Commit graph

4398 commits

Author SHA1 Message Date
wiz
cf98dc96e5 Adapt for librsvg rename. Bump PKGREVISION. 2007-09-20 21:37:35 +00:00
wiz
e81cfe4627 Adapt eel dependencies; bump PKGREVISION. 2007-09-20 21:21:36 +00:00
jlam
924886bbe1 Note, add and enable security/mozilla-rootcerts. 2007-09-20 20:03:41 +00:00
jlam
909f41a142 Import security/mozilla-rootcerts:
This package provides a script which can be used to extract the root
CA certificates distributed by the Mozilla Project into the current
working directory and to rehash the existing certificates.  The directory
can be used by most SSL-aware programs that expect a "CA certificate
path".
2007-09-20 20:02:53 +00:00
wiz
42825e73a6 Bump PKGREVISION for gnome-vfs rename. 2007-09-19 23:18:43 +00:00
wiz
e64b358b66 Use gnome-vfs instead of gnome-vfs2. 2007-09-19 23:13:12 +00:00
taca
1ee28b58ab Use DIST_SUBDIR for changed distfiles noted by wiz@ with private mail.
Bump PKGREVISION.
2007-09-19 13:42:01 +00:00
taca
05fb160b50 openssh-4.7p1-hpn12v18.diff.gz has updated without change file name.
It seems that it corrected SSH_HPN definition to "-hpn12v18".
2007-09-19 09:08:05 +00:00
wiz
52d25fba0c Update to 1.09:
v1.09
        - new method stop_SSL as opposite of start_SSL based on a idea
          of Bron Gondwana <brong[AT]fastmail[DOT]fm>
          To support this method the SSL_shutdown handling had to be
          fixed, e.g. in close a proper unidirectional shutdown
          should be done while in stop_SSL a bidirectional shutdown
        - try to make it clearer that thread support is buggy
2007-09-18 21:17:18 +00:00
joerg
8ea6894b6c Fix build issus on DragonFly with GNUlib and don't use d_reclen as the
assertion is ensured already by opendir.
2007-09-15 08:30:51 +00:00
joerg
fad8ac6a38 Hack around stupid GNUlib mess to allow building on DragonFly. 2007-09-14 12:03:37 +00:00
joerg
7b69a8d34f Fix self-references. Sort PLIST. Use @dirrm instead of rm -rf.
Bump revision.
2007-09-14 11:59:39 +00:00
taca
e669d33f13 Update sudo pacakge to 1.6.9p5.
617) Fixed a bug in the IP address matching introduced by the IPV6 merge.

618) For "visudo -f file" we now use the permissions of the original file
     and not the hard-coded sudoers owner/group/mode.  This makes
     it possible to use visudo with a revision control system.

619) Fixed sudoedit when used on a non-existent file.

620) Regenerated configure using autoconf 2.6.1 and libtool 1.5.24.

621) Groups and netgroups are now valid in an LDAP sudoRunas statement.
2007-09-09 12:54:36 +00:00
wiz
65475deb65 Remove superfluous @dirrm. Bump PKGREVISION. 2007-09-08 09:42:01 +00:00
shannonjr
a8dd436ca5 Correct PLIST ommission and bump PKGREVISION 2007-09-08 09:02:37 +00:00
jlam
07dd3147c6 Convert packages that test and use USE_INET6 to use the options framework
and to support the "inet6" option instead.

Remaining usage of USE_INET6 was solely for the benefit of the scripts
that generate the README.html files.  Replace:

	BUILD_DEFS+=	USE_INET6
with
	BUILD_DEFS+=	IPV6_READY

and teach the README-generation tools to look for that instead.

