Commit graph

3621 commits

Author SHA1 Message Date
wiz
685774b08c Handle NetBSD-3.x the same as NetBSD-2.x. Fix pkglint warning.
Remove BROKEN_IN.
2006-03-01 22:48:05 +00:00
drochner
7b9cca0501 resolve confusion about different behaviour of getenv_r in librfuncs
and NetBSD-current which caused serius lossage:
depend on librfuncs>=1.0.7nb1 which implements NetBSD-current's
behaviour, change the patch to _gpgme_getenv() accordingly,
and bump PKGREVISION
2006-03-01 16:22:20 +00:00
joerg
20b65ea5c3 Add DragonFly support. Honour CXXFLAGS. Add _DRAGONFLY_SOURCE on
DragonFly to work around the _POSIX_SOURCE defines, which break
cwchar's ::vfwprintf usage (aka ISO C99 extensions).
2006-03-01 00:33:30 +00:00
dsainty
df1a55d22d libtasn1-0.2.18 uses makeinfo at build time, so declare USE_MAKEINFO. Without this the package build fails (on my system). I haven't bothered to bump the PKGREVISION on the assumption that this doesn't actually change the end result of a successful build, it just fixes the build for (a select subset of?) people where previously it would fail to build. 2006-02-28 02:45:12 +00:00
wiz
293e58aa43 Update to 0.4.7:
* Fix --disable-nls
* Translation updates
2006-02-25 12:13:24 +00:00
joerg
19e7375012 Add DragonFly support. Fallback to LINE_MAX if BUFSIZ is not defined. 2006-02-24 21:56:40 +00:00
joerg
e4ba0ea882 For DragonFly, OMIT_UTMP like on the other BSDs do. 2006-02-23 20:28:54 +00:00
joerg
e9850b9af2 Fix build on DragonFly. 2006-02-23 19:02:50 +00:00
joerg
8a7fffb47c Fix build with OpenSSL 0.9.8. 2006-02-23 18:32:15 +00:00
wiz
35558d7573 Convert to pkginstall framework. Bump PKGREVISION. 2006-02-20 23:05:27 +00:00
wiz
9faf4cc076 Add missing gettext-lib dependency. Bump PKGREVISION. 2006-02-20 23:04:38 +00:00
wiz
6d319d154b Fix directory handling in PLIST. Bump PKGREVISION. 2006-02-20 23:03:56 +00:00
wiz
a4ccaf110c Fix config file handling. Bump PKGREVISION. 2006-02-20 23:03:00 +00:00
wiz
64b381fccc Add missing files to PLIST, sort. Bump PKGREVISION. 2006-02-20 23:01:03 +00:00
wiz
50af0f229e Use REQD_DIRS instead of OWN_DIRS to
fix CHECK_FILES build. Bump PKGREVISION.
2006-02-20 22:59:27 +00:00
joerg
c1c6794bb2 cat pages are not installed on DragonFly and FreeBSD, so tell
the PLIST framework that we want only man pages.
2006-02-20 15:16:45 +00:00
joerg
85cf9e6aa9 Fix errno. 2006-02-20 15:15:48 +00:00
adrianp
0f0f3453b3 Update to honeyd 1.5
New features include:
* Statistics Collector: A daemon that can process netflow-like information
exported by several Honeyd instances and do computations on the data - see
live data.
* Improved Subsystems: Improved support for subsystems permits running more
complicated UNIX applications like mwcollect as a subsystem for Honeyd.
* Proxy and SMTP subsystems: Example subsystems to simulate open proxies and
mail relays. These subsystems are written with performance in mind and have
no problem in keeping up with a busy network.

Bugfixes include:
A bug in Honeyd's IP reassembly code allows adversaries to remotely fingerprint
honeypots. Thanks to Jon Oberheide for finding the bug; see adv.2006-01 for
more information
2006-02-19 17:23:18 +00:00
joerg
6ce3737746 Add DragonFly support. 2006-02-17 14:43:49 +00:00
martti
e9f3e44177 Fixed warnings found by pkglint -Wall. 2006-02-17 07:43:36 +00:00
joerg
9d87c73a0e Include sys/time.h before sys/resource.h to fix build on DragonFly. 2006-02-16 18:31:06 +00:00
tron
d303bbebdc Readd checksum for "idea.c.gz" which got lost during the last update. 2006-02-15 22:26:46 +00:00
heinz
e7c8a59547 Updated to version 0.22.
Pkgsrc changes:
  - Removed almost all warnings in MESSAGE.

