Commit graph

2078 commits

Author SHA1 Message Date
agc
d9c1f58592 Master site has moved to sourceforge. 2004-01-22 10:11:49 +00:00
agc
d731127ea2 Update portsentry from 1.0 to 1.2.
Major changes from previous version:

	Master site has moved to sourceforge
	Licence has changed to a GPL-like licence

Minor changes from previous version:
12-21-1999 - 1.1 Fixed typo in bare-bones TCP list where 524 was supposed to be for 1524.
03-31-2000 - 1.1 Updated .conf to add ipf blocking rule. Thanks Graham Dunn
<gdunn@inscriber.com>
06-08-2000 - 1.1 Fixed an error in the state engine portion that could cause an increment error
under certain conditions. Thanks Peter M. Allan <peter.m.allan@hsbcgroup.com> for finding this.
6-21-2000 - 1.1 New Features added
                - Added in feature to disable DNS host resolution by checking RESOLVE_HOST in
                conf file.
                - Added in feature to have external command run before or after blocking has
                occurred as defined in KILL_RUN_CMD_FIRST option in conf file.
                - Removed DoBlockTCP/UDP functions. Converted over to generic flag checker.
7-5-2000 - 1.1
                - Added iptables support (thanks Scott Catterton <scatterton@valinux.com>)
                - Added Makefile support for Irix
                - Put in ports for common DDOS ports
9-8-2000 - 1.1  - Added in netmask support
9-9-2000 - 1.1  - Finally moved resolver functions to own area.
                - Made CleanAndResolve to ensure DNS records returned are sanitized
                  correctly before being passed back.
3-23-2001 - 1.1 - Fixed a bug that showed up under Linux 2.4 Kernel that would cause accept
to loop. There was an error with how I used a count variable after trying to bind to ports.
If the port didn't bind the count for the openSockfd would still increment and this caused
the error to show up.
6-26-2001 - 1.1 - Added Mac OS X build support (Same as FreeBSD). Fixed bug for Advanced mode
to properly monitor 1024 ports (it only did first 1023 before). Thanks Guido.
05-23-2003 - 1.2 - Removed references to old psionic e-mail and changed license to
Common Public License.

I've also added a fix for a multi-line string constant for gcc3.
2004-01-22 10:08:19 +00:00
jlam
3601a7551c Recognize KERBEROS as a flag that can cause this package to be built using
Kerberos for GSSAPI support.
2004-01-21 14:01:06 +00:00
jlam
998ffbfea9 Convert to use krb5.buildlink3.mk to get Kerberos 5 support. Tested to
build and install properly using Heimdal.
2004-01-21 12:40:17 +00:00
jlam
9351de8505 Remove debugging line accidentally committed in previous. 2004-01-21 12:14:57 +00:00
jlam
b5b7b84c22 Convert to use krb5.buildlink3.mk to get Kerberos 5 support. Tested to
build and install properly using Heimdal.
2004-01-21 12:12:13 +00:00
jlam
0167c3791f Only point SSLCERTS into ${PKG_SYSCONFDIR} if we're not using the built-in
OpenSSL software.  Otherwise, set it to /etc/ssl/certs, which is where a
lot of Linux distros store certs.  The behaviour on NetBSD systems is
unchanged -- always set to /etc/openssl/certs.  Fixes PR 24161.
2004-01-21 10:03:41 +00:00
lukem
4152ee431a crank version for my mods 2004-01-21 04:15:09 +00:00
lukem
6d77a64959 "Collapse" mutual trust into a single line of a different color.
If an optional "mykeyid" is given on the command line, use different
colors for lines to & from that node.  The colors are:
	green		mutual trust, includes mykey
	blue		mutual trust, not mykey
	orange		someone trusts mykey (one way)
	red		mykey trusts someone (one way)
	black		one way trust, not mykey
2004-01-21 04:14:45 +00:00
atatat
39ecc311a5 This simple perl script takes the output of gpg --list-keys --verbose,
which lists all the keys in your public key ring, along with all
their signatures, and converts it to a di-graph in "dot" language
form.

