Commit graph

4958 commits

Author SHA1 Message Date
plunky
a6dfbfac2a This is a simple PAM module which uses the fingerprint processing and
verification from libfprint for authentication instead of asking for
a password.
2009-02-26 21:52:00 +00:00
plunky
84a3e10fc4 libfprint is an open source software library designed to make it easy for
application developers to add support for consumer fingerprint readers to
their software.
2009-02-26 21:51:06 +00:00
hasso
805195b8cc + openct, opensc, opensc-signer 2009-02-26 11:06:55 +00:00
hasso
46698f3f26 Opensc signer plugin for Mozilla apps. 2009-02-26 10:51:02 +00:00
hasso
ba79afa667 OpenSC provides a set of libraries and utilities to access smart cards.
Its main focus is on cards that support cryptographic operations, and
facilitate their use in security applications such as mail encryption,
authentication, and digital signature. OpenSC implements the PKCS#11 API
so applications supporting this API such as Mozilla Firefox and Thunderbird
can use it. OpenSC implements the PKCS#15 standard and aims to be compatible
with every software that does so, too.
2009-02-26 10:50:05 +00:00
hasso
b8cae3d9a7 Drivers for several smart card readers. OpenCT comes as driver in ifdhandler
format for PC/SC-Lite, as CT-API driver, or as a small and lean middleware,
so applications can use it with minimal overhead. OpenCT also has a primitive
mechanism to export smart card readers to remote machines via TCP/IP.
2009-02-26 10:07:49 +00:00
sno
336c284e13 pkgsrc Changes:
Update dependency to security/p5-Net-SSLeay to 1.33 as notes in modules
META.yml

Upstream Changes:

v1.23 2009.02.23
- if neither SSL_ca_file nor SSL_ca_path are known (e.g not given and the
  default values have no existing file|path) disable checking of
  certificates, but carp about the problem
- new test certificates, the old ones expired and caused tests to fail
2009-02-25 20:33:12 +00:00
roy
e57abfce36 Add patches so that the home/end keys work on BSD servers as well as Linux 2009-02-25 18:08:01 +00:00
wiz
ae61ba2196 Drop maintainership. 2009-02-24 16:15:22 +00:00
adrianp
ee4afd012c Typo 2009-02-23 22:01:11 +00:00
wiz
6e26187f43 Update to 2.30:
Changes undocumented.
2009-02-22 16:09:33 +00:00
wiz
32fb3767be Update to 0.12:
0.12
Made Cyrus.xs more compatible with Perl API by changing function calls
like Perl_warn() to just warn(), and defining PERL_NO_GET_CONTEXT.
Made SASL properties which take an IP address and load it into the SASL
library more robust by determining if the passed address is in
"struct sockaddr" format or in "IP1.IP2.IP3.IP4;PORT" format.
Fixed passing of "function + params" as a callback.

0.11
Fixed t/callback.t to NOT try connecting to the LDAP server
on localhost since that, well, doesn't work at Pause.

0.10
Added better callback management, Perl memory management,
and three test scripts, as written by Ulrich Pfeifer.

0.09
Changed securesocket GLOB, as suggested by Marius Tomaschewski.
Extended SASL2 support.

0.08
Changed the "code" routine to return the result code of the
last SASL library call. This allows differentiation of the
result of the client_step returning a zero byte string vs.
it saying authentication is complete.
2009-02-22 16:06:38 +00:00
he
c146982c0e Update from version 1.33 to 1.34.
Pkgsrc changes:
 o Adjust dependencies according to module requirements (added p5-Crypt-IDEA)

Upstream changes:

1.34 2009.02.01

    - Rekey properly after 1 GB of data (rt.cpan.org #25044). Patch by
      Peter Oliver.
    - Don't try to process nonexistent or empty auth file (rt.cpan.org #41877).
    - Fix typo in croak message (rt.cpan.org #42056), thanks to
      jamie at audible.transient.net.
    - Move 'use base' call after Crypt module loading, per suggestion
      (rt.cpan.org #42051).
    - Only apply stdin if defined in SSH1 - John Payne (rt.cpan.org #42583)
2009-02-22 15:59:05 +00:00
wiz
44e0d982ae Update to 1.22:
v1.22 2009.01.24
- Net::SSLeay stores verify callbacks inside hash and never clears them, so
  set verify callback to NULL in destroy of context

v1.21 2009.01.22
- auto verification of name in certificate created circular reference between
  SSL and CTX object with the verify_callback, which caused the objects to be
  destroyed only at program end. Fix it be no longer access $self from inside
  the callback.
  Thanks to odenbach[AT]uni-paderborn[DOT]de for reporting

v1.20 2009.01.15
- only changes on test suite to make it ready for win32
  (tested with strawberry perl 5.8.8)
2009-02-21 14:02:08 +00:00
wiz
212cbcbac7 Update to 2.6.4:
* Version 2.6.4 (released 2009-02-06)

** libgnutls: Accept chains where intermediary certs are trusted.
Before GnuTLS needed to validate the entire chain back to a
self-signed certificate.  GnuTLS will now stop looking when it has
found an intermediary trusted certificate.  The new behaviour is
useful when chains, for example, contains a top-level CA, an
intermediary CA signed using RSA-MD5, and an end-entity certificate.
To avoid chain validation errors due to the RSA-MD5 cert, you can
explicitly add the intermediary RSA-MD5 cert to your trusted certs.
The signature on trusted certificates are not checked, so the chain
has a chance to validate correctly.  Reported by "Douglas E. Engert"
<deengert@anl.gov> in
<http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3351>.

** libgnutls: result_size in gnutls_hex_encode now holds
the size of the result. Report by John Brooks <special@dereferenced.net>.

** libgnutls: gnutls_handshake when sending client hello during a
rehandshake, will not offer a version number larger than the current.
Reported by Tristan Hill <stan@saticed.me.uk>.

** libgnutls: Permit V1 Certificate Authorities properly.
Before they were mistakenly rejected even though
GNUTLS_VERIFY_ALLOW_ANY_X509_V1_CA_CRT and/or
GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT were supplied.  Reported by
"Douglas E. Engert" <deengert@anl.gov> in
<http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3351>.

** libgnutls: deprecate X.509 validation chains using MD5 and MD2 signatures.
This is a bugfix -- the previous attempt to do this from internal x509
certificate verification procedures did not return the correct value
for certificates using a weak hash.  Reported by Daniel Kahn Gillmor
<dkg@fifthhorseman.net> in
<http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3332>,
debugged and patch by Tomas Mraz <tmraz@redhat.com> and Daniel Kahn
Gillmor <dkg@fifthhorseman.net>.

** libgnutls: Fix compile error with Sun CC.
Reported by Jeff Cai <jeff.cai@sun.com> in
<https://savannah.gnu.org/support/?106549>.
2009-02-21 13:45:31 +00:00
adrianp
97e08aa14b Some initial work on getting this going on OpenSolaris
It's currently still broken but this is a (small) start
2009-02-21 00:06:52 +00:00
adrianp
62dc1a63e1 +php-suhosin 2009-02-17 23:17:08 +00:00
adrianp
0f8ce7903d Suhosin is an advanced protection system for PHP installations. It was designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core. Suhosin comes in two independent parts, that can be used separately or in combination. The first part is a small patch against the PHP core, that implements a few low-level protections against bufferoverflows or format string vulnerabilities and the second part is a powerful PHP extension that implements all the other protections. 2009-02-17 23:16:14 +00:00
joerg
f2f2af60fe Retire gpgme03. 2009-02-17 13:17:10 +00:00
joerg
1f9d754f97 Reset maintainer, mail bounced 2009-02-17 13:02:20 +00:00
joerg
1d5cc86ec3 DESTDIR support 2009-02-16 18:44:40 +00:00
joerg
d75498d8da Fix DESTDIR installation. 2009-02-16 16:42:38 +00:00
tonnerre
35c1f0a284 +pam-mkhomedir 2009-02-15 20:33:49 +00:00
tonnerre
e45d0a42d1 Initial import of the mkhomedir PAM module.
The pam_mkhomedir module provides the means for automatic creation of
home directories upon login, if necessary. Key Benefits are:

 * Uses the Pluggable Authentication Module API defined in OSF DCE RFC 86.0.
 * Removes the need to pre-create user home directories.

