Commit graph

4962 commits

Author SHA1 Message Date
adam
978fa43d4e Changes 2.6.0:
* libgnutls: Correct printing and parsing of IPv6 addresses.
* libgnutls-openssl: fix out of bounds access.
* certtool: Use inet_pton for parsing IPv6 addresses.
* Added API to replace and update the crypto backend.
* certtool: can add several subject alternative names via template file.
* opencdk: Parse (but not decrypt) encrypted secret keys.
* more...
2008-10-18 11:55:11 +00:00
adam
a88a64a4cc Changes 4.26:
* libwrap related fixes, better debugging messages, MS Visual C++ support

Changes 4.25:
* delay libwrap process spawning after dropping privs, other improvements
2008-10-17 07:31:58 +00:00
wiz
d150578c8e PKGREVISION bump for libevent shlib name change. 2008-10-16 21:52:16 +00:00
drochner
6cc7cf199c update to 2.24.0
This switches to the gnome-2.24 release branch.
2008-10-16 13:45:38 +00:00
adam
d779ce5514 Changes 1.4.3:
* Try to auto-initialize Libgcrypt to minimize the effect of
  applications not doing that correctly.  This is not a perfect
  solution but given that many applicationion would totally fail
  without such a hack, we try to help at least with the most common
  cases.  Folks, please read the manual to learn how to properly
  initialize Libgcrypt!
* Auto-initialize the secure memory to 32k instead of aborting the
  process.
* Log fatal errors via syslog.
* Changed the name and the semantics of the fips mode config file.
* Add convenience macro gcry_fips_mode_active.
* More self-tests.
* Documentation cleanups.
2008-10-14 11:33:13 +00:00
adam
b4c509e9c8 Changes 1.6:
* Fixed a build problem under Windows.

Changes 1.5:
* Minor build system fixes.
* Updated gettext.  Removed included gettext copy.
* gpg-error has a new option --version.
2008-10-14 11:32:11 +00:00
bad
465844de47 Fix botched update of nessus.
Need to BUILDLINK_ABI_DEPENDS on the 2.2.11 versions of the libraries.
Bump PKGREVISION wholesale to disambiguate the fixed packages from the botched
ones and depend on them.
Use GPLed version of the plugins instead of the non-free version.

While here fix permissions of PKG_SYSCONFDIR in nessus-core/Makefile.
2008-10-13 22:32:54 +00:00
adam
1ae4ce5ed7 Changes 1.5:
- Update gnulib files.
- Fix memory leaks.
2008-10-13 09:23:34 +00:00
adrianp
863460b3b3 Update from 2.1.4->2.5.7
Use ./configure as one is now supplied
libmxl2 is no longer optional but curl is
Rename doc/eg dirs from ap-security to ap-modsecurity

* Allow for disabling request body limit checks in phase:1
* Now log XML parsing/validation warnings and errors to be in the debug log
  at levels 3 and 4, respectivly.
* Transformation caching has been deprecated, and is now off by default. We
  now advise against using transformation caching in production.
* Improve request body processing error messages.

Any many more . . . see CHANGES for all the details
2008-10-12 12:50:17 +00:00
uebayasi
34004f51e0 Move mk/emacs.mk to editors/emacs/modules.mk.
Don't call pkg_info to get the installed Emacs version; always use the
version matching EMACS_TYPE set by users.  Be DEPENDS to it.  This should
address pkg/37146 by Aleksey Cheusov.

While here convert some emacs lisp packages to user-destdir.
2008-10-11 09:31:54 +00:00
adam
e9b8b7fe93 .nbin patches are not installed 2008-10-10 11:35:39 +00:00
adam
16ddfab365 Changes 2.2.11:
* Bug fixes and improvements
2008-10-10 11:34:50 +00:00
wiz
b4737a01bd Update to 1.16:
v1.16
	- change code for SSL_check_crl to use X509_STORE_set_flags instead of
          X509_STORE_CTX_set_flags based on bug report from
          <tjtoocool[AT]phreaker[DOT]net >
        - change opened() to report -1 if the IO::Handle is open, but the
          SSL connection failed, needed with HTTP::Daemon::SSL which will send
          an error mssage over the unencrypted socket
2008-10-09 13:17:50 +00:00
gdt
9efe008b7b Don't put glob.h in the PLIST for NetBSD. At least 4.0 and current do
not require this, and this fixes the build on those systems.  Not
objected to by joerg@.
2008-10-03 19:01:14 +00:00
joerg
afa791e368 Use POSIX types for int32/uint32 to fix build on AMD64.
Add DESTDIR support.
2008-10-03 17:42:28 +00:00
joerg
52784ae240 Don't mess with /etc on installation. Add DESTDIR support. 2008-10-02 18:21:06 +00:00
joerg
b114922689 Fix DESTDIR build. 2008-10-02 18:06:36 +00:00
joerg
b740c74a84 Fix lp64 build. Add DESTDIR support. 2008-10-02 18:03:36 +00:00
obache
024a6b04df * Move inclusion of phthread.buildlink3.mk to rightful place in options.mk and
only suggest pthread option when native pthread exists.
  We cannot use pthread.buildlink3.mk to just detect if suituable pthread
  implementation exist or not.
  Avoid unwanted dependency on pthread package when no native pthread and
  pthread option off.

* Move inclusion of seculity/tcp_wappers/buildlink3.mk to rightful place in
  options.mk.
  Avoid unwanted dependency on tcp_wrappers when libwrap option off.

* Remove deprecated(?) --with-tcp-wrappers from CONFIGURE_ARGS.

* Remove --enable-libwrap from CONFIGURE_ARGS even if require tcp_wrappers.
  It affect not only check of existence of tcp_wappers but also blow off
  needful addition of -lwrap to LIBS.
  Fixes PR 39635
2008-10-01 14:34:32 +00:00
obache
ee7ad224d9 Revert to previous revision and remove bin/makedat (it was conflict with maildrop?).
Additional entries are optionally and already handled in Makefile and options.mk.
Re: PR 39661
2008-10-01 11:43:41 +00:00
apb
add6a683f6 Make dsniff and dsniff-nox11 build on NetBSD-current:
* In dsniff-nox11/Makefile, add a post-configure target to move
  missing/sys/queue.h out of the way if the configure script
  found a real sys/queue.h.
* Add patches to #include <string.h> in some files where I noticed warnings.

Bump PKGREVISION for both dsniff and dsniff-nox11.
2008-10-01 08:43:09 +00:00
obache
38c8122e9c sort 2008-09-29 11:55:55 +00:00
obache
e02a6bccab Require OpenSSL.
While here, add DESTDIR support.
2008-09-29 11:55:24 +00:00
tonnerre
46723b3a66 Upgrade courier-authlib to version 0.61.0 in order to fix CVE-2008-2667,
finally. While here, fix PLIST and depkglint a bit. Also, fix the horrid
abuse of libtool.

Changes since 0.60.2:
 * courier-authlib.spec: Dummy provides: for symlinks, to allow upgrade
   with older packages that require <libname>.so.0.
 * Makefile.am: Switch to versionless shared libraries.
   Install all shared libraries just as <libname>.so. make install manually
   removes *.so.0.0 files that were left over from previous versions,
   and installs a temporary *.so.0 symlink to *.so, for temporary
   binary ABI compatibility with 0.60. The symlinks will be removed in
   0.62.
 * Cleanup: always compile md5, sha* and hmac stuff, and remove all
   conditionally-compiled cruft. Move SASL list to an internal header.
   Add client-side support for AUTH EXTERNAL.
 * authsasl.c (auth_sasl_ex): auth_sasl_ex() supercedes auth_sasl(),
   invokes auth_sasl() for non-EXTERNAL SASL methods, implements EXTERNAL
   by going through the motions, then setting up a dummy authentication
   request.
 * authdaemon.c (auth_generic): Check for the dummy EXTERNAL
   authentication request, and handle it by invoking auth_getuserinfo(),
   rather than sending it down the pipe. This avoid having to implement
   a stub in every authentication module.
 * authmysqllib.c: Use mysql_set_character_set() instead of SET NAMES
 * authmysqllib.c: Fix domain-less queries.
 * Makefile: Drop the unmaintained authvchkpw module.
 * authmysqllib.c: Cleanup. Use mysql_real_escape_string instead of
   crude filtering.
 * Makefile.am: Use _LIBADD properly.
 * configure.in: More portability fixes.
2008-09-28 22:15:30 +00:00
tonnerre
3e58fd536d If strverscmp() is not present, gnutls shouldn't export a symbol of the
same name, breaking the builds of libraries trying to both link against
libcurl and use strverscmp(). Bump PKGREVISION.

