Commit graph

4942 commits

Author SHA1 Message Date
adrianp
62dc1a63e1 +php-suhosin 2009-02-17 23:17:08 +00:00
adrianp
0f8ce7903d Suhosin is an advanced protection system for PHP installations. It was designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core. Suhosin comes in two independent parts, that can be used separately or in combination. The first part is a small patch against the PHP core, that implements a few low-level protections against bufferoverflows or format string vulnerabilities and the second part is a powerful PHP extension that implements all the other protections. 2009-02-17 23:16:14 +00:00
joerg
f2f2af60fe Retire gpgme03. 2009-02-17 13:17:10 +00:00
joerg
1f9d754f97 Reset maintainer, mail bounced 2009-02-17 13:02:20 +00:00
joerg
1d5cc86ec3 DESTDIR support 2009-02-16 18:44:40 +00:00
joerg
d75498d8da Fix DESTDIR installation. 2009-02-16 16:42:38 +00:00
tonnerre
35c1f0a284 +pam-mkhomedir 2009-02-15 20:33:49 +00:00
tonnerre
e45d0a42d1 Initial import of the mkhomedir PAM module.
The pam_mkhomedir module provides the means for automatic creation of
home directories upon login, if necessary. Key Benefits are:

 * Uses the Pluggable Authentication Module API defined in OSF DCE RFC 86.0.
 * Removes the need to pre-create user home directories.

The software is distributed under the terms of the 2.5-clause BSD license.
2009-02-15 20:16:08 +00:00
tonnerre
8f5ceece1e Initial import of the mkhomedir PAM module.
The pam_mkhomedir module provides the means for automatic creation of
home directories upon login, if necessary. Key Benefits are:

 * Uses the Pluggable Authentication Module API defined in OSF DCE RFC 86.0.
 * Removes the need to pre-create user home directories.

The software is distributed under the terms of the 2.5-clause BSD license.
2009-02-15 14:08:53 +00:00
tonnerre
3042c9c631 Initial import of the mkhomedir PAM module.
The pam_mkhomedir module provides the means for automatic creation of
home directories upon login, if necessary. Key Benefits are:

 * Uses the Pluggable Authentication Module API defined in OSF DCE RFC 86.0.
 * Removes the need to pre-create user home directories.

The software is distributed under the terms of the 2.5-clause BSD license.
2009-02-15 13:21:52 +00:00
taca
73de9ffc0e Enable DESTDIR support and sort PLIST.
(No other functional change.)
2009-02-15 03:27:56 +00:00
tonnerre
1d871bb1f4 The LDAP feature of sudo now also needs the SASL libraries to compile. 2009-02-14 19:30:33 +00:00
joerg
19df0f2ffa Supports DESTDIR. 2009-02-12 17:33:51 +00:00
joerg
3abd2d8fbf Don't use text relocations, link against shared libcrypto.
DESTDIR support. Simplify. Bump revision.
2009-02-11 23:25:59 +00:00
abs
7303ba167b Updated security/msudir to 0.15
move to code.google
PKG_DESTDIR_SUPPORT=    destdir
2009-02-11 23:19:01 +00:00
abs
b7970cd47e fix distinfo 2009-02-11 22:45:58 +00:00
joerg
2070411a90 DESTDIR support. 2009-02-10 21:11:13 +00:00
joerg
87ad0f4320 DESTDIR support 2009-02-10 16:39:40 +00:00
abs
fccea4281f Updated security/msu to 1.09
Enable PKG_DESTDIR_SUPPORT=destdir
Move source to code.google
2009-02-10 13:09:35 +00:00
joerg
6bf251943f DESTDIR support. 2009-02-09 23:53:00 +00:00
joerg
3c645bb7fc Switch to Python 2.5 as default. Bump revision of all packages that have
changed runtime dependencies now.
2009-02-09 22:56:21 +00:00
joerg
e2107c85f6 Remove Python 2.1 support. 2009-02-09 21:09:20 +00:00
taca
ff4641fd17 Update security/sudo package to 1.7.0.
* pkgsrc change: relax restriction to kerberos package.


What's new in Sudo 1.7.0?