Changes since version 0.21:
===========================
0.22  Mon Nov 15 2005 21:13:20
        - Add public_decrypt, private_encrypt methods, contributed
          by Paul G. Weiss <paul@weiss.name>
        - Some changes to help builds on Redhat9
        - Remove deprecated methods:
          * the no-arg new constructor - use new_from_public_key,
            new_from_private_key or Crypt::OpenSSL::RSA->generate_key instead
          * load_public_key - use new_from_public_key
          * load_private_key - use new_from_private_key
          * generate_key as an instance method - use it as a class constructor
            method instead.
          * set_padding_mode - use use_no_padding, use_pkcs1_padding,
            use_pkcs1_oaep_padding, or use_sslv23_padding instead.
          * get_padding_mode
        - Eliminate all(most all) memory leaks.
        - fix email address
        - Stop returning true from methods just to indicate success.
        - Change default public exponent from 65535 to 65537
2006-02-15 22:22:19 +00:00
heinz
314650a33d Updated to version 0.13.
Pkgsrc changes:
  none

Relevant changes since version 0.11:
=============================================
- Removed all use of strlen() in DSA.xs so signatures with nulls,
  as commonly generated with sha1, could be signed/verified,
  and added more tests
2006-02-15 22:08:19 +00:00
heinz
68984764ad Updated to version 0.13.
Pkgsrc changes:
  - Removed dependency on p5-Math-Pari, p5-Crypt-Random, p5-Class-Loader.

Changes since version 0.12:
===========================
0.13  2005.05.26
    - Rewrote to use Math::BigInt instead of Math::Pari, including patches
      from Brad Fitzpatrick for a replacement for the isprime function
      (both using pure Perl and an external gp program).
    - Added optional Content argument to Crypt::DSA::Key->new, to specify
      serialized Content to be deserialized.
    - Added Signature serialization and deserialization of ASN.1-encoded
      structures.
    - Added ability to do key generation using an external openssl binary.
      Thanks to Brad Fitzpatrick for the patch.
    - Signature object now has better get/set acccessors.
    - Use Module::Install instead of hand-coded Makefile.PL.
2006-02-15 20:42:54 +00:00
drochner
a544d6f73f update to 1.4.2.1
this fixes a false positive signature verification if only the exit
code of "gpgv" or "gpg --verify" is used
2006-02-15 19:10:20 +00:00
salo
3252f3b962 PKGREVISION should've been bumped, DEPENDS changed.
and it should never go backwards..
2006-02-15 13:46:10 +00:00
rillig
5740707b65 Fixed all pkglint warnings. 2006-02-15 13:43:35 +00:00
heinz
bc0f47682a Revert the bump of PKGREVISION. It's unnecessary since the package works as
before.
2006-02-15 00:05:04 +00:00
heinz
96326abe2c Added missing dependency on p5-Crypt-DES. 2006-02-15 00:02:11 +00:00
heinz
1c7e3e4399 Updated to version 1.57.
Pkgsrc changes:
  - Removed (now unnecessary) patch-aa.

Changes since version 1.50:
===========================
1.57                                                          Oct 20, 2005
 * Updated POD documentation and added POD syntax and coverage
   tests using Test::Pod and Pod::Coverage.
1.56                                                         July 05, 2005
 * Removed references to the mailing list and added support for
   an optional commercial license.
1.55                                                     February 18, 2005
 * Fixed a bug ::DataFormat::i2osp(), wherein there was an encoding problem
   when the most significant byte is 0x0100. Reported and patched by
   <jbarkdull@yahoo.com> <rt.cpan.org: Bug #11495>
 * Fixed warnings in t/15-benchmark.t
1.51                                                     February 25, 2003
 * In Crypt::RSA::encrypt() and decrypt() added a check to ensure the
   blocksize is greater than 0. Blocksize can be smaller than 0 if the RSA
   key modulus is too small for a particular encoding.
2006-02-14 23:45:47 +00:00
rillig
4e7f179dff Fixed ISO C90 violation. 2006-02-14 01:13:32 +00:00
rillig
ecc788c565 Perl is needed for the configure script. 2006-02-14 01:04:32 +00:00
wiz
03bb2f7deb Allow nb versions of openssl-0.9.7i too. 2006-02-13 21:52:10 +00:00
reed
7b322f7847 Add buildlink3.mk file. Needed by Aleksandar Simic
for his ne7ssh package. As discussed on pkgsrc-wip-discuss
list.
2006-02-13 17:19:42 +00:00
drochner
e346783358 "configure" checks for libtasn1>=0.2.18, so require it explicitely 2006-02-13 11:04:54 +00:00
heinz
d05f0f86dc Updated to version 1.21.
Relevant changes since version 1.1:
===================================
No useful list of changes provided. "diff" shows mainly internal cleanup.
2006-02-12 23:13:49 +00:00
xtraeme
b36bf56512 ENOTIME to mantain these packages, feel free to pick it up if you are
insterested.
2006-02-12 15:24:14 +00:00
heinz
776b76ad4b Updated to version 1.06.
Changes since version 1.02:
======================================
There is no list of changes. Changes I found so far:
- Used htons() from netinet/in.h to simplify handling of different endianness
  between platforms.
- Some changes in test.pl
2006-02-12 02:46:50 +00:00
heinz
55108ef547 Updated to version 2.05.
Relevant changes since version 2.03:
====================================
  des.h was renamed to _des.h in an attempt to solve the build-on-Solaris
  problem.