Fixes PR 39640.
2008-09-27 23:11:36 +00:00
adrianp
22a9586aaf Expose libwrap through options.mk (no change to default builds) 2008-09-19 19:20:57 +00:00
joerg
681afdef37 Fix build on DragonFly. From PR 38835.
Add DESTDIR support.
2008-09-17 16:15:54 +00:00
joerg
59a7666aee Fix build with newer awk in netbsd-current. 2008-09-17 16:11:28 +00:00
reed
8748c6679e Add zlib option.
This is for PR 39433.
It is not enabled by default.
2008-09-17 00:46:58 +00:00
gdt
acbb0d5c86 Finish removal of security/Ai{CA,SSLtelnet} that should have been part
of last commit.
2008-09-16 20:02:16 +00:00
gdt
d5c91b174e Remove security/AiCA, security/AiSSLtelnet, security/smimemsg.
These packages have unfetchable distfiles and unreachable HOMEPAGEs.
Removal proposed on pkgsrc-users with no objections received.
2008-09-16 20:00:35 +00:00
seb
7fa7aa3ba0 Add & enable p5-Authen-CAS-Client 2008-09-16 17:04:36 +00:00
seb
d5000a89cf Initial import of p5-Authen-CAS-Client version 0.03 in the NetBSD
Packages Collection.

The Perl 5 module Authen::CAS::Client provides a simple interface
for authenticating users using JA-SIG's CAS protocol. Both CAS v1.0
and v2.0 are supported.
2008-09-16 17:03:03 +00:00
taca
847296952e Update openssh package to 5.1.1 (5.1p1)
Changes from OpenSSH 5.0 is huge to write here, please refer its
release note: http://www.openssh.com/txt/release-5.1.
I quote only Security section from the release note.

Security:

 * sshd(8): Avoid X11 man-in-the-middle attack on HP/UX (and possibly
   other platforms) when X11UseLocalhost=no

   When attempting to bind(2) to a port that has previously been bound
   with SO_REUSEADDR set, most operating systems check that either the
   effective user-id matches the previous bind (common on BSD-derived
   systems) or that the bind addresses do not overlap (Linux and
   Solaris).

   Some operating systems, such as HP/UX, do not perform these checks
   and are vulnerable to an X11 man-in-the-middle attack when the
   sshd_config(5) option X11UseLocalhost has been set to "no" - an
   attacker may establish a more-specific bind, which will be used in
   preference to sshd's wildcard listener.

   Modern BSD operating systems, Linux, OS X and Solaris implement the
   above checks and are not vulnerable to this attack, nor are systems
   where the X11UseLocalhost has been left at the default value of
   "yes".

   Portable OpenSSH 5.1 avoids this problem for all operating systems
   by not setting SO_REUSEADDR when X11UseLocalhost is set to no.

   This vulnerability was reported by sway2004009 AT hotmail.com.
2008-09-16 12:53:08 +00:00
he
59a0fe51ac Update from version 1.06 to 1.07.
Upstream changes:

1.07 - Fri Aug 15 16:53:36 2008
	* Fixed the odd character problems in some of the files
	* No need to upgrade if you already have this installed

1.06_03 - Sun Jun 22 11:32:46 2008
	* Trying the __sgi definition. If this doesn't make things
	blow up, this release will get bumped to 1.07.

1.06_02 - Thu Jun 19 11:55:21 2008
	* Removed wide chars from the header file. Some compilers
	like to complain about things that are wrong. :(

1.06_01 - Wed Jun 18 09:37:34 2008
	This is a test of a fix for Irix.

1.06_01 - Wed Jun  4 19:18:57 2008
	* This is a test of a fix for Irix.
2008-09-12 11:53:45 +00:00
gdt
beebde5f4e Clarify that the vague patent claims are made by the licensor. 2008-09-12 11:49:57 +00:00
gdt
9d4870602c +generic-nonlicense, NO_*_ON_* because one can't read the license due
to distfile/homepage lossage.

candidate for removal.
2008-09-12 11:45:41 +00:00
gdt
63da1fb304 Add LICENSE=generic-nonlicense, set NO_*_ON_* due to unfetchable
distfile.
2008-09-12 11:42:02 +00:00
adam
f3adb6cf86 Changes 0.2.28:
* Rewrite to use poll instead of select.
* Improve Windows installation instructions in the manual.
* tests: New self test of gsasl_mechanism_name function.
2008-09-08 08:58:49 +00:00
bjs
f8fc2597e3 Update to libassuan-1.0.5. As shipped, it builds with -fPIC on linux.
This is not acceptable for us.  Instead, we patch to use libtool.
The included test passes.

Changes since 1.0.3:

 * Minor fixes.
 * Build library for GNU/Linux as PIC [**but we use libtool**]
 * New hook feature to enhance the internal I/O functions.
2008-09-07 02:40:53 +00:00
wiz
6d32cfc00d Bump PKGREVISION for libevent users due to 1.4.3->1.4.5 shlib name change. 2008-09-06 21:39:52 +00:00
wiz
03b53774ba Recursive PKGREVISION/ABI-depends bump for db4 4.6->4.7 update (shlib
name change).
2008-09-06 20:54:31 +00:00
wiz
7dd4a9c15e Update to 1.15:
v1.15
	- change internal behavior when SSL handshake failed (like when verify
          callback returned an error) in the hope to fix spurios errors in
          t/auto_verify_hostname.t
2008-09-06 15:44:04 +00:00
adrianp
a645ba3258 Update to 5.4
- Make this compile on amd64
- Don't silently look for libraries when we don't need them.  This should fix
  PR 39318
- Add missing depends on apr

Release 5.4
###########
* Fixes to the http modules as some Apache installations are picky
* The MySQL module also works with mysqld-5.0, updated
* Added AS/400 return code checks to pop3 module
* Fixed memory leaks in the http-form module.
* Implemented a proposal by Jean-Baptiste.BEAUFRETON (at) turbomeca.fr to
  check for "530 user unknown" message in the ftp module
* Added a performance patch by alejandro.mendiondo (at) baicom.com. This one
  needs stability testing!
* Beautification to remove compiler warnings of modern gcc
2008-08-31 10:54:52 +00:00
shannonjr
0b0f66db00 Update to 0.9.15. Changes:
- preludedb-admin has a bew 'count' command, printing the result of a
COUNT() on the database.
- preludedb-admin work on smaller set of data, to prevent large
retrieval error (fix #220, refs #305).
- preludedb-admin handling of interrupted transaction was improved.
- Fix MySQL and SQLite MacOSX detection, by
Uwe Schwartz <usx303 at googlemail.com>. (fix #296).
2008-08-27 22:37:09 +00:00
shannonjr
c610379d81 Update to 0.9.14.2. Changes: Various build fixes (#306) 2008-08-26 22:25:46 +00:00
shannonjr
921d0aa5e8 Update to 0.9.13. Changes:
ModSecurity ruleset rewrite, by Peter Vrabec <pvrabec@redhat.com> and
Dan Kopecek <dkopecek@redhat.com>. This ruleset handle ModSecurity 2.0
output. (Fix #216).
- New rulesets for FreeBSD su attempts, by Alexander Afonyashin <firm@iname.com>
(Fix #304).
- Add additional format to the default configuration to deal with apache
error_log file format, by Alexander Afonyashin <firm@iname.com> (Fix #307).
- Normalize some classification: introduce Remote Login, and
Credentials Change. Cleanup SSH ruleset, and remove duplicated rules.
2008-08-26 22:23:29 +00:00
shannonjr
e3fa46a96b Update to 0.9.19. Changes:
- EasyBindings inclusion! EasyBindings provide simple C++, Python,
Perl, Ruby, and Lua bindings for using libprelude. They are still
considered experimental, thus you need to use (--enable-easy-bindings)
to activate them. Thanks to Sebastien Tricaud <toady@inl.fr> and
Pierre Chifflier <p.chifflier@inl.fr> for their contribution to this
project!
- Use automake/autoconf for building/installing Python extension.
- Fix 0.9.18 regression (alert created with empty CreateTime).
- Implement reference counting for the idmef-criteria and
prelude-connection API.
- Automatic casting when setting IDMEF Value to a field that is of
different type. Until now, if an user tried to set a path of a
specific type with an idmef_value_t object containing another type,
idmef_path_set() would return an error.
- Various bug fixes.
2008-08-26 22:21:55 +00:00
obache
1f65f1b313 Add and enable p5-Crypt-OpenSSL-AES. 2008-08-24 09:10:52 +00:00
obache
3bd6aba41e Import p5-Crypt-OpenSSL-AES-0.02 as security/p5-Crypt-OpenSSL-AES.
Based on PR 39222 by Jens Rehsack.

