Commit graph

15634 commits

Author SHA1 Message Date
gavan
1e49626e0e 1 new package in net 2017-08-17 02:06:24 +00:00
gavan
ff03fb9c22 Add go-websocket package 2017-08-17 02:03:23 +00:00
wiz
7c8354aa3e Update some HOMEPAGEs. 2017-08-16 21:22:11 +00:00
wiz
7909ca8cec Comment out dead sites. 2017-08-16 20:45:30 +00:00
wiz
a1e4174a9c Follow some http redirects. 2017-08-16 20:21:03 +00:00
wiz
bd2d845e08 Updated wireshark to 2.2.8.
Bug Fixes

   The following vulnerabilities have been fixed:
     * [1]wnpa-sec-2017-13
       WBMXL dissector infinite loop ([2]Bug 13477, [3]Bug 13796)
       [4]CVE-2017-7702, cve-idlink:CVE-2017-11410[] Note: This is an
       update for a fix in Wireshark 2.2.6 and 2.0.12.

     * [5]wnpa-sec-2017-28
       openSAFETY dissector memory exhaustion ([6]Bug 13649, [7]Bug 13755)
       [8]CVE-2017-9350, [9]CVE-2017-11411 Note: This is an update for a
       fix in Wireshark 2.2.7.

     * [10]wnpa-sec-2017-34
       AMQP dissector crash. ([11]Bug 13780) [12]CVE-2017-11408
     * [13]wnpa-sec-2017-35
       MQ dissector crash. ([14]Bug 13792) [15]CVE-2017-11407
     * [16]wnpa-sec-2017-36
       DOCSIS infinite loop. ([17]Bug 13797) [18]CVE-2017-11406

   The following bugs have been fixed:
     * Y.1711 dissector reverses defect type order. ([19]Bug 8292)
     * Packet list keeps scrolling back to selected packet while names are
       being resolved. ([20]Bug 12074)
     * [REGRESSION] Export Objects do not show files from a SMB2 capture.
       ([21]Bug 13214)
     * LTE RRC: lte-rrc.q_RxLevMin filter fails on negative values.
       ([22]Bug 13481)
     * Hexpane showing in proportional font again. ([23]Bug 13638)
     * Regression in SCCP fragments handling. ([24]Bug 13651)
     * TCAP SRT incorrectly matches TC_BEGINs and TC_ENDs. ([25]Bug 13739)
     * Dissector for WSMP (IEEE 1609.3) not current. ([26]Bug 13766)
     * RANAP: possible issue in the heuristic code. ([27]Bug 13770)
     * [oss-fuzz] UBSAN: shift exponent 35 is too large for 32-bit type
       int in packet-btrfcomm.c:314:37. ([28]Bug 13783)
     * RANAP: false positives on heuristic algorithm. ([29]Bug 13791)
     * Automatic name resolution not saved to PCAP-NG NRB. ([30]Bug 13798)
     * DAAP dissector dissect_daap_one_tag recursion stack exhausted.
       ([31]Bug 13799)
     * Malformed DCERPC PNIO packet decode, exception handler invalid
       poionter reference. ([32]Bug 13811)
     * It seems SPVID was decoded from wrong field. ([33]Bug 13821)
     * README.dissectors: Add notes about predefined string structures not
       available to plugin authors. ([34]Bug 13828)
     * Statistics->Packet Lengths doesn't display details for 5120 or
       greater. ([35]Bug 13844)
     * cmake/modules/FindZLIB.cmake doesn't find inflatePrime. ([36]Bug
       13850)
     * BGP: incorrect decoding COMMUNITIES whose length is larger than
       255. ([37]Bug 13872)

  Updated Protocol Support

   AMQP, BGP, BSSMAP, BT RFCOMM, DAAP, DOCSIS, E.212, FDDI, GSM A GM, GSM
   BSSMAP, IEEE 802.11, IP, ISIS LSP, LTE RRC, MQ, OpenSafety, OSPF,
   PROFINET IO, RANAP, SCCP, SGSAP, SMB2, TCAP, TCP, UMTS FP, UMTS RLC,
   WBXML, WSMP, and Y.1711
2017-08-15 19:37:01 +00:00
wiz
96306cecc3 Updated tor to 0.3.0.10.
Changes in version 0.3.0.10 - 2017-08-02
   Tor 0.3.0.10 backports a collection of small-to-medium bugfixes
   from the current Tor alpha series. OpenBSD users and TPROXY users
   should upgrade; others are probably okay sticking with 0.3.0.9.

  o Major features (build system, continuous integration, backport from 0.3.1.5-alpha):
    - Tor's repository now includes a Travis Continuous Integration (CI)
      configuration file (.travis.yml). This is meant to help new
      developers and contributors who fork Tor to a Github repository be
      better able to test their changes, and understand what we expect
      to pass. To use this new build feature, you must fork Tor to your
      Github account, then go into the "Integrations" menu in the
      repository settings for your fork and enable Travis, then push
      your changes. Closes ticket 22636.

