summaryrefslogtreecommitdiff
path: root/net
AgeCommit message (Collapse)AuthorFilesLines
2016-07-21Depend on latest libfilezilla to fix ftp support.wiz1-2/+3
Bump PKGREVISION. Necessary since libfilezilla is static on at least some platforms, like NetBSD.
2016-07-21Add two patches from upstream that fix wide character support.wiz4-2/+143
In particular, this fixes ftp mode. Investigated with upstream by richard@, thank you very much! Bump PKGREVISION.
2016-07-21Updated p5-Socket6 to 0.28.wiz2-9/+7
2016-07-11 Hajimu UMEMOTO <ume@mahoroba.org> * Socket6.pm: Bump version number to 0.28. * aclocal.m4 (IPv6_CHECK_INET_NTOP): inet_ntop(3) may returns IPv4-compatible IPv6 address. [cpan #113950] Submitted by: Andrew Galante <spock128 [...] gmail.com>
2016-07-20(pkgsrc)mef2-8/+12
- Added following packages on BUILD_DEPENDS for make test p5-DateTime-Format-DateParse-[0-9]*:../../time/p5-DateTime-Format-DateParse p5-DateTime-[0-9]*:../../time/p5-DateTime p5-CGI-[0-9]*:../../www/p5-CGI (upstream) - Updated net/p5-RT-Client-REST to 0.50 --------------------------------------- 0.50 Fri Dec 11 2015 "Sarvesh Das" <sarveshd@opmbx.org> - Added the 'disabled' attribute to RT::Client::REST::Group and RT::Client::REST::Queue to match the addition in RT 4.2.2 -- commit 7557633. Thanks Tom. - Allow a trailing forward slash in the server URI -- RT#97621. Thanks Marco Pessotto. - Tests in 82-stringify.t are skipped with LWP::UserAgent 6.04 which has buggy read timeout -- commit da577af. Thanks Marco Pessotto. - Fixed warning `Unescaped left brace in regex is deprecated' in perl 5.22 -- RT#106795. Thanks Mike Andrews. - Fixed documentation for RT::Client:REST::search() in POD -- RT#98160. - Removed MYMETA* files from distribution -- RT#108083
2016-07-19Update filezilla to 3.19.0.wiz2-7/+8
3.19.0 (2016-06-27) + Building FileZilla now depends on libfilezilla >= 0.5.3 (https://lib.filezilla-project.org/). - Fixed context menu in search dialog if not connected to server - OS X, *nix: Fix displayed text in file list status bar if selecting a single item in the file list out of multiple already selected items 3.19.0-rc1 (2016-06-20) + In the Site Manager a background colour for sites can now be selected + Open tabs can be re-arranged using drag&drop - Fixed copying URLs of multiple selected files to clipboard - Setting remote file timestamps did not take timezone offsets configured through the Site Manager into account 3.18.0 (2016-05-27) - Small fixes to local file search - Fixed a regression introduced in 3.18.0-rc1 when formatting hostnames for display 3.18.0-rc1 (2016-05-20) + The search functionality can now also be used to search local files + Reduced CPU consumption of adding files to the list of search results + Opening the remote context menu while holding shift allows copying URLs to clipboard that include the password + Added an option to the configuration file through which initiating drag&drop can be disallowed + Reduced memory footprint of some data structures + Building FileZilla now depends on libfilezilla >= 0.5.2 (https://lib.filezilla-project.org/). - The remote file list context menu no longer shows inapplicable entries while files are being added to queue - Fix date validation in filter and search conditions 3.17.0.1 (2016-05-09) ! MSW: Quoted the path to the uninstaller when executed from the installer to prevent an attacker from tricking the installer into running some other program instead - SFTP: Fixed resuming SFTP transfers - MSW: Loading the system default locale no longer fails on systems that have any English locale installed, yet do not have the US-English locale installed - Fixed crash if update dialog is opened at the very same moment FileZilla is being closed.