This module implements a wrapper around OpenSSL. Specifically, it wraps the
methods related to the US Government's Advanced Encryption Standard (the
Rijndael algorithm).
This module is compatible with Crypt::CBC (and likely other modules that
utilize a block cipher to make a stream cipher).
This module is an alternative to the implementation provided by Crypt::Rijndael
which implements AES itself. In contrast, this module is simply a wrapper
around the OpenSSL library.
The Crypt::Rijndael implementation seems to produce inaccurate results on
64-bit x86 machines. By using OpenSSL, this module aims to avoid architecture
specific problems, allowing the OpenSSL maintainers to overcome such issues.
2008-08-24 09:09:38 +00:00
obache
2d7bf63357 Remove unresolvable hosts from MASTER_SITES.
Noticed by Zafer Aydogan via private mail.
2008-08-23 07:46:59 +00:00
epg
647ff31665 Set MAKE_JOBS_SAFE=no 2008-08-23 00:48:12 +00:00
tonnerre
e188148e85 Push new Python OpenSSL module. Changes since version 0.6:
- Removed some unused variables.
 - Improved Python 2.3 compatibility.
 - Fixed various threading bugs.
 - Some improvements in the test suite.
2008-08-21 10:29:31 +00:00
he
0eb28a977e Add p5-Net-DNS-SEC-Maint-Key. 2008-08-20 09:56:28 +00:00
he
09114ae9fb Import p5-Net-DNS-SEC-Maint-Key version 0.013.
This is the RIPE NCC DNSSEC Key Management tools, described at

  https://www.ripe.net/projects/disi/dnssec_maint_tool/

This class implements an interface to a database of private keys used
during DNSSEC administration.


This package includes some diffs to the self-tests, so that they pass.
2008-08-20 09:55:38 +00:00
markd
48dceb7aee Update p5-GSSAPI to 0.26
0.22    Mo Mai 29 21:15:17 CEST 2006
        - Bugfixs

0.23    Mi Aug  2 15:48:19 UTC 2006
        - Re-added support of MIT Kerberos 1.2.x

0.24    Wed, 21 Feb 2007 20:59:39 +0100
        - Changed tests as an answer to FAIL 413320

0.25    So 3. Feb 20:18:16 UTC 2008
        - Enhancement to use OpenSolaris/Solaris 10 native gss library

0.26    Fr 15. Feb 22:32:10 UTC 2008
        - modified Makefile.PL to trigger no FAIL testreports
          in case of missing prerequirements.
2008-08-17 21:09:12 +00:00
he
3993718d61 Update from version 2.10 to 2.11.
Pkgsrc changes:
 o Change MAINTAINER to pkgsrc-users@ as per communication with maintainer

Upstream changes:

Authen-SASL 2.11 -- Mon Apr 21 10:23:19 CDT 2008

Enhancements
  * implement securesocket() in the ::Perl set of plugins

Bug Fixes
  * fix parsing challenges from GnuSASL
  * update tests for DIGEST-MD5
  * New test from Phil Pennock for testing final server response
2008-08-17 17:40:36 +00:00
dholland
c6ff9df47b This installs a bash script. Handle it properly.
PKGREVISION++
2008-08-17 05:32:12 +00:00
dholland
891852c7a5 Fix DESTDIR. 2008-08-17 03:21:45 +00:00
manu
2181a05305 Update to ipsec-tools 0.7.1, fixes CVE-2008-3652
Changes since the 0.6 branch:
0.7.1 - 23 July 2008
        o Fixes a memory leak when invalid proposal received
        o Some fixes in DPD
        o do not set default gss id if xauth is used
        o fixed hybrid enabled builds
        o fixed compilation on FreeBSD8
        o cleanup in network port value manipulation
        o gets ports from SADB_X_EXT_NAT_T_[SD]PORT if present in purge_ipsec_sp
i()
        o Generates a log if cert validation has been disabled by configuration
        o better handling for pfkey socket read errors
        o Fixes in yacc / bison stuff
        o new plog() macro (reduced CPU usage when logging is disabled)
        o Try to works better with huge SPD/SAD
        o Corrected modecfg option syntax
        o Many other various fixes...

0.7     - 09 August 2007
        o Xauth with pre-shared key PSK
        o Xauth with certificates
        o SHA2 support
        o pkcs7 support
        o system accounting (utmp)
        o Darwin support
        o configuration can be reloaded
        o Support for UNIQUE generated policies
        o Support for semi anonymous sainfos
        o Support for ph1id to remoteid matching
        o Plain RSA authentication
        o Native LDAP support for Xauth and modecfg
        o Group membership checks for Xauth and sainfo selection
        o Camellia cipher support
        o IKE Fragment force option
        o Modecfg SplitNet attribute support
        o Modecfg SplitDNS attribute support ( server side )
        o Modecfg Default Domain attribute support
        o Modecfg DNS/WINS server multiple attribute support
2008-08-16 06:55:18 +00:00
wiz
2c824d3104 Remove idea option -- I can't find a patch for the current PKGVERSION.
Addresses PR 39316.
2008-08-14 19:24:07 +00:00
adam
b2d1395ec5 Changes 0.2.27:
* Fix SASL operations through TLS.
* Update gnulib files, and include gnulib self-tests.
* Update translations.
2008-08-14 10:01:03 +00:00
obache
ce6fa3e65e Add DESTDIR support. 2008-08-12 10:16:54 +00:00
shannonjr
9d2f0bf21f PLIST correction. 2008-08-10 12:38:39 +00:00
shannonjr
571dc25154 PLIST correction. 2008-08-08 21:27:58 +00:00
shannonjr
982ffc8ac0 Re: pkg/39314 (security/ccid update to 1.3.8)
Update to 1.3.8
2008-08-08 21:27:24 +00:00
shannonjr
c3ad12ccf2 Re: pkg/39315
Update to 1.4.102. Patches ag and ah are deleted because they are no
longer required (change included in unmodified system).
2008-08-08 21:25:48 +00:00
obache
3d9d4444c5 Change MASITER_SITES to one still have old distfile.
from Zafer Aydogan via private mail.
2008-08-04 08:37:06 +00:00
he
925bae7970 Update from version 1.13 to 1.14. Changes:
v1.14
	- added support for verification of hostname from certificate
          including subjectAltNames, support for IDN etc based on patch and
          input from christopher[AT]odenbachs[DOT]de and
          achim[AT]grolmsnet[DOT]de.
          It is also possible to get more information from peer_certificate
          based on this patch. See documentation for peer_certificate and
          verify_hostname
	- automatic verification of hostnames with SSL_verifycn_scheme and
          SSL_verifycn_name
        - global setting of default context options like SSL_verifycn_scheme,
          SSL_verify_mode with set_ctx_defaults
        - fix import of inet4,inet6 which got broken within 1.13_X.
          Thanks to <at[AT]altlinux[DOT]ru> for bugreport and patch
	- clarified and enhanced debugging supppport based on bugreport
          http://rt.cpan.org/Ticket/Display.html?id=32960
	- put information into README regarding the supported and recommanded
	  version of Net::SSLeay
2008-08-03 20:47:11 +00:00
he
248476e90b Update from version 1.32nb1 to 1.35. Changes:
1.35 25.07.208
	- Fix test plan for autoload.t if Test::Exception isn't available.
	- Skip rsa_generate_key.t if Test::Exception isn't available.

