Commit graph

5961 commits

Author SHA1 Message Date
pettai
52efe0b4b5 1.10:
- New Features:
    - New Apps:     (see the validator/apps directory for details)
                    - dnssec-check: check dnssec support from your ISP
                    - dnssec-nodes: graphically displays a DNS
                      hierarchy, color coded by each node's DNSSEC status
                    - dnssec-system-tray: displays pop-up
                      notifications when a libval-enabled application
                      triggers a DNSSEC error
                    - lookup: a graphical DNS lookup utility that
                      displays the results in a hierarchical tree and
                      color codes the window according to DNSSEC status

    - libval:       - Added support for building on Windows.
                    - added support for falling back to recursion when
                      the caching name server does not appear to
                      support DNSSEC. This also works as a mechanism
                      to work around poisoned or misbehaving cache.
                    - Significant improvements to the the asynchronous support.
    - lsdnssec:     - Improvements to lsdnssec to display different
                      output depending on whether a zone is a
                      stand-alone zone or under control of rollerd.
    - nagios:       - Plugins for the nagios monitoring system which
                      enable monitoring of zone rollerover states.
    - firefox:      - Improved patches that work with the most recent firefox

 Plus many more minor features and bug fixes

1.9:
 - New Features:
    - lsdnssec:     - Added a new flag (-p) to show only zones in a
                      particular rollerd phase.
                    - fixed bugs to align timing output with rollerd.
    - rollerd:      - Added a -logtz flag for logging timezones
                    - fixed bugs related to the -alwayssign flag.
                    - zonesigner's path is taken from the config file.
    - rollctl:      - Added -rollall and -rollzone options.
    - zonesigner:   - Assumes keys need to be generated for new zones
                      (Assumes -genkeys option was given if a keyrec file
                      can't be found.)
                    - Exits with unique exit codes if a failure occurs.
                      ("zonesigner -xc CODE" can lookup a description for it.")
                    - Added the -phase option so rollover options could be
                      more easily specified.
    - lights:       - A simple GUI to check the status of rollover states
    - blinkenlights:- Added hide/show commands for rollrec names and zone
                      names, for split-zone support
    - cleankrf:     - Fixed deletion of obsolete set keyrecs.
    - GUI commands: - Fixed how the Exit command works so they don't coredump.

    - libsres
      & libval:     - New beta support for issuing asynchronous requests.
                      This can speed up queries by up to 4 times if used.
                      (see example code in validator/apps/validator_selftest.c)
                    - NSEC3, DLV and IPv6 are enabled by default.
                    - improved logging and logging-callback support.
    - drawvalmap    - Can output PNG files now

 - Packaging:
                    - Our download page now allows you to download
                      the C validator libraries independently of the
                      full DNNSEC-Tools tool-suite.

 - Many bugs were also fixed in the 240+ changes.
2011-07-27 05:30:31 +00:00
pettai
4d7e026284 OpenDNSSEC 1.3.0
* Include simple-dnskey-mailer-plugin in dist.
* Enforcer: Change message about KSK retirement to make it less confusing.

Bugfixes:
* ods-control: If the Enforcer did not close down, you entered an infinite loop.
* Signer Engine: Fix log message typos.
* Signer Engine: Fix crash where ods-signer update
* Signer Engine: Also replace DNSKEYs if <DNSKEY><TTL> has changed in policy.
* Zonefetcher: Sometimes invalid 'Address already in use' occurred.
* Bugfix #247: Fixes bug introduced by bugfix #242.


OpenDNSSEC 1.3.0rc3

* Do not distribute trang.

Bugfixes:
* Fix test for java executable and others.
* Auditor: Fix delegation checks.
* Bugfix #242: Race condition when receiving multiple NOTIFIES for a zone.
* ods-kaspcheck: Do not expect resalt in NSEC policy.
* Signer Engine: Ifdef a header file.
* Signer Engine: The default working directory was not specified.
* Signer Engine: Handle stdout console output throttling that would
  truncate daemon output intermittently.


OpenDNSSEC 1.3.0.rc2

* Match the names of the signer pidfile and enforcer pidfile.
* Include check for resign < resalt in ods-kaspcheck.

Bugfixes:
* Bugfix #231: Fix MySQL version check.
* ods-ksmutil: Update now sends a HUP to the enforcerd.
* Signer Engine: Fix assertion failure if zone was just added.
* Signer Engine: Don't hsm_close() on setup error.
* Signer Engine: Fix race condition bug when doing a single run.
* Signer Engine: In case of failure, also mark zone processed (single run).
* Signer Engine: Don't leak backup file descriptor.
* signconf.rnc now allows NSEC3 Iterations of 0


OpenDNSSEC 1.3.0rc1

* <SkipPublicKey/> is enabled for SoftHSM in the default configuration.
  It improves the performance by only using the private key objects.
* Document the <RolloverNotification> tag in conf.xml.

Bugfixes:
* Bugfix #221: Segmentation Fault on schedule.c:232
* Enforcer: 'make check' now works.
* Enforcer: Fixed some memory leaks in the tests.
* Signer Engine: Coverity report fixes some leaks and thread issues.
* Signer Engine: Now logs to the correct facility again.


