Commit graph

2078 commits

Author SHA1 Message Date
grant
63054249c7 set LD=CC again for all platforms with an appropriate comment - I
don't know why this didn't originally work as it should, but I've
just tested it with gcc3 and Forte 8 on Solaris and I couldn't make
it fail.

fixes coredump problem on Solaris observed by some, and also
PR pkg/23120 from Alex Gerasimoff.

bump PKGREVISION to differentiate between broken and unbroken
package.
2003-10-12 10:13:53 +00:00
grant
2f7d54398d add a missing .elif OPSYS == NetBSD, which was resulting in passing
"--with-skey=... --without-skey" on Solaris :)
2003-10-12 08:25:17 +00:00
grant
68fd50e391 bump PKGREVISIONs after bump of expat BUILDLINK_DEPENDS. 2003-10-11 13:40:19 +00:00
grant
d554d28831 comment block which uses non-existant variable (because we don't need
the supplied db2).

fixes PR pkg/22912 from Jonathan Perkin.
2003-10-11 12:06:04 +00:00
grant
a45a75c721 require GNU sed for GNU sed specific expressions.
fixes PR pkg/21493.
2003-10-11 07:18:50 +00:00
agc
d1cf13dbac Update to isakmpd version 20030903.
No changelog available, but many bugs fixed, and these sources will
compile with gcc-3.3.1 (well, after I tweaked them).  With thanks to
Christoph Badura for most of this work, I merely did the gcc-3.3.1
patching.
2003-10-10 12:56:18 +00:00
cube
28cb362dd2 Bump PKGREVISION since libnids update. 2003-10-10 09:18:11 +00:00
cube
22a1e439c6 Buildlinkify and remove hard-coded dependency on libnids-1.14. 2003-10-10 08:54:26 +00:00
reed
a20d31972d Improve message (because on some systems it is okay to install to the
PAM directory too).
2003-10-08 18:54:42 +00:00
rtr
773c32d99b Use pkgsrc defined version of install path, fixes install on SunOS.
From Jonathan Perkin <jonathan@perkin.org.uk> pr pkg/22911
2003-10-07 13:49:58 +00:00
christos
c3637c54ff Bump revision. 2003-10-06 16:48:04 +00:00
christos
6948e59140 regen 2003-10-06 16:31:18 +00:00
christos
716d8ae309 Fix uninitialized variable that caused core-dumps. 2003-10-06 16:31:07 +00:00
jlam
083b97acdf Only create one directory per invocation of install(1), and run the Crack
script with ${SH} instead of /bin/sh since some OSes have dumb /bin/sh,
e.g. Solaris.  From pkg/22914 by Jonathan Perkin.
2003-10-06 08:19:45 +00:00
jlam
d151742e36 Sniff needs to depend on the libpcap package on non-NetBSD systems, so
convert to use buildlink2 and include libpcap/buildlink2.mk to handle this
correctly.  Also fix network library problems on Solaris.  From pkg/22915
by Jonathan Perkin.
2003-10-06 07:53:04 +00:00
chris
ace63ac599 Add BUILD_DEFS line for USE_PAM and SASL_USE_GSSAPI. 2003-10-05 21:52:57 +00:00
recht
2e54ee29df 1) Solaris (and others) require libpcap from pkgsrc. Use buildlink2
2) Fix the SunOS makefile, which isn't complete.  Tidy up while here.
3) Re-order COMMENT/HOMEPAGE to appease pkglint.

provided by Jonathan Perkin in PR 22916.
2003-10-05 18:13:00 +00:00
reed
b2fcfff89a Add support for BSD/OS. 2003-10-04 07:54:52 +00:00
seb
a7ca42bc59 Some xargs (Hi Sun) run the command even when stdin is "empty". Compare
'echo | xargs echo' on NetBSD and Solaris...

Workaround this in post-extract target's 'rm' by adding a '-f' argument
to it.

XXX Current upstream tarball does not have .orig files, I could have
removed this post-extract target...
2003-10-03 12:56:48 +00:00
gavan
f4064a6a53 Work around non-termination of the build when using Solaris sed. 2003-10-02 09:50:26 +00:00
martti
24d78764ac Added support for FreeBSD 2003-10-02 07:13:27 +00:00
jschauma
83ca290393 Update to 0.9.6k:
Changes between 0.9.6j and 0.9.6k  [30 Sep 2003]

  *) Fix various bugs revealed by running the NISCC test suite:

     Stop out of bounds reads in the ASN1 code when presented with
     invalid tags (CAN-2003-0543 and CAN-2003-0544).

     If verify callback ignores invalid public key errors don't try to check
     certificate signature with the NULL public key.

     [Steve Henson]

  *) In ssl3_accept() (ssl/s3_srvr.c) only accept a client certificate
     if the server requested one: as stated in TLS 1.0 and SSL 3.0
     specifications.
     [Steve Henson]

  *) In ssl3_get_client_hello() (ssl/s3_srvr.c), tolerate additional
     extra data after the compression methods not only for TLS 1.0
     but also for SSL 3.0 (as required by the specification).
     [Bodo Moeller; problem pointed out by Matthias Loepfe]

  *) Change X509_certificate_type() to mark the key as exported/exportable
     when it's 512 *bits* long, not 512 bytes.
     [Richard Levitte]

 Changes between 0.9.6i and 0.9.6j  [10 Apr 2003]

  *) Countermeasure against the Klima-Pokorny-Rosa extension of
     Bleichbacher's attack on PKCS #1 v1.5 padding: treat
     a protocol version number mismatch like a decryption error
     in ssl3_get_client_key_exchange (ssl/s3_srvr.c).
     [Bodo Moeller]

  *) Turn on RSA blinding by default in the default implementation
     to avoid a timing attack. Applications that don't want it can call
     RSA_blinding_off() or use the new flag RSA_FLAG_NO_BLINDING.
     They would be ill-advised to do so in most cases.
     [Ben Laurie, Steve Henson, Geoff Thorpe, Bodo Moeller]

  *) Change RSA blinding code so that it works when the PRNG is not
     seeded (in this case, the secret RSA exponent is abused as
     an unpredictable seed -- if it is not unpredictable, there
     is no point in blinding anyway).  Make RSA blinding thread-safe
     by remembering the creator's thread ID in rsa->blinding and
     having all other threads use local one-time blinding factors
     (this requires more computation than sharing rsa->blinding, but
     avoids excessive locking; and if an RSA object is not shared
     between threads, blinding will still be very fast).
     [Bodo Moeller]

 Changes between 0.9.6h and 0.9.6i  [19 Feb 2003]

  *) In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked
     via timing by performing a MAC computation even if incorrrect
     block cipher padding has been found.  This is a countermeasure
     against active attacks where the attacker has to distinguish
     between bad padding and a MAC verification error. (CAN-2003-0078)

     [Bodo Moeller; problem pointed out by Brice Canvel (EPFL),
     Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and
     Martin Vuagnoux (EPFL, Ilion)]

 Changes between 0.9.6g and 0.9.6h  [5 Dec 2002]

  *) New function OPENSSL_cleanse(), which is used to cleanse a section of
     memory from it's contents.  This is done with a counter that will
     place alternating values in each byte.  This can be used to solve
     two issues: 1) the removal of calls to memset() by highly optimizing
     compilers, and 2) cleansing with other values than 0, since those can
     be read through on certain media, for example a swap space on disk.
     [Geoff Thorpe]

  *) Bugfix: client side session caching did not work with external caching,
     because the session->cipher setting was not restored when reloading
     from the external cache. This problem was masked, when
     SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG (part of SSL_OP_ALL) was set.
     (Found by Steve Haslam <steve@araqnid.ddts.net>.)
     [Lutz Jaenicke]

  *) Fix client_certificate (ssl/s2_clnt.c): The permissible total
     length of the REQUEST-CERTIFICATE message is 18 .. 34, not 17 .. 33.
     [Zeev Lieber <zeev-l@yahoo.com>]

  *) Undo an undocumented change introduced in 0.9.6e which caused
     repeated calls to OpenSSL_add_all_ciphers() and
     OpenSSL_add_all_digests() to be ignored, even after calling
     EVP_cleanup().
     [Richard Levitte]

  *) Change the default configuration reader to deal with last line not
     being properly terminated.
     [Richard Levitte]

  *) Change X509_NAME_cmp() so it applies the special rules on handling
     DN values that are of type PrintableString, as well as RDNs of type
     emailAddress where the value has the type ia5String.
     [stefank@valicert.com via Richard Levitte]

  *) Add a SSL_SESS_CACHE_NO_INTERNAL_STORE flag to take over half
     the job SSL_SESS_CACHE_NO_INTERNAL_LOOKUP was inconsistently
     doing, define a new flag (SSL_SESS_CACHE_NO_INTERNAL) to be
     the bitwise-OR of the two for use by the majority of applications
     wanting this behaviour, and update the docs. The documented
     behaviour and actual behaviour were inconsistent and had been
     changing anyway, so this is more a bug-fix than a behavioural
     change.
     [Geoff Thorpe, diagnosed by Nadav Har'El]

  *) Don't impose a 16-byte length minimum on session IDs in ssl/s3_clnt.c
     (the SSL 3.0 and TLS 1.0 specifications allow any length up to 32 bytes).
     [Bodo Moeller]

  *) Fix initialization code race conditions in
        SSLv23_method(),  SSLv23_client_method(),   SSLv23_server_method(),
        SSLv2_method(),   SSLv2_client_method(),    SSLv2_server_method(),
        SSLv3_method(),   SSLv3_client_method(),    SSLv3_server_method(),
        TLSv1_method(),   TLSv1_client_method(),    TLSv1_server_method(),
        ssl2_get_cipher_by_char(),
        ssl3_get_cipher_by_char().
     [Patrick McCormick <patrick@tellme.com>, Bodo Moeller]

  *) Reorder cleanup sequence in SSL_CTX_free(): only remove the ex_data after
     the cached sessions are flushed, as the remove_cb() might use ex_data
     contents. Bug found by Sam Varshavchik <mrsam@courier-mta.com>
     (see [openssl.org #212]).
     [Geoff Thorpe, Lutz Jaenicke]

  *) Fix typo in OBJ_txt2obj which incorrectly passed the content
     length, instead of the encoding length to d2i_ASN1_OBJECT.
     [Steve Henson]
2003-10-02 02:34:39 +00:00
itojun
ee7b218482 dig DIST_SUBDIR so that we can build newer version without removing
pkgsrc/distrib/p0f.tgz manually
2003-10-01 23:43:16 +00:00
recht
64f360938e Update to 2.0.2
patch provided in PR 22939 by Adrian Portelli

Version 2.0.2:
--------------
Cleanup of the RST mess in p0fr.fp and p0f.c parser.

Added isprint() text preview for -x mode.

[BUG] Fixed packet size reporting and matching for packets over 255 bytes
(_u8 -> _u16).

Extended RST+ACK to also cover plain RST, added some sane explanations
of the purpose of each mode. Clarification of the RST vs RST+ACK
occurences; test/sendack.c added.

Added -R option for RST+ACK fingerprinting. Created an empty database.
Moved databases from /etc to /etc/p0f/

Windows memory leak mystery solved.

No longer using pcap timeouts for anything. They suck. I first wanted
to use SIGALRM with no SA_RESTART, but it's broken on Linux on this
particular syscall. Fortunately, I spotted an mis-documented  pcap_fileno and can now use select(). I just hope it won't break.

Note to self: despite of the documentation saying pcap_open_live with
timeout 0 will simply never timeout (which is irrelevant for
pcap_loop anyway), it does not work on FreeBSD, inhibiting all packet
processing instead. Works fine on Linux. Go figure.

Some minor p0fq fixes to prevent warnings.

Added some SYN+ACK signatures from rfp (p0fa.fp). Hooray!
p0fa.fp is now official. Moved from test/ to ., etc. README updated.

[BUG] Fixed the default TTL for IRIX and Tru64 (60), added a note to
p0f.fp, fixed TTL checker to also support %30 values.

[BUG] Fixed query mode lookup. The old code didn't handle reverse
lookups properly.

Masquerade scoring data is now available via the query interface.
P0fq utility updated to handle this.

Dropped /bin/bash from p0frep, /bin/sh would suffice.

Added a new -c option for -M and -Q cache size scaling, packet ratio
information on Ctrl-C to help estimate the right parameter.