1.34 24.07.2008
	- Fixed problem with X509_get_subjectAltNames, where some types of Alt
	  Name (eg DIRNAMEs) were not properly handled, resulting in seg faults.
	  Reported by Achim Grolms.
	- Added support for ENGINE_load_builtin_engines and
	  ENGINE_register_all_complete in order to enable built-in OpenSSL
	  crypto engines for hardware acceleration etc.
	- Added support for ENGINE_by_id and ENGINE_set_default, required
	  to enable Sun crypto acceleration

1.33_01 14.02.2008
	- Fixed a compile problem with inc_paths /usr/kerberos/include
	  in inc/Module/Install/PRIVATE/Net/SSLeay.pm. Reported by "J. Nick
	  Koston via RT"
	- Added optional support for SSL_set_hello_extension,
          SSL_set_session_secret_cb to support various extension patches from
          a patch to openssl-0.9.9-dev contributed by Jouni Malinen.
          See wpa_supplicant/patches/openssl-0.9.9-session-ticket.patch in the
          latest (git) version 0.6 and later of wpa_suplicant at
          http://hostap.epitest.fi/. These additions are ifdefed to
          SSL_F_SSL_SET_HELLO_EXTENSION which is added by the patch
          Tested with openssl-SNAP-20070816.
        - Added SSL_SESSION_set_master_key and SSL_get_keyblock_size.
        - Added all SSL_OP_* options flags present in 0.9.9
        - Fixed a bug in SSL_set_tmp_dh
        - Doc improvements in README.Win32
	- Fixed a problem with proxy connections: open_proxy_tcp_connection
	  was stopping after the first \n from teh proxy,
	  but instead should have looked for
	  $CRLF . $CRLF to find the beginning of the SSL content
	- Fixed missing / on /usr/kerberos/include, reported by several people
	- removed bacus.pt from host list in t/handle/external/10_destroy.t,
	  since it seems no longer to respond. Reported by tco2.
	- changed t/handle/external/10_destroy.t so this list of URIs to be
	  tested can be configured with environment variable SSLEAY_URIS, a
	  colon separated list of host names. Suggested by tco2.
	- changed t/handle/external/50_external.t and t/external/08_external.t
	  so this list of sites to be
	  tested can be configured with environment variable SSLEAY_SITES, a
	  colon separated list of host names. Suggested by tco2.
	- Fixed doucumentation in README of how to use OPENSSL_PREFIX
	  environment variable to control the location of openssl. Reported by
	  "Quanah Gibson-Mount via RT".
	- Don't use Module::Installs auto_install.
	- Bind NID_ and GEN_ constants.
	- Default to not running external tests.
2008-08-03 20:35:30 +00:00
agc
6503f7082f Add and enable sshfp 2008-07-31 10:23:06 +00:00
agc
a1e0ba2e59 Initial import of sshfp-1.1.3 into the Packages Collection.
sshfp is a small utility that generates RFC4255 SSHFP DNS records
	based on the public keys stored in a known_hosts file or obtained by
	using ssh-keyscan.  If the nameserver of the domain allows zone
	tranfers (AXFR), an entire domain can be processed for all its A
	records.  These can then be easilly added to a zone, and then secured
	by DNSSEC.
2008-07-31 10:21:21 +00:00
kefren
ad4ad68b38 update to gnutls-2.4.1
Changes:

** libgnutls: Fix local crash in gnutls_handshake. [GNUTLS-SA-2008-2]
** libgnutls: Fix memory leaks when doing a re-handshake.
** Fix compiler warnings.
** Fix ordering of -I's to avoid opencdk.h conflict with system headers.
** srptool: Fix a problem where --verify check does not succeed.
2008-07-30 17:17:21 +00:00
he
bc6858a8f0 Update from version 0.34nb4 to 0.36.
Pkgsrc changes:
 o Change to use CPAN as distribution source
 o Change HOMEPAGE to use search.cpan.org; leave old
   HOMEPAGE pointing to sourceforge commented-out

Upstream changes:
0.36 Mon Aug 13 12:16:38 EDT 2007

    * [rt.cpan.org #28814] - Performance improvement
      from mehradek (Radoslaw Zielinski)
        -use English;
        +use English qw( -no_match_vars );


0.35 Fri Apr 20 12:33:53 EDT 2007 - Jesse Vincent <jesse@bestpractical.com>

    * New Maintainer: Jesse Vincent <jesse@bestpractical.com> took over
      maintenance of this module.
    * Removed test key expiry dates. (Fixes
      http://rt.cpan.org/Ticket/Display.html?id=17618)
    * Applied secret key output patch for modern GPG from
      http://rt.cpan.org/Ticket/Display.html?id=17619
    * Applied patch to support 'tru' record types from
      (http://search.cpan.org/src/JRED/Mail-GPG-1.0.6/patches/)
2008-07-30 13:26:52 +00:00
joerg
bbb376ec3a Needs pkg-config. 2008-07-29 19:53:45 +00:00
he
08533f8f5c Update from version 0.06 to 0.07. Changes:
0.07  Thu Jul 23 10:31:33 2008
    - rt 34703
    - argument logic before filehandle fetch so that they'll apply
    - read small chunk of file handles instead if readline() to
      avoid various issues
2008-07-28 09:26:48 +00:00
joerg
645008a58a NetBSD at least gets glob.h installed, so check for it. 2008-07-27 18:47:07 +00:00
he
0901f20e3c Add HOMEPAGE pointing into search.cpan.org.
No other change, so no version bump.
2008-07-27 16:06:09 +00:00
he
35135ea5fe Update from version 0.02 to 0.04.
Pkgsrc changes:
 o Added full list of dependencies, from Makefile.PL.

Upstream changes:
0.04  Sun Jun 15 16:22:32 JST 2008
	* fixed a bug caused memory greediness with too long strings :<
	* improved internal code for PAUSE.

0.03  Sat Jun 14 19:17:30 JST 2008
	* added support for Math::Random::MT::Perl.
	* switched to Module::Build.
	* cleaned up test scripts.
	* added 'binary' option to rndpassword.
2008-07-26 20:28:23 +00:00
rhaen
1132dc138f Fixed the problems reported by babylon5.netbsd.org weekly pkgsrc output for Thu Jul 24 02:20:00 2008 2008-07-25 08:48:23 +00:00
tnn
53324c97e5 Add patch from OpenSSH 5.1 that fixes an X11 fwd security issue on HP-UX.
Bump PKGREVISION.
2008-07-24 16:25:47 +00:00
obache
d700089e65 Update amavisd-new to 2.6.1.
Based on maintainer update request in PR 39196.

There are a lot of changes and some incompatabilities with 2.5.3
(current version in pkgsrc) particularly as respects SQL schema.
Consult vendor's releases notes for more detail:
    http://www.ijs.si/software/amavisd/release-notes.txt
2008-07-24 13:49:22 +00:00
rhaen
b0d730ef34 updated to 2.01
- no complete ChangeLog from upstream -

ChangeLog:
2000-03-13   Gisle Aas <gisle@ActiveState.com>

   Release 2.01

   Broken out of the Digest-MD5-2.12 distribution and made into
   a separate dist.
2008-07-23 22:52:39 +00:00
shannonjr
d738510fd2 Changed so that pflogger daemon can run as non-root with nologin shell. 2008-07-21 12:22:15 +00:00
shannonjr
b744defec4 Added prelude-correlator 2008-07-21 12:17:52 +00:00
shannonjr
ca727cf206 Prelude-Correlator serves to correlate, in real time, the multiple
events received by Prelude. Several isolated alerts, generated from
different probes, can thus trigger a single correlation alert should the
events be related. This correlation alert then appears within the
Prewikka interface and indicates the potential target information via
the set of correlation rules.
2008-07-21 12:16:46 +00:00
shannonjr
59829784a4 Update to 0.9.14. Changes:
- Improve thread safety when evicting events to disk.
- Handle IDMEF message version tag, which will be used in upcoming
libprelude version.
- Add support for newer GnuTLS 2.2.0 session priority functions. When
the option is available, the user might specify TLS settings through
the "tls-options" configuration entry.
- Fix a possible crash upon destruction of a bufpool that is writing to
a failover.
- Correct strtoul() error checking, when verifying scheduler options.
2008-07-21 12:12:15 +00:00
shannonjr
dc766237b5 Update to 0.9.18. Changes:
- Add support for newer GnuTLS 2.2.0 session priority functions. When
the option is available, the user might specify TLS settings through
the "tls-options" configuration entry.
- Workaround a GnuTLS issue where the client wouldn't be able
to negotiate a supported compression protocol with the server (#299).
- Implement variable substitution in Prelude configuration files.
- Allow IDMEF criteria with multiples values for a single path,
as can be seen in the following example:
alert.classification.text = (A || B || C || D)
- Implement negation of idmef-criteria, allowing to write criteria like:
! (alert.classification.text = A || alert.classification.text = B)
- Fix an IDMEF-Criteria matching problem, where the match function would
not attempt to match a OR after multiple consecutive AND that failed.
Thanks Alexander Afonyashin <firm(at)iname.com> for pointing out the
problem.
- Never use non-pointer field, always use the "required" keyword. Fix
API consistency issue, that could lead to unexpected behavior.
- Fix multiples problem with prelude_read_multiline /
prelude_read_multiline2,
(fix a problem with prelude-manager idmef-criteria that wouldn't read
external ruleset).
- Error out if GnuTLS initialization fail.
2008-07-21 12:10:48 +00:00
heinz
921d1ed754 Updated to version 1.98.
Pkgsrc changes:
  - none

Changes since version 1.58:
===========================
1.98                                                          Jul 08, 2008
 * Precedence bug in Public::write() and Private::write()
   (http://rt.cpan.org/Public/Bug/Display.html?id=37489)
   Thanks to HRAFNKELL for reporting this!

