summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2002-08-05update to the latest citrix_ica client. The current versions are:dmcmahill9-70/+88
i386: citrix_ica-6.30.1050 sparc: citrix_ica-6.20.985 Update provided in PR pkg/17192 by Murray Armfield. Submitter could not find an update list to the client program but noticed the following changes: - Auto reconnect option - Smart card logons - proxy/firewall configuration changes, now takes https and netscape settings for firewall.
2002-08-05rmdir some directories on @unexeczuntum1-1/+3
2002-08-05Use more sane defaults for config file location, logdir, and dbhome.zuntum1-8/+4
2002-08-04exec gconftool-1 while pkg_add as make install does.taya1-1/+2
2002-08-04Make this work on platforms that don't have any base system "openssl",fredb1-8/+7
includes (i.e NetBSD-1.4.3). Problem pointed out by Amitai Schlair.
2002-08-04Update to 5.13, provided by the author and maintainer.wiz4-723/+7
changes since bozohttpd 5.12: o support .mp3 files (type audio/mpeg) o use stat() to find out if something is a directory, for -X mode changes since bozohttpd 5.11: o constification o fixes & enhancements for directory index mode (-X)
2002-08-04Fix build on xpkgwedged systems and some others.wiz3-3/+33
2002-08-04update to jhead-1.8.jdolecek2-9/+9
changes: - Ignore undefined bits of "flash used" tag, as cannon sets them nonzero, causing jhead to indicate flash used when it wasn't with some Canon models. - Automatic rotation using jpegtran & clear rotation element - Option to put a file in as comments (as opposed to edit file) This adresses pkg/17816 by Eric Jacoboni
2002-08-04Add patch to make this compilable with 1.6 (tested with i386),.jdolecek3-3/+22
enable for NetBSD-* This fixes pkg/16450 by Jan Schaumann.
2002-08-04make shorterjdolecek1-4/+1
2002-08-04update checksum for patch-acjdolecek1-2/+2
2002-08-04add RCS Id tagjdolecek1-0/+2
2002-08-04fix \ botch - need double \ to get the the \ properly generatedjdolecek1-2/+2
in wrapper script
2002-08-04add PSIjdolecek1-1/+2
2002-08-04PSI 0.8.6 - advanced graphical Jabber instant messaging clientjdolecek8-0/+353
Jabber is an open, XML based Instant Messaging system that seeks to be the standard IM network. It is a distributed system, created from the ground up, not relying upon central servers. Thus, anyone can run a server, and they are all interoperable. For assistance with migrating users to Jabber, many servers feature transports for interoperating with other IM systems. Features: * Message (ICQ-style) and Chat (AIM-style) modes * Drag and drop to send to multiple contacts * Full Unicode support * Secure connections * Saving contact list locally, and server sync on login * Icon Themes * Agent registration and searching * Retrieving and updating User Info * Sound support for incoming events * Auto-away after a configurable amount of time * Tray/dock icon for KDE/GNOME environments * Language plugins
2002-08-04add comment for the REPLACE_BUILDLINK_SED stuff - these QMAKE variablesjdolecek1-1/+3
seem to be working fine empty, but it may be eventually be problematic
2002-08-04add qmake, bump pkg revisionjdolecek2-3/+175
2002-08-04Add and enable bbappconfjschauma1-1/+2
2002-08-04Initial import of misc/bbappconf, a tool to configure certain aspects ofjschauma7-0/+200
an application under the Blackbox window manager, into pkgsrc using files provided by Anthony Mallet <anthony dot mallet at useless-ficus dot net> in PR pkg/17831 with minor modifications by myself.