Extra masquerade detection flags: -T for threshold, -V for detailed
flag breakdown; masquerade reporting now recognizes -r.

The new -w option writes all matching packets to a pcap file (regardless
of -K and -U settings).

Added -M option (unix only until p0f-query.c gets ported). This option
enables advanced masquerade detection based on the cyclic buffer
used by -Q. Added - signature flag to the config file. Some
documentation for the new functionality.

[BUG] Cleaned up the -K and -U semantics with -Q.

Replaced some single-character printfs with putchars in signature
reporting code (should be a tad faster). Added signature check
reporting, generic signature count and some other minor tweaks.

The new -x option provides a hexadecimal TCP/IP packet dump. Useful
when comparing two colliding fingerprints to find some differences
not covered by the current quirks set.

PPPoE interface is now handled correctly on NetBSD.

Added a shoddy manpage and updated makefiles.

Removed E quirk and added E to the regular options; removed needless EOL
append code from the parser. Breaks the old signature format in some
rare cases, but the old quirk is still recognized, and the user will be
advised to change it.

[BUG] Fixed ? option parsing bug that prevented RISC OS signature from
working (and would prevent all ? signatures from working, should there
be any other ;-).

New signatures and other database additions, of course.

[BUG] Fixed a very minor parser bug that could cause it to loop over
an unknown option with a declared length of zero. This is not a DoS
condition, because the parser would quit the loop after parsing max. 16
options anyway.
2003-10-01 23:13:13 +00:00
mycroft
5ebe510ed0 Trivial fix for GCC3. 2003-09-29 23:31:49 +00:00
jschauma
5bc408943d On non-SunOS, bring back
LD=${CC}
2003-09-23 20:53:52 +00:00
jschauma
91cad7d231 This version of OpenSSH doesn't need special flags for Irix anymore. 2003-09-23 19:33:14 +00:00
jschauma
d22e217b00 Update to 3.7.1p2:
Most important chcanges: security relevant bug fixes in new PAM authentication code

Changes since OpenSSH 3.7.1p1:
==============================

* This release disables PAM by default. To enable it, set "UsePAM yes" in
  sshd_config. Due to complexity, inconsistencies in the specification and
  differences between vendors' PAM implementations we recommend that PAM
  be left disabled in sshd_config unless there is a need for its use.
  Sites using only public key or simple password authentication usually
  have little need to enable PAM support.

* This release now requires zlib 1.1.4 to build correctly. Previous
  versions have security problems.

* Fix compilation for versions of OpenSSL before 0.9.6. Some cipher modes
  are not supported for older OpenSSL versions.

* Fix compilation problems on systems with a missing or lacking inet_ntoa()
  function.

* Workaround problems related to unimplemented or broken setresuid/setreuid
  functions on several platforms.

* Fix compilation on older OpenBSD systems.

* Fix handling of password-less authentication (PermitEmptyPasswords=yes)
  that has not worked since the 3.7p1 release.
2003-09-23 17:52:33 +00:00
jmmv
09086b9799 This needs libpcap. Do not bump revision since the package does not change
where it already built fine.  From Jonathan Perkin in PR pkg/22913.
2003-09-23 13:15:17 +00:00
grant
0f0b2f9840 style nits 2003-09-22 03:15:33 +00:00
grant
7be5254f17 formatting nits 2003-09-22 03:13:58 +00:00
grant
4f44662287 as this pkg now calls the linker directly, we need to explicitly
specify -lc on Solaris.

remove a bogus hack setting LD=${CC} which was also breaking the
build on Solaris.
2003-09-22 01:18:38 +00:00
grant
16dbb5f911 run ranlib over libskey.a in post-install, to appease Darwin's linker 2003-09-22 00:56:48 +00:00
jmc
51812310e9 Add USE_BUILDLINK2 so this picks up a proper depend 2003-09-21 09:39:21 +00:00
jmc
a1955f66e2 Hand generate the first part of this patch to avoid an RCS expansion on
checkouts
2003-09-21 09:03:37 +00:00
jmc
0dad2927b3 Comment out setenv.c for NetBSD. System library has working copies and
unsetenv conflicts anyways.
2003-09-21 08:54:00 +00:00
jmc
b10fb83eb5 Comment out setenv.c for NetBSD. System library has working copies and
unsetenv conflicts anyways.
2003-09-21 08:53:35 +00:00
jmc
207ce032a0 Check openssl version and use new DES api if >= 0.9.7. Allows build to
work on -current again. Bump PKGREVISION
2003-09-21 08:35:51 +00:00
jmc
b74f6c1605 Bump PKGREVISION as DES patches allow this to work on -current again 2003-09-21 08:02:59 +00:00
jmc
79d0da89fe Add some patches so if using openssl >= 0.9.7 the new des API is used 2003-09-21 08:02:21 +00:00
agc
781a0fe476 Mark tripwire as being only for NetBSD and Solaris right now.
The Darwin compile time configuration is easy to write, but I don't have a
Darwin box handy, and so the tw.conf.darwin is a bit difficult to write as
there tend to be a few non-standard paths.

In response to PR 22362.
2003-09-19 13:26:12 +00:00
wiz
833162b90d Remove patch-a{a,b,c,d} -- I wonder where they are :) 2003-09-19 13:18:30 +00:00
hubertf
0149e16994 fix HOMEPAGE 2003-09-19 02:02:07 +00:00
jmc
1e1df89533 Needs USE_BUILDLINK2 to get dependency on python correctly 2003-09-18 04:17:12 +00:00
jmc
79d29b68a5 Make this work with 0.9.7 openssl (and other non-pkgsrc installed nbsd versions 2003-09-18 04:09:17 +00:00
jschauma
97b01bddae Ok, so we can make this work on Irix by adding
-DSETEUID_BREAKS_SETUID -DBROKEN_SETREUID -DBROKEN_SETREGID
to the CFLAGS.  Wuppi.
2003-09-18 02:11:38 +00:00
grant
40614d0b3c get rid of USE_GCC2/3 in pkg Makefiles, and set GCC_REQD or
USE_PKGSRC_GCC as appropriate, as this is handled by compiler.mk now.
2003-09-17 19:39:58 +00:00
jschauma
7c1fd4eb84 Mark OpenSSH-3.7x as *not available for IRIX*!
# OpenSSH 3.7x currently does *not* work on IRIX!
# To compile, we would need to remove the extraneous inclusion of the
# ``inet_ntoa.h'' header in openbsd-compat/inet_ntoa.c, but even though
# sshd will not work:  It seems the connection is closed by the daemon
# when it tries to spawn off a child to handle the incoming connection
#
# If you need the latest security patches for your openssh, I'm afraid you'll
# have to apply them by hand to the 3.6.1p2 version.

(Now wouldn't it be nice if we had a NOT_FOR_PLATFORM_REASON that is displayed
automatically?)
2003-09-17 16:42:01 +00:00
jwise
a5096f14e8 Update for _new_ new OpenSSH patch, bump pkgrevision.
``Oops, they did it again.''
2003-09-17 14:27:03 +00:00
grant
3783c766e5 move ftp.openssh.com to the top, as it's the only site which has the
new distfile so far.
2003-09-16 23:06:22 +00:00
grant
af8cc1bb0f Update openssh to 3.7.1p1.
Changes since 3.7p1:

more malloc/fatal fixes; ok millert/deraadt; ghudson at MIT.EDU
2003-09-16 23:05:33 +00:00
jwise
3f8ae3a319 Apply security patch for OpenSSH-3.6.1p2 recently released by openssh team.
PKGREVISION bump, and BROKEN= removed.

While there, fix Solaris short pkg name.
2003-09-16 18:15:26 +00:00
grant
3222b9705d missed a pkg-vulnerabilities filename 2003-09-16 14:50:47 +00:00
grant
8701611d07 netbsd.org -> NetBSD.org. 2003-09-16 14:47:49 +00:00
grant
651a74f47a correct name of pkg-vulnerabilities file; netbsd.org -> NetBSD.org;
add missing word; bump date.
2003-09-16 14:46:52 +00:00
grant
6152558d3d ftp.netbsd.org -> ftp.NetBSD.org 2003-09-16 14:33:01 +00:00
jwise
69576d038a Mark this package as broken until an updated version of the openssh+gssapi
patch is available, as OpenSSH-3.6.1p2 contains another buffer overflow.
2003-09-16 14:05:47 +00:00
grant
aaa76f9d3a Update openssh to 3.7p1.
Large number of changes since 3.6.1p2, the most pertinent being:

* do not expand buffer before attempting to reallocate it (buffer.c)

note that NetBSD-current already includes this fix.

other changes include:

* portability fixes
* regression test fixes
* add GSSAPI support and remove kerberos support from ssh1, retaining
  kerberos passwd auth for ssh1 and 2
* man page fixes
* general bug fixes

see the ChangeLog for full details.
2003-09-16 13:52:30 +00:00
agc
4842dd4749 Update audit-packages to 1.23.
Use the first word of ${FETCH_CMD} to determine which utility is used.

Addresses PR 22760 from Todd Vierling.
2003-09-16 09:06:03 +00:00
agc
1cbfd70c0e Update audit-packages to 1.22:
Make an informational message clearer.
2003-09-16 07:21:01 +00:00
recht
e914ab3288 hange extension.mk to also install optimized files for distutils packages.
Inspired by FreeBSD "ports".

Fix the PLISTs accordingly.
Also, while at it, remove now obsolete compileall.py calls in post-install
targets and insure that extension.mk is in included before builinlinks of
other Python modules.

Discussed with/ok'ed by drochner@.
2003-09-14 16:43:45 +00:00
jlam
18d4961b21 Use SHLIBTOOL to install the plugins since we used it to build them. 2003-09-13 19:18:16 +00:00
jlam
48099e406a * Use LIBTOOL_OVERRIDE instead of LTCONFIG_OVERRIDE.
* Use ${SHLIBTOOL} to build the shared plugins so we don't get the useless
  lib<plugin>.a file.
2003-09-13 19:08:50 +00:00
jlam
7ea4564bab Updated security/p5-IO-Socket-SSL to 0.95. Changes version version 0.93
include:

        - Better opened() behavior when sockets close unexpectedly.
        - Added support for WeakRef and Scalar::Util to allow
          IO::Socket::SSL objects to auto-destroy themselves when
          they go out of scope.
        - Added croak()ing for unimplemented send() and recv() methods
          so they are not accidentally used to transmit unencrypted
          data.  The Perl builtin functions cannot be reliably trapped
          and are still dangerous, a fact that the POD now reflects
        - Changed accept() to use inherited accept() instead of
          IO::Socket::accept, so that IPv6 inheritance is possible.
        - Added options to import() so that a user could specify
          IPv6 or IPv4 mode of operation.
2003-09-13 12:24:08 +00:00
jlam
e3ece173c9 Update security/p5-Net-SSLeay to 1.25. Changes from version 1.23 include:
- new features: http and raw tcp support
        - fixed apparent STDIO vs. sysread bug in proxy connect
        - added tcpecho.pl and tcpcat.pl to MANIFEST
        - fixed some further bugs with TCP read all, etc.
        - fixed some const char pointer warnings
2003-09-13 12:16:57 +00:00
jlam
79386bc77e Remove redundant TEST_TARGET definition that matches the default one in
perl5/module.mk.
2003-09-13 06:22:49 +00:00
jlam
4f81faa05b Update security/p5-Digest-MD5 to 2.27. Changes from version 2.24 include:
Don't assume PerlIO_read() works like fread() even though
   it was documented like that for perl 5.6.  It returns negative
   on read failure.

   The $md5->addfile method now croaks if it discovers
   errors on the handle after reading from it.  This should
   make it more difficult to end up with the wrong digest
   just because you are to lazy to check the error status
   on your file handles after reading from them.

   Improved documentation.
2003-09-12 23:11:03 +00:00
jlam
cb52064964 Update security/p5-Digest-SHA1 to 2.04. Changes from version 2.02 include:
Don't assume PerlIO_read() works like fread() even though
   it was documented like that for perl 5.6.  It returns negative
   on read failure.

   Implemented sha1_transform, required to implement NIST FIPS 186-2.

   Make it build on 64-bit platforms with 32-bit longs.