The graphviz package can turn the description into a graph you can
look at to see who has signed whose key, or how far it is from your
key to someone in Reykjavik, etc.
2004-01-21 04:04:55 +00:00
snj
e0220ad330 s/it's/its/ 2004-01-20 22:15:21 +00:00
snj
324a2e6bfe Add lsh (hi drochner!). Okayed by jmmv. 2004-01-20 21:26:13 +00:00
agc
3ad1bdbf06 Move WRKSRC definition away from the first paragraph in a Makefile. 2004-01-20 12:18:15 +00:00
grant
35e1a08546 put the stunnel.pid file in /var/run, not ${PREFIX}/var/run.
bump PKGREVISION.
2004-01-20 03:08:25 +00:00
jlam
a442099d05 This package never invokes the toolchain so it doesn't need buildlink[23].
Define NO_BUILDLINK to signify this to bsd.pkg.mk.
2004-01-19 15:15:08 +00:00
jlam
a6d5f1ebaf Update MASTER_SITES and HOMEPAGE to current locations. 2004-01-17 15:31:02 +00:00
itojun
8fe68eb74f bump to 20040116a. missing ntohs() in info exchange fix. 2004-01-16 02:29:49 +00:00
cube
796b5386cc No patches are needed for that package, except for -current between Sept.,
16th 2003 and Jan., 6th 2004 when <sys/siginfo.h> included <sys/queue.h>
unconditionally.

Rework the patches so that they're used only in that case.
2004-01-15 14:10:51 +00:00
jlam
83532f92f6 Support a new yes/no variable "KERBEROS_PREFIX_CMDS" that can be used by
Kerberos implementation packages to decide whether to prefix certain
commands with a "k" to differentiate it from system tools with similar
names.  KERBEROS_PREFIX_CMDS defaults to "no".
2004-01-15 12:48:00 +00:00
grant
c1ba386ea1 kth-krb4: add CONFLICT on tnftp.
tnftp: add CONFLICT on lukemftp, kth-krb4.
2004-01-15 10:35:49 +00:00
itojun
cb805a8461 upgrade to 2004/1/14 tar.gz. fixes hash validation problem posted to bugtraq. 2004-01-14 09:22:22 +00:00
jlam
5389a1c2c7 This package should try to build samba2 if it needs a samba package
installed.
2004-01-13 20:45:50 +00:00
jlam
2569632971 Bump the version of security/cyrus-saslauthd to 2.1.17nb1: install the
saslcache and testsaslauthd programs that are useful to test and debug
the setup of saslauthd.
2004-01-13 09:03:15 +00:00
jlam
29903eb0aa Move the documentation into share/doc instead of using share/examples. 2004-01-13 08:13:42 +00:00
markd
f8c2eb7eb1 Fix build with gcc3. 2004-01-13 02:05:29 +00:00
jlam
18ec955c8a whitespace. 2004-01-13 00:00:32 +00:00
xtraeme
b4fbdeca7f Update to 1.0.4
Version 1.0.4 (04/01/2004)

- Changed handshake behaviour to send the lowest TLS version
  when an unsupported version was advertized. The current behaviour
  is to send the maximum version we support.
- certtool no longer asks the password in unencrypted private
  keys.
- The source is now compiled to use the reentrant libc functions.
2004-01-12 22:57:38 +00:00
jlam
3685c7774b bl3ify 2004-01-12 15:59:35 +00:00
drochner
94d670332b add a pkg for lsh-1.4.3, an alternative ssh2 client/server 2004-01-12 15:55:11 +00:00
cjep
1b39677b6e Remove unnecessary blank lines. 2004-01-12 09:46:04 +00:00
martti
a73e004fa9 Use correct Makefile.common 2004-01-12 07:59:28 +00:00
martti
6c1f64b114 Use correct Makefile.common 2004-01-12 07:31:52 +00:00
jlam
0ac69be3ed Note conflict with samba>=3.0, which installs its own pam-smbpass. 2004-01-12 04:56:35 +00:00
jlam
63d79814ef Note location of pidfile. 2004-01-12 04:52:34 +00:00
jlam
c4dd17d8b7 Update security/PAM to 0.77nb1:
Actually make this package honor PKG_SYSCONFDIR.  This package now looks
for /usr/pkg/etc/pam.conf if PKG_SYSCONFBASE != "/etc".
2004-01-12 04:31:09 +00:00
jlam
a542b62c6b Substitute for ROOT_USER in the rc.d script. 2004-01-12 04:12:58 +00:00
jlam
bf65a51eb8 Add MAINTAINER, HOMEPAGE, COMMENT. 2004-01-12 03:16:32 +00:00
jschauma
52d6dbeeaa Update to version 0.12, include new homepage and thusly fix problem seen
in agc's last bulk build.