OpenDNSSEC 1.3.0b1

* Support for signing the root. Use the zone name "."
* Enforcer: Stop import of policy if it is not consistent.
* ods-signer: The queue command will now also show what tasks the workers
  are working on.
* Signer Engine: Just warn if occluded zone data was found, don't stop signing p
rocess.
* Signer Engine: Simpler serial maintenance, reduces the number of conflicts.
  Less chance to hit a 'cannot update: serial too small' error message.
* Signer Engine: Simpler NSEC(3) maintenance.
* Signer Engine: Temperate the number of backup files.
* Signer Engine: Set number of <SignerThreads> in conf.xml to
  get peak performance from HSMs that can handle multiple threads.

Bugfixes:
* Bugreport #139: ods-auditor fails on root zone.
* Bugreport #198: Zone updates ignored?
* Replace tab with white-space when writing to syslog.
* Signer Engine: Do not block update command while signing.
2011-07-27 03:13:25 +00:00
adam
19799c1dc3 Changes 0.97.2
ClamAV 0.97.2 fixes problems with the bytecode engine, Safebrowsing detection,
hash matcher, and other minor issues. Please see the ChangeLog file for
details.
2011-07-25 22:59:12 +00:00
obache
35f7f67dfa Update py-paramiko to 1.7.7.1.
various bug fixes; requires pycrypto 2.1. or newer
2011-07-22 14:03:30 +00:00
obache
8692ff62cb recursive bump from gnome-vfs drop crypto dependency. 2011-07-21 13:05:46 +00:00
asau
3238f916d8 Regenerate checksum for patches. 2011-07-16 11:18:32 +00:00
drochner
92c167970f disable AESNI support for now, until we have a method to tell whether
the assembler supports the needed SSE commands, to allow building
on NetBSD-5, in response to a report by Marc Baudoin to pkgsrc-users
2011-07-15 20:58:56 +00:00
drochner
9d0ea6ecc9 propagate libtasn1 dependency, should fix seahorse build failure
reported by Ryo ONODERA per PR pkg/45144
2011-07-14 14:53:42 +00:00
obache
ee404dfb29 Fixes PKGCONFIG_OVERRIDE settings:
* No need to prefix with ${WRKSRC}.
* It must not be overwritten multiple time, or only last one will be activate.
* library/gnome-keyring part is now in separate libgnome-keyring package.

Bump PKGREVISION.
2011-07-14 14:25:45 +00:00
taca
743ad89c72 Re-add entries for gcrypt.tar.bz2 which neede by idea PKG_OPTIONS. 2011-07-14 01:03:35 +00:00
adam
833ca25fa0 Changes 1.5.0:
* New function gcry_kdf_derive implementing OpenPGP S2K algorithms
  and PBKDF2.
* Support for WindowsCE.
* Support for ECDH.
* Support for OAEP and PSS methods as described by RFC-3447.
* Fixed PKCS v1.5 code to always return the leading zero.
* New format specifiers "%M" and "%u" for gcry_sexp_build.
* Support opaque MPIs with "%m" and "%M" in gcry_sexp_build.
* New functions gcry_pk_get_curve and gcry_pk_get_param to map ECC
  parameters to a curve name and to retrieve parameter values.
* gcry_mpi_cmp applied to opaque values has a defined semantic now.
* Uses the Intel AES-NI instructions if available.
* The use of the deprecated Alternative Public Key Interface
  (gcry_ac_*) will now print compile time warnings.
* The module register subsystem has been deprecated.  This subsystem
  is not flexible enough and would always require ABI changes to
  extend the internal interfaces.  It will eventually be removed.
  Please contact us on the gcrypt-devel mailing list to discuss
  whether you really need this feature or how it can be replaced by
  an internal plugin mechanism.
* CTR mode may now be used with data chunks of arbitrary length.
2011-07-13 21:21:52 +00:00
drochner
7e747b8e1c update to 2.12.7
changes:
-bugfixes
-minor feature additions
pkgsrc change: since the pkg was changed to build against "nettle"
instead of libgcrypt (whether this was a good idea or not...), the
latter isn't needed anymore, so remove the stale dependency
This can cause build breakage -- in this case addition of a local
dependency should restore the old state. (This dependency is technically
unnecessary often, but the assumption that gnutls needs libgcrypt
is sometimes hardwired in configure scripts and/or code.)
2011-07-11 16:10:29 +00:00
ryoon
f772ddbdd0 Update to 4.39
Version 4.39, 2011.07.06, urgency: LOW:

    New features
        New Win32 installer module to build self-signed stunnel.pem.
        Added configuration file editing with Windows GUI.
        Added log file reopening file editing with Windows GUI. It might be useful to also implement log file rotation.
        Improved configuration file reload with Windows GUI.

Version 4.38, 2011.06.28, urgency: MEDIUM:

    New features
        Server-side SNI implemented (RFC 3546 section 3.1) with a new service-level option "nsi".
        "socket" option also accepts "yes" and "no" for flags.
        Nagle's algorithm is now disabled by default for improved interactivity.
    Bugfixes
        A compilation fix was added for OpenSSL version < 1.0.0.
        Signal pipe set to non-blocking mode. This bug caused hangs of stunnel features based on signals, e.g. local mode, FORK threading, or configuration file reload on Unix. Win32 platform was not affected.