2016-07-19Update libfilezilla to 0.5.3:wiz3-56/+7
2016-06-20 - libfilezilla 0.5.3 released New features: Add fz::replace_substrincs to search and replace substrings in std::(w)string Bugfixes and minor changes: Explicitly request large file support on 32bit systems 2016-05-20 - libfilezilla 0.5.2 released New features: Add fz::shared_optional::is_same that checks whether two instances share the same underlying pointer value, like a shallow equal. Add fz::int_to_hex_char as reverse to fz::hex_char_to_int 2016-05-09 - libfilezilla 0.5.1 released New features: Add constructore to sparse_optional taking pointers Bugfixes and minor changes: Fix compilation on systems where iconv's second argument is const
2016-07-19Update pear-Net_URL2 to 2.2.1.taca2-7/+7
Summary from commit log: * Fix: Correct case of method call name * Fix: Correct earlier regex delimiter Remove superfluous character from character class that was previously needed as the at-symbol ("@") was used as pattern delimiter. Ref: fca283a
2016-07-19Update pear-Net_LDAP3 to 1.0.5.taca2-7/+7
Summary from commit log: * Fix find_domain() result when domain wasn't found (#4959) * Support %s variable in 'domain_filter' config option Resolves T135 * Don't execute LDAP queries for domains if domain_base_dn is not configured * fixing recursive deletion of domains Summary: recursive deletion: need to find and delete objects with objectclass ldapsubentry as well (#5100). This is for example needed when deleting a domain, for the role kolab-admin which has class ldapsubentry Reviewers: vanmeeuwen, #web_administration_panel_developers Reviewed By: vanmeeuwen, #web_administration_panel_developers Subscribers: machniak, vanmeeuwen Differential Revision: https://git.kolab.org/D23 * Unify some error, warning and debug messages feb73bc6 Browse Files * Ensure that multi-valued attributes have sequential indexes in the array * Remove unused variable, remove @ on ldap_add(), this may print useful warnings that are not related to ldap connection * Fix ldap_sort() deprecation warning in PHP7 (T1107) * Fix bug where LDAP_OPT_DEBUG_LEVEL option couldn't have been disabled (#4918) * Add .arcconfig 099bac48 Browse Files * Fix package names to conform with packagist's naming policies Summary: This change will allow the package to be submitted to packagist.org for easy installation via Composer. Reviewers: vanmeeuwen, machniak Reviewed By: machniak Subscribers: bruederli Differential Revision: https://git.kolab.org/D121
2016-07-19Update pear-Net_LDAP2 to 2.2.0.taca3-12/+15
Changelog: * Fix bug #20969: Fatal error with PEAR 1.10.0 / constructor visiblity * Add support for PHP 7 * Improve unit tests
2016-07-19Update bind910 to 9.10.4pl2 (BIND 9.10.4-P2).taca4-16/+17
Changes from 9.10.3-P4 to 9.10.4 are too many to write here, please refer CHANGES file. --- 9.10.4-P2 released --- 4406. [bug] getrrsetbyname with a non absolute name could trigger an infinite recursion bug in lwresd and named with lwres configured if when combined with a search list entry the resulting name is too long. (CVE-2016-2775) [RT #42694] 4405. [bug] Change 4342 introduced a regression where you could not remove a delegation in a NSEC3 signed zone using OPTOUT via nsupdate. [RT #42702] 4387. [bug] Change 4336 was not complete leading to SERVFAIL being return as NS records expired. [RT #42683] --- 9.10.4-P1 released --- 4368. [bug] Fix a crash when calling "rndc stats" on some Windows builds because some Visual Studio compilers generated crashing code for the "%z" printf() format specifier. [RT #42380] 4366. [bug] Address race condition when updating rbtnode bit fields. [RT #42379] 4363. [port] win32: Disable explicit triggering UAC when running BINDInstall. --- 9.10.4 released ---
2016-07-19Update bind99 to 9.9.9pl2 (BIND 9.9.9-P2).taca2-8/+7
--- 9.9.9-P2 released --- 4406. [bug] getrrsetbyname with a non absolute name could trigger an infinite recursion bug in lwresd and named with lwres configured if when combined with a search list entry the resulting name is too long. (CVE-2016-2775) [RT #42694] 4405. [bug] Change 4342 introduced a regression where you could not remove a delegation in a NSEC3 signed zone using OPTOUT via nsupdate. [RT #42702] 4387. [bug] Change 4336 was not complete leading to SERVFAIL being return as NS records expired. [RT #42683] --- 9.9.9-P1 released --- 4366. [bug] Address race condition when updating rbtnode bit fields. [RT #42379] 4363. [port] win32: Disable explicit triggering UAC when running BINDInstall.
