Commit graph

2250 commits

Author SHA1 Message Date
wiz
f042140b18 Update to 3.8p1:
This version features many improvements and bugfixes.
2004-03-12 19:24:47 +00:00
recht
5f7392fd02 update to 20040310 version
changes:

- Added support for removing files recursivly
- Incudes checking for file type and size.
- Displays the file being destroyed and its size.
- Added command line flags:
- Added Security Level Flag (Destroy Severity)
- Added Output suppression flag for non-verbose output.
- Added Help flag.
- Added a Manual page for the program in section 1.
2004-03-12 18:01:57 +00:00
seb
9fca7358bd Update to version 3.2.9.1.
While here bl3ify.

Changes since previously packaged version (3.2.5):

2003-12-03  Sami J. Lehtinen  <sjl@ssh.com>

	* ssh-3.2.9.1.

	* non-commercial: removed cert hash compat stuff, which broke
	  compilation.

2003-09-26  Sami J. Lehtinen  <sjl@ssh.com>
	* ssh-3.2.9.
	* ssh2,sshd2: (by Patrick Irwin): Critical security fix: fixed
	  several bugs in ASN.1 decoding functionality, which were caused
	  by invalid assumptions on the format of input BER data.
	  Certificates malformed in certain ways could cause a crash or
	  buffer overflow. No known exploits at this time, but you are
	  strongly advised to upgrade.

	  Admins unwilling or unable to upgrade need to disable
	  certificates, but this may not be enough for "hostbased"
	  authentication. "publickey" auth should be safe even with the
	  old version with certificates disabled. Clients are probably
	  vulnerable against malicious servers in the initial key exchange
	  regardless of configuration.

	  Users of noncommercial version are not affected by this
	  vulnerability.

2003-09-25  Sami J. Lehtinen  <sjl@ssh.com>

	* sshd2, ssh2: Implemented DisableVersionFallback, with which you
	  can disable fallback compatibility code for older, or otherwise
	  incompatible versions of software. Don't disable unless you know
	  what you're doing. See sshd2_config(5) for details. For really
	  paranoid people (using this option will probably hurt usability
	  somewhat, especially in environments where multiple versions of
	  SSH are used from different vendors).

	* sshd2, ssh2: Implemented Cert.RSA.Compat.HashScheme. Older SSH
	  Secure Shell clients and servers used hashes in an incoherent
	  manner (sometimes MD5, sometimes SHA-1). With this option, you
	  can set what hash is used. See sshd2_config(5) for details.

	* Previous: ssh-3.2.8.

2003-08-07  Tomi Salo  <ttsalo@ssh.com>

	* Added a new general configuration option, MaxCRLSize. This sets
	  the maximum size for CRLs and CA certs used in validating
	  received certificates. (The size is the total size of all CRLs
	  and certs, not the maximum individual size.)

2003-06-11  Sami J. Lehtinen  <sjl@ssh.com>

	* ssh-3.2.7.

	* ssh-signer2: Fixed a bug, which caused the application to
	  intermittently call fatal because the read() operation was
	  interrupted by a signal (SIGCHLD).

2003-06-04  Sami J. Lehtinen  <sjl@ssh.com>

	* ssh-3.2.6.