  o Major bugfixes (linux TPROXY support, backport from 0.3.1.1-alpha):
    - Fix a typo that had prevented TPROXY-based transparent proxying
      from working under Linux. Fixes bug 18100; bugfix on 0.2.6.3-alpha.
      Patch from "d4fq0fQAgoJ".

  o Major bugfixes (openbsd, denial-of-service, backport from 0.3.1.5-alpha):
    - Avoid an assertion failure bug affecting our implementation of
      inet_pton(AF_INET6) on certain OpenBSD systems whose strtol()
      handling of "0xfoo" differs from what we had expected. Fixes bug
      22789; bugfix on 0.2.3.8-alpha. Also tracked as TROVE-2017-007.

  o Minor features (backport from 0.3.1.5-alpha):
    - Update geoip and geoip6 to the July 4 2017 Maxmind GeoLite2
      Country database.

  o Minor bugfixes (bandwidth accounting, backport from 0.3.1.2-alpha):
    - Roll over monthly accounting at the configured hour and minute,
      rather than always at 00:00. Fixes bug 22245; bugfix on 0.0.9rc1.
      Found by Andrey Karpov with PVS-Studio.

  o Minor bugfixes (compilation warnings, backport from 0.3.1.5-alpha):
    - Suppress -Wdouble-promotion warnings with clang 4.0. Fixes bug 22915;
      bugfix on 0.2.8.1-alpha.
    - Fix warnings when building with libscrypt and openssl scrypt
      support on Clang. Fixes bug 22916; bugfix on 0.2.7.2-alpha.
    - When building with certain versions of the mingw C header files,
      avoid float-conversion warnings when calling the C functions
      isfinite(), isnan(), and signbit(). Fixes bug 22801; bugfix
      on 0.2.8.1-alpha.

  o Minor bugfixes (compilation, mingw, backport from 0.3.1.1-alpha):
    - Backport a fix for an "unused variable" warning that appeared
      in some versions of mingw. Fixes bug 22838; bugfix on
      0.2.8.1-alpha.

  o Minor bugfixes (coverity build support, backport from 0.3.1.5-alpha):
    - Avoid Coverity build warnings related to our BUG() macro. By
      default, Coverity treats BUG() as the Linux kernel does: an
      instant abort(). We need to override that so our BUG() macro
      doesn't prevent Coverity from analyzing functions that use it.
      Fixes bug 23030; bugfix on 0.2.9.1-alpha.

  o Minor bugfixes (directory authority, backport from 0.3.1.1-alpha):
    - When rejecting a router descriptor for running an obsolete version
      of Tor without ntor support, warn about the obsolete tor version,
      not the missing ntor key. Fixes bug 20270; bugfix on 0.2.9.3-alpha.

  o Minor bugfixes (linux seccomp2 sandbox, backport from 0.3.1.5-alpha):
    - Avoid a sandbox failure when trying to re-bind to a socket and
      mark it as IPv6-only. Fixes bug 20247; bugfix on 0.2.5.1-alpha.

  o Minor bugfixes (unit tests, backport from 0.3.1.5-alpha)
    - Fix a memory leak in the link-handshake/certs_ok_ed25519 test.
      Fixes bug 22803; bugfix on 0.3.0.1-alpha.
2017-08-15 19:22:44 +00:00
jperkin
f8240f5a7f Support documented command line options. Bump PKGREVISION. 2017-08-15 14:23:50 +00:00
jperkin
0c4e7352e6 Update net/rancid to 3.6.2. Patch supplied by coyhile in
joyent/pkgsrc#2.  Changes since 3.6.1:

3.6.2
        Fix etc/Makefile for rancid.types.conf handling.
2017-08-15 13:22:20 +00:00
jperkin
0e5ec21510 Fix build on SunOS and add SMF manifest. Based on patches provided by
Jorge Schrauwen in joyent/pkgsrc#14.
2017-08-15 13:13:36 +00:00
adam
2d2b97ed46 1.11.134
api-change:batch: Update batch command to latest version
api-change:cloudhsmv2: Update cloudhsmv2 command to latest version
api-change:efs: Update efs command to latest version
api-change:ssm: Update ssm command to latest version
api-change:storagegateway: Update storagegateway command to latest version
api-change:mgh: Update mgh command to latest version
api-change:glue: Update glue command to latest version

1.11.133
api-change:ec2: Update ec2 command to latest version
api-change:cognito-idp: Update cognito-idp command to latest version
api-change:codedeploy: Update codedeploy command to latest version
2017-08-15 09:59:52 +00:00
adam
e76bc7d37e 1.4.6
enhancement:Logging: Switch log levels from INFO to DEBUG
2017-08-15 09:57:12 +00:00
adam
bfe78f74f3 1.6.1
api-change:cloudhsmv2: Update cloudhsmv2 client to latest version
api-change:ssm: Update ssm client to latest version
api-change:glue: Update glue client to latest version
api-change:mgh: Update mgh client to latest version
api-change:efs: Update efs client to latest version
api-change:storagegateway: Update storagegateway client to latest version
api-change:batch: Update batch client to latest version

