Commit graph

4070 commits

Author SHA1 Message Date
cbiere
602a5d0eba Check for GCC on IRIX instead of assuming the native compiler is used. 2006-12-03 14:49:56 +00:00
rillig
34a9ff2e26 Fixed PKGMANDIR. 2006-12-02 16:01:45 +00:00
joerg
f7f714eb37 Replace hard-coded PKGNAME with the variable for the sake of
Python != 2.4.
2006-12-01 10:55:30 +00:00
joerg
27d8e7219c Explicitly pass down MAKE to fix wrkdir reference in nessus-build.
Bump revision.
2006-11-30 21:16:07 +00:00
joerg
394907382d The oracle says that FOO= ${FOO} to get the variable from the environment
in Makefile is a really bad and stupid idea. Kill it.
2006-11-30 18:51:31 +00:00
gdt
36a87e0b0b update to 0.0.8.
* Major changes in 0.0.8

** epa-file.el can now specify recipient keys from the file local
   variable `epa-file-encrypt-to'.

** Always encode passphrase with eol-type LF.

** Allow empty user IDs.

** Support handling notations on the signature.

* Major changes in 0.0.7

** Fixed a clearsign verification bug.
2006-11-30 14:08:27 +00:00
tv
da353d92f4 Add devel/sysexits/buildlink3.mk. Doesn't affect existing builds. 2006-11-28 16:38:00 +00:00
taca
553fdbc1e1 Add the same patch as security/gnupg2 package to fix a buffer overflow.
While fixing a bug reported by Hugh Warrington, a buffer overflow has
been identified in all released GnuPG versions.  The current versions
1.4.5 and 2.0.0 are affected.  A small patch is provided.
...

2006-11-27  Werner Koch  <wk@g10code.com>

	* openfile.c (ask_outfile_name): Fixed buffer overflow occurring
	if make_printable_string returns a longer string.  Fixes bug 728.

Bump PKGREVISION.
2006-11-28 05:39:41 +00:00
wiz
fc1eb2693d Bump PKGREVISION for security fix in patch-ag. 2006-11-27 20:38:46 +00:00
shannonjr
36bc11cf32 "While fixing a bug reported by Hugh Warrington, a buffer overflow has
been identified in all released GnuPG versions.  Exploiting this
overflow seems to be possible.  Apply the following patch to GnuPG."
2006-11-27  Werner Koch  <wk@g10code.com>

gnupg2 has been patched accordingly.
2006-11-27 20:37:20 +00:00
agc
bd4c2841dc Apply the fix in PR 35024 from Jukka Salmi - allow the use of the base name
of the package when specifying package names for the -p (one package) option,
and to make audit-packages more consistent with pkg_info behaviour.
2006-11-25 13:43:42 +00:00
obache
1e490a3135 Add and enable cy2-ldapdb. 2006-11-25 13:37:01 +00:00
obache
1a2232ca27 Import cy2-ldapdb version 2.1.22.
Based on PR 33317 by Yoshito Komatsu.

SASL is a method for adding authentication support to connection-based
protocols.  To use SASL, a protocol includes a command for identifying and
authenticating a user to a server and for optionally negotiating protection
of subsequent protocol interactions.  If its use is negotiated, a security
layer is inserted between the protocol and the connection.

This is the Cyrus SASL plugin that implements the LDAPDB authentication
2006-11-25 13:35:25 +00:00
wiz
5c007cc7c1 Reset maintainer:
Name service error for name=ethmoid.org type=MX: Host not found, try again
2006-11-24 23:04:14 +00:00
shannonjr
b0b02fd1c5 Update to Prewikka 0.9.8. Changes:
- Save/load user configuration when using CGI authentication mode (#181).
- Show Prewikka version in the About page (#177).
- Use Python logging facility (available backend: stderr, file, smtp, syslog),
  multiple simultaneous handler supported (#113).
- Fix anonymous authentication.
- Fix external process going into zombie state (#178).
- Display correct alertident for invalid CorrelationAlert analyzerid/messageid pair.
- prewikka-httpd should now log the source address.
- Thread safety fixes.
2006-11-24 11:45:30 +00:00
shannonjr
0b450fcca8 Re: pkg/35086: security/pinentry: PLIST is wrong
PLIST correction.
2006-11-22 11:56:14 +00:00
tv
569889ebf2 Add explicit IOV_MAX for Interix -- openssh tries to use _XOPEN_IOV_MAX
in an autoarray, but on Interix that is the same as INT_MAX[!].
2006-11-21 17:47:53 +00:00
tv
53c87eaf2f regen for patches 2006-11-21 17:44:53 +00:00
tv
d576320b00 fix variable name in Interix part of patch 2006-11-21 17:43:56 +00:00
shannonjr
e1f1416513 Re: pkg/35088: security/gnupg2: PLIST.gpgsm is wrong
PLIST correction.
2006-11-20 22:23:24 +00:00
shannonjr
32022306d7 Added a gettext-lib API version dependancy to deal with reported build
problem under NetBSD 3.0.
2006-11-19 19:03:56 +00:00
wiz
658d9cf876 tv@ pointed out that curl-7.16.0 had a shlib major bump --
increase its BUILDLINK_ABI_DEPENDS, and bump PKGREVISIONs
of dependencies.

