Commit graph

6284 commits

Author SHA1 Message Date
wiz
81c617df6d Update to 2.6:
2.6
===
	* [CVE-2012-2417] Fix LP#985164: insecure ElGamal key generation.
	  (thanks: Legrandin)

	  In the ElGamal schemes (for both encryption and signatures), g is
	  supposed to be the generator of the entire Z^*_p group.  However, in
	  PyCrypto 2.5 and earlier, g is more simply the generator of a random
	  sub-group of Z^*_p.

	  The result is that the signature space (when the key is used for
	  signing) or the public key space (when the key is used for encryption)
	  may be greatly reduced from its expected size of log(p) bits, possibly
	  down to 1 bit (the worst case if the order of g is 2).

	  While it has not been confirmed, it has also been suggested that an
	  attacker might be able to use this fact to determine the private key.

	  Anyone using ElGamal keys should generate new keys as soon as practical.

	  Any additional information about this bug will be tracked at
	  https://bugs.launchpad.net/pycrypto/+bug/985164

	* Huge documentation cleanup (thanks: Legrandin).

	* Added more tests, including test vectors from NIST 800-38A
	  (thanks: Legrandin)

	* Remove broken MODE_PGP, which never actually worked properly.
	  A new mode, MODE_OPENPGP, has been added for people wishing to write
	  OpenPGP implementations.  Note that this does not implement the full
	  OpenPGP specification, only the "OpenPGP CFB mode" part of that
	  specification.
	  https://bugs.launchpad.net/pycrypto/+bug/996814

	* Fix: getPrime with invalid input causes Python to abort with fatal error
	  https://bugs.launchpad.net/pycrypto/+bug/988431

	* Fix: Segfaults within error-handling paths
	  (thanks: Paul Howarth & Dave Malcolm)
	  https://bugs.launchpad.net/pycrypto/+bug/934294

	* Fix: Block ciphers allow empty string as IV
	  https://bugs.launchpad.net/pycrypto/+bug/997464

	* Fix DevURandomRNG to work with Python3's new I/O stack.
	  (thanks: Sebastian Ramacher)

	* Remove automagic dependencies on libgmp and libmpir, let the caller
	  disable them using args.

	* Many other minor bug fixes and improvements (mostly thanks to Legrandin)
2012-05-25 08:28:13 +00:00
pettai
448d8b50ff OpenDNSSEC 1.3.8
* OPENDNSSEC-228: Signer Engine: Make 'ods-signer update' reload signconfs
  even if zonelist has not changed.
* OPENDNSSEC-231: Signer Engine: Allow for Classless IN-ADDR.ARPA names
  (RFC 2317).
* OPENDNSSEC-234: Enforcer: Add indexes for foreign keys in kasp DB. (sqlite
  only, MySQL already has them.)
* OPENDNSSEC-246: Signer Engine: Warn if <Audit/> is in signer configuration,
  but ods-auditor is not installed
* OPENDNSSEC-249: Enforcer: ods-ksmutil: If key export finds nothing to do
  then say so rather than display nothing which might be misinterpreted.

Bugfixes:
* OPENDNSSEC-247: Signer Engine: TTL on NSEC(3) was not updated on SOA
  Minimum change.
* OPENDNSSEC-253: Enforcer: Fix "ods-ksmutil zone delete --all"
2012-05-23 10:09:21 +00:00
pettai
2316f8d166 SoftHSM 1.3.3
* Increased performance by adding more indexes to the database.
* Describe the usage of SO and user PIN in the README.

