:52:10 +00:00
tnn
6218a22d2f PR 36233: Make libgcrypt build on NetBSD/hp700. From David H. Gutteridge.
Also makes it build on HP-UX and Linux/hppa, tested by me.
2007-04-28 17:46:21 +00:00
tron
bea247486f Also link with the "dl" library when creating the shared libraries.
Another attempt to fix PR pkg/36086.
2007-04-26 21:11:05 +00:00
tnn
4726602c49 Bump PKGREVISIONs to chase update of devel/libevent. 2007-04-25 16:39:40 +00:00
tron
2d5bd3c024 Use all necessary means to convince OpenSSL's "special" build system
to link with the "dl" library under Mac OS X if necessary.
This should finally fix PR pkg/36086.
2007-04-24 14:10:37 +00:00
heinz
abd6054c1c Added DESTDIR support. 2007-04-22 09:04:54 +00:00
heinz
82874b8437 As suggested by Joerg Sonnenberger, replaced CHECK_INTERPRETER_SKIP
with appropriate values for REPLACE_PERL.
2007-04-22 09:00:21 +00:00
wiz
be84695db3 Update to 1.6.2:
* Version 1.6.2 (released 2007-04-18)

** Fix X.509 signing with RSA-PKCS#1 to set a NULL parameters fields.
Before, we remove the parameters field, which resulted in a slightly
different DER encoding which in turn caused signature verification
failures of GnuTLS-generated RSA certificates in some other
implementations (e.g., GnuPG 2.x's gpgsm).  Depending on which RFCs
you read, this may or may not be correct, but our new behaviour appear
to be consistent with other widely used implementations.

** Regenerate the PKIX ASN.1 syntax tree.
For some reason, after changing the ASN.1 type of ldap-UID in the last
release, the generated C file built from the ASN.1 schema was not
refreshed.  This can cause problems when reading/writing UID
components inside X.500 Distinguished Names.  Reported by devel
<dev001@pas-world.com>.

** Updated translations.

** API and ABI modifications:
No changes since last version.
2007-04-20 06:07:15 +00:00
tron
09d04b1e6d Make sure that the "dlcompat" related options are actually added to
"LDFLAGS". This is another attempt to fix PR pkg/36086.
2007-04-18 14:11:33 +00:00
tron
f7c84b5393 Because OpenSSL uses dlfcn(3) only internally and Mac OS X supports shared
library dependences we don't need to include "dlopen.buildlink3.mk" here.
2007-04-17 17:12:09 +00:00
tron
944afe7a21 Use "pkgsrc/mk/dlopen.buildlink3.mk" instead of manually including
"pkgsrc/devel/dlcompat/buildlink3.mk" under Darwin. This might
finally fix PR pkg/36086.
2007-04-17 17:04:00 +00:00
joerg
6ac6da8674 Needs msgfmt. 2007-04-17 13:13:42 +00:00
wiz
d86ffeb70e Update to 1.04:
v1.04
        - added way to create SSL object with predefined session
	  cache, thus making it possible to share the cache between
	  objects even if the rest of the context is not shared
          key SSL_session_cache
          Note that the arguments of IO::Socket::SSL::SessionCache::new
          changed (but you should never have used this class directly
          because it's internal to IO::Socket::SSL)
2007-04-15 13:06:26 +00:00
drochner
1897833bf6 update to 1.0.1
This moves this pkg to the new stable gnome branch, too much to list here.
2007-04-11 21:48:02 +00:00
drochner
61aaeee7c7 update to 2.18.0
This moves this pkg to the new stable gnome branch, too much to list here.
2007-04-11 17:59:48 +00:00
ghen
3612dc6014 Update to ipsec-tools 0.6.7.
o Fixed SHA256 detection on some systems
o Fixed a DoS in Informationnal messages processing (CVE-2007-1841).
2007-04-11 06:51:19 +00:00
drochner
da73c6dbf0 update to 0.8.1
changes:
* Fixes some a null pointer crashes when called with a NULL
  keyring
* Translations
2007-04-10 18:30:05 +00:00
shannonjr
741d310347 Update to 0.9.10. Changes:
- Allow filtering plugins to hook others filters plugins.
- Update reporting code to latest specification for the SNMPService class.
- Warn about Un-handled command line arguments.
- Properly dump IDMEF-XML output (fix #186).
- Various bug fixes.
2007-04-09 12:50:20 +00:00
shannonjr
fb84c4ccd7 Update to 0.9.7.2. Changes:
- Allow filtering plugins to hook others filters plugins.
- Update reporting code to latest specification for the SNMPService class.
- Warn about Un-handled command line arguments.
- Properly dump IDMEF-XML output (fix #186).
- Various bug fixes.
2007-04-09 12:49:20 +00:00
shannonjr
d932ef2c74 Update to 0.9.12. Changes:
- Fix preludedb-admin copy/move operations.
2007-04-09 12:48:09 +00:00
shannonjr
8b44742330 Update to 0.9.13.2. Changes:
- Improve error reporting with the central option interface.
- Fix a bug when comparing IDMEF object with optional fields.
- Fix a problem with the logger, where large log entry wouldn't be
logged.
2007-04-09 12:46:48 +00:00
tv
cd6393fb67 Reassign to pkgsrc-users@; I no longer use Pine and thus don't use
pgpenvelope either.
2007-04-04 14:41:23 +00:00
tron
1e65ee8c3c Add ${BUILDLINK_LDFLAGS.dlcompat} (defined as "-ldl") to "LDFLAGS" under
Mac OS X. This is harmless under recent versions of Mac OS X where
"libdl.dylib" is symbolic link to "libSystem.dylib". And it is necessary
under old versions of Mac OS X (Jaguar and older) where we need the
"libdl.dylib" from the "dlcompat" package.

This should finally fix PR pkg/36086 by John D. Baker.
2007-04-01 21:33:05 +00:00
wiz
47036fe032 Upgrade lsh to version 2 (from lsh2) and remove lsh2.
No disagreement on pkgsrc-users.
2007-04-01 21:26:48 +00:00
wiz
b678424ac0 Remove security/amavis -- discontinued; security/amavisd-new is one
replacement.

No disagreement on pkgsrc-users.
2007-04-01 21:17:16 +00:00
joerg
cf8a69eab6 Fix NO_MTREE. 2007-03-28 13:26:55 +00:00
tron
ecd5e19f04 Include "pkgsrc/devel/dlcompat/buildlink3.mk" when building this package
under Mac OS X. This should fix PR pkg/36086.
2007-03-26 11:44:18 +00:00
wiz
12365314f5 Complete move otpcalc->otpCalc. 2007-03-25 06:13:36 +00:00
wiz
0b0852b3e3 Reimport optCalc-0.96 under its PKGNAME (from otpcalc before). 2007-03-25 06:12:29 +00:00
joerg
be9fa112f8 Fix build on DragonFly. 2007-03-25 00:48:08 +00:00
joerg
161c920c15 Prepare for switching to NO_MTREE=yes. 2007-03-24 19:21:18 +00:00
bad
f6e8007fdf Update fwbuilder and libfwbuilder to 2.1.10.
Changes since 2.1.7 are:

Version 2.1.10

Improvements and bug fixes in the GUI
     * fixed bug #1661140: "built-in installer broken in 2.1.9 for PF".
       Installer incorrectly set name for files it copied to the firewall if
       generated configuration consisted of several files. Affected platforms
       are PF and ipfilter because normally for these platforms compiler
       generates two files.
     * fixed bug #1659832: "No compile with QT without STL support"
     * a workaround for the bug 1629461: "Policy tabs do not scroll @ window
       extent on OSX". The tab widget used to show policy, nat, routing and
       policy branch rulesets does not switch to a "folded" mode on Mac OS X
       when it needs to show more tabs that fit in the window. Since I can't
       figure out a way to force it to do that, I am dropping "Policy/" from
       the tab titles for branches to make them shorter. This will help users
       with policies with many branches, however it does not solve the
       problem because as they keep adding branches, at some point they won't
       fit in the window again.
     * added an item "Where used" to the context menu associated with objects
       in rules