2016-07-18Changes 2016.07.17:adam3-8/+68
[mtvservices] Strip description [comedycentraltv] Add extractor Revert "[bbc] extract more and better qulities from Unified Streaming… [viki] Override m3u8 formats acodec [viki] Lower m3u8 preference [viki] Fix tests [spike] Relax _VALID_URL and improve extraction [README.md] Make download URLs consistent
2016-07-16New package, go-vultr, a client for the Vultr Cloud service.bsiegert6-1/+106
2016-07-16gcc6 build fixmarkd2-1/+17
2016-07-15New package, go-dns.bsiegert5-1/+110
Complete and usable DNS library. All widely used Resource Records are supported, including the DNSSEC types. It follows a lean and mean philosophy. If there is stuff you should know as a DNS programmer there isn't a convenience function for it. Server side and client side programming is supported, i.e. you can build servers and resolvers with it.
2016-07-15Update to 0.696wen2-9/+8
Upstream changes: 0.696 2015-06-10 - Fixed up dist.ini - YAPC::NA release 0.695 2014-12-02 - Corrected github details 0.694 2014-08-27 - Fix for RT89267 - Added github details - Some minor code style changes
2016-07-11If py-dns or py-iso8601 are installed, the PLIST is wrong becausewiz2-86/+5
the separate copy coming with samba4 is not installed. Depend on the two packages and never install the separate copies. Bump PKGREVISION.
2016-07-10Fixed pkglint warnings.rillig3-16/+15
2016-07-09Remove python33: adapt all packages that refer to it.wiz55-110/+110
2016-07-09Fixed some pkglint warnings.rillig1-4/+4
2016-07-09Bump PKGREVISION for perl-5.24.0 for everything mentioning perl.wiz86-159/+173
2016-07-09Update to 0.9.6bryoon2-7/+7
Changelog: 0.9.6b: Merge pull request #15 from pandax381/master 0.9.6a: Merge pull request #12 from pandax381/release-0.9.6a
2016-07-09Update to 1.20wen2-8/+7
Upstream changes: 1.20 June 9, 2016 ! Minor kwalitee updates (@oeuftete) ! #106688 encode utf8 content in test which fails under RHES 6.6
2016-07-08Fixed pkglint warnings.rillig3-11/+11
2016-07-08Update openvpn distfile. Bump PKGREVISION.jperkin2-7/+7
2016-07-08Update openvpn distfile. Bump PKGREVISION.jperkin2-7/+7
2016-07-08Update net/openvpn to 2.3.11. Changes since 2.3.6:jperkin7-24/+31
2016.05.09 -- Version 2.3.11 Fixed port-share bug with DoS potential Make intent of utun device name validation clear Fix buffer overflow by user supplied data Correctly report TCP connection timeout on windows. Report Windows bitness Fix undefined signed shift overflow Fix build with libressl Improve LZO, PAM and OpenSSL documentation Ensure input read using systemd-ask-password is null terminated Support reading the challenge-response from console openssl: improve logging polarssl: improve logging Update manpage: OpenSSL might also need /dev/urandom inside chroot socks.c: fix check on get_user_pass() return value(s) Fix OCSP_check.sh hardening: add safe FD_SET() wrapper openvpn_fd_set() Fix memory leak in argv_extract_cmd_name() Replace MSG_TEST() macro for static inline msg_test() Restrict default TLS cipher list Various Changes.rst fixes Clarify mssfix documentation Clarify --block-outside-dns documentation Update --block-outside-dns to work on Windows Vista 2016.01.04 -- Version 2.3.10 Prepare for v2.3.10 release, list PolarSSL 1.2 to 1.3 upgrade Make certificate expiry warning patch (091edd8e299686) work on OpenSSL 1.0.1 and earlier. Repair IPv6 netsh calls if Win XP is detected Use bob.example.com and alice.example.com to improve clarity of documentation Remove unused variables from ssl_verify_polarssl.c's x509_get_serial() Upgrade OpenVPN 2.3 to PolarSSL 1.3 Warn user if their certificate has expired Make assert_failed() print the failed condition cleanup: get rid of httpdigest.c type warnings Fix regression in setups without a client certificate polarssl: fix unreachable code 2015.12.15 -- Version 2.3.9 Show extra-certs in current parameters. Fix commit a3160fc1bd7368395745b9cee6e40fb819f5564c Do not set the buffer size by