Commit graph

7382 commits

Author SHA1 Message Date
szptvlfn
9da944d0cd make it clear what package depend on
discussed with wiz@.
2014-08-29 14:08:38 +00:00
richard
e782488d6e reinstate patch-configure as upstream patch not yet in [1.6.2] release.
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commitdiff;h=43376891c01f4aff1fbfb23beafebb5adfd0868c
revbump to pick it up.
2014-08-29 10:29:14 +00:00
tez
cc60b78017 Add fixes for CVE-2014-4341, CVE-2014-4342 (same patch as CVE-2014-4341)
CVE-2014-4343, CVE-2014-4344 & MITKRB5-SA-2014-001 (CVE-2014-4345).
2014-08-28 22:23:05 +00:00
jperkin
f8e8e664c9 Explicitly disable SSSE3 support on SunOS, it doesn't build. 2014-08-28 13:38:29 +00:00
wiz
aa4f49bf6c Add missing dependency on p5-Clone. Bump PKGREVISION. 2014-08-28 08:47:52 +00:00
joerg
bceed63ce7 Recent qmake changes result in installation of additional tool.
Bump revision.
2014-08-26 20:59:40 +00:00
wiz
96f78a689a Update to 0.5.4:
0.5.4 - 2014-08-20
~~~~~~~~~~~~~~~~~~

* Added several functions to the OpenSSL bindings to support new
  functionality in pyOpenSSL.
* Fixed a redefined constant causing compilation failure with Solaris 11.2.
2014-08-25 18:37:18 +00:00
mlelstv
6c6af783d9 Update certs to more recent version. The License changed to MPL 2.0. 2014-08-25 08:34:44 +00:00
wiz
ae075e6d55 Bump PKGREVISION for ilmbase shlib major bump. 2014-08-22 11:24:25 +00:00
wiz
2e9add9638 Remove patch that was already included upstream.
See
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commitdiff;h=43376891c01f4aff1fbfb23beafebb5adfd0868c
2014-08-21 21:04:15 +00:00
wiz
39c466ebee Update to 1.4.4. Remove obsolete configure args.
Noteworthy changes in version 1.4.4 (2014-07-30) [C22/A11/R1]
-------------------------------------------------------------

 Backported from 1.5.1:

 * Fixed possible overflow in gpgsm and uiserver engines.
   [CVE-2014-3564]

 * Fixed possibled segv in gpgme_op_card_edit.

 * Fixed minor memleaks and possible zombie processes.

 * Fixed prototype inconsistencies and void pointer arithmetic.


Noteworthy changes in version 1.4.3 (2013-08-12) [C22/A11/R0]
-------------------------------------------------------------

 * The default engine names are now taken from the output of gpgconf.
   If gpgconf is not found the use of gpg 1 is assumed.

 * Under Windows the default engines names are first searched in the
   installation directory of the gpgme DLL.

 * New function gpgme_data_identify to detect the type of a message.

 * Interface changes relative to the 1.4.2 release:
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 gpgme_signers_count            NEW.
 gpgme_data_type_t              NEW.
 gpgme_data_identify            NEW.


Noteworthy changes in version 1.4.2 (2013-05-28)
------------------------------------------------

 * Allow symmetric encryption with gpgme_op_encrypt_sign.

 * Fixed mismatching off_t definitions on Windows.

 * Interface changes relative to the 1.4.1 release:
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 gpgme_off_t                    NEW.
 gpgme_size_t                   NEW.
 GPGME_PROTOCOL_OPENPGP         NEW alias.
2014-08-21 20:40:58 +00:00
wiz
bde0ebf513 Add comments and upstream bug report URLs to patches. 2014-08-21 19:55:26 +00:00
wiz
dddade98c2 Update HOMEPAGE. 2014-08-21 19:55:08 +00:00
wiz
421719951a Update to 1.6.2. Add a comment to patch.
Noteworthy changes in version 1.6.2 (2014-08-21) [C20/A0/R2]
------------------------------------------------

 * Map deprecated RSA algo number to the RSA algo number for better
   backward compatibility.

 * Support a 0x40 compression prefix for EdDSA.

 * Improve ARM hardware feature detection and building.

 * Fix powerpc-apple-darwin detection

 * Fix building for the x32 ABI platform.

 * Support building using the latest mingw-w64 toolchain.

 * Fix some possible NULL deref bugs.