Sorry for not finding this earlier.
2006-11-19 11:50:23 +00:00
wiz
b19269fab2 Make build with curl-7.16.0. 2006-11-19 08:15:17 +00:00
obache
d223ee72e7 Added starttls. 2006-11-18 16:10:41 +00:00
obache
55ffb6e9ac Import starttls 0.10, based on PR 29467 by FUKAUMI Naoki.
I modify to adapt to recent pkgsrc tree.

starttls is simple wrapper program for STARTTLS on emacsen.
2006-11-18 16:09:12 +00:00
shannonjr
9cba0222df Removing gnupg-devel. It has been replaced by gnupg2. 2006-11-17 15:19:39 +00:00
shannonjr
e9429a54af Added entry for gnupg2 2006-11-17 12:38:36 +00:00
shannonjr
fa74212ce3 Update to 1.0.0.
There are no actual code changes since the last release, only some
cleanups and a complete manual.
2006-11-17 12:34:47 +00:00
shannonjr
9e5d2d2c28 Updated gpgsm option to use security/gnupg2 instead of security/gnupg-devel. 2006-11-17 12:16:00 +00:00
shannonjr
5877ae8b9e This package is the sucessor to gnupg-devel.
GnuPG-2 provides several utilities that are used by mail clients,
such as Kmail and Balsa, including OpenPGP and S/MIME support.
GnuPG-2 has a different architecture than GnuPG-1 (e.g. 1.4.5) in that
it splits up functionality into several modules.  However, both
versions may be installed alongside without any conflict.  In fact,
the gpg version from GnuPG-1 is able to make use of the gpg-agent as
included in GnuPG-2 and allows for seamless passphrase caching.  The
advantage of GnuPG-1 is its smaller size and the lack of dependency on
other modules at run and build time.
2006-11-17 12:13:11 +00:00
rillig
065971180f This package does not have a man page. 2006-11-14 13:22:06 +00:00
drochner
98cb7c213a update to 1.4.5
changes: minor bugfixes
2006-11-13 18:15:14 +00:00
obache
26c17a6dab Use md5.h in distfile instead of system provided file.
This is better solution of PR 28562 and may fix PR 34792.

Also, convert a post-build sed step to use the SUBST framework,
requested by PR 34792.
2006-11-13 15:47:14 +00:00
rillig
c2cf732bb4 Fixed PKGMANDIR and Perl interpreter. PKGREVISION++ 2006-11-12 02:56:41 +00:00
rillig
ffc370ef6a Fixed PKGMANDIR. 2006-11-12 02:22:44 +00:00
bad
cf7e86be16 Descend into fwbuilder21 and libfwbuilder21. 2006-11-09 19:11:33 +00:00
bad
fd8a161670 These conflict with with libfwbuilder21 and fwbuilder21 because
of the lib/libfw{builder,compiler}.{a,la.so} files.
2006-11-09 19:10:17 +00:00
bad
8ce21a8fff Initial import of fwbuilder-2.1.7.
Changes since the 2.0.12 release:

Improvements and changes in the GUI

     * The GUI works much faster with very large object trees.

     * "Where used" menu item to quickly find and show all groups and
       firewall rules that reference given object. Confirmation dialog
       shown when an object is deleted also shows all groups and rules
       that use it.

     * Built-in installer can now save a copy of .fwb file to the firewall.

     * Compile/install dialog is now an independent window instead of a modal
       dialog, this means the user can look at the policy and objects while
       compilation and/or installation is going on.