This nukes USE_INET6 from pkgsrc proper.  We leave a tiny bit of code
to continue to support USE_INET6 for pkgsrc-wip until it has been nuked
from there as well.
2007-09-07 22:12:10 +00:00
jlam
06ab49ce09 Allow packages that use OpenSSL to specify that they need an OpenSSL
built with support for threads.  This is done by adding the following
line to the package Makefile before the inclusion of openssl/buildlink3.mk:

    USE_FEATURES.openssl=	threads

The openssl/builtin.mk file is also adjusted to detect whether or not
the built-in OpenSSL was built with support for threads and the result
is used accordingly to determine whether or not a pkgsrc OpenSSL is
needed.
2007-09-07 17:26:23 +00:00
taca
67217a21ce Update openssh package to 4.7.1 (4.7p1).
Changes since OpenSSH 4.6:
============================

Security bugs resolved in this release:

 * Prevent ssh(1) from using a trusted X11 cookie if creation of an
   untrusted cookie fails; found and fixed by Jan Pechanec.

Other changes, new functionality and fixes in this release:

 * sshd(8) in new installations defaults to SSH Protocol 2 only.
   Existing installations are unchanged.

 * The SSH channel window size has been increased, and both ssh(1)
   sshd(8) now send window updates more aggressively. These improves
   performance on high-BDP (Bandwidth Delay Product) networks.

 * ssh(1) and sshd(8) now preserve MAC contexts between packets, which
   saves 2 hash calls per packet and results in 12-16% speedup for
   arcfour256/hmac-md5.

 * A new MAC algorithm has been added, UMAC-64 (RFC4418) as
   "umac-64@openssh.com". UMAC-64 has been measured to be
   approximately 20% faster than HMAC-MD5.

 * A -K flag was added to ssh(1) to set GSSAPIAuthentication=Yes

 * Failure to establish a ssh(1) TunnelForward is now treated as a
   fatal error when the ExitOnForwardFailure option is set.

 * ssh(1) returns a sensible exit status if the control master goes
   away without passing the full exit status. (bz #1261)

 * The following bugs have been fixed in this release:

   - When using a ProxyCommand in ssh(1), set the outgoing hostname with
     gethostname(2), allowing hostbased authentication to work (bz #616)
   - Make scp(1) skip FIFOs rather than hanging (bz #856)
   - Encode non-printing characters in scp(1) filenames.
     these could cause copies to be aborted with a "protocol error"
     (bz #891)
   - Handle SIGINT in sshd(8) privilege separation child process to
     ensure that wtmp and lastlog records are correctly updated
     (bz #1196)
   - Report GSSAPI mechanism in errors, for libraries that support
     multiple mechanisms (bz #1220)
   - Improve documentation for ssh-add(1)'s -d option (bz #1224)
   - Rearrange and tidy GSSAPI code, removing server-only code being
     linked into the client. (bz #1225)
   - Delay execution of ssh(1)'s LocalCommand until after all forwadings
     have been established. (bz #1232)
   - In scp(1), do not truncate non-regular files (bz #1236)
   - Improve exit message from ControlMaster clients. (bz #1262)
   - Prevent sftp-server(8) from reading until it runs out of buffer
     space, whereupon it would exit with a fatal error. (bz #1286)

 * Portable OpenSSH bugs fixed:

   - Fix multiple inclusion of paths.h on AIX 5.1 systems. (bz #1243)
   - Implement getpeereid for Solaris using getpeerucred. Solaris
     systems will now refuse ssh-agent(1) and ssh(1) ControlMaster
     clients from different, non-root users (bz #1287)
   - Fix compilation warnings by including string.h if found. (bz #1294)
   - Remove redefinition of _res in getrrsetbyname.c for platforms that
     already define it. (bz #1299)
   - Fix spurious "chan_read_failed for istate 3" errors from sshd(8),
     a side-effect of the "hang on exit" fix introduced in 4.6p1.
     (bz #1306)
   - pam_end() was not being called if authentication failed (bz #1322)
   - Fix SELinux support when SELinux is in permissive mode. Previously
     sshd(8) was treating SELinux errors as always fatal. (bz #1325)
   - Ensure that pam_setcred(..., PAM_ESTABLISH_CRED) is called before
     pam_setcred(..., PAM_REINITIALIZE_CRED), fixing pam_dhkeys.
     (bz #1339)
   - Fix privilege separation on QNX - pre-auth only, this platform does
     not support file descriptior passing needed for post-auth privilege
     separation. (bz #1343)
2007-09-07 10:41:11 +00:00
jlam
86ec3742a6 Honor PKG_SYSCONFDIR. The default host keys for dropbear are now found in
${PKG_SYSCONFDIR}/dropbear.  Bump the PKGREVISION to 2.
2007-09-06 19:15:10 +00:00
joerg
7ae978be7d Update to OpenPAM Figwort (20050616):
- BUGFIX: Correct several small signedness and initialization bugs
  discovered during review by the NetBSD team.