  all references to des_ were changed to _des_ since the 2.04 release didn't
  seem to fix the problem on Solaris.
2006-02-12 02:26:08 +00:00
heinz
94e8997573 Updated to version 1.03.
Relevant changes since version 1.02:
=====================================
1.03  22 May 2005
        - make it work in taintmode
2006-02-12 01:55:23 +00:00
heinz
35effe103a Updated to version 1.25.
Relevant changes since version 1.13:
====================================
 - fixed circular reference between Crypt::Random and Crypt::Random::Generator
   causing 'Undefined subroutine' errors.
 - Made "forbidden division t_REAL % t_INT" error disappear.
 - Workaround for Math::Pari's serialization problem.
 - Added a Uniform option to makerandom() and makerandom_itv() that
   doesn't set the high bit of the generated random, and produces
   a number uniformally distributed in the interval. Thanks to Len
   Budney for pointing this out.
2006-02-12 01:50:05 +00:00
heinz
e87f1bec7f Updated to version 2.15.
Relevant changes since version 2.08:
=====================================
- RandomIV in message header overrides manually-supplied -salt, as one
  would expect it should.
- Added OpenSSL compatibility
- Salt and IV generators take advantage of /dev/urandom device, if available
- Added regression test for PCBC mode
- Fixed bug reported by Joshua Brown that caused certain length
  strings to not encrypt properly if ending in a "0" character.
- Fixed Rijndael compat problems
2006-02-12 00:52:20 +00:00
salo
711b5325d2 Update to version 3.4p1
From Jason White via PR pkg/32780

Changes:

Security bugs resolved in this release:

 * CVE-2006-0225: scp (as does rcp, on which it is based) invoked a
   subshell to perform local to local, and remote to remote copy
   operations. This subshell exposed filenames to shell expansion
   twice; allowing a local attacker to create filenames containing
   shell metacharacters that, if matched by a wildcard, could lead
   to execution of attacker-specified commands with the privilege of
   the user running scp (Bugzilla #1094)

This is primarily a bug-fix release, only one new feature has been
added:

 * Add support for tunneling arbitrary network packets over a
   connection between an OpenSSH client and server via tun(4) virtual
   network interfaces. This allows the use of OpenSSH (4.3+) to create
   a true VPN between the client and server providing real network
   connectivity at layer 2 or 3. This feature is experimental and is
   currently supported on OpenBSD, Linux, NetBSD (IPv4 only) and
   FreeBSD. Other operating systems with tun/tap interface capability
   may be added in future portable OpenSSH releases. Please refer to
   the README.tun file in the source distribution for further details
   and usage examples.

Some of the other bugs resolved and internal improvements are:

 * Reduce default key length for new DSA keys generated by ssh-keygen
   back to 1024 bits. DSA is not specified for longer lengths and does
   not fully benefit from simply making keys longer. As per FIPS 186-2
   Change Notice 1, ssh-keygen will refuse to generate a new DSA key
   smaller or larger than 1024 bits

 * Fixed X forwarding failing to start when a the X11 client is executed
   in background at the time of session exit (Bugzilla #1086)

 * Change ssh-keygen to generate a protocol 2 RSA key when invoked
   without arguments (Bugzilla #1064)

 * Fix timing variance for valid vs. invalid accounts when attempting
   Kerberos authentication (Bugzilla #975)

 * Ensure that ssh always returns code 255 on internal error (Bugzilla
   #1137)

 * Cleanup wtmp files on SIGTERM when not using privsep (Bugzilla #1029)

 * Set SO_REUSEADDR on X11 listeners to avoid problems caused by
   lingering sockets from previous session (X11 applications can
   sometimes not connect to 127.0.0.1:60xx) (Bugzilla #1076)

 * Ensure that fds 0, 1 and 2 are always attached in all programs, by
   duping /dev/null to them if necessary.

 * Xauth list invocation had bogus "." argument (Bugzilla #1082)

 * Remove internal assumptions on key exchange hash algorithm and output
   length, preparing OpenSSH for KEX methods with alternate hashes.