2002-08-04Update openssl to 0.9.6e. This update fixes multiple vulnerabilities,fredb18-641/+502
and also changes the ABI of "libcrypto" and "libssl". (So the shared library majors and buildlink requirements are bumped, too.) The code base is now synced perfectly with NetBSD HEAD and netbsd-1-6 branches as of 2002-08-04, the optimization levels are reduced to "-O2", but I've retained some of the processor optimization flags and different code path #defines in the "Configure" script, just to keep things interesting. The default "certs" directory on NetBSD is now "/etc/openssl/certs", to give continuity to those who find themselves using the package system's "openssl" after upgrading a package that formerly used the base system's. [Suggested by itojun.] The best way to avoid such problems, however, is to upgrade your base system *first*. I'm making use of the new and improved build system as much as possible. This gives us a cleaner way to make shared libraries and real man pages, but loses many of the symlinks to the openssl binary. I've culled items from the "CHANGES" file that appear to have security implications or are particularly interesting for NetBSD users, below. My comments are marked off with '===>'. ===> This is from the netbsd-20020804-patch *) Fix ASN1 checks. Check for overflow by comparing with LONG_MAX and get fix the header length calculation. [Florian Weimer <Weimer@CERT.Uni-Stuttgart.DE>, Alon Kantor <alonk@checkpoint.com> (and others), Steve Henson] Changes between 0.9.6d and 0.9.6e [30 Jul 2002] *) New option SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS for disabling the SSL 3.0/TLS 1.0 CBC vulnerability countermeasure that was added in OpenSSL 0.9.6d. As the countermeasure turned out to be incompatible with some broken SSL implementations, the new option is part of SSL_OP_ALL. SSL_OP_ALL is usually employed when compatibility with weird SSL implementations is desired (e.g. '-bugs' option to 's_client' and 's_server'), so the new option is automatically set in many applications. [Bodo Moeller] *) Changes in security patch: Changes marked "(CHATS)" were sponsored by the Defense Advanced Research Projects Agency (DARPA) and Air Force Research Laboratory, Air Force Materiel Command, USAF, under agreement number F30602-01-2-0537. *) Add various sanity checks to asn1_get_length() to reject the ASN1 length bytes if they exceed sizeof(long), will appear negative or the content length exceeds the length of the supplied buffer. [Steve Henson, Adi Stav <stav@mercury.co.il>, James Yonan <jim@ntlp.com>] *) Assertions for various potential buffer overflows, not known to happen in practice. [Ben Laurie (CHATS)] *) Various temporary buffers to hold ASCII versions of integers were too small for 64 bit platforms. (CAN-2002-0655) [Matthew Byng-Maddick <mbm@aldigital.co.uk> and Ben Laurie (CHATS)> *) Remote buffer overflow in SSL3 protocol - an attacker could supply an oversized session ID to a client. (CAN-2002-0656) [Ben Laurie (CHATS)] *) Remote buffer overflow in SSL2 protocol - an attacker could supply an oversized client master key. (CAN-2002-0656) [Ben Laurie (CHATS)] Changes between 0.9.6c and 0.9.6d [9 May 2002] *) Implement a countermeasure against a vulnerability recently found in CBC ciphersuites in SSL 3.0/TLS 1.0: Send an empty fragment before application data chunks to avoid the use of known IVs with data potentially chosen by the attacker. [Bodo Moeller] Changes between 0.9.6a and 0.9.6b [9 Jul 2001] *) Change ssleay_rand_bytes (crypto/rand/md_rand.c) to avoid a SSLeay/OpenSSL PRNG weakness pointed out by Markku-Juhani O. Saarinen <markku-juhani.saarinen@nokia.com>: PRNG state recovery was possible based on the output of one PRNG request appropriately sized to gain knowledge on 'md' followed by enough consecutive 1-byte PRNG requests to traverse all of 'state'. 1. When updating 'md_local' (the current thread's copy of 'md') during PRNG output generation, hash all of the previous 'md_local' value, not just the half used for PRNG output. 2. Make the number of bytes from 'state' included into the hash independent from the number of PRNG bytes requested. The first measure alone would be sufficient to avoid Markku-Juhani's attack. (Actually it had never occurred to me that the half of 'md_local' used for chaining was the half from which PRNG output bytes were taken -- I had always assumed that the secret half would be used.) The second measure makes sure that additional data from 'state' is never mixed into 'md_local' in small portions; this heuristically further strengthens the PRNG. [Bodo Moeller] *) The countermeasure against Bleichbacher's attack on PKCS #1 v1.5 RSA encryption was accidentally removed in s3_srvr.c in OpenSSL 0.9.5 when fixing the server behaviour for backwards-compatible 'client hello' messages. (Note that the attack is impractical against SSL 3.0 and TLS 1.0 anyway because length and version checking means that the probability of guessing a valid ciphertext is around 2^-40; see section 5 in Bleichenbacher's CRYPTO '98 paper.) Before 0.9.5, the countermeasure (hide the error by generating a random 'decryption result') did not work properly because ERR_clear_error() was missing, meaning that SSL_get_error() would detect the supposedly ignored error. Both problems are now fixed. [Bodo Moeller] Changes between 0.9.6 and 0.9.6a [5 Apr 2001] ===> This is our ABI change. *) Rename 'des_encrypt' to 'des_encrypt1'. This avoids the clashes with des_encrypt() defined on some operating systems, like Solaris and UnixWare. [Richard Levitte] *) Don't use getenv in library functions when run as setuid/setgid. New function OPENSSL_issetugid(). [Ulf Moeller] *) Store verify_result within SSL_SESSION also for client side to avoid potential security hole. (Re-used sessions on the client side always resulted in verify_result==X509_V_OK, not using the original result of the server certificate verification.) [Lutz Jaenicke] ===> package doesn't doesn't do this. We'll bump major versions ===> as necessary. *) Make sure that shared libraries get the internal name engine with the full version number and not just 0. This should mark the shared libraries as not backward compatible. Of course, this should be changed again when we can guarantee backward binary compatibility. [Richard Levitte] *) Rework the system to generate shared libraries: - Make note of the expected extension for the shared libraries and if there is a need for symbolic links from for example libcrypto.so.0 to libcrypto.so.0.9.7. There is extended info in Configure for that. - Make as few rebuilds of the shared libraries as possible. - Still avoid linking the OpenSSL programs with the shared libraries. - When installing, install the shared libraries separately from the static ones.