- BUGFIX: Modify gendoc.pl to sort cross-references in dictionary
  order within each section.

- ENHANCE: if a policy specifies a relative module path,
  prepend the
  module directory so we never call dlopen(3) with a relative
  path.

- ENHANCE: add a pam.conf(5) manual page.
2007-09-06 18:54:44 +00:00
jlam
b1fb9270c5 Install the manual pages for dropbear. Bump the PKGREVISION to 1. 2007-09-06 16:31:55 +00:00
jlam
f76b802e8d Put variable declarations at beginning of a block to work with older
compilers.
2007-09-06 16:07:51 +00:00
jlam
f51a7b0324 For the "pam" package option, one needs to include pam.buildlink3.mk. 2007-09-06 15:55:06 +00:00
wiz
4c66b5984c Fix typo in comment. 2007-09-06 01:12:33 +00:00
drochner
57b1c21bd1 update to 2.0.0
While an update to a .0 version is somehow risky, it finishes the
unfortunate state that the pkgsrc gnutls didn't work with the pkgsrc
opencdk, which I wouldn't like to go into the next stable branch.
Release candidates have worked for me, and there is some time left
before the Q3 branch, so I'm confident.
changes:
* Support for external RSA/DSA signing for TLS client authentication
-many X.509 enhancements
 Support for Supplemental handshakes messages (RFC 4680)
* Support for TLS authorization extension (draft-housley-tls-authz-extns-07)
* Improve logic of gnutls_set_default_priority()
* New APIs to enumerate supported algorithms in the library
* Certtool can export more than one certificate to PKCS#12
* Several message translation improvements
* Improved manual
* Many bugfixes and minor improvements
2007-09-05 21:51:21 +00:00
drochner
aaeee9c668 update to 0.50
changes:
- Add DROPBEAR_PASSWORD environment variable to specify a dbclient password
- Use /dev/urandom by default, since that's what everyone does anyway
- Exit with an exit code of 1 if dropbear can't bind to any ports
- Improve network performance and add a -W <receive_window> argument for
  adjusting the tradeoff between network performance and memory consumption
- Fix a problem where reply packets could be sent during key exchange,
  in violation of the SSH spec. This could manifest itself with connections
  being terminated after 8 hours with new TCP-forward connections being
  established
- Add -K <keepalive_time> argument, ensuring that data is transmitted
  over the connection at least every N seconds
- dropbearkey will no longer generate DSS keys of sizes other than 1024
  bits, as required by the DSS specification. (Other sizes are still
  accepted for use to provide backwards compatibility)
2007-09-05 21:08:06 +00:00
shannonjr
2cf2fe1967 PLIST fix 2007-09-05 20:43:41 +00:00
drochner
fb494c5a7a -add DESTDIR support, from Blair Sadewitz
(I didn't adopt the libtool change for now because it is not clear for
 be whether that PAM modules is useful for non-NetBSD.)
-block SIGCHLD while the forked helper process is running, so that a
 calling process with a SIGCHLD handler won't steal the exit status
 which is used to report success of the authentication.
 This makes the "dropbear" ssh server usable if started with user
 privileges.
bump revision to 1.1
2007-09-05 20:29:05 +00:00
shannonjr
39c7e2c3da Update to 0.9.9.1. Changes:
- Fix for new libprelude (0.9.15) runtime warning.
- Add documentation for SQLite3 in the template configuration file
  (Sébastien Tricaud <toady at gscore.org>).
2007-09-05 19:07:30 +00:00
shannonjr
957cdce372 Update to 0.9.13. Changes:
- Source and Target now use a 16 bits index (required for CorrelationAlert with
