Commit graph

19 commits

Author SHA1 Message Date
grant
868dbb0a08 Updated ap-ssl to 2.8.16.
Major changes since 2.8.15:

   *) Upgraded to Apache 1.3.29

   *) Avoid memory corruption in certificate handling caused by a heap
      memory double-freeing situation.

   *) Allow "HTTPS" variable to be passed through by suEXEC.

   *) Clear the OpenSSL error code in pass phrase reading code to
      workaround the following situation: multiple keys, all with
      different passphrases -- entering the correct pass phrase at each
      prompt leads to an OpenSSL error message after the last prompt.

   *) Reverted the recent change where ap_cleanup_for_exec() called
      ap_kill_alloc_shared(). This caused nasty side-effects in other
      processes and is not necessary at all (because shared memory
      segments are not inherited across exec).

   *) mod_ssl was checking the OpenSSL error reason code against
      SSL_R_HTTP_REQUEST and concluded the result is an SSL error. Since
      OpenSSL reason codes are not unique, this isn't always the case.
      It now additionally checks that the library is the SSL library.
2003-11-02 05:38:56 +00:00
tron
38af44e8ec Update "ap-ssl" package to version 2.8.15. Changes since version 2.8.14:
- Upgraded to Apache 1.3.28
- Take over security fix from Apache 2.0 related to per-directory
  renogotiations.
2003-07-19 12:34:18 +00:00
wiz
44d2208ac0 Update to 2.8.14:
Changes with mod_ssl 2.8.14 (18-Mar-2002 to 21-Mar-2003)

   *) Fixed logic in the destruction of a temporary certificate
      structure and this way avoid a crash due to freeing NULL object.

   *) Removed one newly introduced X509_free() call in the context of
      SSL_get_certificate(), because this function does not increment a
      reference count (although SSL_get_peer_certificate() does).

   *) Fixed hash-table based shared memory session cache (shmht)
      implementation by making sure that the underlying hash table
      library does not crash if memory cannot be allocated.

  Changes with mod_ssl 2.8.13 (23-Oct-2002 to 18-Mar-2003)

   *) Always enforce RSA blinding on RSA private keys in order to be
      resistent to timing attacks.

   *) Added timeout also to the "pre-sucking" of the trailing data in
      POST request handling.

   *) Correctly shutdown shared memory pools on fork+exec situations.

   *) Bugfix SSL client certificate verification: OpenSSL was not
      informed with SSL_set_verify_result(ssl, X509_V_OK) in case
      mod_ssl forced the verification to be ok.

   *) Consistently use OPENSSL_free() instead of plain free() to
      deallocate memory chunks allocated inside OpenSSL.

   *) Fixed various memory leaks related to X509 certificates.

New patch-ac sent to maintainer.
2003-04-10 08:36:41 +00:00
grant
dac711e214 allow 'mkcert' to work on Solaris by using ${SH} rather than /bin/sh. 2002-12-03 14:31:32 +00:00
taca
108c6a0eff Update ap-ssl package to 2.8.12.
Changes with mod_ssl 2.8.12 (04-Oct-2002 to 23-Oct-2002)

   *) Fixed potential Cross-Site-Scripting bug.

   *) Allow also 8192 bytes of shared memory data size.
2002-10-25 02:29:10 +00:00
tron
56dbfe2693 Update "ap-ssl" package to version 2.8.11. Changes since 2.8.10:
- Upgraded to Apache 1.3.27.
- Fixed internal error handling for CRL verification.
- Initialize OpenSSL ENGINE before initializing OpenSSL
  to workaround problems with the PRNG.
- Also find "openssl" executable in "sbin" directories.
- Honor specified number of maximum bytes on SSLRandomSeed
  if reading from EGD.
- Fixed generation of SSL_CLIENT_CERT_CHAIN_[0-9] variables.
2002-10-04 19:16:46 +00:00
jlam
a020ed9056 Merge packages from the buildlink2 branch back into the main trunk that
have been converted to USE_BUILDLINK2.
2002-08-25 21:50:52 +00:00
taca
c21a213279 Update ap-ssl to 2.8.10 (mod_ssl 2.8.10).
Changes with mod_ssl 2.8.10 (19-Jun-2002 to 24-Jun-2002)

   *) Fixed off-by-one buffer overflow bug in the compatibility
      functionality (mapping of old directives to new ones).

   *) Fixed memory leak in processing of CA certificates.

   *) In case there is actually a certificate chain in the session cache,
      we now use the value of SSL_get_peer_certificate(ssl) to verify as
      it will have been removed from the chain before it was put in the
      cache.

