summaryrefslogtreecommitdiff
path: root/net
AgeCommit message (Collapse)AuthorFilesLines
2017-06-21Pullup ticket #5489 - requested by sevanbsiegert2-1/+44
net/transmission: build fix for Dragonfly Revisions pulled up: - net/transmission/distinfo 1.10-1.11 - net/transmission/patches/patch-libtransmission_platform-quota.c 1.4-1.5 --- Module Name: pkgsrc Committed By: maya Date: Mon Jun 19 13:21:35 UTC 2017 Modified Files: pkgsrc/net/transmission: distinfo Added Files: pkgsrc/net/transmission/patches: patch-libtransmission_platform-quota.c Log Message: Apply patch that reportedly fixes the build on DragonflyBSD >From Aleksej Lebedev (From dragonfly dports) in pkgsrc-users --- Module Name: pkgsrc Committed By: maya Date: Mon Jun 19 13:33:46 UTC 2017 Modified Files: pkgsrc/net/transmission: distinfo pkgsrc/net/transmission/patches: patch-libtransmission_platform-quota.c Log Message: Add last missing hunk for dflybsd build, missed in previous commit.
2017-06-21Pullup ticket #5483 - requested by sevanbsiegert3-2/+24
net/ndpi: SunOS build fix Revisions pulled up: - net/ndpi/Makefile 1.3 - net/ndpi/distinfo 1.3 - net/ndpi/patches/patch-src_include_ndpi__includes.h 1.1 --- Module Name: pkgsrc Committed By: fhajny Date: Thu Jun 15 10:06:39 UTC 2017 Modified Files: pkgsrc/net/ndpi: Makefile distinfo Added Files: pkgsrc/net/ndpi/patches: patch-src_include_ndpi__includes.h Log Message: Fix ndpi build on SunOS.
2017-06-21Pullup ticket #5481 - requested by sevanbsiegert2-7/+7
net/tor: security fix Revisions pulled up: - net/tor/Makefile 1.122 - net/tor/distinfo 1.82 --- Module Name: pkgsrc Committed By: wiz Date: Wed Jun 14 16:16:04 UTC 2017 Modified Files: pkgsrc/net/tor: Makefile distinfo Log Message: Updated tor to 0.3.0.8. Changes in version 0.3.0.8 - 2017-06-08 Tor 0.3.0.8 fixes a pair of bugs that would allow an attacker to remotely crash a hidden service with an assertion failure. Anyone running a hidden service should upgrade to this version, or to some other version with fixes for TROVE-2017-004 and TROVE-2017-005. Tor 0.3.0.8 also includes fixes for several key management bugs that sometimes made relays unreliable, as well as several other bugfixes described below. o Major bugfixes (hidden service, relay, security, backport from 0.3.1.3-alpha): - Fix a remotely triggerable assertion failure when a hidden service handles a malformed BEGIN cell. Fixes bug 22493, tracked as TROVE-2017-004 and as CVE-2017-0375; bugfix on 0.3.0.1-alpha. - Fix a remotely triggerable assertion failure caused by receiving a BEGIN_DIR cell on a hidden service rendezvous circuit. Fixes bug 22494, tracked as TROVE-2017-005 and CVE-2017-0376; bugfix on 0.2.2.1-alpha. o Major bugfixes (relay, link handshake, backport from 0.3.1.3-alpha): - When performing the v3 link handshake on a TLS connection, report that we have the x509 certificate that we actually used on that connection, even if we have changed certificates since that connection was first opened. Previously, we would claim to have used our most recent x509 link certificate, which would sometimes make the link handshake fail. Fixes one case of bug 22460; bugfix on 0.2.3.6-alpha. o Major bugfixes (relays, key management, backport from 0.3.1.3-alpha): - Regenerate link and authentication certificates whenever the key that signs them changes; also, regenerate link certificates whenever the signed key changes. Previously, these processes were only weakly coupled, and we relays could (for minutes to hours) wind up with an inconsistent set of keys and certificates, which other relays would not accept. Fixes two cases of bug 22460; bugfix on 0.3.0.1-alpha. - When sending an Ed25519 signing->link certificate in a CERTS cell, send the certificate that matches the x509 certificate that we used on the TLS connection. Previously, there was a race condition if the TLS context rotated after we began the TLS handshake but before we sent the CERTS cell. Fixes a case of bug 22460; bugfix on 0.3.0.1-alpha. o Major bugfixes (hidden service v3, backport from 0.3.1.1-alpha): - Stop rejecting v3 hidden service descriptors because their size did not match an old padding rule. Fixes bug 22447; bugfix on tor-0.3.0.1-alpha. o Minor features (fallback directory list, backport from 0.3.1.3-alpha): - Replace the 177 fallbacks originally introduced in Tor 0.2.9.8 in December 2016 (of which ~126 were still functional) with a list of 151 fallbacks (32 new, 119 unchanged, 58 removed) generated in May 2017. Resolves ticket 21564. o Minor bugfixes (configuration, backport from 0.3.1.1-alpha): - Do not crash when starting with LearnCircuitBuildTimeout 0. Fixes bug 22252; bugfix on 0.2.9.3-alpha. o Minor bugfixes (correctness, backport from 0.3.1.3-alpha): - Avoid undefined behavior when parsing IPv6 entries from the geoip6 file. Fixes bug 22490; bugfix on 0.2.4.6-alpha. o Minor bugfixes (link handshake, backport from 0.3.1.3-alpha): - Lower the lifetime of the RSA->Ed25519 cross-certificate to six months, and regenerate it when it is within one month of expiring. Previously, we had generated this certificate at startup with a ten-year lifetime, but that could lead to weird behavior when Tor was started with a grossly inaccurate clock. Mitigates bug 22466; mitigation on 0.3.0.1-alpha. o Minor bugfixes (memory leak, directory authority, backport from 0.3.1.2-alpha): - When directory authorities reject a router descriptor due to keypinning, free the router descriptor rather than leaking the memory. Fixes bug 22370; bugfix on 0.2.7.2-alpha.
2017-06-21Pullup ticket #5480 - requested by sevanbsiegert12-27/+160
net/hping3: build fix Revisions pulled up: - net/hping3/Makefile 1.8 - net/hping3/distinfo 1.5 - net/hping3/options.mk 1.2 - net/hping3/patches/patch-aa 1.2 - net/hping3/patches/patch-ab 1.3 - net/hping3/patches/patch-ac 1.3 - net/hping3/patches/patch-ars.c 1.1 - net/hping3/patches/patch-ars.h 1.1 - net/hping3/patches/patch-gethostname.c 1.1 - net/hping3/patches/patch-libpcap__stuff.c 1.1 - net/hping3/patches/patch-sbignum.c 1.1 - net/hping3/patches/patch-sendip.c 1.1 --- Module Name: pkgsrc Committed By: jperkin Date: Wed Jun 14 12:17:30 UTC 2017 Modified Files: pkgsrc/net/hping3: Makefile distinfo options.mk pkgsrc/net/hping3/patches: patch-aa patch-ab patch-ac Added Files: pkgsrc/net/hping3/patches: patch-ars.c patch-ars.h patch-gethostname.c patch-libpcap__stuff.c patch-sbignum.c patch-sendip.c Log Message: Various patches and cleanups to fix build on Darwin and SunOS.
2017-06-21Pullup ticket #5479 - requested by sevanbsiegert3-2/+20
net/dnstracer: build fix Revisions pulled up: - net/dnstracer/Makefile 1.18 - net/dnstracer/distinfo 1.8 - net/dnstracer/patches/patch-Makefile 1.1 --- Module Name: pkgsrc Committed By: jperkin Date: Wed Jun 14 09:30:20 UTC 2017 Modified Files: pkgsrc/net/dnstracer: Makefile distinfo Added Files: pkgsrc/net/dnstracer/patches: patch-Makefile Log Message: Fix build on Darwin and SunOS.
