Commit graph

1382 commits

Author SHA1 Message Date
abs
ba32c186cf Added msudir-0.09
msudir allows enabled users to easily manage 'setuid' scripts and
	binaries.  A directory containing scripts or other executables is
	created inside the basedir for each destination user. Any user is
	then able to invoke the script 'bar' in the directory 'fu' via
	'msudir fu/bar'. The script will be run under the uid and primary
	gid of the destination user. Some effort is taken to sanitise the
	arguments and environment, but msudir should not be used without
	an understanding of the security implication.
2002-08-27 09:00:52 +00:00
abs
082308b3f1 Import msudir-0.09
msudir allows enabled users to easily manage 'setuid'
	scripts and binaries.  A directory containing scripts or
	other executables is created inside the basedir for each
	destination user. Any user is then able to invoke the script
	'bar' in the directory 'fu' via 'msudir fu/bar'. The script
	will be run under the uid and primary gid of the destination
	user. Some effort is taken to sanitise the arguments and
	environment, but msudir should not be used without an
	understanding of the security implication.
2002-08-27 08:57:32 +00:00
mjl
9d3b9427c3 Update to 0.3.9
* An experimental interface to GnuPG's --edit-key functionality is
   introduced, see gpgme_op_edit.
 * The new gpgme_import_ext function provides a convenient access to
   the number of processed keys.
 * It is possible to use an outside event loop for the I/O to the
   crypto engine by setting the I/O callbacks with gpgme_set_io_cbs.
 * GPGME_ATTR_OTRUST is implemented now.
 * A first step toward thread safeness has been achieved, see the
   documentation for details.  Supported thread libraries are pthread
   and Pth.
 * All error output of the gpgsm backend is send to the bit bucket.
 * The signature verification functions are extended.  Instead of
   always returning GPGME_SIG_STATUS_GOOD, the functions new codes for
   expired signatures.
 * The current passphrase callback and progress meter callback can be
   retrieved with the new functions gpgme_get_passphrase_cb and
   gpgme_get_progress_cb respectively.
 * gpgme_op_encrypt can be called with RECIPIENTS being 0.  In this
   case, symmetric encryption is performed.  Note that this requires a
   passphrase from the user.
 * More information is returned for X.509 certificates.
 * Interface changes relative to the 0.3.4 release:
 * gpgme_op_encrypt does now fail with GPGME_Invalid_Recipients if
   some recipients have been invalid, whereas earlier versions
   succeeded in this case.
 * gpgme_op_verify now allows to pass an uninitialized data object as
   its plaintext argument to check for normal and cleartext
   signatures.  The plaintext is then returned in the data object.
 * New interfaces gpgme_set_include_certs and gpgme_get_include_certs
   to set and get the number of certifications to include in S/MIME
   signed messages.
 * New interfaces gpgme_op_encrypt_sign and gpgme_op_encrypt_sign_start
   to encrypt and sign a message in a combined operation.
 * New interface gpgme_op_keylist_ext_start to search for multiple patterns.
 * gpgme_key_get_ulong_attr supports the GPGME_ATTR_EXPIRE attribute.
 * Interface changes relative to the 0.3.3 release:
 * Fix the Makefile in jnlib.
 * Fix the test suite (hopefully).  It should clean up all its state
   with `make check' now.
 * Remove erroneous dependency on libgcrypt in jnlib.
 * There is a Texinfo manual documenting the API.
 * The gpgme_set_keylist_mode function returns an error, and changed
   its meaning.  It is no longer usable to select between normal and
   fast mode (newer versions of GnuPG will always be fast), but
   selects between local keyring, remote keyserver, or both.
   For this, two new macros are defined, GPGME_KEYLIST_MODE_LOCAL
   and GPGME_KEYLIST_MODE_EXTERN.  To make it possible to modify the
   current setting, a fucntion gpgme_get_keylist_mode was added to
   retrieve the current mode.
 * gpgme_wait accepts a new argument STATUS to return the error status
   of the operation on the context.  Its definition is closer to
   waitpid() now than before.
 * The LENGTH argument to gpgme_data_new_from_filepart changed its
   type from off_t to the unsigned size_t.
 * The R_HD argument to the GpgmePassphraseCb type changed its type
   from void* to void**.
 * New interface gpgme_op_trustlist_end() to match
   gpgme_op_keylist_end().
 * The CryptPlug modules have been renamed to gpgme-openpgp and
   gpgme-smime, and they are installed in pkglibdir by `make install'.
 * An idle function can be registered with gpgme_register_idle().
 * The GpgSM backend supports key generation with gpgme_op_genkey().
2002-08-26 13:34:16 +00:00
jlam
1c57323789 Merge packages from the buildlink2 branch back into the main trunk that
have been converted to USE_BUILDLINK2.
2002-08-25 21:48:57 +00:00
jlam
efb93b17bd Merge changes in packages from the buildlink2 branch that have
buildlink2.mk files back into the main trunk.
2002-08-25 19:21:43 +00:00
jlam
e2afa97f51 Merge changes in packages from the buildlink2 branch that have
buildlink2.mk files back into the main trunk.  This provides sufficient
buildlink2 infrastructure to start merging other packages from the
buildlink2 branch that have already been converted to use the buildlink2
framework.
2002-08-25 18:38:05 +00:00
mjl
88c5d3a87e Correct man page xrefs pgp(1) -> pgp5(1).
Import some patches (via FreeBSD), one of them concerning weak rnd number
generation.
2002-08-25 15:18:41 +00:00
martti
1367771b0b Added avcheck 2002-08-23 11:49:35 +00:00
martti
76bc8a0610 Import avcheck-0.9
Avcheck is a simple program that allows you to call an antivirus software
in order to check mail messages for viruses before actual delivery from
within a Mail Transfer Agent, or MTA.
2002-08-23 11:47:48 +00:00
grant
9289b01b8f Remove Solaris specific SSH_PID_DIR, as Solaris 8/9 do indeed have a
/var/run directory, tmpfs is mounted on /var/run by default.