	* SecurID certified binaries, no code changes.
2004-03-12 16:40:08 +00:00
taca
4ebeb28b9f Bump pacakge revision with ruby-base package's update. 2004-03-12 05:02:55 +00:00
reed
9c5adc6fea The MESSAGE mentions modifying the sudoers file (and doesn't
haev location shown), so tell the admin to use the visudo tool.
2004-03-11 23:33:09 +00:00
jmmv
96a54de082 s/Gnome/GNOME/ 2004-03-11 12:41:58 +00:00
jmmv
182bab7770 Fix path to an icon so that the entry in the control center shows up properly. 2004-03-11 12:38:18 +00:00
jmmv
1dc4467816 Bump PKGREVISION to catch with gpgme03 package rename (it was named gpgme
previously) and its associated library.
2004-03-11 12:29:39 +00:00
jmmv
28eb406354 Rename this package to gpgme03, and rename all installed files to include
the '03' suffix, so that this can coexist with the gpgme package.
2004-03-11 12:26:28 +00:00
jmmv
c84bf493a1 unused 2004-03-11 12:24:22 +00:00
uebayasi
8c74d25297 Fix build on Red Hat 7.3. 2004-03-11 01:41:49 +00:00
jlam
bb46710479 Convert to use bdb.buildlink3.mk. 2004-03-10 18:07:16 +00:00
jlam
d0b4c54eb6 Split out the code that deals with checking whether the software is
built-in or not into a separate builtin.mk file.  The code to deal
checking for built-in software is much simpler to deal with in pkgsrc.

The buildlink3.mk file for a package will be of the usual format
regardless of the package, which makes it simpler for packagers to
update a package.

The builtin.mk file for a package must define a single yes/no variable
USE_BUILTIN.<pkg> that is used by bsd.buildlink3.mk to decide whether
to use the built-in software or to use the pkgsrc software.
2004-03-10 17:57:14 +00:00
cube
93a406f391 Define NO_EXPORT_CPP so that rpcgen doesn't get mad. 2004-03-10 07:12:09 +00:00
seb
b47b1b8a52 Remove info files entries from PLIST. 2004-03-10 00:56:54 +00:00
seb
2baa1f9c50 Remove info files entries from PLIST. 2004-03-10 00:34:51 +00:00
seb
b2a8972a6e Remove info files entries from PLIST. 2004-03-10 00:22:43 +00:00
seb
a8438b38a4 Remove info files entries from PLIST. 2004-03-09 23:10:34 +00:00
seb
dc6d5ee831 Remove info files entries from PLIST. 2004-03-09 23:01:17 +00:00
reed
044930d046 Don't build and install openssl with IDEA, MDC2, or RC5 support.
According to README, "RSA Security holds software patents on the
RC5 algorithm.  If you intend to use this cipher, you must contact
RSA Security for licensing conditions." And "The IDEA algorithm is
patented by Ascom ... They should be contacted if that algorithm
is to be used." The openssl FAQ says "For patent reasons, support
for IDEA, RC5 and MDC2 is disabled in this [Red Hat Linux] version."
The FAQ lists patent numbers and expiry dates of US patents:
MDC-2: 4,908,861 13/03/2007
IDEA:  5,214,703 25/05/2010
RC5:   5,724,428 03/03/2015

Now fee-based-commercial-use ACCEPTABLE_LICENSES is not needed.
2004-03-09 08:06:45 +00:00
minskim
2827f5b2d8 Enable tk84 and replace x11/tk with x11/tk83. Packages compatible
with 8.4 will be updated to depend on x11/tk after Tk update.
2004-03-08 20:27:13 +00:00
minskim
ac690cf634 Replace lang/tcl with lang/tcl83. Packages compatible with 8.4 will
be updated to depend on lang/tcl after Tcl/Tk update.
2004-03-08 19:52:50 +00:00
jmmv
ae5a97419f Handle some shared directories by depending on (or updating dependancies to
the latest versions) xdg-dirs, xdg-x11-dirs or gnome*-dirs.
Bump PKGREVISION.
2004-03-08 19:40:36 +00:00
heinz
6b57ac466e Updated to version 1.03
Adapted to buildlink3
No INTERACTIVE_STAGE anymore

Changes sinces 0.17
===================

1.03 2002.12.09
    - Makefile.PL now uses ExtUtils::AutoInstall. Thanks to Autrijus Tang
      for the note.
    - SIGNATURE file now included with distribution.
    - Added --version to bin/pgplet, which lists supported ciphers, digests,
      etc., along with version information.
    - Added Crypt::OpenPGP::KeyBlock::save_armoured, to save an armoured
      version of the keyblock (useful for exporting public keys).
    - encrypt and verify no longer fail if there are no public keyrings,
      in case lookup in a keyserver is desired.
    - Added Crypt::OpenPGP::Digest::supported and
      Crypt::OpenPGP::Cipher::supported.
    - Fixed bug where signed cleartext has \r characters in the header.