Version 4.37, 2011.06.17, urgency: MEDIUM:

    New features
        Client-side SNI implemented (RFC 3546 section 3.1).
        Default "ciphers" changed from the OpenSSL default to a more secure and faster "RC4-MD5:HIGH:!aNULL:!SSLv2". A paranoid (and usually slower) setting would be "HIGH:!aNULL:!SSLv2".
        Recommended "options = NO_SSLv2" added to the sample stunnel.conf file.
        Default client method upgraded from SSLv3 to TLSv1. To connect servers without TLS support use "sslVersion = SSLv3" option.
        Improved --enable-fips and --disable-fips ./configure option handling.
        On startup stunnel now compares the compiled version of OpenSSL against the running version of OpenSSL. A warning is logged on mismatch.
    Bugfixes
        Non-blocking socket handling in local mode fixed (Debian bug #626856).
        UCONTEXT threading mode fixed.
        Removed the use of gcc Thread-Local Storage for improved portability.
        va_copy macro defined for platforms that do not have it.
        Fixed "local" option parsing on IPv4 systems.
        Solaris compilation fix (redefinition of "STR").

Version 4.36, 2011.05.03, urgency: LOW:

    New features
        Updated Win32 DLLs for OpenSSL 1.0.0d.
        Dynamic memory management for strings manipulation: no more static STRLEN limit, lower stack footprint.
        Strict public key comparison added for "verify = 3" certificate checking mode (thx to Philipp Hartwig).
        Backlog parameter of listen(2) changed from 5 to SOMAXCONN: improved behavior on heavy load.
        Example tools/stunnel.service file added for systemd service manager.
    Bugfixes
        Missing pthread_attr_destroy() added to fix memory leak (thx to Paul Allex and Peter Pentchev).
        Fixed the incorrect way of setting FD_CLOEXEC flag.
        Fixed --enable-libwrap option of ./configure script.
        /opt/local added to OpenSSL search path for MacPorts compatibility.
        Workaround implemented for signal handling on MacOS X.
        A trivial bug fixed in the stunnel.init script.
        Retry implemented on EAI_AGAIN error returned by resolver calls.

Version 4.35, 2011.02.05, urgency: LOW:

    New features
        Updated Win32 DLLs for OpenSSL 1.0.0c.
        Transparent source (non-local bind) added for FreeBSD 8.x.
        Transparent destination ("transparent = destination") added for Linux.
    Bugfixes
        Fixed reload of FIPS-enabled stunnel.
        Compiler options are now auto-detected by ./configure script in order to support obsolete versions of gcc.
        Async-signal-unsafe s_log() removed from SIGTERM/SIGQUIT/SIGINT handler.
        CLOEXEC file descriptor leaks fixed on Linux >= 2.6.28 with glibc >= 2.10. Irreparable race condition leaks remain on other Unix platforms. This issue may have security implications on some deployments: http://udrepper.livejournal.com/20407.html
        Directory lib64 included in the OpenSSL library search path.
        Windows CE compilation fixes (thx to Pierre Delaage).
        Deprecated RSA_generate_key() replaced with RSA_generate_key_ex().
    Domain name changes (courtesy of Bri Hatch)
        http://stunnel.mirt.net/ --> http://www.stunnel.org/
        ftp://stunnel.mirt.net/ --> http://ftp.stunnel.org/
        stunnel.mirt.net::stunnel --> rsync.stunnel.org::stunnel
        stunnel-users@mirt.net --> stunnel-users@stunnel.org
        stunnel-announce@mirt.net --> stunnel-announce@stunnel.org

Version 4.34, 2010.09.19, urgency: LOW:

    New features
        Updated Win32 DLLs for OpenSSL 1.0.0a.
        Updated Win32 DLLs for zlib 1.2.5.
        Updated automake to version 1.11.1
        Updated libtool to version 2.2.6b
        Added ECC support with a new service-level "curve" option.
        DH support is now enabled by default.
        Added support for OpenSSL builds with some algorithms disabled.
        ./configure modified to support cross-compilation.
        Sample stunnel.init updated based on Debian init script.
    Bugfixes
        Implemented fixes in user interface to enter engine PIN.
        Fixed a transfer() loop issue on socket errors.
        Fixed missing WIN32 taskbar icon while displaying a global option error.
2011-07-11 14:20:23 +00:00
obache
2e371ed07c Update ruby-oauth to 0.4.5.
=== 0.4.5 2011-06-25