default but rely on the operation system default. Remove --enable-password-save option Reflect enable-password-save change in documentation Also remove second instance of enable-password-save in the man page Detect config lines that are too long and give a warning/error Log serial number of revoked certificate Adjust server-ipv6 documentation Avoid partial authentication state when using --disabled in CCD configs Make "block-outside-dns" option platform agnostic Un-break --auth-user-pass on windows Replace unaligned 16bit access to TCP MSS value with bytewise access Repair test_local_addr() on WIN32 Fix possible heap overflow on read accessing getaddrinfo() result. Fix FreeBSD-specific mishandling of gc arena pointer in create_arbitrary_remote() remove unused gc_arena in FreeBSD close_tun() Fix isatty() check for good. put virtual IPv6 addresses into env Use adapter index instead of name for windows IPv6 interface config Client-side part for server restart notification Use adapter index for add/delete_route_ipv6 Pass adapter index to up/down scripts Fix VS2013 compilation Fix privilege drop if first connection attempt fails Support for username-only auth file. Add CONTRIBUTING.rst Updates to Changes.rst Fix termination when windows suspends/sleeps Do not hard-code windows systemroot in env_block Handle ctrl-C and ctrl-break events on Windows Unbreak read username password from management Replace strdup() calls for string_alloc() calls Check return value of ms_error_text() Increase control channel packet size for faster handshakes hardening: add insurance to exit on a failed ASSERT() Fix memory leak in auth-pam plugin Fix (potential) memory leak in init_route_list() Fix unintialized variable in plugin_vlog() Add macro to ensure we exit on fatal errors Fix memory leak in add_option() by simplifying get_ipv6_addr openssl: properly check return value of RAND_bytes() Fix rand_bytes return value checking Add Windows DNS Leak fix using WFP ('block-outside-dns') Fix "White space before end tags can break the config parser" 2015.08.03 -- Version 2.3.8 Report missing endtags of inline files as warnings Fix commit e473b7c if an inline file happens to have a line break exactly at buffer limit Produce a meaningful error message if --daemon gets in the way of asking for passwords. Document --daemon changes and consequences (--askpass, --auth-nocache). Del ipv6 addr on close of linux tun interface Fix --askpass not allowing for password input via stdin write pid file immediately after daemonizing Make __func__ work with Visual Studio too fix regression: query password before becoming daemon Fix using management interface to get passwords. Fix overflow check in openvpn_decrypt() 2015.06.02 -- Version 2.3.7 Default gateway can't be determined on illumos/Solaris platforms Warn that tls-auth with free form files is going to be removed from OpenVPN 2.4 autotools: Fix wrong ./configure help screen default values down-root plugin: Replaced system() calls with execve() down-root: Improve error messages plugin, down-root: Fix compiler warnings sockets: Remove the limitation of --tcp-nodelay to be server-only plugins, down-root: Code style clean-up pkcs11: Load p11-kit-proxy.so module by default Make 'provider' option to --show-pkcs11-ids optional where p11-kit is present Use OPENVPN_ETH_P_* so that <netinet/if_ether.h> is unecessary New approach to handle peer-id related changes to link-mtu (2.3 version) Fix incorrect use of get_ipv6_addr() for iroute options. Print helpful error message on --mktun/--rmtun if not available. explain effect of --topology subnet on --ifconfig Add note about file permissions and --crl-verify to manpage. repair --dev null breakage caused by db950be85d37 assume res_init() is always there. Correct note about DNS randomization in openvpn.8 Disallow usage of --server-poll-timeout in --secret key mode. slightly enhance documentation about --cipher Enforce "serial-tests" behaviour for