Commit graph

5799 commits

Author SHA1 Message Date
tez
c8b298166d add mit-krb5-appl (split out of mit-krb5) 2011-03-22 23:20:49 +00:00
abs
261907ea22 looks like "make mps" may have been missed... 2011-03-22 23:09:10 +00:00
taca
9fdaec50e8 Update sudo pacakge to 1.7.5.
* pkgsrc change: trying to use user-destdir.


What's new in Sudo 1.7.5?

 * When using visudo in check mode, a file named "-" may be used to
   check sudoers data on the standard input.

 * Sudo now only fetches shadow password entries when using the
   password database directly for authentication.

 * Password and group entries are now cached using the same key
   that was used to look them up.  This fixes a problem when looking
   up entries by name if the name in the retrieved entry does not
   match the name used to look it up.  This may happen on some systems
   that do case insensitive lookups or that truncate long names.

 * GCC will no longer display warnings on glibc systems that use
   the warn_unused_result attribute for write(2) and other system calls.

 * If a PAM account management module denies access, sudo now prints
   a more useful error message and stops trying to validate the user.

 * Fixed a potential hang on idle systems when the sudo-run process
   exits immediately.

 * Sudo now includes a copy of zlib that will be used on systems
   that do not have zlib installed.

 * The --with-umask-override configure flag has been added to enable
   the "umask_override" sudoers Defaults option at build time.

 * Sudo now unblocks all signals on startup to avoid problems caused
   by the parent process changing the default signal mask.

 * LDAP Sudoers entries may now specify a time period for which
   the entry is valid.  This requires an updated sudoers schema
   that includes the sudoNotBefore and sudoNotAfter attributes.
   Support for timed entries must be explicitly enabled in the
   ldap.conf file.  Based on changes from Andreas Mueller.

 * LDAP Sudoers entries may now specify a sudoOrder attribute that
   determines the order in which matching entries are applied.  The
   last matching entry is used, just like file-based sudoers.  This
   requires an updated sudoers schema that includes the sudOrder
   attribute.  Based on changes from Andreas Mueller.

 * When run as sudoedit, or when given the -e flag, sudo now treats
   command line arguments as pathnames.  This means that slashes
   in the sudoers file entry must explicitly match slashes in
   the command line arguments.  As a result, and entry such as:
	user ALL = sudoedit /etc/*
   will allow editing of /etc/motd but not /etc/security/default.

 * NETWORK_TIMEOUT is now an alias for BIND_TIMELIMIT in ldap.conf for
   compatibility with OpenLDAP configuration files.

 * The LDAP API TIMEOUT parameter is now honored in ldap.conf.

 * The I/O log directory may now be specified in the sudoers file.

 * Sudo will no longer refuse to run if the sudoers file is writable
   by root.

 * Sudo now performs command line escaping for "sudo -s" and "sudo -i"
   after validating the command so the sudoers entries do not need
   to include the backslashes.

 * Logging and email sending are now done in the locale specified
   by the "sudoers_locale" setting ("C" by default).  Email send by
   sudo now includes MIME headers when "sudoers_locale" is not "C".

 * The configure script has a new option, --disable-env-reset, to
   allow one to change the default for the sudoers Default setting
   "env_reset" at compile time.

 * When logging "sudo -l command", sudo will now prepend "list "
   to the command in the log line to distinguish between an
   actual command invocation in the logs.

 * Double-quoted group and user names may now include escaped double
   quotes as part of the name.  Previously this was a parse error.

 * Sudo once again restores the state of the signal handlers it
   modifies before executing the command.  This allows sudo to be
   used with the nohup command.

 * Resuming a suspended shell now works properly when I/O logging
   is not enabled (the I/O logging case was already correct).
2011-03-22 14:52:08 +00:00
pettai
981e84fa49 OpenDNSSEC 1.2.1:
* ldns 1.6.9 is required for bugfixes.
* dnsruby-1.52 required for bugfixes.