Version 2.1.9

Improvements and bug fixes in the GUI
     * New feature: new operation "Tools/Find Conflicting Objects in Two Data
       Files". This operation inspects two data files (either .fwb or .fwl)
       and finds conflicting objects. Conflicting objects have the same
       internal ID but different attributes. Two data files can not be
       merged, or one imported into another, if they contain such objects.
       This operation also helps identify changes made to objects in two
       copies of the same data file. This operation does not find objects
       present in one file but not in the other, such objects present no
       problem for merge or import operations. This operation works with two
       external files, neither of which needs to be opened in the program.
       Currently opened data file is not affected by this operation and
       objects in the tree do not change. In the process of this operation
       user is presented with series of dialogs showing conflicting objects
       side by side. In the end the program can generate report and write it
       to a text file.
     * installOptionsDialog was too large and did not fit on some laptop
       screens. Doing tricks to make sure the dialog properly resized after
       unused GUI elements are hidden.
     * bug #1629521: "can't delete empty chain/policy tab"
     * bug #1619842: "prolog "script editor" opens behind other windows"
     * bug #1620206: "RuleOptions' "Apply" button greyed-out until menu
       selection"
     * bug 1619930: "Prolog tab's ScriptEditor's import fails to overwrite"
     * bug #1617501:"Install fails after compile". The GUI got confused when
       user enter full path to the policy file in the "Output file name"
       input field in the "Compiler" tab of firewall object dialog. Making
       sure we always strip directory path from the file name if user
       specified full path for the policy file in the "Output file name"
       input field in the "Compiler" tab of firewall object dialog. Need to
       strip path when macro "%FWSCRIPT%" is substituted in installation
       scriptlets and in some other places.
     * "Apply" and "Close" buttons in the objct editor panel should be of
       fixed size horizontally
     * bug #1624577: "group window doesn't stay open on multiple-adds". Using
       special flag to tell ObjectTreeView that it should ignore
       MouseReleaseEvent it gets after d&d operation, so it wont switch
       object in the editor panel. Note the bug triggered only on Mac OS X.
     * bug (no num.): GUI used show fanthom 'Policy', 'NAT' and 'Routing'
       tabs when user deleted objects from the Deleted Objects library,
       provided some of these objects were previously deleted firewalls.
     * bug #1620284: "conflict when adding library to Preferences/Libraries".
       When the user tried to add a library to the list in
       Preferemces/Libraries when a data file with the same object library
       was loaded, the GUI detected the conflict and showed error dialog.
     * bug #1650369: "[patch] please add support for GNU/kFreeBSD". Applied
       patch to make code compile on kFreeBSD.

Compiler for iptables
     * bug #1623338: "Can not disable rules in a branch". Compiler for
       iptables ignored flag 'disabled' on rules in a branch.
     * bug #1623113: 'connlimit fails in compiled "address table" rules'
       Module connlimit can only be used in iptables rules matching TCP
       services. Such iptables commands have "-p tcp" and/or "-m tcp"
       options. If a rule in fwbuilder uses TCP Service and connlimit option
       and has multiple objects in src and dst, optimizer used to split it to
       minimize matches. It however preserved connlimit option in all
       subrules, even though some of them did not have TCP service after the
       split. This lead to generation of incorrect iptables commands.
     * bug #1620925: "compile-time AddressTable object with empty file".
       Compile-time AddressTable object that uses file with no addresses
       should be treated as an empty group according to the "Ignore empty
       groups" option.
     * bug #1618381: "CLASSIFY/MARK are non-terminating". This bug report in
       fact reported several problems.

          * For action Branch with option to add branching rule to the mangle
            table: we now generate rules in PREROUTING, POSTROUTING, INPUT,
            OUTPUT and FORWARD chains. This is because some targets can only
            work in PREROUTING or POSTROUTING chains but we do not know what
            rules will user put in the branch. So we need to branch in all
            chains
          * For rules in mangle table with direction set to Inbound or
            Outbound force chain to PREROUTING or POSTROUTING respectively
            early. This eliminates duplicates such as the same rule in
            PREROUTING and INPUT chains. Also since most (all?) targets that
            require mangle table go into either PREROUTING or POSTROUTING
            chains, it should be enough to use these two chains.
          * Non-terminating rules shadow each other "backwards", that is more
            general rule shadows other rules _above_ it. Added flag 'reverse'
            to the method find_more_general_rule and added new rule processor
            DetectShadowingForNonTerminatingRules that finds such cases of
            'reverse' shadowing. Using it for rules in the mangle table for
            iptables.
          * Adding iptables rule with target ACCEPT to emulate terminating
            behavior for Tag and Classify actions. Emulation is controlled by
            a global option in the "Compiler" tab of the firewall properties
            dialog (default is "off"). This means emulation can be turned on
            and off for all rules that might require it at once. It is
            impossible to mix such rules with terminating and
            non-termninating behavior. The reason for this is that shadowing
            detection algorithm can only work with either terminating or
            non-terminating rules, not with the mix.

     * bug #1628989: "run-time-loaded rules don't accept ";" as line comment"
     * bug #1632054: "Runtime AddressObjects FAIL to load if "Name:" contains
       "."". Compiler checks if the name of the run-time AddressTable object
       contains characters that have special meaning in sheel and relaces
       them with '_' when it generates the name of the temporary shell
       variable.
     * bug (no num.): data files used for run-time AddressTable objects can
       have empty lines, the script should skip them.
                         Firewall Builder Release Notes

Version 2.1.8

Installation
   Optinon poll ran on the fwbuilder-discussion mailing list showed that
   majority of users are not interested in ability to install and run both
   fwbuilder 2.0 and 2.1 on the same machine at the same time. Hence we are
   reverting to the old naming schema without suffix '21' for the binaries
   and man pages in this release.

Improvements and bug fixes in the GUI
     * The user can search for objects using regular expressions matching
       their names or attributes.
     * Fixed bug #1592130: "Policy Chaining Issues". The GUI should properly
       display nested branch rulesets. The user can create policy branches
       within other branches.

All compilers
     * Fixed bug #1590746 "problem with using "DNS Names" objects on MS
       Windows". Compiler failed to convert DNSName objects set to resolve at
       compile time into IP addresses.

Compiler for iptables
     * fixed bug #1593221: "iptables filtering bridge problem - PHYSDEV: no
       physdev opti..." Some times rules were generated with "-m physdev" but
       witout "--physdev-in" or "--physdev-out" options.

Compiler for Cisco PIX
     * fixed a bug (no num, support req. #1604103: "fwb_pix policy compiler
       dies when SNMP or NTP hosts defined". Compiler did not print error
       message when it could not find an interface with network zone matching
       IP address of NTP or SNMP server (it just printed the address without
       explanation of what went wrong)
     * Experimental utility fwb_pix_diff has been added to the package. This
       utility takes two PIX configurations on the command line and produces
       the 'diff' that consists of a set of commands that should bring the
       firewall from the state defined by the first config to the state
       defined by the second. Only PIX 7.0 is supported. This utility will be
       incorporated into policy installer in the future to make policy
       updates simpler and faster, especially when small changes are made to
       the large set of access lists and nat rules.
2007-03-24 18:37:19 +00:00
heinz
d10ca954f2 Updated to version 1.58.
Pkgsrc changes:
  - Added CHECK_INTERPRETER_SKIP patterns to stop complaints about
    non-existing "/usr/bin/perl" interpreter.

Changes since version 1.57:
===========================
1.58                                                          Dec 21, 2006
 * We turn on binmode() on filehandles when reading and writing
   keys from disk, so allow safe exchange of SSH private keys
   from Windows and *nix systems. Thanks to Ulisses Gomes
   <ulisses@ibiz.com.br> for pointing this out.
 * Include a copy of the GPL in the distribution. This addresses
   bug #18771. (http://rt.cpan.org/Public/Bug/Display.html?id=18771)
 * Removed warnings from t/15-benchmark.t
2007-03-24 18:35:14 +00:00
heinz
c1217ff475 Added DESTDIR support.
Stopped check-interpreter.mk complaining about Tie/EncryptedHash.pm
2007-03-24 18:32:25 +00:00
schmonz
b90253514b Quell pkglint: add QMAILDIR to BUILD_DEFS. 2007-03-24 07:25:28 +00:00
schmonz
e4624bb2ab Quell pkglint: BUILD_DIRS doesn't need to be preceded by ${WRKSRC}. 2007-03-24 07:16:41 +00:00
drochner
4d67262cc9 update to 0.49
change: warn strongly when a hostkey mismatch occurred
2007-03-23 20:07:02 +00:00
drochner
c6a373a7cb update to 1.1.4
this fixes the same problem which was fixed by gpg-1.4.7: depending
on use, additional text could get through undetected
this gpgme uses gpg in a save way -- since we have gpg-1.4.7 in pkgsrc
this is kindo belt-and-suspender, but anyway...
2007-03-23 20:04:13 +00:00
rillig
8b01483b70 Added the buildlink3.mk file, which was requested in PR 36057. 2007-03-22 10:06:24 +00:00
rillig
327a58e217 Follow the HTTP redirection. 2007-03-21 13:18:45 +00:00
wiz
2d1a8cc474 Bump PKGREVISION for gnome-keyring ABI bump. 2007-03-21 12:05:41 +00:00
wiz
adabc0cd25 Update to 0.8. Bump ABI depends for new dbus dependency.
Changes in version 0.8 are:
* Translations

Changes in version 0.7.92 are:
* Fix build by including sys/types.h
* In gnome_keyring_free() don't crash on NULL parameter.

Changes in version 0.7.91 are:
* Add method for library to discover daemon via DBus. Adds soft
  DBus dependency.
* Fixes for building on kFreeBSD.

Changes in version 0.7.3 are:
* Fix endless loop when creating a keyring and a file by that name
  already exists.
* Fix crasher when deleting session keyring.
* Fix crasher when doing find operation with NULL attribute string.
* Sync files to disk after writing to keyring.