tests/Makefile Revert "Enforce "serial-tests" behaviour for tests/Makefile" On signal reception, return EAI_SYSTEM from openvpn_getaddrinfo(). Use configure.ac hack to apply serial_test AM option only if supported. Use EAI_AGAIN instead of EAI_SYSTEM for openvpn_getaddrinfo(). Move res_init() call to inner openvpn_getaddrinfo() loop Fix FreeBSD ifconfig for topology subnet tunnels. Fix --redirect-private in --dev tap mode. include ifconfig_ environment variables in --up-restart env set Fix null pointer dereference in options.c Fix mssfix default value in connection_list context Manual page update for Re-enabled TLS version negotiation. Include systemd units in the source tarball (make dist) Updated manpage for --rport and --lport Properly escape dashes on the man-page Improve documentation in --script-security section of the man-page Really fix '--cipher none' regression Update doxygen (a bit) Set tls-version-max to 1.1 if cryptoapicert is used Account for peer-id in frame size calculation Disable SSL compression Fix frame size calculation for non-CBC modes. Allow for CN/username of 64 characters (fixes off-by-one) Remove unneeded parameter 'first_time' from possibly_become_daemon() Re-enable TLS version negotiation by default Remove size limit for files inlined in config Improve --tls-cipher and --show-tls man page description Re-read auth-user-pass file on (re)connect if required Clarify --capath option in manpage Call daemon() before initializing crypto library
2016-07-07Update samba4 to 4.3.11 (Samba 4.3.11), including security fix fortaca3-8/+9
CVE-2016-2119. Changes from 4.3.9 to 4.3.10 are too many to write here, please refer WHATSNEW.txt file. ============================== Release Notes for Samba 4.3.11 July 07, 2016 ============================== This is a security release in order to address the following defect: o CVE-2016-2119 (Client side SMB2/3 required signing can be downgraded) ======= Details ======= o CVE-2016-2119: It's possible for an attacker to downgrade the required signing for an SMB2/3 client connection, by injecting the SMB2_SESSION_FLAG_IS_GUEST or SMB2_SESSION_FLAG_IS_NULL flags. This means that the attacker can impersonate a server being connected to by Samba, and return malicious results. The primary concern is with winbindd, as it uses DCERPC over SMB2 when talking to domain controllers as a member server, and trusted domains as a domain controller. These DCE/RPC connections were intended to protected by the combination of "client ipc signing" and "client ipc max protocol" in their effective default settings ("mandatory" and "SMB3_11"). Additionally, management tools like net, samba-tool and rpcclient use DCERPC over SMB2/3 connections. By default, other tools in Samba are unprotected, but rarely they are configured to use smb signing, via the "client signing" parameter (the default is "if_required"). Even more rarely the "client max protocol" is set to SMB2, rather than the NT1 default. If both these conditions are met, then this issue would also apply to these other tools, including command line tools like smbcacls, smbcquota, smbclient, smbget and applications using libsmbclient. Changes since 4.3.10: -------------------- o Stefan Metzmacher <metze@samba.org> * BUG 11860: CVE-2016-2119: Fix client side SMB2 signing downgrade. * BUG 11948: Total dcerpc response payload more than 0x400000. ####################################### Reporting bugs & Development Discussion ####################################### Please discuss this release on the samba-technical mailing list or by joining the #samba-technical IRC channel on irc.freenode.net. If you do report problems then please try to send high quality feedback. If you don't provide vital information to help us track down the problem then you will probably be ignored. All bug reports should be filed under the "Samba 4.1 and newer" product in the project's Bugzilla database (https://bugzilla.samba.org/).