1.96                                                          Jul 06, 2008
 * Set the version numbers in modules to $Crypt::RSA::Version::VERSIOn

1.95                                                          Jul 06, 2008
 * Remove STDERR error output in Crypt::RSA::SS::PSS.
   (http://rt.cpan.org/Public/Bug/Display.html?id=29048)
 * Allow symmetric cipher specification in Crypt::RSA::Key.
   (http://rt.cpan.org/Public/Bug/Display.html?id=27929)
 * Fix bug in AUTOLOAD.
   (http://rt.cpan.org/Public/Bug/Display.html?id=26028)
 * Use Module::Install instead of ExtUtils::MakeMaker
 * Consolidate versioning to module version in Crypt::RSA::Version
   (which is the reason for the version # jump)
 * "use base" instead of @ISA
 * "use FindBin" instead of the literal "lib" - this is safer.
2008-07-17 21:14:53 +00:00
heinz
34044d023c Updated to version 1.24.
Pkgsrc changes:
  - none

Changes since version 1.21:
===========================
1.24 (Tue Jul 15 14:35:35 EDT 2008)

- Remove references to Artistic License from README.

1.23 (Tue Jul 15 05:18:37 EDT 2008)

- Applied patch from ANDK@cpan.org to avoid failures in reforgy.t
  [http://rt.cpan.org/Ticket/Display.html?id=27585]

- Turned off warnings in the test suite.  It is supposed to generate
  warnings but it freaks out people.

- License changed to Artistic 2.0 | GPL for Fedora folks.
2008-07-17 20:50:24 +00:00
heinz
8a79320f1f Updated to version 2.29.
Pkgsrc changes:
  - none

Changes since version 2.24:
===========================
2.29	 Tue Apr 22 10:22:37 EDT 2008
	 - Fixed errors that occurred when encrypting/decrypting utf8 strings
	 in Perl's more recent than 5.8.8.

2.28	 Mon Mar 31 10:46:25 EDT 2008
	 - Fixed bug in onesandzeroes test that causes it to fail with
           Rijndael module is not installed.

2.27	 Fri Mar 28 10:13:32 EDT 2008
 	 - When taint mode is turned on and user is using a tainted key,
           explicitly check tainting of key in order to avoid "cryptic"
           failure messages from some crypt modules.

2.26	Thu Mar 20 16:41:23 EDT 2008
	- Fixed onezeropadding test, which was not reporting its test count
	  properly.

2.25	Fri Jan 11 15:26:27 EST 2008
	- Fixed failure of oneandzeroes padding when plaintext size is
	an even multiple of blocksize.
	- Added new "rijndael_compat" padding method, which is compatible
	with the oneandzeroes padding method used by Crypt::Rijndael in
	CBC mode.
2008-07-17 20:28:08 +00:00
heinz
753ca44889 Updated to version 5.45.
Pkgsrc changes:
  - none

Changes since version 5.45:
===========================
5.47  Wed Apr 30 04:00:54 MST 2008
	- modified Makefile.PL to install in core for Perls >= 5.10
		-- thanks to Jerry Hedden for patch
	- changed from #include <> to #include "" in SHA.xs
		-- some platforms not able to find SHA source files
			-- thanks to Alexandr Ciornii for testing
	- moved .pm file to appropriate lib directory
	- minor addition to META.yml

5.46  Wed Apr  9 05:04:00 MST 2008
	- modified Addfile to recognize leading and trailing
		whitespace in filenames (ref. rt.cpan.org #34690)
	- minor C source code modification (ref. hmac.c)
	- use const in sha.c for clean builds with -Wwrite-strings
		-- thanks to Robin Barker for patch
2008-07-17 19:02:32 +00:00
drochner
7beee17e68 -make this work with the openpam version in -current
(I didn't try whether it still works on 4.0. Would be nice if
  someone did it.)
-supply an example pam.conf file
-slow down to avoid abuse, better cleanup in error cases, more paranoia
thanks to Joerg for suggestions
2008-07-17 18:00:58 +00:00
rhaen
97f5307fde - updated to 1.06
- fixed dependencies (required)
ChangeLog:
1.06 - Wed Apr 23 13:14:34 2008
	* This release has a compiler-bug workaround for Sun C 5.9
	identified by Andy Armstrong. No, really, it was a compiler
	bug: http://in.opensolaris.org/jive/thread.jspa?threadID=53641&tstart=0
	* You don't need to upgrade if you already have 1.05.
2008-07-17 10:59:22 +00:00
rhaen
198c9b7d69 - updated to 0.14
Changelog:
0.11  Wed Oct 31 20:26:13 2007
        - fixed __reflect error

0.12  Sat Nov  3 10:11:42 2007
        - Debug output removed

0.13  Sun Nov  4 11:22:54 2007
        - fixed tests

0.14  Mon Nov  5 08:10:11 2007
        - fixed __reflect error in non XS part
2008-07-16 13:53:24 +00:00
joerg
2c8433379b Try to fix build on NetBSD. 2008-07-15 16:39:55 +00:00
mishka
c1c9887eb8 Use my NetBSD.org email - I read it much more regulary than any others. 2008-07-15 15:33:45 +00:00
drochner
3d80c5d3f6 sync w/ base pkg 2008-07-15 11:13:30 +00:00
drochner
c7853b86b0 update to 2.22.3
change: version bump for gnome-2.22.3
2008-07-15 11:12:42 +00:00
abs
da84bdd952 +p5-Crypt-GPG 2008-07-15 09:46:57 +00:00
abs
f4c4e59451 Added security/p5-Crypt-GPG version 1.63
The Crypt::GPG module provides access to the functionality of the
GnuPG (www.gnupg.org) encryption tool through an object oriented
interface.

It provides methods for encryption, decryption, signing, signature
verification, key generation, key certification, export and import.
Key-server access is on the todo list.
2008-07-15 09:46:22 +00:00
adam
12be2ea8e0 Changes 2.1.19:
* Improvements and bug fixes.
2008-07-15 09:17:27 +00:00
dsainty
8f8c9f2e65 Catch distinfo up with the removal of patch-a[bh].
(Hi Tobias :)
2008-07-14 22:19:11 +00:00
drochner
c44a332480 update to 2.22.3
changes:
-Better initization of (non-crypto) random number generator
-Build fixes
2008-07-14 17:20:35 +00:00
joerg
f605fec2db Mark as destdir ready. 2008-07-14 12:55:56 +00:00
tnn
ecd7c12e2c Update to openssl-0.9.8h. Changes from 0.9.8g:
Two crashes discovered using the Codenomicon TLS test suite, as reported
in CVE-2008-0891 and CVE-2008-1672, were fixed. The root CA certificates
of commercial CAs were removed from the distribution. Functions were added
to implement RFC3394 compatible AES key wrapping. Utility functions to
handle ASN1 structures were added. The certificate status request TLS
extension, as defined in RFC3546, was implemented. Several other bugfixes
and enhancements were made.
2008-07-14 03:52:54 +00:00
bad
6fbd870d63 Make nessus-core honor PKG_SYSCONFBASE for configuration files.
While here, move the sharedstatedir to VARBASE where it belongs.
Bump PKGREVISION.
2008-07-01 21:27:38 +00:00
obache
28d2e6ccff Treat DragonFly same as other *BSDs.
Patch provided by Hasso Tepper in PR 38878.
2008-07-01 13:46:02 +00:00
taca
1632781072 Update sudo package to 1.6.9p17.
660) The -i flag should imply resetting the environment, as it did in
     sudo version prior to 1.6.9.  Also, the -i and -E flags are
     mutually exclusive.