1.6.0
api-change:ec2: Update ec2 client to latest version
feature:retries: Add ability to configure the maximum amount of retry attempts a client call can make.
api-change:cognito-idp: Update cognito-idp client to latest version
api-change:codedeploy: Update codedeploy client to latest version
2017-08-15 09:55:46 +00:00
wiz
376fd5892a Updated libfilezilla to 0.10.1.
2017-08-14 - libfilezilla 0.10.1 released
Bugfixes and minor changes:

    MSW: Improve handling of reparse points in fz::local_filesys

2017-07-10 - libfilezilla 0.10.0 released
New features:

    Added fz::percent_encode and fz::percent_encode
    Added fz::uri and fz::query_string
    Added fz::less_insensitive_ascii for case-insensitive strings in maps

Bugfixes and minor changes:

    Moved encoding functions from string.hpp to encode.hpp
    Use pkg-config instead of cppunit-config to look for cppunit.
2017-08-14 21:19:23 +00:00
wiz
a92965ec4f Updated httping to 2.5.
Changes not found.
2017-08-14 20:38:02 +00:00
wiz
1c7d09c1f7 Updated libsoup to 2.58.2.
Changes in libsoup from 2.58.1 to 2.58.2:

	* CVE-2017-2885: Fixed a chunked decoding buffer overrun that
          could be exploited against either clients or servers.
          [#785774]

Changes in libsoup from 2.58.0 to 2.58.1:

	* Reverts a change to SoupSession to close all open
          connections when the :proxy-resolver property is changed
          [#777326; this change was made in 2.58.0 but accidentally
          left out of the NEWS for that release]; although that
          behavior made :proxy-resolver more consistent with
          :proxy-uri, it ended up breaking Evolution EWS. [#781590]

	* Fixed undefined behavior in tests/header-parsing that could
          make the test spuriously fail. [#777258]

	* Updates to the configure tests for Apache for use in tests/:
		* Dropped support for Apache 2.2
		* Changed PHP support from PHP 5 to PHP 7
		* mod_unixd can now be either built-in or dynamically
		  loaded [#776478]

	* Updated translations:
	  Turkish

Changes in libsoup from 2.57.1 to 2.58.0:

	* Fix authentication issues when the SOUP_MESSAGE_DO_NOT_USE_AUTH_CACHE
	  flag is used. [#778497, #777936, Carlos Garcia Campos]

	* MSVC build improvements (Chun-wei Fan)

	* Updated translations:
	  Basque, Belarusian, Brazilian Portuguese, Chinese (Taiwan), Danish,
	  French, Galician, Greek, Indonesian, Italian, Korean, Latvian,
	  Lithuanian, Norwegian bokmål, Russian, Serbian, Slovak, Slovenian,
	  Spanish, zh_CN

Changes in libsoup from 2.56.0 to 2.57.1:

	* Added SoupWebsocketConnection:keepalive-interval, to make a
          connection send regular pings. [#773253, Ignacio Casal
          Quinteiro]

	* Added soup_auth_manager_clear_cached_credentials() and
          SOUP_MESSAGE_DO_NOT_USE_AUTH_CACHE, to allow greater control
          over the use of cached HTTP auth credentials. [#774031,
          #774033, Carlos Garcia Campos]

	* Fixed the use of SoupSession:proxy-uri values containing
          passwords. [#772932, Jonathan Lebon]

	* Various minor WebSocket fixes [Ignacio Casal Quinteiro]:
		* Avoid sending data after we start closing the
		  connection [#774957]
		* Do not log a critical if the peer sends an invalid
		  close status code
		* Log a debug message when a "pong" is received

	* Fixed introspection of
          soup_message_headers_get_content_range() [Jasper St. Pierre]

	* Replaced Vala [Deprecated] annotations with [Version] to
          avoid build warnings [#773177, Evan Nemerson]

	* MSVC build improvements (Chun-wei Fan)

	* Updated error/message strings to use Unicode punctuation.
          [#772217, Piotr Drąg]

	* Updated translations:
	  Czech, Friulian, German, Hebrew, Hungarian,
	  Norwegian bokmål, Polish, Swedish

Changes in libsoup from 2.55.90 to 2.56.0:

	* Added SoupWebsocketConnection:max-incoming-payload-size
          property, to override the default maximum incoming payload
          size. [#770022, Ignacio Casal Quinteiro]

	* Added soup-version.h symbols (in particular
          soup_check_version()) to introspection. [#771439, Rico
          Tzschichholz]

	* Updated the copy of the public suffix list used by SoupTLD
	  [#769650, Michael Catanzaro]

	* Updated translations:
	  British English, Greek, Polish

Changes in libsoup from 2.54.1 to 2.55.90:

	* Removed support for SSLv3 fallback; sites that reject TLS
          1.x handshakes will now just fail with an error. (Firefox
          and Chrome have both already switched to this behavior.)
          [#765940, Dan Winship]

	* Fixed the parsing of <double>s in the new GVariant-based
          XMLRPC code. [#767707, Dan Winship]

	* Fixed soup_server_set_ssl_cert_file(), which was added in
          2.48 but didn't actually work... [patch on libsoup-list from
          Sean DuBois]

	* Added GObject properties to SoupLogger to make it
          bindings-friendly. [#768053, Jonh Wendell]

	* Fixed build error on FreeBSD [#765376, Ting-Wei Lan]

	* Fixed build with certain new versions of glibc that define
          "EOF" as a macro. [#768731, Philip Withnall]

	* Updated m4/ax_code_coverage.m4 with support for lcov 1.12
          [Philip Withnall]

	* Updated po files for future gettext versions [Piotr Drąg]

	* New/updated translations:
	  Occitan, Scottish Gaelic
2017-08-14 20:09:02 +00:00
wiz
6f3404c0fe Updated syncthing to 0.14.36.
v0.14.36

This is an unscheduled release to fix a bug that slipped through the cracks in 0.14.34 & 0.14.35.