2014-08-21 19:41:38 +00:00
jperkin
9ff1af0fa3 Fix build on SunOS (needs explicit -lnsl -lresolv). 2014-08-21 16:26:20 +00:00
wiz
40fcfa905a Fix typo in previous. From PR 49131. 2014-08-21 15:48:52 +00:00
wiz
8465272e00 On AIX, openssl ignores $CC & defaults to using the aix-cc profile
& building with /usr/vac/bin/cc, add the necessary checks to Makefile
to use the correct profile depending on what CC/ABI is set to.

Patch from Sevan Janiyan in PR 49131, but moved a few lines to not
affect Darwin.
2014-08-21 08:02:56 +00:00
dbj
6930f98ad9 work around problematic sed/make quoting interaction 2014-08-21 04:47:29 +00:00
wiedi
d156c4bc92 change smf manifest to use startd/duration child, this prevents useless creation of pid files 2014-08-18 22:19:15 +00:00
szptvlfn
700b5a4364 + hs-digest 2014-08-18 21:20:08 +00:00
szptvlfn
4a2edc5ddf Import digest-0.0.1.2 as security/hs-digest,
packaged for wip by zecrazytux.

Haskell package providing efficient cryptographic hash implementations
for strict and lazy bytestrings.
For now, CRC32 and Adler32 are supported; they are
implemented as FFI bindings to efficient code from zlib.
2014-08-18 21:18:48 +00:00
wiz
4a13c1636c Update to 2.0.26:
Noteworthy changes in version 2.0.26 (2014-08-12)
-------------------------------------------------

 * gpg: Fix a regression in 2.0.24 if a subkey id is given
   to --recv-keys et al.

 * gpg: Cap attribute packets at 16MB.

 * gpgsm: Auto-create the ".gnupg" home directory in the same
   way gpg does.

 * scdaemon: Allow for certificates > 1024 when using PC/SC.
2014-08-16 12:14:28 +00:00
wiz
14978c911c gsed needed on OS X. Dependency small enough, add it to TOOLS.
PR 49111 by Youri Mouton.
2014-08-13 13:19:14 +00:00
adam
72ed0307eb Revbump after boost-libs update 2014-08-13 10:57:32 +00:00
schmonz
27d556302e Add and enable nacl. 2014-08-12 05:01:14 +00:00
schmonz
60347b6f73 Initial import of NaCl.
NaCl (pronounced "salt") is a new easy-to-use high-speed software
library for network communication, encryption, decryption, signatures,
etc. NaCl's goal is to provide all of the core operations needed
to build higher-level cryptographic tools.

Of course, other libraries already exist for these core operations.
NaCl advances the state of the art by improving security, by improving
usability, and by improving speed.
2014-08-12 05:00:34 +00:00
wiz
41c6d74597 Update to 5.03:
Version 5.03, 2014.08.07, urgency: HIGH:
* Security bugfixes
  - OpenSSL DLLs updated to version 1.0.1i.
    See https://www.openssl.org/news/secadv_20140806.txt
* New features
  - FIPS autoconfiguration cleanup.
  - FIPS canister updated to version 2.0.6.
  - Improved SNI diagnostic logging.
* Bugfixes
  - Compilation fixes for old versions of OpenSSL.
  - Fixed whitespace handling in the stunnel.init script.

Version 5.02, 2014.06.09, urgency: HIGH:
* Security bugfixes
  - OpenSSL DLLs updated to version 1.0.1h.
    See https://www.openssl.org/news/secadv_20140605.txt
* New features
  - Major rewrite of the protocol.c interface: it is now possible to add
    protocol negotiations at multiple connection phases, protocols can
    individually decide whether the remote connection will be
    established before or after SSL/TLS is negotiated.
  - Heap memory blocks are wiped before release.  This only works for
    block allocated by stunnel, and not by OpenSSL or other libraries.
  - The safe_memcmp() function implemented with execution time not
    dependent on the compared data.
  - Updated the stunnel.conf and stunnel.init templates.
  - Added a client-mode example to the manual.
* Bugfixes
  - Fixed "failover = rr" broken since version 5.00.
  - Fixed "taskbar = no" broken since version 5.00.
  - Compilation fix for missing SSL_OP_MSIE_SSLV2_RSA_PADDING option.
2014-08-10 14:54:12 +00:00
wiz
86a73bde4f Update to 0.5.3:
0.5.3 - 2014-08-06
~~~~~~~~~~~~~~~~~~