 * Rewritten parser that converts sudoers into a set of data structures.
   This eliminates a number of ordering issues and makes it possible to
   apply sudoers Defaults entries before searching for the command.
   It also adds support for per-command Defaults specifications.

 * Sudoers now supports a #include facility to allow the inclusion of other
   sudoers-format files.

 * Sudo's -l (list) flag has been enhanced:
    o applicable Defaults options are now listed
    o a command argument can be specified for testing whether a user
      may run a specific command.
    o a new -U flag can be used in conjunction with "sudo -l" to allow
      root (or a user with "sudo ALL") list another user's privileges.

 * A new -g flag has been added to allow the user to specify a
   primary group to run the command as.  The sudoers syntax has been
   extended to include a group section in the Runas specification.

 * A uid may now be used anywhere a username is valid.

 * The "secure_path" run-time Defaults option has been restored.

 * Password and group data is now cached for fast lookups.

 * The file descriptor at which sudo starts closing all open files is now
   configurable via sudoers and, optionally, the command line.

 * Visudo will now warn about aliases that are defined but not used.

 * The -i and -s command line flags now take an optional command
   to be run via the shell.  Previously, the argument was passed
   to the shell as a script to run.

 * Improved LDAP support.  SASL authentication may now be used in
   conjunction when connecting to an LDAP server.  The krb5_ccname
   parameter in ldap.conf may be used to enable Kerberos.

 * Support for /etc/nsswitch.conf.  LDAP users may now use nsswitch.conf
   to specify the sudoers order.  E.g.:
	sudoers: ldap files
   to check LDAP, then /etc/sudoers.  The default is "files", even
   when LDAP support is compiled in.  This differs from sudo 1.6
   where LDAP was always consulted first.

 * Support for /etc/environment on AIX and Linux.  If sudo is run
   with the -i flag, the contents of /etc/environment are used to
   populate the new environment that is passed to the command being
   run.

 * If no terminal is available or if the new -A flag is specified,
   sudo will use a helper program to read the password if one is
   configured.  Typically, this is a graphical password prompter
   such as ssh-askpass.

 * A new Defaults option, "mailfrom" that sets the value of the
   "From:" field in the warning/error mail.  If unspecified, the
   login name of the invoking user is used.

 * A new Defaults option, "env_file" that refers to a file containing
   environment variables to be set in the command being run.

 * A new flag, -n, may be used to indicate that sudo should not
   prompt the user for a password and, instead, exit with an error
   if authentication is required.

 * If sudo needs to prompt for a password and it is unable to disable
   echo (and no askpass program is defined), it will refuse to run
   unless the "visiblepw" Defaults option has been specified.

 * Prior to version 1.7.0, hitting enter/return at the Password: prompt
   would exit sudo.  In sudo 1.7.0 and beyond, this is treated as
   an empty password.  To exit sudo, the user must press ^C or ^D
   at the prompt.