  large number of source/target). CorrelationAlert Alertident now use a 32 bits
  index (required to link large number of Alert together).
- Fix compilation on system without ENOTSUP (fix #227):
  Include modified patch from Alexandre Anriot <aanriot@atlantilde.com>.
  conversions preventing PostgreSQL to use indexes (fix #225).
- [preludedb-admin] Use separate alert / heartbeat command: this is done to
  have a coherent implementation of the --offset and --count command line
  options.
- [preludedb-admin] Fix --offset with the load command.
- [preludedb-admin] Give the delete table a decent size, should speedup the
  delete command.
- [documentation] preludedb-admin manpage (fix #230), by Pierre Chifflier
  <chifflier@inl.fr>.
2007-09-05 19:04:00 +00:00
shannonjr
d1f737d6a6 Corrected my misunderstanding of CONF_FILES
infrastrure. Fixed several configuration file
installation problems.
2007-09-05 18:58:19 +00:00
jlam
a61eb2f649 Move variable declarations to start of block to appease older C compilers. 2007-09-05 17:06:55 +00:00
jlam
061852ab91 Apply fixes for substitution errors reported in PR pkg/36898 by Nicolas
Joly.  Bump PKGREVISION due to fixed script update_dat.sh script.
2007-09-04 19:43:15 +00:00
shannonjr
7e13317ab9 Correct test for existing configuration file 2007-09-03 14:44:25 +00:00
shannonjr
8f6848356f Added entry for prelude-pflogger 2007-09-03 13:52:13 +00:00
shannonjr
244b840db0 Prelude sensor for OpenBSD's PF (Packet Filter)
that reports to Prelude Manager.
2007-09-03 13:50:49 +00:00
shannonjr
999368ef77 Update to 0.9.10.1. Changes:
- Make SSH rules IPv6 compliants, allowing to merge old
  IPv6 only rules with IPv4 rules. Some additional minor
  bug fixes (fix #232).
- Fix incorrect target user assignment, as well as incorrect
  PCRE reference in assessment.impact.description
  (Paul Robert Marino <prmarino1@gmail.com>) (fix #232).
- CISCO router acl lists can now use names instead of numbers. This made
  rule id=500 in cisco-router.rules fail to alert on packet denys on newer
  cisco devices (Paul Robert Marino <prmarino1@gmail.com>).
- Fix Apache formating when Apache logname or user is set
  (Robin Gruyters <r.gruyters@yirdis.nl> and <andre@vandervlies.xs4all.nl>)
  (fix #229).
- Invalid user.user_id(0).name assignement in SSH rule 1913
  (Scott Olihovik <skippylou@gmail.com>) (fix #243).
- Various bug fixes and minor improvements.
2007-09-03 13:46:04 +00:00
shannonjr
77bff19d86 Update to 0.9.15.1. Changes:
- Fix build error on system that use native awk implementation in place of GNU awk
  (Pierre Chifflier <chifflier at inl.fr>), fix #256.
- Avoid a prelude-string fatal assertion, by denying copy/cloning of an empty
  prelude-string.
- Correction to the 'prelude-admin send' help message.
- Convert prelude-string to use prelude_return_if_fail() in place of prelude_log().
2007-09-03 13:43:40 +00:00
wiz
1374ac631c Reset maintainer: SMTP connections to comet.lbl.gov time out. 2007-09-03 06:12:43 +00:00
jlam
48590f4577 Skip the interpreter check on authsystem.passwd as we don't want to
depend on the tcl-expect package.  The package MESSAGE file already
tells the user what to do.
2007-08-30 20:11:08 +00:00
wiz
1fdc30b3e7 Update to 1.08:
v1.08
	- make sure that Scalar::Util has support for dualvar
          (Makefile.PL,SSL.pm) because the perl-only version has
          has no dualvar
2007-08-30 06:12:11 +00:00
wiz
aa077a7717 Update to 2.0.6. Add support for idea option. From Blair Sadewitz
on tech-pkg.