2017-06-03Pullup ticket #5461 - requested by sevanbsiegert2-1/+32
net/powerdns-recursor: build fix Revisions pulled up: - net/powerdns-recursor/distinfo 1.18 - net/powerdns-recursor/patches/patch-ext_json11_json11.cpp 1.1 --- Module Name: pkgsrc Committed By: joerg Date: Mon May 22 23:41:52 UTC 2017 Modified Files: pkgsrc/net/powerdns-recursor: distinfo Added Files: pkgsrc/net/powerdns-recursor/patches: patch-ext_json11_json11.cpp Log Message: Merge patch from powerdns package to avoid ordering nullptrs.
2017-05-29Pullup ticket #5452 - requested by sevanbsiegert2-7/+10
net/tor: security fix Revisions pulled up: - net/tor/Makefile 1.121 - net/tor/distinfo 1.81 --- Module Name: pkgsrc Committed By: adam Date: Wed May 17 07:13:37 UTC 2017 Modified Files: pkgsrc/net/tor: Makefile distinfo Log Message: Changes in version 0.3.0.7 - 2017-05-15 Tor 0.3.0.7 fixes a medium-severity security bug in earlier versions of Tor 0.3.0.x, where an attacker could cause a Tor relay process to exit. Relays running earlier versions of Tor 0.3.0.x should upgrade; clients are not affected. o Major bugfixes (hidden service directory, security): - Fix an assertion failure in the hidden service directory code, which could be used by an attacker to remotely cause a Tor relay process to exit. Relays running earlier versions of Tor 0.3.0.x should upgrade. This security issue is tracked as TROVE-2017-002. Fixes bug 22246; bugfix on 0.3.0.1-alpha. o Minor features: - Update geoip and geoip6 to the May 2 2017 Maxmind GeoLite2 Country database. o Minor features (future-proofing): - Tor no longer refuses to download microdescriptors or descriptors if they are listed as "published in the future". This change will eventually allow us to stop listing meaningful "published" dates in microdescriptor consensuses, and thereby allow us to reduce the resources required to download consensus diffs by over 50%. Implements part of ticket 21642; implements part of proposal 275. o Minor bugfixes (Linux seccomp2 sandbox): - The getpid() system call is now permitted under the Linux seccomp2 sandbox, to avoid crashing with versions of OpenSSL (and other libraries) that attempt to learn the process's PID by using the syscall rather than the VDSO code. Fixes bug 21943; bugfix on 0.2.5.1-alpha.
2017-05-27Pullup ticket #5431 - requested by hebsiegert6-116/+269
net/samba4: security fix Revisions pulled up: - net/samba4/Makefile 1.28-1.30 - net/samba4/PLIST 1.11-1.12 - net/samba4/distinfo 1.12-1.13 - net/samba4/options.mk 1.4 - net/samba4/patches/patch-lib_param_loadparm.h 1.2 - net/samba4/patches/patch-source3_script_tests_test__smbclient__s3.sh 1.3 --- Module Name: pkgsrc Committed By: ryoon Date: Sat Apr 8 08:56:27 UTC 2017 Modified Files: pkgsrc/net/samba4: Makefile PLIST distinfo options.mk pkgsrc/net/samba4/patches: patch-lib_param_loadparm.h patch-source3_script_tests_test__smbclient__s3.sh Log Message: Update to 4.6.2 * Use internal heimdal Changelog: Changes since 4.6.1: -------------------- o Jeremy Allison <jra@samba.org> * BUG 12721: Fix regression with "follow symlinks = no". Changes since 4.6.0: -------------------- o Jeremy Allison <jra@samba.org> * BUG 12496: CVE-2017-2619: Symlink race permits opening files outside share directory. o Ralph Boehme <slow@samba.org> * BUG 12496: CVE-2017-2619: Symlink race permits opening files outside share directory. CHANGES SINCE 4.6.0rc4 ====================== o Jeremy Allison <jra@samba.org> * BUG 12592: Fix several issues found by covscan. * BUG 12608: s3: smbd: Restart reading the incoming SMB2 fd when the send queue is drained. o Ralph Boehme <slow@samba.org> * BUG 12427: vfs_fruit doesn't work with fruit:metadata=stream. * BUG 12526: vfs_fruit: Only veto AppleDouble files if "fruit:resource" is set to "file". * BUG 12604: vfs_fruit: Enabling AAPL extensions must be a global switch. o Volker Lendecke <vl@samba.org> * BUG 12612: Re-enable token groups fallback. o Stefan Metzmacher <metze@samba.org> * BUG 9048: Samba4 ldap error codes. * BUG 12557: gensec:spnego: Add debug message for the failed principal. * BUG 12605: s3:winbindd: Fix endless forest trust scan. * BUG 12612: winbindd: Find the domain based on the sid within wb_lookupusergroups_send(). o Andreas Schneider <asn@samba.org> * BUG 12557: s3:librpc: Handle gss_min in gse_get_client_auth_token() correctly. * BUG 12582: idmap_hash: Add a deprecation message, improve the idmap_hash manpage. * BUG 12592: Fix several issues found by covscan. o Martin Schwenke <martin@meltin.net> * BUG 12592: ctdb-logging: CID 1396883 Dereference null return value (NULL_RETURNS). CHANGES SINCE 4.6.0rc3 ====================== o Jeremy Allison <jra@samba.org> * BUG 12545: s3: rpc_server/mdssvc: Add attribute "kMDItemContentType". * BUG 12572: s3: smbd: Don't loop infinitely on bad-symlink resolution. o Ralph Boehme <slow@samba.org> * BUG 12490: vfs_fruit: Correct Netatalk metadata xattr on FreeBSD. * BUG 12536: s3/smbd: Check for invalid access_mask smbd_calculate_access_mask(). * BUG 12591: vfs_streams_xattr: use fsp, not base_fsp. o Amitay Isaacs <amitay@gmail.com> * BUG 12580: ctdb-common: Fix use-after-free error in comm_fd_handler(). * BUG 12595: build: Fix generation of CTDB manpages while creating tarball. o Bryan Mason <bmason@redhat.com> * BUG 12575: Modify smbspool_krb5_wrapper to just fall through to smbspool if AUTH_INFO_REQUIRED is not set or is not "negotiate". o Stefan Metzmacher <metze@samba.org> * BUG 11830: s3:winbindd: Try a NETLOGON connection with noauth over NCACN_NP against trusted domains. * BUG 12262: 'net ads testjoin' and smb access fails after winbindd changed the trust password. * BUG 12585: librpc/rpc: fix regression in NT_STATUS_RPC_ENUM_VALUE_OUT_OF_RANGE error mapping. * BUG 12586: netlogon_creds_cli_LogonSamLogon doesn't work without netr_LogonSamLogonEx. * BUG 12587: winbindd child segfaults on connect to an NT4 domain. * BUG 12588: s3:winbindd: Make sure cm_prepare_connection() only returns OK with a valid tree connect. * BUG 12598: winbindd (as member) requires kerberos against trusted ad domain, while it shouldn't. * BUG 12601: Backport pytalloc_GenericObject_reference() related changes to 4.6. o Garming Sam <garming@catalyst.net.nz> * BUG 12600: dbchecker: Stop ignoring linked cases where both objects are alive. o Andreas Schneider <asn@samba.org> * BUG 12571: s3-vfs: Only walk the directory once in open_and_sort_dir(). o Martin Schwenke <martin@meltin.net> * BUG 12589: CTDB statd-callout does not cause grace period when CTDB_NFS_CALLOUT="". * BUG 12595: ctdb-build: Fix RPM build. CHANGES SINCE 4.6.0rc2 ====================== o Jeremy Allison <jra@samba.org> * BUG 12499: s3: vfs: dirsort doesn't handle opendir of "." correctly. * BUG 12546: s3: VFS: vfs_streams_xattr.c: Make streams_xattr_open() store the same path as streams_xattr_recheck(). * BUG 12531: Make vfs_shadow_copy2 cope with server changing directories. o Andrew Bartlett <abartlet@samba.org> * BUG 12543: samba-tool: Correct handling of default value for use_ntvfs and use_xattrs. * BUG 12573: Samba < 4.7 does not know about compatibleFeatures and requiredFeatures. * BUG 12577: 'samba-tool dbcheck' gives errors on one-way links after a rename. o Ralph Boehme <slow@samba.org> * BUG 12184: s3/rpc_server: Shared rpc modules loading. * BUG 12520: Ensure global "smb encrypt = off" is effective. * BUG 12524: s3/rpc_server: Move rpc_modules.c to its own subsystem. * BUG 12541: vfs_fruit: checks wrong AAPL config state and so always uses readdirattr. o Volker Lendecke <vl@samba.org> * BUG 12551: smbd: Fix "map acl inherit" = yes. o Stefan Metzmacher <metze@samba.org> * BUG 12398: Replication with DRSUAPI_DRS_CRITICAL_ONLY and DRSUAPI_DRS_GET_ANC results in WERR_DS_DRA_MISSING_PARENT S * BUG 12540: s3:smbd: allow "server min protocol = SMB3_00" to go via "SMB 2.???" negprot. o John Mulligan <jmulligan@nasuni.com> * BUG 12542: docs: Improve description of "unix_primary_group" parameter in idmap_ad manpage. o Andreas Schneider <asn@samba.org> * BUG 12552: waf: Do not install the unit test binary for krb5samba. o Amitay Isaacs <amitay@gmail.com> * BUG 12547: ctdb-build: Install CTDB tests correctly from toplevel. * BUG 12549: ctdb-common: ioctl(.. FIONREAD ..) returns an int value. o Garming Sam <garming@catalyst.net.nz> * BUG 12577: 'samba-tool dbcheck' gives errors on one-way links after a rename. o Uri Simchoni <uri@samba.org> * BUG 12529: waf: Backport finding of pkg-config. CHANGES SINCE 4.6.0rc1 ====================== o Amitay Isaacs <amitay@gmail.com> * BUG 12469: CTDB lock helper getting stuck trying to lock a record. * BUG 12500: ctdb-common: Fix a bug in packet reading code for generic socket I/O. * BUG 12510: sock_daemon_test 4 crashes with SEGV. * BUG 12513: ctdb-daemon: Remove stale eventd socket. o Björn Jacke <bj@sernet.de> * BUG 12535: vfs_default: Unlock the right file in copy chunk. o Volker Lendecke <vl@samba.org> * BUG 12509: messaging: Fix dead but not cleaned-up-yet destination sockets. * BUG 12538: Backport winbind fixes. o Stefan Metzmacher <metze@samba.org> * BUG 12501: s3:winbindd: talloc_steal the extra_data in winbindd_list_users_recv(). o Martin Schwenke <martin@meltin.net> * BUG 12511: ctdb-takeover: Handle case where there are no RELEASE_IPs to send. * BUG 12512: ctdb-scripts: Fix remaining uses of "ctdb gratiousarp". * BUG 12516: ctdb-scripts: /etc/iproute2/rt_tables gets populated with multiple 'default' entries. --- Module Name: pkgsrc Committed By: jnemeth Date: Mon Apr 10 15:27:22 UTC 2017 Modified Files: pkgsrc/net/samba4: Makefile Log Message: Add pkg-config to USE_TOOLS, which is needed to find gnutls. Problem found in a bulk build. Not bumping PKGREVISION since it shouldn't change the binary package when it built. --- Module Name: pkgsrc Committed By: he Date: Wed May 24 15:51:32 UTC 2017 Modified Files: pkgsrc/net/samba4: Makefile PLIST distinfo Log Message: Update samba4 to version 4.6.4. Pkgsrc changes: * Adapt PLIST, new .so installed. Upstream changes: Changes since 4.6.3: --------------------- o Volker Lendecke <vl@samba.org> * BUG 12780: CVE-2017-7494: Avoid remote code execution from a writable share. Changes since 4.6.2: -------------------- o Michael Adam <obnox@samba.org> * BUG 12743: s3:vfs:shadow_copy2: vfs_shadow_copy2 fails to list snapshots from shares with GlusterFS backend. o Jeremy Allison <jra@samba.org> * BUG 12559: Fix for Solaris C compiler. * BUG 12628: s3: locking: Update oplock optimization for the leases era. * BUG 12693: Make the Solaris C compiler happy. * BUG 12695: s3: libgpo: Allow skipping GPO objects that don't have the expected LDAP attributes. * BUG 12747: Fix buffer overflow caused by wrong use of getgroups. o Hanno Boeck <hanno@hboeck.de> * BUG 12746: lib: debug: Avoid negative array access. * BUG 12748: cleanupdb: Fix a memory read error. o Ralph Boehme <slow@samba.org> * BUG 7537: streams_xattr and kernel oplocks results in NT_STATUS_NETWORK_BUSY. * BUG 11961: winbindd: idmap_autorid allocates ids for unknown SIDs from other backends. * BUG 12565: vfs_fruit: Resource fork open request with flags=O_CREAT|O_RDONLY. * BUG 12615: manpages/vfs_fruit: Document global options. * BUG 12624: lib/pthreadpool: Fix a memory leak. * BUG 12727: Lookup-domain for well-known SIDs on a DC. * BUG 12728: winbindd: Fix error handling in rpc_lookup_sids(). * BUG 12729: winbindd: Trigger possible passdb_dsdb initialisation. o Alexander Bokovoy <ab@samba.org> * BUG 12611: credentials_krb5: use gss_acquire_cred for client-side GSSAPI use case. * BUG 12690: lib/crypto: Implement samba.crypto Python module for RC4. o Amitay Isaacs <amitay@gmail.com> * BUG 12697: ctdb-readonly: Avoid a tight loop waiting for revoke to complete. * BUG 12723: ctdb_event monitor command crashes if event is not specified. * BUG 12733: ctdb-docs: Fix documentation of "-n" option to 'ctdb tool'. o Volker Lendecke <vl@samba.org> * BUG 12558: smbd: Fix smb1 findfirst with DFS. * BUG 12610: smbd: Do an early exit on negprot failure. * BUG 12699: winbindd: Fix substitution for 'template homedir'. o Stefan Metzmacher <metze@samba.org> * BUG 12554: s4:kdc: Disable principal based autodetected referral detection. * BUG 12613: idmap_autorid: Allocate new domain range if the callers knows the sid is valid. * BUG 12724: LINKFLAGS_PYEMBED should not contain -L/some/path. * BUG 12725: PAM auth with WBFLAG_PAM_GET_PWD_POLICY returns wrong policy for trusted domain. * BUG 12731: rpcclient: Allow -U'OTHERDOMAIN\user' again. o Christof Schmitt <cs@samba.org> * BUG 12725: winbindd: Fix password policy for pam authentication. o Andreas Schneider <asn@samba.org> * BUG 12554: s3:gse: Correctly handle external trusts with MIT. * BUG 12611: auth/credentials: Always set the realm if we set the principal from the ccache. * BUG 12686: replace: Include sysmacros.h. * BUG 12687: s3:vfs_expand_msdfs: Do not open the remote address as a file. * BUG 12704: s3:libsmb: Only print error message if kerberos use is forced. * BUG 12708: winbindd: Child process crashes when kerberos-authenticating a user with wrong password. o Uri Simchoni <uri@samba.org> * BUG 12715: vfs_fruit: Office document opens as read-only on macOS due to CNID semantics. * BUG 12737: vfs_acl_xattr: Fix failure to get ACL on Linux if memory is fragmented.