* Updated Windows wheels to be compiled against OpenSSL 1.0.1i.
2014-08-10 14:42:25 +00:00
wiz
f78434a2b8 Use 'mkdir -p' in case ${PREFIX}/etc doesn't exist yet. 2014-08-10 10:47:42 +00:00
tron
306456d39c Fix build under Mac OS X. 2014-08-10 09:06:48 +00:00
obache
c62adf2f13 Update openssl to 1.0.1i.
Changes between 1.0.1h and 1.0.1i [6 Aug 2014]

  *) Fix SRP buffer overrun vulnerability. Invalid parameters passed to the
     SRP code can be overrun an internal buffer. Add sanity check that
     g, A, B < N to SRP code.

     Thanks to Sean Devlin and Watson Ladd of Cryptography Services, NCC
     Group for discovering this issue.
     (CVE-2014-3512)
     [Steve Henson]

  *) A flaw in the OpenSSL SSL/TLS server code causes the server to negotiate
     TLS 1.0 instead of higher protocol versions when the ClientHello message
     is badly fragmented. This allows a man-in-the-middle attacker to force a
     downgrade to TLS 1.0 even if both the server and the client support a
     higher protocol version, by modifying the client's TLS records.

     Thanks to David Benjamin and Adam Langley (Google) for discovering and
     researching this issue.
     (CVE-2014-3511)
     [David Benjamin]

  *) OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject
     to a denial of service attack. A malicious server can crash the client
     with a null pointer dereference (read) by specifying an anonymous (EC)DH
     ciphersuite and sending carefully crafted handshake messages.

     Thanks to Felix Gröbert (Google) for discovering and researching this
     issue.
     (CVE-2014-3510)
     [Emilia Käsper]

  *) By sending carefully crafted DTLS packets an attacker could cause openssl
     to leak memory. This can be exploited through a Denial of Service attack.
     Thanks to Adam Langley for discovering and researching this issue.
     (CVE-2014-3507)
     [Adam Langley]

  *) An attacker can force openssl to consume large amounts of memory whilst
     processing DTLS handshake messages. This can be exploited through a
     Denial of Service attack.
     Thanks to Adam Langley for discovering and researching this issue.
     (CVE-2014-3506)
     [Adam Langley]

  *) An attacker can force an error condition which causes openssl to crash
     whilst processing DTLS packets due to memory being freed twice. This
     can be exploited through a Denial of Service attack.
     Thanks to Adam Langley and Wan-Teh Chang for discovering and researching
     this issue.
     (CVE-2014-3505)
     [Adam Langley]

  *) If a multithreaded client connects to a malicious server using a resumed
     session and the server sends an ec point format extension it could write
     up to 255 bytes to freed memory.

     Thanks to Gabor Tyukasz (LogMeIn Inc) for discovering and researching this
     issue.
     (CVE-2014-3509)
     [Gabor Tyukasz]

  *) A malicious server can crash an OpenSSL client with a null pointer
     dereference (read) by specifying an SRP ciphersuite even though it was not
     properly negotiated with the client. This can be exploited through a
     Denial of Service attack.

     Thanks to Joonas Kuorilehto and Riku Hietamäki (Codenomicon) for
     discovering and researching this issue.
     (CVE-2014-5139)
     [Steve Henson]

  *) A flaw in OBJ_obj2txt may cause pretty printing functions such as
     X509_name_oneline, X509_name_print_ex et al. to leak some information
     from the stack. Applications may be affected if they echo pretty printing
     output to the attacker.