   Sync up with the Digest::MD5 implementation:
      - added clone method
      - addfile croaks if it can't read
      - the sha1*() functions warn if called as method
        or with reference arguments.
2003-09-12 21:22:32 +00:00
grant
ac2754dcb7 kill all references to gcc.buildlink2.mk and compiler.mk, and define
USE_GCC2 or USE_GCC3 where appropriate.

the functionality of the old gcc.buildlink2.mk has been rolled into
compiler.mk now, which is automatically used.

more changes to come later...
2003-09-12 20:07:06 +00:00
seb
336d68c05a Update to version 1.21.
download-vulnerability-list(8) now needs digest(1).
Hence put digest package as a runtime dependency of audit-packages
package.
2003-09-12 12:57:10 +00:00
jlam
83ee477d18 Change USE_OPENSSL_VERSION into equivalent BUILDLINK_DEPENDS.openssl. 2003-09-11 04:14:04 +00:00
jlam
3fff0e5495 Garbage-collect USE_OPENSSL_VERSION now that openssl/buildlink2.mk supports
just setting BUILDLINK_DEPENDS.openssl.  USE_OPENSSL_VERSION wasn't
actually needed here anyway since the minimum version allowed by
openssl/buildlink2.mk exceeded the version requested here.
2003-09-11 04:13:01 +00:00
jlam
05b5d9484e Rewrite this file so that we can specify the version of OpenSSL that we
need by simply setting BUILDLINK_DEPENDS.openssl.  This buildlink2.mk file
now functions just like any other typical buildlink2.mk file.
2003-09-11 04:10:38 +00:00
jlam
31ac96c449 Note version numbers for 0.9.6[hij]. 2003-09-10 16:43:14 +00:00
jlam
8851ca23da Only check if we need to add the rsaref dependency if we need the pkgsrc
openssl.
2003-09-10 16:25:25 +00:00
jlam
054f8001ea Use the built-in HAS_CONFIGURE and TEST_TARGET infrastructure to do the
configure and test phases.
2003-09-10 16:23:27 +00:00
jlam
d7e76ed3bc Honor CFLAGS/LDFLAGS from the environment. 2003-09-10 16:05:09 +00:00
jlam
e02a907cbe Back out the make -> @MAKE@ -> ${MAKE} changes since we workaround the
bare "make" problem using tools.mk.
2003-09-10 01:57:06 +00:00
agc
4b67b74873 Update audit-packages to 1.20.
Support wget and curl as FETCH_CMDs, as discussed in PR 19103.
2003-09-09 17:31:34 +00:00
salo
951956ec68 Whitespace. 2003-09-09 09:59:29 +00:00
salo
de7812e66a Remove reference to wip. (hi xtraeme!)
Style nits, while here.
2003-09-09 09:58:11 +00:00
itojun
b48882a760 use PKG_SYSCONFDIR 2003-09-08 13:38:12 +00:00
itojun
b26a601c07 upgrade to 2.0.1.
from webpage:

>v2 is a significantly more accurate, precise and faster brother of the original
>proof-of-concept tool I released in 2000. P0f v1 is largely obsolete...
2003-09-06 04:56:28 +00:00
tron
20f7d53ff8 Remove "/pub" from pathnames on "ftp.fu-berlin.de" because such a directory
doesn't exist. It's apparently only mapped in the FTP server configuration.
2003-09-05 19:00:57 +00:00
xtraeme
14593c9a36 Add and enable p5-Authen-SASL and p5-Authen-SASL-Cyrus 2003-09-04 13:32:35 +00:00
xtraeme
545932c0a2 Initial import of p5-Authen-SASL-Cyrus, version 0.07.
SASL is a generic mechanism for authentication used by several
network protocols. Authen::SASL provides an implementation
framework that all protocols should be able to share.

The XS framework makes calls into the existing libsasl.so
shared library to perform SASL client connection functionality,
including loading existing shared library mechanisms.

Authen::SASL::Cyrus implements XS SASL Authentication.

Packages provided by Quentin Garnier via pkgsrc-wip.
2003-09-04 13:30:54 +00:00
xtraeme
8c3f9f8a28 Initial import of p5-Authen-SASL, version 2.04.
SASL is a generic mechanism for authentication used by several
network protocols. Authen::SASL provides an implementation
framework that all protocols should be able to share.

The included plugin Authen::SASL::Perl implements several of
these protocols (DIGEST-MD5, CRAM-MD5, ANONYMOUS, EXTERNAL,
LOGIN and PLAIN).

Package provided by Quentin Garnier via pkgsrc-wip.
2003-09-04 13:29:30 +00:00
tron
1665e3992f Fix inconsistent filename for "pkg-vulnerabilities" file in
"audit-packages" script. Bump package version again.
2003-09-03 15:06:59 +00:00
jmc
9ba4361a12 Nuke definition for INSTALL_EXTRA_TMPL here since INSTALL doesn't exist. 2003-09-02 23:14:44 +00:00
agc
d61816fcb2 Update audit-packages to 1.18.
Changes from previous version:

+ rely on an embedded sha1 digest to tell whether the vulnerabilities
  file has been damaged in transit or received successfully, rather than
  trusting that the file will not grow smaller

+ use the new filename "pkg-vulnerabilities"

+ use definitions from defs.${OPSYS}.mk in the download-vulnerability-list
  script

+ at installation time, don't rely on "ln -sf" to DTRT - explicitly call
  "rm -f" before attempting the symbolc link

With thanks to seb@ for testing.
2003-09-02 10:20:27 +00:00
frueauf
630f7479f0 Update libnasl, nessus{-core,-libraries,-plugins} to 2.0.7.
Based on pr pkg/22356 by Adrian Portelli.

Changes since 2.0.6a:

. changes by Renaud Deraison (deraison@cvs.nessus.org)
- Fixed bad performances issues when pinging dead hosts
- Fixed a bug which would prevent to store items larger than 2kb in the KB
- NFS and SMB file-related functions completed (open, read and cwd are
  implemented)
- Plugins support for Windows 2003
- Network IPs can now be evenly sliced instead of being scanned
  sequentially
- User-definable source-IP(s) for the checks (nessusd -S)
- Fixed a possible message corruption problem if a plugin was to send a too
  long message back to nessusd
- Fixed a possible plugin corruption problem when the client overwrites
  existing plugins
- Fixed various false positives and wording issues in several plugins
2003-09-02 09:29:47 +00:00
jdolecek
c0ffc0a9d5 Added php4-openssl 4.3.3 - PHP4 extension module for access to OpenSSL
library
2003-09-01 16:41:19 +00:00
jdolecek
3e36c2b137 add PHP4 OpenSSL extension module
adresses openssl part of PR pkg/22654 by Adrian Portelli
2003-09-01 16:37:36 +00:00
jdolecek
393e228522 appears the CONFIGURE_ENV+= MCRYPT_DIR=... isn't necessary anymore - it
compiles fine without
2003-09-01 16:28:51 +00:00
cjep
0174216952 whitespace fixes 2003-09-01 10:13:08 +00:00
jdolecek
90c1c1709f Update PHP to final 4.3.3
Some highlights of changes since 4.2.3:
* PCRE updated to 4.3, GD to 2.0.15
* improved Apache2 support
* much improved stream & URL wrapper support, output compression support
* added CLI (Command Line Interface) SAPI
* debug_backtrace() backported from ZendEngine2
* faster build system
* huge number of other bug fixes and improvements

Packaging changes:
* 'pcre', 'xml', and 'session' modules folded back into main package -
  'pcre' and 'xml' is required by PEAR, and 'session' is just too essential
  to be separate
* 'gd' module now uses bundled PHP GD library, which is better integrated
* PHP modules use shared distinfo when possible to ease future PHP updates
* ${PREFIX}/bin/php is now CLI version, ${PREFIX}/libexec/cgi-big/php
  remains CGI version
2003-08-31 19:55:21 +00:00
jlam
b2677a2cb0 Add definitions for DEINSTALL_EXTRA_TMPL and INSTALL_EXTRA_TMPL if
USE_PKGINSTALL is "YES".  bsd.pkg.install.mk will no longer automatically
pick up a INSTALL/DEINSTALL script in the package directory and assume that
you want it for the corresponding *_EXTRA_TMPL variable.
2003-08-30 22:51:11 +00:00
dan
49f6bda80d correct HOMEPAGE= 2003-08-30 22:23:31 +00:00
jlam
2920a32c71 Prepare for pkgviews by making sure that passing VIEW-INSTALL or
VIEW-DEINSTALL to the INSTALL/DEINSTALL scripts don't cause errors.
2003-08-30 20:22:49 +00:00
reed
e2336bb021 "It's" stands for "it is" (or "it has"). The apostrophe is not used
for a possessive (like her, his, whose, their, and its).

Note that I didn't check for proper use of "its" (when it should
be "it is" or "it has" instead).

I also saw over 15 other grammar or punctuation problems, but not
fixed in this commit.
2003-08-30 02:14:19 +00:00
wiz
816d71a63f No necessity to depend on latest libmcrypt -- back out previous. 2003-08-29 04:48:33 +00:00
dan
e10fd70e39 update to 2.5.7
from Adrian Portelli in PR/22628
2003-08-29 00:56:25 +00:00
dan
433c5fd135 doh. cruft. 2003-08-29 00:30:04 +00:00
dan
e6cb91e745 bitstir monitors rnd(4) for low entropy and uses find(1) to solicit more.
program and pkg from Peter Hendrickson <pdh@wiredyne.com>
2003-08-29 00:25:34 +00:00
xtraeme
252d9f7253 Change my email address to the NetBSD one, ok'ed by wiz@ 2003-08-28 20:05:13 +00:00
itojun
2b364c9adb upgrade to 20030826. corrects keylen miscomputation. 2003-08-26 03:06:08 +00:00
itojun
cd563b68fb upgrade to 1.2.3.
* New "--gnupg" option (set by default) that disables --openpgp,
      and the various --pgpX emulation options.  This replaces
      --no-openpgp, and --no-pgpX, and also means that GnuPG has
      finally grown a --gnupg option to make GnuPG act like GnuPG.
    * A number of portability changes to make building GnuPG on
      less-common platforms easier.
    * Romanian translation.
    * Two new %-expandos for use in notation and policy URLs.  "%g"
      expands to the fingerprint of the key making the signature
      (which might be a subkey), and "%p" expands to the fingerprint
      of the primary key that owns the key making the signature.
    * New "tru" record in --with-colons --list-keys listings.  It
      shows the status of the trust database that was used to
      calculate the key validity in the listings.  See doc/DETAILS for
      the specifics of this.
    * New REVKEYSIG status tag for --status-fd.  It indicates a valid
      signature that was issued by a revoked key.  See doc/DETAILS for
      the specifics of this.
2003-08-25 21:25:24 +00:00
jschauma
6766d3344d Several of the Makefile used in this package call 'make' directly. If
an operating system does not have a 'make' (ie only bmake), or if the OS
supplied 'make' is sufficiently broken (Irix), this will cause the build to
fail (interestingly enough apparently only if build as a dependency, not
if build from this directory).
Patch Makefiles to use @MAKE@, which then, after patching, is substituted with
the actual ${MAKE} (can't use "MAKE= ${MAKE} -f Makefile.ssl").

While here, tweak Irix configure a bit.
2003-08-25 16:34:00 +00:00
taca
625823b882 Update ruby-tcpwrap package to 0.6.
No documentation is given for changes.

- improved portability; proper checking for libwrap.
- add hosts_allow, hosts_deny and hosts_ctl methods.

It should fix macppc bulk build problem.  This packge was broken since
ruby-tcpwrap-0.3's distfile's contet was changed.
2003-08-24 05:00:54 +00:00
wiz
d2c1ebf9b9 Default to build dependency, since the package only
contains a static library. Patch from Todd Vierling.
2003-08-23 21:34:21 +00:00
agc
47409ab810 Update audit-packages to 1.17.
Instead of using the number of bytes to determine whether or not the
file has shrunk, use the number of lines.  This will allow for
spelling corrections, login name of committers being shorter than
others, etc.  This is a temporary measure until a better distribution
mechanism is used.  Suggested by David Brownlee.
2003-08-22 10:11:57 +00:00
jmc
c06ce4682b Update to correct version number on library 2003-08-19 15:52:03 +00:00
agc
33220fdf7f Add and enable dropbear 2003-08-19 15:48:17 +00:00
agc
17e0e1d5d6 Initial import of dropbear-0.36 into the NetBSD Packages Collection.
The search for a small Secure Shell server to fit on a laptop with 4
megs ram and no hard disk was fruitless, so Matt Johnston decided to
write his own, and Dropbear is the result.  It implements various
features of the SSH 2 protocol, including X11 and Authentication Agent
forwarding.  Dropbear is Open Source software, distributed under a
MIT-style license.