Bugfixes:
* Detect if a C++ compiler is missing.
2012-05-23 10:05:44 +00:00
joerg
c7bfb89d94 Fix build on NetBSD/amd64, if the kernel was built on a host with 386 in
its name.
2012-05-22 06:00:11 +00:00
marino
10303c9a85 security/botan: Fix DragonFly-*-i386 PLIST 2012-05-20 11:43:33 +00:00
obache
ef509dee9a Add missing dependency on p5-IO-Socket-SSL and p5-libwww (for LWP::UserAgent).
Bump PKGREVISION.
2012-05-17 10:52:48 +00:00
obache
e6d37553d6 Change HOMEPAGE to permalink. 2012-05-17 10:35:14 +00:00
wiz
60b7466218 pkglint cleanup: use standard packlist path. 2012-05-17 10:21:12 +00:00
jnemeth
b78cedd6a3 add and enable p5-AuthCAS 2012-05-17 05:05:37 +00:00
bouyer
d792695085 Inital import of security/p5-AuthCAS version 1.5
AuthCAS aims at providing a Perl API to Yale's Central Authentication System
(CAS). Only a basic Perl library is provided with CAS whereas AuthCAS is a
full object-oriented library.
2012-05-16 15:55:23 +00:00
taca
1b193d34b2 Update sudo package to 1.7.9p1.
Fix seuciry problem of CVE-2012-2337.


What's new in Sudo 1.7.9p1?

 * Fixed a bug when matching against an IP address with an associated
   netmask in the sudoers file.  In certain circumstances, this
   could allow users to run commands on hosts they are not authorized
   for.

What's new in Sudo 1.7.9?

 * Fixed a false positive in visudo strict mode when aliases are
   in use.

 * The line on which a syntax error is reported in the sudoers file
   is now more accurate.  Previously it was often off by a line.

 * The #include and #includedir directives in sudoers now support
   relative paths.  If the path is not fully qualified it is expected
   to be located in the same directory of the sudoers file that is
   including it.

 * visudo will now fix the mode on the sudoers file even if no changes
   are made unless the -f option is specified.

 * The "use_loginclass" sudoers option works properly again.

 * For LDAP-based sudoers, values in the search expression are now
   escaped as per RFC 4515.

 * Fixed a race condition when I/O logging is not enabled that could
   result in tty-generated signals (e.g. control-C) being received
   by the command twice.

 * If none of the standard input, output or error are connected to
   a tty device, sudo will now check its parent's standard input,
   output or error for the tty name on systems with /proc and BSD
   systems that support the KERN_PROC_PID sysctl.  This allows
   tty-based tickets to work properly even when, e.g. standard
   input, output and error are redirected to /dev/null.

 * Fixed a bug where a pattern like "/usr/*" included /usr/bin/ in
   the results, which would be incorrectly be interpreted as if the
   sudoers file had specified a directory.

 * "visudo -c" will now list any include files that were checked
   in addition to the main sudoers file when everything parses OK.

 * Users that only have read-only access to the sudoers file may
   now run "visudo -c".  Previously, write permissions were required
   even though no writing is down in check-only mode.

What's new in Sudo 1.7.8p2?

 * Fixed a crash in the monitor process on Solaris when NOPASSWD
   was specified or when authentication was disabled.
2012-05-16 14:49:55 +00:00
dholland
179fc8a900 Add missing pam.bl3.mk. 2012-05-14 08:03:54 +00:00
dholland
91d072329c Set PKG_DESTDIR_SUPPORT. It looks to me like it should probably just work;
I can't test it though right now due to some kind of JVM lossage.
2012-05-14 05:47:09 +00:00
wiz
f11d5436d1 "Convert" to destdir by moving one line higher up. 2012-05-13 15:23:33 +00:00
wiz
ea61d28556 + ocaml-cryptokit 2012-05-12 17:54:16 +00:00
wiz
ec567f8aff Initial import of ocaml-cryptokit-1.5. Packaged byJaap Boender in PR 41691.
The Cryptokit library for Objective Caml provides a variety of
cryptographic primitives that can be used to implement cryptographic
protocols in security-sensitive applications. The primitives provided
include:

Symmetric-key cryptography: AES, DES, Triple-DES, ARCfour, in ECB,
CBC, CFB and OFB modes. Public-key cryptography: RSA encryption and
signature; Diffie-Hellman key agreement. Hash functions and MACs:
SHA-1, MD5, and MACs based on AES and DES. Random number generation.
Encodings and compression: base 64, hexadecimal, Zlib compression.