Changes in version 0.7.2 are:
* Don't have multiple password dialogs presented for the same
  keyring

Changes in version 0.7.1 are:
* Added GNOME_KEYRING_ITEM_APPLICATION_SECRET which allows an item
  to be for a single application only with strict access controls.
* New function gnome_keyring_item_get_info_full(_sync) which allow
  retrieval of item meta data without the secret, thus not incurring
  an ACL prompt.
* Translation updates
2007-03-21 12:04:58 +00:00
jlam
f6ec796ba5 Honor PKGMANDIR. 2007-03-20 17:04:13 +00:00
tv
b0ce45fc02 give away to pkgsrc-users 2007-03-19 16:36:41 +00:00
wiz
f1123cd7a3 Try fixing PLIST for Darwin. 2007-03-18 18:58:07 +00:00
obache
d0e74d561e Update ocaml-ssl to 0.4.1.
Provided by MAINTAINER, Jaap Boender in PR 35942.

CHANGES:
0.4.1 (2007-02-21)
=====
* file_descr_of_socket is not marked as deprecated anymore.
* Patched the Makefile to be compatible with FreeBSD (thanks Jaap Boender).
* Explicitely link with libcrypto since we use it. Compilation should now work
  on Mac OS X too (thanks Janne Hellsten).
2007-03-18 16:07:08 +00:00
taca
93ca72a887 Update openssh pacakge to 4.6.1.
Changes since OpenSSH 4.5:
============================

 * sshd now allows the enabling and disabling of authentication
   methods on a per user, group, host and network basis via the
   Match directive in sshd_config.

 * The following bugs have been fixed in this release:

   - Clear SIGALRM when restarting due to SIGHUP. Prevents stray
     signal from taking down sshd if a connection was pending at
     the time SIGHUP was received
   - sftp returned a zero exit status when upload failed due to write
     errors (bugzilla #1252)
   - fixed an inconsistent check for a terminal when displaying scp
     progress meter (bugzilla #1265)
   - Parsing of time values in Match blocks was incorrectly applied
     to the global configuration (bugzilla #1275)
   - Allow multiple forwarding options to work when specified in a
     PermitOpen directive (bugzilla #1267)
   - Interoperate with ssh.com versions that do not support binding
     remote port forwarding sessions to a hostname (bugzilla #1019)

 * Portable OpenSSH bugs fixed:

   - "hang on exit" when background processes are running at the time
     of exit on a ttyful/login session (bugzilla #52)
   - Fix typos in the ssh-rand-helper(8) man page (bugzilla #1259)
   - Check that some SIG records have been returned in getrrsetbyname
     (bugzilla #1281)
   - Fix contrib/findssl for platforms that lack "which" (bugzilla
     #1237)
   - Work around bug in OpenSSL 0.9.8e that broke aes256-ctr,
     aes192-ctr, arcfour256 (bugzilla #1291)
2007-03-18 12:38:44 +00:00
adrianp
055489cf4d Update to 2.1.0
Fix a typo in options.mk

23 Feb 2006 - 2.1.0
-------------------

* Removed the "Connection reset by peer" message, which has nothing
to do with us. Actually the message was downgraded from ERROR to
NOTICE so it will still appear in the debug log.
* Removed the (harmless) message mentioning LAST_UPDATE_TIME missing.
* It was not possible to remove a rule placed in phase 4 using
SecRuleRemoveById or SecRuleRemoveByMsg. Fixed.
* Fixed a problem with incorrectly setting requestBodyProcessor using
the ctl action.
* Bundled Core Rules 2.1-1.3.2b4.
* Updates to the reference manual.
* Reversed the return values of @validateDTD and @validateSchema, to
make them consistent with other operators.
* Added a few helpful debug messages in the XML validation area.
* Updates to the reference manual.
* Fixed the validateByteRange operator.
* Default value for the status action is now 403 (as it was supposed to
be but it was effectively 500).
* Rule exceptions (removing using an ID range or an regular expression)
is now applied to the current context too. (Previously it only worked
on rules that are inherited from the parent context.)
* Fix of a bug with expired variables.
* Fixed regular expression variable selectors for many collections.
* Performance improvements - up to two times for real-life work loads!
* Memory consumption improvements (not measured but significant).
* The allow action did not work in phases 3 and 4. Fixed.
* Unlocked collections GLOBAL and RESOURCE.
* Added support for variable expansion in the msg action.
* New feature: It is now possible to make relative changes to the
audit log parts with the ctl action. For example: "ctl:auditLogParts=+E".
* New feature: "tag" action. To be used for event categorisation.
* XML parser was not reporting errors that occured at the end
of XML payload.
* Files were not extracted from request if SecUploadKeepFiles was
Off. Fixed.
* Regular expressions that are too long are truncated to 256
characters before used in error messages. (In order to keep
the error messages in the log at a reasonable size.)
* Fixed the sha1 transformation function.
* Fixed the skip action.
* Fixed REQUEST_PROTOCOL, REMOTE_USER, and AUTH_TYPE.
* SecRuleEngine did not work in child configuration contexts
(e.g. <Location>).
* Fixed base64Decode and base64Encode.

15 Nov 2006 - 2.0.4
-------------------
* Fixed the "deprecatevar" action.
* Decreasing variable values did not work.
* Made "nolog" do what it is supposed to do - cause a rule match to
not be logged. Also "nolog" now implies "noauditlog" but it's
possible to follow "nolog" with "auditlog" and have the match
not logged to the error log but logged to the auditlog. (Not
something that strikes me as useful but it's possible.)
* Relative paths given to SecDataDir will now be treated as relative
* Decreasing variable values did not work.
* Made "nolog" do what it is supposed to do - cause a rule match to
not be logged. Also "nolog" now implies "noauditlog" but it's
possible to follow "nolog" with "auditlog" and have the match
not logged to the error log but logged to the auditlog. (Not
something that strikes me as useful but it's possible.)
* Relative paths given to SecDataDir will now be treated as relative
to the Apache server root.
* Added checks to make sure only correct actions are specified in
SecDefaultAction (some actions are required, some don't make any
sense) and in rules that are not chain starters (same). This should
make the unhelpful "Internal Error: Failed to add rule to the ruleset"
message go away.
* Fixed the problem when "SecRuleInheritance Off" is used in a context
with no rules defined.
* Fixed a problem of lost input (request body) data on some redirections,
for example when mod_rewrite is used.
2007-03-18 10:35:13 +00:00
rillig
082f1ff6b4 Updated putty to 0.59.
Changes since 0.58:

     * PuTTY  can  now  connect  to  local serial ports as well as making
       network connections.
     * Windows  PuTTY  now  supports  "local  proxying",  where a network
       connection  is  replaced  by  a  local  command.  (Unix  PuTTY has
       supported  this  since it was first released in 0.54.) Also, Plink
       has  gained  a "-nc" mode where the primary channel is replaced by
       an  SSH  tunnel,  which  makes it particularly useful as the local
       command to run.
     * Improved  speed of SSH on Windows (particularly SSH-2 key exchange
       and public-key authentication).
     * Improved SFTP throughput.
     * Various  cryptographic  improvements  in  SSH-2,  including  SDCTR
       cipher modes, a workaround for a weakness in CBC cipher modes, and
       Diffie-Hellman group exchange with SHA-256.
     * Support for the Arcfour cipher in SSH-2.
     * Support for sending terminal modes in SSH.
     * When  Pageant  is  running  and  an  SSH  key  is specified in the
       configuration, PuTTY will now only try Pageant authentication with
       that  key. This gets round a problem where some servers would only
       allow a limited number of keys to be offered before disconnecting.
     * Support  for  SSH-2  password expiry mechanisms, and various other
       improvements and bugfixes in authentication.
     * A  change to the SSH-2 password camouflage mechanism in 0.58 upset
       some Cisco servers, so we have reverted to the old method.
     * The  Windows  version  now  comes  with documentation in HTML Help
       format.  (Windows Vista does not support the older WinHelp format.
       However,  we  still  provide  documentation  in that format, since
       Win95 does not support HTML Help.)
     * On  Windows, when pasting as RTF, attributes of the selection such
       as colours and formatting are also pasted.
     * Ability   to   configure   font   quality  on  Windows  (including
       antialiasing and ClearType).
     * The  terminal  is  now restored to a sensible state when reusing a
       window to restart a session.
     * We now support an escape sequence invented by xterm which lets the
       server  clear  the  scrollback  (CSI  3  J).  This  is  useful for
       applications such as terminal locking programs.
     * Improvements to the Unix port:
          + now compiles cleanly with GCC 4
          + now  has  a  configure script, and should be portable to more
            platforms
     * Bug  fix:  0.58  utterly  failed  to  run on some installations of
       Windows XP.
     * Bug  fix:  PSCP  and PSFTP now support large files (greater than 4
       gigabytes), provided the underlying operating system does too.
     * Bug  fix:  PSFTP (and PSCP) sometimes ran slowly and consumed lots
       of CPU when started directly from Windows Explorer.
     * Bug  fix:  font  linking  (the automatic use of other fonts on the
       system  to  provide Unicode characters not present in the selected
       one) should now work again on Windows, after being broken in 0.58.
       (However,  it  unfortunately still won't work for Arabic and other
       right-to-left text.)
     * Bug  fix:  if  the  remote server saturated PuTTY with data, PuTTY
       could become unresponsive.
     * Bug  fix:  certain large clipboard operations could cause PuTTY to
       crash.
     * Bug  fix:  SSH-1  connections  tended  to crash, particularly when
       using port forwarding.
     * Bug  fix:  SSH Tectia Server would reject SSH-2 tunnels from PuTTY
       due to a malformed request.
     * Bug  fix:  SSH-2 login banner messages were being dropped silently
       under some circumstances.
     * Bug  fix:  the  cursor  could  end  up  in  the wrong place when a
       server-side application used the alternate screen.
     * Bug  fix:  on  Windows,  PuTTY now tries harder to find a suitable
       place  to  store its random seed file PUTTY.RND (previously it was
       tending to end up in C:\ or C:\WINDOWS).
     * Bug fix: IPv6 should now work on Windows Vista.
     * Numerous other bugfixes, as usual.
2007-03-17 16:35:05 +00:00
heinz
511db2e9f6 Changed HOMEPAGE to URL independent of current Perl module maintainer 2007-03-17 12:58:38 +00:00
kristerw
c212aed1a7 Add p5-Authen-PAM. 2007-03-16 21:10:08 +00:00
wiz
698196061c Update to 1.03:
v1.03
        - add CLONE_SKIP as proposed by
          Jarrod Johnson jbjohnso at us dot ibm dot com
2007-03-16 20:52:55 +00:00
cjs
40d179625e Bring in patch suggested in http://bugzilla.mindrot.org/show_bug.cgi?id=1299 .
This fixes the issue that, when "options edns0" is turned on (usually in
/etc/resolv.conf), ssh doesn't see it, and thus fails to request a DNSSEC
response, which in turn leads to SSHFP records being considered insecure.
2007-03-16 05:46:06 +00:00
wiz
46a7f08367 Remove duplicate p5-Crypt-CBC entry. 2007-03-15 18:46:04 +00:00
rillig
56157bd198 Imported p5-Authen-PAM.
This module provides a Perl interface to the PAM library.
2007-03-15 12:18:29 +00:00
rillig
bec1d82f20 bin/sudo is set-uid root. PKGREVISION++ 2007-03-13 09:46:00 +00:00
abs
be13260407 add p5-Crypt-GeneratePassword 2007-03-12 11:52:46 +00:00
abs
7bb88b7874 Add security/p5-Crypt-GeneratePassword version 0.03
Crypt::GeneratePassword generates random passwords that are (more
or less) pronounceable. Unlike Crypt::RandPasswd, it doesn't use
the FIPS-181 NIST standard, which is proven to be insecure. It does
use a similar interface, so it should be a drop-in replacement in
most cases.

