Commit graph

9068 commits

Author SHA1 Message Date
prlw1
ee6cf974ac Move gdbus-codegen users to py-glib2-tools by including glib2/buildtools.mk 2017-10-13 16:36:03 +00:00
minskim
2363665c37 security/Makefile: Add ruby-rex-ole 2017-10-13 16:29:35 +00:00
minskim
58a0d24c18 security/ruby-rex-ole: Import version 0.1.6
Ruby Exploitation(Rex) Library which contains architecture specific
information such as registers, opcodes, and stack manipulation
routines.
2017-10-13 16:29:07 +00:00
minskim
c4c172dfa7 security/Makefile: Add ruby-rex-java 2017-10-13 16:15:19 +00:00
minskim
17982f2a7f security/ruby-rex-java: Import version 0.1.5
Ruby Exploitation (Rex) library for parsing Java serialized streams.
2017-10-13 16:14:05 +00:00
minskim
dc5b6ea166 security/Makefile: Add ruby-rex-arch 2017-10-13 16:00:06 +00:00
minskim
ba4699243b security/ruby-rex-arch: Import version 0.1.11
Ruby Exploitation(Rex) Library which contains architecture specific
information such as registers, opcodes, and stack manipulation
routines.
2017-10-13 15:59:36 +00:00
nros
7347d95313 Revbump and use of c++11 beacuse of lang/qore update. 2017-10-12 18:21:23 +00:00
minskim
d9c2a241b5 security/Makefile: Add ruby-rex-core 2017-10-12 16:19:18 +00:00
minskim
bf944d0d3c security/ruby-rex-core: Import version 0.1.12
The Ruby Exploitation (rex) Core Gem. This Gem contains the odds and
ends of code that so many other pieces of Rex rely upon, but that are
too small to be put into their own seperate gems. This include some of
the ruby cross-platform compatibility and file utility code.
2017-10-12 16:18:13 +00:00
adam
114e8d35f1 py-paramiko: update to 2.3.1
2.3.1:
[Bug] 1071: Certificate support broke the no-certificate case for Ed25519 keys (symptom is an AttributeError about public_blob.) This went uncaught due to cert autoload behavior (i.e. our test suite never actually ran the no-cert case, because the cert existed!) Both issues have been fixed. Thanks to John Hu for the report.
2017-10-12 12:42:26 +00:00
adam
ccca74e315 PyNaCl is a Python binding to libsodium, which is a fork of the Networking and
Cryptography library. These libraries have a stated goal of improving
usability, security and speed.
2017-10-12 12:35:34 +00:00
adam
d8931d3dfb libsodium: update to 1.0.15
Version 1.0.15
 - The default password hashing algorithm is now Argon2id. The
`pwhash_str_verify()` function can still verify Argon2i hashes
without any changes, and `pwhash()` can still compute Argon2i hashes
as well.
 - The aes128ctr primitive was removed. It was slow, non-standard, not
authenticated, and didn't seem to be used by any opensource project.
 - Argon2id required at least 3 passes like Argon2i, despite a minimum
of `1` as defined by the `OPSLIMIT_MIN` constant. This has been fixed.
 - The secretstream construction was slightly changed to be consistent
with forthcoming variants.
 - The Javascript and Webassembly versions have been merged, and the
module now returns a `.ready` promise that will resolve after the
Webassembly code is loaded and compiled.
 - Note that due to these incompatible changes, the library version
major was bumped up.
2017-10-12 12:08:39 +00:00
adam
046ddb4985 py-bcrypt: update to 3.1.4
3.1.4
Fixed compilation with mingw and on illumos.
2017-10-12 08:31:58 +00:00
adam
f931c27680 py-cryptography[_vectors]: update to 2.1.1
2.1:
FINAL DEPRECATION Python 2.6 support is deprecated, and will be removed in the next release of cryptography.
BACKWARDS INCOMPATIBLE: Whirlpool, RIPEMD160, and UnsupportedExtension have been removed in accordance with our :doc:`/api-stability` policy.
BACKWARDS INCOMPATIBLE: :attr:`~cryptography.x509.DNSName.value`, :attr:`~cryptography.x509.RFC822Name.value`, and :attr:`~cryptography.x509.UniformResourceIdentifier.value` will now return an :term:`A-label` string when parsing a certificate containing an internationalized domain name (IDN) or if the caller passed a :term:`U-label` to the constructor. See below for additional deprecations related to this change.
Installing cryptography now requires pip 6 or newer.
Deprecated passing :term:`U-label` strings to the :class:`~cryptography.x509.DNSName`, :class:`~cryptography.x509.UniformResourceIdentifier`, and :class:`~cryptography.x509.RFC822Name` constructors. Instead, users should pass values as :term:`A-label` strings with idna encoding if necessary. This change will not affect anyone who is not processing internationalized domains.
Added support for :class:`~cryptography.hazmat.primitives.ciphers.algorithms.ChaCha20`. In most cases users should choose :class:`~cryptography.hazmat.primitives.ciphers.aead.ChaCha20Poly1305` rather than using this unauthenticated form.
Added :meth:`~cryptography.x509.CertificateRevocationList.is_signature_valid` to :class:`~cryptography.x509.CertificateRevocationList`.
Support :class:`~cryptography.hazmat.primitives.hashes.BLAKE2b` and :class:`~cryptography.hazmat.primitives.hashes.BLAKE2s` with :class:`~cryptography.hazmat.primitives.hmac.HMAC`.
Added support for :class:`~cryptography.hazmat.primitives.ciphers.modes.XTS` mode for AES.
Added support for using labels with :class:`~cryptography.hazmat.primitives.asymmetric.padding.OAEP` when using OpenSSL 1.0.2 or greater.
Improved compatibility with NSS when issuing certificates from an issuer that has a subject with non-UTF8String string types.
Add support for the :class:`~cryptography.x509.DeltaCRLIndicator` extension.
Add support for the :class:`~cryptography.x509.TLSFeature` extension. This is commonly used for enabling OCSP Must-Staple in certificates.
Add support for the :class:`~cryptography.x509.FreshestCRL` extension.
2017-10-12 08:28:40 +00:00
tez
ae64bfc327 mit-krb5: update to 1.14.6
Major changes in 1.14.6 (2017-09-25)