Resolved issues:

    #4297: Folders paths are no longer reset when editing a folder without a label

v0.14.35

This is an unscheduled release in panic mode to fix a significant problem in 0.14.34.

Resolved issues in 0.14.35:

    #4288: Symlinks are deleted from versioned folders on startup

Resolved issues in 0.14.34:

    #2157: The new folder dialog now suggests a default path. Adjustable via advanced config defaultFolderPath.
    #4272: The build script no longer sets -installsuffix by default.
    #4286: Prevents a vulnerability that allows file overwrite via versioned symlinks

Note that the last issue is a security vulnerability. Symlinks on Windows are not supported and have not been created by Syncthing for a while. Nonetheless, if you use symlinks on Windows and Syncthing versioning you may have symlinks in your versioning directory from earlier versions. You must remove these manually. Syncthing can not remove them automatically because there are other things that look to us like symlinks but are not - deduplicated files, primarily. (This is one of the reasons symlinks are not supported on Windows.)

On other platforms the versioning directory is cleaned from symlinks as part of the upgrade.

v0.14.34-rc.1

This is a release candidate for v0.14.34.

Resolved issues:

    #2157: The new folder dialog now suggests a default path. Adjustable via advanced config defaultFolderPath.
    #4272: The build script no longer sets -installsuffix by default.

v0.14.33

This is a regularly scheduled stable release.

Resolved issues:

    #4188: Relative version paths are now correctly relative to the folder path
    #4227: Remote devices now show bytes remaining to sync
    #4249: Editing ignore patterns no longer incorrectly shows included patterns

v0.14.33-rc.1

This is a release candidate for v0.14.33.

Resolved issues:

    #4188: Relative version paths are now correctly relative to the folder path
    #4227: Remote devices now show bytes remaining to sync
    #4249: Editing ignore patterns no longer incorrectly shows included patterns

v0.14.32

This is a regularly scheduled stable release.

Resolved issues:

    #4157: "Nearby devices" are now shown in the add device dialog, avoiding the need to type their device ID.
    #4219: Folders that were once ignored in a sharing request now actualproperly when later added manually.

v0.14.32-rc.2

This is a release candidate for v0.14.32.

v0.14.32-rc.1

This is a release candidate fo14.31:

    #4157: "Nearby devices" are now shown in the add device dialog, avoiding the need to type their device ID.
    #4219: Folders that were once ignored in a sharing request now actually work properly when later added manually.
2017-08-14 18:41:56 +00:00
jlam
b028fc44bf net/nagios-plugin-milter: Create necessary users and groups.
This package installs a binary that is setuid-executable to the
"smmsp" user and it also needs to be owned by the "nagios" group.
Add hooks to create these users and groups in the package install
scripts when the binary package is installed.

Bump the PKGREVISION due to changes in the package install scripts.
2017-08-14 15:24:42 +00:00
jlam
ea456e8040 net/nagios-base: Remove rss-newsfeed.html from SPECIAL_PERMS.
The rss-newsfeed.html file was removed in the update to version
4.3.2, so we no longer need to change ownership and permissions on
the file after installation.

Arguably, nagios-base should have a postinstall check for the
rss-newsfeed.* files and remove them, as they were removed in
version 4.3.2 due to security concerns.
2017-08-14 15:24:30 +00:00
adam
a4f865c811 version 4.2.2:
* Improve compatibility with GNU Hurd
* Fixed 2286 - improve CMake on Windows documentation
* Fixed 1235 - improved compatibility with mingw64
* Improve zmq_proxy documentation to state it can return ETERM as well
* Fixed 1442 - SO_NOSIGPIPE and connection closing by peer race condition
* Improve CMake functionality on Windows: ZeroMQConfig.cmake generation CPack
  option, correct static library filename, ship FindSodium.cmake in tarball
* Fixed 2228 - setting HWM after connect on inproc transport leads to infinite
  HWM
* Add support for Visual Studio 2017
* New DRAFT (see NEWS for 4.2.0) zmq_has option "draft" option that returns
  true if the library was built with DRAFT enabled. Useful for FFI bindings.
  See doc/zmq_has.txt for more information
* Fixed 2321 - zmq_z85_decode does not validate its input. The function has
  been fixed to correctly follow RFC32 and return NULL if the input is invalid
* Fixed 2323 - clock_t related crash on Apple iOS 9.3.2 and 9.3.5
* Fixed 1801 - OSX: Cmake installs libzmq in a weird PATH
* Fixed potential divide by zero in zmq::lb_t::sendpipe
* Improve compatibility with OpenIndiana by skipping epoll and using poll/select
* Fix IPv4-in-IPv6 mapped addresses parsing error
2017-08-13 17:10:45 +00:00
taca
7dbeb98b66 Update isc-dhcp4 to 4.3.6.
This is mainly bug fix release and changes from 4.3.4 are too many to write
here, please refer RELNOTES in detail.
2017-08-13 14:21:03 +00:00
nros
5ef73676f1 Update nsd to version 4.1.17.
Changes from release notes.