Features

    * A small memory footprint - Dropbear can compile to a 110kB
      statically linked binary with uClibc (and only minimal options
      selected).
    * Implements X11 forwarding, and authentication-agent forwarding
      for OpenSSH clients
    * Compatible with OpenSSH ~/.ssh/authorized_keys public key
      authentication
    * Features can easily be disabled when compiling to save space.
    * Preliminary TCP forwarding support (-L style only)
2003-08-19 15:46:44 +00:00
recht
a4ec41985a Update to 2.1.15.
changes:
Fix build on NetBSD-current with OpenSSL 0.9.7.

New in 2.1.15
-------------
* Fix a number of build issues
* Add a doc/components.html that hopefully describes how things
  interact better.

New in 2.1.14
-------------
* OS X 10.2 support
* Support for the Sun SEAM GSSAPI implementation
* Support for MySQL 4
* A number of build fixes
* Other minor bugfixes

OK'ed by chris@
2003-08-16 09:06:41 +00:00
itojun
4a811c3434 add IPv6 support. bump PKGREVISION 2003-08-15 07:02:22 +00:00
seb
59d2eb59ec Update to version 3.2.5
Previous versions have a security issue. Please update!

Thanks to gendalia@ for testing.

Changes since version 3.2.2:

2003-05-09  Sami J. Lehtinen  <sjl@ssh.com>

	* ssh-3.2.5.

	* Fixed a critical security bug with RSA signature
	  verification. Mitigating factors: DSA is used by default (not
	  vulnerable). Also, the attack requires that attacker has the
	  public key and the attacker needs to precompute the signature
	  data so, that it looks like a valid PKCS#1 signature. This is a
	  non-trivial task to perform without the private
	  key. Nonetheless, all users should update their servers and
	  clients as soon as convenient. Workarounds are to not use RSA
	  keys as host keys (though connecting to existing hosts with RSA
	  hostkeys poses a serious risk with a vulnerable client), and
	  disabling publickey authentication. Update your clients and
	  servers.

2003-04-22  Sami J. Lehtinen  <sjl@ssh.com>

	* ssh-3.2.4.

	* sshd2: Binary (generated by us) is tagged as a "supported
	  binary" for SecurID. (no actual code changes)

	* Previous: ssh-3.2.3.1.

2003-02-06  Sami J. Lehtinen  <sjl@ssh.com>

	* sftp2 (etc): Fixed a bug with readline jamming when pressing
	  backspace (etc) on AIX and some other platforms.

2003-01-12  Sami J. Lehtinen  <sjl@ssh.com>

	* ssh-3.2.3.

2003-01-03  Sami J. Lehtinen  <sjl@ssh.com>

	* scp2: Removed broken special handling for SIGHUP, so that
	  "nohup" can again work.

	* ssh2: Check whether we should ignore SIGQUIT, SIGINT, and do so,
	  if necessary. Thanks for J. Schilling for pointing this one out.

	* ssh-add2: Make sure fgets() from pipe to ssh-askpass2 recovers
	  from if interrupted by signal, i.e. SIGCHLD.

	* ssh2 (lib/sshsession/sshtty.c): As entry above, but for tcsetattr().

	* During "make install", use default size of key instead of hardcoded
	  1024 when generating hostkey.

2002-12-18  Sami J. Lehtinen  <sjl@ssh.com>

	* scp2,sftp2: Print progress output to stdout, to make it
	  distinguishable from errors in cron jobs etc.

2002-12-17  Sami J. Lehtinen  <sjl@ssh.com>

	* apps/ssh/sshchsession.c: Fixed a bug which caused sshd2 child
	  server to jam occasionally after logging an event, if nsswitch had
	  been configured to use LDAP.

2002-12-13  Sami J. Lehtinen  <sjl@ssh.com>

	* sshd2: Previous (by Tomi Mickelsson): Fixed a bug where
	  specifying a local forwarding endpoint as an IP-address which was
	  unresolvable would result in a crash.

2002-12-12  Sami J. Lehtinen  <sjl@ssh.com>

	* scp2: Fixed a bug/missing feature from scp2. It now reports
	  information also when run when there is no tty. Also implemented
	  --statistics=[no,yes,simple], where "yes" is old-style, "no" is
	  analogous to "-Q" command-line option, and "simple" is the way
	  the statistics are printed when there is no tty (no intermittent
	  reporting, file size, transfer time and full file name are printed
	  after the transfer for the specific file is finished).

2002-12-11  Sami J. Lehtinen  <sjl@ssh.com>

	* ssh-keygen2: respect "-P" and "-p" options when converting
	  ssh1-keys.

2002-12-10  Sami J. Lehtinen  <sjl@ssh.com>

	* lib/sshutil/sshcore/sshdebug.c: Fixed a compilation problem
	  manifested on older AIX and debugging enabled (as is default).

	* scp2: You can now specify the newline convention when using the
	  "-a" option. See manual page scp2(1).

2002-11-08  Sami J. Lehtinen  <sjl@ssh.com>

	* Removed ssh-pubkeymgr and ssh-chrootmgr from the distribution
	  (they didn't work too well).

	* apps/ssh/lib/sshproto/trcommon.c: Fixed a crash if hostkey
	  algorithms or kex-methods couldn't be negotiated.

2002-11-05  Sami J. Lehtinen  <sjl@ssh.com>

	* lib/sshapputil/sshuserfile.c: Changed to use
	  lib/sshsession/sigchld.c, instead of using wait() directly. This
	  fixes the bug where the number of connections would slowly rise to
	  the maximum when using MaxConnections and tcp-wrappers (it was a
	  race-condition).

	* lib/sshsession/sigchld.c: Sigchld now keeps a list of recently
	  exited children. This fixes a race condition, where the child
	  process could exit before the mother process had registered a
	  handler for it.

	* lib/sshsession: Fixed NetBSD 1.6 compilation. Also, NetBSD 1.6
	  supports openpty style ptys, so fixed check to actually detect
	  them on NetBSD. Don't use utmpx on NetBSD, as it doesn't seem to
	  work (at least not in the way we use it).

	* lib/sshsession/sshunixuser.c: Make sure we have room for the
	  NULL pointer in the groups array.

	* ssh2 (ssh1-emulation): Fixed a bug, which in some cases caused
	  an assertion failure later.

2002-10-29  Sami J. Lehtinen  <sjl@ssh.com>

	* configure: Added /usr/X11R6/bin and /usr/X11/bin to search PATH
	  for xauth to ease installation on pristine systems.

2002-10-22  Sami J. Lehtinen  <sjl@ssh.com>

	* lib/sshutil/sshnet/sshtcp.c: (by Tomi Ollila) Fixed a bug with
	  SOCKS handling.

2002-10-01  Sami J. Lehtinen  <sjl@ssh.com>

	* lib/sshutil/sshpacketstream/sshpacketwrapper.c: (by Tomi Kause)
	  Fixed a latent (in ssh2) bug, when writing to the stream from the
	  received_cb.

	* lib/sshutil/sshnet/sshsocks.c: (by Tomi Ollila) Decode
	  ipv6-mapped-ipv4-addresses when doing SOCKS4, as SOCKS4 only
	  supports plain ipv4-addresses.

	* scp2: Implemented --overwrite, which controls whether to
	  overwrite the destination file(s). Default is "yes",
	  i.e. to overwrite.

	* scp2: Implemented interactive mode, i.e. you can make scp2
	  prompt you whether to overwrite an existing destination
	  file. Works by giving --interactive (-I) on the command-line.

2002-08-15  Sami J. Lehtinen  <sjl@ssh.com>

	* sshd2: Fixed a bug with originator-pat with ForwardACLs.

2002-08-02  Sami J. Lehtinen  <sjl@ssh.com>

	* scp2, sftp2: Fixed a bug, which caused file transfer to stall,
	  if trying to transfer a zero sized file with ascii transfer
	  (newline mangling).

2002-07-21  Sami J. Lehtinen  <sjl@ssh.com>

	* sftp2: Added option "S" and "r" to "ls" (for sorting by size and
	  reversing the sort order, respectively).

	* sftp2: "ls" works much better now. Tab completion understand
	  directories (appends a '/', for easier directory traversal).

	* sftp2, scp2: Extensive rewrite of SshFileCopy, and as a
	  consequence, of both scp2 and sftp2 core functionality.

2002-06-13  Sami J. Lehtinen  <sjl@ssh.com>

	* ssh2: Fixed a bug with one-shot forwarding.
2003-08-12 19:08:55 +00:00
seb
56b682547a USE_NEW_TEXINFO is unnecessary now. 2003-08-09 10:59:08 +00:00
wiz
553f3358ea Remove superfluous chunk which confuses some patch(1). 2003-08-09 09:12:41 +00:00
heinz
909643e553 fix for bad sh behaviour on Solaris (already available in latest GnuPG snapshots) 2003-08-09 08:48:35 +00:00
heinz
bc46c9d9f8 fix for bad sh behaviour on Solaris (already available in latest GnuPG snapshots) 2003-08-09 08:11:30 +00:00
wiz
fc99d82917 Add http master site for idea.c.gz. Addresses PR 22408. 2003-08-08 18:57:04 +00:00
wiz
5d061ecd61 Add buildlink2.mk provided by Todd Vierling in PR 22361. 2003-08-05 17:18:20 +00:00
jwise
3f53640519 We need explicit -lcrypto on -current (at least with gcc3), and it does no
harm on older versions, so bring it in explicitly.
2003-08-05 15:44:46 +00:00
drochner
15d0f250e6 bump revision after qt3/kde prefix change 2003-08-05 13:39:59 +00:00
seb
c16d497900 Convert to USE_NEW_TEXINFO. 2003-08-05 11:17:10 +00:00
seb
b9422ada12 Convert to USE_NEW_TEXINFO.
Fix PLIST for missing info files.
2003-08-05 10:14:22 +00:00
seb
de4d99ef38 Convert to USE_NEW_TEXINFO. 2003-08-05 09:50:59 +00:00
seb
85d792d885 Convert to USE_NEW_TEXINFO. 2003-08-04 22:55:22 +00:00
jmc
ae16687c70 If 0.9.7a or 0.9.7b are required and not otherwise installed on the system
set PKG_SKIP_REASON and move on. The package only supports to 0.9.6g
currently otherwise.
2003-08-04 17:28:23 +00:00
jmc
03003b05e4 Typo in use of USE_OPENSSL_VERSION. 2003-08-04 17:27:06 +00:00
jmmv
42845c849e Update to 3.0.0 (homepages not beeing up to date...):
3.0.0:
- Cleaned up installed header files.
- Modified the API so that all keys can be passed as arrays of bytes.
- Modified the API so that all key sizes are given in bits.
- Modified the multi-precision integer library to work better on 64-bit
  machines.
- Modified the assembly source generation mechanism, employing the m4
  macro processor.
- Added multi-precision integer vectorized assembler routines for
  Itanium.
- Added multi-precision integer assembler routines for PowerPC 64-bit.
- Added multi-precision integer assembler routines for Alpha.
- Added multi-precision integer assembler routines for Opteron.
- Added multi-precision integer assembler routines for IBM zSeries 64-bit.
- Added multi-precision integer assembler routines for M68K.
- Added Jeff Johnson's python bindings.
- Added new unit tests.
- Added new benchmarking programs.

2.3.0pre:
- Modified the header files so that the library now uses self-contained
  autoconf-generated configuration files; a program employing BeeCrypt can
  now use the symbols already tested and defined instead of having to
  regenerate them (thus also eliminating the risk of inconsistencies).
- Added the AES algorithm, with assembler routines for i586 and powerpc.
- Added the DSA signature algorithm.
- Added PowerPC assembler routines for blowfish.
- Added Pentium4 SSE2 assembler multiplication routines.
- Fixed the RSA CRT algorithm.
- Fixed the gas/i386 mp32even and mp32odd routines.
- Fixed a bug in modular inverse computation; thanks to Jeff Johnson of
  RedHat for pointing this out.
- Fixed a bug in testing the result of a gcd operation in the mp32prndconone
  routine.
- Fixed an ugly bug in base64 decoding.
- Fixed compatibility with the latest automake & autoconf versions.
- Replaces CPU optimization mechanism in configure script.
2003-08-03 20:58:17 +00:00
jmmv
25f2290454 Add and enable beecrypt. 2003-08-03 15:48:08 +00:00
jmmv
c2444537b4 Initial import of beecrypt, version 2.1.0:
BeeCrypt is an open source cryptography library that contains highly
optimized C and assembler implementations of many well-known algorithms
including Blowfish, MD5, SHA-1, Diffie-Hellman, and ElGamal.