2017-05-27Pullup ticket #5398 - requested by leotbsiegert3-11/+50
net/youtube-dl: bugfix --- Update net/youtube-dl to 20170501 Changes: version 2017.05.01 Core + [extractor/common] Extract view count from JSON-LD * [utils] Improve unified_timestamp + [utils] Add video/mp2t to mimetype2ext * [downloader/external] Properly handle live stream downloading cancellation (#8932) + [utils] Add support for unicode whitespace in clean_html on python 2 (#12906) Extractors * [infoq] Make audio format extraction non fatal (#12938) * [brightcove] Allow whitespace around attribute names in embedded code + [zaq1] Add support for zaq1.pl (#12693) + [xvideos] Extract duration (#12828) * [vevo] Fix extraction (#12879) + [noovo] Add support for noovo.ca (#12792) + [washingtonpost] Add support for embeds (#12699) * [yandexmusic:playlist] Fix extraction for python 3 (#12888) * [anvato] Improve extraction (#12913) * Promote to regular shortcut based extractor * Add mcp to access key mapping table * Add support for embeds extraction * Add support for anvato embeds in generic extractor * [xtube] Fix extraction for older FLV videos (#12734) * [tvplayer] Fix extraction (#12908) version 2017.04.28 Core + [adobepass] Use geo verification headers for all requests - [downloader/fragment] Remove assert for resume_len when no fragments downloaded + [extractor/common] Add manifest_url for explicit group rendition formats * [extractor/common] Fix manifest_url for m3u8 formats - [extractor/common] Don't list master m3u8 playlists in format list (#12832) Extractor * [aenetworks] Fix extraction for shows with single season + [go] Add support for Disney, DisneyJunior and DisneyXD show pages * [youtube] Recognize new locale-based player URLs (#12885) + [streamable] Add support for new embedded URL schema (#12844) * [arte:+7] Relax URL regular expression (#12837) version 2017.04.26 Core * Introduce --keep-fragments for keeping fragments of fragmented download on disk after download is finished * [YoutubeDL] Fix output template for missing timestamp (#12796) * [socks] Handle cases where credentials are required but missing * [extractor/common] Improve HLS extraction (#12211) * Extract m3u8 parsing to separate method * Improve rendition groups extraction * Build stream name according stream GROUP-ID * Ignore reference to AUDIO group without URI when stream has no CODECS * Use float for scaled tbr in _parse_m3u8_formats * [utils] Add support for TTML styles in dfxp2srt * [downloader/hls] No need to download keys for fragments that have been already downloaded * [downloader/fragment] Improve fragment downloading * Resume immediately * Don't concatenate fragments and decrypt them on every resume * Optimize disk storage usage, don't store intermediate fragments on disk * Store bookkeeping download state file + [extractor/common] Add support for multiple getters in try_get + [extractor/common] Add support for video of WebPage context in _json_ld (#12778) + [extractor/common] Relax JWPlayer regular expression and remove duplicate URLs (#12768) Extractors * [iqiyi] Fix extraction of Yule videos * [vidio] Improve extraction and sort formats + [brightcove] Match only video elements with data-video-id attribute * [iqiyi] Fix playlist detection (#12504) - [azubu] Remove extractor (#12813) * [porn91] Fix extraction (#12814) * [vidzi] Fix extraction (#12793) + [amp] Extract error message (#12795) + [xfileshare] Add support for gorillavid.com and daclips.com (#12776) * [instagram] Fix extraction (#12777) + [generic] Support Brightcove videos in <iframe> (#12482) + [brightcove] Support URLs with bcpid instead of playerID (#12482) * [brightcove] Fix _extract_url (#12782) + [odnoklassniki] Extract HLS formats version 2017.04.17 Extractors * [limelight] Improve extraction LimelightEmbeddedPlayerFlash media embeds and add support for channel and channelList embeds * [generic] Extract multiple Limelight embeds (#12761) + [itv] Extract series metadata * [itv] Fix RTMP formats downloading (#12759) * [itv] Use native HLS downloader by default + [go90] Extract subtitles (#12752) + [go90] Extract series metadata (#12752) version 2017.04.16 Core * [YoutubeDL] Apply expand_path after output template substitution + [YoutubeDL] Propagate overridden meta fields to extraction results of type url (#11163) Extractors + [generic] Extract RSS entries as url_transparent (#11163) + [streamango] Add support for streamango.com (#12643) + [wsj:article] Add support for articles (#12558) * [brightcove] Relax video tag embeds extraction and validate ambiguous embeds' URLs (#9163, #12005, #12178, #12480) + [udemy] Add support for react rendition (#12744) version 2017.04.15 Extractors * [youku] Fix fileid extraction (#12741, #12743) version 2017.04.14 Core + [downloader/hls] Add basic support for EXT-X-BYTERANGE tag (#10955) + [adobepass] Improve Comcast and Verison login code (#10803) + [adobepass] Add support for Verizon (#10803) Extractors + [aenetworks] Add support for specials (#12723) + [hbo] Extract HLS formats + [go90] Add support for go90.com (#10127) + [tv2hu] Add support for tv2.hu (#10509) + [generic] Exclude URLs with xml ext from valid video URLs (#10768, #11654) * [youtube] Improve HLS formats extraction * [afreecatv] Fix extraction for videos with different key layout (#12718) - [youtube] Remove explicit preference for audio-only and video-only formats in order not to break sorting when new formats appear * [canalplus] Bypass geo restriction version 2017.04.11 Extractors * [afreecatv] Fix extraction (#12706) + [generic] Add support for <object> YouTube embeds (#12637) * [bbccouk] Treat bitrate as audio+video bitrate in media selector + [bbccouk] Skip unrecognized formats in media selector (#12701) + [bbccouk] Add support for https protocol in media selector (#12701) * [curiositystream] Fix extraction (#12638) * [adn] Update subtitle decryption key * [chaturbate] Fix extraction (#12665, #12688, #12690) version 2017.04.09 Extractors + [medici] Add support for medici.tv (#3406) + [rbmaradio] Add support for redbullradio.com URLs (#12687) + [npo:live] Add support for default URL (#12555) * [mixcloud:playlist] Fix title, description and view count extraction (#12582) + [thesun] Add suport for thesun.co.uk (#11298, #12674) + [ceskateleveize:porady] Add support for porady (#7411, #12645) * [ceskateleveize] Improve extraction and remove URL replacement hacks + [kaltura] Add support for iframe embeds (#12679) * [airmozilla] Fix extraction (#12670) * [wshh] Extract html5 entries and delegate to generic extractor (12676) + [raiplay] Extract subtitles + [xfileshare] Add support for vidlo.us (#12660) + [xfileshare] Add support for vidbom.com (#12661) + [aenetworks] Add more video URL regular expressions (#12657) + [odnoklassniki] Fix format sorting for 1080p quality + [rtl2] Add support for you.rtl2.de (#10257) + [vshare] Add support for vshare.io (#12278) version 2017.04.03 Core + [extractor/common] Add censorship check for TransTelekom ISP * [extractor/common] Move censorship checks to a separate method Extractors + [discoveryvr] Add support for discoveryvr.com (#12578) + [tv5mondeplus] Add support for tv5mondeplus.com (#11386) + [periscope] Add support for pscp.tv URLs (#12618, #12625) version 2017.04.02 Core * [YoutubeDL] Return early when extraction of url_transparent fails Extractors * [rai] Fix and improve extraction (#11790) + [vrv] Add support for series pages * [limelight] Improve extraction for audio only formats * [funimation] Fix extraction (#10696, #11773) + [xfileshare] Add support for vidabc.com (#12589) + [xfileshare] Improve extraction and extract hls formats + [crunchyroll] Pass geo verifcation proxy + [cwtv] Extract ISM formats + [tvplay] Bypass geo restriction + [vrv] Add support for vrv.co + [packtpub] Add support for packtpub.com (#12610) + [generic] Pass base_url to _parse_jwplayer_data + [adn] Add support for animedigitalnetwork.fr (#4866) + [allocine] Extract more metadata * [allocine] Fix extraction (#12592) * [openload] Fix extraction version 2017.03.26 Core * Don't raise an error if JWPlayer config data is not a Javascript object literal. _find_jwplayer_data now returns a dict rather than an str. (#12307) * Expand environment variables for options representing paths (#12556) + [utils] Introduce expand_path * [downloader/hls] Delegate downloading to ffmpeg immediately for live streams Extractors * [afreecatv] Fix extraction (#12179) + [atvat] Add support for atv.at (#5325) + [fox] Add metadata extraction (#12391) + [atresplayer] Extract DASH formats + [atresplayer] Extract HD manifest (#12548) * [atresplayer] Fix login error detection (#12548) * [franceculture] Fix extraction (#12547) * [youtube] Improve URL regular expression (#12538) * [generic] Do not follow redirects to the same URL version 2017.03.24 Extractors - [9c9media] Remove mp4 URL extraction request + [bellmedia] Add support for etalk.ca and space.ca (#12447) * [channel9] Fix extraction (#11323) * [cloudy] Fix extraction (#12525) + [hbo] Add support for free episode URLs and new formats extraction (#12519) * [condenast] Fix extraction and style (#12526) * [viu] Relax URL regular expression (#12529) version 2017.03.22 Extractors - [pluralsight] Omit module title from video title (#12506) * [pornhub] Decode obfuscated video URL (#12470, #12515) * [senateisvp] Allow https URL scheme for embeds (#12512)
2017-05-18Pullup ticket #5429 - requested by kimbsiegert2-2/+12
net/wget: security fix Revisions pulled up: - net/wget/Makefile 1.135 - net/wget/distinfo 1.54 --- Module Name: pkgsrc Committed By: kim Date: Mon May 15 05:10:09 UTC 2017 Modified Files: pkgsrc/net/wget: Makefile distinfo Log Message: Add a patch for CVE-2017-6508 from upstream.