Features

* zone parser parses type AVC (it has TXT format).
* Fix #1272: use writev to put tcp length field
  with data for outgoing zone transfer requests.

Bugfixes

* Fix potential null pointer in nsec3 adjustment tree.
* Fix text format of deletes for CDS and CDNSKEY,
  single 0 to represent empty base64 or hex string.
2017-08-13 11:11:42 +00:00
prlw1
8e434bc7f1 * vobject != vdirsyncer.vobject, so correct dependency and remove patches.
https://github.com/Kozea/Radicale/issues/675#issuecomment-320029350

* override folder for storing local collections, from
  /var/lib/radicale/collections to ${PREFIX}/share/radicale/collections

Update Radicale2 to 2.1.4

2.1.4 - Wild Radish
-------------------

This feature is not compatible with the 1.x.x versions. See
http://radicale.org/1to2/ if you want to switch from 1.x.x to
2.x.x.

* Fix incorrect time range matching and calculation for some edge-cases with
  rescheduled recurrences
* Fix owner property

2.1.3 - Wild Radish
-------------------

This feature is not compatible with the 1.x.x versions. See
http://radicale.org/1to2/ if you want to switch from 1.x.x to
2.x.x.

* Enable timeout for SSL handshakes and move them out of the main thread
* Create cache entries during upload of items
* Stop built-in server on Windows when Ctrl+C is pressed
* Prevent slow down when multiple requests hit a collection during cache warm-up

2.1.2 - Wild Radish
-------------------

This feature is not compatible with the 1.x.x versions. See
http://radicale.org/1to2/ if you want to switch from 1.x.x to
2.x.x.

* Remove workarounds for bugs in VObject < 0.9.5
* Error checking of collection tags and associated components
* Improve error checking of uploaded collections and components
* Don't delete empty collection properties implicitly
* Improve logging of VObject serialization
2017-08-10 19:08:13 +00:00
jlam
530b4108bb Honor ${PKGMANDIR} during installation of net/dnscap. 2017-08-08 17:13:34 +00:00
jlam
4b8e81a192 Don't use INSTALLATION_DIRS where MAKE_DIRS or OWN_DIRS is correct.
Bump the PKGREVISION where the package install script has changed
due to changes in MAKE_DIRS or OWN_DIRS.
2017-08-08 16:39:11 +00:00
jlam
2944f810d1 There is no MANPREFIX variable -- use PKGMANDIR as intended. 2017-08-08 16:38:19 +00:00
jlam
49970e3866 Fix packages that had INSTALLATION_DIRS+=$(PKG_SYSCONFDIR}.
Set PKG_SYSCONFSUBDIR where appropriate, and use {MAKE,OWN}_DIRS to
create the directory tree under ${PKG_SYSCONFDIR} instead of using
INSTALLATION_DIRS.

Bump the PKGREVISION of packages that changed due to changes in the
package install scripts.
2017-08-07 17:56:12 +00:00
jlam
91ba3e3d14 Create ${NAGIOS_GROUP} for plugins that are setgid-executable.
Ensure that the ${NAGIOS_GROUP} group is created before the package
files are installed since the plugin binary must be made setgid to
that group.

Bump the PKGREVISIONs of these plugin packages due to package
install scripts being added.
-------------------------------------------------------------------
2017-08-07 09:30:45 +00:00
jlam
1d53d13b20 net/nagios-plugin-dotpid requires ${NAGIOS_GROUP} to be created.
Ensure that the ${NAGIOS_GROUP} group is created before the package
files are installed since the binary must be made setgid to that
group.

Bump the PKGREVISON due to package install scripts being added.
2017-08-07 09:19:19 +00:00
jlam
a2f6175fe0 Fix the mk/pkginstall variables used in net/nagios-base.
* Ensure that ${PKG_SYSCONFDIR}/objects is created at package
  installation time by adding it to OWN_DIRS.

* Don't explicitly add ${DESTDIR} to files listed in SPECIAL_PERMS
  since it is automatically added by the pkgsrc infrastructure if
  needed.

* It's "${DESTDIR}${PREFIX}", not "${DESTDIR}/${PREFIX}" -- avoid
  having double slashes in pathnames for correctness.

Bump the PKGREVISION due to fixes in the package install scripts.
-------------------------------------------------------------------
2017-08-07 09:09:28 +00:00
jlam
0d6c11b0fc Use PKG_SYSCONF* variables correctly in net/knot.
Set PKG_SYSCONFSUBDIR to "knot" to have all of the config files
located in the "knot" subdirectory of ${PKG_SYSCONFBASE}.