This is a bug fix release.

    Fix a KDC denial of service vulnerability caused by unset status strings [CVE-2017-11368]
    Preserve GSS contexts on init/accept failure [CVE-2017-11462]
    Fix kadm5 setkey operation with LDAP KDB module
    Use a ten-second timeout after successful connection for HTTPS KDC requests, as we do for TCP requests
    Fix client null dereference when KDC offers encrypted challenge without FAST
2017-10-10 21:22:53 +00:00
adam
1278fc6b50 py-stix: update to 1.2.0.4
Version 1.2.0.4:
Add support for Python 3.6.
Update to latest mixbox.
Emit proper xsi:type for AISMarkingStructure.
Implement hash for required objects
2017-10-10 07:32:30 +00:00
adam
0b88562472 py-cybox: update to 2.1.0.14
Version 2.1.0.14:
- Add support for Python 3.6.
- Update to latest version of mixbox.
- Add __hash__ to classes.
2017-10-10 07:30:58 +00:00
jperkin
f0f4e59027 ruby-metasploit_payloads-mettle: Disable SSP checks. 2017-10-09 15:34:04 +00:00
wiz
ddfa23f6ca ruby-metasploit-payloads: follow redirect 2017-10-09 08:47:51 +00:00
wiz
5c5c46e9e7 py-slowaes: update HOMEPAGE 2017-10-09 08:25:56 +00:00
wiz
752fded5be p5-Digest-SHA3: update to 0.27.
0.27  Wed Oct  4 00:40:04 MST 2017
	- removed "portable" mode from sha3sum and addfile
		-- rarely used, mostly in outdated systems
		-- potentially confusing features (e.g. \r\r\n -> \n)
		-- Universal Newlines mode (-U) a much cleaner approach
			-- mimics Universal Newlines in Python
	- sha3sum now depends explicitly on Digest::SHA3
		-- eliminates runtime loading of modules
		-- no future plans to write Digest::SHA3::PurePerl
2017-10-09 07:37:32 +00:00
wiz
d072dd2551 p5-Digest-SHA: update to 5.98.
5.98  Wed Oct  4 00:40:02 MST 2017
	- removed "portable" mode from shasum and addfile
		-- rarely used, mostly in outdated systems
		-- potentially confusing features (e.g. \r\r\n -> \n)
		-- Universal Newlines mode (-U) a much cleaner approach
			-- mimics Universal Newlines in Python
	- shasum now uses Digest::SHA explicitly
		-- no longer loads Digest::SHA::PurePerl as an option
			-- hence no need for -R switch
		-- Digest::SHA::PurePerl has its own shasum: shasumpp
2017-10-09 07:36:54 +00:00
adam
1524bb7052 Fixed: PLIST is different for Python 2.x and 3.x 2017-10-09 06:21:39 +00:00
adam
401f21717c py-bcrypt: update to 3.1.3
3.1.3
Fixed a compilation issue on Solaris.
Added a warning when using too few rounds with kdf.
2017-10-08 08:58:21 +00:00
hauke
63e40c9399 Project homepage has changed. 2017-10-06 14:29:10 +00:00
hauke
7954e57d7f Upgrade security/libfprint from 0.0.6 to 0.7.0
Changes are too numerous to list.
Install cli test tools.
2017-10-06 14:16:00 +00:00
adam
61c24d5d5b py-asn1: update to 0.3.7
Revision 0.3.7:
Fixed ASN.1 time types pickling/deepcopy'ing
2017-10-06 06:34:36 +00:00
hauke
3971a80644 Project homepage is at freedesktop.org now. 2017-10-05 12:51:59 +00:00
wiz
45e1ad2483 openssh: update to 7.6.1.
Potentially-incompatible changes
================================