Additional ciphers and hashes can easily be used in conjunction
with the library. In particular, basic mechanisms such as chaining
modes, output buffering, and padding are provided by generic classes
that can easily be composed with user-provided ciphers. More
generally, the library promotes a "Lego"-like style of constructing
and composing transformations over character streams.
2012-05-12 17:53:40 +00:00
wiz
4326abf388 Add CONFLICTS with new man-pages package. For details, see
man-pages/Makefile.
2012-05-12 07:37:50 +00:00
taca
9077603d55 Update openssl to 0.9.8x.
OpenSSL CHANGES
 _______________

 Changes between 0.9.8w and 0.9.8x [10 May 2012]

  *) Sanity check record length before skipping explicit IV in DTLS
     to fix DoS attack.

     Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic
     fuzzing as a service testing platform.
     (CVE-2012-2333)
     [Steve Henson]

  *) Initialise tkeylen properly when encrypting CMS messages.
     Thanks to Solar Designer of Openwall for reporting this issue.
     [Steve Henson]
2012-05-11 13:27:26 +00:00
obache
929ea232da Update ruby-simple_oauth to 0.1.8.
contains OAuth spec compatible fixes.
2012-05-10 12:12:29 +00:00
martin
12ad0b558d Add upstream bug reference 2012-05-10 09:44:58 +00:00
wiz
efd3373f7a Since p5-Crypt-OpenSSL-RSA versions before 0.27 are broken with
perl-5.14, and perl-5.14 is pkgsrc's default, depend on at least that
version. Bump PKGREVISION.
2012-05-09 06:21:39 +00:00
pettai
45d246ac5e 0.28 Thu Aug 25 2011 - Moritz Onken (PERLER)
- RT 56454 - Win32 compatibility patch (kmx@cpan.org)

0.27  Wed Jun 29 2011 - Todd Rinaldo (TODDR)
        - RT 65947 - Fix RSA.pm break with perl 5.14+
2012-05-08 21:17:17 +00:00
dholland
7e751949e4 Set BUILDLINK_ABI_DEPENDS correctly (with +=, not ?=)
It turns out there were a lot of these.
2012-05-07 01:53:12 +00:00
dholland
5ff7a40dcf Fix build with latest glib2. (not the usual thing, either) 2012-05-07 01:14:14 +00:00
jmmv
9426d775f8 Add and enable google-authenticator. 2012-05-07 00:02:33 +00:00
jmmv
5430cafef3 Initial import of google-authenticator, version 0.0.20120506:
The Google Authenticator includes implementations of one-time passcode
generators for several mobile platforms as well as a pluggable
authentication module (PAM).  One-time passcodes are generated using
open standards developed by the Initiative for Open Authentication
(OATH) (which is unrelated to OAuth).

These implementations support the HMAC-Based One-time Password (HOTP)
algorithm specified in RFC 4226 and the Time-based One-time Password
(TOTP) algorithm specified in RFC 6238.

Because upstream does not provide a distribution file (yet), I have
pre-packaged the sources myself as of today and uploaded them to
ftp.n.o under my own directory.  This explains the 0.0 prefix in the
version number, because if upstream starts providing distfiles with
proper versioning, we don't want our date stamp to be "above" all
official versions.
2012-05-07 00:01:48 +00:00
dholland
5a12cc1494 Patches for building with the latest glib2. 2012-05-06 17:14:58 +00:00
pettai
a3f18340a1 Added validns 2012-05-05 00:01:24 +00:00
pettai
12da381bef Validns is a standalone command line RFC 1034/1035 zone file validation
tool that, in addition to basic syntactic and semantic zone checks,
includes DNSSEC signature verification and NSEC/NSEC3 chain validation,
as well a number of optional policy checks on the zone.
2012-05-04 23:57:46 +00:00
martin
a98adf0b6f Let the compiler handle the alignement for cached passwd entries, fixes
a bus error on sparc (since 64 bit time_t).
2012-05-03 08:31:05 +00:00
obache
a6d5ad9edc Recursive bump from icu shlib major bumped to 49. 2012-04-27 12:31:32 +00:00
obache
1b5d945125 Update ruby-simple_oauth to 0.1.7.
(no summary)
2012-04-24 12:08:25 +00:00
obache
894ebc9fe7 Update ruby-simple_oauth to 0.1.7.
(no summary)
2012-04-24 12:07:17 +00:00
taca
b982de4e94 Update openssl package to 0.9.8w.
Security fix for CVS-2012-2131.