Pass ${PKG_SYSCONFBASE} to the configure script since the package's
build infrastructure automatically appends "/knot" to the value
passed in through --sysconfdir.

Remove ${PKG_SYSCONFDIR} from INSTALLATION_DIRS since it is
automatically created by the package install script.

Bump the PKGREVISION due to changes in the package install scripts.
2017-08-07 08:44:14 +00:00
jlam
d6cd22621d Fix creation of the config directory used by DarwinStreamingServer.
There is no REQUIRE_DIRS used by pkgsrc.  I think that REQD_DIRS
was meant to be used; however, REQD_DIRS is also the wrong way to
create the config directory.

Set PKG_SYSCONFSUBDIR to "streaming" to automatically create
${PKG_SYSCONFBASE}/streaming during package installation, and
consistently use ${PKG_SYSCONFDIR} within the package Makefile to
refer to the config directory path.

Bump the PKGREVISION due to the changes in the resulting package
scripts.
2017-08-07 07:42:34 +00:00
bsiegert
99ca7a9f63 Fix rc script ordering to prevent a circular dependency. From Uwe Toenjes
in PR pkg/52095.
2017-08-05 20:09:27 +00:00
schmonz
7e41d89ba2 Catch up to qmail-run:
- Collapse redundant code for invoking service-specific rc.d scripts.
- Don't try to run a service's rc.d script if it isn't enabled in rc.conf.
- Prefix "nb" to procnames.

Bump version.
2017-08-05 15:16:05 +00:00
adam
75d36712bf Nmap 7.60
o Updated the bundled Npcap from 0.91 to 0.93, fixing several issues
  with installation and compatibility with the Windows 10 Creators Update.

o NSE scripts now have complete SSH support via libssh2,
  including password brute-forcing and running remote commands, thanks to the
  combined efforts of three Summer of Code students.

o Added 14 NSE scripts from 6 authors, bringing the total up to 579!
  They are all listed at https://nmap.org/nsedoc/, and the summaries are below:

  + ftp-syst sends SYST and STAT commands to FTP servers to get system version
    and connection information.

  + http-vuln-cve2017-8917 checks for an SQL injection vulnerability affecting
    Joomla! 3.7.x before 3.7.1.

  + iec-identify probes for the IEC 60870-5-104 SCADA protocol.

  + openwebnet-discovery retrieves device identifying information and
    number of connected devices running on openwebnet protocol.

  + puppet-naivesigning checks for a misconfiguration in the Puppet CA where
    naive signing is enabled, allowing for any CSR to be automatically signed.

  + smb-protocols discovers if a server supports dialects NT LM 0.12
    (SMBv1), 2.02, 2.10, 3.00, 3.02 and 3.11. This replaces the old
    smbv2-enabled script.

  + smb2-capabilities lists the supported capabilities of SMB2/SMB3
    servers.

  + smb2-time determines the current date and boot date of SMB2
    servers.

  + smb2-security-mode determines the message signing configuration of
    SMB2/SMB3 servers.

  + smb2-vuln-uptime attempts to discover missing critical patches in
    Microsoft Windows systems based on the SMB2 server uptime.

  + ssh-auth-methods lists the authentication methods offered by an SSH server.

  + ssh-brute performs brute-forcing of SSH password credentials.

  + ssh-publickey-acceptance checks public or private keys to see if they could
    be used to log in to a target. A list of known-compromised key pairs is
    included and checked by default.

  + ssh-run uses user-provided credentials to run commands on targets via SSH.

o Removed smbv2-enabled, which was incompatible with the new SMBv2/3
  improvements. It was fully replaced by the smb-protocols script.

o Added Datagram TLS (DTLS) support to Ncat in connect (client)
  mode with --udp --ssl. Also added Application Layer Protocol Negotiation
  (ALPN) support with the --ssl-alpn option.

o Updated the default ciphers list for Ncat and the secure ciphers list for
  Nsock to use "!aNULL:!eNULL" instead of "!ADH". With the addition of ECDH
  ciphersuites, anonymous ECDH suites were being allowed.

o Fix ndmp-version and ndmp-fs-info when scanning Veritas Backup
  Exec Agent 15 or 16.

o Added wildcard detection to dns-brute. Only hostnames that
  resolve to unique addresses will be listed.

o FTP scripts like ftp-anon and ftp-brute now correctly handle
  TLS-protected FTP services and use STARTTLS when necessary.

o Function url.escape no longer encodes so-called "unreserved"
  characters, including hyphen, period, underscore, and tilde, as per RFC 3986.

o Function http.pipeline_go no longer assumes that persistent
  connections are supported on HTTP 1.0 target (unless the target explicitly
  declares otherwise), as per RFC 7230.

o The HTTP response object has a new member, version, which
  contains the HTTP protocol version string returned by the server, e.g. "1.0".

o Fix handling of the objectSID Active Directory attribute
  by ldap.lua.

o Fix line endings in the list of Oracle SIDs used by oracle-sid-brute.
  Carriage Return characters were being sent in the connection packets, likely
  resulting in failure of the script.

o http-useragent-checker now checks for changes in HTTP status
  (usually 403 Forbidden) in addition to redirects to indicate forbidden User
  Agents.
2017-08-03 13:52:00 +00:00
he
435ed1d6cf Update radsecproxy to version 1.6.9.
Pkgsrc changes:
 * The hosting of radsecproxy has changed to nordu.net.