Unlike some other crypto libraries, BeeCrypt is not designed to solve
one specific problem, like file encryption, but to be a general purpose
toolkit which can be used in a variety of applications.

There are also no patent or royalty issues associated with BeeCrypt, and
it is released under the GNU LGPL license, which means it can used for
free in both open source and closed source commercial projects.
2003-08-03 15:47:42 +00:00
drochner
9bf7618750 don't depend on "swig-python" - this is only needed under certain circumstances
explained in the "Advanced Topics" part of the SWIG documentation
(as currently built - w/o python version dependency, it is broken anyway)
we just need a build dependency on swig-build
2003-08-01 14:00:07 +00:00
jmc
6c2c9bec76 This needs to define KERBEROS or the section which adds the right libraries
never gets included and nothing links.
2003-08-01 03:21:02 +00:00
jmmv
4ab51057d8 Convert to the bsd.pkg.install.mk framework by honouring PKG_SYSCONFDIR and
using RCD_SCRIPTS to handle generation and installation of the rc.d script.
Convert the rc.d script to the rc.subr framework too.
Bump PKGREVISION to 1.
2003-07-31 10:38:32 +00:00
jmmv
e569e99cf2 Convert the rc.d script to the rc.subr framework and use RCD_SCRIPTS from
bsd.pkg.install.mk to handle its generation and installation.
While here, switch to buildlink2.  Bump PKGREVISION to 1.
2003-07-31 10:05:52 +00:00
grant
6d62e266f7 drop unneeded parens 2003-07-30 18:35:53 +00:00
wiz
a112d0a932 MASTER_SITES and HOMEPAGE gone; comment them out. 2003-07-30 05:47:10 +00:00
grant
23cd338455 add openssl 0.9.7a, as found in Slackware Linux 9.
XXX there really must be a better way to (not have to) do this.
2003-07-29 19:25:50 +00:00
jmmv
da4fb9e636 Install example file under the examples hierarchy and honour PKG_SYSCONFDIR.
Bump PKGREVISION to 1.
2003-07-29 11:18:38 +00:00
simonb
738a46011e Avoid null-pointer dereference if getpwuid(getuid()) fails. 2003-07-26 13:27:05 +00:00
drochner
a99b38b315 With native threads, explicitely disable any GNU pth checking.
Otherwise it gets confused about the library hidden by buildlink.
2003-07-25 17:22:38 +00:00
drochner
aaf75dd4ea update to 1.9alpha6
changes:
-bugfixes
-speed improvements, added benchmark tools
-support to RSA key objects for blinding and unblinding data
-       * Renamed cansign(), canencrypt(), hasprivate(), to
          can_sign, can_encrypt, has_private.
-* Many randpool changes.
2003-07-25 16:37:58 +00:00
drochner
b9079e8a3d +py-m2crypto 2003-07-25 15:59:31 +00:00
drochner
5883718f95 Now that we have openssl-0.97 it makes sense to import
m2crypto-0.11, a crypto and SSL toolkit for Python.
2003-07-25 15:58:19 +00:00
jwise
d96f7482bc Bump ${PKGREVISION} for re-enabled kerberos support. 2003-07-24 21:25:26 +00:00
jwise
86c245dc72 Fix kerberos support in this package (kerberos support in the Makefile
was commented out because it didn't work with recent openssh, is now fiexed
and commented back in).  This support is conditional on ${KERBEROS} being
set, and currently enables support for both kerberos 4 and 5.  This should
be refined.

This has been tested and confirmed on -current and 1.6.  Testing on other
platforms (if any?  solaris?) in which we support kerberos in pkgsrc should
be done.
2003-07-24 21:24:28 +00:00
jwise
9b55571cd9 Make difference between this package and ../openssh clearer in DESCR and
COMMENT, and add comment to Makefile explaining why we copy, rather than
source, files from ../openssh.
2003-07-24 21:06:25 +00:00
jwise
98496d7188 Import package for openssh+gssapi, which is openssh-3.6.1p2 with version
20030430 of the GSSAPI patches from

	http://www.sxw.org.uk/computing/patches/openssh.html

.  From the site:

  The patches on this page are concerned with adding support for
  authenticating users via their Kerberos credentials, and allowing
  authenticated users to forward their credentials to a remote
  machine over ssh.

  These patches are against various versions of the OpenSSH portable
  code. SSH has both a legacy protocol version 1, and a newer,
  protocol version 2 (which is being standardised in the IETF).
  Techniques exist for performing Kerberos authentication over both
  protocols, and GSSAPI authentication over protocol version 2.

In this package standard ssh support for kerberos versions 4 and 5 is kept
for version 1 of the ssh protocol (openssh does not support kerberos 4 in
ssh protocol version 2).

These patches, which provide a much more thorough implementation of kerberos
5 support than that shipped with openssh, are pkg'ed here with an eye toward
evaluation of their usefullness for inclusion in the base os.
2003-07-24 21:01:23 +00:00
jwise
5b0c2204e7 Add openssh+gssapi. 2003-07-24 20:59:28 +00:00
jwise
17b55e0ebf Mark conflicts with openssh+gssapi. 2003-07-24 20:59:03 +00:00
tron
bf2ee3a526 Add support for OpenSSL 0.9.7b shipped with NetBSD-current. 2003-07-24 20:18:24 +00:00
salo
6472eaf122 Better INSTALL_* fix for PR pkg/22234 by Jonathan Perkin.
Use buildlink2.
ONLY_FOR_PLATFORM -> NOT_FOR_PLATFORM (*BSD have skey in base system.)
Workaround a bug in GCC on sparc64.
Whitespace.
2003-07-23 16:03:55 +00:00
jmmv
d5b1cb870a Fix installation permissions using the right install commands. Also avoid
making some directories that are automatically created by mtree.
Patch provided in PR pkg/22234 by Jonathan Perkin.
2003-07-23 14:34:27 +00:00
jmmv
39f04a62dc Let the COMMENT be plural: the package provides multiple utilities. 2003-07-23 14:22:59 +00:00
jmmv
01752f4968 Make descriptions and comments a bit different between pgp2 and pgp5,
as proposed in PR pkg/22227 by reed@reedmedia.net.
2003-07-23 10:51:13 +00:00
wiz
daa9aa028d Remove fallout from ruby-openssl mis-reimport. 2003-07-22 18:57:39 +00:00
taca
41ecec9c66 Remove ruby-ossl since it was back to ruby-openssl.
Since "ossl" is only distribution file's name and real library name is
"openssl", ruby-openssl is better name.  I was much confused yesterday.

name
2003-07-22 17:46:52 +00:00
taca
146eb94bbe Delete ruby-ossl and add ruby-openssl. 2003-07-22 17:43:21 +00:00
taca
b60248a6ce Re-add ruby-openssl 0.1.4.1 package: back out ruby-openssl => ruby-ossl. 2003-07-22 17:42:31 +00:00
taca
3caaeff527 Re-import security/ruby-openssl 0.1.4.1. 2003-07-22 17:37:36 +00:00
taca
40c8427593 Update ruby-ossl package to 0.1.4.1 (0.1.4a).
Wed, 16 Jul 2003 16:04:02 +0900 -- GOTOU Yuuzou <gotoyuzo@notwork.org>
	* ossl-0.1.4a released

Wed, 16 Jul 2003 15:43:52 +0900 -- GOTOU Yuuzou <gotoyuzo@notwork.org>
	* extconf.rb: check CRYPTO_malloc for libcrypto.
	* ossl.h: include <openssl/bn.h>.
	* ossl_bn.c: use BN_CTX_new instead of BN_CTX_init.
	* ossl_cipher.c: NIDs of AES were changed.
	* ossl_x509store.c: alias add_cert add_trusted.
	* lib/net/https.rb: follow HTTPResponse.read_new's incompatiplity.

Tue, 15 Jul 2003 04:48:33 +0900 -- GOTOU Yuuzou <gotoyuzo@notwork.org>
	* ossl-0.1.4 released

Tue, 15 Jul 2002 04:19:44 +0900 -- GOTOU Yuuzou <gotoyuzo@notwork.org>
	* openssl_missing.h: add MS_CALLBACK.
	* extconf.rb: should check <openssl/e_os.h>.
	* ossl.h: check HAVE_OPENSSL_E_OS_H.
	* net/https.rb: follow ruby-1.8.
2003-07-21 17:21:32 +00:00
taca
2f59e6a07c Update ruby-ossl package to 0.1.4.1 (0.1.4a).
Add conflict with its older name, ruby-openssl package.
Thanks to advise by a private mail from wiz.

Wed, 16 Jul 2003 16:04:02 +0900 -- GOTOU Yuuzou <gotoyuzo@notwork.org>
	* ossl-0.1.4a released

Wed, 16 Jul 2003 15:43:52 +0900 -- GOTOU Yuuzou <gotoyuzo@notwork.org>
	* extconf.rb: check CRYPTO_malloc for libcrypto.
	* ossl.h: include <openssl/bn.h>.
	* ossl_bn.c: use BN_CTX_new instead of BN_CTX_init.
	* ossl_cipher.c: NIDs of AES were changed.
	* ossl_x509store.c: alias add_cert add_trusted.
	* lib/net/https.rb: follow HTTPResponse.read_new's incompatiplity.

Tue, 15 Jul 2003 04:48:33 +0900 -- GOTOU Yuuzou <gotoyuzo@notwork.org>
	* ossl-0.1.4 released

Tue, 15 Jul 2002 04:19:44 +0900 -- GOTOU Yuuzou <gotoyuzo@notwork.org>
	* openssl_missing.h: add MS_CALLBACK.
	* extconf.rb: should check <openssl/e_os.h>.
	* ossl.h: check HAVE_OPENSSL_E_OS_H.
	* net/https.rb: follow ruby-1.8.
2003-07-21 17:21:30 +00:00
martti
c1b54b4f61 COMMENT should start with a capital letter. 2003-07-21 17:20:17 +00:00
martti
8cee801716 COMMENT should start with a capital letter. 2003-07-21 17:10:16 +00:00
taca
249fbc04ed Deleted ruby-openssl since it renamed to ruby-ossl. 2003-07-21 17:08:56 +00:00
taca
cf3b05407a remove ruby-openssl and add ruby-ossl. 2003-07-21 17:05:56 +00:00
taca
953a7b7655 Re-import security/ruby-openssl as security/ruby-ossl for changing
the package name.
2003-07-21 17:04:27 +00:00
martti
ff2d99ade0 Updated keychain to 2.0.3
- Added keychain man page
- Fixed bugs with displaying colors for keychain --help
- Added a $grepopts to fix the grepping for a pid on cygwin
- Added a TODO document color fix based on submission by Luke Holden
2003-07-18 03:59:49 +00:00
grant
ca3be631f2 s/netbsd.org/NetBSD.org/ 2003-07-17 22:50:55 +00:00
wiz
2d9b835f6b Update DEPENDS. 2003-07-13 17:54:29 +00:00
wiz
63fe7a77c8 @dirrm libexec/crack. 2003-07-13 16:12:29 +00:00
wiz
43fa0c7cb6 PKGREVISION bump for libiconv update. 2003-07-13 13:50:19 +00:00
dillo
2816ab4961 don't define test target directly, use do-test instead 2003-07-12 13:23:43 +00:00
itojun
f4c8e92a42 $NetBSD$ 2003-07-12 10:24:17 +00:00
itojun
ff8376c33a upgrade to 20030711 snapshot. (compiles at least on 1.6.1, not tested on 1.5)
bunch of stability fixes
2003-07-12 10:01:44 +00:00
zuntum
4c716e5f92 Update p5-Digest-MD5 to version 2.24
Changes:

2003-03-09   Gisle Aas <gisle@ActiveState.com>
   Release 2.24

   Don't let the $^W test get confused by lexical warnings.
   Sync up with bleadperl; safer patchlevel include.