     * Network discovery driud is back, ported from fwbuilder 1.0. As before,
       it supports reading object definitions from a file in /etc/hosts
       format, can read DNS zone and also can crawl the network using SNMP
       queries.

     * Startup splash window has been removed.

     * Keeping track of dependencies between objects. Firewalls that refer
       to an object that is modified are marked with bold font.

     * Added bulk compile and install operations.

     * All object dialogs have been converted into built-in panels that
       appear in the right hand part of the main window.

     * Improvements in "Find" function: administrator can now drag an object
       into a well in the find dialog panel to make it search for this
       particular object.

     * The "Find and replace" operation has been implemented.

New object types, new rule types and rule elements, new actions and other new
features

     * AddressTable  This object resolves to a set of IP addresses defined in
       an external file.

     * DNSName:  This object resolves a host name to the IP address using
       DNS. Object can be confgiured to do so at compile time or run time.

     * TagService:  This object matches tags set by action Tag.

     * Interface objects can now be marked as bridge ports.

     * Support for routing rules has been implemented.

     * Global policy and interface policies have been merged. Each policy
       rule now has rule element "Interface".

     * Policy rules can have the following new actions:

          * Queue:  This action passes the packet to user space process for
            inspection.

          * Custom:  This action allows administrator to define arbitrary
            piece of code to be used in place of an action.

          * Branch:  This action is used to create a branch in the rule set.

          * Tag:  This action associates internal tag with the packet.

          * Classify:  This action allows the firewall to define QoS class
            for the packet that matches the rule.

          * Route:  This action makes the firewall to route the packet that
            matches the rule through an interface or a gateway specified in
            the parameters of the action.

     * Firewall object now has an attribute "inactive" excluding it from
       bulk compiles and installs.

Compiler for iptables

     * Support for address tables loaded from external files at compile or
       run time.

     * Support user defined chains with predefined names (using special
       action )

     * Support for CLASSIFY, MARK, CONNMARK, QUEUE, ROUTE targets

     * Support for physdev module for bridging firewalls

     * additional optimization of rules in INPUT and OUTPUT chain: now
       removing firewall object from src or dst to simplify rule if it uses
       OUTPUT or INPUT chain.

     * support for modules connlimit and hashlimit.

Compiler for PF

     * Support for load balancing rules
     * Support for tag and route options
     * Support for address ranges and network objects in TSrc in NAT rules
     * Support for pool types in NAT rules ('bitmask', 'random',
       'source-hash', 'round-robin'), as well as 'static-port' option.
     * Supprot for anchors (by way of a special action)
     * Support for tables with predefined names (using AddressTable object)
     * Support for packet 'tagging' (by way of a special action and service
       object TagService)

Compiler for ipfilter

     * Support for PPTP and IRC proxies
     * Support for route option

API

     * internal object ID is augumented with process ID of the program that
       creates an object.
     * fwbedit

   Fwbedit can now create objects and repair broken object database.
2006-11-09 19:07:56 +00:00
bad
7f4f21f230 Initial import of libfwbuilder-2.1.7.
Changes since the the 2.0.12 release:

Improvements and changes in the GUI

     * The GUI works much faster with very large object trees.

     * "Where used" menu item to quickly find and show all groups and
       firewall rules that reference given object. Confirmation dialog
       shown when an object is deleted also shows all groups and rules
       that use it.

     * Built-in installer can now save a copy of .fwb file to the firewall.

     * Compile/install dialog is now an independent window instead of a modal
       dialog, this means the user can look at the policy and objects while
       compilation and/or installation is going on.

     * Network discovery driud is back, ported from fwbuilder 1.0. As before,
       it supports reading object definitions from a file in /etc/hosts
       format, can read DNS zone and also can crawl the network using SNMP
       queries.

     * Startup splash window has been removed.

     * Keeping track of dependencies between objects. Firewalls that refer
       to an object that is modified are marked with bold font.

     * Added bulk compile and install operations.

     * All object dialogs have been converted into built-in panels that
       appear in the right hand part of the main window.

     * Improvements in "Find" function: administrator can now drag an object
       into a well in the find dialog panel to make it search for this
       particular object.

     * The "Find and replace" operation has been implemented.

New object types, new rule types and rule elements, new actions and other new
features

     * AddressTable  This object resolves to a set of IP addresses defined in
       an external file.

     * DNSName:  This object resolves a host name to the IP address using
       DNS. Object can be confgiured to do so at compile time or run time.

     * TagService:  This object matches tags set by action Tag.