1.02 2002.10.12
    - encrypt and verify now support auto-retrieval of public keys from
      an HKP keyserver, if the keys are not found in the local keyring.
    - Added support for the SHA-1 integrity checks on secret keys used
      by gnupg 1.0.7. Thanks to Chip Turner for the spot.
    - Added a --local-user|-u option to bin/pgplet to support using a
      different secret key for signing. Thanks to Joseph Pepin for the
      patch.
    - new() now accepts Crypt::OpenPGP::KeyRing objects for the PubRing
      and SecRing parameters.
    - Fixed a bug in decrypt where passing in a "Key" param to decrypt a
      message encrypted to multiple recipients did not work. Thanks to
      rdailey for the spot.
    - ElGamal self-signatures no longer cause an error.
    - Added LWP::UserAgent and URI::Escape to prereqs, for keyserver.
    - Added Crypt::OpenPGP::Signature::digest accessor. Thanks to Bob
      Mathews for the patch.

1.01 2002.07.15
    - Added Crypt::OpenPGP::handle, a DWIM wrapper around the other
      high-level interface methods. Given data, it determines whether the
      data needs to be decrypted, verified, or both. And then it does what
      it's supposed to do.
    - Added Crypt::OpenPGP::Signature::timestamp to return the created-on
      time for a signature. Also, Crypt::OpenPGP::decrypt and
      Crypt::OpenPGP::verify now return the Crypt::OpenPGP::Signature object
      if called in list context (and, in the case of decrypt, if there is
      a signature). Thanks to Erik Arneson for the patches.
    - Fixed a bug in decrypt with uncompressed encrypted signed data.
      Thanks to Erik Arneson for the spot.
    - Fixed a bug in Crypt::OpenPGP::Message with clearsigned messages, if
      the text and signature were contained in a block of text containing
      more PGP messages/signatures.
    - Fixed a nasty, evil, stupid compatibility bug with canonical text.
      Namely, pgp2 and pgp5 do not trim trailing whitespace from "canonical
      text" signatures, only from cleartext signatures. This was causing
      invalid signatures which should not have been invalid. Thanks to
      Erik Arneson for the spot.
    - Added Crypt::OpenPGP::KeyServer, which does lookups against an HKP
      keyserver.

1.00 2002.02.26
    - CAST5 is now supported thanks to Crypt::CAST5_PP from Bob Mathews.
    - bin/pgplet now supports encrypting and decrypting symmetrically-
      encrypted messages.
    - The PassphraseCallback argument to Crypt::OpenPGP::decrypt can now
      be used to supply a callback for symmetrically-encrypted packets,
      as well as public-key-encrypted packets.
    - Fix a bug with encrypted, signed text--the signature was being
      armoured, which led to errors from the process trying to decrypt and
      verify.
    - Fix a bug with symmetric-encrypted session keys w/r/t generation for
      PGP2--PGP2 doesn't understand symmetric-encrypted session keys, so we
      need to leave them out when Compat is PGP2. Also, we need to use the
      'Simple' S2k rather than the default, 'Salt_Iter'.
    - Fix a key generation bug where GnuPG will not import generated public
      keys, because the self-signature is invalid; signature needs to be on
      key data *and* user ID. Thanks to Joel Rowles for the spot.
    - Fix bug in ElGamal encryption and k generation.