Changes since 0.11:
- ZServerSSL with client certificate-based authentication rides again.
- Created Makefile for Python 2.3.
- Modified LICENCE: changed my name to the generic "the author" in the
all-caps disclaimer paragraph.
- Allow to save RSA key pair in the clear.
- ZServerSSL for Zope 2.7.
- Excluded RC5. IDEA was taken out several releases ago. This should
allow M2Crypto to build with stock OpenSSL on various Linuxen.
- Added ssl_set_tmp_dh_callback.
- Added ssl_set_tmp_rsa and ssl_set_tmp_rsa_callback to support weak-cipher
browsers.
- ZServerSSL exports SSL_CIPHER request header (a la mod_ssl) to Zope applications.
- Perform distutils's SWIG .i search path tweaking within setup.py. setup.py
should now work "out of the box".
- Allow using a passphrase callback in class SMIME. Thanks to Artur Frysiak
<wiget@pld-linux.org> for the patch.
- Added method get0_signers to class PKCS7, which retrieves signers' certificates
from a PKCS7 blob. Thanks again to Artur Frysiak.
- Added contrib/smimeplus.py, a high-level S/MIME interface, contributed by Bernard
Yue <bernie@3captus.com>. Thanks Bernard.
- Alias 'emailAddress' to 'Email' in X509.X509_Name.nid to support recent OpenSSL
convention.
2004-01-11 19:06:46 +00:00
jlam
0e60357705 Fix printing of daemon name if rc.subr isn't there. 2004-01-11 00:38:17 +00:00
jlam
489bc96215 bl3ify 2004-01-11 00:33:03 +00:00
xtraeme
012b8a7d98 s/bonobo-activation/libbonobo/ 2004-01-11 00:32:34 +00:00
jlam
a41e499e44 Note CONFLICT with forthcoming mit-krb5 package. 2004-01-11 00:00:28 +00:00
jlam
99ac5d408b Add a rc.d script to start the kdc daemon on the Kerberos master server. 2004-01-10 21:59:29 +00:00
jlam
c0a16733a6 Back out previous. This doesn't work as expected and needs more thought. 2004-01-10 21:35:26 +00:00
jlam
ca86c17d51 The buildlink3 wrappers automatically remove -I/usr/include/* from the
command line options.  We need -I/usr/include/krb5 to build against
heimdal, so symlink the headers in /usr/include/krb5 into ${BUILDLINK_DIR}
so they can be found.
2004-01-10 19:44:16 +00:00
jlam
3f2f920bfb Add and enable heimdal. 2004-01-10 14:57:21 +00:00
jlam
694ff19aff Initial import of heimdal-0.6 into security/heimdal.
Heimdal is a free implementation of Kerberos 5.

Kerberos is a system for authenticating users and services on a network.
It is built upon the assumption that the network is "unsafe".  Kerberos
is a trusted third-party service.  That means that there is a third
party (the Kerberos server) that is trusted by all the entities on the
network (users and services, usually called "principals").  All
principals share a secret password (or key) with the Kerberos server and
this enables principals to verify that the messages from the Kerberos
server are authentic.  Thus trusting the Kerberos server, users and
services can authenticate each other.
2004-01-10 14:56:44 +00:00
jlam
682212d643 Remove files listed in PLIST.ldap. 2004-01-10 01:27:00 +00:00
jlam
fe51e56c62 Don't install the LDAP_SASLAUTHD documentation file unless we are building
with support for LDAP.
2004-01-09 20:40:05 +00:00
jlam
7fa7bb10c3 Remove references to saslauthd from this package. 2004-01-09 20:35:03 +00:00