2016-07-07Remove obsolete patch (not in distinfo)wiz1-24/+0
2016-07-04Updated net/syncthing to 0.13.10abs2-7/+7
v0.13.10 This is a regular bugfix release recommended for all users. #3128: Generated folder IDs are now lower case. #3338: Syncthing now uses shorter temporary file names, alleviating issues on encfs. #3335: Event IDs seen in /rest/system/events are now sequential again. #3362: Tests now pass on when building on arm64. #2471: Folders are now marked "stopped" when missing a path, and duplicate folder IDs are not accepted. #3375: A stalling TLS handshake no longer blocks the connection service. #3346: The global discovery server now correctly handle IPv6 announces over IPv4 and vice versa. v0.13.9 This release fixes a crash on 32 bit platforms introduced in 0.13.8. v0.13.8 Resolved issues: #3306: The layout of the out of sync items dialog has been improved. #3310: Folders are now sorted by label, falling back to ID when required. #3330: Windows zip files now make sense when unpacked on non-Windows. #3321: Folder name completion now works for empty names on non-Windows. #2782: Folders can now be symbolic links also when using ~-relative paths. New features and enhancements: #3340: The discovered device addresses are now shown for disconnected devices.
2016-07-04Drop dependency on libiberty - its not needed, besides which its toxic and ↵abs1-3/+2
breaks any later builds of pkgsrc gcc. Bump PKGREVISION
2016-07-03Update to newer version 1.6.6.morr3-14/+13
Changes: - BUG/MAJOR: fix listening IP address storage for frontends - BUG/MINOR: fix listening IP address storage for frontends (cont) - DOC: Fix typo so fetch is properly parsed by Cyril's converter - BUG/MAJOR: http: fix breakage of "reqdeny" causing random crashes - BUG/MEDIUM: stick-tables: fix breakage in table converters - BUG/MEDIUM: dns: unbreak DNS resolver after header fix - BUILD: fix build on Solaris 11 - CLEANUP: connection: fix double negation on memcmp() - BUG/MEDIUM: stats: show servers state may show an servers from another backend - BUG/MEDIUM: fix risk of segfault with "show tls-keys" - BUG/MEDIUM: sticktables: segfault in some configuration error cases - BUG/MEDIUM: lua: converters doesn't work - BUG/MINOR: http: add-header: header name copied twice - BUG/MEDIUM: http: add-header: buffer overwritten - BUG/MINOR: ssl: fix potential memory leak in ssl_sock_load_dh_params() - BUG/MINOR: http: url32+src should use the big endian version of url32 - BUG/MINOR: http: url32+src should check cli_conn before using it - DOC: http: add documentation for url32 and url32+src - BUG/MINOR: fix http-response set-log-level parsing error - MINOR: systemd: Use variable for config and pidfile paths - MINOR: systemd: Perform sanity check on config before reload (cherry picked from commit 68535bddf305fdd22f1449a039939b57245212e7) - BUG/MINOR: init: always ensure that global.rlimit_nofile matches actual limits - BUG/MINOR: init: ensure that FD limit is raised to the max allowed - BUG/MEDIUM: external-checks: close all FDs right after the fork() - BUG/MAJOR: external-checks: use asynchronous signal delivery - BUG/MINOR: external-checks: do not unblock undesired signals - BUILD/MEDIUM: rebuild everything when an include file is changed - BUILD/MEDIUM: force a full rebuild if some build options change - BUG/MINOR: srv-state: fix incorrect output of state file - BUG/MINOR: ssl: close ssl key file on error - BUG/MINOR: http: fix misleading error message for response captures - BUG/BUILD: don't automatically run "make" on "make install" - DOC: add missing doc for http-request deny [deny_status <status>] Drop one patch included upstream.