* Add explicit require for rsa/sha1 (Juris Galang)
* Use webmock to mock all http-requests in tests (Adrian Feldman)
* Add gemtest support (Adrian Feldman)
* Fix POST Requests with Typhoeus proxy (niedhui)
* Mention Typhoeus require in the README (Kim Ahlström)
* Fix incorrect hardcoded port (Ian Taylor)
* Use Net::HTTPGenericRequest (Jakub Kuźma)
2011-07-11 11:28:34 +00:00
drochner
27fb61f660 -depend on libgcrypt explicitely
(gnutls used to pull it in for us, but this will be cleaned up)
-libgnutls-config isn't needed (uses pkg-config)
2011-07-11 10:55:46 +00:00
obache
25be26fdd5 + ruby-twitter_oauth 2011-07-11 08:55:15 +00:00
obache
d1a686afa9 Import ruby-twitter_oauth-0.4.3 as security/ruby-twitter_oauth.
twitter_oauth is a Ruby client for the Twitter API using OAuth.
2011-07-11 08:53:47 +00:00
drochner
178b2d3c3b depend on libgcrypt explicitely
(gnutls used to pull it in for us, but this will be cleaned up)
also remove an assumption about time_t size which fails on NetBSD-current
2011-07-08 11:47:28 +00:00
adam
e9a9cefac0 Changes 1.8.4:
This is primarily a bugfix release.
Fix vulnerabilities:
* KDC uninitialized pointer crash [MITKRB5-SA-2010-006 CVE-2010-1322]
* kpropd denial of service [MITKRB5-SA-2011-001 CVE-2010-4022]
* KDC denial of service attacks [MITKRB5-SA-2011-002 CVE-2011-0281 CVE-2011-0282 CVE-2011-0283]
* KDC double-free when PKINIT enabled [MITKRB5-SA-2011-003 CVE-2011-0284]
* kadmind frees invalid pointer [MITKRB5-SA-2011-004 CVE-2011-0285]
Interoperability:
* Correctly encrypt GSSAPI forwarded credentials using the session key, not
  a subkey.
* Set NT-SRV-INST on TGS principal names as expected by some Windows Server
  Domain Controllers.
* Don't reject AP-REQ messages if their PAC doesn't validate; suppress the PAC
  instead.
* Correctly validate HMAC-MD5 checksums that use DES keys
2011-07-08 09:59:28 +00:00
adam
169afc7d7b Changes 1.4:
New features
* Support for reading MIT database file directly
* KCM is polished up and now used in production
* NTLM first class citizen, credentials stored in KCM
* Table driven ASN.1 compiler, smaller!, not enabled by default
* Native Windows client support
Notes
* Disabled write support NDBM hdb backend (read still in there) since
  it can't handle large records, please migrate to a diffrent backend
  (like BDB4)

Changes 1.3.3:
Bug fixes
* Check the GSS-API checksum exists before trying to use it [CVE-2010-1321]
* Check NULL pointers before dereference them [kdc]

Changes 1.3.2:
Bug fixes
* Don't mix length when clearing hmac (could memset too much)
* More paranoid underrun checking when decrypting packets
* Check the password change requests and refuse to answer empty packets
* Build on OpenSolaris
* Renumber AD-SIGNED-TICKET since it was stolen from US
* Don't cache /dev/*random file descriptor, it doesn't get unloaded
* Make C++ safe
* Misc warnings
2011-07-08 09:49:21 +00:00
adam
38a2c332ee Changes 0.97.1:
This is a bugfix release recommended for all users. Please refer to the
ChangeLog file for details.
2011-07-08 09:28:06 +00:00
tez
60a5596d38 Add fix for MITKRB5-SA-2011-005 (ftpd fails to setegid from daemon) 2011-07-05 19:48:59 +00:00
dholland
edfbf7955c Fix broken build. Needs explicit -lgcrypt. Add comment to patch-aa. 2011-07-05 05:02:10 +00:00
tez
2269c189c8 Correct the fix for http://secunia.com/advisories/44572/
See the thread here:
  http://www.mail-archive.com/openssl-dev@openssl.org/msg29283.html
2011-07-04 14:42:56 +00:00
obache
72e2ec96ad * set LICENSE=gnu-gpl-v2 # or later
* Allow to build with builtin libevent, because just libevent>=1.0 is required,
  and builtin libevent version detection was added quite a few years ago.
  No bump PKGREVISION, because it is impossible to build with libevent-2
  from pkgsrc.
2011-06-23 05:12:12 +00:00
drochner
255323b5fd add patch from upstream to fix a sign extension problem which
breaks blowfish password hashes for non-ASCII characters
bump PKGREV
2011-06-20 09:17:50 +00:00
taca
0a2bded7ed Update sudo package to 1.7.6.2 (1.7.6p2).
What's new in Sudo 1.7.6p2

 * Two-character CIDR-style IPv4 netmasks are now matched correctly
   in the sudoers file.

 * A build error with MIT Kerberos V has been resolved.

What's new in Sudo 1.7.6p1

 * A non-existent includedir is now treated the same as an empty
   directory and not reported as an error.

 * Removed extraneous parens in LDAP filter when sudoers_search_filter
   is enabled that can cause an LDAP search error.
2011-06-19 15:54:55 +00:00
taca
d99e1c1627 Add and enable ruby-bcrypt. 2011-06-19 03:20:04 +00:00
taca
a01d055a6d Importing ruby-bcrypt version 2.1.4 package.
bcrypt() is a sophisticated and secure hash algorithm designed by The
OpenBSD project for hashing passwords. bcrypt-ruby provides a simple,
humane wrapper for safely handling passwords.