2002-08-04enable generation of message-ID and use of msg-id-cache.jschauma1-2/+3
ok'd by MAINTAINER mjl
2002-08-04Note possible problem with gre(4), as discussed on current-users.hubertf1-0/+7
2002-08-04Update nedit to 5.3mjl3-20/+10
New features: * The built-in Help system was revamped, a hyperlink mechanism was added for following cross-references * Enhanced Exuberant ctags support * Line numbers are available in shell commands * Goto Line also accepts column numbers * Automatic line-feed termination when saving is now optional * A customizable window title * Optional syntax based parenthesis matching (iso. purely character based) Fixed bugs: * Find Definition incorrectly reads the X selection when not needed * Background popup menu could lock up X-server when used with any of the lock keys on * Very wide windows when starting NEdit under fvwm * Workaround for illegal key bindings installed by other Motif applications, causing PageUp/PageDown and arrow keys to stop responding in NEdit. This is not an NEdit bug, it just looks like one * Fix for PageUp/PageDown keys not responding * Crash when running X on 2nd screen * Line number display updating in continous wrap mode * Performance problem with X Resources highlight patterns * Menu fonts showing up as blocks * Lockup's in syntax highlighting (especially Perl) * Crash when using characters with ASCII code >= 128 in syntax highlighting patterns * Crash when modifying tab distance in continous wrap mode * Crash when running NEdit in low-depth color modes * Continous wrap mode + variable width font display bugs * Potential scroll bar corruption in continuous wrap mode * Workaround for selection copy/paste problems with recent versions of gnome-terminal * Jump to tags only referenced by line number * Composed characters in learned sequence * Missing titles in some dialogs * Macro language: continue statement outside loop crash * Rectangular overstrike paste fixes * Hard-coded statistics line font * Open filenames starting with a dash * Crash when closing window of non-existing file while error dialog is up * Bad CapsLock grab on certain keyboard configurations * Replacements in rectangular selections could sometimes fail * Various buffer overflow fixes * Multiple selection dialog does not pop up on first find * Tag not found * Files opened with -read command line option could not be unlocked
2002-08-04add dependancy on graphics/xpm, as noted by kre in pkg/17830.grant1-1/+2
2002-08-04Fix dependence on "nmap" package.tron1-2/+2
2002-08-04add & enable squidGuardzuntum1-1/+2
2002-08-04Initial import of squidGuard-1.2.0zuntum5-0/+90
squidGuard is a combined filter, redirector and access controller plugin for Squid. It can be used to: * limit the web access for some users to a list of accepted/well known web servers and/or URLs only. * block access to some listed or blacklisted web servers and/or URLs for some users. * block access to URLs matching a list of regular expressions or words for some users. * enforce the use of domainnames/prohibit the use of IP address in URLs. * redirect blocked URLs to an "intelligent" CGI based info page. * redirect unregistered user to a registration form. * redirect popular downloads like Netscape, MSIE etc. to local copies. * redirect banners to an empty GIF. * have different access rules based on time of day, day of the week, date etc. * have different rules for different user groups. * and much more..
2002-08-04Add me as an Maintainer.veego1-2/+2
2002-08-04Build it also on Solaris.veego2-4/+7
Apply patch from pkg/17260, which should now work after the recent buildlink changes.
2002-08-04Remove lib/nessus/plugins_factory, which is in fact a directory andveego1-2/+1
later correctly used with the @dirrm prefix to be removed, but having a second one here cause some problems while removing the package.
2002-08-04ync packages with suse reality, correct distinfo.grant2-6/+7
pointed out by Thomas Klausner.
2002-08-04sync packages with suse reality, correct distinfo.grant6-20/+24
pointed out by Thomas Klausner.
2002-08-03Make this look slightly more aesthetic, whitespace-wise.jlam1-3/+1
2002-08-03Drop MAINTAINERship of devel/isect.jlam1-2/+2
2002-08-03Fix _JAVA_PKGBASE definition in "sun-jdk" case so that when used as ajlam1-3/+3
pattern with "pkg_info -e <pattern>", we can actually match a full package name.
2002-08-03Until this package is updated one more time from basesrc, provide a patchseb2-5/+14
for Solaris on FTP_CMD value in Makefile.inc. Fixed in revision 1.19 of basesrc/usr.sbin/pkg_install/Makefile.inc.