The software is distributed under the terms of the 2.5-clause BSD license.
2009-02-15 20:16:08 +00:00
tonnerre
8f5ceece1e Initial import of the mkhomedir PAM module.
The pam_mkhomedir module provides the means for automatic creation of
home directories upon login, if necessary. Key Benefits are:

 * Uses the Pluggable Authentication Module API defined in OSF DCE RFC 86.0.
 * Removes the need to pre-create user home directories.

The software is distributed under the terms of the 2.5-clause BSD license.
2009-02-15 14:08:53 +00:00
tonnerre
3042c9c631 Initial import of the mkhomedir PAM module.
The pam_mkhomedir module provides the means for automatic creation of
home directories upon login, if necessary. Key Benefits are:

 * Uses the Pluggable Authentication Module API defined in OSF DCE RFC 86.0.
 * Removes the need to pre-create user home directories.

The software is distributed under the terms of the 2.5-clause BSD license.
2009-02-15 13:21:52 +00:00
taca
73de9ffc0e Enable DESTDIR support and sort PLIST.
(No other functional change.)
2009-02-15 03:27:56 +00:00
tonnerre
1d871bb1f4 The LDAP feature of sudo now also needs the SASL libraries to compile. 2009-02-14 19:30:33 +00:00
joerg
19df0f2ffa Supports DESTDIR. 2009-02-12 17:33:51 +00:00
joerg
3abd2d8fbf Don't use text relocations, link against shared libcrypto.
DESTDIR support. Simplify. Bump revision.
2009-02-11 23:25:59 +00:00
abs
7303ba167b Updated security/msudir to 0.15
move to code.google
PKG_DESTDIR_SUPPORT=    destdir
2009-02-11 23:19:01 +00:00
abs
b7970cd47e fix distinfo 2009-02-11 22:45:58 +00:00
joerg
2070411a90 DESTDIR support. 2009-02-10 21:11:13 +00:00
joerg
87ad0f4320 DESTDIR support 2009-02-10 16:39:40 +00:00
abs
fccea4281f Updated security/msu to 1.09
Enable PKG_DESTDIR_SUPPORT=destdir
Move source to code.google
2009-02-10 13:09:35 +00:00
joerg
6bf251943f DESTDIR support. 2009-02-09 23:53:00 +00:00
joerg
3c645bb7fc Switch to Python 2.5 as default. Bump revision of all packages that have
changed runtime dependencies now.
2009-02-09 22:56:21 +00:00
joerg
e2107c85f6 Remove Python 2.1 support. 2009-02-09 21:09:20 +00:00
taca
ff4641fd17 Update security/sudo package to 1.7.0.
* pkgsrc change: relax restriction to kerberos package.


What's new in Sudo 1.7.0?

 * Rewritten parser that converts sudoers into a set of data structures.
   This eliminates a number of ordering issues and makes it possible to
   apply sudoers Defaults entries before searching for the command.
   It also adds support for per-command Defaults specifications.

 * Sudoers now supports a #include facility to allow the inclusion of other
   sudoers-format files.

 * Sudo's -l (list) flag has been enhanced:
    o applicable Defaults options are now listed
    o a command argument can be specified for testing whether a user
      may run a specific command.
    o a new -U flag can be used in conjunction with "sudo -l" to allow
      root (or a user with "sudo ALL") list another user's privileges.

 * A new -g flag has been added to allow the user to specify a
   primary group to run the command as.  The sudoers syntax has been
   extended to include a group section in the Runas specification.

 * A uid may now be used anywhere a username is valid.

 * The "secure_path" run-time Defaults option has been restored.

 * Password and group data is now cached for fast lookups.

 * The file descriptor at which sudo starts closing all open files is now
   configurable via sudoers and, optionally, the command line.

 * Visudo will now warn about aliases that are defined but not used.

 * The -i and -s command line flags now take an optional command
   to be run via the shell.  Previously, the argument was passed
   to the shell as a script to run.

 * Improved LDAP support.  SASL authentication may now be used in
   conjunction when connecting to an LDAP server.  The krb5_ccname
   parameter in ldap.conf may be used to enable Kerberos.