661) Fixed the configure test for dirfd() under Linux.

662) Fixed test for whether -lintl is required to link.

663) Changed how sudo handles the child process when sending mail.
     This fixes a problem on Linux with the mail_always option.

664) Fixed a problem with line continuation characters inside of
     quoted strings.
2008-06-30 15:53:41 +00:00
peter
a0fd6786bb -pflkm 2008-06-26 21:01:25 +00:00
peter
28b5c355bc Remove security/pflkm, it's outdated and unmaintained.
Approved by agc.
2008-06-26 21:01:00 +00:00
drochner
ab0e7394b0 don't pass DESTDIR in CPPFLAGS, from Stephen Borrill 2008-06-25 18:17:33 +00:00
joerg
b34aa6885e DESTDIR support. 2008-06-22 23:05:00 +00:00
he
b540489d0d Add p5-Digest-MD5-File. 2008-06-21 22:25:52 +00:00
he
eb54c3aa26 Import p5-Digest-MD5-File version 0.06.
Get MD5 sums for files of a given path or content of a given url.
2008-06-21 22:25:00 +00:00
joerg
3b0d97b0de Add DESTDIR support. 2008-06-20 01:09:05 +00:00
taca
f7ceb84d39 - Switch to use vendor_dir with Ruby 1.8.7.
Bump PKGREVISION.
2008-06-19 14:52:11 +00:00
tonnerre
edf2b93718 Fix shared library build on various architectures. This basically fiddles
with the number of colons between the fields.
2008-06-16 20:18:20 +00:00
joerg
4addc4fd2d Add missing directory. 2008-06-16 15:33:11 +00:00
peter
810255d978 Add detection for pf 4.1 and 4.2. 2008-06-15 14:03:22 +00:00
joerg
ba171a91fa Add DESTDIR support. 2008-06-12 02:14:13 +00:00
shannonjr
9b17cd7da7 RE: pkg/38922: security/libprelude fails to build
Applied Hasso Tepper recommended fix. Thank you.
2008-06-10 13:57:10 +00:00
tonnerre
dbcd463c31 Add more patches, now for MITKRB5-SA-2007-006, MITKRB5-SA-2008-001 and
MITKRB5-SA-2008-002. Bump PKGREVISION now finally.
2008-06-07 23:58:11 +00:00
tonnerre
3dba4d1622 Add patches for MITKRB5-SA-2007-004 and MITKRB5-SA-2007-005. PKGREVISION
will be bumped again once some other patches are in.
2008-06-07 22:26:10 +00:00
tonnerre
ee2541c198 Remove parts of a different security patch which slipped in but are not
supported yet. Don't bump revision as the package didn't build before.
2008-06-07 20:22:18 +00:00
tonnerre
c94122195f Add security patches for 3 Kerberos vulnerabilities:
- telnetd username and environment sanitizing vulnerabilities ("-f root")
   as described in MIT Kerberos advisory 2007-001.
 - krb5_klog_syslog() problems with overly long log strings as described
   in MIT Kerberos advisory 2007-002.
 - GSS API kg_unseal_v1() double free vulnerability as described in the
   MIT Kerberos advisory 2007-003.
2008-06-07 18:36:06 +00:00
tonnerre
9005c221a8 Fix two Denial of Service vulnerabilities in OpenSSL 0.9.8g:
- Fix flaw if 'Server Key exchange message' is omitted from a TLS handshake
   which could lead to a silent crash.
 - Fix double free in TLS server name extensions which could lead to a remote
   crash.

Patches from upstream.
2008-06-03 21:39:40 +00:00
obache
75e54952f2 Missing to add bin/chkutmp when updated to 0.47.
Noticed by Hasso Tepper in PR 38822.

Bump PKGREVISION.
2008-06-02 12:23:04 +00:00
obache
604ecba71a Try to fix build failure on Solaris, it does not have LOG_AUTHPRIV. 2008-06-01 08:09:38 +00:00
tron
71065d0d2f Restore NetBSD specific part of the patch which got lost in the
last commit.
2008-05-30 13:55:48 +00:00
tron
9f3ec4170c Fix build problem under Mac OS X caused by broken code to support
getpeereid() .
2008-05-30 12:30:07 +00:00
drochner
c4594852f5 update to 2.22.2
changes:
-Fix importing keys from hkp keyservers
-build fixes
2008-05-29 16:53:20 +00:00
drochner
532e197c84 update to 2.22.2
changes:
-minor UI improvements
-bugfixes
-portability improvements, in particular for credential passing on
 local sockets -- unfortunately a bit of the patch I submitted upstream
 got lost
2008-05-29 10:47:52 +00:00
schmonz
078836c257 Restore PKG_SYSCONFDIR support, lost in the last update. Bump PKGREVISION. 2008-05-29 00:44:30 +00:00
agc
ee52f51006 Make this package work on Mac OS X. 2008-05-27 22:28:21 +00:00
tnn
5f770b6c1a Update to stunnel-4.24.
4.24: fix security problem (properly reject revoked certs)
4.23: WinNT bugfix
4.22:
  - A new global option to control logging to syslog.
    Simultaneous logging to a file and the syslog is now possible.
  - A new service level option to control stack size.
  - Restored chroot() to be executed after decoding numerical
    userid and groupid values in drop_privileges().
  - A few bugs fixed the in the new libwrap support code.
  - TLSv1 method used by default in FIPS mode instead of
    SSLv3 client and SSLv23 server methods.
4.21:
  - Initial FIPS 140-2 support (see INSTALL.FIPS for details).
  - Experimental fast support for non-MT-safe libwrap is provided
    with pre-spawned processes.
  - Stunnel binary moved from /usr/local/sbin to /usr/local/bin
    in order to meet FHS and LSB requirements.
  - Added code to disallow compiling stunnel with pthreads when
    OpenSSL is compiled without threads support.
  - Minor manual update.
  - TODO file updated.
  - Dynamic locking callbacks added (needed by some engines to work).
  - AC_ARG_ENABLE fixed in configure.am to accept yes/no arguments.
  - On some systems libwrap requires yp_get_default_domain from libnsl,
    additional checking for libnsl was added to the ./configure script.
  - Sending a list of trusted CAs for the client to choose the right
    certificate restored.
  - Some compatibility issues with NTLM authentication fixed.
2008-05-27 11:51:32 +00:00
tnn
879c72f41f Mark as not for bulk building on HPUX 2008-05-27 09:44:39 +00:00
joerg
3d8ef5a52d Second round of explicit pax dependencies. As reminded by tnn@,
many packages used to use ${PAX}. Use the common way of directly calling
pax, it is created as tool after all.
2008-05-26 02:13:14 +00:00
wiz
22414ab751 Improve previous patch to still build on NetBSD 4.0 branch.
Addresses PR 38744.
2008-05-25 21:50:45 +00:00
joerg
a8a3c01339 Explicitly add pax dependency in those Makefiles that use it (or have
patches to add it). Drop pax from the default USE_TOOLS list.
Make bsdtar the default for those places that wanted gtar to extract
long links etc, as bsdtar can be built of the tree.
2008-05-25 21:42:20 +00:00
obache
e1120407b7 Require libgcrypt>=1.2.2. Noticed by Steve Bellovin in pkgsrc-users@.
And also require opencdk>=0.6.5.
2008-05-24 04:59:59 +00:00
tnn
dff5175c58 Remove textproc/p5-String-Random which was a duplicate of
security/p5-String-Random. Merge changes from the textproc one into
the security one.
2008-05-22 19:04:37 +00:00
tnn
1a4e5d5cb6 Update to gnutls-2.2.5.
* Version 2.2.5 (released 2008-05-19)
  Fix flaw in fix for GNUTLS-SA-2008-1-3.
* Version 2.2.4 (released 2008-05-19)
  Fix three security vulnerabilities.  [GNUTLS-SA-2008-1]
  [GNUTLS-SA-2008-1-1]
   libgnutls: Fix crash when sending invalid server name.
  [GNUTLS-SA-2008-1-2]
   libgnutls: Fix crash when sending repeated client hellos.
  [GNUTLS-SA-2008-1-3]
   libgnutls: Fix crash in cipher padding decoding for invalid record lengths.
* Version 2.2.3 (released 2008-05-06)
  Increase default handshake packet size limit to 48kb.
  Fix compilation error related to __FUNCTION__ on some systems.
  Documented the --priority option to gnutls-cli and gnutls-serv.
  Fix fopen file descriptor leak in PSK server code.
  Build Guile code with -fgnu89-inline only when supported.
  Make Camellia encryption work.
2008-05-22 13:18:52 +00:00
obache
3a3654baf5 Update gsasl to 0.2.26.
Based on patch provided by Eric Schnoebelen in PR 38692.
While here, marked as DESTDIR support.
Also fix CONFIGURE option for GSSAPI implement (I don't know from when).