= bcrypt-ruby

An easy way to keep your users' passwords secure.

* http://bcrypt-ruby.rubyforge.org/
* http://github.com/codahale/bcrypt-ruby/tree/master

== Why you should use bcrypt

If you store user passwords in the clear, then an attacker who steals
a copy of your database has a giant list of emails and passwords. Some
of your users will only have one password -- for their email account,
for their banking account, for your application. A simple hack could
escalate into massive identity theft.

It's your responsibility as a web developer to make your web
application secure -- blaming your users for not being security
experts is not a professional response to risk.

bcrypt allows you to easily harden your application against these
kinds of attacks.
2011-06-19 03:17:32 +00:00
uebayasi
7c190b191f Support user-destdir. 2011-06-14 14:07:37 +00:00
obache
9297f1831d recursive bump from icu shlib major bump. 2011-06-10 21:57:06 +00:00
drochner
eef8ae78bc add a hint for gnupg2 users (as claws-mail with the s/mime plugin) 2011-06-10 16:23:45 +00:00
obache
9572f6d892 recursive bump from textproc/icu shlib major bump. 2011-06-10 09:39:41 +00:00
obache
b99878c526 Update ruby-roauth to 0.0.7.
bug fixes.
2011-06-10 02:09:57 +00:00
adam
6f3b27380b Changes 1.6.1:
* build: Demand gettext >= 0.18.1 in order to get newer M4 files.
  The old M4 files associated with 0.17 caused problems on Solaris,
  which will hopefully be fixed with this.
* doc: Typo fix in autoconf snippet.
* i18n: Updated translations.
2011-06-01 10:05:57 +00:00
adam
6c122d287c Fix building with Clang 2011-06-01 09:57:23 +00:00
tez
2d2ed9a86a Add protection against ECDSA timing attacks as mentioned in the paper
by Billy Bob Brumley and Nicola Tuveri, see:
  http://eprint.iacr.org/2011/232.pdf
[Billy Bob Brumley and Nicola Tuveri]

(patch confirmed in upstream cvs)
2011-05-31 17:18:42 +00:00
cheusov
3d07d2b7a8 DESCR_SRC now contains full paths to DESCR files 2011-05-28 10:15:14 +00:00
cheusov
cfbc347f65 add heirloom-su, oked by sponsors 2011-05-28 08:37:10 +00:00
cheusov
9fd6d249be heirloom part 2011-05-28 08:36:05 +00:00
wiz
a2ce0d57a8 Bump PKGREVISION for dependency removal. 2011-05-27 18:50:48 +00:00
hans
ef11c9f19f libgnome-keyring 2.32.0 does not depend on eggdbus anymore, according to
http://mail.gnome.org/archives/gnome-announce-list/2010-September/msg00101.html
2011-05-27 14:02:57 +00:00
kivinen
727a619126 Added support for new 2048 bit FINEID cards. 2011-05-27 10:05:52 +00:00
obache
1fa52dbda9 * LICENSE=gnu-gpl-v2 # or later
* honor PKGMANDIR
* add user-destdir installation support
* use ${PERL5} as shebang, not /usr/bin/env.

Bump PKGREVISION.
2011-05-26 13:32:26 +00:00
drochner
ade1bcc810 add patch from upstream to make network connections (to fetch CRLs)
non-blocking. Blocking can be considered a DOS problem because other
requests are not served in that time. (SA44680, no CVE entry)
bump PKGREV
2011-05-25 09:29:05 +00:00
adam
05cf5d6011 Changes 0.12:
* OpenSSL/crypto/x509.c: Add get_extension_count and get_extension
  to the X509 type, allowing read access to certificate extensions.
* OpenSSL/crypto/x509ext.c: Add get_short_name and get_data to the
  X509Extension type, allowing read access to the contents of an
  extension.
* OpenSSL/ssl/ssl.c: Expose a number of symbolic constants for
  values passed to the connection "info" callback.
* OpenSSL/ssl/connection.py: Add support for new-style
  buffers (primarily memoryviews) to Connection.send and
  Connection.sendall.
2011-05-20 11:05:33 +00:00
drochner
7331326742 make this build again on NetBSD-current 2011-05-19 15:48:41 +00:00
drochner
f067b9b9a1 update to 1.2.18
change: fixes a serious crasher
2011-05-18 10:51:38 +00:00
drochner
ff5d4eba24 this pkg only installs binaries -- no need to propagate library
dependencies
2011-05-18 10:11:47 +00:00
taca
580e7ecb84 Don't always try to create ecdsa key which depends on OpenSSL's version.
Bump PKGREVISION.
2011-05-17 03:26:52 +00:00
taca
d159b739ef Maintenance of openssh pacakge:
1. Add support for check and create ECDSA host key for SSH protocol
   version 2.

2. Disable use of strnvis(3) on NetBSD.  NetBSD current after 2011/03/12
   has strnvis(3), but it has different argument from OpenBSD (and other
   system).