 Changes between 0.9.8v and 0.9.8w [23 Apr 2012]

  *) The fix for CVE-2012-2110 did not take into account that the
     'len' argument to BUF_MEM_grow and BUF_MEM_grow_clean is an
     int in OpenSSL 0.9.8, making it still vulnerable. Fix by
     rejecting negative len parameter. (CVE-2012-2131)
     [Tomas Hoger <thoger@redhat.com>]
2012-04-24 05:03:48 +00:00
obache
22a190e1fb Update ruby-oauth to 0.4.6.
=== 0.4.6 2012-04-21

* Fixed nested attributes in #normalize (Shaliko Usubov)
* Make use the path component of the :site parameter (Jonathon M. Abbott)
* Fixed post body's being dropped in 1.9 (Steven Hammond)
* Fixed PUT request handling (Anton Panasenko)
2012-04-22 11:54:18 +00:00
wiz
6dd417bc6e Update to 20120309:
20120309
  - Download the certdata from mozilla over SSL (John Joseph Bachir)
  - CA updates:
    Removes:
    - Hellenic Academic and Research Institutions RootCA 2011

20120118
  - CA updates:
    Add:
    - Security Communication RootCA2
    - EC-ACC
    - Hellenic Academic and Research Institutions RootCA 2011
    Remove:
    - Verisign Class 4 Public Primary Certification Authority - G2
    - TC TrustCenter, Germany, Class 2 CA
    - TC TrustCenter, Germany, Class 3 CA
2012-04-22 11:51:38 +00:00
wiz
e9a56c561a Update to 1.66:
v1.66 2012.04.16
- make it thread safer, thanks to bug report from vega[DOT]james[AT]gmail
  [DOT]com, https://rt.cpan.org/Ticket/Display.html?id=76538
v1.65 2012.04.16
- added NPN (Next Protocol Negotiation) support based on patch from kmx
  https://rt.cpan.org/Ticket/Display.html?id=76223
v1.64 2012.04.06
- clarify some behavior regarding hostname verfication.
  Thanks to DOHERTY for reporting.
v1.63 2012.04.06
- applied patch of DOUGDUDE to ignore die from within eval to make tests
  more stable on Win32, https://rt.cpan.org/Ticket/Display.html?id=76147
v1.62 2012.03.28
- small fix to last version
v1.61 2012.03.27
- call CTX_set_session_id_context so that servers session caching works with
  client certificates too.
  https://rt.cpan.org/Ticket/Display.html?id=76053
v1.60 2012.03.20
- don't make blocking readline if socket was set nonblocking, but return as
  soon no more data are available
  https://rt.cpan.org/Ticket/Display.html?id=75910
- fix BUG section about threading so that it shows package as thread safe
  as long as Net::SSLeay >= 1.43 is used
  https://rt.cpan.org/Ticket/Display.html?id=75749
v1.59 2012.03.08
- if SSLv2 is not supported by Net::SSLeay set SSL_ERROR with useful
  message when attempting to use it.
- modify constant declarations so that 5.6.1 should work again
v1.58 2012.02.26
- fix t/dhe.t again to enable the workaround only for newer openssl