2017-05-06Pullup ticket #5395 - requested by sevanbsiegert1-4/+4
net/xymon: build fix Revisions pulled up: - net/xymon/Makefile 1.49 --- Module Name: pkgsrc Committed By: spz Date: Wed May 3 05:29:41 UTC 2017 Modified Files: pkgsrc/net/xymon: Makefile Log Message: chmod the right files, the .sh are just an identical wrapper now
2017-05-06Pullup ticket #5393 - requested by sevanbsiegert2-11/+9
net/tor: point update (ensure package remains functional) Revisions pulled up: - net/tor/Makefile 1.119 - net/tor/distinfo 1.80 --- Module Name: pkgsrc Committed By: wiz Date: Tue May 2 11:16:02 UTC 2017 Modified Files: pkgsrc/net/tor: Makefile distinfo Log Message: Updated tor to 0.3.0.6. Changes in version 0.3.0.6 - 2017-04-26 Tor 0.3.0.6 is the first stable release of the Tor 0.3.0 series. With the 0.3.0 series, clients and relays now use Ed25519 keys to authenticate their link connections to relays, rather than the old RSA1024 keys that they used before. (Circuit crypto has been Curve25519-authenticated since 0.2.4.8-alpha.) We have also replaced the guard selection and replacement algorithm to behave more robustly in the presence of unreliable networks, and to resist guard- capture attacks. This series also includes numerous other small features and bugfixes, along with more groundwork for the upcoming hidden-services revamp. Per our stable release policy, we plan to support the Tor 0.3.0 release series for at least the next nine months, or for three months after the first stable release of the 0.3.1 series: whichever is longer. If you need a release with long-term support, we recommend that you stay with the 0.2.9 series. Below are the changes since 0.2.9.10. For a list of only the changes since 0.3.0.5-rc, see the ChangeLog file. o Major features (directory authority, security): - The default for AuthDirPinKeys is now 1: directory authorities will reject relays where the RSA identity key matches a previously seen value, but the Ed25519 key has changed. Closes ticket 18319. o Major features (guard selection algorithm): - Tor's guard selection algorithm has been redesigned from the ground up, to better support unreliable networks and restrictive sets of entry nodes, and to better resist guard-capture attacks by hostile local networks. Implements proposal 271; closes ticket 19877. o Major features (next-generation hidden services): - Relays can now handle v3 ESTABLISH_INTRO cells as specified by prop224 aka "Next Generation Hidden Services". Service and clients don't use this functionality yet. Closes ticket 19043. Based on initial code by Alec Heifetz. - Relays now support the HSDir version 3 protocol, so that they can can store and serve v3 descriptors. This is part of the next- generation onion service work detailled in proposal 224. Closes ticket 17238. o Major features (protocol, ed25519 identity keys): - Clients now support including Ed25519 identity keys in the EXTEND2 cells they generate. By default, this is controlled by a consensus parameter, currently disabled. You can turn this feature on for testing by setting ExtendByEd25519ID in your configuration. This might make your traffic appear different than the traffic generated by other users, however. Implements part of ticket 15056; part of proposal 220. - Relays now understand requests to extend to other relays by their Ed25519 identity keys. When an Ed25519 identity key is included in an EXTEND2 cell, the relay will only extend the circuit if the other relay can prove ownership of that identity. Implements part of ticket 15056; part of proposal 220. - Relays now use Ed25519 to prove their Ed25519 identities and to one another, and to clients. This algorithm is faster and more secure than the RSA-based handshake we've been doing until now. Implements the second big part of proposal 220; Closes ticket 15055. o Major features (security): - Change the algorithm used to decide DNS TTLs on client and server side, to better resist DNS-based correlation attacks like the DefecTor attack of Greschbach, Pulls, Roberts, Winter, and Feamster. Now relays only return one of two possible DNS TTL values, and clients are willing to believe DNS TTL values up to 3 hours long. Closes ticket 19769. o Major bugfixes (client, onion service, also in 0.2.9.9): - Fix a client-side onion service reachability bug, where multiple socks requests to an onion service (or a single slow request) could cause us to mistakenly mark some of the service's introduction points as failed, and we cache that failure so eventually we run out and can't reach the service. Also resolves a mysterious "Remote server sent bogus reason code 65021" log warning. The bug was introduced in ticket 17218, where we tried to remember the circuit end reason as a uint16_t, which mangled negative values. Partially fixes bug 21056 and fixes bug 20307; bugfix on 0.2.8.1-alpha. o Major bugfixes (crash, directory connections): - Fix a rare crash when sending a begin cell on a circuit whose linked directory connection had already been closed. Fixes bug 21576; bugfix on 0.2.9.3-alpha. Reported by Alec Muffett. o Major bugfixes (directory authority): - During voting, when marking a relay as a probable sybil, do not clear its BadExit flag: sybils can still be bad in other ways too. (We still clear the other flags.) Fixes bug 21108; bugfix on 0.2.0.13-alpha. o Major bugfixes (DNS): - Fix a bug that prevented exit nodes from caching DNS records for more than 60 seconds. Fixes bug 19025; bugfix on 0.2.4.7-alpha. o Major bugfixes (IPv6 Exits): - Stop rejecting all IPv6 traffic on Exits whose exit policy rejects any IPv6 addresses. Instead, only reject a port over IPv6 if the exit policy rejects that port on more than an IPv6 /16 of addresses. This bug was made worse by 17027 in 0.2.8.1-alpha, which rejected a relay's own IPv6 address by default. Fixes bug 21357; bugfix on commit 004f3f4e53 in 0.2.4.7-alpha. o Major bugfixes (parsing): - Fix an integer underflow bug when comparing malformed Tor versions. This bug could crash Tor when built with --enable-expensive-hardening, or on Tor 0.2.9.1-alpha through Tor 0.2.9.8, which were built with -ftrapv by default. In other cases it was harmless. Part of TROVE-2017-001. Fixes bug 21278; bugfix on 0.0.8pre1. Found by OSS-Fuzz. - When parsing a malformed content-length field from an HTTP message, do not read off the end of the buffer. This bug was a potential remote denial-of-service attack against Tor clients and relays. A workaround was released in October 2016, to prevent this bug from crashing Tor. This is a fix for the underlying issue, which should no longer matter (if you applied the earlier patch). Fixes bug 20894; bugfix on 0.2.0.16-alpha. Bug found by fuzzing using AFL (http://lcamtuf.coredump.cx/afl/). o Major bugfixes (scheduler): - Actually compare circuit policies in ewma_cmp_cmux(). This bug caused the channel scheduler to behave more or less randomly, rather than preferring channels with higher-priority circuits. Fixes bug 20459; bugfix on 0.2.6.2-alpha. o Major bugfixes (security, also in 0.2.9.9): - Downgrade the "-ftrapv" option from "always on" to "only on when --enable-expensive-hardening is provided." This hardening option, like others, can turn survivable bugs into crashes--and having it on by default made a (relatively harmless) integer overflow bug into a denial-of-service bug. Fixes bug 21278 (TROVE-2017-001); bugfix on 0.2.9.1-alpha. o Minor feature (client): - Enable IPv6 traffic on the SocksPort by default. To disable this, a user will have to specify "NoIPv6Traffic". Closes ticket 21269. o Minor feature (fallback scripts): - Add a check_existing mode to updateFallbackDirs.py, which checks if fallbacks in the hard-coded list are working. Closes