Bump PKGREVISION.
2011-05-16 05:06:48 +00:00
gls
b182bb8a54 Update security/ruby-net-ssh-gateway to version 1.1.0
Upstream changes:

1.1.0 / 30 Apr 2011

    * Fix for sporadicly stalled SSH connections in Ruby 1.9 [Mat Trudel]
    * Decrease wait time within Net::SSH session loop [Grant Hutchins, Michael
Schubert]
2011-05-15 19:34:51 +00:00
gls
2e6da0052c Update security/ruby-net-ssh to version 2.1.4.
Upstream changes:

2.1.4 / 3 Apr 2011

    * Add ConnectionTimeout exception class. [Joel Watson]

        See: https://github.com/net-ssh/net-ssh-multi/pull/1

2.1.3 / 2 Mar 2011

    * Call to transport.closed should be transport.close [Woon Jung]

2.1.2 / 1 Mar 2011

    * Fix for Net::SSH Continues to attempt authentication when notified it is
not allowed [Eric Hodel]
(see: http://net-ssh.lighthouseapp.com/projects/36253-net-ssh/tickets/26)
    * Fix for transport won't be closed if authentication fails [Patrick Marchi]

2.1 / 19 Jan 2011

    * Support "IdentitiesOnly" directive (LH-24) [Musy Bite, Edmund Haselwanter]
    * Speeding up the Loggable module (LH-23) [robbebob]

2.0.24 / 14 Jan 2011

    * Fix for process code to correctly wait until remote_id is set before
sending any output, including eof. [Daniel Pittman, Markus Roberts]
    * Fix circular require warning in Ruby 1.9.2 [Gavin Brock]
2011-05-15 19:31:55 +00:00
wiz
6cfafe5d68 Finish move of tarsnap from security to sysutils. 2011-05-15 11:17:51 +00:00
taca
b834a6808d Update openssh package to 5.8.2 (5.8p2).
20110403
 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
   [contrib/suse/openssh.spec] Prepare for 5.8p2 release.
 - (djm) [version.h] crank version
 - Release 5.8p2

20110329
 - (djm) [entropy.c] closefrom() before running ssh-rand-helper; leftover fds
   noticed by tmraz AT redhat.com

20110221
 - (dtucker) [contrib/cygwin/ssh-host-config] From Corinna: revamp of the
   Cygwin-specific service installer script ssh-host-config.  The actual
   functionality is the same, the revisited version is just more
   exact when it comes to check for problems which disallow to run
   certain aspects of the script.  So, part of this script and the also
   rearranged service helper script library "csih" is to check if all
   the tools required to run the script are available on the system.
   The new script also is more thorough to inform the user why the
   script failed.  Patch from vinschen at redhat com.

20110206
 - (dtucker) [openbsd-compat/port-linux.c] Bug #1851: fix syntax error in
   selinux code.  Patch from Leonardo Chiquitto
 - (dtucker) [contrib/cygwin/ssh-{host,user}-config]  Add ECDSA key
   generation and simplify.  Patch from Corinna Vinschen.
2011-05-15 04:17:15 +00:00
adam
bf616e57eb Fix building on systems, where ulong is not defined. 2011-05-12 12:54:17 +00:00
reed
4f7f4a21b8 Remove the REPLACE_PYTHON. It pointed to unused "perl" file.
It is not needed since python is ran directly.
2011-05-10 13:01:01 +00:00
obache
c468aabcb7 Update ruby-simple_oauth to 0.1.5.
* Rakefiles are executables, and rake loads rake, not rakefile code
* Replace rcov with simplecov
* Convert README to Markdown
* Convert LICENSE to Markdown
* Replace rdoc with yard
* Add turn in development for more verbose test output
* Trust the load path
* Remove vestigial VERSION file
* Add Travis configuration file
* Bundle setup before running tests
* Require rubygems
* Add bundler as a development dependency
* Apparently, Object#tap was added in 1.8.7, not 1.9
* Add jruby-openssl dependency
* Add link to Travis CI
* Remove vestigial rdoc options from gem specification
* Bump version to 0.1.5
2011-05-07 03:01:35 +00:00
alnsn
e5cee11ab4 pass --libdir to ./configure to fix lib64 vs lib confusion on linux 2011-05-06 19:30:13 +00:00
adam
c01bda295d Fix buildling with Clang 2011-05-05 08:55:23 +00:00
pettai
c2d7d13fb6 SoftHSM 1.2.1 - 2011-05-03
* Backport mutex handling from v2 for increased multithreaded
  performance.
* Remove signature verification used for debugging purposes.
  (was enabled with ./configure --enable-sigver)
* Added an index to the attribute table in the database.
* Optimization of the database handling.
2011-05-04 10:10:18 +00:00
agc
8f89163b4d Update liboauth from 0.8.9 to 0.9.4.
Changes since previous version:

	version 0.9.4
	  - fixed possible memory corrution in oauth_curl_get
		  thanks to Bruce Rosen for reporting this issue

	version 0.9.3
	 - yet more build-system fixes:
	   - allow to override HASH_LIBS and CURL_LIBS using envoronment variables
	   - include them in .pc and tests/Makefile.am

	version 0.9.2
	 - fixed typo in build-system (LDFLAGS, -Wl,--as-needed detection)

	version 0.9.1
	 - fixed typo in API:
	   oauth_time_indepenent_equals[_n] is now deprecated in favor of
		 oauth_time_independent_equals[_n]
	 - added check for 'Wl,--as-needed' linker flag.

	version 0.9.0
	 - fixed typo in pkg-config file.