If you want to use passwords from a different language than english,
you can use one of the packaged alternate unit tables or generate
your own.
2007-03-12 11:51:38 +00:00
abs
26023e3a68 Add missing p5-Crypt-Random depends, bump PKGREVISION 2007-03-12 09:58:10 +00:00
abs
9cdc4a4926 enable p5-Data-SimplePassword 2007-03-09 13:28:14 +00:00
abs
77c2854257 Import security/p5-Data-SimplePassword-0.02
Yet another very easy-to-use but a bit strong random password generator.
2007-03-09 13:21:44 +00:00
wiz
33043e8906 Minor pkglint cleanup, from Sergey Svishchev. 2007-03-08 19:25:32 +00:00
wiz
9011846386 Update to 0.3.9:
Version 0.3.9 (released 2007-03-02)
- In generated code, config.h is pulled in if HAVE_CONFIG_H.
- Development changes: changed from CVS to GIT as an experiment.
  I push my changes to <http://repo.or.cz/w/libtasn1.git>.
- Autoconf 2.61 and automake 1.10 is required.

Version 0.3.8 (released 2006-11-16)
- Fix reading of binary files in asn1Decoding, for Windows.

Version 0.3.7 (released 2006-10-19)
- When asn1_der_coding encoded a TYPE_NULL and the output buffer is
  NULL, it would not increment the counter properly, so the size of
  the required buffer would be off by one.  Fixed.  Reported by
  Stephen Wrobleski <steve@localtoast.org>.
- Fix configure to respect user-definable flags.  Reported by "Diego
  'Flameeyes' Pettenò" <flameeyes@gentoo.org>.
- The --help and --version outputs from the tools have been improved.

Version 0.3.6 (released 2006-08-13)
- Fix man pages to use \- instead of - for negative signs (as in "-1").
- Add -I's when building in src/, so that unistd.h etc is found on
  systems that doesn't have them.
- Valgrind isn't used for cross-compilation by default, and there is
  also --disable-valgrind-tests to unconditionally disable it.
- Valgrind is invoked without parameters, put things you like into
  ~/.valgrindrc instead.
2007-03-08 18:23:42 +00:00
drochner
8c787d5d15 update to 1.4.7, from Christian Gall per PR pkg/35940
This fixes a security problem which is rather an application issue:
The user wasn't notified about additional text (not covered by the
signature) unless the --status-fd flag is used.
2007-03-07 11:31:24 +00:00
adrianp
28506079ec Update to 2.0.8
Patches from Matthias Drochner (thanks !)

Version 2.0.8:
-------------
More fingerprints, signature cleanup.
p0fping.c and diagnostic queries added.
Socket ownership fix when dropping privs.
Some -O signatures.

Version 2.0.7:
--------------
Added -0 mode for port 0 wildcards in queries.
Added -e option to make p0f work on some boxes.
HDLC support added.
New fingerprints, including Windows Vista betas.
[BUG] Fixed timezone in logs after chroot().
[BUG] Unlikely command-line overflow with VLANs fixed.

Version 2.0.6:
--------------
[BUG] Fixed pcap naming madness.
Support for Cygwin.
More signatures. Plenty of -A sigs from Ryan Kruse.
[BUG] Fix to a command-line parsing snafu with sprintf; shame on me ;-)
Timestamps in masquerade detection.
Write PID to /var/run/p0f.pid
2007-03-05 20:31:51 +00:00
njoly
3bd2df35bc Download URLs have moved, update MASTER_SITES. Fixes PR/35710. 2007-03-02 09:15:24 +00:00
schmonz
85fabf860b Add and enable py-tlslite. 2007-02-28 05:35:16 +00:00
schmonz
43ea469dcd Initial import of py-tlslite 0.3.8.
TLS Lite is a free python library that implements SSL 3.0, TLS 1.0,
and TLS 1.1. TLS Lite supports non-traditional authentication methods
such as SRP, shared keys, and cryptoIDs in addition to X.509
certificates. TLS Lite is pure Python, however it can access OpenSSL,
cryptlib, pycrypto, and GMPY for faster crypto operations. TLS Lite
integrates with httplib, xmlrpclib, poplib, imaplib, smtplib,
SocketServer, asyncore, and Twisted.
2007-02-28 05:34:25 +00:00
wiz
4c28e966f5 Update to 0.55:
[Changes for 0.55 - 2006-07-29]

* ANDK submitted a patch to fix versioning problem when
  the user elects to install Crypt::OpenPGP.

* Major refactoring of the Makefile.PL to ease the installation process.

[Changes for 0.54 - 2006-05-12]

* Fixed a long-standing bug where differing end-of-line conventions
  could cause bogus comparisons in signature checks.

* Fixed another long-standing bug where CRLF text files were hashed
  into different digests under Unix and Dosish platforms.  Now it's
  consistently hashed as if it's been normalized to LF.

* Optional dependencies are no longer installed-by-default.

[Changes for 0.53 - 2006-01-31]

* The explicit call to "readline(D)" didn't compile on earlier perls which
  demanded either "readline(*D)" or "<D>" -- I elected the latter form.
  Reported by: Matthew Persic

* Update my author key to reflect revoked past uids.

[Changes for 0.52 - 2006-01-19]

* POD and source code cleanup; no functional changes.

* Updated my author key to reflect my new name and identity.

* Upgrade to the latest Module::Install to fix Cygwin
  installation problems.
  Reported by: Lyle Ziegelmiller

[Changes for 0.51 - 2006-01-02]

* Even more flexible CRLF handling for SIGNATURE files,
  Contributed by: Andreas Koenig.

[Changes for 0.50 - 2005-08-21]

* Add support for to SHA-256, requested by Mark Shelor in light
  of the recent SHA1 attacks.  SHA1 is still the default, but
  you can now override this by settings MODULE_SIGNATURE_CIPHER
  environment variable to SHA256.