2016-07-03Remove net/polsms (sms-2.0.3)kamil5-65/+0
This program no longer works and upstream is long dead. Reported by Frederic Cambus.
2016-07-03Detach net/polsmskamil1-2/+1
2016-07-01Add libquic-0.0.3 to the packages collection.agc14-1/+276
QUIC is an experimental protocol aimed at reducing web latency over that of TCP. On the surface, QUIC is very similar to TCP+TLS+SPDY implemented on UDP. Because TCP is implement in operating system kernels, and middlebox firmware, making significant changes to TCP is next to impossible. However, since QUIC is built on top of UDP, it suffers from no such limitations. Key features of QUIC over existing TCP+TLS+SPDY include + Dramatically reduced connection establishment time + Improved congestion control + Multiplexing without head of line blocking + Forward error correction + Connection migration
2016-07-01Added patches/patch-configure.acadam1-0/+15
2016-07-01Changes 2.4:adam10-195/+82
* Memory-management, stability and speed have been fundamentally improved * We have kept an eye on security and hardened the code to prevent privileges escalation and XSS * Alerts have been extended to include support for . Re-arming to avoid raising trains of identical alerts in short periods of time . Alert propagation to the infrastructure monitoring software Nagios . CIDR-based triggers to monitor the behavior of whole networks . The detection of suspicious probing attempts * Netfilter support has been added together with optional packet dropping features * Routing visibility is now possible through RIPE RIS * Availability of fine-grained historical data drill-down features, including top talkers, top applications, and interactions between hosts (more details here) * Integrations with other software . LDAP authentication support . alerts forwarding/withdrawal to Nagios . nBox integration to request full packet pcaps of monitored flows . Data export to Apache Kafka * We have extended and improved traffic monitoring . Visibility of TCP sessions throughput estimations and state breakdown (e.g., connections established, connections reset, etc.) . Goodput monitoring . Trends detection . Highlight of low-goodput flows and hosts . Visibility of hosts top-visited sites * Built-in support is now included for . GRE detunnelling . per-VLAN historical statistics . ICMP and ICMPv6 dissection * We have extended the set of supported OSes to include: Ubuntu 16, Debian 7, EdgeOS * There is also an optional support for hosts categorization via service flashstart.it
2016-06-30+ py-dnsdiag.wiz1-1/+2
2016-06-30Import py-dnsdiag-1.5.0 as net/py-dnsdiag.wiz5-0/+345
Ever been wondering if your ISP is hijacking your DNS traffic? Ever observed any misbehavior with your DNS responses? Ever been redirected to wrong address and suspected something is wrong with your DNS? Here we have a set of tools to perform basic audits on your DNS requests and responses to make sure your DNS is working as you expect. You can measure the response time of any given DNS server for arbitrary requests using dnsping. Just like traditional ping utility, it gives you similar functionality for DNS requests. You can also trace the path your DNS request takes to destination to make sure it is not being redirected or hijacked. This can be done by comparing different DNS queries being sent to the same DNS server using dnstraceroute and observe if there is any difference between the path. dnseval evaluates multiple DNS resolvers and helps you choose the best DNS server for your network. While it is highly recommended to use your own DNS resolver and never trust any third-party DNS server, but in case you need to choose the best DNS forwarder for your network, dnseval lets you compare different DNS servers from performance (latency) and reliability (loss) point of view.