Bugfixes:
* Auditor: 'make check' now works when srcdir != builddir.
* Auditor: Include the 'make check' files in the tarball.
* Enforcer: Fix the migration script for SQLite.
* Enforcer: Increase size of keypairs(id) field in MySQL to allow more than
  32767 keys; see MIGRATION for details.
* Enforcer: Minor change to NOT_READY_KEY error message.
* libhsm: Increase the maximum number of attached HSM:s from 10 to 100.
* ods-ksmutil: Send trivial MySQL messages to stdout when exporting zonelist
  etc. Otherwise the resulting XML needs to be edited by hand.
* ods-control: Fix for Bourne shell.
* Signer Engine: Prevent race condition when setting up the workers and
  the command handler.
* Signer Engine: Check if the signature exists before recycling it.
* Signer Engine: Quit when there are errors in the configuration.
* Signer Engine: Enable core dump on failure.
* Signer Engine: Explicitly close down log msg with null.
* Signer Engine: Backup state after writing output.
* Signer Engine: Allow update of serial if internal structure is not
  initialized.
2011-03-21 15:52:25 +00:00
obache
e472f7bcd2 Add user-destdir installatin support. 2011-03-20 06:36:30 +00:00
obache
c47c160dc4 Add user-destdir installation support. 2011-03-20 06:29:52 +00:00
obache
d1b49ee73e Add user-destdir installation support. 2011-03-20 06:17:58 +00:00
dholland
4f4376b1c7 Update ap-modsecurity2 to 2.5.13, partly from Matthew Sporleder in
PR 44745, rest by me.

pkgsrc changes:
   - fix up deps
   - fix Apache module handling
   - DESTDIR support

XXX: The DESTDIR support has to bypass apxs because as far as I can tell
XXX: apxs -i doesn't know how to handle DESTDIRs. Various Apache modules
XXX: do this in various different ways. Someone(TM) should teach apxs -i
XXX: about DESTDIRs and fix up all the abuse. The infrastructure for
XXX: Apache modules could use some rototilling as well.

29 Nov 2010 - 2.5.13
--------------------

 * Cleaned up some mlogc code and debugging output.

 * Remove the ability to use a relative path to a piped audit logger
   (i.e. mlogc) as Apache does not support it in their piped loggers
   and it was breaking Windows and probably other platforms that
   use spaces in filesystem paths.  Discovered by Tom Donovan.

 * Fix memory leak freeing regex.  Discovered by Tom Donovan.

 * Fix some portability issues on Windows.

 * Fixed Geo lookup concurrent connections bug

 * Fixed Skip/SkipAfter chain bug

 * Added new setvar Lua API to be used into Lua scripts

 * Added PCRE messages indicates each rule that exceed match limits

 * Added new Base64 transformation function called base64DecodeEx, which
   can decode base64 data skipping special characters.

 * Add SecReadStateLimit to limit the number of concurrent threads in BUSY connections per ip address

 * Fixed redirect action was not expanding macros in chained rules



04 Feb 2010 - 2.5.12
--------------------

 * Fixed SecUploadFileMode to set the correct mode.

 * Fixed nolog,auditlog/noauditlog/nolog controls for disruptive actions.

 * Added additional file info definitions introduced in APR 0.9.5 so that
   build will work with older APRs (IBM HTTP Server v6).

 * Added SecUploadFileLimit to limit the number of uploaded file parts that
   will be processed in a multipart POST.  The default is 100.

 * Fixed path normalization to better handle backreferences that extend
   above root directories.  Reported by Sogeti/ESEC R&D.

 * Trim whitespace around phrases used with @pmFromFile and allow
   for both LF and CRLF terminated lines.

 * Allow for more robust parsing for multipart header folding.  Reported
   by Sogeti/ESEC R&D.

 * Fixed failure to match internally set TX variables with regex
   (TX:/.../) syntax.

 * Fixed failure to log full internal TX variable names and populate
   MATCHED_VAR* vars.

 * Enabled PCRE "studying" by default.  This is now a configure-time option.

 * Added PCRE match limits (SecPcreMatchLimit/SecPcreMatchLimitRecursion) to
   aide in REDoS type attacks.  A rule that goes over the limits will set
   TX:MSC_PCRE_LIMITS_EXCEEDED.  It is intended that the next major release
   of ModSecurity (2.6.x) will move these flags to a dedicated collection.

 * Reduced default PCRE match limits reducing impact of REDoS on poorly
   written regex rules.  Reported by Sogeti/ESEC R&D.

 * Fixed memory leak in v1 cookie parser.  Reported by Sogeti/ESEC R&D.

 * Now support macro expansion in numeric operators (@eq, @ge, @lt, etc.)

 * Update copyright to 2010.

 * Reserved 700,000-799,999 IDs for Ivan Ristic.