   *) Seed the PRNG with a maximum of 1K from the internal scoreboard.
2002-06-24 16:26:49 +00:00
jdolecek
d94ae5e191 update for now-available mod_ssl-2.8.9-1.3.26 2002-06-19 11:03:58 +00:00
jlam
7e8dea6c91 Update www/ap-ssl to 2.8.8. Changes from version 2.8.7 include:
*) Upgraded to Apache 1.3.24
   *) Support leading whitespaces in commands of SSLLog "|..." directives.
   *) Fixed timeout handling on connection establishment by correctly
      resetting the timeout on errors.
   *) Fixed two memory leaks related to CA certificate configuration.
   *) Fixed memory leak related to temporary DH key handling.
   *) Fixed memory leak on shutdown if CRLs are used.
   *) Fixed remaining SIGBUS problems on SPARC inside SHMCB session
      cache implementation.
2002-04-02 14:22:23 +00:00
jlam
60f5701ef0 Update www/ap-ssl to 2.8.7 from the mod_ssl-2.8.7-1.3.23 distribution.
Relevant changes from version 2.8.6 include:

   *) Fixed potential buffer overflow in DBM and SHMHT session
      cache if very very large certificate chains are used.

   *) Compliance with POSIX 1003.1-2001 (SUSv3) by replacing obsolete
      "head -1" and "tail -1" constructs with sed variants in scripts.
2002-02-28 05:45:44 +00:00
jlam
401c787b36 Update www/ap-ssl to 2.8.6:
*) Upgraded to Apache 1.3.23

   *) Fixed a subtle indexing bug in SHMCB. Each sub-cache used an
      indexing structure that (correctly) used index values (and ranges)
      as "unsigned int", but the meta-structure in the header had these
      ranged as "unsigned char".

   *) Perform the SHMCB remove operation under mutual exclusion
      to prevent a inter-process synchronization problem.

   *) Made sure that mod_ssl does not segfault in case of
      SCOREBOARD_SIZE < 1024.

   *) Merged in the SDBM patch from Uwe Ohse which fixes a problem with
      sdbms .dir file, which arrises when a second .dir block is needed
      for the first time. read() returns 0 in that case, and the library
      forgot to initialize that new block. A related problem is that the
      calculation of db->maxbno is wrong. It just appends 4096*BYTESIZ
      bits, which is not enough except for small databases (.dir
      basically doubles everytime it's too small).
2002-02-01 16:05:15 +00:00
jlam
6e896e42e0 Forgot a CONFDIR -> PKG_SYSCONFDIR replacement. 2001-11-26 07:30:44 +00:00
jlam
b6d299c11f Update ap-ssl to 2.8.5 from the mod_ssl-2.8.5-1.3.22 distribution.
Changes from version 2.8.4 include:

   *) Upgraded to Apache 1.3.22
   *) Fixed check whether server certificate wildcard CommonName (CN)
      matches the configured server name.
   *) Fixed buffer overflow.
2001-10-17 19:17:11 +00:00
jlam
0fd480400b Update ap-ssl to 2.8.4 using mod_ssl-2.8.4-1.3.20. Relevant changes from
version 2.8.3 include:

   *) Upgraded to Apache 1.3.20
2001-06-09 06:50:24 +00:00
jlam
e870d60151 Update ap-ssl to 2.8.3. Changes from version 2.8.2 include:
*) Allow loadcacert.cgi script to work inside mod_perl.

   *) Fixed typo in the directive descriptions in mod_ssl.c

   *) Fixed ENGINE support: the engine support is are now already
      loaded at configure time. Else mod_ssl fails to find them.
2001-05-14 14:02:47 +00:00
jlam
c9b1cd81cf Update ap-ssl to 2.8.2. Relevant changes from version 2.8.1:
*) Moved the Shared Memory Cyclic Buffer (SHMCB) session cache
      variant from "experimental" state to "production" by removing the
      `#ifdef SSL_EXPERIMENTAL_SHMCB ...#endif' wrappers. This means
      that now `SSLSessionCache shmcb:...' is unconditionally available.

   *) Made the mutex handling more robust by retrying the
      semaphore-based operations in interrupt situations
      (errno == EINTR).

   *) Also log the OpenSSL error message if the RSA temporary
      key(s) cannot be generated.

   *) Fixed mod_ssl Auth handler: it now returns DECLINED instead of
      OK if authentication is passed successfully to allow other modules
      (usually mod_auth) to still deny the request.

   *) Fixed certificate DN handling under EBCDIC platforms.
2001-04-29 20:36:47 +00:00
skrll
aa3c03b75a Move to sha1 digests, and add distfile sizes. 2001-04-20 12:02:30 +00:00
agc
8f972b049a + move the distfile digest/checksum value from files/md5 to distinfo
+ move the patch digest/checksum values from files/patch-sum to distinfo
2001-04-17 12:12:16 +00:00