With thanks to Brad Harder for the nudge.
2011-05-03 14:23:57 +00:00
adam
b1b4ab80d8 Fix building with Clang 2011-05-02 21:27:15 +00:00
obache
fd208e2f14 Add a patch for lack of posix standard AF_LOCAL, fall back to AF_UNIX.
for PR#44924.
2011-05-02 09:27:43 +00:00
wiz
c774ff630c Add archivers and sysutils to CATEGORIES, per gdt. 2011-05-01 08:28:24 +00:00
wiz
d5f4fb1447 + tarsnap. 2011-04-30 12:21:43 +00:00
wiz
3036a9ddc8 Initial import of tarsnap-1.0.29:
Tarsnap is a secure online backup service for BSD, Linux, OS X,
Solaris, Cygwin, and can probably be compiled on many other UNIX-like
operating systems. The Tarsnap client code provides a flexible and
powerful command-line interface which can be used directly or via
shell scripts.
2011-04-30 12:21:05 +00:00
taca
3be650a428 More replace interpreter. 2011-04-29 16:51:27 +00:00
adam
fbbddcc89d Changes 1.08:
* Do not attempt to logout if uninitialized.
* Use OpenSSL engine's rsa_priv_enc instead of rsa_sign.

Changes 1.07:
* Minor Win64 fixup.
2011-04-28 07:20:46 +00:00
tnn
f3fb7683e8 "pkg-config --cflags gnutls" failed with:
Package zlib was not found in the pkg-config search path.

... there is no zlib.pc, so comment out the part of the configure
script that adds that to the pkg-config file.
Bump PKGREVISION.
2011-04-27 16:56:43 +00:00
obache
306257aa5f need to buildlink with security/nettle.
fixes PR#44909.
2011-04-27 07:19:06 +00:00
adam
cd4fcaa944 Changes 2.12.3:
* libgnutls: Several minor bugfixes.
* libgnutls: Restored HMAC-MD5 for compatibility. Although considered weak,
  several sites require it for connection. It is enabled for "NORMAL" and
  "PERFORMANCE" priority strings.
* libgnutls: depend on libdl.
* libgnutls: gnutls_transport_set_global_errno() was deprecated. Use your
  system's errno fascility or gnutls_transport_set_errno().
* gnutls-cli: Correction with usage of select to check for pending data in
  gnutls sessions. It now uses gnutls_record_check_pending().
* tests: More fixes and updates for win32. Patches by LRN.
* libgnutls: Several files unnecessarily included <gcrypt.h>; this has been
  fixed.
** API and ABI modifications: gnutls_transport_set_global_errno: DEPRECATED

Changes 2.12.2:
* libgnutls: Several updates and fixes for win32. Patches by LRN.
* libgnutls: Several bug and memory leak fixes.
* srptool: Accepts the -d option to enable debugging.
* libgnutls: Corrected bug in gnutls_srp_verifier() that prevented the
  allocation of a verifier. Reported by Andrew Wiseman.

Changes 2.12.1:
* certtool: Generated certificate request with stricter permissions.
* libgnutls: Bug fixes in opencdk code. Reported by Vitaly Kruglikov.
* libgnutls: Corrected windows system_errno() function prototype.
* libgnutls: C++ compatibility fix for compat.h. Reported by Mark Brand.
* libgnutls: Fix size of gnutls_openpgp_keyid_t by using the
  GNUTLS_OPENPGP_KEYID_SIZE definition. Reported by Andreas Metzler.
2011-04-26 10:35:29 +00:00
adam
ccb449e062 buildlink3.mk depends on gmp, even when includes are needed; use MAJOR/MINOR for linking libraries 2011-04-26 09:54:55 +00:00
adam
26f46192e6 Actually, prefer gm4 2011-04-26 09:39:02 +00:00
adam
f2a1d09d28 Added security/nettle version 2.1 2011-04-26 09:01:12 +00:00
adam
40ef3874e4 Nettle is a cryptographic library that is designed to fit easily in more
or less any context: In crypto toolkits for object-oriented languages
(C++, Python, Pike, ...), in applications like LSH or GNUPG, or even in
kernel space. In most contexts, you need more than the basic
cryptographic algorithms, you also need some way to keep track of available
algorithms, their properties and variants. You often have some algorithm
selection process, often dictated by a protocol you want to implement.

And as the requirements of applications differ in subtle and not so
subtle ways, an API that fits one application well can be a pain to use
in a different context. And that is why there are so many different
cryptographic libraries around.

Nettle tries to avoid this problem by doing one thing, the low-level
crypto stuff, and providing a simple but general interface to it.
In particular, Nettle doesn't do algorithm selection. It doesn't do
memory allocation. It doesn't do any I/O.