 * Fixed SecAction not working when CONNECT request method is used
   (MODSEC-110). [Ivan Ristic]

 * Do not escape quotes in macro resolution and only escape NUL in setenv
   values.


04 Nov 2009 - 2.5.11
--------------------

 * Added a new multipart flag, MULTIPART_INVALID_QUOTING, which will be
   set true if any invalid quoting is found during multipart parsing.

 * Fixed parsing quoted strings in multipart Content-Disposition headers.
   Discovered by Stefan Esser.

 * Cleanup persistence database locking code.

 * Added warning during configure if libcurl is found linked against
   gnutls for SSL.  The openssl lib is recommended as gnutls has
   proven to cause issues with mutexes and may crash.

 * Cleanup some mlogc (over)logging.

 * Do not log output filter errors in the error log.

 * Moved output filter to run before other stock filters (mod_deflate,
   mod_cache, mod_expires, mod_filter) to avoid analyzing modified data
   in the response.  Patch originally submitted by Ivan Ristic.



18 Sep 2009 - 2.5.10
--------------------

 * Cleanup mlogc so that it builds on Windows.

 * Added more detailed messages to replace "Unknown error" in filters.

 * Added SecAuditLogDirMode and SecAuditLogFileMode to allow fine tuning
   auditlog permissions (especially with mpm-itk).

 * Cleanup SecUploadFileMode implementation.

 * Cleanup build scripts.

 * Fixed crash on configuration if SecMarker is used before any rules.

 * Fixed SecRuleUpdateActionById so that it will work on chain starters.

 * Cleanup build system for mlogc.

 * Allow mlogc to periodically flush memory pools.

 * Using nolog,auditlog will now log the "Message:" line to the auditlog, but
   nothing to the error log.  Prior versions dropped the "Message:" line from
   both logs.  To do this now, just use "nolog" or "nolog,noauditlog".

 * Forced mlogc to use SSLv3 to avoid some potential auto negotiation
   issues with some libcurl versions.

 * Fixed mlogc issue seen on big endian machines where content type
   could be listed as zero.

 * Removed extra newline from audit log message line when logging XML errors.
   This was causing problems parsing audit logs.

 * Fixed @pm/@pmFromFile case insensitivity.


 * Truncate long parameters in log message for "Match of ... against ...
   required" messages.

 * Correctly resolve chained rule actions in logs.

 * Cleanup some code for portability.

 * AIX does not support hidden visibility with xlc compiler.

 * Allow specifying EXTRA_CFLAGS during configure to override gcc specific
   values for non-gcc compilers.

 * Populate GEO:COUNTRY_NAME and GEO:COUNTRY_CONTINENT as documented.

 * Handle a newer geo database more gracefully, avoiding a potential crash for
   new countries that ModSecurity is not yet aware.

 * Allow checking &GEO "@eq 0" for a failed @geoLookup.

 * Fixed mlogc global mutex locking issue and added more debugging output.