[Changes for 0.45 - 2005-08-09]

* Andreas Koenig ported out that "Import GPG keys?" was asked
  far too many times during autoinstall.
2007-02-27 09:28:33 +00:00
wiz
a60484a7d2 Update to 1.00:
1.00 Tue Jul 12 23:45:00 UTC 2005
	- migrated to Build.PL
	- added POD, POD coverage, and signature tests
	- generated traditional Makefile.PL
	- bumped up version number
	- ported tests to Test::Simple
	- bumped up test coverage
	- updated README

0.61  Sat May 25 17:31:52 UTC 2002
	- avoid uninitialized value warnings in fh_crypt()

	  Thu May 10          2001
	- fixed _gen_iv() to generate 255 characters (thanks to John Wiersba)

      Sun Apr 29          2001
	- added license/copyright information to the pod in the module itself
2007-02-27 09:07:04 +00:00
yyamano
b3452709e5 Make this build on Darwin. 2007-02-25 00:57:54 +00:00
jnemeth
55b57e6335 delete fressh 2007-02-24 11:51:13 +00:00
jnemeth
1dcd16eca4 Thor Lancelot Simon, author of FreSSH, says that nobody should be
using it because it only supports SSHv1 and has stopped distribution
of the source tarball.
2007-02-24 11:49:33 +00:00
shannonjr
c715ad813c Update to 0.9.9. Changes:
- Improve database performance by reducing the number of query. (Paul Robert Marino)
- Activate CleanOutput filtering (lot of escaping fixes).
- More action logging.
- Bug fixes with the error pages Back/Retry buttons.
- Fix error on group by user (#191).
- Fix template compilation error with Cheetah version 2 (#184).
2007-02-23 15:25:00 +00:00
shannonjr
8facaf1807 Update to 0.9.7.1. Changes:
- Fix a startup problem on system with different address of different family
  mapping to the same IP.
- Fix for system using the GnuLib poll replacement modules. The module was
  broken when used in conjunction with server socket.
- Various portability fixes
2007-02-23 15:23:23 +00:00
shannonjr
47d57982de Update to 0.9.8.1. Changes:
- Various portability fixes.
- Introduce Cisco ASA IPS module support.
- Introduce yum support.
- Introduce Cacti thold plugin support.
- Introduce Microsoft Cluster Service support.
- Honeyd rules update and improvement.
- Updated NAVCE rules; modified ClamAV rules for consistency.
- Improve NTSyslog ruleset.
- Added rule to ignore LML's "could not match prefix" log entries.
- Fix format problem with Apache logs from western hemisphere (- versus
+ TZ).
- Fix Squid process exited rule (#185).
2007-02-23 15:22:10 +00:00
shannonjr
b51243c2ae Update to 0.9.11.3. Changes:
- Fix preludedb-admin copy/move operations
- Fix a Python binding memory leak upon alert list deletion.
- Various bugfixes.
- Various portability fixes.
2007-02-23 15:19:40 +00:00
wiz
51c8ea8d62 pkglint USE_LANGUAGES cleanup. Patch from Sergey Svishchev. 2007-02-22 19:30:02 +00:00
wiz
601583c320 Whitespace cleanup, courtesy of pkglint.
Patch provided by Sergey Svishchev in private mail.
2007-02-22 19:26:05 +00:00
wiz
6e2c35c083 pkglint cleanup; update HOMEPAGE/MASTER_SITES.
From Sergey Svishchev in private mail.
2007-02-22 19:01:13 +00:00
drochner
da45d43410 pull in some patches from lsh2 to make it compile with gcc4 2007-02-22 17:38:33 +00:00
wiz
0e8c2753f8 Update to 1.08:
1.07 - Wed 22 Feb 06 08:57:02 UTC
	added  || defined(__hpux) to idea.h to cope with
	HPUX 11.11 w/ANSI C compiler per RT ticket 17796

1.08 - Fri 21 Apr 06 10:40:52 UTC
	added  || defined(WIN32) to idea.h
	added  ifdef for WIN32 to _idea.c
	Thanks to Carl Franks for the pach contributions
		per RT ticket 18811
	Updated README - added additional known-good platforms
	Updated COPYRIGHT
2007-02-22 12:07:34 +00:00
wiz
c371c5e5ff Update to 0.14:
0.14  2006.05.08
    - Win32 fixes: use Data::Random as a fallback in make_random, better
      support for locating openssl. Thanks to CFRANKS for the patch.
    - Makefile.PL update, to the latest Module::Install. Thanks to Adam
      Kennedy for the patch.
2007-02-22 12:04:50 +00:00
wiz
676fea063d Update to 1.04:
1.04  1 Jul 2006
        - removed broken CBC test
2007-02-22 11:57:11 +00:00
shannonjr
a106f6a657 Update to 0.9.13. Changes:
- Fix a crash with Python bindings upon signal reception (Fix #200).
- New --with-system-ltdl configure switch. The default is now to use the
  system wide ltdl library if it is available, unless specified otherwise
  (Fix #199).
- Prevent NULL pointer dereference if no permission is specified after the
  permission type (Fix #197).
- Upon IDMEFCriteria parsing error, recover from broken parser stater (Fix #195).
- Detailed error reporting on IDMEFCriteria parsing error.
- Fix string and possible criteria leak on IDMEFCriteria syntax error.
- Prefer anonymous authentication rather than SRP. We do this because there
  are compatibility issue with SRP between different GnuTLS version
  (Should fix #187).
- When dumping AdditionalData of type byte-string to string, encode the data using base64.
2007-02-20 15:13:02 +00:00
rillig
77492ec2ad Fixed the build on IRIX 6.5. 2007-02-20 10:17:14 +00:00
adrianp
5e82482f1f buildlink updates and patches to handle the new libnet package structure
bump PKGREVISION
2007-02-18 18:54:23 +00:00
adrianp
56a242701f Update to 1.2.7
- 8/5/2006 1.2.7 (karen)
- Improved HTML <table> output in "base_qry_alert.php" -- Jonathan W Miner
- Remove message when 0 alerts -- Jonathan W Miner
- PrintBase64PacketPayload fix for payload lenght modulo = 0 -- Juergen Leising
- Added empty function to ProtocolFieldCriteria -- Kevin Johnson
- Fixed issue if sig_gid was empty -- Valter Santos
- Added SnortUnified, a perl replacement for Barnyard -- Jason Brvenik
- Updated base-rss.php -- Dan Michitsch
2007-02-17 19:18:24 +00:00
adrianp
d002f1441f Update to 1.36
Changes (new this version)
 Added -404 option to specify a "404 string" on the command line
 Added plugin to chek for PUT and DELETE
 Additional checks for HTTP methods
 Additional checks for headers
 Other bugfixes, please see the CHANGES file for more details
2007-02-16 00:54:23 +00:00
rillig
c4ac32f5b8 This package has info files. 2007-02-15 21:23:55 +00:00
tv
e6db44e8c5 PKGREVISION bump due to proper ABI_DEPENDS versioning in devel/libevent. 2007-02-11 05:22:24 +00:00
obache
c7ffb8dc31 Update amavisd-new to 2.4.5.
Patch provided by MAINTAINER, Julian Dunn in PR 35578.

---------------------------------------------------------------------------
                                                           January 30, 2007
amavisd-new-2.4.5 release notes

SECURITY

- Recommended version of Convert::UUlib is 1.08 or higher
  to avoid processing of uninitialized data containing 'random' garbage.

  Note that a security hole in uulib which comes with Convert::UUlib 1.04
  and older is now (as of 2006-12-05) known to be exploitable:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1349
  credits to Jean-Sebastien Guay-Leroux;

- p0f-analyzer.pl will no longer reply to queries coming from low-numbered
  UDP ports below 1024 or from nfsd port 2049, and will ignore queries
  with nonce longer than 1024 character or containing characters outside
  of \040-\177 range to limit its usefulness as a potential reflector
  for an attacker from internal networks.


INCOMPATIBLE CHANGE WITH 2.4.4

- p0f-analyzer.pl now only binds to a loopback interface by default, instead
  of to all interfaces;  change $bind_addr in p0f-analyzer.pl to '0.0.0.0'
  if p0f-analyzer.pl is running on a different host from amavisd or from
  other querying clients; suggested by Shaun T. Erickson and Mario Liehr;


BUG FIXES

- let p0f-analyzer.pl exit when a pipe on stdin is closed (e.g. when p0f
  is killed or crashes), instead of entering a tight loop; reported by
  Justin Piszcz and Henrik Krohns;

- hard-blacklisting no longer skips quarantining when
  $spam_quarantine_cutoff_level is undefined (or is an empty string);

- restart timer after Sophie times out; previously the next attempt
  would run with no time limit; reported by Nick Leverton and
  Nicklas Bondesson;

- fixed AM.PDP code to always provide smtp-quoted form in angle brackets
  in delrcpt and addrcpt attributes of a response, i.e. in the same form
  as was received in sender and recipient attributes;

- fix error reporting in open_on_specific_fd when POSIX::dup2 fails;
  thanks to Chris (decoder);

- fix signal handling in read_snmp_variables() and register_proc(),
  a signal could previously get lost (not re-signaled) if it occurred
  within these subroutines;

- fixed get_body_digest which incorrectly determined 7- or 8-bitness
  of mail header and body, setting body_type incorrectly (with only
  cosmetic ill-effects);

- AM.PDP protocol: ensure proper address form is used in server response
  attributes 'delrcpt' and 'addrcpt': the same form should be used as
  in 'sender' and 'recipient' attributes. The attribute value syntax is
  specified in RFC 2821 as 'Reverse-path' (i.e. smtp-quoted form, enclosed
  in <>); previously enclosing angle brackets were missing in a server reply;

- documentation - amavisd.conf-default incorrectly stated that a default
  value for $prepend_header_fields_hdridx is 1;  actually the default is 0
  as correctly indicated in release notes; reported by Jo Rhett;