  versions, because this would cause failures on older versions
v1.57 2012.02.26
- fix t/dhe.t for openssl 1.0.1 beta by forcing tlsv1, so that it does
  not complain about the too small rsa key which it should not use anyway.
  Thanks to paul[AT]city-fan[DOT]org  for reporting.
  https://rt.cpan.org/Ticket/Display.html?id=75165
v1.56 2012.02.22
- add automatic or explicit (via SSL_hostname) SNI support, needed for
  multiple SSL hostnames with same IP. Currently only supported for the
  client.
v1.55 2012.02.20
- work around IO::Sockets work around for systems returning EISCONN etc
  on connect retry for non-blocking sockets by clearing $! if SUPER::connect
  returned true.
  https://rt.cpan.org/Ticket/Display.html?id=75101
  Thanks for Manoj Kumar for reporting.
v1.54 2012.01.11
- return 0 instead of undef in SSL_verify_callback to fix unitialized
  warnings.  Thanks to d[DOT]thomas[AT]its[DOT]uq[DOT]edu[DOT]au for
  reporting the bug and MIKEM for the fix.
  https://rt.cpan.org/Ticket/Display.html?id=73629
v1.53 2011.12.11
- kill child in t/memleak_bad_hanshake.t if test fails
  https://rt.cpan.org/Ticket/Display.html?id=73146
  Thanks to CLEACH ofr reporting
v1.52 2011.12.07
- fix syntax error in t/memleak_bad_handshake.t
  thanks to cazzaniga[DOT]sandro[AT]gmail[DOT]com for reporting
v1.51 2011.12.06
- disable t/memleak_bad_handshake.t on AIX, because it might hang
  https://rt.cpan.org/Ticket/Display.html?id=72170
v1.50 2011.12.06
  Thanks to HMBRAND for reporting and Rainer Tammer tammer[AT]tammer[DOT]net for
  providing access to AIX system
v1.49 2011.10.28
- another regression for readline fix, this time it failed to return lines
  at eof which don't end with newline. Extended t/readline.t to catch this
  case and the fix for 1.48
  Thanks to christoph[DOT]mallon[AT]gmx[DOT]de for reporting
v1.48 2011.10.26
- bugfix for readline fix in 1.45. If the pending data where false
  (like '0') it failed to read rest of line.
  Thanks to Victor Popov for reporting
  https://rt.cpan.org/Ticket/Display.html?id=71953
v1.47 2011.10.21
- fix for 1.46 - check for mswin32 needs to be /i. Thanks to
  Alexandr Ciornii for reporting
v1.46 2011.10.18
- disable test t/signal-readline.t on windows, because signals are
  not relevant for this platform and test does not work.
  https://rt.cpan.org/Ticket/Display.html?id=71699
v1.45 2011.10.12
- fix readline to continue when getting interrupt waiting for more
  data. Thanks to kgc[AT]corp[DOT]sonic[DOT]net for reporting problem
2012-04-22 11:50:34 +00:00
wiz
393fcd7171 Update to 0.45:
0.45 Wed Oct 26 00:11:17 EDT 2011