* Version 0.2.26 (released 2008-05-05)

** Translations files not stored directly in git to avoid merge conflicts.
This allows us to avoid use of --no-location which makes the
translation teams happier.

** Build fixes for the documentation.

** Update gnulib files.

* Version 0.2.25 (released 2008-03-10)

** gsasl: Fix buffering issue to avoid mixing stdout/stderr outputs.
This would manifest itself when redirecting output to a pipe, such as
when used with Gnus.  Reported by Enrico Scholz
<enrico.scholz@informatik.tu-chemnitz.de>, see
<http://thread.gmane.org/gmane.comp.gnu.gsasl.general/123>.

** Fix non-portable use of brace expansion in makefiles.

* Version 0.2.24 (released 2008-01-15)

** Link self-tests with gnulib, to fix link failures under MinGW.

* Version 0.2.23 (released 2008-01-15)

** Improve CRAM-MD5 self-test to detect if challenges are the same.

** Improve gsasl --help and --version to conform with GNU standards.

** Use gettext 0.17.

** Update gnulib files.

* Version 0.2.22 (released 2007-10-08)

** Development git tree moved to savannah.
See <https://savannah.gnu.org/projects/gsasl/>.

** Fix warnings when building the tool 'gsasl'.

** Update gnulib files.
2008-05-21 15:22:56 +00:00
obache
1f8accbf4c Fix MAINTAINER address typo since initial import.
tech-pkg at jp.NetBSD.org => tech-pkg-ja at jp.NetBSD.org
2008-05-17 08:22:56 +00:00
drochner
0cb815d245 update to 1.7.3
changes:
-direct-tcpip support
-bug fixes

pkgsrc change: disable use of Python setuptools
	(gives unpredictable results)
2008-05-15 18:27:43 +00:00
wiz
a7abc37f1c Fix build on NetBSD-current with openssl-current, by adding a "const". 2008-05-15 11:06:05 +00:00
jwise
00cd99382b libhcrypto.la only seems to get installed if we're building on 3.x or older,
so make it only end up in the PLIST if that is the case.
2008-05-14 18:01:26 +00:00
taca
6c7222dc28 Update security/seudo pacakge to 1.6.p16.
Major changes since Sudo 1.6.9p15:

 o There was missing whitespace before the ldap libraries in the Makefile
   for some configurations.

 o LDAPS_PORT may not be defined on older Solaris LDAP SDKs.

 o If the LDAP server could not be contacted and the user was not present
   in sudoers, a syntax error in sudoers was incorrectly reported.
2008-05-14 14:00:15 +00:00
agc
650bfc74c8 Add and enable stegtunnel 2008-05-09 21:40:34 +00:00
agc
6596cdb087 Initial import of stegtunnel-0.4 into the packages collection.
Stegtunnel provides a covert channel in the IPID and sequence number
	fields of any desired TCP connection.  It requires the server and
	client to have a previously shared secret in common to detect and
	decrypt the data.
2008-05-09 21:39:17 +00:00
joerg
a235d3b925 Supports DESTDIR. 2008-05-08 18:59:38 +00:00
joerg
b9d9951b4c Supports DESTDIR 2008-05-08 18:32:19 +00:00
tonnerre
2f84995386 Fix build of OpenSSL on NetBSD/amd64 (4.0 and current tested) 2008-05-08 14:04:25 +00:00
jwise
6995e3bc58 Add missing library (libhcrypto) to PLIST, allowing sudo to build against
this heimdal on 3.x.

Bump PKGREVISION.
2008-05-05 02:26:03 +00:00
jlam
c98cfb0b82 Note addition of security/ruby-ezcrypto. 2008-05-01 21:10:19 +00:00
jlam
a353970006 Initial import of ruby18-ezcrypto-0.7 as security/ruby-ezcrypto.
EzCrypto is an easy-to-use wrapper around the poorly documented OpenSSL
Ruby library.  Features include:

    * Defaults to AES 128 CBC
    * Will use OpenSSL library for transparent hardware crypto support
    * Single-class object-oriented access to most commonly used features
    * Ruby-like syntax
2008-05-01 21:09:47 +00:00
jmmv
0d3662ee66 Drop maintainership
Stop lying and drop maintainership of these packages.  I have not
maintained them for a very long time already, so leave room for
fresh blood to take over them.
2008-04-30 13:38:14 +00:00
shannonjr
753cd7d5a3 Re: pkg/38549 (Support for DragonFly to security/pcsc-lite)
Synopsis: Support for DragonFly to security/pcsc-lite
Incorporated fix submitted by Hasso Tepper.
2008-04-30 13:34:28 +00:00
shannonjr
6c169bd86d Re: pkg/38550 (Support for DragonFly to security/ccid)
Synopsis: Support for DragonFly to security/ccid
Incorporated fix submitted by Hasso Tepper.
2008-04-30 13:32:21 +00:00
shannonjr
bc762658a7 Add patch to conditionally include <stdint.h> based on the symbol
HAVE_STDINT_H generated by configure. This is required for
compilation on Solaris 9.
2008-04-30 11:39:24 +00:00
wiz
d01506e74b Update to 1.4:
Version 1.4 (released 2008-04-21)
- Update gnulib files.
- Replace uses of alloca with malloc.
2008-04-29 11:45:55 +00:00
wiz
1cb31b9db7 Update to 1.4.1:
Noteworthy changes in version 1.4.1 (2008-04-25)
------------------------------------------------

 * Fixed a bug introduced by 1.3.1 which led to the comsumption of far
   too much entropy for the intial seeding.

 * Improved AES performance for CFB and CBC modes.