This release includes a number of changes that may affect existing
configurations:

 * ssh(1): delete SSH protocol version 1 support, associated
   configuration options and documentation.

 * ssh(1)/sshd(8): remove support for the hmac-ripemd160 MAC.

 * ssh(1)/sshd(8): remove support for the arcfour, blowfish and CAST
   ciphers.

 * Refuse RSA keys <1024 bits in length and improve reporting for keys
   that do not meet this requirement.

 * ssh(1): do not offer CBC ciphers by default.

Changes since OpenSSH 7.5
=========================

This is primarily a bugfix release. It also contains substantial
internal refactoring.

Security
--------

 * sftp-server(8): in read-only mode, sftp-server was incorrectly
   permitting creation of zero-length files. Reported by Michal
   Zalewski.

New Features
------------

 * ssh(1): add RemoteCommand option to specify a command in the ssh
   config file instead of giving it on the client's command line. This
   allows the configuration file to specify the command that will be
   executed on the remote host.

 * sshd(8): add ExposeAuthInfo option that enables writing details of
   the authentication methods used (including public keys where
   applicable) to a file that is exposed via a $SSH_USER_AUTH
   environment variable in the subsequent session.

 * ssh(1): add support for reverse dynamic forwarding. In this mode,
   ssh will act as a SOCKS4/5 proxy and forward connections
   to destinations requested by the remote SOCKS client. This mode
   is requested using extended syntax for the -R and RemoteForward
   options and, because it is implemented solely at the client,
   does not require the server be updated to be supported.

 * sshd(8): allow LogLevel directive in sshd_config Match blocks;
   bz#2717

 * ssh-keygen(1): allow inclusion of arbitrary string or flag
   certificate extensions and critical options.

 * ssh-keygen(1): allow ssh-keygen to use a key held in ssh-agent as
   a CA when signing certificates. bz#2377

 * ssh(1)/sshd(8): allow IPQoS=none in ssh/sshd to not set an explicit
   ToS/DSCP value and just use the operating system default.

 * ssh-add(1): added -q option to make ssh-add quiet on success.

 * ssh(1): expand the StrictHostKeyChecking option with two new
   settings. The first "accept-new" will automatically accept
   hitherto-unseen keys but will refuse connections for changed or
   invalid hostkeys. This is a safer subset of the current behaviour
   of StrictHostKeyChecking=no. The second setting "off", is a synonym
   for the current behaviour of StrictHostKeyChecking=no: accept new
   host keys, and continue connection for hosts with incorrect
   hostkeys. A future release will change the meaning of
   StrictHostKeyChecking=no to the behaviour of "accept-new". bz#2400

 * ssh(1): add SyslogFacility option to ssh(1) matching the equivalent
   option in sshd(8). bz#2705

Bugfixes
--------

 * ssh(1): use HostKeyAlias if specified instead of hostname for
   matching host certificate principal names; bz#2728

 * sftp(1): implement sorting for globbed ls; bz#2649

 * ssh(1): add a user@host prefix to client's "Permission denied"
   messages, useful in particular when using "stacked" connections
   (e.g. ssh -J) where it's not clear which host is denying. bz#2720

 * ssh(1): accept unknown EXT_INFO extension values that contain \0
   characters. These are legal, but would previously cause fatal
   connection errors if received.