 * Ignore junk sent by a server before it sends the "SSH-" banner
   (Bugzilla #1067)

 * The manpages has been significantly improves and rearranged, in
   addition to other specific manpage fixes:
   #1037 - Man page entries for -L and -R should mention -g.
   #1077 - Descriptions for "ssh -D" and DynamicForward should mention
           they can specify "bind_address" optionally.
   #1088 - Incorrect descriptions in ssh_config man page for
           ControlMaster=no.
   #1121 - Several corrections for ssh_agent manpages

 * Lots of cleanups, including fixes to memory leaks on error paths
   (Bugzilla #1109, #1110, #1111 and more) and possible crashes (#1092)

 * Portable OpenSSH-specific fixes:

   - Pass random seed during re-exec for each connection: speeds up
     processing of new connections on platforms using the OpenSSH's
     builtin entropy collector (ssh-rand-helper)

   - PAM fixes and improvements:
     #1045 - Missing option for ignoring the /etc/nologin file
     #1087 - Show PAM password expiry message from LDAP on login
     #1028 - Forward final non-query conversations to client
     #1126 - Prevent user from being forced to change an expired
             password repeatedly on AIX in some PAM configurations.
     #1045 - Do not check /etc/nologin when PAM is enabled, instead
             allow PAM to handle it. Note that on platforms using
             PAM, the pam_nologin module should be used in sshd's
             session stack in order to maintain past behaviour

   - Portability-related fixes:
     #989 - Fix multiplexing regress test on Solaris
     #1097 - Cross-compile fixes.
     #1096 - ssh-keygen broken on HPUX.
     #1098 - $MAIL being set incorrectly for HPUX server login.
     #1104 - Compile error on Tru64 Unix 4.0f
     #1106 - Updated .spec file and startup for SuSE.
     #1122 - Use _GNU_SOURCE define in favor of __USE_GNU, fixing
             compilation problems on glibc 2.4
2006-02-12 00:13:55 +00:00
ben
239bad1f87 Update fprot-workstation-bin to 4.6.6. Addresses PR#32776
Change MAINTAINER to tech-pkg.  Stop using PKGREVISION in DISTNAME.
Notable changes include:

* Postfix config has been changed so TLS is not used internally, that is
  when communicating with scan-mail.pl.  TLS can nevertheless be used
  when communicating with the outside world on port 25.
* f-protd has been tweaked for better performance
* A bug in f-protd when using the 'id=' argument was fixed
* A format string bug in f-protd which could cause malformed xml report
  was fixed
* f-prot-milter's logging changed to facilitate more useful error logs
* Fixed startup/shutdown routine for f-prot-milter in scan-mail.pl
* .wmf scanning improved
* A bug in the .hqx scanner on x86 cpu's was fixed
* A bug in the .msl scanner was fixed
* Fixed a bug in .cab and lzh handling
* A race issue with OLE documents was fixed.
2006-02-11 20:11:01 +00:00
joerg
14a8fc2553 Don't hard-wire -lpthread into gpgme-config, it breaks e.g. mail/balsa2
on DragonFly. Bump revision.
2006-02-11 14:11:07 +00:00
drochner
6ef154571c update libtasn1 to 0.2.18 and gnutls to 1.3.4,
fixes possible DOS (crash by invalid DER input) "GNUTLS-SA-2006-1"
2006-02-10 12:39:25 +00:00
shannonjr
2de4fb3c5f Update to 0.9.3. Changes:
- Only send TLS alert if there is one queued, fix a possible crash.
- Emit warning if prelude-failover problem arise.
- Improve error handling.
- Improve db plugin log option, "-" now mean stdout.
- Various bug fixes.
2006-02-09 11:01:57 +00:00
shannonjr
cb4efc3c00 Update to 0.9.4. Changes:
- Fix for filtering IDMEF field using the '!=' operator, which resulted in
  filtering of events where the field did not exist (#129).
- Implement a "move" command in preludedb-admin.
- When SQL query logging is enabled, log the time taken to execute the query.
- Improve plugin API by making it opaque so that existing plugin don't break
  if we add more SQL plugin function.
- Verbose error reporting, make the plugin error API viable for more drivers.
- Fix error reporting from perl and python bindings.
- Make libpreludedb header files c++ compiler friendly.
- Enforce listed IDMEF value ordering. IDMEF value were sometime unordered
  because of an uninitialized list position problem.
2006-02-08 16:35:18 +00:00
shannonjr
422f3dd3aa Update to 0.9.5. Changes:
- More TLS cleanup.
- Application can now report error without using specific prelude_client
  error reporting function.
- More work and improved verbose error reporting.
- Fix compilation problem with prelude_error_is_verbose() (#130).
Compilation problem on NetBSD 1.6 and OpenBSD has been fixed so patch-ad
is deleted.
2006-02-08 09:58:46 +00:00