The idea is that one can build several application and context specific
interfaces on top of Nettle, and share the code, test cases, benchmarks,
documentation, etc. Examples are the Nettle module for the Pike
language, and LSH, which both use an object-oriented abstraction on top
of the library.
2011-04-26 08:59:33 +00:00
hauke
b221861b8b Make sure <langinfo.h> actually provides CODESET before using it,
for the sake of old NetBSD releases.
2011-04-23 17:48:33 +00:00
obache
9ea3b36c23 recursive bump from gettext-lib shlib bump. 2011-04-22 14:40:40 +00:00
obache
1d9df3258a recursive bump from gettext-lib shlib bump. 2011-04-22 13:41:54 +00:00
obache
efeea0dd01 note "used by..." comments 2011-04-18 11:55:14 +00:00
joerg
5df6232aa0 Dependency doesn't support Python 2.4 2011-04-15 14:48:41 +00:00
tez
3d74a0406d fix MITKRB5-SA-2011-004 (CVE-2011-0285) DOS in kadmind 2011-04-14 19:37:26 +00:00
drochner
0034d9dea0 +py-keyring 2011-04-14 17:28:47 +00:00
drochner
2753ff93d4 add py-keyring-0.5.1, from Kamel Derouiche per pkgsrc-wip 2011-04-14 17:27:04 +00:00
drochner
11312b44a3 update to 2.32.1
This switches to the gnome-2.32 release branch.
2011-04-13 16:39:14 +00:00
wiz
bed91a9d0e Bump PKGREVISION for abs' PLIST fix.
While here, set COMMENT (!) and HOMEPAGE.
2011-04-13 09:53:32 +00:00
abs
95572ec2f6 Add info/assuan.info to PLIST 2011-04-13 09:11:39 +00:00
adam
4fa2da0992 Removed (lib)fwbuilder21 successor (lib)fwbuilder 4.1.3 2011-04-12 13:46:35 +00:00
adam
972b6cbea6 Changes 4.1.3:
This version comes with the following usability enhancements:
* Added checkbox to the Preferences dialog, this checkbox turns off some
  tooltips that can be annoying for users who are sufficiently familiar with
  the GUI.
* Added a tab "Policy Rule" to the "Objects" page of the global preferences
  dialog; checkbox in this tab allows the user to choose whether new policy
  rules should be created with logging turned on or off.
The major bug fixes in this release include:
* Fixed installer issue for Windows users that use Putty sessions. Built-in
  policy installer can use putty session on Windows when it runs pscp.exe
  utility to copy generated script to the firewall
* Fixed bug in the generated iptables script that made it to not configure
  broadcast address when it added ip addresses to interfaces.
* Several bugs that affected cluster configurations were fixed.
2011-04-12 13:41:17 +00:00
adam
46b08b6755 Fix building on Mac OS X; pkglint clean-up 2011-04-12 13:17:20 +00:00
obache
4c9a98916d + ruby-simple_oauth 2011-04-12 12:00:39 +00:00
obache
e6378afc05 Import ruby18-simple_oauth-0.1.4 as security/ruby-simple_oauth.
Simply builds and verifies OAuth headers.
2011-04-12 11:58:45 +00:00
tez
9dc2b934be correct openssl dependency (it needs >=0.9.8)
correct BUILDLINK_API_DEPENDS.mit-krb5
fix building where libtool chokes on "--version-info : " (at least OS X)
2011-04-09 00:16:18 +00:00
tez
b4949581c3 Add builtin support for SunOS per PR#44597 2011-04-08 17:30:35 +00:00
obache
5fa1402e5a * set LICENSE=gnu-gpl-v2(tools part) AND gnu-lgpl-v2(library part).
* let to depend on dbus-glib, this package use it directly and already in
  buildlink3.mk.
* using desktopdb.mk for *.desktop files.

Bump PKGREVISION.
2011-04-07 08:58:12 +00:00
wiz
d4cafb9bb6 Fix PKGREVISION variable name. From Robert Elz. 2011-04-05 08:36:41 +00:00
manu
7d6b2db865 Major update, with many changes that ould be difficult to sum up. Please
see the NEWS file.
2011-04-04 08:30:29 +00:00
agc
01c500e03e Let this package build on post-POSIX getline() systems.
Also include the relevant (static) libraries, where necessary, to allow
link-editing.
2011-04-01 21:56:14 +00:00
tez
f1c5f57117 Use solaris64 rather than solaris for ABI=64 build using gcc in SunOS
fixes PR#44769
2011-04-01 21:02:48 +00:00
wiz
711e87b5b6 Update to 1.2.17, for security reasons.
* Preparations for 1.2.17 release
* Fixed security issue with libxslt (CVE-2011-1425, reported by Nicolas Gregoire)
* Fixed pkcs12 file loading (based on patch from Andre de Souza Pinto)
* Fixed comments (based on patch from Wolfgang Woehl)
* Fixed extra quotes in configure (bug #631258)
* Fixed configure issue with empty --with-libxml/libxsl and config scripts in /bin directory
* Fixed gcrypt init/shutdown (patch from Roumen)
2011-04-01 12:27:45 +00:00