Upstream changes:

2017-08-02 1.6.9
        Misc:
        - Use a listen(2) backlog of 128 (RADSECPROXY-72).

        Bug fixes:
        - Don't follow NULL the pointer at debug level 5 (RADSECPROXY-68).
        - Completely reload CAs and CRLs with cacheExpiry (RADSECPROXY-50).
        - Tie Access-Request log lines to response log lines (RADSECPROXY-60).
        - Fix a couple of memory leaks and NULL ptr derefs in error cases.
        - Take lock on realm refcount before updating it (RADSECPROXY-77).

2016-09-21 1.6.8
        Bug fixes:
        - Stop waiting on writable when reading a TCP socket.
        - Stomp less on the memory of other threads (RADSECPROXY-64).

2016-03-14 1.6.7
        Enhancements (security):
        - Negotiate TLS1.1, TLS1.2 and DTLS1.2 when possible, client and
        server side. Fixes RADSECPROXY-62.

        Enhancements:
        - Build HTML documentation properly.
2017-08-03 11:30:45 +00:00
adam
b34b674b7e 1.11.129
api-change:config: Update config command to latest version
api-change:codedeploy: Update codedeploy command to latest version
api-change:pinpoint: Update pinpoint command to latest version
api-change:ses: Update ses command to latest version

1.11.128
api-change:ssm: Update ssm command to latest version
api-change:inspector: Update inspector command to latest version
2017-08-03 07:53:18 +00:00
adam
58f0067477 1.4.5
enhancement:s3: Add a LifecycleConfiguration resource to resolve issues with the existing Lifecycle resource.
2017-08-03 07:51:04 +00:00
adam
9198786368 1.5.92
api-change:ses: Update ses client to latest version
api-change:pinpoint: Update pinpoint client to latest version
api-change:codedeploy: Update codedeploy client to latest version
api-change:config: Update config client to latest version

1.5.91
api-change:ssm: Update ssm client to latest version
api-change:inspector: Update inspector client to latest version
2017-08-03 07:49:20 +00:00
fhajny
964eeaac58 Update net/powerdns-recursor to 4.0.6
Bug fixes
- Use the incoming ECS for cache lookup if use-incoming-edns-subnet is
  set
- when making a netmask from a comboaddress, we neglected to zero the
  port. This could lead to a proliferation of netmasks.
- Don't take the initial ECS source for a scope one if EDNS is off
- also set d_requestor without Lua: the ECS logic needs it
- Fix IXFR skipping the additions part of the last sequence
- Treat requestor's payload size lower than 512 as equal to 512
- make URI integers 16 bits, fixes ticket #5443
- unbreak quoting

Improvements
- EDNS Client Subnet becomes compatible with the packet cache, using
  the existing variable answer facility.
- Remove just enough entries from the cache, not one more than asked
- Move expired cache entries to the front so they are expunged
- changed IPv6 addr of b.root-servers.net
- e.root-servers.net has IPv6 now
- hello decaf signers (ED25519 and ED448)
- don't use the libdecaf ed25519 signer when libsodium is enabled
  (Kees Monshouwer)
- do not hash the message in the ed25519 signer (Kees Monshouwer)
- Disable use-incoming-edns-subnet by default
2017-08-02 20:15:42 +00:00
fhajny
173135ce28 Update net/py-lexicon to 2.1.10.
Changes since 2.1.8:
- Add SoftLayer provider.
- Bug fixes.
2017-08-02 14:32:17 +00:00
wiz
4b6cc49c90 Comment out some dead HOMEPAGEs. 2017-08-01 17:40:08 +00:00
wiz
2afb7b28ce cftp is a dead project with major bugs. Remove. 2017-08-01 17:12:49 +00:00
wiz
908f082c71 Update HOMEPAGE. 2017-08-01 17:03:52 +00:00
wiz
3800987ac6 Update HOMEPAGE. Set LICENSE. 2017-08-01 16:56:46 +00:00
wiz
7b294157a3 Comment out dead sites (DNS problems). 2017-08-01 16:47:35 +00:00
wiz
8733ee0040 Follow some http -> https redirects. 2017-08-01 14:58:51 +00:00
taca
ac72cf3877 Update bind99 to 9.9.11.
Here is release note except security (already fixed by bind-9.9.10pl3, BIND
9.9.10-P3).

Release Notes for BIND Version 9.9.11

Introduction

   This document summarizes significant changes since the last production
   release of BIND on the corresponding major release branch. Please see
   the CHANGES file for a further list of bug fixes and other changes.

Download

   The latest versions of BIND 9 software can always be found at
   http://www.isc.org/downloads/. There you will find additional
   information about each release, source code, and pre-compiled versions
   for Microsoft Windows operating systems.