/var/run does not exist by default on Solaris 7, but some daemons
appear to make use of it after it is created (eg. syslogd).
2002-08-23 07:27:54 +00:00
martti
095cb3942b Updated amavis-perl to 20020531
* bug fixes
2002-08-22 11:27:16 +00:00
seb
30cb0aa238 Fix sparc64 build by patching sigs/sha/sha.c like the revision 1.6 of
basesrc/lib/libc/hash/sha1.c.
2002-08-20 17:19:34 +00:00
abs
6ea7067ecb openssl/buildlink.mk enforces OpenSSL>=0.9.5f due to the DoS fix. Do not bother
trying to ask for 0.9.5a as we will not be allowed to use it anyway.
2002-08-20 17:13:38 +00:00
abs
e5c2c56a75 Updated msu to 1.05 from 1.04
- Do not revoke existing group membership.
2002-08-20 15:00:03 +00:00
wiz
e6dacda517 Update HOMEPAGE. 2002-08-20 14:39:14 +00:00
fredb
6db5eceda2 Let build on sparc v7. 2002-08-19 18:34:54 +00:00
wiz
e439f721d6 Fix test for rc.d in configure script, so that this works on 1.4.x.
Gleaned from apache's startup script.
2002-08-19 17:30:05 +00:00
wiz
ce1ba0b1d2 Fix a comment, and improve pattern to also work on netbsd-1-4. 2002-08-19 16:00:06 +00:00
wiz
13ee19350f Compile no-shared on 1.4.x. This makes the package install and work for me
on 1.4.2/i386. Approved by agc.
2002-08-19 15:17:55 +00:00
shell
bf6674d483 Updated to p5-Net-SSLeay-1.19
Changes :
- further fixes for Net::SSLeay::Handle from jbowlin@@_linklint.org
- applied minor patch by Mark Veltzer <mark@@veltzer._org> to Makefile.PL
- Added SSL_peek patch to ssl_read_until from
  Peter Behroozi <peter@@fhpwireless_.com> --Sampo
- Improved Windows instructions per Marcel Bucher <marcle@bucher._cc>
2002-08-19 09:48:55 +00:00
agc
00bd77232a Add a patch to get this to compile on NetBSD. 2002-08-19 09:17:15 +00:00
agc
2df95bedb4 Provide a sensible default for BUILDLINK_DEPENDS.openssl - noticed when
the in-tree openssl is < 0.9.6f, a previous package build has installed
the openssl-0.9.6g package, but the BUILDLINK_DEPENDS.openssl value is
not initialised, so that the package infrastructure tries to build and
install the openssl-0.9.6g package again.
2002-08-16 19:41:14 +00:00
fredb
5677c8890c Revert Makefile,v.1.56, as the NetBSD patches were causing intractable
problems for Solaris. Instead, handle patch for NetBSD-1.4.2 specially.
2002-08-15 19:22:10 +00:00
wiz
646426f49f Remove (partly obsolete) homepage URLs from DESCR. 2002-08-15 09:39:18 +00:00
fredb
36090d2088 Really require 0.9.6g, if we require the package at all. 2002-08-15 01:14:32 +00:00
grant
7ad20a23f6 fix CFLAGS on big endian machines. 2002-08-14 02:39:30 +00:00
wiz
dd9794ac2f Update MASTER_SITES and HOMEPAGE. 2002-08-12 18:39:58 +00:00
fredb
be47ce1e19 Delete "No newline at end of file" garbage left by "mkpatches". 2002-08-11 00:50:36 +00:00
fredb
03a3cef468 It just occurred to me that the ${PATCHDIR} patches developed against the
NetBSD-patched codebase won't apply cleanly (or at all) without the NetBSD
patch. Therefore, remove the `.if ${OS}' condition for applying the patch,
so Solaris and Darwin start with the same codebase. Fix as needed.
2002-08-10 11:08:18 +00:00
itojun
b81f5f0022 require 0.9.6f, at least 2002-08-10 05:27:30 +00:00
fredb
d5e2ea6e68 Update to 0.9.6g. The most significant change is this proof against
a stunning DoS vulnerability, fixed in 0.9.6f:

  *) Use proper error handling instead of 'assertions' in buffer
     overflow checks added in 0.9.6e.  This prevents DoS (the
     assertions could call abort()).
     [Arne Ansper <arne@ats.cyber.ee>, Bodo Moeller]

Regenerate the netbsd patch. This is now a clean diff against the
vendor tag, with version-number-only changes elided.

Partially revert "crypto/dist/openssl/crypto/rand/randfile.c", version
1.4 (via additional pkgsrc patch), to give this a shot to compile on
NetBSD-1.4.2 and earlier, which had no strlcpy() or strlcat().

Assemble the shared library without "-Bsymbolic", mainly to give this
a shot at linking on NetBSD-a.out (untested).
2002-08-10 04:50:31 +00:00
jlam
577caefd40 Correctly set the value of SSLCERTS depending on the environment and the
platform.
2002-08-09 17:12:51 +00:00
jlam
8ad7767d39 * Change the perl paths in the various build scripts to ${PERL5} and not
${LOCALBASE}/bin/perl.

* Refer to the make program used to drive the build and installation as
  "${MAKE_PROGRAM}".

* Instead of explicitly setting PKG_SYSCONFBASE=/etc, use the pkg-specific
  override PKG_SYSCONFDIR.openssl, and optionally set it so that the
  user still has the option of overriding its value.

* Use bsd.pkg.install.mk to install the default config file (openssl.cnf)
  and to create and remove the extra config directories.  This lets us
  reemove the extra lines in PLIST that do the same thing.
2002-08-09 14:45:05 +00:00
jlam
7ddc05c158 Refer to the openssl config directory as ${PKG_SYSCONFDIR} as it differs
between platforms.
2002-08-09 14:35:55 +00:00
wiz
f889c7a852 Fix binary package, from Urban Boquist in pkg/17892.
While here, update MASTER_SITES, all the previous ones were not carrying
the file anymore.
2002-08-09 13:03:19 +00:00
agc
1744618535 Fix a problem shown up in the last bulk build 2002-08-07 13:27:51 +00:00
fredb
abd1be5e66 Remove my macros for missing strlcpy() and strncpy() which aren't correct,
and don't actually work.
2002-08-07 10:30:53 +00:00
jlam
b23b831acc Merge security/uvscan-dat into security/uvscan. The uvscan-dat package is
out-of-date very frequently, and it's sole purpose seems to be to provide
the uvscan package with the update_dat script so that uvscan can keep
up-to-date with the latest virus definitions.

A MESSAGE file has been added to security/uvscan that recommends running
"update_dat" to update the virus definitions database to the most recent
version after installation.  The update_dat script has also been rewritten
to allow the new syntax "update -f <DATFILE>" to update from an already-
downloaded DATFILE, so users will still be able to do bulk downloads to
removable media on a machine with a fat connection and be able to compile
and install a usable uvscan package on another machine.

Bump the PKGREVISION on uvscan to 1 and mark the CONFLICT with the obsolete
uvscan-dat packages.
2002-08-07 05:42:12 +00:00
zuntum
ea2cb17fc2 Do not list homepage in DESCR 2002-08-06 01:49:11 +00:00
cjs
57beeb4962 Move pscan from net to security. 2002-08-06 01:49:07 +00:00
cjs
2bc3282372 PScan is a C source code security scanner, which looks for misuse of
libc functions which use varargs and printf-style formatting
operators. In many situations these can cause security vulnerabilities
in the application if it runs with privileges (setugid, or listening
to a network socket, etc).