OTHER

- qmail interfacing notice:
  MTA timeout for waiting on results from amavisd should be longer than
  $child_timeout (8 minutes by default) with some margin, setting MTA timeout
  to 15 or 20 minutes is usual. With qmail however the QMQP code in qmail
  has hard-coded timeouts set, 10 seconds for connect and 60 seconds for
  read/write. If amavisd processing takes longer than 60 seconds, the MTA
  drops connection and retries later, yet amavisd continues processing
  and eventually delivers a mail (with each MTA retry), causing repeated
  deliveries of the same message. The following patch by Eric Huss on
  the www.qmail.org page: http://www.ehuss.org/qmail/qmqpc-timeout.tar.gz
  should be applied to qmail when interfacing it to a post-queue content
  filter. Problem researched by Nicklas Bondesson;

- better timeout handling in interface code to daemonized virus scanners
  like clamd,  Sophie, Trophie: allow short time (10 s) for connect and
  for sending a request, then allow normal (long) time to collect results;
  keep evidence of the initial deadline on retries;

- prefer '7bit' as Content-Transfer-Encoding when attaching original message
  or its headers (message/rfc822 or text/rfc822-headers) to DSN or to a
  defanged mail, and only specify '8bit' when necessary;

- remove protecting the $ and @ characters in second argument
  of a regexp selector macro, it is unnecessary and confusing;

- sanitize Message-ID and Resent-Message-ID header field bodies in
  macros %m, %r and header_field by providing angle brackets if missing
  to facilitate log parsing (angle brackets are RFC 2822 required syntax
  and are semantically not part of a message id);

- updated $map_full_type_to_short_type_re to avoid mapping file(1) result
  'MS-DOS executable (built-in)' to types 'exe-ms' and 'exe'; the file(1)
  utility generously declares any text file starting with LZ to be a
  'MS-DOS executable (built-in)';  thanks to Noel Jones, Jakob Curdes
  and Clifton Royston for troubleshooting;

- add X-Spam-* header fields to quarantined mail if spam score is at or
  above tag_level. Previously message needed to be recognized as spammy
  or spam (tag2 or kill level) in order to receive spam header fields
  in quarantined copy. This also makes it more consistent with adding
  such header fields to passed mail;  suggested by Michael Gaskins;

- add X-Amavis-OS-Fingerprint header field to quarantined mail;

- header field X-Spam-Score in a passed or quarantined mail now reflects
  score boost even when SA score is unknown (e.g. when SA was not called),
  and reflects white and blacklisting by pushing score to 0 or 64, to
  make it consistent with a bar size in X-Spam-Level header field;

- resignal "timed out" after (almost) every eval {} which has no subsequent
  call to prolong_timer() to ensure we do not continue running with
  disabled timer. Exceptions are DESTROY and END handlers, and code which
  handles timer in some other way (e.g. by keeping evidence of a deadline);

- for the purpose of looking up client IP address in @mynetworks_maps,
  treat unknown/unavailable IP address as 0.0.0.0;  this allows treating
  directly submitted mail on the MTA host (not submitted through SMTP) as
  coming from IP address 0.0.0.0 (i.e. "This" Network - according to RFC 1700);

  Note that this is indistinguishable from other reasons when IP address
  is not made available to amavisd, e.g. when smtp_send_xforward_command
  option in Postfix smtp service is not enabled, which is why the default
  setting of @mynetworks does not include a 0.0.0.0/8 network to prevent
  falsely loading a MYNETS policy bank.

  One should add 0.0.0.0/8 to a @mynetworks list only when XFORWARD is known
  to work and if some software on the MTA host is submitting its mail to MTA
  directly, e.g. through a sendmail command, and MYNETS policy bank loading
  is needed for proper processing of such mail;

- report a more informative message when a file(1) utility fails to produce
  useful results: joins exit status with a parsing report into one message;
  thanks to Andres, whose file(1) utility was crashing with SEGV;

- consistency: rearrange implicitly adding $X_HEADER_TAG to a hash
  %allowed_added_header_fields so that it is possible to turn off
  insertion of $X_HEADER_TAG header field by turning off associated key in
  %allowed_added_header_fields even when $X_HEADER_TAG is explicitly defined;

- let %allowed_added_header_fields also control insertion of header fields
  into quarantined message;

- amavisd-nanny now displays a title line indicating the semantics of columns;

- Courier patch: ensure the information is stored to newly introduced
  recip_addr_smtp and sender_smtp object attributes, which are needed
  to preserve pristine address forms for DSN and ORCPT use and for logging;
  a patch by Martin Orr;

- qmqpqq (qmail): ensure the information is stored to newly introduced
  recip_addr_smtp and sender_smtp object attributes;

- qmail patch now activates line-by-line sending to qmail to avoid qmail bug
  ('bare LF' reported when CR and LF are separated by a TCP packet boundary);

- tighten a regexp on matching a p0f fingerprint for Windows XP to avoid
  matching 'Windows XP SP1+, 2000 SP3';  suggested by Michael Scheidell;

- updated AV entry for CentralCommand Vexira (vascan):
  removed hard-coded option '--vdb';  by Brian Wong;

- internal: move code dealing with a SA call to a dedicated
  subroutine call_spamassassin;

- internal: provide new routines to collect scalar and structured results
  from a subprocess (collect_results, collect_results_structured) and
  take advantage of them in decoding, in AV and in dspam interface routines,
  unifying code and providing results size sanity limit and consistent
  killing of runaway external programs;

- experimental: taking advantage of the above, make it possible to run SA in
  a spawned process, requested by setting a new config variable $sa_spawned
  to true (it is off by default); benefits are that a mainstream child process
  can not be brought down by potential processing problems in SA or its
  external modules, and timeouts are handled cleanly by a calling process;
  downside is an increase of process count (worst case: doubled), with
  corresponding increase in memory footprint, plus about 20 .. 30 ms
  of additional processing time for each call to SA;

- added a tuning tip on buffer sizes to README.sql for MySQL with InnoDB,
  by Wayne Smith;

- updated URL of Sophie AV scanner;
2007-02-09 02:39:40 +00:00
wiz
ce60f8c137 Update to 0.5.13:
Noteworthy changes in version 0.5.13 (2007-02-01)
------------------------------------------------

* Fixed shared library for newly added APIs in last release.

* Add -no-undefined to LDFLAGS, to make opencdk build under mingw32.

* Add AC_LIBTOOL_WIN32_DLL to configure.ac, which is required for
* libtool to behave correctly for cross-compiles to mingw32.

* Use gnulib for mingw32 support.

Noteworthy changes in version 0.5.12 (2007-02-01)
------------------------------------------------

* Add new API to extract public/secret OpenPGP key to S-expr.
The functions are cdk_pubkey_to_sexp and cdk_seckey_to_sexp.  Patch by
Mario Lenz <mario.lenz@gmx.net>.

* Autoconf 2.60 and automake 1.10 are now required.

* Doc fixes.
2007-02-05 22:59:00 +00:00
shannonjr
9a63d628d2 Update to Version 2.0.2.
This is maintenance release to fix build problems found after the
release of 2.0.1.  There are also some minor enhancements.
2007-02-05 11:43:01 +00:00
schwarz
46ee2df023 make sure LDFLAGS is honored if set by pkgsrc 2007-02-03 18:48:49 +00:00
sborrill
7ebc7857d8 Update to john-1.7.2 and enable per-arch optimization for NetBSD and
OpenBSD.

Changes:
The following changes have been made between John 1.7.1 and 1.7.2:

* Bitslice DES assembly code for x86-64 making use of the 64-bit mode
extended SSE2 with 16 XMM registers has been added for better performance
at DES-based crypt(3) hashes with x86-64 builds on AMD processors.
* New make target for FreeBSD/x86-64.

The following changes have been made between John 1.7.0.2 and 1.7.1:

* Bitslice DES code for x86 with SSE2 has been added for better performance
at DES-based crypt(3) hashes on Pentium 4 and SSE2-capable AMD processors.
* Assorted high-level changes have been applied to improve performance
on current x86-64 processors.
* New make target for NetBSD/SPARC64.
* Minor source code cleanups.
2007-02-03 17:09:20 +00:00
wiz
b1e5bdfecd Update to 1.2.4:
Noteworthy changes in version 1.2.4 (2007-02-01)
------------------------------------------------

 * Fixed a bug in the memory allocator which could have been the
   reason for some of non-duplicable bugs.