2003-01-18   Gisle Aas <gisle@ActiveState.com>
   Release 2.23

   Override INSTALLDIRS for 5.8 as suggested by
   Guido Ostkamp <Guido.Ostkamp@t-online.de>.
2003-07-12 09:41:52 +00:00
zuntum
551b7c1425 Update p0f to version 1.8.3
Changelog:

1.8.3 (Feb 6, 2003)
       - Lots of new signatures
       - URL's for papers and sites with information on fingerprinting.
       - Information on the windows/Cygwin port.  .exe for 1.8.3 will
         show up soon.


1.8.2.2 (May 13, 2002)
       - Rechecked version numbers. (Bill)
       - Mysql cleanup and integration
       - Mysql quickstart (Marion)


1.8.2.1 (May 12, 2002)
       - Mysql Support Added (Evrim ULU <evrim@core.gen.tr>)
       - FPS Buffer Length increased from 120 to 150 (Evrim)
       - p0f-mysql.conf config file added for mysql connectivity (Evrim)
       - parser for p0f.fp was corrected. It was including
         wwww:ttt: ... line in the comments. (Evrim)
       - mysql/db.sql file is included for creation of db tables (Evrim)
       - Makefile.mysql is added - no gnu autoconf support yet. (Evrim)
       - New RedHat 7.0 Beta Fischer FP added. (Evrim)
       - Max fingerprints raised to 5000 for the moresigs project. (Bill)
2003-07-12 01:10:59 +00:00
aymeric
4e85e41fb2 Remove NO_MTREE=yes
It broke installation of audit-packages as the first package in the system.
Okayed by Alistair.
2003-07-09 13:01:59 +00:00
taca
2d8c6cc138 Update ruby-openssl package from 0.1.3.
- ad hoc fix build problem on NetBSD current.
- changes from 0.1.2a:

Tue, 10 Dec 2002 02:32:54 -0900 -- GOTOU Yuuzou <gotoyuzo@notwork.org>
	* ossl-0.1.3 released

Mon,  9 Dec 2002 22:26:15 -0900 -- GOTOU Yuuzou <gotoyuzo@notwork.org>
	* x509name.c: let initialize() give a Array instead of a Hash.
	  to_a is implemented and to_h is deprecated.
	* openssl.rb: X509::Name is refined.

Mon,  9 Dec 2002 20:21:32 -0900 -- GOTOU Yuuzou <gotoyuzo@notwork.org>
	* ossl.c: use ruby_unsetenv() instead of unsetenv().
	* ssl.c: the return value of SSL_read/SSL_write is int (not size_t).
	  This fix is suggested by matz. ([ruby-list:36721])

Mon, 28 Oct 2002 10:39:43 +0100 -- Michal Rokos <m.rokos@sh.cvut.cz>
	* LICENCE: update to latest Ruby's
	* extconf.rb: fix to make it work under Ruby 1.7.3
	* pkey.c: fix MACRO
	* ChangeLog: changed style
2003-07-06 14:22:44 +00:00
jmmv
eaf78a998b Do not hardcode /usr/pkg in patch files. 2003-07-02 17:33:17 +00:00
grant
1355ba8347 style nits, join two .if's. 2003-07-02 13:03:25 +00:00
grant
1bbc0aa690 more brutally attack the CONFIGURE_ARGS target issue on Solaris.
force gcc if *gcc* - Sun's compiler is never going to be installed
into a path with 'gcc' in it(!)
2003-07-02 13:00:46 +00:00
jschauma
e4114ffbdd Make this work on IRIX64. 2003-06-27 02:36:36 +00:00
agc
38b8598cd7 Add and enable aide06 2003-06-23 13:49:18 +00:00
agc
a4bbacd6ef Re-import an older version of aide, aide-0.6, as security/aide06,
since there is a problem with aide-0.9 which results in it sending an
email warning on every run of the scanner.  Whilst this version may
have other problems (it believes opendir(3)'s output, IIRC), it does
keep quiet about them.

aide-0.6 creates a database from the regular expression rules that it finds
from the config file.  Once this database is initialized it can be
used to verify the integrity of the files.  It has several message
digest algorithms (md5,sha1,rmd160,tiger,haval,etc.) that are used to
check the integrity of the file.  More algorithms can be added with
relative ease.  All of the usual file attributes can also be checked
for inconsistencies.  It can read databases from older or newer
versions.  See the manual pages within the distribution for further
info.  There is also a beginning of a manual at

	http://www.cs.tut.fi/~rammer/aide/manual.html
2003-06-23 13:48:33 +00:00
agc
d967817238 Set the correct version of mhash to depend upon properly, so that we don't
end up with multiple version dependencies.
2003-06-17 13:05:37 +00:00
shell
24e1d2bf28 Updated to p5-SSLeay-0.51
Changes (from 0.49) :
- fixed build problem for OpenSSL 0.9.6 and some builds
  of perl 5.8.x which resulted in make error:

   /usr/include/openssl/des.h:193: parse error before '&' token"

  Thanks to Rob Brown for submitting a similar patch to cover
  this problem
- bug fix from Dongqiang Bai when server using proxy cannot
  resolve host name being connected to
- Added c:/openssl in default search path on win32 machines
  which is the recommended installation area in the openssl dist
- Added patch from Pavel Hlavnicka for freeing memory leaks
  from SSL_CTX_use_pkcs12_file() whose functionality is triggered
  by the $ENV{HTTPS_PKCS12_*} settings
- Added alarm() during Net::SSL->read() to honor socket timeout
  setting for more robust applications.  read()
  will die_with_error() which in consistent with previous
  semantics used during SSL read() failure
  Thanks to Pavel Hlavnicka for prompting this change.
- Removed code that supported versions of SSLeay before version 0.8
  I believe SSLeay v.8 was released back in 1998
- Added patch from Devin Heitmueller so that initial random seed
  would be taken from /dev/urandom if available via RAND_load_file
  API
2003-06-14 09:26:45 +00:00
shell
4bbf13bdaa Updated to p5-Net-SSLeay-1.23
Changes :
1.22
  - proxy auth fix from Bill.Muller@@ubsw_..com
  - RAND patch from Toni Andjelkovic <toni@soth._at>
1.23
  - some minor tweaks by many, mainly for RH build
  - memory leak and cleanup patches from
    Marian Jancar <mjancar@suse._cz>
2003-06-14 09:10:53 +00:00
wiz
1072aade83 -f the symlinks. Requested by Jeremy C. Reed. 2003-06-12 19:52:26 +00:00
wiz
6dacb668a8 Add man page supplied by Jeremy C. Reed in PR 21865, with some fixes by me.
Bump to 1.16.
2003-06-12 06:59:30 +00:00
abs
fb6c29f8bf Update for the fact that 'arm' ports have been called NetBSD-*-arm for a while
now and not NetBSD-*-arm32. Changes include one or more of:
    - Change MACHINE_ARCH == arm32 to also match arm
    - Where ONLY_FOR_PLATFORM includes NetBSD-*-arm32, add NetBSD-*-arm
    - Where BROKEN or worked around for arm gcc bugs, set USE_GCC3
The last may shake out a few more broken packages the next bulk build.
2003-06-11 20:50:50 +00:00
jschauma
a9f758d4a2 Upgrade to 3.6.1p2:
- (djm) Add back radix.o (used by AFS support), after it went missing from
   Makefile many moons ago
 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
 - (djm) Fix blibpath specification for AIX/gcc
 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org

(This last fix makes this compile on IRIX again.)
2003-06-10 21:00:45 +00:00
jschauma
dc9cb111d0 Rename PLIST.irix6 to PLIST.irix to match the others and set the
PLIST_SRC accordingly after we recently set LOWER_OPSYS on IRIX to what
most applications seem to expect (ie irix6.5 rather than irix6).
2003-06-10 18:02:26 +00:00
jschauma
8a9a2329c0 Make this find the right target in IRIX 6.5, and disable IPv6 under Linux
for the time being.
2003-06-10 17:58:34 +00:00
wiz
dba12e6516 Update to 2.1.0, from Quentin Garnier in PR 21780.
Also, add dependency on Perl instead of noting it in message, and use
REPLACE_PERL.
PHP frontend not included in this package.
Changes:
apg-2.1.0
    Some code cleanup.

apg-2.1.0b1
    Option [-E char_string] now works for pronounceable
    password generation too (see apg(1), apgd(8)).

apg-2.1.0b0
    Added new option [-e char_string] that allow to exclude some
    characters from password generation process.
    (works only for random password generation yet)

apg-2.1.0a0
    Added support for /dev/arandom for OpenBSD

apg-2.1.0a0
    Fixed some typing errors in the man pages
    System getopt() replaced with own apg_getopt().
    All calls of bcopy() and bzero() replaced with memcpy() and memset().
    Changed documentation.
    PRNG algorithm changed to use PID as an element of initial seed.
    Redesigned PHP frontend. Added support for German language.
    Implemented password quality ckeck based on filter. Now you can enforce
    APG to generate passwords that must contain numbers, special characters etc.
    Removed support for old style password generation mode definition.

apg-2.0.0final
    Changed PHP frontend to work with PHP safe-mode.
    Version numbers of apg, apgd, apgbfm, apgonline changed to 2.0.0final.

apg-2.0.0b1
    Fixed error that has forced user to set world-write privileges on
    Bloom-filter file. (Thanks to Mike Robbins)
    Fixed PHP frontend to clean-up generated HTML code.
    (Thanks to Mike Robbins)

apg-2.0.0b0
    Some code style fixes.
    Support for "special" symbol-set usage for password generation
    in pronounceable mode (S mode).
    Support for "resticted special" symbol-set usage for password generation
    in pronounceable mode (R mode).
    New style of hyphenated password output for pronounceable
    password generation mode.

apg-2.0.0a3
    Better error handling in apgbfm.
    Added -q option for apgbfm and apg (quiet mode).
    Added PHP frontend for APG.

apg-2.0.0a2
    Added support for SHA1 algorithm used for random numbers and hash
    generation.
    Hash function used in apgbfm changed to SHA1.
    Added info to APG_TIPS file.

apg-2.0.0a1 (not published)
    Finaly fixed some warnings during compilation process.
    Added support for OpenBSD.
    Added info to APG_TIPS file.

apg-2.0.0a0
    Added new algorithm (-b option) to check generated passwords
    quality (Bloom filter).
    Added utility apgbfm to manage Bloom filter.
    Some code style fixes.
    Added APG_TIPS file in documentation.
2003-06-10 06:38:46 +00:00
jmmv
a6f4ed68f5 Update to 2.2a:
- Cleared up some ambiguous syntax (grid -column instead of -col)
- Added a workaround for a bug in Tcl/Tk 8.4.0, which crashes on selection
  requests when a handler is registered without a type.  Thanks to Roberto
  Ugoccioni for both of these patches!
2003-06-09 22:12:35 +00:00
frueauf
24f8195277 Refer to the nessusd rc.d script via ${RCD_SCRIPTS_EXAMPLEDIR} like
suggested by Jeremy C. Reed.
2003-06-09 18:53:53 +00:00
frueauf
9cb62fee99 Add note about nessusd rc.d startupscript and how to use it. 2003-06-09 17:42:00 +00:00
frueauf
7e44b847eb Update libnasl and nessus{-core,-libraries,-plugins} to 2.0.6a.
This also includes changes offered in pr pkg/18734 and pr pkg/20796
submitted by Adrian Portelli. Thanks & Sorry that it took that long to
pick them up.