An example of the kind of situation pscan looks for is the following:

  variable = "%s";                   /* or malicious user input */
  sprintf(buffer, variable);         /* BAD! */

WWW: http://www.striker.ottawa.on.ca/~aland/pscan/
2002-08-06 01:36:59 +00:00
seb
ebe13bfd06 Add and enable ssh2. 2002-08-06 00:56:37 +00:00
seb
2291c3b221 Initial import of ssh version 2.3.0 into the NetBSD Packages Collection.
This package provides Secure Shell client and server for V.2 SSH protocol
from SSH Communications Security.

Based on PR 15358 from Greg A. Woods <woods@planix.com>.
2002-08-06 00:48:09 +00:00
fredb
1ffcd53464 Make this work on platforms that don't have any base system "openssl",
includes (i.e NetBSD-1.4.3). Problem pointed out by Amitai Schlair.
2002-08-04 23:38:43 +00:00
fredb
d78c8fae4b Update openssl to 0.9.6e. This update fixes multiple vulnerabilities,
and also changes the ABI of "libcrypto" and "libssl". (So the shared
library majors and buildlink requirements are bumped, too.) The code
base is now synced perfectly with NetBSD HEAD and netbsd-1-6 branches
as of 2002-08-04, the optimization levels are reduced to "-O2", but
I've retained some of the processor optimization flags and different code
path #defines in the "Configure" script, just to keep things interesting.

The default "certs" directory on NetBSD is now "/etc/openssl/certs", to
give continuity to those who find themselves using the package system's
"openssl" after upgrading a package that formerly used the base system's.
[Suggested by itojun.] The best way to avoid such problems, however, is
to upgrade your base system *first*.

I'm making use of the new and improved build system as much as possible.
This gives us a cleaner way to make shared libraries and real man pages,
but loses many of the symlinks to the openssl binary.

I've culled items from the "CHANGES" file that appear to have security
implications or are particularly interesting for NetBSD users, below.
My comments are marked off with '===>'.

===> This is from the netbsd-20020804-patch

  *) Fix ASN1 checks. Check for overflow by comparing with LONG_MAX
     and get fix the header length calculation.
     [Florian Weimer <Weimer@CERT.Uni-Stuttgart.DE>,
      Alon Kantor <alonk@checkpoint.com> (and others),
      Steve Henson]

 Changes between 0.9.6d and 0.9.6e  [30 Jul 2002]

  *) New option
          SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS
     for disabling the SSL 3.0/TLS 1.0 CBC vulnerability countermeasure
     that was added in OpenSSL 0.9.6d.

     As the countermeasure turned out to be incompatible with some
     broken SSL implementations, the new option is part of SSL_OP_ALL.
     SSL_OP_ALL is usually employed when compatibility with weird SSL
     implementations is desired (e.g. '-bugs' option to 's_client' and
     's_server'), so the new option is automatically set in many
     applications.
     [Bodo Moeller]

  *) Changes in security patch:

     Changes marked "(CHATS)" were sponsored by the Defense Advanced
     Research Projects Agency (DARPA) and Air Force Research Laboratory,
     Air Force Materiel Command, USAF, under agreement number
     F30602-01-2-0537.

  *) Add various sanity checks to asn1_get_length() to reject
     the ASN1 length bytes if they exceed sizeof(long), will appear
     negative or the content length exceeds the length of the
     supplied buffer.
     [Steve Henson, Adi Stav <stav@mercury.co.il>, James Yonan <jim@ntlp.com>]

  *) Assertions for various potential buffer overflows, not known to
     happen in practice.
     [Ben Laurie (CHATS)]

  *) Various temporary buffers to hold ASCII versions of integers were
     too small for 64 bit platforms. (CAN-2002-0655)
     [Matthew Byng-Maddick <mbm@aldigital.co.uk> and Ben Laurie (CHATS)>

  *) Remote buffer overflow in SSL3 protocol - an attacker could
     supply an oversized session ID to a client. (CAN-2002-0656)
     [Ben Laurie (CHATS)]

  *) Remote buffer overflow in SSL2 protocol - an attacker could
     supply an oversized client master key. (CAN-2002-0656)
     [Ben Laurie (CHATS)]

 Changes between 0.9.6c and 0.9.6d  [9 May 2002]

  *) Implement a countermeasure against a vulnerability recently found
     in CBC ciphersuites in SSL 3.0/TLS 1.0: Send an empty fragment
     before application data chunks to avoid the use of known IVs
     with data potentially chosen by the attacker.
     [Bodo Moeller]

 Changes between 0.9.6a and 0.9.6b  [9 Jul 2001]

  *) Change ssleay_rand_bytes (crypto/rand/md_rand.c)
     to avoid a SSLeay/OpenSSL PRNG weakness pointed out by
     Markku-Juhani O. Saarinen <markku-juhani.saarinen@nokia.com>:
     PRNG state recovery was possible based on the output of
     one PRNG request appropriately sized to gain knowledge on
     'md' followed by enough consecutive 1-byte PRNG requests
     to traverse all of 'state'.

