Commit graph

12 commits

Author SHA1 Message Date
gdt
4c1945bff8 Update to 4.1.1.
This is a security release addressing CVE-2016-2851.

- Fix an integer overflow bug that can cause a heap buffer overflow (and
  from there remote code execution) on 64-bit platforms
- Fix possible free() of an uninitialized pointer
- Be stricter about parsing v3 fragments
- Add a testsuite ("make check" to run it), but only on Linux for now,
  since it uses Linux-specific features such as epoll
- Fix a memory leak when reading a malformed instance tag file
- Protocol documentation clarifications
2016-03-09 18:04:17 +00:00
agc
b35b0abbb4 Add SHA512 digests for distfiles for chat category
Problems found with existing distfiles:
	distfiles/icb-5.0.9.tar.gz
	distfiles/icb.2.1.4.tar.Z
	distfiles/zenicb-19981202.tar.gz
No changes made to these /distinfo files.

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
2015-11-03 01:20:17 +00:00
gdt
74f8cac1f2 Update to 4.1.0.
21 Oct 2014:
- Release 4.1.0
- Modernized autoconf build system
- Use constant-time comparisons where needed
- Use gcrypt secure memory allocation
- Correctly reject attempts to fragment a message into too many pieces
- Fix a missing opdata when sending message fragments
- Don't lose the first user message when REQUIRE_ENCRYPTION is set
- Fix some memory leaks
- Correctly check for children contexts' state when forgetting a context
- API Changes:
  - Added API functions otrl_context_find_recent_instance and
    otrl_context_find_recent_secure_instance.
2014-10-21 11:46:31 +00:00
gdt
6515929e3e Update to 4.0.0.
Note that while the protocol is compatible, the API is not, and hence
there will be a pidgin-otr update within minutes.

There is an apparent gcc 4.1.3 -O2/SSP bug, which is avoided by
disabling SSP in libotr (which libotr finds and turns on).  This is
temporary pending more fine-grained control and/or a fix.

Update to libotr 4.0.0.  Note that libotr 4.x is API-incompatible with
libotr 3.x; upstream thinks this is ok, so pkgsrc won't try to work
around it.

24 Aug 2012:
- Release 4.0.0
- Support v3 of the OTR protocol
- The main new feature: sensibly handle the case where a user is logged
  in multiple times to the same IM account
- API changes:
  - instance tags, to support multiple simultaneous logins
  - support for asynchronous private key generation
  - the ability to provide an "extra" symmetric key to applications
    (with forward secrecy)
  - applications can supply a formation conversion callback if they do
    not natively use XHTML-style UTF8 markup
  - error messages formerly provided by libotr are now handled using
    callbacks to the application, for better i18n support
  - otrl_message_sending now handles message fragmentation internally
2012-09-06 00:23:18 +00:00
gdt
72c9067193 Update to 3.2.1.
(This is a security release, but pkgsrc already had patches from
upstream.)

This version corrects two heap overflows reported by our users:

- A small write overflow, reported by Justin Ferguson
- A large read overflow, reported by Ben Hawkes
2012-08-14 22:08:09 +00:00
drochner
e29f04073e att patches from upstream to fix buffer overflow in the base64
decoder which can lead to crashes or potentially code injection
(CVE-2012-3461)
bump PKGREV
2012-08-09 10:06:46 +00:00
gdt
78c70b383f Update to 3.2.0.
- Added support for one-way authentication using an explicit question,
  based on the SOUPS 2008 user study.
2008-06-17 13:58:08 +00:00
gdt
bf66f721c7 Update to 3.1.0.
Override libtool; otherwise the distfile libtool inexplicably gets the
wrong shlib version.

Changes since 3.0.0:

- Added fragmentation support for large messages
- Added new method for buddy authentication which does not require the
  (explicit) use of fingerprints.
2007-08-02 11:26:28 +00:00
salo
8201d5e4be Update to version 3.0.0
From Jason White, via PR pkg/32451

Changes:

- Support for OTR protocol version 2; will still interoperate with version 1
  clients (though with a warning to the user), fixes identity-binding flaw
  http://www.cypherpunks.ca/otr/Protocol-v2-3.0.0.html
2006-02-13 14:44:31 +00:00
rillig
96b8e019fa Added a patch to fix void* arithmetic. 2005-07-30 21:30:53 +00:00
gdt
3b5869a4e1 update to 2.0.2:
* src/privkey.c (otrl_privkey_hash_to_human): Avoid writing a
        NUL one byte past the end of the buffer
2005-07-27 19:17:35 +00:00
nathanw
9814b8da9f Initial import of libotr-2.0.1.
This is the portable OTR Messaging Library, as well as the toolkit to
help you forge messages.

Off-the-Record (OTR) Messaging allows you to have private
conversations over instant messaging by providing:

Encryption
    No one else can read your instant messages.
Authentication
    You are assured the correspondent is who you think it is.
Deniability
    The messages you send do not have digital signatures that are
    checkable by a third party. Anyone can forge messages after a
    conversation to make them look like they came from you. However,
    during a conversation, your correspondent is assured the messages
    he sees are authentic and unmodified.
Perfect forward secrecy
    If you lose control of your private keys, no previous conversation
    is compromised.
2005-03-24 21:24:12 +00:00