2016-06-30+ py-cymruwhois.wiz1-1/+2
2016-06-30Import py-cymruwhois-1.5 as net/py-cymruwhois.wiz5-0/+48
Client for the whois.cymru.com service Perform lookups by ip address and return ASN, Country Code, and Netblock Owner.
2016-06-30Remove py-dns3, py-dns now supports python 3.wiz5-284/+1
2016-06-30Updated py-dns to 1.14.0.wiz3-13/+44
2016-05-27 Bob Halley <halley@dnspython.org> * (Version 1.14.0 released) * Add CSYNC RR support * Fix bug in LOC which destroyed N/S and E/W distinctions within a degree of the equator or prime merdian respectively. * Misc. fixes to deal with fallout from the Python 2 & 3 merge. [issue #156], [issue #157], [issue #158], [issue #159], [issue #160]. * Running with python optimization on caused issues when stripped docstrings were referenced. [issue #154] * dns.zone.from_text() erroneously required the zone to be provided. [issue #153] 2016-05-13 Bob Halley <halley@dnspython.org> * dns/message.py (make_query): Setting any value which implies EDNS will turn on EDNS if 'use_edns' has not been specified. 2016-05-12 Bob Halley <halley@dnspython.org> * TSIG signature algorithm setting was broken by the Python 2 and Python 3 code line merge. Fixed. 2016-05-10 Bob Halley <halley@dnspython.org> * (Version 1.13.0 released) 2016-05-10 Bob Halley <halley@dnspython.org> * Dropped support for Python 2.4 and 2.5. * Zone origin can be specified as a string. * Support string representation for all DNSExceptions. * Use setuptools not distutils * A number of Unicode name bug fixes. * Added support for CAA, CDS, CDNSKEY, EUI48, EUI64, and URI RR types. * Names now support the pickle protocol. * NameDicts now keep the max-depth value correct, and update properly. * resolv.conf processing rejects lines with too few tokens. * Ports can be specified per-nameserver in the stub resolver. 2016-05-03 Arthur Gautier * Single source support for python 2.6+ and 3.3+ 2014-09-04 Bob Halley <halley@dnspython.org> * Comparing two rdata is now always done by comparing the binary data of the DNSSEC digestable forms. This corrects a number of errors where dnspython's rdata comparison order was not the DNSSEC order. * Add CAA implementation. Thanks to Brian Wellington for the patch.
2016-06-27use GCC specific flags for GCC 5, too.maya1-2/+2
Fixes build on NetBSD-current.
2016-06-26Update net/youtube-dl to 20160625adam3-11/+14
Changes: 2016.06.25: [*] misc bug fixes and improvements 2016.06.23*: [*] misc bug fixes and improvements 2016.06.22: [gametrailers] Remove extractor [*] misc bug fixes and improvements 2016.06.20: [*] misc bug fixes and improvements 2016.06.19*: [aftonbladet] Fix extraction [closertotruth] Add extractor [r7] Fix extraction [*] misc bug fixes and improvements
2016-06-26Add missing PKGCONFIG_OVERRIDE.kamil1-1/+4
It's still needed (but with a fixed path) Bump PKGREVISION. Pointed out by <wiz>.
2016-06-24Fix the variable name substituted in the ddclient file, reported byagc1-3/+3
prototrout on freenode.
2016-06-24Add comments to patches which didn't have any.he5-7/+27
Add a patch to avoid scribbling on random memory if the server certificate has more than one alternate name. Bump PKGREVISION.
2016-06-24Pull in cups instead of cups15, so that it is possible to installhe2-4/+4
this package where other packages are installed which depend on cups. Discussed with wiz@ Bump PKGREVISION.
2016-06-23PR 32295 Jake Kupersmith: missing alloca.h on Solaris.dholland2-4/+5