2.0.6 :
. changes by Renaud Deraison (deraison@cvs.nessus.org)
- Support for the keyword 'default' as a port range in nmap_wrapper.nes
- Fixed a zombie issue in nmap_wrapper.nes
- Fixed various issues which could allow a NASL script to crash the
  NASL interpretor
- Improved the process management in find_services.nes

2.0.5 :
. changes by Renaud Deraison (deraison@cvs.nessus.org)
- Fixed a rare race condition which may make the scan hang
- Fixed SMB related issues
- Entering "default" as the port range will make nessusd scan the ports
  listed in the Nessus services file.
- Even more sigs in find_services.nes
. changes by Julien Bordet (zejames@greyhats.org)
- Added over 3,000 signatures to smtpscan.nasl (thanks to the data
  provided by the Nessus team)

2.0.4 :
. changes by Renaud Deraison (deraison@cvs.nessus.org)
- fixed the SIGCHLD handler which would not work properly and leave zombies
  on the system
- fixed a race condition when testing a great number of hosts which would
  cause a testing process to slow down a whole audit or even hang it
  totally
- When a great number of host names is passed to nessusd as a target, they
  are resolved by chunks of 64 instead of trying to resolve everything then
  starting the test
- RedHat 9 support (in spite of their attempt to make their distro incompatible
  with everyone else)
. changes by Gabriel L. Somlo <somlo@acns.colostate.edu>
- The nessus can save the reports to stdout and read them from stdin

2.0.3 :
- fixed a compilation error which would prevent find_services from working
  properly

2.0.2 :
. changes by Michel Arboi (arboi@alussinan.org)
- NASL port of smtpscan (original Perl program by Julien Bordet)
- Nasty bug made loop stop prematurely on rare cases
. changes by Renaud Deraison (deraison@cvs.nessus.org)
- Re-wrote webmirror.nasl from scratch. The new version has a real parser
  built-in and is much faster
- Added checks for older Microsoft Advisories
- SMB plugins now use NTMLv1 authentication, ie: they don't send passwords
  in clear text over the network any more
- Added new crypto functions, taken from samba, in libnasl/
- Repaired detached scans
- Fixed IP ranges notation (10.1.1-9.1-254 did not work any more)
- Minor bug fixes and enhancements : #234, #233, #230, #229, #228, #225, #222,
  #220, #218, #217, #216, #215, #213, #212, #211, #207, #206, #205
- nessus-update-plugins properly calls chown under FreeBSD, no matter how
  many plugins there are
- find_services.nes recognizes even more protocols
. changes by Xueyong Zhi <zhi@mail.eecis.udel.edu>
- Added NTLMv2 authentication
. changes by Frank Migge (frank.migge@oracle.com)
- nessus-mkcert-client creates the auth/rules file properly

2.0.1 :
. changes by Renaud Deraison (deraison@cvs.nessus.org)
- Minor bugfixes (bugs #180, #183, #185, #188, #189, #195, #197, #202, #203, #204)
- Fixed the "pink" graphical report issue
- Added http keep-alive support in the CGI related plugins
- Fixed a bug in the function get_kb_list() which would not always work
  properly
- Fixed an issue where in some situations, some HTTP services would not
  be tested for flaws if they have not been port-scanned first
- Added new signatures in find_services.nes
. changes by Stephen Friedl (steve@unixwiz.net)
- Fixed bugs and warnings in nessus-libraries

2.0.0 :
. changes by Michel Arboi (arboi@alussinan.org)
- NASL2 : Implement >!< "strings don't match" operator
- NASL2 : fixed a vicious case of freed memory copy.
. changes by Renaud Deraison (deraison@cvs.nessus.org)
- Fixed a small bug in the plugin scheduler
- Ported to IRIX
- Several small bugfixes
. changes by Xueyong Zhi <zhi@mail.eecis.udel.edu>
- Added nmap_osfingerprint

1.3.4 :
. changes by Renaud Deraison (deraison@cvs.nessus.org)
- Re-written the process manager for the hosts
- Lots of bugfixes in the plugins text store manager
- New port scanner "synscan" which uses the RTT of the packets to do
  its job.
- Fixed several small issues in nasl and nessusd (bug fixes, code cleanup)
- Added cryptographic hashing functions in NASL
- Added the function get_kb_list() which returns the content of a KB
  without forking the plugin
- Updated the manpages of nessusd and nasl
. changes by Michel Arboi (arboi@alussinan.org)
- Fixed scanner_get_port() when running in standalone mode
- Fixed possible uninitiliazed memory issues in libnasl
- Started to write the NASL2 reference guide (to be found in libnasl/doc/)

1.3.3 :
. changes by Michel Arboi (arboi@alussinan.org)
- Implement bit xor, logical & aithmetic right shift, power
- Fix operator precedence
- Added new NASL functions
. changes by Renaud Deraison (deraison@cvs.nessus.org)
- The plugin texts are not loaded in memory any more, thus reducing
  the consumption of the nessus daemon of two megs. This also speeds up
  the loading of nessusd.
- Fixed a bug in the plugins scheduler (if optimizations were enabled,
  the scan would sometime hang)
- Added a new NASL function (int())
- Fixed strings substraction to handle null values properly
- find_services.nes runs in parallel mode, for improved speed
- new plugin (synscan) which should perform well against firewalled
  hosts (computes the RTT before the scan)

1.3.2 :
. changes by Renaud Deraison (deraison@cvs.nessus.org)
- Added fixes so that nessus-core/nessusd/pluginscheduler.c compiles with
  the latest version of GCC
- Fixed a bug in nessus-libraries/libnessus/bpf_share.c : a timer would not
  be reset, causing plugins which call bpf_next() to sometimes crash
- Set the timer of bpf_share.c to a much lower value, thus making it work
  much better
- Improved tcp_ping()
- Fixed two bugs in the plugins scheduler :
	- If the option "enable dependencies at runtime" is set,
	  it would enable ALL the plugins which are depended on, instead
	  of only those we use ;
	- In some cases, it may terminate too early, thus preventing a scan
	  from being complete
- DESTDIR support

1.3.1 :
. changes by Renaud Deraison (deraison@cvs.nessus.org)
- Rewrote the plugins scheduler (which determines the order in which
  the plugins are to be launched). The new one is much more efficient
  but as a result, it is not possible to accurately determine the
  order in which the plugins will be ran, so the 'plugin name' in
  the client is now totally bogus
- Fixed various issues with NASL scripts so that they work better
  with NASL2
- Fixed bugs relative to the creation of icmp and udp packets in nasl
- Fixed some fatal bugs in the bpf sharer
- NASL scripts do not read /dev/urandom any more, and use time() as a
  random seed instead. As a result, the loading and execution of nasl
  scripts if faster on systems where /dev/urandom can be blocking
- Fixed the tcp NIDS evasion techniques on BSD systems
- Full support for Bugtraq IDs
- The HTML reports add links for URLs, and show the ID number of
  the plugin that issues the report.
- Speed up the calls to arg_get_value() by using a hash of the name
  being searched for.
- Changed the licence of NASL2 to the GPLv2 (with the consent of Michel Arboi)
. changes by Michel Arboi (arboi@alussinan.org)
- Better handling of the arrays in NASL2
. changes by Erik Anderson (eanders@carmichaelsecurity.com)
- CVE and bugtraq cross references
. changes by Jay (jay@kinetic.org)
- Fixed multiple typos in the plugins
. changes by Javier Fernandez-Sanguino (jfernandez@germinus.com)
- Nessus now ships Hydra 2.2
- Fixed various compilation scritps (see bug#63)

1.3.0 :
. changes by Michel Arboi (arboi@alussinan.org)
- Use our own nessus-services file (re-generated at first start to include
  /etc/services and nmap-services)
- Added new families of plugins (ACT_KILL_HOST and ACT_END)
- Rewrote libnasl
. changes by Renaud Deraison (deraison@cvs.nessus.org)
- The 'cancel' button of several file selection dialogs is now working
- Optimized several plugins :
	- Web-related checks now use http_recv() instead of recv()
	- open_priv_sock_tcp() has a lower timeout
	- RPC related checks now use get_rpc_port(), a function equivalent
	  to libc's getrpcport() but with a much smaller timeout
	- Decreased the default value of checks_read_timeout from 15 to 5
- Fixed a bug in the plugin selection GUI which would not refresh
  the list of plugins of a given family properly (bug#3)
- Fixed memory leaks in NASL
- Fixed a bug in nessusd which would make it leak memory when receiving a SIGHUP
  (bug#10)
- Fixed a compatibility problem with Nmap 3.10ALPHA (bug#11)
- Nessus now accepts nmap's U: and T: notation for the port range (bug#5)
- Helped Michel Arboi to give the last touches to the new libnasl
. changes by Erik Anderson (eanders@pobox.com)
- Added CVE and BID links, added urls and removed dead links from the plugins
. changes by Michel Scheidell (scheidell@secnap.net)
- Improved several SMB-related checks
. changes by Rodolfo Baader (rbaader@activesec.biz)
- Quotes and apostrophes are properly escaped in the XML output report
2003-06-09 17:01:24 +00:00
wiz
8e2a418ba6 Fix typo, reported by yaranaika in PR 21825. 2003-06-09 09:36:20 +00:00
abs
06c139310f Update:
net/mrstat:      1.19
 security/msu:    1.06
 security/msudir: 0.13
Do not unconditionally set CFLAGS'.
2003-06-06 17:09:05 +00:00
jmc
10388433ef Sync up library versions 2003-06-06 15:14:04 +00:00
jmc
26b69ab63a Sync up with reality 2003-06-06 15:10:38 +00:00
jschauma
a443e2a36f It's tcp_wrapper_s_. 2003-06-06 03:16:23 +00:00
seb
d3b33181ee Claim stewardship of these. 2003-06-03 09:39:00 +00:00
abs
0de8869fb4 Use mk/gcc.buildlink2.mk rather than gcc/buildlink2.mk so lang/gcc3
is accepted. Suggested by Grant.
2003-06-02 14:05:00 +00:00
jschauma
e366d0c694 Use tech-pkg@ in favor of packages@ as MAINTAINER for orphaned packages.
Should anybody feel like they could be the maintainer for any of thewe packages,
please adjust.
2003-06-02 01:15:31 +00:00
jmmv
6fdf05cc93 Depend on (at least) version 1.2 of gnome{,1,2}-dirs to automatically handle
the shared share/mime-info directory.  Bump PKGREVISION.
2003-05-30 16:19:50 +00:00
jmmv
f0be21d4d7 Update to 0.7.3:
Changes in 0.7.3:
* More key loading optimizations
* Import and Export dialogs now use the clipboard instead of a text view
* Nautilus component that provides a context menu for crypto operations
* Removed Tools menu in favor of nautilus component
* PGP gconf schemas in /desktop/pgp
* Depends on gnome-mime-data for mime types
* Widgets no longer insensitive during progress operations
* Key edit dialogs are key modal so operations do not conflict
* Can do concurrent operations, except for editing the same key
* Can sign, export, and delete multiple keys
* Export dialog has a default filename
* Control center capplet for configuring pgp
* Can select keys & do operations while keys are loading

Changes in 0.7.2:
* GConf notification for preferences and ui settings
* More gnome preferences
* More listing improvements and optimizations for large key rings
* Key properties now a property window
* Owner trust values are restricted based on key type
* Key manager toolbar preferences
* General interface updates
* Nicer passphrase entry dialog
* Nicer change passphrase dialog
* More columns available in key-manager, can customize which ones are shown,
  and each column is sortable
* Main window not completely insensitive during progress and startup
* Key Properties shows a formatted fingerprint, tabs are scrollable
* Recipients allows multiple selection, has statusbars to show number selected
* Can expand and collapse all rows in key-manager
2003-05-30 15:25:08 +00:00
jmmv
ba5542bd0a Update to 0.7.1:
* Changed File menu to Key menu
* Added context menu for keys
* Added buttons/menu items for possible, but not-yet-implemented features
* Sign an entire key
* Add a revoker to a key
* Bug fix when setting Ascii Armor Preferences
* Removed File Manager, replaced with file operations in Tools
* Key pairs initially listed first
* Performance improvements with large key rings, especially in loading
  preferences
* Progress display at startup for listing of keys
* Can delete subkeys of non key-pairs
* General interface cleanups
2003-05-27 17:17:38 +00:00
jmmv
85f2f1f1e1 Add trailing slash to HOMEPAGE. 2003-05-27 15:50:04 +00:00
martti
c98e995c23 Updated cyrus-sasl to 2.1.13
* several bug fixes

Approved by chris.
2003-05-26 06:53:08 +00:00
martti
50560f96fa Updated cyrus-sasl to 2.1.13
* several bug fixes

Approved by chris.
2003-05-26 06:53:07 +00:00
heinz
8bec230b24 Update p5-IO-Socket-SSL to version 0.92.
From the change log:
  - Changed the fileno() function to support returning the fileno
    of server sockets.  (Problem found by Roland Giersig
    <RGiersig at cpan org>).
  - Fixed SSL_version incorrectly defaulting to SSLv2 (patch from
    Roland Alder <roland.alder at celeris ch>).
2003-05-25 02:20:25 +00:00
wiz
2819934830 Some improvements from Jeremy C. Reed via PR 20892:
- improved DESCRiption (and spelling fixed)
 - more MASTER_SITES
 - improved COMMENT
 - variable for enabling --with-libcrack
 - install limits.conf if under Linux
 - make sure it doesn't have an interactive configuration
2003-05-22 14:36:06 +00:00
wiz
105157900a Match v1.16 of rc.d/sshd:
Don't assume that $0 is this script.
Remove a directory check since we check for a file in the directory anyway.
Closes PR 21353 by Jeremy C. Reed.
2003-05-22 09:05:38 +00:00
wiz
075e7d52b2 s/make/${MAKE}/; make Makefiles more portable.
From Jeremy C. Reed in PR 20843.
2003-05-22 07:30:14 +00:00
seb
cef8d73c43 Update to version 1.15.
The directory ${PKGVULNDIR)} holding the 'vulnerabilities' file
which default value is determined at configure time can now be
overridden at runtime from the environment.