     Thanks to Ivan Fratric (Google) for discovering this issue.
     (CVE-2014-3508)
     [Emilia Käsper, and Steve Henson]

  *) Fix ec_GFp_simple_points_make_affine (thus, EC_POINTs_mul etc.)
     for corner cases. (Certain input points at infinity could lead to
     bogus results, with non-infinity inputs mapped to infinity too.)
     [Bodo Moeller]
2014-08-07 01:29:45 +00:00
obache
85e8b5e02a netbsd-desktop@ is a retired list. 2014-08-06 12:21:02 +00:00
khorben
a10d76bf77 pev 0.60 was re-released with changes to the original archive 2014-08-06 11:07:30 +00:00
wiz
ad606e3f28 Update to 4.0:
---
4.0
---

* Removed ``keyring_path`` parameter from ``load_keyring``. See release notes
  for 3.0.3 for more details.
* Issue #22: Removed support for loading the config from the current
  directory. The config file must now be located in the platform-specific
  config location.
2014-08-05 19:22:42 +00:00
khorben
4bf67ebc1e Added security/pev 2014-08-02 14:12:56 +00:00
khorben
21df93147d Imported security/pev version 0.60 from wip
pev is a PE file analysis toolkit that includes some nice programs to work with
PE files in many systems. It can be useful for programmers, security analysts
and forensic investigators. It's licensed under GPLv3+ terms.
2014-08-02 14:11:08 +00:00
fhajny
bd10651ca6 Add runtime dependency on flex (in bin/compile_et). Bump PKGREVISION. 2014-07-30 11:05:04 +00:00
wiz
46df3236cf Update to 0.5.2:
0.5.2 - 2014-07-09
~~~~~~~~~~~~~~~~~~

* Add
  :class:`~cryptography.hazmat.backends.interfaces.TraditionalOpenSSLSerializationBackend`
  support to :doc:`/hazmat/backends/multibackend`.
* Fix compilation error on OS X 10.8 (Mountain Lion).

0.5.1 - 2014-07-07
~~~~~~~~~~~~~~~~~~

* Add
  :class:`~cryptography.hazmat.backends.interfaces.PKCS8SerializationBackend`
  support to :doc:`/hazmat/backends/multibackend`.