 * visudo will now check the sudoers file owner and mode in -c (check)
   mode when the -s (strict) flag is specified.
2009-02-05 13:48:12 +00:00
tron
ea71974691 Fix build under Mac OS X:
The GNU library ends up being empty and "ar" complains if you try to create
an archive. Simply skip the directory during the build to avoid this.
2009-02-02 11:58:47 +00:00
shattered
bcb98e3257 heimdal leaves empty directories after deinstallation, fix that.
OK by wiz@.
2009-02-01 21:39:43 +00:00
adam
fac4d52596 Changes 1.8:
* Fix crlf self-test under Mingw+Wine.
* Fix build problems on platforms that lack stdint.h.
2009-01-31 08:58:55 +00:00
adam
6c385f5ff3 Changes 1.4.4:
* Publish GCRY_MODULE_ID_USER and GCRY_MODULE_ID_USER_LAST constants.
  This functionality has been in Libgcrypt since 1.3.0.
* MD5 may now be used in non-enforced fips mode.
* Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes.
* In fips mode, RSA keys are now generated using the X9.31 algorithm
  and DSA keys using the FIPS 186-2 algorithm.
* The transient-key flag is now also supported for DSA key
  generation.  DSA domain parameters may be given as well.
2009-01-31 08:53:14 +00:00
joerg
82874648cf Fix installation. 2009-01-29 17:11:25 +00:00
joerg
4d090be8d2 Needs libtool. 2009-01-29 16:54:17 +00:00
markd
5ba7d247a2 Update to qca 2.0.1
- Bugfix release, forward and backward compatible with 2.0.0
  - Ability to build as a Mac framework (and build this way by default)
  - On non-Mac Unix, the pkgconfig file is always qca2.pc, even in debug
    mode
  - Certificates containing wildcards are now matched properly
  - DirWatch/FileWatch now work
  - Keystore writes now work
  - Don't delete objects in their event handler (prevents Qt 4.4 warnings)
  - Fix potential hang with TLS in server mode
  - Windows version can be configured/installed using paths with spaces
2009-01-27 11:10:46 +00:00
jschauma
65e9c90d89 Give up maintainership, as I have not so much as looked at pkgsrc in
well over a year now.  Sorry. :-(
2009-01-23 21:14:16 +00:00
obache
1726335b5f Also need to take care of md5 for Solaris, PR 40434. 2009-01-20 14:48:56 +00:00
sketch
77f91ca050 The Solaris support in this package only works on OpenSolaris. Allow it to
build (although likely not work) on Solaris too.
2009-01-20 10:08:17 +00:00
seb
8e4ba347bb Update from version 2.12 to version 2.12nb1.
Pkgsrc changes:
- Register required dependency on package security/p5-Digest-HMAC
2009-01-20 06:24:03 +00:00
obache
867afc2eb6 Solaris's md4.h and sha1.h are not good enough for this package,
and MD5_* is in libmd5.
Fixes build failure reported by PR 40434.
2009-01-19 12:00:03 +00:00
ahoka
05ae0e14e9 security/39313 strikes again
Do a workaround here too.
2009-01-11 20:32:18 +00:00
he
e404323ce0 Update from version 2.11nb1 to 2.12.
Upstream changes:

Authen-SASL 2.12 -- Mon Jun 30 21:35:21 CDT 2008

Enhancements
  * GSSAPI implement protocol according to RFC, but by default,
    remain compatible with cyrus sasl lib
  * DIGEST-MD5 implement channel encryption layer
2009-01-11 14:30:08 +00:00
manu
24c4fb7253 From Sergey Svishchev <svs@ropnet.ru>: ipsec-tools builds fine on FreeBSD 2009-01-10 17:13:01 +00:00
rillig
19abf88cc9 Fixed pkglint warnings about sorting SUBDIR. 2009-01-09 19:34:44 +00:00
tnn
1157e16862 Update to openssl-0.9.8j. Fixes CVE-2008-5077.
Changes between 0.9.8i and 0.9.8j  [07 Jan 2009]
*) Properly check EVP_VerifyFinal() and similar return values
   (CVE-2008-5077).
*) Allow the CHIL engine to be loaded, whether the application is
   multithreaded or not. (This does not release the developer from the
   obligation to set up the dynamic locking callbacks.)
*) Use correct exit code if there is an error in dgst command.
*) Tweak Configure so that you need to say "experimental-jpake" to enable
   JPAKE, and need to use -DOPENSSL_EXPERIMENTAL_JPAKE in applications.
*) Add experimental JPAKE support, including demo authentication in
   s_client and s_server.
*) Set the comparison function in v3_addr_canonize().
*) Add support for XMPP STARTTLS in s_client.
*) Change the server-side SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG behavior
   to ensure that even with this option, only ciphersuites in the
   server's preference list will be accepted.  (Note that the option
   applies only when resuming a session, so the earlier behavior was
   just about the algorithm choice for symmetric cryptography.)