As a side effect the strings substituted at configure time in
files/{audit-packages,download-vulnerability-list} are now of the
form '@VAR@' and not '${VAR}'.
2003-05-21 14:07:45 +00:00
yyamano
996fb65889 Update pgpdump to 0.18. approved by jun.
* Supporting MacOS X.
* Catching up to 2440bis-07.
* A bug fix of old_Public_Key_Packet.
2003-05-20 16:40:13 +00:00
wiz
b2fde2b390 Don't reference an include file that has not been installed yet
and uses the correct HAVE_GETSPNAM.
From Jeremy C. Reed in PR 21413.
2003-05-16 17:30:58 +00:00
wiz
b263414622 Add freebsd specific parts. From Marc Recht in PR 21573. 2003-05-14 12:07:45 +00:00
salo
7549f23b35 Add gnutls, libasn1 and opencdk. 2003-05-14 03:49:59 +00:00
salo
2dfa58d4d7 Import of gnutls-0.8.7: GNU Transport Layer Security library.
GnuTLS is a portable ANSI C based library which implements the TLS 1.0 and SSL
3.0 protocols. The library does not include any patented algorithms and is
available under the GNU Lesser GPL license.

Important features of the GnuTLS library include:
- Thread safety
- Support for both TLS 1.0 and SSL 3.0 protocols
- Support for both X.509 and OpenPGP certificates
- Support for basic parsing and verification of certificates
- Support for SRP for TLS authentication
- Support for TLS Extension mechanism
- Support for TLS Compression Methods

Additionaly GnuTLS provides an emulation API for the widely used OpenSSL
library, to ease integration with existing applications.

Package provided by Juan RP via pkgsrc-wip with modifications by me.
2003-05-14 03:46:44 +00:00
salo
9f0223d75e Import of libtasn1-0.2.4: ASN.1 structure parser library.
libtasn1 library was developed for ASN1 (Abstract Syntax Notation One)
structures management.

The main features of this library are:
- on-line ASN1 structure management that does
  not require any C code file generation;
- off-line ASN1 structure management with C code
  file generation containing an array;
- DER (Distinguish Encoding Rules) encoding;
- no limits for INTEGER and ENUMERATED values

Package provided bu Juan RP via pkgsrc-wip with some modifications by me.
2003-05-14 03:23:43 +00:00
salo
2e172b9dcb wip->security. 2003-05-14 03:17:22 +00:00
salo
436cec638b Import of opencdk-0.4.5: Open Crypto Development Kit.
OpenCDK (Open Crypto Development Kit) provides basic parts of the OpenPGP
message format.  The aim of the library is *not* to replace any available
OpenPGP version.  There will be no real support for key management (sign,
revoke, alter preferences, ...) and some other parts are only rudimentary
available.  The main purpose is to handle and understand OpenPGP packets and
to use basic operations.  For example to encrypt/decrypt or to sign/verify
and packet routines.

Provided by Juan RP via pkgsrc-wip with some modifications by me.
2003-05-14 03:16:23 +00:00
salo
4197dd0335 Updated to version 1.1.12.
Based on a patch sent by Juan RP via PR pkg/21559.

Changes:

- DESCR has 80 columns
- style nits

1.1.12:
=======
- gcry_pk_sign, gcry_pk_verify and gcry_pk_encrypt can now handle an optional
  pkcs1 flags parameter in the S-expression.  A similar flag may be passed to
  gcry_pk_decrypt but it is only syntactically implemented.
- New convenience macro gcry_md_get_asnoid.
- There is now some real stuff in the manual.
2003-05-13 03:07:10 +00:00
salo
909e75a128 Update to version 20021111.1.
Based on a patch sent by Hiramatsu Yoshifumi via PR pkg/21540.

Changes:

- fix all installed scripts
- simplify installation
- DESCR has 80 columns
- style nits

20021111.1:
===========
- alerts with original packet included now have both sets of ports and first
  set of IPs as links
- added -obfuscateip option to change the IP addresses in alerts to randomly
  (but consistently) chosen alternates (not presently available for database
  input)
- Updated parsing for Snort 1.9.0 full alert files
- new-style Spade reports now processed (Spade version 021008.1 and on)
- spp_portscan2 log files now processed (these entries are displayed somewhat
  prettified)
- updated linking to ICMP log files; this involved updates for new ICMP header
  format in Snort 1.9.0
- more robust recognition of non-packet alerts in different formats(these get
  ignored)
- clarified warning about unknown ICMP type text and added repeat warning
  suppression (you'll now only get a warning about a particular string twice)
- SnortSnarf will now ignore lines beginning with '#' between alerts, so you
  can use that to begin a comment
2003-05-13 00:27:48 +00:00
seb
ddffb20feb Add&enable ssh2-nox11. 2003-05-10 10:07:12 +00:00
seb
2ae8af08a0 Initial import of ssh2-nox11 into the NetBSD Packages Collection.
This package provides the same secure shell software as the ssh2 package but
without X Windows support.
2003-05-10 10:05:50 +00:00
seb
d9dcfe77ab Pave the way for bits sharing with the upcoming ssh2-nox11 package. 2003-05-10 10:02:34 +00:00
wiz
164b721135 Update to 1.6.7p5:
509) Fixed a typo that caused a compilation error on Heimdal.
510) Darwin (MacOS X) doesn't have a real setreuid() system call.
511) Fixed a problem with large numbers of environment variables.
2003-05-09 08:29:14 +00:00
jwise
73357897ce Add patch from lha@netbsd.org to fix build when KERBEROS == 5. 2003-05-08 18:08:38 +00:00
itojun
d02e2eeda9 fix checksum for USE_IDEA case 2003-05-07 08:26:10 +00:00
jmmv
f1446ddf2b Drop trailing whitespace. Ok'ed by wiz. 2003-05-06 17:40:18 +00:00
tron
222245a6b7 Remove dead mirrors, add a new one. 2003-05-06 15:57:03 +00:00
tron
c8fd9ebd01 Fix some of the master site URLs so that the "fetch" target works at
least particually.
2003-05-06 15:48:24 +00:00
jmmv
8a555528c0 PKGREVISION goes after PKGNAME. 2003-05-05 19:05:05 +00:00
jmmv
2420155ea1 Line up PKGREVISION whitespace. 2003-05-05 16:40:38 +00:00
taca
c6eac1cc9d Update gnupg package to 1.2.2.
Security problem is reported on bugtraq.

http://www.securityfocus.com/archive/1/320444/2003-05-02/2003-05-08/0


2003-05-01  Werner Koch  <wk@gnupg.org>

	Released 1.2.2.

2003-04-30  David Shaw  <dshaw@jabberwocky.com>

	* NEWS: Note trust bug fix.

2003-04-29  David Shaw  <dshaw@jabberwocky.com>

	* NEWS: Add note about TIGER being dropped from OpenPGP.

	* README: Add note about the HP/UX inline problem.  Fix all URLs
	to point to the right place in the reorganized gnupg.org web
	pages.  Some minor language fixes.

2003-04-27  David Shaw  <dshaw@jabberwocky.com>

	* NEWS: Add sig version, pk algo, hash algo, and sig class to
	VALIDSIG.

	* BUGS: Fix bug reporting URL.

2003-04-24  Werner Koch  <wk@gnupg.org>

	* configure.ac (ALL_LINGUAS): Added Hungarian translation by Nagy
	Ferenc László.

2003-04-23  David Shaw  <dshaw@jabberwocky.com>

	* configure.ac: "TIGER" -> "TIGER/192".

	* README: Put back proper copyright line.

2003-04-16  Werner Koch  <wk@gnupg.org>

	Released 1.2.2rc2.

2003-04-15  Werner Koch  <wk@gnupg.org>

	* configure.ac (ALL_LINGUAS): Add Slovak translation.

	* configure.ac (HAVE_DOSISH_SYSTEM): New automake conditional.

	* acinclude.m4 (GNUPG_CHECK_ENDIAN): Fixed quoting of r.e. using
	quadrigraphs.

2003-04-08  David Shaw  <dshaw@jabberwocky.com>

	* configure.ac: Big warning that TIGER is being removed from the
	standard.

2003-04-08  Werner Koch  <wk@gnupg.org>

	* Makefile.am (EXTRA_DIST): Add autogen.sh wrapper which is
	useful for some cross-compiling targets.

2003-04-07  David Shaw  <dshaw@jabberwocky.com>

	* acinclude.m4: Fix URL to faqprog.pl.

	* README: Add --enable-sha512 switch and update version number and
	copyright date.

	* NEWS: Add note about SHA-256/384/512.

2003-03-24  Werner Koch  <wk@gnupg.org>

	* configure.ac: Test for ranlib and ar.

2003-03-12  Werner Koch  <wk@gnupg.org>

	* acinclude.m4 (GNUPG_CHECK_ENDIAN): When crosscompiling assume
	little only for Intel CPUs.

2003-02-19  David Shaw  <dshaw@jabberwocky.com>

	* configure.ac: Define @CAPLIBS@ to link in -lcap if we are using
	capabilities.

2003-02-11  David Shaw  <dshaw@jabberwocky.com>

	* configure.ac: Add --enable-sha512 switch to add SHA384/512
	support.

2003-02-06  David Shaw  <dshaw@jabberwocky.com>

	* configure.ac: Do not set GNUPG_LIBEXECDIR in ./configure, so
	that makefiles can override it.

2003-02-02  David Shaw  <dshaw@jabberwocky.com>

	* configure.ac (ALL_LINGUAS): Needs to be on one line to avoid
	problems during ./configure.

	* NEWS: Note new --with-colons disabled key flag and new "revuid"
	command.

2003-01-07  Werner Koch  <wk@gnupg.org>

        Released 1.2.2rc1.

	* configure.ac (ALL_LINGUAS): Added fi and zh_TW.

2003-01-06  David Shaw  <dshaw@jabberwocky.com>

	* NEWS: Add notes about disabled keys and trustdb tweaks.

2002-12-04  David Shaw  <dshaw@jabberwocky.com>

	* NEWS: Add note about convert-from-106 script.

2002-11-25  David Shaw  <dshaw@jabberwocky.com>

	* NEWS: Add notes about notation names and '@', the "--trust-model
	always" option, and non-optimized memory wiping.

2002-11-09  Werner Koch  <wk@gnupg.org>

	* configure.ac: Check for ctermid().

2002-10-31  David Shaw  <dshaw@jabberwocky.com>

	* Makefile.am: Put gnupg.spec in the root directory so rpm -ta
	works.

	* configure.ac: Add a check for volatile.
2003-05-05 16:33:46 +00:00
jmmv
ba64a08666 Do not let the program's Makefile directly install the sudoers file under
PKG_SYSCONFDIR.  This is already done by bsd.pkg.install.mk in a better way.
2003-05-03 18:27:46 +00:00
cjep
fe926affc4 Whitespace fix 2003-05-03 12:00:10 +00:00
wiz
3676a04f27 Convert to buildlink2. 2003-05-02 14:15:35 +00:00
wiz
7166660e08 Dependency bumps, needed because of devel/pth's major bump, and related
dependency bumps.
2003-05-02 11:53:34 +00:00
jmmv
3b7463f403 Use tabs instead of spaces. 2003-05-01 21:48:40 +00:00
jmmv
22a8b06e36 Honour PKG_SYSCONFDIR. Bump PKGREVISION to 1. 2003-05-01 21:47:42 +00:00
jmmv
30a0bb1cf5 Replace spaces with tabs. 2003-05-01 21:33:19 +00:00