     1. When updating 'md_local' (the current thread's copy of 'md')
        during PRNG output generation, hash all of the previous
        'md_local' value, not just the half used for PRNG output.

     2. Make the number of bytes from 'state' included into the hash
        independent from the number of PRNG bytes requested.

     The first measure alone would be sufficient to avoid
     Markku-Juhani's attack.  (Actually it had never occurred
     to me that the half of 'md_local' used for chaining was the
     half from which PRNG output bytes were taken -- I had always
     assumed that the secret half would be used.)  The second
     measure makes sure that additional data from 'state' is never
     mixed into 'md_local' in small portions; this heuristically
     further strengthens the PRNG.
     [Bodo Moeller]

  *) The countermeasure against Bleichbacher's attack on PKCS #1 v1.5
     RSA encryption was accidentally removed in s3_srvr.c in OpenSSL 0.9.5
     when fixing the server behaviour for backwards-compatible 'client
     hello' messages.  (Note that the attack is impractical against
     SSL 3.0 and TLS 1.0 anyway because length and version checking
     means that the probability of guessing a valid ciphertext is
     around 2^-40; see section 5 in Bleichenbacher's CRYPTO '98
     paper.)

     Before 0.9.5, the countermeasure (hide the error by generating a
     random 'decryption result') did not work properly because
     ERR_clear_error() was missing, meaning that SSL_get_error() would
     detect the supposedly ignored error.

     Both problems are now fixed.
     [Bodo Moeller]

 Changes between 0.9.6 and 0.9.6a  [5 Apr 2001]

===> This is our ABI change.

  *) Rename 'des_encrypt' to 'des_encrypt1'.  This avoids the clashes
     with des_encrypt() defined on some operating systems, like Solaris
     and UnixWare.
     [Richard Levitte]

  *) Don't use getenv in library functions when run as setuid/setgid.
     New function OPENSSL_issetugid().
     [Ulf Moeller]

  *) Store verify_result within SSL_SESSION also for client side to
     avoid potential security hole. (Re-used sessions on the client side
     always resulted in verify_result==X509_V_OK, not using the original
     result of the server certificate verification.)
     [Lutz Jaenicke]

===> package doesn't doesn't do this. We'll bump major versions
===> as necessary.

  *) Make sure that shared libraries get the internal name engine with
     the full version number and not just 0.  This should mark the
     shared libraries as not backward compatible.  Of course, this should
     be changed again when we can guarantee backward binary compatibility.
     [Richard Levitte]


  *) Rework the system to generate shared libraries:

     - Make note of the expected extension for the shared libraries and
       if there is a need for symbolic links from for example libcrypto.so.0
       to libcrypto.so.0.9.7.  There is extended info in Configure for
       that.

     - Make as few rebuilds of the shared libraries as possible.

     - Still avoid linking the OpenSSL programs with the shared libraries.

     - When installing, install the shared libraries separately from the
       static ones.
2002-08-04 15:47:43 +00:00
tron
3101bc0f5c Fix dependence on "nmap" package. 2002-08-04 11:46:54 +00:00
veego
e835c7ce5a Remove lib/nessus/plugins_factory, which is in fact a directory and
later correctly used with the @dirrm prefix to be removed, but having
a second one here cause some problems while removing the package.
2002-08-04 08:02:38 +00:00
cjep
5d15456078 Update to 4216. 2002-08-02 21:49:58 +00:00
tron
24ff1640b7 Comment out master sites because the file on "ftp.openbsd.org" and
possibly on its mirrors is obviously infected with a trojan. The file
on "ftp.netbsd.org" is safe.
2002-08-01 08:35:45 +00:00
jschauma
e10e2a05bb Change MAINTAINER from tv at netbsd dot org to packages at netbsd dot org
after consulting with Todd.  Any volunteers for any of these packages?
2002-08-01 02:37:41 +00:00