ticket 20174. Patch by haxxpop. o Minor feature (protocol versioning): - Add new protocol version for proposal 224. HSIntro now advertises version "3-4" and HSDir version "1-2". Fixes ticket 20656. o Minor features (ciphersuite selection): - Allow relays to accept a wider range of ciphersuites, including chacha20-poly1305 and AES-CCM. Closes the other part of 15426. - Clients now advertise a list of ciphersuites closer to the ones preferred by Firefox. Closes part of ticket 15426. o Minor features (controller): - Add "GETINFO sr/current" and "GETINFO sr/previous" keys, to expose shared-random values to the controller. Closes ticket 19925. - When HSFETCH arguments cannot be parsed, say "Invalid argument" rather than "unrecognized." Closes ticket 20389; patch from Ivan Markin. o Minor features (controller, configuration): - Each of the *Port options, such as SocksPort, ORPort, ControlPort, and so on, now comes with a __*Port variant that will not be saved to the torrc file by the controller's SAVECONF command. This change allows TorBrowser to set up a single-use domain socket for each time it launches Tor. Closes ticket 20956. - The GETCONF command can now query options that may only be meaningful in context-sensitive lists. This allows the controller to query the mixed SocksPort/__SocksPort style options introduced in feature 20956. Implements ticket 21300. o Minor features (diagnostic, directory client): - Warn when we find an unexpected inconsistency in directory download status objects. Prevents some negative consequences of bug 20593. o Minor features (directory authorities): - Directory authorities now reject descriptors that claim to be malformed versions of Tor. Helps prevent exploitation of bug 21278. - Reject version numbers with components that exceed INT32_MAX. Otherwise 32-bit and 64-bit platforms would behave inconsistently. Fixes bug 21450; bugfix on 0.0.8pre1. o Minor features (directory authority): - Add a new authority-only AuthDirTestEd25519LinkKeys option (on by default) to control whether authorities should try to probe relays by their Ed25519 link keys. This option will go away in a few releases--unless we encounter major trouble in our ed25519 link protocol rollout, in which case it will serve as a safety option. o Minor features (directory cache): - Relays and bridges will now refuse to serve the consensus they have if they know it is too old for a client to use. Closes ticket 20511. o Minor features (ed25519 link handshake): - Advertise support for the ed25519 link handshake using the subprotocol-versions mechanism, so that clients can tell which relays can identity themselves by Ed25519 ID. Closes ticket 20552. o Minor features (entry guards): - Add UseEntryGuards to TEST_OPTIONS_DEFAULT_VALUES in order to not break regression tests. - Require UseEntryGuards when UseBridges is set, in order to make sure bridges aren't bypassed. Resolves ticket 20502. o Minor features (fallback directories): - Allow 3 fallback relays per operator, which is safe now that we are choosing 200 fallback relays. Closes ticket 20912. - Annotate updateFallbackDirs.py with the bandwidth and consensus weight for each candidate fallback. Closes ticket 20878. - Display the relay fingerprint when downloading consensuses from fallbacks. Closes ticket 20908. - Exclude relays affected by bug 20499 from the fallback list. Exclude relays from the fallback list if they are running versions known to be affected by bug 20499, or if in our tests they deliver a stale consensus (i.e. one that expired more than 24 hours ago). Closes ticket 20539. - Make it easier to change the output sort order of fallbacks. Closes ticket 20822. - Reduce the minimum fallback bandwidth to 1 MByte/s. Part of ticket 18828. - Require fallback directories to have the same address and port for 7 days (now that we have enough relays with this stability). Relays whose OnionOO stability timer is reset on restart by bug 18050 should upgrade to Tor 0.2.8.7 or later, which has a fix for this issue. Closes ticket 20880; maintains short-term fix in 0.2.8.2-alpha. - Require fallbacks to have flags for 90% of the time (weighted decaying average), rather than 95%. This allows at least 73% of clients to bootstrap in the first 5 seconds without contacting an authority. Part of ticket 18828. - Select 200 fallback directories for each release. Closes ticket 20881. o Minor features (fingerprinting resistence, authentication): - Extend the length of RSA keys used for TLS link authentication to 2048 bits. (These weren't used for forward secrecy; for forward secrecy, we used P256.) Closes ticket 13752. o Minor features (geoip): - Update geoip and geoip6 to the April 4 2017 Maxmind GeoLite2 Country database. o Minor features (geoip, also in 0.2.9.9): - Update geoip and geoip6 to the January 4 2017 Maxmind GeoLite2 Country database. o Minor features (infrastructure): - Implement smartlist_add_strdup() function. Replaces the use of smartlist_add(sl, tor_strdup(str)). Closes ticket 20048. o Minor features (linting): - Enhance the changes file linter to warn on Tor versions that are prefixed with "tor-". Closes ticket 21096. o Minor features (logging): - In several places, describe unset ed25519 keys as "<unset>", rather than the scary "AAAAAAAA...AAA". Closes ticket 21037. o Minor features (portability, compilation): - Autoconf now checks to determine if OpenSSL structures are opaque, instead of explicitly checking for OpenSSL version numbers. Part of ticket 21359. - Support building with recent LibreSSL code that uses opaque structures. Closes ticket 21359. o Minor features (relay): - We now allow separation of exit and relay traffic to different source IP addresses, using the OutboundBindAddressExit and OutboundBindAddressOR options respectively. Closes ticket 17975. Written by Michael Sonntag. o Minor features (reliability, crash): - Try better to detect problems in buffers where they might grow (or think they have grown) over 2 GB in size. Diagnostic for bug 21369. o Minor features (testing): - During 'make test-network-all', if tor logs any warnings, ask chutney to output them. Requires a recent version of chutney with the 21572 patch. Implements 21570. o Minor bugfix (control protocol): - The reply to a "GETINFO config/names" request via the control protocol now spells the type "Dependent" correctly. This is a breaking change in the control protocol. (The field seems to be ignored by the most common known controllers.) Fixes bug 18146; bugfix on 0.1.1.4-alpha. - The GETINFO extra-info/digest/<digest> command was broken because of a wrong base16 decode return value check, introduced when refactoring that API. Fixes bug 22034; bugfix on 0.2.9.1-alpha. o Minor bugfix (logging): - Don't recommend the use of Tor2web in non-anonymous mode. Recommending Tor2web is a bad idea because the client loses all anonymity. Tor2web should only be used in specific cases by users who *know* and understand the issues. Fixes bug 21294; bugfix on 0.2.9.3-alpha. o Minor bugfixes (bug resilience): - Fix an unreachable size_t overflow in base64_decode(). Fixes bug 19222; bugfix on 0.2.0.9-alpha. Found by Guido Vranken; fixed by Hans Jerry Illikainen. o Minor bugfixes (build): - Replace obsolete Autoconf macros with their modern equivalent and prevent similar issues in the future. Fixes bug 20990; bugfix on 0.1.0.1-rc. o Minor bugfixes (certificate expiration time): - Avoid using link certificates that don't become valid till some time in the future. Fixes bug 21420; bugfix on 0.2.4.11-alpha o Minor bugfixes (client): - Always recover from failures in extend_info_from_node(), in an attempt to prevent any recurrence of bug 21242. Fixes bug 21372; bugfix on 0.2.3.1-alpha. - When