 * Cleaned up build dependencies and configure options.
2011-03-19 21:18:06 +00:00
dholland
d9e3ab2da8 Sort. 2011-03-19 21:16:27 +00:00
obache
fa81d4c2b1 * additional missing clean up after removal of libxml option.
* pass to configure more preferred variables.
2011-03-19 13:31:52 +00:00
obache
98f3ca061d * improve fetch message
* add user-destdir installation support
* fixes installation on platforms where ROOT_USER != "root".
2011-03-19 11:54:30 +00:00
obache
1136fd6bd2 Only suggest download of DEFAULT_DISTFILES, or other files may need to be
downloaded from other sites than MASTER_SITES.
2011-03-19 11:46:59 +00:00
obache
2462957290 Add user-destdir installation support. 2011-03-19 11:14:30 +00:00
obache
afe02a84c3 Convert to usual style of "used by" comment. 2011-03-19 10:37:26 +00:00
obache
9b53688301 * MAKE_JOBS_SAFE=no
* Note commented-out LICENSE (GNU EMACS GENERAL PUBLIC LICENSE)
* Add user-destdir installation support.
2011-03-19 09:36:47 +00:00
obache
c7f99d1836 * LICENSE=original-bsd
* Add user-destdir installation support.
* Let to binary package same as installed from source
Bump PKGREVISION.
2011-03-19 09:18:02 +00:00
obache
d71e41989d LICENSE=gnu-gpl-v2 2011-03-19 08:31:26 +00:00
obache
ebd42cd2a8 Marked as USER_DESTDIR ready. 2011-03-19 08:29:20 +00:00
zafer
536818ce0f service suspended. prevent timeout. fetch from backup. 2011-03-18 20:28:21 +00:00
zafer
8a952529f9 update master_sites 2011-03-18 20:26:02 +00:00
pettai
c350b3a99f 1.8:
- New Features:
    - zonesigner, rollerd
                    - Made changes so that these tools are more compatible
                      with recent versions of Bind
                    - The zone_errors configuration parameter allows a zone-
                      specific maximum to be set.  Once exceeded, that zone
                      will be skipped rather than allowing rollover to continue.
    - blinkenlights
                    - Recognizes when rollerd abruptly quits, so error messages
                      aren't spewed interminably.
    - ZonFile::Fast - Fixed parsing of DS records containing spaces and
                      parsing of mname and rname SOA fields
                    - Added support for parsing KEY records
    - keyrec.pm     - Made changes to properly lock keyrec files before
                      writing to them.
                    - Begun process of deprecating keyrec_open().
    - mapper:       - added a new option: --node-size for mapping
                      complex zones.
    - dnspktflow:   - added two new options:
                      --layout-style for selecting the layout style to use
                      --node-size for mapping complex zones.
                    - Add new (default) option to cluster
                      authoritative nodes together to help better
                      understand the relationships between traffic
                      patterns and authoritative name server/zone arrangement.
    - libval:       - Now distributed with the Root TA.
                    - Added stricter checks for openssl SHA-256 support in
                      configure.
                    - Added several improvements that allow the validator to
                      lookup information within provably insecure zones that
                      do not handle EDNS0 requests nicely. This includes
                      adding support for turning off EDNS0 when traversing a
                      name hierarchy that leads to a provably insecure zone,
                      EDNS0 fallback support, and additional checks to check
                      the sanity of response data.
                    - Fixed certain bugs in CNAME handling and in the
                      validation of proofs accompanying wildcard responses,
                      referrals and alias chains.
                    - Fixed support for RSADSA and RSASHA-512 signature
                      validation.
    - Mac OSX:      - Added a Ports file for mac ports
                    - updated the fink build spec

 - many other miscellaneous bug fixes and improvements.
2011-03-12 20:07:19 +00:00
pettai
695a2a1abb Fix build + installation errors. 2011-03-12 19:55:41 +00:00
pettai
c3acfc37e5 zkt 1.0 -- 15. June 2010
* feat  "/dev/urandom" check added to checkconfig()
* feat  Config compability switch (-C) added to zkt-conf
* feat  zkt-ls has a new switch -s to change sorting of domains from
        subdomain before parent to subdomain below the parent
* feat  "zkt-ls -T" prints only parent trust anchor

zkt 1.0rc1 -- 1. Apr 2010 (The 1.0 release was sponsored by DOMINIC(r) )