0.18  2002.01.29
    - Added IsPacketStream parameter to Crypt::OpenPGP::Message; this turns
      off armour detection when initializing the message, and can be used
      when you *know* that the message is a stream of packets, and not an
      ASCII-armoured stream of packets.
    - When unarmouring, remove \r characters from the armoured text end
      of lines.
    - Added Crypt::OpenPGP::KeyRing::save method. Thanks to Ben Xain for
      the idea and a patch.
    - Added compatibility with symmetric-key-encrypted files that do not
      have a symmetric-key session key packet. The assumption with these
      encrypted messages is that they are PGP2-encrypted, using the IDEA
      cipher, MD5 digests, and a Simple s2k. So that is how the fix has
      been implemented. Thanks to Ben Xain for the bug report.
    - Win32 fixes: use binmode when reading files that might be binary.
    - Added --symmetric and --digest options to Makefile.PL to set
      symmetric and digest algorithms when using --sdk.
    - Fixed subkey IDs in list-keys with bin/pgplet.
    - Check for errors when reading keyring.
2004-03-07 03:28:44 +00:00
jlam
9ff0e10340 Reorder location and setting of BUILDLINK_PACKAGES to match template
buildlink3.mk file in revision 1.101 of bsd.buildlink3.mk.
2004-03-05 19:25:06 +00:00
minskim
b2f1469a63 Update gss to 0.0.10.
Changes since 0.0.6:
  - A command line tool "gss" added in src/.
  - gss_display_status can return multiple description texts (using context).
  - The Swedish translation has been updated.
  - Various cleanups and improvements.
  - Implemented gss_export_name and gss_krb5_inquire_cred_by_mech.
    The Kerberos 5 backend also support them.
  - gss_inquire_cred support default credentials.
  - Kerberos 5 gss_canonicalize_name now support all mandatory name types.
  - Kerberos 5 gss_accept_sec_context now support sub-session keys in AP-REQ.
  - Added new extended function API: gss_userok.
  - API documentation in HTML format from GTK-DOC included in doc/reference/.
  - Moved all backend specific code into sub-directories of lib/.
  - The gss_duplicate_name function now allocate the output result properly.
  - Man pages for all public functions are included.
  - Documentation fixes.  For example, all official APIs are now documented.
  - Fixed typo that broke gss_wrap for 3DES with Kerberos 5.
  - Improvements to build environment.
  - Autoconf 2.59, Automake 1.8 beta, Libtool CVS used.
2004-03-04 18:54:41 +00:00
simonb
2deb3b6da5 Update to priv-1.0-beta2.
Changes from previous version are:

 + Fix a single byte buffer overflow.  Can only be a NUL byte that
   overflows, not believed (at this stage!) to be exploitable in any
   way.
 + Avoid null-pointer dereference if getpwuid(getuid()) fails.
2004-03-04 02:57:00 +00:00
minskim
1ed4d35a43 Update opencdk to 0.5.4.
Changes since 0.5.3:
  * Added versioned symbols.
2004-03-03 04:00:32 +00:00
wiz
5b42d2b843 Make build on m68kelf, and honour M68060 variable for quite a bit
of speedup on m68060 machines.
From S.P. Zeidler in PR 24579.
2004-03-01 19:12:25 +00:00
jmmv
5adcfa1afb Bump PKGREVISION due to libtasn1 and gnutls updates. 2004-03-01 15:19:41 +00:00
jmmv
640581be59 Update to 1.0.8. Changes since 1.0.6:
Version 1.0.8 (28/02/2004)
- Corrected bug in mutual certificate authentication in SSL 3.0.
- Several other minor bugfixes.

Version 1.0.7 (25/02/2004)
- Implemented TLS 1.1 (and also obsoleted the TLS 1.0 CBC protection hack).
- Some updates in the documentation.
2004-03-01 15:14:45 +00:00
jmmv
e8f5ff2654 Update to 0.2.7:
- Added versioned symbols.
2004-03-01 15:12:10 +00:00
cube
a2711fedac Enable and note addition of srm version 1.2.8. 2004-03-01 09:45:31 +00:00
cube
24dcecdd5f Initial import of srm, version 1.2.8 into the NetBSD Package Collection,
by request on regional-fr.