 * Support for /etc/nsswitch.conf.  LDAP users may now use nsswitch.conf
   to specify the sudoers order.  E.g.:
	sudoers: ldap files
   to check LDAP, then /etc/sudoers.  The default is "files", even
   when LDAP support is compiled in.  This differs from sudo 1.6
   where LDAP was always consulted first.

 * Support for /etc/environment on AIX and Linux.  If sudo is run
   with the -i flag, the contents of /etc/environment are used to
   populate the new environment that is passed to the command being
   run.

 * If no terminal is available or if the new -A flag is specified,
   sudo will use a helper program to read the password if one is
   configured.  Typically, this is a graphical password prompter
   such as ssh-askpass.

 * A new Defaults option, "mailfrom" that sets the value of the
   "From:" field in the warning/error mail.  If unspecified, the
   login name of the invoking user is used.

 * A new Defaults option, "env_file" that refers to a file containing
   environment variables to be set in the command being run.

 * A new flag, -n, may be used to indicate that sudo should not
   prompt the user for a password and, instead, exit with an error
   if authentication is required.

 * If sudo needs to prompt for a password and it is unable to disable
   echo (and no askpass program is defined), it will refuse to run
   unless the "visiblepw" Defaults option has been specified.

 * Prior to version 1.7.0, hitting enter/return at the Password: prompt
   would exit sudo.  In sudo 1.7.0 and beyond, this is treated as
   an empty password.  To exit sudo, the user must press ^C or ^D
   at the prompt.

 * visudo will now check the sudoers file owner and mode in -c (check)
   mode when the -s (strict) flag is specified.
2009-02-05 13:48:12 +00:00
tron
ea71974691 Fix build under Mac OS X:
The GNU library ends up being empty and "ar" complains if you try to create
an archive. Simply skip the directory during the build to avoid this.
2009-02-02 11:58:47 +00:00
shattered
bcb98e3257 heimdal leaves empty directories after deinstallation, fix that.
OK by wiz@.
2009-02-01 21:39:43 +00:00
adam
fac4d52596 Changes 1.8:
* Fix crlf self-test under Mingw+Wine.
* Fix build problems on platforms that lack stdint.h.
2009-01-31 08:58:55 +00:00
adam
6c385f5ff3 Changes 1.4.4:
* Publish GCRY_MODULE_ID_USER and GCRY_MODULE_ID_USER_LAST constants.
  This functionality has been in Libgcrypt since 1.3.0.
* MD5 may now be used in non-enforced fips mode.
* Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes.
* In fips mode, RSA keys are now generated using the X9.31 algorithm
  and DSA keys using the FIPS 186-2 algorithm.
* The transient-key flag is now also supported for DSA key
  generation.  DSA domain parameters may be given as well.
2009-01-31 08:53:14 +00:00
joerg
82874648cf Fix installation. 2009-01-29 17:11:25 +00:00
joerg
4d090be8d2 Needs libtool. 2009-01-29 16:54:17 +00:00
markd
5ba7d247a2 Update to qca 2.0.1
- Bugfix release, forward and backward compatible with 2.0.0
  - Ability to build as a Mac framework (and build this way by default)
  - On non-Mac Unix, the pkgconfig file is always qca2.pc, even in debug
    mode
  - Certificates containing wildcards are now matched properly
  - DirWatch/FileWatch now work
  - Keystore writes now work
  - Don't delete objects in their event handler (prevents Qt 4.4 warnings)
  - Fix potential hang with TLS in server mode
  - Windows version can be configured/installed using paths with spaces
2009-01-27 11:10:46 +00:00
jschauma
65e9c90d89 Give up maintainership, as I have not so much as looked at pkgsrc in
well over a year now.  Sorry. :-(
2009-01-23 21:14:16 +00:00
obache
1726335b5f Also need to take care of md5 for Solaris, PR 40434. 2009-01-20 14:48:56 +00:00
sketch
77f91ca050 The Solaris support in this package only works on OpenSolaris. Allow it to
build (although likely not work) on Solaris too.
2009-01-20 10:08:17 +00:00
seb
8e4ba347bb Update from version 2.12 to version 2.12nb1.
Pkgsrc changes:
- Register required dependency on package security/p5-Digest-HMAC
2009-01-20 06:24:03 +00:00