 * Other minor bug fixes.
2007-02-03 00:08:51 +00:00
wiz
47400d69b0 Update to 1.02:
v1.02
	- added some info to BUGS and to BUGS section of pod
	- added TELL and BINMODE to IO::Socket::SSL::SSL_HANDLE, even
          if they do nothing useful.
	- all tests allocate now the ports dynamically, so there should
          be no longer a conflict with open ports on the system where
          the tests run
v1.01
	- work around Bug in Net::HTTPS where it defines sub blocking
          as {}, e.g. force scalar context when calling sub blocking
          (in IO::Socket::SSL::write)
          see http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=383106
v1.0
	- fix depreciated and practically undocumented function
          get_peer_certificate so that LWP Net::HTTPS works again
        - set arg 'Blocking' while calling SUPER::configure only
          if it was set by the caller to work around Problem in LWP
          Net::HTTPS
2007-02-02 19:05:12 +00:00
joerg
351fae6ade Fix PLIST. Bump revision. 2007-02-02 16:03:07 +00:00
joerg
9d5e86cca3 Don't include x11.b3.mk by default, esp when no GTK/Qt support is
requested.
2007-02-02 00:20:06 +00:00
ghen
9d37c316b1 Install amavisd-release perl script as well. Bump PKGREVISION. 2007-01-31 20:20:56 +00:00
wiz
29abbd1c1b Mark as BROKEN_IN pkgsrc-2006Q4, based on
ftp://asim.lip6.fr/outgoing/packages/i386/3.1/20070114.1132/broken.html
(latest 3.1/i386 bulk build of 2006Q4).

Feel free to fix them...
2007-01-31 00:04:11 +00:00
joerg
48cbd2ccd5 Modular Xorg support for option X11. 2007-01-30 20:53:24 +00:00
joerg
8219c281af Modular Xorg support. 2007-01-30 20:47:58 +00:00
joerg
f99014ccf2 Modular Xorg support. 2007-01-30 20:41:32 +00:00
wiz
bbb5b9ea17 Put macro argument in parentheses. From Naoto Morishima in PR 35519.
Bump PKGREVISION.
2007-01-30 06:53:32 +00:00
gdt
38a9ea5eba Update to 0.0.10.
* Major changes in 0.0.10

** Support GnuPG versions older than 1.4.3

** Provide a minor-mode to encrypt/sign mails

* Major changes in 0.0.9

** epa.el usablity improvements.

*** M-x epa-encrypt-region specifies --armor & --textmode by default

*** M-x epa-sign-region and M-x epa-sign-file create a cleartext signature by
    default

*** Region based commands now determine the coding-system used to
    encode the plain text

*** Fingerprints are pretty-printed

*** New user option epa-protocol to use the S/MIME.

** Support XEmacs compiled with --with-mule=no --with-file-coding=no.
2007-01-29 15:02:57 +00:00
adrianp
e124e16091 Update to 1.9
a) Experimental IKEv2 support (--ikev2)
b) RFC 3947 NAT traversal support (--nat-t)
c) Source IP spoofing (--sourceip) - Requires raw sockets.
d) Nortel proprietary pre-shared key cracking support.
e) psk-crack can read dictionary files from stdin (--dictionary=-)
f) Backoff patterns may contain only a single packet.
g) Two new packet display options: --timestamp and --shownum
h) ike-scan now uses the Mersenne twister PRNG, with new --randomseed option.
i) --rcookie option allows the responder cookie to be specified in outgoing packets.
j) Several new backoff patterns and vendor IDs added.
k) ike-scan wiki launched: http://www.nta-monitor.com/wiki/
2007-01-28 01:34:42 +00:00
schwarz
dabfb3562f * added a patch to ensure compatibility with IRIX 5 (Changes says it is al-
ready included with that release of OpenSSH, but in fact it is not)
* removed hacks.mk which is no longer necessary with that version of OpenSSH
2007-01-27 22:57:35 +00:00
markd
60c020c40a Update icons location of KDE apps. Bump PKGREVISION 2007-01-26 04:25:46 +00:00
shannonjr
548195851f Re: pkg/35480: security/libpreludedb fails to compile (NetBSD 3.0)
Package was incorectly auto detecting postgres and attempting to compile
postgres plugin. Force package to skip compilation of postgres plugin.
2007-01-25 14:39:03 +00:00
epg
e4f20d343c devel/apr:
Update to 1.2.8 (formerly in devel/apr1), no longer build from the
    httpd distfile.

devel/rapidsvn:
devel/subversion-base:
parallel/ganglia-monitor-core:
security/hydra:
www/apache2:
    Use devel/apr0.

www/apache22:
    Use devel/apr and devel/apr-util.
2007-01-24 19:46:45 +00:00
wiz
3053dddc84 Remove share/common-lisp/source/gpg-error directory tree on deinstall.
Bump PKGREVISION.
2007-01-24 19:38:16 +00:00
tron
8070b8de09 Renable and fix build of C++ library under Mac OS X.
Bump package revision because of this fix.
2007-01-24 15:58:04 +00:00
smb
6bbd60056f Change default pid file from /var/run/stunnel/stunnel.pid to /var/run/stunnel.pid 2007-01-23 21:53:58 +00:00
minskim
c91702e305 Disable the C++ library on Darwin to avoid a link error (PR 35456).
According to the gnutls maintainer, the C++ compiler on Darwin is
probably broken.
2007-01-21 18:13:55 +00:00
wiz
a45b42f314 Update to 1.6.1:
* Version 1.6.1 (released 2006-12-28)

** Fix the list of trusted CAs that server's send to clients.
Before, the list contained issuer DN's instead of subject DN's of the
trusted CAs.  Reported by Max Kellermann

** Fix gnutls_certificate_set_x509_crl to initialize the CRL before using it.
Reported by Max Kellermann

** Encode UID fields in DN's as DirectoryString.
Before GnuTLS encoded and parsed UID fields as IA5String.  This was
incorrect, it should have used DirectoryString.  Now it will use
DirectoryString for the UID field, but for backwards compatibility it
will also accept IA5String UID's.  Reported by Max Kellermann

** Fix ./configure failure with non-GCC compilers.
This fixes the following error message:
configure: error: conditional "HAVE_LD_OUTPUT_DEF" was never defined.
Reported by "Michael C. Vergallen"

* Version 1.6.0 (released 2006-11-17)

** No changes since 1.5.5.
The major changes compared to the 1.4.x branch are:

*** A GnuTLS C++ library is part of the official distribution.
Currently there are no examples or documentation, but hopefully this
will change.  See gnutlsxx.h for the API.

*** Windows is a supported platform.
There are, however, two know bugs.  One is related to select() in
command line tools (not, nota bene, in the library), the other is a
problem with libgcrypt that causes delays.  Help is needed to resolve
those issues, so we feel we can't delay the release because of this.

*** New APIs for custom push/pull function error reporting.
The new APIs are gnutls_transport_set_errno and
gnutls_transport_set_global_errno.  See the release notes for version
1.5.4 for more information.

*** Self tests are run under valgrind, if available.  See --disable-valgrind.
2007-01-20 17:38:06 +00:00
taca
c1cf735115 Update hpn-patch; openssh-4.4p1-hpn12v13 to openssh-4.5p1-hpn12v14.
Accurate changes are unknown.

Bump PKGREVISION.
2007-01-20 10:03:39 +00:00
rillig
dce06beb4e Added a patch that calls closedir() after scanning a directory. Now RATS
is able to scan much larger directories. :)

PKGREVISION++
2007-01-18 22:55:19 +00:00
salo
36b53788b7 Fix building with Autoconf 2.60 and newer.
Addresses PR pkg/34252 by Matthias Petermann.

Also delint a bit.
2007-01-18 17:28:24 +00:00
wiz
e5b04d25c0 Very belatedly bump PKGREVISION for all jasper dependencies because
of the shlib name change (!) during the update to 1.900.0.

Noted by Robert Elz in PR 35431.
2007-01-17 23:47:18 +00:00
salo
f3624b6351 Security fix for CVE-2006-6143:
"An unauthenticated user may cause execution of arbitrary code in
 kadmind, which can compromise the Kerberos key database and host
 security.  (kadmind usually runs as root.)  Unsuccessful exploitation,
 or even accidental replication of the required conditions by
 non-malicious users, can result in kadmind crashing."

http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-002-rpc.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6143

Patch from MIT.
2007-01-17 23:43:47 +00:00
adrianp
71bd3f9136 Update to 1.27
2007-01-16 David A. Wheeler <dwheeler, at, dwheeler.com>
* Release version 1.27

2007-01-16 Sebastien Tandel <sebastien, at, tandel (doht) be)
* Cleaned up code for patch handling, fix bug in subdir handling,
include patch info in help.

2007-01-15 Steve Kemp <steve at shellcode dot org>
* Fix Debian bug 268236.
This complains that flawfinder crashes when presented with a
file it cannot read.  The patch obviously can't prevent
the problem, since the tool can't review what it can't read,
but at least it halts with a cleaner error message.

2007-01-15 cmorgan <cmorgan47, at earthlink dooot net>
* Fixed Debian bug 271287 (flawfinder).
Fixed skipping newlines when line ended with \,
which caused incorrect line number reporting.
Skip multiple whitespace at one time.

2007-01-15 David A. Wheeler <dwheeler, at, dwheeler.com>
* Modified Sebastien Tandel's code so that it also supports GNU diff
(his code worked only for svn diff)
* When using a patchfile, skip analysis of any file not
listed in the patchfile.

2007-01-15 Sebastien Tandel <sebastien, at, tandel (doht) be)
* Add support for using "svn diff" created patch files, based
on the approach described by David A. Wheeler on how it
could be done.