 * ssh(1)/sshd(8): repair compression statistics printed at
   connection exit

 * sftp(1): print '?' instead of incorrect link count (that the
   protocol doesn't provide) for remote listings. bz#2710

 * ssh(1): return failure rather than fatal() for more cases during
   session multiplexing negotiations. Causes the session to fall back
   to a non-mux connection if they occur. bz#2707

 * ssh(1): mention that the server may send debug messages to explain
   public key authentication problems under some circumstances; bz#2709

 * Translate OpenSSL error codes to better report incorrect passphrase
   errors when loading private keys; bz#2699

 * sshd(8): adjust compatibility patterns for WinSCP to correctly
   identify versions that implement only the legacy DH group exchange
   scheme. bz#2748

 * ssh(1): print the "Killed by signal 1" message only at LogLevel
   verbose so that it is not shown at the default level; prevents it
   from appearing during ssh -J and equivalent ProxyCommand configs.
   bz#1906, bz#2744

 * ssh-keygen(1): when generating all hostkeys (ssh-keygen -A), clobber
   existing keys if they exist but are zero length. zero-length keys
   could previously be made if ssh-keygen failed or was interrupted part
   way through generating them. bz#2561

 * ssh(1): fix pledge(2) violation in the escape sequence "~&" used to
   place the current session in the background.

 * ssh-keyscan(1): avoid double-close() on file descriptors; bz#2734

 * sshd(8): avoid reliance on shared use of pointers shared between
   monitor and child sshd processes. bz#2704

 * sshd_config(8): document available AuthenticationMethods; bz#2453

 * ssh(1): avoid truncation in some login prompts; bz#2768

 * sshd(8): Fix various compilations failures, inc bz#2767

 * ssh(1): make "--" before the hostname terminate argument processing
   after the hostname too.

 * ssh-keygen(1): switch from aes256-cbc to aes256-ctr for encrypting
   new-style private keys. Fixes problems related to private key
   handling for no-OpenSSL builds. bz#2754

 * ssh(1): warn and do not attempt to use keys when the public and
   private halves do not match. bz#2737

 * sftp(1): don't print verbose error message when ssh disconnects
   from under sftp. bz#2750

 * sshd(8): fix keepalive scheduling problem: activity on a forwarded
   port from preventing the keepalive from being sent; bz#2756

 * sshd(8): when started without root privileges, don't require the
   privilege separation user or path to exist. Makes running the
   regression tests easier without touching the filesystem.

 * Make integrity.sh regression tests more robust against timeouts.
   bz#2658

 * ssh(1)/sshd(8): correctness fix for channels implementation: accept
   channel IDs greater than 0x7FFFFFFF.

Portability
-----------

 * sshd(9): drop two more privileges in the Solaris sandbox:
   PRIV_DAX_ACCESS and PRIV_SYS_IB_INFO; bz#2723

 * sshd(8): expose list of completed authentication methods to PAM
   via the SSH_AUTH_INFO_0 PAM environment variable. bz#2408

 * ssh(1)/sshd(8): fix several problems in the tun/tap forwarding code,
   mostly to do with host/network byte order confusion. bz#2735

 * Add --with-cflags-after and --with-ldflags-after configure flags to
   allow setting CFLAGS/LDFLAGS after configure has completed. These
   are useful for setting sanitiser/fuzzing options that may interfere
   with configure's operation.

 * sshd(8): avoid Linux seccomp violations on ppc64le over the
   socketcall syscall.

 * Fix use of ldns when using ldns-config; bz#2697

 * configure: set cache variables when cross-compiling. The cross-
   compiling fallback message was saying it assumed the test passed,
   but it wasn't actually set the cache variables and this would
   cause later tests to fail.

 * Add clang libFuzzer harnesses for public key parsing and signature
   verification.
2017-10-04 11:44:14 +00:00
minskim
c9db389d67 security/Makefile: Add ruby-rubyntlm 2017-10-03 15:57:06 +00:00
minskim
744b363403 security/ruby-rubyntlm: Import version 0.6.2
Ruby/NTLM provides message creator and parser for the NTLM
authentication.
2017-10-03 15:56:29 +00:00
wiz
565d6e265d py-oauthlib: update to 2.0.4.
2.0.4 (2017-09-17)
------------------
* Fixed typo that caused OAuthlib to crash because of the fix in
"Address missing OIDC errors and fix a typo in the AccountSelectionRequired
exception".
2017-10-03 12:46:52 +00:00
wiz
321105cae4 libsecret: update to 0.18.5.
0.18.5
 * Build fixes
 * Port tests to Python 3 [#761834]
 * Fix textual typos [#763143]
 * Updated translations

0.18.4
 * Multithreading fixes [#756766]
 * Fix memory leaks [#756766]
 * Updated translations

0.18.3
 * Updated translations
 * Documentation fixes

0.18.2
 * Testing fixes
 * Documentation typo [#747654 ...]
 * Build fixes [#743444]
 * Updated transaltions
 * Accomodate libgcrypt 1.6+