Srm is a secure replacement for rm(1).  Unlike the standard rm, it overwrites
the data in the target files before unlinkg them.  This prevents command-line
recovery of the data by examining the raw block device.  It may also help
frustrate physical examination of the disk, although it's unlikely that
completely protects against this type of recovery.

Srm uses algorithms found in _Secure Deletion of Data from Magnetic and
Solid-State Memory_ by Peter Gutmann and THC Secure Delete (the overwrite,
truncate, rename, unlink sequence).

All users, but especially Linux users, should be aware that srm will only
work on file systems that overwrite blocks in place.  In particular, it will
_NOT_ work on resiserfs or the vast majority of journaled file systems.  It
should work on ext2, FAT-based file systems, and the BSD native file system.
Ext3 users should be especially careful as it can be set to journal data as
well, which is an obvious route to reconstructing information.
2004-03-01 09:43:06 +00:00
grant
1fa7a034f2 include mk/compiler.mk before testing ${CC} 2004-02-29 00:36:45 +00:00
taca
90dc08bf79 MAINTAINER should be tech-pkg@NetBSD.org instead of packages@netbsd.org. 2004-02-28 15:29:20 +00:00
itojun
22cfcba886 add ike-scan 2004-02-27 22:14:10 +00:00
itojun
923a884c64 ike-scan, IKE fingerprinting tool
---
ike-scan discovers IKE hosts and can also fingerprint them using the
retransmission backoff pattern.

ike-scan does two things:

a) Discovery: Determine which hosts are running IKE.
   This is done by displaying those hosts which respond to the IKE requests
   sent by ike-scan.

b) Fingerprinting: Determine which IKE implementation the hosts are using.
   This is done by recording the times of the IKE response packets from the
   target hosts and comparing the observed retransmission backoff pattern
   against known patterns.

The retransmission backoff fingerprinting concept is discussed in more
detail in the UDP backoff fingerprinting paper which should be included
in the ike-scan kit as udp-backoff-fingerprinting-paper.txt.

The program sends IKE main mode requests to the specified hosts and displays
any responses that are received.  It handles retry and retransmission with
backoff to cope with packet loss.  It also limits the amount of bandwidth
used by the outbound IKE packets.
2004-02-27 22:12:51 +00:00
markd
dd05c8383d USE_LANGUAGES= c c++. 2004-02-25 22:16:23 +00:00
minskim
fe66015eda Regen. Noted by jmmv@. 2004-02-25 21:53:17 +00:00
minskim
e073097bd3 Not used any more. 2004-02-25 19:19:45 +00:00
minskim
9f9cc8dd13 bl3ify and add explicit dependency on pkgconfig. 2004-02-25 19:15:44 +00:00
minskim
a734b80220 Not used any more. 2004-02-25 19:05:09 +00:00
heinz
133c0cfe89 Enable p5-Crypt-CAST5_PP 2004-02-25 19:00:16 +00:00
minskim
8131e4341f Not used any more. 2004-02-25 18:42:12 +00:00
minskim
2333b63720 Enable pkgviews installation. 2004-02-25 18:20:06 +00:00
minskim
3976305efb Not used any more. 2004-02-25 18:16:28 +00:00
minskim
62b096c9c5 Bump BUILDLINK_DEPENDS due to library major bump. 2004-02-25 18:10:49 +00:00
minskim
6d3ec2b779 Update libksba to 0.9.4.
Changes since 0.9.1:
 * Support for Extended Key Usage.
 * ksba_cms_identify may no return a pseudo content type for pkcs#12
   files.
 * Cleaned up the DN label table.
 * Fixed a bug in creating CMS signed data.
 * Interface changes:
	ksba_reader_clear             NEW.
	ksba_cert_get_ext_key_usages  NEW.
	KSBA_CT_PKCS12                NEW.
2004-02-25 18:08:27 +00:00
minskim
f5e93c14ab Bump PKGREVISION due to the update of libgcrypt. 2004-02-25 15:53:17 +00:00