* feat  Several config parameter are printed now in a more consistent and
        user friendly form.
        SerialFormat "Incremental" could be abbreviated as "inc" on input.
* bug   use of AC_ARG_ENABLE macros changed in a way that it is possible
        to use it as a "--disable-FEATURE" switch.
* port  no longer checking for malloc() in configue script.
        Mainly because it checks only if malloc(0) is allowed and we do
        not need this.
* port  --disable-color-mode added to configure script
* bug   Makro PRINT_AGE_OF_YEAR renamed to PRINT_AGE_WITH_YEAR in configure.ac
* misc  man page zkt-keyman added
* misc  New command zkt-keyman added as replacement for dnssec-zkt's key
        management functionality
* misc  man page zkt-ls added
* port  Check for ncurses added to Makefile.in
* misc  Color mode (Option -C) added to zkt-ls (experimental)
        New source file tcap.c.
* misc  Deprecate "single linked list" version of ZKT. The binary tree
        version is the default for years, so the VERSION string does no
        longer contain a "T".  Now, if someone insist on the single link
        list version (configure --disable-tree) a "S" is added to the
        version string.
        Anyway, the code for the single link list version does no longer
        have the same functionality and will be removed in one of the later
        releases.
* misc  New command zkt-ls added as replacement for dnssec-zkt's key
        listing functionality
* func  New key algorithms RSASHA256 and RSAHSHA512 added to dki.[ch]
        and zconf.c
        New parameter NSEC3 added. Now it's possible to configure
        an NSEC3_OPTOUT zone.
* bug   Token parsing function gettok() fixed to recognize tokens
        with dashes ("zone-statistics" was seen as "zone").
        Thanks to Andreas Baess for finding this bug.
* bug   Fixed bug in (re)salting dynamic zones.
        sig_zone() and gensalt() needs parameter change for this
* func  New option -a added to zkt-conf
* func  In zconf.c CONF_TIMEINT parameter are now able to recognize
        "unset" values (which is represented internaly as 0)
* func  Set Max_TTL to sig lifetime for dynamic zones or if Max_TTL
        is less than 1.
        max_ttl checks in checkconfig() fixed.
* func  printconfigdiff() added to zconf.c and used by zkt-conf.
        Now local configs are printed as diff to site wide config.
* misc  man page zkt-signer.8 changed to new command syntax
* func  Per domain logging added. Use parameter LogDomainDir to
        enable it. For more details see file README.logging.
* func  distribute.sh supports new action type "distkeys" but is
        currently not used
* misc  LOG_FNAMETMPL changed and moved from config_zkt.h to log.h
* misc  Default soa serial format changed from "Incremental"
        to "Unixtime"
* func  dnssec-signer command renamed to zkt-signer. Man page updated.
* func  New command zkt-conf added as replacement for dnssec-zkt -Z
* misc  timeint2str() is now global (zconf.c)
* func  zfparse.c - a rudimentary zone file parser
        scans minimum and maximum ttl values; adds $INCLUDE dnskey.db

zkt 0.99d -- Not released

* func  Option SIG_DnsKeyKSK for DNSKEY signing with KSK only added
* misc  BIND 9.7 compability
2011-03-12 16:46:05 +00:00
drochner
ee7814d4b8 add some clarification about the difference between OpenSSL and GnuTLS,
and guidance for users of the latter
2011-03-11 21:00:06 +00:00
adam
3f56fef802 Changes 1.2.0:
* New functions to allow the creation of X.509 certificates.
* Interface changes relative to the 1.1.0 release:
  ksba_certreq_set_serial          NEW
  ksba_certreq_set_issuer          NEW
  ksba_certreq_set_validity        NEW
  ksba_certreq_set_siginfo         NEW
2011-03-11 07:22:05 +00:00
adam
39cacf8b91 Fix building on Mac OS X; added LICENCE 2011-03-11 07:20:45 +00:00
drochner
bf61ff2be8 update to 0.53.1
changes:
-misc fixes and improvements
-build against system libtommath/crypt
2011-03-10 10:20:16 +00:00
drochner
6b3134f375 build shared lib, bump PKGREV 2011-03-10 09:52:24 +00:00
drochner
fc92f5813b fix installed pkgconfig .pc file: Don't refer to zlib.pc -- this
fails with system libz. We propagate a dependency per bl3 file,
this should be sufficient.
bump PKGREV
2011-03-09 10:52:25 +00:00
adam
d762c5558e Changes 2.10.5:
* libgnutls: Corrected verification of finished messages.
* libgnutls: Corrected signature generation and verification in the Certificate
  Verify message when in TLS 1.2.
* pkg-config gnutls.pc improvements.
* API and ABI modifications: No changes since last version.
2011-03-07 13:45:34 +00:00
adam
3f208f95b6 buildlink3.mk fix 2011-03-05 11:49:12 +00:00
obache
116527272b Use AC_LINK_IFELSE instead of AC_COMPILE_IFELSE for __thread,
or unwanted detect of TLS support on NetBSD-5.1.
2011-03-04 11:34:12 +00:00
adam
94fd91d96b Changes 1.3.0:
* GPGME does not come with an internal libassuan version anymore.
  The external libassuan 1.1.0 release or later is required.  For
  application programmers on systems that can resolve inter-library
  dependencies at runtime, this is a transparent change.
* New engine GPGME_PROTOCOL_G13 to support the new g13 tool.
* New engine GPGME_PROTOCOL_UISERVER to support UI Servers.
* New API to change the passpgrase of a key.
2011-03-03 11:39:47 +00:00
kleink
f710071ee7 Remove security/libksba04. Nothing uses this anymore, there's
security/libksba tracking stable releases, and the distfile is gone.
2011-03-01 15:40:22 +00:00
wiz
36ff915e97 Reset maintainer for retired developers. 2011-02-28 14:52:37 +00:00
wiz
df14816790 Let's assume for now that everything that worked with python-2.6 also
works with python-2.7.
2011-02-25 09:47:18 +00:00
obache
6f52075a35 Use --format-executable to avoid conflicts with ruby variants each other.
Bump PKGREVISION.
2011-02-25 06:35:23 +00:00
adam
533f882eab Changes 2.4.1:
Bug
* Reload interval staying too low on reload failures.
* [HTTP-Redirect binding] [Message encoding] There should be no '%0A' in the
  SAMLRequest parameter value
2011-02-23 09:11:09 +00:00
adam
d13c24ae28 Changes 1.6.0:
* Fix: wrong namespace in encryption DigestMethod
* Fix: RetrievalMethod handler
* Fix: support for >1 CRL per KeyInfo
* Fix: buffer initialization issue
* Fix: vector index bug
* Fix: stylesheet append bug
* Fix: header guard in XPath transform header
* Fix: string release crash
* Fix: improper c14n of XSLT
* Fix: setters for Reference Type/Id
* Fix: skip comments in X509Certificate elements
* Fix: more header guards
* Fix: NSS verification of RSA broken
* Expose algorithm URI on Signature and Reference objects
* White/blacklisting of otherwise registered algorithms
* Add selected XML Signature 1.1 KeyInfo extensions
* Add elliptic curve keys and signatures via ECDSA
* Support debugging of Reference/SignedInfo data
* Clean up tests for SHA2 algorithms in OpenSSL
* Updated autoconf script, added NSS support, removed pre-automake material
* Add methods for Reference removal to DSIGSignature/DSIGSignedInfo classes
2011-02-23 09:02:07 +00:00
taca
6d80a96612 Bump PKGREVISION due to ABI change of ruby18-base. 2011-02-21 16:01:10 +00:00
jmcneill
05ef2ca099 don't enable padlock support on NetBSD by default, it crashes on padlock
capable CPUs
2011-02-19 00:55:31 +00:00
taca
1caa448699 Update openssh package to 5.8.1 (5.8p1).
For changes from 5.5 to 5.7, please refer http://openssh.com/txt/release-5.7
and http://openssh.com/txt/release-5.6 in detail.