0.18.1
 * Testing fix [#726909]
2017-10-02 15:38:05 +00:00
taca
0307dd484b security/ruby-metasploit-payloads: Fix syntax of Makefile
Fix syntax fo Makefile.
2017-10-02 05:03:19 +00:00
joerg
58d83fb139 Don't check payload files for library dependencies. 2017-10-01 19:05:40 +00:00
adam
f5b291c774 py-asn1: update to 0.3.6
Revision 0.3.6:
* End-of-octets encoding optimized at ASN.1 encoders
* The __getitem__/__setitem__ behavior of Set/Sequence and SetOf/SequenceOf objects aligned with the canonical Mapping and Sequence protocols in part
* Fixed crash in ASN.1 encoder when encoding an explicitly tagged component of a Sequence
2017-09-30 15:12:30 +00:00
adam
02b624b473 gnupg2: update to 2.2.1
version 2.2.1:
* gpg: Fix formatting of the user id in batch mode key generation
  if only "name-email" is given.
* gpgv: Fix annoying "not suitable for" warnings.
* wks: Convey only the newest user id to the provider.  This is the
  case if different names are used with the same addr-spec.
* wks: Create a complying user id for provider policy mailbox-only.
* wks: Add workaround for posteo.de.
* scd: Fix the use of large ECC keys with an OpenPGP card.
* dirmngr: Use system provided root certificates if no specific HKP
  certificates are configured.  If build with GNUTLS, this was
  already the case.
2017-09-30 12:38:01 +00:00
adam
34bf97af84 py-kerberos: update to 1.2.5
1.2.5:
Bug fixes.
2017-09-30 09:42:52 +00:00
wiz
48f6d824b2 KeePass: follow redirect 2017-09-30 07:42:46 +00:00
minskim
5bc5fc2d73 security/Makefile: Add ruby-rex-powershell 2017-09-29 17:16:13 +00:00
minskim
72d9d7a4ba security/ruby-rex-powershell: Import version 0.1.72
Ruby Exploitation (Rex) library for generating/manipulating Powershell
scripts.
2017-09-29 17:15:41 +00:00
minskim
89cc479013 security/Makefile: Add ruby-rex-random_identifier 2017-09-29 16:52:46 +00:00
minskim
923f1162a7 security/ruby-rex-random_identifier: Import version 0.1.4
Ruby Exploitation (Rex) library for generating Random identifier
strings.
2017-09-29 16:51:00 +00:00
minskim
e2356a026c security/Makefile: Add ruby-rex-text 2017-09-29 16:26:15 +00:00
minskim
a1934b506f security/ruby-rex-text: Import version 0.2.15
rex-text contains all of the Ruby Exploitation (Rex) methods for text
manipulation and generation.
2017-09-29 16:25:43 +00:00
minskim
7fbb02da30 security/Makefile: Add ruby-metasploit-payloads 2017-09-29 15:46:17 +00:00
minskim
c22dc27069 security/ruby-metasploit-payloads: Import version 1.3.9
Compiled binaries for Metasploit's Meterpreter.
2017-09-29 15:45:15 +00:00
wiz
eef80df883 emacs22*, emacs23*, emacs24*: remove unmaintained emacs versions
As announced in
https://mail-index.netbsd.org/pkgsrc-users/2017/09/11/msg025563.html

This still leaves emacs20, emacs21, and the current version, emacs25.
2017-09-29 12:40:26 +00:00
adam
0540fbb749 py-asn1crypto: update to 0.23.0
0.23.0:
Backwards compatibility break: the tag_type, explicit_tag and explicit_class attributes on core.Asn1Value no longer exist and were replaced by the implicit and explicit attributes. Field param dicts may use the new explicit and implicit keys, or the old tag_type and tag keys. The attribute changes will likely to have little to no impact since they were primarily an implementation detail.
Teletex strings used inside of X.509 certificates are now interpreted using Windows-1252 (a superset of ISO-8859-1). This enables compatibility with certificates generated by OpenSSL. Strict parsing of Teletex strings can be retained by using the x509.strict_teletex() context manager.
Added support for nested explicit tagging, supporting values that are defined with explicit tagging and then added as a field of another structure using explicit tagging.
Fixed a UnicodeDecodeError when trying to find the (optional) dependency OpenSSL on Python 2
Fixed next_update field of crl.TbsCertList to be optional
Added the x509.Certificate.sha256_fingerprint property
x509.Certificate.ocsp_urls and x509.DistributionPoint.url will now return https://, ldap:// and ldaps:// URLs in addition to http://.
Added CMS Attribute Protection definitions from RFC 6211
Added OIDs from RFC 6962
2017-09-29 06:36:31 +00:00