2002-08-03Rename apr-devel-0.20020725223645 to apr-0.20020725223645hubertf2-4/+4
2002-08-03since we override do-build target, we need to call ${_ULIMIT_CMD}jdolecek1-2/+2
explicitly, too
2002-08-03use /dev/urandom, from apache2 pkghubertf1-2/+5
2002-08-03add sparc PLIST and enable in Makefile. Also change the check to lookdmcmahill2-5/+38
for a compat_svr4 setup rather than compat_sunos as its a solaris-2.6 binary. Finally, add a mirror site.
2002-08-03Update aterm to aterm-0.4.2nb2: work around problem withhubertf3-3/+29
lockup in select() Patch submitted by Christian Biere <ChristianBiere@gmx.de> in PR 17745
2002-08-03nmapfe is now part of nmap, so use that sources (nmapfe version ishubertf4-24/+20
still 0.9.5, so no changes there). Also install manpage for frontend.
2002-08-03pull critical patches in from zebra cvs repo (i have been asking for releaseitojun15-2/+307
of 0.93b, however, it's not happening yet) - bgpd: bug in capability negotiation - ospf6d: synchronize with zebra deamon correctly
2002-08-03Update nmap to 3.00. Changes:hubertf9-95/+60
* Added protocol scan (-sO), which determines what IP protocols (TCP, IGMP, GRE, UDP, ICMP, etc) are supported by a given host. This uses a clever technique designed and implemented by Gerhard Rieger . * Nmap now recognizes more than 700 operating system versions and network devices (printers, webcams, routers, etc) thanks to thousands of contributions from the user community! Many operating systems were even recognized by Nmap prior to their official release. Nmap3 also recognizes 2148 port assignments, 451 SunRPC services, and 144 IP protocols. * Added Idlescan (-sI), which bounces the scan off a "zombie" machine. This can be used to bypass certain (poorly configured) firewalls and packet filters. In addition, this is the most stealthy Nmap scan mode, as no packets are sent to the target from your true IP address. * The base Nmap package now builds and functions under Windows! It is distributed in three forms: build-it-yourself source code, a simple command-line package, or along with a nice GUI interface (NmapWin) and a fancy installer. This is due to the hard work of Ryan Permeh (from eEye), Andy Lutomirski, and Jens Vogt. * Mac OS X is now supported, as well as the latest versions of Linux, OpenBSD, Solaris, FreeBSD, and most other UNIX platforms. Nmap has also been ported to several handheld devices -- see the Related Projects page for further information. * XML output (-oX) is now available for smooth interoperability between Nmap and other tools. * Added ICMP Timestamp and Netmask ping types (-PP and -PM). These (especially timestamp) can be useful against some hosts that do not respond to normal ping (-PI) packets. Nmap still allows TCP "ping" as well. * Nmap can now detect the uptime of many hosts when the OS Scan option (-O) is used. * Several new tests have been added to make OS detection more accurate and provide more granular version information. * Removed 128.210.*.* addresses from Nmap man page examples due to complaints from Purdue security staff. * The --data_length option was added, allowing for longer probe packets. Among other uses, this defeats certain simplistic IDS signatures. * You can now specify distinct port UDP and TCP port numbers in a single scan command using a command like 'nmap -sSU -p U:53,111,137,T:21-25,80,139,515,6000,8080 target.com'. See the man page for more usage info. * Added mysterious, undocumented --scanflags and --fuzzy options. * Nmap now provides IPID as well as TCP ISN sequence predictability reports if you use -v and -O. * SYN scan is now the default scan type for privileged (root) users. This is usually offers greater performance while reducing network traffic. * Capitalized all references to God in error messages. * Added List scan (-sL) which enumerates targets without scanning them. * The Nmap "random IP" scanning mode is now smart enough to skip many unallocated netblocks. * Tons of more minor features, bugfixes, and portability enhancements.
2002-08-03add net/wistumbler. PR 17819itojun1-1/+2
2002-08-03wistumbler, network stumbler for wi* interfaceitojun4-0/+25
2002-08-03add & enable subversionhubertf1-1/+2
2002-08-03Add subversion-0.2667: Version control system, meant to replace CVShubertf8-0/+231
The goal of the Subversion project is to build a version control system that is a compelling replacement for CVS in the open source community. The software is released under an Apache/BSD-style open source license. Submitted by Joel Wilsson <joelw@unix.se> in PR 17813.
2002-08-03add & enable apr-develhubertf1-1/+2
2002-08-03Add apr-devel-0.20020725223645: Apache Portable Run-time, a system ↵hubertf4-0/+66
portability layer The Apache Portable Run-time mission is to provide a library of routines that allows programmers to write a program once and be able to compile it anywhere. Submitted by Joel Wilsson <joelw@unix.se> in PR 17811.