 * Removed build problems for the Padlock support.
2008-04-29 11:03:50 +00:00
bouyer
a02c5da190 Add py-smbpasswd 2008-04-28 22:05:05 +00:00
bouyer
31cf4566e4 py-smbpasswd version 1.0.1
This module can generate both LANMAN and NT password hashes, suitable for
use with Samba.
2008-04-28 22:03:53 +00:00
shannonjr
8e0349434d Update to 2.0.9. Changes:
* Enhanced gpg-connect-agent with a small scripting language.
* New option --list-config for gpgconf.
* Fixed a crash in gpgconf.
* The envvars XAUTHORITY and PINENTRY_USER_DATA are now passed to the
   pinentry.
 * Fixed the auto creation of the key stub for smartcards.
 * Fixed a rare bug in decryption using the OpenPGP card.
 * Creating DSA2 keys is now possible.
 * New option --extra-digest-algo for gpgsm to allow verification of
   broken signatures.
 * Allow encryption with legacy Elgamal sign+encrypt keys with option
   --rfc2440.
2008-04-28 14:54:27 +00:00
shannonjr
8f8197707f Re: pkg/38508 (gnupg2 won't build)
Builds without 'enable-maintainer-mode' being set
2008-04-28 14:21:27 +00:00
shannonjr
c786e8b6b2 Update to 0.9.14. Changes:
- Let the user choose the type of sorting (default to time descending,
  available: time asc/desc, count asc/desc).
- Implement Prewikka Asynchronous DNS resolution in alert view
  as well as message summary (require twisted.names and twisted.internet),
  see the additional dns_max_delay settings parameters in prewikka.conf.
- In the alert summary view, handle portlist and ip_version service fields,
  and show alert messageid.
- Fix exception when rendering ToolAlert.
- Fix double classification escaping (could result in non working link
  for alert with classification containing escaped character).
- Improvement to heartbeat retrieval (heartbeat view speedup).
- Correct typo (fix #275), thanks Scott Olihovki <skippylou@gmail.com>
  for pointing this out.
- Polish translation, by Konrad Kosmowski <konrad@kosmosik.net>.
- Update to pt_BR translation, by Edelberto Franco Silva <edeunix@edeunix.com>
- Various bug fixes and cleanup.
2008-04-28 10:59:42 +00:00
shannonjr
29d33b2356 Update to 0.9.12.2. Changes:
- [rulesets]: Remove successful/failure keyword from classification
  (use IDMEF completion). Analyzer class sanitization.
- [nagios] Handle Nagios V2 log entry (fix #283).
- [spamassassin] Fix incorrect AdditionalData assignement.
- New Suhosin ruleset, by Sebastien Tricaud <toady@inl.fr>
- Fix invalid logfile inconsistency alert that could be triggered
  in a rare case, after a renaming detection. Alert improvement.
- On logfile inconsistency alert, do not re-analyze the whole file.
- Remove the 1024 bytes per PCRE reference limit.
- Minor bug fixes, build system cleanup.
2008-04-28 10:54:08 +00:00
shannonjr
d53d7b9ff0 New patch required for 0.9.17 2008-04-28 10:52:40 +00:00
shannonjr
7634cc570d Update to 0.9.17. Changes:
- Implement RFC 4122 UUIDv1 identifier generation, more resistant to
  duplicate than our previous implementation in case of clock skew, or
  multiple client with the same analyzerid sending alert in parallel.
- You can now provide NULL value to idmef_path_set() in order to
  destroy existing value within an IDMEF message.
- Unify memory handling of value retrieval through idmef_path_t. This
  allow the user to retrieve and keep any values, even through the
  associated IDMEF message is freed.
- Build system cleanup, enable RELRO when possible.
- Implement PRELUDE_CLIENT_FLAGS_AUTOCONFIG, which is set by default,
  but that applications might unset in order for their client not to
  read the default profile/global configuration.
- Fix possible assertion when destroying un-started prelude-client.
- Improvement to the prelude-io API, the user might now hook its own
  handling function.
- Fix dumping of (not) NULL criteria operator to string. Remove
  gratuitous space insertion when dumping criteria.
- Headers fixes for C++ build.
- Fix printing and cloning of empty IDMEF string.
- In IDMEF to string convertion code, print <invalid enum value> in
  place of NULL on invalid enumeration value.
- Various bug fixes.
2008-04-28 10:51:49 +00:00
frueauf
8255221254 Set MAINTAINER to pkgsrc-users@NetBSD.org to indicate anyone can work on fixes for those packages. 2008-04-27 18:14:03 +00:00
tnn
351ceffa01 Update to OpenSSH 5.0p1.
Changes since 4.7:
- fix two security issues
- chroot support for sshd(8)
- sftp server internalized in sshd(8)
- assorted bug fixes
2008-04-27 00:34:27 +00:00
tnn
97822f1b10 Fix DEPENDS for Python 2.5. 2008-04-25 22:30:47 +00:00
tnn
29075003c4 Don't hardcode PYPKGPREFIX in bl3.mk 2008-04-25 22:16:20 +00:00
joerg
a77e7015fe Update PYTHON_VERSIONS_COMPATIBLE
- assume that Python 2.4 and 2.5 are compatible and allow checking for
fallout.
- remove PYTHON_VERSIONS_COMPATIBLE that are obsoleted by the 2.3+
default. Modify the others to deal with the removals.
2008-04-25 20:39:06 +00:00
jlam
9080934d3b Fix detection of openssl configuration directory on NetBSD so it's
/etc/openssl only if USE_BUILTIN.openssl is "yes".
2008-04-25 20:06:15 +00:00
smb
a24a1950a1 Fix function prototype mismatch 2008-04-25 15:16:31 +00:00
tnn
a18f03ef3a revbumps due to libevent update. 2008-04-22 18:06:09 +00:00
adam
18b56f1131 Changes 2.1.18:
This version includes compilers for Cisco PIX and IOS access lists which
were released under GPL.
2008-04-21 15:43:15 +00:00
jnemeth
ad43885514 sort 2008-04-20 02:48:38 +00:00
drochner
be979fabcc update to 2.22.1
This switches to the gnome-2.22 release branch.
2008-04-15 18:53:42 +00:00
wiz
8015905674 Update to 1.0:
Ignore temporary build files
make make install install stuff.
Bump NEWS.Debian.
Proposed solution for #462897: unconditionally sync keys between
normal gnupg home and caff gnupg home on startup, to cope with
changed keys.
2008-04-13 22:26:34 +00:00
schmonz
077f92a68f Update to 0.90. From the changelog:
- Added support for chaining modules within the version client library.
  To use this, specify the module string as a list of modules separated
  with commas. For example:

	cvm-command:/path/to/module,cvm-local:/path/to/socket

  This enhancement deprecates the cvm-chain module.

- Introduced an "out of scope" fact, to be used on credential rejection
  results when the supplied credentials are outside of the scope of
  authority of the module. The cvm-vmailmgr and cvm-qmail modules
  report this fact as appropriate, and cvm-chain copies it as
  appropriate from the modules it invokes.

- A random anti-spoofing tag is added to all version 2 client requests.
  Its length is set by $CVM_RANDOM_BYTES and defaults to 8.

- Fixed a bug that caused the domain output to be set incorrectly when
  doing qmail lookups with a domain not in the control files with
  $CVM_QMAIL_ASSUME_LOCAL set.
2008-04-13 06:51:19 +00:00
jlam
841dfa0e7a Convert to use PLIST_VARS instead of manually passing "@comment "
through PLIST_SUBST to the plist module.
2008-04-12 22:42:57 +00:00
wiz
5eb83dd9bc Remove non-standard qt4/lib/pkgconfig directory. Bump PKGREVISION. 2008-04-12 10:35:17 +00:00
jlam
ba8d4b3c72 Remove unnecessary PLIST_SUBST definition -- the PLIST is dynamic through
the use of AUTHLIB_PLIST, so we don't need to comment stuff out.
2008-04-10 20:56:33 +00:00
drochner
2a4296c275 update to 2.22.1
This switches to the gnome-2.22 release branch.
2008-04-10 16:53:44 +00:00
wiz
a865b2e1c4 Fix path in DEPENDS line. 2008-04-10 07:56:09 +00:00
taca
87c3f03083 Fix build problem with hpn-patch option enabled. 2008-04-08 06:36:47 +00:00
joerg
ced3928058 Fix installation. 2008-04-07 18:06:07 +00:00
joerg
37963f36a5 Fix DESTDIR. 2008-04-07 18:04:21 +00:00
joerg
a820e04656 Add missing directories. 2008-04-07 16:45:35 +00:00
markd
c3348303f2 also set KRB5_CONFIG in the case where using builtin but
/usr/bin/krb5-config exists.  Fixes build of imap-uw package with the
kerberos option on NetBSD-current and possibly other platforms.
2008-04-04 21:10:45 +00:00
jlam
6973294f00 Add and enable new ruby-* packages. 2008-04-04 15:33:05 +00:00
jlam
6488c3a1fb Initial import of ruby18-net-ssh-1.1.2 as security/ruby-net-ssh.
Net::SSH is to SSH as Net::Telnet is to Telnet and Net::HTTP is to
HTTP.  Perform non-interactive SSH processing, purely from Ruby!
2008-04-04 15:20:34 +00:00
jlam
5fa529a3b5 Initial import of ruby18-net-sftp-1.1.1 as security/ruby-net-sftp.
Net::SFTP is a pure-Ruby implementation of the SFTP client protocol.
2008-04-04 15:20:28 +00:00
tonnerre
2442cc7499 Fix two vulnerabilities in OpenSSH:
- X11 forwarding information disclosure (CVE-2008-1483)
 - ForceCommand bypass vulnerability
2008-04-03 07:59:08 +00:00
jlam
38a70df401 Don't hardcode "0 0" for the root user and group -- use ${REAL_ROOT_USER}
and ${REAL_ROOT_GROUP} instead.  The pkginstall framework checks for
the name of the user and group, not the uid and gid, when comparing
permissions.  This fixes the following spurious warning from appearing:

    The following files are used by sudo-1.6.9p15 and have
    the wrong ownership and/or permissions:

            /usr/pkg/etc/sudoers (m=0440, o=0, g=0)
2008-04-02 15:06:07 +00:00
taca
e07592e07d Update sudo package to 1.6.9p15.
653) Fixed installation of sudo_noexec.so on AIX.

654) Updated libtool to version 1.5.26.

655) Fixed printing of default SELinux role and type in -V mode.

656) The HOME environment variable is once again preserved by default,
     as per the documentation.
2008-03-29 14:16:58 +00:00