0.5 - 2014-07-07
~~~~~~~~~~~~~~~~

* **BACKWARDS INCOMPATIBLE:**
  :class:`~cryptography.hazmat.primitives.ciphers.modes.GCM` no longer allows
  truncation of tags by default. Previous versions of ``cryptography`` allowed
  tags to be truncated by default, applications wishing to preserve this
  behavior (not recommended) can pass the ``min_tag_length`` argument.
* Windows builds now statically link OpenSSL by default. When installing a
  wheel on Windows you no longer need to install OpenSSL separately. Windows
  users can switch between static and dynamic linking with an environment
  variable. See :doc:`/installation` for more details.
* Added :class:`~cryptography.hazmat.primitives.kdf.hkdf.HKDFExpand`.
* Added :class:`~cryptography.hazmat.primitives.ciphers.modes.CFB8` support
  for :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES` and
  :class:`~cryptography.hazmat.primitives.ciphers.algorithms.TripleDES` on
  :doc:`/hazmat/backends/commoncrypto` and :doc:`/hazmat/backends/openssl`.
* Added ``AES`` :class:`~cryptography.hazmat.primitives.ciphers.modes.CTR`
  support to the OpenSSL backend when linked against 0.9.8.
* Added
  :class:`~cryptography.hazmat.backends.interfaces.PKCS8SerializationBackend`
  and
  :class:`~cryptography.hazmat.backends.interfaces.TraditionalOpenSSLSerializationBackend`
  support to the :doc:`/hazmat/backends/openssl`.
* Added :doc:`/hazmat/primitives/asymmetric/ec` and
  :class:`~cryptography.hazmat.backends.interfaces.EllipticCurveBackend`.
* Added :class:`~cryptography.hazmat.primitives.ciphers.modes.ECB` support
  for :class:`~cryptography.hazmat.primitives.ciphers.algorithms.TripleDES` on
  :doc:`/hazmat/backends/commoncrypto` and :doc:`/hazmat/backends/openssl`.
* Deprecated :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey`
  in favor of backend specific providers of the
  :class:`~cryptography.hazmat.primitives.interfaces.RSAPrivateKey` interface.
* Deprecated :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey`
  in favor of backend specific providers of the
  :class:`~cryptography.hazmat.primitives.interfaces.RSAPublicKey` interface.
* Deprecated :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey`
  in favor of backend specific providers of the
  :class:`~cryptography.hazmat.primitives.interfaces.DSAPrivateKey` interface.
* Deprecated :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey`
  in favor of backend specific providers of the
  :class:`~cryptography.hazmat.primitives.interfaces.DSAPublicKey` interface.
* Deprecated :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAParameters`
  in favor of backend specific providers of the
  :class:`~cryptography.hazmat.primitives.interfaces.DSAParameters` interface.
* Deprecated ``encrypt_rsa``, ``decrypt_rsa``, ``create_rsa_signature_ctx`` and
  ``create_rsa_verification_ctx`` on
  :class:`~cryptography.hazmat.backends.interfaces.RSABackend`.
* Deprecated ``create_dsa_signature_ctx`` and ``create_dsa_verification_ctx``
  on :class:`~cryptography.hazmat.backends.interfaces.DSABackend`.
2014-07-29 11:51:36 +00:00
jperkin
2bb27de2fa Darwin doesn't build sudo_noexec.so, patch from Sevan Janiyan. 2014-07-28 20:07:42 +00:00
fhajny
a5a191ac1c This package is still useful on SunOS, as it provides more functionality
compared to the one shipped with the platform. Enable for SunOS, but disable
the INSTALL/DEINSTALL symlinks. Bump PKGREVISION.
2014-07-28 18:23:39 +00:00
wiz
2324d44072 Fix overlooked option name for previous.
Found by jperkin.
2014-07-28 11:02:11 +00:00
tron
d79b29792b Improve default options for SSHGuard. "-f 100:/var/run/sshd.pid" in
particular affects the detection rate badly.

Bump package revision.
2014-07-27 08:32:06 +00:00
tron
799ebd6a2c Add and enable "sshguard" package. 2014-07-26 19:57:59 +00:00
tron
9e9a7fc8f9 Add new "sshguard" package:
Sshguard is a small program that monitors services running on your
machine from the log files. When it detects that someone is doing
something bad to a service, sshguard blocks the IP address of the bad
guy with a firewall rule.

Sshguard was started in 2006 to mitigate the growing brute force
attacks to SSH servers. Because of the generality of its infrastructure,
however, it was soon extended to monitor and protect more and more services.
2014-07-26 19:57:44 +00:00
jperkin
18b7f8f21e Don't override LDFLAGS, fixes check-shlibs. 2014-07-25 16:21:26 +00:00
jperkin
5890faf951 Make sure RPATH to libcrypto is added, fixes check-shlibs-elf. 2014-07-24 21:21:09 +00:00
hiramatsu
586a3fe5af Update security/p5-String-Random to 0.26.
Changes from previous:
----------------------
0.26   Fri Jan 31 2014
- LICENSE section and file (CPANTS).
- Minimum version of perl in Build.PL / META.yml .

0.25   Fri Dec 27 2013
- Update the link to the version control repository.

0.24   Tue Dec 03 2013
- Add keywords and a link to he repository to Build.PL / META.yml.

0.23   Tue Dec 03 2013
- Add t/style-trailing-space.t .
- Update the POD in lib/String/Random.pm .
- Add t/pod.t .
- Convert Build.PL to Test::Run::Builder.
- Hopefully fix https://rt.cpan.org/Public/Bug/Display.html?id=86894
    - Bug #86894 for String-Random: Spurious warnings
2014-07-23 06:30:48 +00:00
wiz
edbf61ee18 Update to 2.0.25. Rename gpgsm option to gnupg2-gpgsm.
Noteworthy changes in version 2.0.25 (2014-06-30)
-------------------------------------------------

 * gpg: Fix a regression in 2.0.24 if more than one keyid is given
   to --recv-keys et al.

 * gpg: Cap RSA and Elgamal keysize at 4096 bit also for unattended
   key generation.

 * gpgsm: Fix a DISPLAY related problem with --export-secret-key-p12.

 * scdaemon: Support reader Gemalto IDBridge CT30.
2014-07-22 11:30:00 +00:00
wiz
7934c72e83 Update to 1.4.18:
Noteworthy changes in version 1.4.18 (2014-06-30)
-------------------------------------------------

 * Fix a regression in 1.4.17 if more than one keyid is given
   to --recv-keys et al.

 * Cap RSA and Elgamal keysize at 4096 bit also for unattended key
   generation.
2014-07-22 11:24:29 +00:00
wiz
a8bf36265a Update to 1.1.8.
New keyart binary (not installed)
documenation improvements.
2014-07-22 11:23:11 +00:00