     * Interface objects can now be marked as bridge ports.

     * Support for routing rules has been implemented.

     * Global policy and interface policies have been merged. Each policy
       rule now has rule element "Interface".

     * Policy rules can have the following new actions:

          * Queue:  This action passes the packet to user space process for
            inspection.

          * Custom:  This action allows administrator to define arbitrary
            piece of code to be used in place of an action.

          * Branch:  This action is used to create a branch in the rule set.

          * Tag:  This action associates internal tag with the packet.

          * Classify:  This action allows the firewall to define QoS class
            for the packet that matches the rule.

          * Route:  This action makes the firewall to route the packet that
            matches the rule through an interface or a gateway specified in
            the parameters of the action.

     * Firewall object now has an attribute "inactive" excluding it from
       bulk compiles and installs.

Compiler for iptables

     * Support for address tables loaded from external files at compile or
       run time.

     * Support user defined chains with predefined names (using special
       action )

     * Support for CLASSIFY, MARK, CONNMARK, QUEUE, ROUTE targets

     * Support for physdev module for bridging firewalls

     * additional optimization of rules in INPUT and OUTPUT chain: now
       removing firewall object from src or dst to simplify rule if it uses
       OUTPUT or INPUT chain.

     * support for modules connlimit and hashlimit.

Compiler for PF

     * Support for load balancing rules
     * Support for tag and route options
     * Support for address ranges and network objects in TSrc in NAT rules
     * Support for pool types in NAT rules ('bitmask', 'random',
       'source-hash', 'round-robin'), as well as 'static-port' option.
     * Supprot for anchors (by way of a special action)
     * Support for tables with predefined names (using AddressTable object)
     * Support for packet 'tagging' (by way of a special action and service
       object TagService)

Compiler for ipfilter

     * Support for PPTP and IRC proxies
     * Support for route option

API

     * internal object ID is augumented with process ID of the program that
       creates an object.
     * fwbedit

   Fwbedit can now create objects and repair broken object database.
2006-11-09 19:06:37 +00:00
rillig
576d5e3854 Made the package work for unprivileged users. Moved the man page to
man1, since the binaries are installed in bin/.

PKGREVISION++
2006-11-09 11:08:01 +00:00
taca
c69a611a66 Update openssh package to 4.5.1 (openssh-4.5p1).
Changes:

Security bugs resolved in this release:

 * Fix a bug in the sshd privilege separation monitor that weakened its
   verification of successful authentication. This bug is not known to
   be exploitable in the absence of additional vulnerabilities.

This release includes the following non-security fixes:

 * Several compilation fixes for portable OpenSSH

 * Fixes to Solaris SMF/process contract support (bugzilla #1255)
2006-11-08 01:49:22 +00:00
schmonz
346a3b0eee Update to 0.82. From the changelog:
- Fixed handling of user/domain name splitting in the client library
  when the caller doesn't initially provide a domain name.

- cvm_client_setenv now also sets $MAILDIR for use with Courier IMAP.
2006-11-07 22:50:05 +00:00
joerg
c416efe4cb Due to a bug, INSTALLATION_DIRS originally was not prefixed correctly
in the DESTDIR case, fix this.
2006-11-07 09:28:09 +00:00
taca
066403d616 Update hpn-patch to hpn12v13 since old one has gone.
Bump PKGREVISION.
2006-11-07 07:08:26 +00:00
adrianp
6912b69782 Add in a BUILDLINK depends on apache>=2.0.59nb2 as that contains the
libtool fix this package needs to build.
Riding on the initial import - no PKGREVISION bump
2006-11-05 18:05:33 +00:00
joerg
aa48c98240 DESTDIR support. 2006-11-05 17:31:09 +00:00
adrianp
7639ec8b72 +ap-modsecurity2 2006-11-05 14:34:50 +00:00
adrianp
1c14fcf232 ModSecurity is an open source intrusion detection and prevention engine for
web applications (or a web application firewall). Operating as an Apache Web
server module or standalone, the purpose of ModSecurity is to increase web
application security, protecting web applications from known and unknown
attacks.

This is the 2.x branch of modsecurity and only supports Apache 2.x
2006-11-05 14:33:37 +00:00
joerg
c9280515c9 Use custom install rules to get user-destdir ready and most likely
also fix unprivileged builds in general.
2006-11-03 09:07:30 +00:00
joerg
7abab1544d DESTDIR support. 2006-11-03 07:45:44 +00:00