	Include trailing columns when parsing --fixed-list-mode output
2012-04-22 11:48:29 +00:00
wiz
bf314eb3db Update to 5.71:
5.71  Wed Feb 29 04:06:10 MST 2012
	- prevented $! from getting clobbered in _bail() routine
		-- thanks to Zefram for patch
	- added example of BITS mode usage to shasum documentation

5.70  Wed Dec 14 02:32:10 MST 2011
	- added BITS mode to addfile method and shasum
		-- partial-byte inputs now possible via files/STDIN
		-- allows shasum to check all 8074 NIST Msg vectors
			-- previously required special programming

5.63  Tue Nov  8 02:36:42 MST 2011
	- added code to allow very large data inputs all at once
		-- previously limited to several hundred MB at a time
		-- many thanks to Thomas Drugeon for his elegant patch
	- removed outdated reference URLs from several test scripts
		-- these URLs aren't essential, and often go stale
		-- thanks to Leon Brocard for spotting this
			-- ref. rt.cpan.org #68740
2012-04-22 11:47:05 +00:00
taca
1a999fa1fc Update openssl package to 0.9.8v.
NEWS
====

This file gives a brief overview of the major changes between each OpenSSL
release. For more details please read the CHANGES file.

Major changes between OpenSSL 0.9.8u and OpenSSL 0.9.8v:

    o Fix for ASN1 overflow bug CVE-2012-2110
2012-04-21 07:38:14 +00:00
drochner
97431b5272 update to 2.0.19
changes:
-cmd line UI improvements
-Ukrainian translation
2012-04-17 18:35:33 +00:00
drochner
22a9361d94 update to 2.12.18
changes:
-Corrected SRP-RSA ciphersuites when used under TLS 1.2
-Fixed leaks in key generation
2012-04-17 17:53:01 +00:00
joerg
fc9d5f03fe Fix some errors in C++ usage. 2012-04-17 17:46:30 +00:00
ryoon
1921f944ca Update to 4.53
Changelog:
Version 4.53, 2012.03.19, urgency: MEDIUM:
* New features
  - Added client-mode "sni" option to directly control the value of
    TLS Server Name Indication (RFC 3546) extension.
  - Added support for IP_FREEBIND socket option with a pached Linux kernel.
  - Glibc-specific dynamic allocation tuning was applied to help unused memory
    deallocation.
  - Non-blocking OCSP implementation.
* Bugfixes
  - Compilation fixes for old versions of OpenSSL (tested against 0.9.6).
  - Usage of uninitialized variables fixed in exec+connect services.
  - Occasional logging subsystem crash with exec+connect services.
  - OpenBSD compilation fix (thx to Michele Orru').
  - Session id context initialized with session name rather than a constant.
  - Fixed handling of a rare inetd mode use case, where either stdin or stdout
    is a socket, but not both of them at the same time.
  - Fixed missing OPENSSL_Applink http://www.openssl.org/support/faq.html#PROG2
  - Fixed crash on termination with FORK threading model.
  - Fixed dead canary after configuration reload with open connections.
  - Fixed missing file descriptors passed to local mode processes.
  - Fixed required jmp_buf alignment on Itanium platform.
  - Removed creating /dev/zero in the chroot jail on Solaris platform.
  - Fixed detection of WSAECONNREFUSED Winsock error.
  - Missing Microsoft.VC90.CRT.manifest added to Windows installer.

Version 4.52, 2012.01.12, urgency: MEDIUM:
* Bugfixes
  - Fixed write closure notification for non-socket file descriptors.
  - Removed a line logged to stderr in inetd mode.
  - Fixed "Socket operation on non-socket" error in inetd mode on Mac OS X
    platform.
  - Removed direct access to the fields of the X509_STORE_CTX data structure.

Version 4.51, 2012.01.09, urgency: MEDIUM:
* New features
  - Updated Win32 binary distribution OpenSSL DLLs to version 0.9.8s-fips.
  - Updated Android binary OpenSSL to version 1.0.0f.
  - Zlib support added to Win32 and Android binary builds.
  - New "compression = deflate" global option to enable RFC 2246 compresion.
    For compatibility with previous versions "compression = zlib" and
    "compression = rle" also enable the deflate (RFC 2246) compression.
  - Separate default ciphers and sslVersion for "fips = yes" and "fips = no".
  - UAC support for editing configuration file with Windows GUI.
* Bugfixes
  - Fixed exec+connect sections.
  - Added a workaround for broken Android getaddrinfo():
    http://stackoverflow.com/questions/7818246/segmentation-fault-in-getaddrinfo
2012-04-16 16:55:21 +00:00
wiz
6dc4abe4b7 Reset maintainer, developer has left the building 2012-04-15 22:00:58 +00:00
markd
cbc4db0822 Update KDE SC to 4.8.2
bugfixes.
2012-04-15 05:54:50 +00:00
adam
88bb0e6439 Removed mk/apachever.mk 2012-04-14 16:25:11 +00:00
hans
99fdb8d9c3 Add -lrt to LIBS.SunOS to make this build. Not needed on 5.11, but
doesn't hurt either.
2012-04-13 23:20:07 +00:00
hans
d50422c9bc Add -lrt to LIBS.SunOS to make this build. Not needed on 5.11, but
doesn't hurt either.
2012-04-13 23:04:11 +00:00
gls
058699623a Update security/py-ssh to 1.7.13.
Upstream changes:


## ssh 1.7.13 (2012-02-13)

* #5: Moved a `fcntl` import closer to where it's used to help avoid
  `ImportError` problems on Windows platforms. Thanks to Jason Coombs for the
  catch + suggested fix.
* #4: Updated implementation of WinPageant integration to work on 64-bit
  Windows. Thanks again to Jason Coombs for the patch.
2012-04-13 21:35:18 +00:00