2007-01-15 David A. Wheeler <dwheeler, at, dwheeler.com>
* By default, now skips directories beginning with "."
(this makes it work nicely with many SCM systems).
Added "--followdotdir" option if you WANT it to enter
such directories.
* Fixed divide-by-zero when no code found (not exactly common
in normal use, but anyway!)
2007-01-17 21:48:25 +00:00
rillig
5acfb0b6ca Renamed BUILDLINK_TRANSFORM.* to BUILDLINK_FNAME_TRANSFORM.*, to make
clear that these variables are completely unrelated to
BUILDLINK_TRANSFORM.

Added a legacy check that catches appearances of BUILDLINK_TRANSFORM.*.

XXX: Where should incompatible changes in pkgsrc be documented?
2007-01-17 03:11:18 +00:00
tonio
7f09f334fa Update security/caff to 0.4.9
Changelog:
 * caff:
   + Fix a bug with checking if we have exactly one or more keys that failed
     downloading.
   + Mention in manpage that keyserver-options is a useful setting in
     .caff/gnupghome/gpg.conf (Closes: #392811).
   + q-p-encode From: header (Closes: #366745).
2007-01-15 21:34:43 +00:00
joerg
69f4c52818 Modular Xorg support. 2007-01-15 16:21:55 +00:00
tonio
1a501ca010 Added ocaml-ssl 0.4.0 2007-01-15 14:22:26 +00:00
tonio
b492218538 Import ocaml-ssl 0.4.0 into pkgsrc:
ocaml-ssl is a library of OCaml bindings for libssl.
Package provided by Jaap Boender in PR pkg/35212
2007-01-15 14:21:10 +00:00
taca
005faebc10 Update pam-ldap to 183.
- Fix miscellaneous pkglint warnings.
- Fix security problem; CAN-2006-5170.

$Id: ChangeLog,v 1.212 2006/10/05 23:23:52 lukeh Exp $
===============================================================

183	Luke Howard <lukeh@padl.com>

	* fix for BUG#291: don't suppress password policy
	  errors which should not be suppressed

182	Luke Howard <lukeh@padl.com>

	* fix for BUG#269: compile time error in call to
	  ldap_sasl_interactive_bind_s()

181	Luke Howard <lukeh@padl.com>

	* fix for BUG#256: don't send password policy request
	  control if pam_lookup_policy no specified
	* fix for BUG#254: check gethostbyname() result
	* fix for BUG#237: typo in ldap_get_lderrno()
	  implementation
	* fix for BUG#207: if ldap_start_tls_s() fails
	  return PAM_AUTHINFO_UNAVAIL
	* fix for BUG#261: sslpath example wrong
	* fix for BUG#268: POLICY_ERROR_CHANGE_AFTER_RESET
	  should be handled as POLICY_ERROR_PASSWORD_EXPIRED,
	  other password policy errors to be treated as fatal
2007-01-15 03:24:03 +00:00
martti
920703277a Updated security/keychain to 2.6.8
* keychain 2.6.8 (24 Oct 2006)

  Save LC_ALL for gpg invocation so that pinentry-curses works.  This affected
  peper and kloeri, though it seems to work for me in any case.

* keychain 2.6.7 (24 Oct 2006)

  Prevent gpg_listmissing from accidentally loading keys
2007-01-14 08:32:32 +00:00
schmonz
35f2439c2d Update to 4.20. From the changelog:
Version 4.20, 2006.11.30, urgency: MEDIUM:
* Release notes
  - The new transfer() function has been well tested.
    I recommend upgrading any previous version with this one.
* Bugfixes
  - Fixed support for encrypted passphases (broken in 4.19).
  - Reduced amount of debug logs.
  - A minor man page update.

Version 4.19, 2006.11.11, urgency: LOW/EXPERIMENTAL:
* Release notes
  - There are a lot of new features in this version.  I recommend
    to test it well before upgrading your mission-critical systems.
* New features
  - New service-level option to specify OCSP server flag:
    OCSPflag = <flag>
  - "protocolCredentials" option changed to "protocolUsername"
    and "protocolPassword"
  - NTLM support to be enabled with the new service-level option:
    protocolAuthentication = NTLM
  - imap protocol negotiation support added.
  - Passphrase cache was added so the user does not need to reenter
    the same passphrase for each defined service any more.
  - New service-level option to retry connect+exec section:
    retry = yes|no
  - Local IP and port is logged for each established connection.
  - Win32 DLLs for OpenSSL 0.9.8d.
* Bugfixes
  - Serious problem with SSL_WANT_* retries fixed.
    The new code requires extensive testing!

Version 4.18, 2006.09.26, urgency: MEDIUM:
* Bugfixes
  - GPF on entering private key pass phrase on Win32 fixed.
  - Updated OpenSSL Win32 DLLs.
  - Minor configure script update.

Version 4.17, 2006.09.10, urgency: MEDIUM:
* New features
  - Win32 DLLs for OpenSSL 0.9.8c.
* Bugfixes
  - Problem with detecting getaddrinfo() in ./configure fixed.
  - Compilation problem due to misplaced #endif in ssl.c fixed.
  - Duplicate 220 in smtp_server() function in protocol.c fixed.
  - Minor os2.mak update.
  - Minor update of safestring()/safename() macros.

Version 4.16, 2006.08.31, urgency: MEDIUM:
* New features sponsored by Hewlett-Packard
  - A new global option to control engine:
    engineCtrl = <command>[:<parameter>]
  - A new service-level option to select engine to read private key:
    engineNum = <engine number>
  - OCSP support:
    ocsp = <URL>
* New features
  - A new option to select version of SSL protocol:
    sslVersion = all|SSLv2|SSLv3|TLSv1
  - Visual Studio vc.mak by David Gillingham <dgillingham@gmail.com>.
  - OS2 support by Paul Smedley (http://smedley.info)
* Bugfixes
  - An ordinary user can install stunnel again.
  - Compilation problem with --enable-dh fixed.
  - Some minor compilation warnings fixed.
  - Service-level CRL cert store implemented.
  - GPF on protocol negotiations fixed.
  - Problem detecting addrinfo() on Tru64 fixed.
  - Default group is now detected by configure script.
  - Check for maximum number of defined services added.
  - OpenSSL_add_all_algorithms() added to SSL initialization.
  - configure script sections reordered to detect pthread library funcions.
  - RFC 2487 autdoetection improved.  High resolution s_poll_wait()
    not currently supported by UCONTEXT threading.
  - More precise description of cert directory file names (thx to Muhammad
    Muquit).
* Other changes
  - Maximum number of services increased from 64 to 256 when poll() is used.
2007-01-14 00:07:15 +00:00
adrianp
a4ea706090 Give up maintainership as I don't use this anymore. 2007-01-13 00:56:54 +00:00
joerg
2f6e8dc768 Modular Xorg support. 2007-01-13 00:16:40 +00:00
minskim
162b528f42 Make this package build on Darwin. Patch from Darwinports.
This fixes PR 35400.
2007-01-11 00:02:53 +00:00
drochner
dd526ea1bc +pam-pwauth_suid 2007-01-08 18:41:37 +00:00
drochner
09db3d2bc4 add a PAM module which used a suid helper program to access the passwd
database, for use by unprivileged users to verify their own password
(in particular for screen savers)
thanks to many people for comments
2007-01-08 18:39:44 +00:00
obache
38980f4d8a +pam-af 2007-01-08 06:33:49 +00:00
obache
88a2c34ea0 Import pam_af version 1.0.1.
pam_af is a simple anti-bruteforce PAM module for authentification
services. It can be used to prevent brute-force attacks on services
like SSH or Telnet.
2007-01-08 05:49:01 +00:00
rillig
2829e658f2 Mechanically replaced man/* with ${PKGMANDIR}/* in the definition of
INSTALLATION_DIRS, as well as all occurrences of ${PREFIX}/man with
${PREFIX}/${PKGMANDIR}.

Fixes PR 35265, although I did not use the patch provided therein.
2007-01-07 09:13:46 +00:00
rillig
b4dab364f0 Updated MyPasswordSafe to 20061216.
Changes unknown. The homepage seems to come directly from the year 2004.
2007-01-06 19:06:22 +00:00
minskim
7b216e9ea3 Declare functions before using them to avoid wrong guess. 2007-01-03 03:31:54 +00:00
minskim
f4ef2de2b0 Correct the path to dinode.h on Darwin. 2007-01-03 03:26:31 +00:00
minskim
cf15737f9a Explicitly specify where to find openssl. Otherwise, the configure script
fails to detect native openssl on Darwin.
2007-01-03 03:06:13 +00:00
joerg
d26cf36e57 - fine grained X11 dependencies for packages which have either USE_IMAKE
or USE_X11BASE set, but don't include mk/x11.buildlink3.mk directly or
  via buildlink3.mks
- introduce BUILDLINK_PREFIX.libXpm as alias for BUILDLINK_PREFIX.xpm
  in the !modular case
- fix some cases where the check for libX11 couldn't work at all by using
  C++ for compilation without including the proper headers

Verified using a full X11_TYPE=xorg bulk build without additional
breakage. Discussed with salo@, wiz@ and send to packages@ for feedback.
2006-12-27 13:37:35 +00:00
wiz
b83bdcb59e regen. 2006-12-23 09:35:01 +00:00