Changes between 0.9.8h and 0.9.8i  [15 Sep 2008]
*) Fix a state transitition in s3_srvr.c and d1_srvr.c
   (was using SSL3_ST_CW_CLNT_HELLO_B, should be ..._ST_SW_SRVR_...).
*) The fix in 0.9.8c that supposedly got rid of unsafe
   double-checked locking was incomplete for RSA blinding,
   addressing just one layer of what turns out to have been
   doubly unsafe triple-checked locking.
   So now fix this for real by retiring the MONT_HELPER macro
   in crypto/rsa/rsa_eay.c.
*) Various precautionary measures:
   - Avoid size_t integer overflow in HASH_UPDATE (md32_common.h).
   - Avoid a buffer overflow in d2i_SSL_SESSION() (ssl_asn1.c).
     (NB: This would require knowledge of the secret session ticket key
     to exploit, in which case you'd be SOL either way.)
   - Change bn_nist.c so that it will properly handle input BIGNUMs
     outside the expected range.
   - Enforce the 'num' check in BN_div() (bn_div.c) for non-BN_DEBUG
     builds.
*) Allow engines to be "soft loaded" - i.e. optionally don't die if
   the load fails. Useful for distros.
*) Add support for Local Machine Keyset attribute in PKCS#12 files.
*) Fix BN_GF2m_mod_arr() top-bit cleanup code.
*) Expand ENGINE to support engine supplied SSL client certificate functions.
   This work was sponsored by Logica.
*) Add CryptoAPI ENGINE to support use of RSA and DSA keys held in Windows
   keystores. Support for SSL/TLS client authentication too.
   Not compiled unless enable-capieng specified to Configure.
   This work was sponsored by Logica.
*) Fix bug in X509_ATTRIBUTE creation: dont set attribute using
   ASN1_TYPE_set1 if MBSTRING flag set. This bug would crash certain
   attribute creation routines such as certifcate requests and PKCS#12
   files.
2009-01-08 16:38:22 +00:00
tonnerre
8883df8908 Despite the fact that various Python modules do have buildlink files,
according to Joerg this behavior is wrong. Remove this one again.
2009-01-07 23:00:26 +00:00
tonnerre
7da5df70b0 Add buildlink3.mk file to py-OpenSSL extension so it can be referenced in
other packages.
2009-01-07 22:27:48 +00:00
wiz
777af89dac Update to 1.19:
v1.19 2008.12.31
- fix verfycn_name autodetection from PeerAddr/PeerHost
2009-01-07 12:41:50 +00:00
wiz
55fa90af5f Move scrollkeeper/omf.mk to rarian/omf.mk.
scrollkeeper is nowadays included in rarian, so the omf.mk file should
be there as well.
Adapt all references.
2009-01-04 18:00:58 +00:00
adrianp
3d34fb2c47 +openvas-* 2009-01-04 01:13:55 +00:00
adrianp
be52ce7665 OpenVAS stands for Open Vulnerability Assessment System and is a
network security scanner with associated tools like a graphical
user front-end. The core component is a server with a set of network
vulnerability tests (NVTs) to detect security problems in remote
systems and applications.
2009-01-04 01:08:52 +00:00
obache
b2ce73ffc8 Update amavisd-new to 2.6.2, maintainer update request by PR 40303.
amavisd-new-2.6.2 release notes

MAIN NEW FEATURES SUMMARY

- bounce killer: improved detection of nonstandard bounces;
- bounces to be killed no longer waste SpamAssassin time;
- tool to convert dkim-filter keysfile into amavisd configuration;
- compatibility with SpamAssassin 3.3 (CVS head) regained;
- rewritten and expanded documentation section on DKIM signing and
  verification in amavisd-new-docs.html;

COMPATIBILITY WITH 2.6.1

- apart from small differences in logging and notifications, the
  version 2.6.2 is compatible with 2.6.1, with its configuration file
  and its environment;

- virus scanner entries were updated (as described below, most notably by
  adding a regexp flag m), so be sure to update existing configuration file;
  updated virus scanner entries can be used with 2.6.1 too;

- the %sql_clause default has changed in detail (see below), if its value
  is overridden in a configuration file the setting may need updating;

See full release notes:

http://www.ijs.si/software/amavisd/release-notes.txt
2009-01-01 14:30:02 +00:00
stacktic
85ceaf1037 Fixed build (removed whirlpool) (ok by wiz) 2008-12-30 15:13:28 +00:00
taca
05d38d24bc This package isn't JOBS_SAFE. 2008-12-21 15:20:27 +00:00
jmcneill
31b608fb35 PR# pkg/40146: security/policykit fails to build on Linux 2008-12-21 13:57:29 +00:00