New DNSSEC Root Key

   ICANN is in the process of introducing a new Key Signing Key (KSK) for
   the global root zone. BIND has multiple methods for managing DNSSEC
   trust anchors, with somewhat different behaviors. If the root key is
   configured using the managed-keys statement, or if the pre-configured
   root key is enabled by using dnssec-validation auto, then BIND can keep
   keys up to date automatically. Servers configured in this way should
   have begun the process of rolling to the new key when it was published
   in the root zone in July 2017. However, keys configured using the
   trusted-keys statement are not automatically maintained. If your server
   is performing DNSSEC validation and is configured using trusted-keys,
   you are advised to change your configuration before the root zone
   begins signing with the new KSK. This is currently scheduled for
   October 11, 2017.

   This release includes an updated version of the bind.keys file
   containing the new root key. This file can also be downloaded from
   https://www.isc.org/bind-keys .

Windows XP No Longer Supported

   As of BIND 9.9.11, Windows XP is no longer a supported platform for
   BIND, and Windows XP binaries are no longer available for download from
   ISC.

Feature Changes

     * Threads in named are now set to human-readable names to assist
       debugging on operating systems that support that. Threads will have
       names such as "isc-timer", "isc-sockmgr", "isc-worker0001", and so
       on. This will affect the reporting of subsidiary thread names in ps
       and top, but not the main thread. [RT #43234]
     * DiG now warns about .local queries which are reserved for Multicast
       DNS. [RT #44783]

Bug Fixes

     * Fixed a bug that was introduced in an earlier development release
       which caused multi-packet AXFR and IXFR messages to fail validation
       if not all packets contained TSIG records; this caused
       interoperability problems with some other DNS implementations. [RT
       #45509]
     * Semicolons are no longer escaped when printing CAA and URI records.
       This may break applications that depend on the presence of the
       backslash before the semicolon. [RT #45216]
     * AD could be set on truncated answer with no records present in the
       answer and authority sections. [RT #45140]

End of Life

   BIND 9.9 (Extended Support Version) will be supported until at least
   June, 2018. https://www.isc.org/downloads/software-support-policy/
2017-07-31 13:42:06 +00:00
taca
2783e7c678 Update bind910 to 9.10.6.
Here is release note except security (already fixed by bind-9.10.5pl3, BIND
9.10.5-P3).

Release Notes for BIND Version 9.10.6

Introduction

   This document summarizes changes since the last production release on
   the BIND 9.10 branch. Please see the CHANGES file for a further list of
   bug fixes and other changes.

Download

   The latest versions of BIND 9 software can always be found at
   http://www.isc.org/downloads/. There you will find additional
   information about each release, source code, and pre-compiled versions
   for Microsoft Windows operating systems.

New DNSSEC Root Key

   ICANN is in the process of introducing a new Key Signing Key (KSK) for
   the global root zone. BIND has multiple methods for managing DNSSEC
   trust anchors, with somewhat different behaviors. If the root key is
   configured using the managed-keys statement, or if the pre-configured
   root key is enabled by using dnssec-validation auto, then BIND can keep
   keys up to date automatically. Servers configured in this way should
   have begun the process of rolling to the new key when it was published
   in the root zone in July 2017. However, keys configured using the
   trusted-keys statement are not automatically maintained. If your server
   is performing DNSSEC validation and is configured using trusted-keys,
   you are advised to change your configuration before the root zone
   begins signing with the new KSK. This is currently scheduled for
   October 11, 2017.

   This release includes an updated version of the bind.keys file
   containing the new root key. This file can also be downloaded from
   https://www.isc.org/bind-keys .

Windows XP No Longer Supported

   As of BIND 9.10.6, Windows XP is no longer a supported platform for
   BIND, and Windows XP binaries are no longer available for download from
   ISC.

Feature Changes

     * dig +ednsopt now accepts the names for EDNS options in addition to
       numeric values. For example, an EDNS Client-Subnet option could be
       sent using dig +ednsopt=ecs:.... Thanks to John Worley of Secure64
       for the contribution. [RT #44461]
     * Threads in named are now set to human-readable names to assist
       debugging on operating systems that support that. Threads will have
       names such as "isc-timer", "isc-sockmgr", "isc-worker0001", and so
       on. This will affect the reporting of subsidiary thread names in ps
       and top, but not the main thread. [RT #43234]
     * DiG now warns about .local queries which are reserved for Multicast
       DNS. [RT #44783]

Bug Fixes

     * Fixed a bug that was introduced in an earlier development release
       which caused multi-packet AXFR and IXFR messages to fail validation
       if not all packets contained TSIG records; this caused
       interoperability problems with some other DNS implementations. [RT
       #45509]
     * Semicolons are no longer escaped when printing CAA and URI records.
       This may break applications that depend on the presence of the
       backslash before the semicolon. [RT #45216]
     * AD could be set on truncated answer with no records present in the
       answer and authority sections. [RT #45140]

End of Life

   The end of life for BIND 9.10 is yet to be determined but will not be
   before BIND 9.12.0 has been released for 6 months.
   https://www.isc.org/downloads/software-support-policy/
2017-07-31 13:37:53 +00:00
wiz
8d59bf7376 Use https for www.gnome.org HOMEPAGEs. 2017-07-30 22:47:48 +00:00