Changes since OpenSSH 5.7
=========================

Security:

 * Fix vulnerability in legacy certificate signing introduced in
   OpenSSH-5.6 and found by Mateusz Kocielski.

   Legacy certificates signed by OpenSSH 5.6 or 5.7 included data from
   the stack in place of a random nonce field. The contents of the stack
   do not appear to contain private data at this point, but this cannot
   be stated with certainty for all platform, library and compiler
   combinations. In particular, there exists a risk that some bytes from
   the privileged CA key may be accidentally included.

   A full advisory for this issue is available at:
   http://www.openssh.com/txt/legacy-cert.adv

Portable OpenSSH Bugfixes:

 * Fix compilation failure when enableing SELinux support.

 * Do not attempt to call SELinux functions when SELinux is disabled.
   bz#1851
2011-02-16 17:45:08 +00:00
tnn
1b0495fc57 revbump(1) for devel/libevent update. 2011-02-11 21:22:02 +00:00
taca
b1ce322fbc Add fix for security issue CVE-2011-0014.
Bump PKGREVISION.
2011-02-09 00:15:30 +00:00
adam
c86c95d050 Changes 0.97:
ClamAV 0.97 brings many improvements, including complete Windows support
(all major components compile out-of-box under Visual Studio), support for
signatures based on SHA1 and SHA256, better error detection, as well as
speed and memory optimizations. The complete list of changes is available
in the ChangeLog file.
2011-02-08 07:56:09 +00:00
obache
efbeaad982 Fixes build on SUA.
* header file location of libbind is differ than SFU.
* treat all Interxi as same, not only interix3.
2011-02-06 11:31:18 +00:00
obache
705909d2dd On Interix, it is impossible to build with HAVE_IPV6 due to missing
neither getipnodebyname(3) nor gethostbyname2(3).
2011-02-06 08:39:59 +00:00
jym
e6a576c7a4 Add MESSAGE to give a hint on what to do (~copy/pasted from script) 2011-01-31 03:05:17 +00:00
adam
51929d9a97 PLIST fix 2011-01-28 08:16:55 +00:00
obache
9dd96830cd corrent checksum of patches. 2011-01-25 09:08:25 +00:00