Noteworthy changes in version 2.0.6 (2007-08-16)
------------------------------------------------

 * GPGSM does now grok --default-key.

 * GPGCONF is now aware of --default-key and --encrypt-to.

 * GPGSM does again correctly print the serial number as well the the
   various keyids.  This was broken since 2.0.4.

 * New option --validation-model and support for the chain-model.

 * Improved Windows support.
2007-08-29 23:19:06 +00:00
wiz
3dec26722c Add support for idea option. From Blair Sadewitz in private mail, with
some cleanup.
2007-08-29 23:11:37 +00:00
obache
4d8118b980 Switch to New LibIdent, version 0.32.
libident 0.32
--------------
# A serious portability fix for *BSD and Solaris was submitted by:
  Nicolas Rachinsky <nicolas@rachinsky.de>.

# Build of sample programs ("testers") was fixed.


libident 0.31
--------------
# libtool is used instead of ranlib, so that a shared library can be built
  automatically if the OS supports it.


libident 0.30
--------------
#  This new release is meant to provide Internet Protocol version independant
  support: libident can now handles IPv6 addresses and perform queries over
  IPv6, as well as IPv4. The IP version is selected automatically.

# I also have ported the library to the GNU autotools (autoconf & automake),
  and removed support for non ANSI C platforms. If you use such an old system,
  do NOT update. It doesn't support IPv6 anyway.
2007-08-25 14:00:20 +00:00
jlam
bbdf14eb50 Convert to use the emulator framework.
XXX This package is out of date and should be updated.  It doesn't work
XXX on current versions of NetBSD due to the silly way it detects the
XXX the running OS and tries to figure out the corresponding binary.
2007-08-23 19:36:00 +00:00
jlam
a517442623 * Convert security/fprot-workstation-bin to use the emulator framework.
* Remove unncessary dependency on netbsd32_compat16 on NetBSD/amd64.
  This package installs statically linked binaries, so there is no
  need for any shared libraries or ld.elf_so to run fprot.

* Stop pretending to support non-NetBSD platforms -- the build and
  install targets bear no relation to the extracted distfiles on Linux
  or Solaris.  Support will be re-added in the fullness of time.
2007-08-21 23:14:45 +00:00
taca
22134b5756 Replace python's path in RCD_SCRIPTS, files/denyhosts.
Bump PKGREVISION.
2007-08-20 07:31:38 +00:00
taca
f29d2e45e2 Add a patch for http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4323.
Bump PKGREVISION.
2007-08-18 15:10:38 +00:00
taca
b55392c988 Update sudo package to 1.6.9p4.
pkgsrc change:

Make these options mutual exclusive: kerberos pam skey.
(Really, combinations of kerberos and pam, pam and skey are conflicts.)

CHANGES:

609) Worked around a bug ins some PAM implementations that caused a crash
     when no tty was present.

610) Fixed a crash on some platforms in the error logging function.

611) Documentation improvements.

Sudo 1.6.9p1 released.

612) Fixed updating of the saved environment when the environ pointer
     gets changed out from underneath us.

Sudo 1.6.9p2 released.

613) Fixed a bug related to supplemental group matching introduced
     in 1.6.9.

Sudo 1.6.9p3 released.

614) Added IPv6 support from YOSHIFUJI Hideaki.

615) Fixed sudo_noexec installation path.

616) Fixed a K&R compilation error.

Sudo 1.6.9p4 released.
2007-08-18 15:09:11 +00:00
obache
ed23cefa1e Fixed miss of upstream when split apart seahorse-agent and seahorse-daemon
into different processes.
Should fix PR 36256.

seahorse-agent is now setuid.  Bump PKGREVISION.
2007-08-18 13:19:56 +00:00