clients that use bridges start up with a cached consensus on disk, they were ignoring it and downloading a new one. Now they use the cached one. Fixes bug 20269; bugfix on 0.2.3.12-alpha. o Minor bugfixes (code correctness): - Repair a couple of (unreachable or harmless) cases of the risky comparison-by-subtraction pattern that caused bug 21278. o Minor bugfixes (config): - Don't assert on startup when trying to get the options list and LearnCircuitBuildTimeout is set to 0: we are currently parsing the options so of course they aren't ready yet. Fixes bug 21062; bugfix on 0.2.9.3-alpha. o Minor bugfixes (configuration): - Accept non-space whitespace characters after the severity level in the `Log` option. Fixes bug 19965; bugfix on 0.2.1.1-alpha. - Support "TByte" and "TBytes" units in options given in bytes. "TB", "terabyte(s)", "TBit(s)" and "terabit(s)" were already supported. Fixes bug 20622; bugfix on 0.2.0.14-alpha. o Minor bugfixes (configure, autoconf): - Rename the configure option --enable-expensive-hardening to --enable-fragile-hardening. Expensive hardening makes the tor daemon abort when some kinds of issues are detected. Thus, it makes tor more at risk of remote crashes but safer against RCE or heartbleed bug category. We now try to explain this issue in a message from the configure script. Fixes bug 21290; bugfix on 0.2.5.4-alpha. o Minor bugfixes (consensus weight): - Add new consensus method that initializes bw weights to 1 instead of 0. This prevents a zero weight from making it all the way to the end (happens in small testing networks) and causing an error. Fixes bug 14881; bugfix on 0.2.2.17-alpha. o Minor bugfixes (crash prevention): - Fix an (currently untriggerable, but potentially dangerous) crash bug when base32-encoding inputs whose sizes are not a multiple of 5. Fixes bug 21894; bugfix on 0.2.9.1-alpha. o Minor bugfixes (dead code): - Remove a redundant check for PidFile changes at runtime in options_transition_allowed(): this check is already performed regardless of whether the sandbox is active. Fixes bug 21123; bugfix on 0.2.5.4-alpha. o Minor bugfixes (descriptors): - Correctly recognise downloaded full descriptors as valid, even when using microdescriptors as circuits. This affects clients with FetchUselessDescriptors set, and may affect directory authorities. Fixes bug 20839; bugfix on 0.2.3.2-alpha. o Minor bugfixes (directory mirrors): - Allow relays to use directory mirrors without a DirPort: these relays need to be contacted over their ORPorts using a begindir connection. Fixes one case of bug 20711; bugfix on 0.2.8.2-alpha. - Clarify the message logged when a remote relay is unexpectedly missing an ORPort or DirPort: users were confusing this with a local port. Fixes another case of bug 20711; bugfix on 0.2.8.2-alpha. o Minor bugfixes (directory system): - Bridges and relays now use microdescriptors (like clients do) rather than old-style router descriptors. Now bridges will blend in with clients in terms of the circuits they build. Fixes bug 6769; bugfix on 0.2.3.2-alpha. - Download all consensus flavors, descriptors, and authority certificates when FetchUselessDescriptors is set, regardless of whether tor is a directory cache or not. Fixes bug 20667; bugfix on all recent tor versions. o Minor bugfixes (documentation): - Update the tor manual page to document every option that can not be changed while tor is running. Fixes bug 21122. o Minor bugfixes (ed25519 certificates): - Correctly interpret ed25519 certificates that would expire some time after 19 Jan 2038. Fixes bug 20027; bugfix on 0.2.7.2-alpha. o Minor bugfixes (fallback directories): - Avoid checking fallback candidates' DirPorts if they are down in OnionOO. When a relay operator has multiple relays, this prioritizes relays that are up over relays that are down. Fixes bug 20926; bugfix on 0.2.8.3-alpha. - Stop failing when OUTPUT_COMMENTS is True in updateFallbackDirs.py. Fixes bug 20877; bugfix on 0.2.8.3-alpha. - Stop failing when a relay has no uptime data in updateFallbackDirs.py. Fixes bug 20945; bugfix on 0.2.8.1-alpha. o Minor bugfixes (hidden service): - Clean up the code for expiring intro points with no associated circuits. It was causing, rarely, a service with some expiring introduction points to not open enough additional introduction points. Fixes part of bug 21302; bugfix on 0.2.7.2-alpha. - Resolve two possible underflows which could lead to creating and closing a lot of introduction point circuits in a non-stop loop. Fixes bug 21302; bugfix on 0.2.7.2-alpha. - Stop setting the torrc option HiddenServiceStatistics to "0" just because we're not a bridge or relay. Instead, we preserve whatever value the user set (or didn't set). Fixes bug 21150; bugfix on 0.2.6.2-alpha. o Minor bugfixes (hidden services): - Make hidden services check for failed intro point connections, even when they have exceeded their intro point creation limit. Fixes bug 21596; bugfix on 0.2.7.2-alpha. Reported by Alec Muffett. - Make hidden services with 8 to 10 introduction points check for failed circuits immediately after startup. Previously, they would wait for 5 minutes before performing their first checks. Fixes bug 21594; bugfix on 0.2.3.9-alpha. Reported by Alec Muffett. - Stop ignoring misconfigured hidden services. Instead, refuse to start tor until the misconfigurations have been corrected. Fixes bug 20559; bugfix on multiple commits in 0.2.7.1-alpha and earlier. o Minor bugfixes (IPv6): - Make IPv6-using clients try harder to find an IPv6 directory server. Fixes bug 20999; bugfix on 0.2.8.2-alpha. - When IPv6 addresses have not been downloaded yet (microdesc consensus documents don't list relay IPv6 addresses), use hard- coded addresses for authorities, fallbacks, and configured bridges. Now IPv6-only clients can use microdescriptors. Fixes bug 20996; bugfix on b167e82 from 19608 in 0.2.8.5-alpha. o Minor bugfixes (memory leak at exit): - Fix a small harmless memory leak at exit of the previously unused RSA->Ed identity cross-certificate. Fixes bug 17779; bugfix on 0.2.7.2-alpha. o Minor bugfixes (onion services): - Allow the number of introduction points to be as low as 0, rather than as low as 3. Fixes bug 21033; bugfix on 0.2.7.2-alpha. o Minor bugfixes (portability): - Use "OpenBSD" compiler macro instead of "OPENBSD" or "__OpenBSD__". It is supported by OpenBSD itself, and also by most OpenBSD variants (such as Bitrig). Fixes bug 20980; bugfix on 0.1.2.1-alpha. o Minor bugfixes (portability, also in 0.2.9.9): - Avoid crashing when Tor is built using headers that contain CLOCK_MONOTONIC_COARSE, but then tries to run on an older kernel without CLOCK_MONOTONIC_COARSE. Fixes bug 21035; bugfix on 0.2.9.1-alpha. - Fix Libevent detection on platforms without Libevent 1 headers installed. Fixes bug 21051; bugfix on 0.2.9.1-alpha. o Minor bugfixes (relay): - Avoid a double-marked-circuit warning that could happen when we receive DESTROY cells under heavy load. Fixes bug 20059; bugfix on 0.1.0.1-rc. - Honor DataDirectoryGroupReadable when tor is a relay. Previously, initializing the keys would reset the DataDirectory to 0700 instead of 0750 even if DataDirectoryGroupReadable was set to 1. Fixes bug 19953; bugfix on 0.0.2pre16. Patch by "redfish". o Minor bugfixes (testing): - Fix Raspbian build issues related to missing socket errno in test_util.c. Fixes bug 21116; bugfix on 0.2.8.2. Patch by "hein". - Remove undefined behavior from the backtrace generator by removing its signal handler. Fixes bug 21026; bugfix on 0.2.5.2-alpha. - Use bash in src/test/test-network.sh. This ensures we reliably call chutney's newer tools/test-network.sh when available. Fixes bug 21562; bugfix on 0.2.9.1-alpha. o Minor bugfixes (tor-resolve): - The tor-resolve command line tool now rejects hostnames over 255 characters in length. Previously, it would silently truncate them, which could lead to bugs. Fixes bug 21280; bugfix on 0.0.9pre5. Patch by "junglefowl". o Minor bugfixes (unit tests): - Allow the unit tests to pass even when DNS lookups of bogus addresses do not fail as expected. Fixes bug 20862 and 20863; bugfix on unit tests introduced in 0.2.8.1-alpha through 0.2.9.4-alpha. o Minor bugfixes (util): - When finishing writing a file to disk, if we were about to replace the file with the temporary file created before and we fail to replace it, remove the temporary file so it doesn't stay on disk. Fixes bug 20646; bugfix on 0.2.0.7-alpha. Patch by fk. o Minor bugfixes (Windows services): - Be sure to initialize the monotonic time subsystem before using it, even when running as an NT service. Fixes bug 21356; bugfix on 0.2.9.1-alpha. o Minor bugfixes (Windows): - Check for getpagesize before using it to mmap files. This fixes compilation in some MinGW environments. Fixes bug 20530; bugfix on 0.1.2.1-alpha. Reported by "ice". o Code simplification and refactoring: - Abolish all global guard context in entrynodes.c; replace with new guard_selection_t structure as preparation for proposal 271. Closes ticket 19858. - Extract magic numbers in circuituse.c into defined variables. - Introduce rend_service_is_ephemeral() that tells if given onion service is ephemeral. Replace unclear NULL-checkings for service directory with this function. Closes ticket 20526. - Refactor circuit_is_available_for_use to remove unnecessary check. - Refactor circuit_predict_and_launch_new for readability and testability. Closes ticket 18873. - Refactor code to manipulate global_origin_circuit_list into separate functions. Closes ticket 20921. - Refactor large if statement in purpose_needs_anonymity to use switch statement instead. Closes part of ticket 20077. - Refactor the hashing API to return negative values for errors, as is done as throughout the codebase. Closes ticket 20717. - Remove data structures that were used to index or_connection objects by their RSA identity digests. These structures are fully redundant with the similar structures used in the channel abstraction. - Remove duplicate code in the channel_write_*cell() functions. Closes ticket 13827; patch from Pingl. - Remove redundant behavior of is_sensitive_dir_purpose, refactor to use only purpose_needs_anonymity. Closes part of ticket 20077. - The code to generate and parse EXTEND and EXTEND2 cells has been replaced with code automatically generated by the "trunnel" utility. o Documentation (formatting): - Clean up formatting of tor.1 man page and HTML doc, where <pre> blocks were incorrectly appearing. Closes ticket 20885. o Documentation (man page): - Clarify many options in tor.1 and add some min/max values for HiddenService options. Closes ticket 21058. o Documentation: - Change '1' to 'weight_scale' in consensus bw weights calculation comments, as that is reality. Closes ticket 20273. Patch from pastly. - Clarify that when ClientRejectInternalAddresses is enabled (which is the default), multicast DNS hostnames for machines on the local network (of the form *.local) are also rejected. Closes ticket 17070. - Correct the value for AuthDirGuardBWGuarantee in the manpage, from 250 KBytes to 2 MBytes. Fixes bug 20435; bugfix on 0.2.5.6-alpha. - Include the "TBits" unit in Tor's man page. Fixes part of bug 20622; bugfix on 0.2.5.1-alpha. - Small fixes to the fuzzing documentation. Closes ticket 21472. - Stop the man page from incorrectly stating that HiddenServiceDir must already exist. Fixes 20486. - Update the description of the directory server options in the manual page, to clarify that a relay no longer needs to set DirPort in order to be a directory cache. Closes ticket 21720. o Removed features: - The AuthDirMaxServersPerAuthAddr option no longer exists: The same limit for relays running on a single IP applies to authority IP addresses as well as to non-authority IP addresses. Closes ticket 20960. - The UseDirectoryGuards torrc option no longer exists: all users that use entry guards will also use directory guards. Related to proposal 271; implements part of ticket 20831. o Testing: - Add tests for networkstatus_compute_bw_weights_v10. - Add unit tests circuit_predict_and_launch_new. - Extract dummy_origin_circuit_new so it can be used by other test functions. - New unit tests for tor_htonll(). Closes ticket 19563. Patch from "overcaffeinated". - Perform the coding style checks when running the tests and fail when coding style violations are found. Closes ticket 5500.
2017-05-01Pullup ticket #5391 - requested by sevanbsiegert1-2/+2
net/vnc: build fix Revisions pulled up: - net/vnc/Makefile 1.56 --- Module Name: pkgsrc Committed By: darcy Date: Sun Apr 30 14:37:40 UTC 2017 Modified Files: pkgsrc/net/vnc: Makefile Log Message: Old web site didn't work. Here is one that does.
2017-05-01Pullup ticket #5389 - requested by sevanbsiegert4-36/+7
net/sipsak: build fix Revisions pulled up: - net/sipsak/Makefile 1.14-1.15 - net/sipsak/distinfo 1.5 - net/sipsak/patches/patch-header__f.c deleted - net/sipsak/patches/patch-header__f.h deleted --- Module Name: pkgsrc Committed By: schwarz Date: Sat Apr 29 10:01:07 UTC 2017 Modified Files: pkgsrc/net/sipsak: Makefile Log Message: updated the download and home page URLs for sipsak --- Module Name: pkgsrc Committed By: schwarz Date: Sat Apr 29 10:21:54 UTC 2017 Modified Files: pkgsrc/net/sipsak: Makefile distinfo Removed Files: pkgsrc/net/sipsak/patches: patch-header__f.c patch-header__f.h Log Message: We do not need the inline removal patches since this can be achieved more easily with the existing substituion in Makefile (which initially had only been used for the Sunpro compiler).
2017-05-01Pullup ticket #5386 - requested by sevanbsiegert1-2/+2
net/iperf3: build fix Revisions pulled up: - net/iperf3/Makefile 1.5 --- Module Name: pkgsrc Committed By: jperkin Date: Fri Apr 28 14:12:14 UTC 2017 Modified Files: pkgsrc/net/iperf3: Makefile Log Message: Requires C99 for some math functions.
2017-04-29Pullup ticket #5322 - requested by sevanbsiegert2-18/+35
net/libpcap: build fix Revisions pulled up: - net/libpcap/distinfo 1.34 - net/libpcap/patches/patch-ac 1.12 --- Module Name: pkgsrc Committed By: dsainty Date: Wed Apr 19 11:50:18 UTC 2017 Modified Files: pkgsrc/net/libpcap: distinfo pkgsrc/net/libpcap/patches: patch-ac Log Message: Remove dependencies on VERSION, which trigger unintended implicit rules against version.c on case-insensitive file systems. Fixes build on Darwin in its out-of-the-box case-insensitive configuration.
2017-04-29Pullup ticket #5305 - requested by sevanbsiegert1-2/+2
net/traceroutr-nanog: build fix Revisions pulled up: - net/traceroute-nanog/Makefile 1.10 --- Module Name: pkgsrc Committed By: schwarz Date: Mon Apr 17 19:53:11 UTC 2017 Modified Files: pkgsrc/net/traceroute-nanog: Makefile Log Message: -lresolv resolv is needed on MacOS later than 10.6, too.
2017-04-25Pullup ticket #5359 - requested by sevanbsiegert1-2/+2
net/iftop: build fix Revisions pulled up: - net/iftop/Makefile 1.19 --- Module Name: pkgsrc Committed By: sborrill Date: Mon Apr 24 12:15:28 UTC 2017 Modified Files: pkgsrc/net/iftop: Makefile Log Message: Fix builtin vs ncurses detection
2017-04-13Pullup ticket #5273 - requested by tacabsiegert2-8/+7
net/bind99: security fix Revisions pulled up: - net/bind99/Makefile 1.66 - net/bind99/distinfo 1.44 --- Module Name: pkgsrc Committed By: taca Date: Thu Apr 13 01:53:35 UTC 2017 Modified Files: pkgsrc/net/bind99: Makefile distinfo Log Message: Update bind99 to 9.9.9pl8 (BIND 9.9.9-P8). Quote from release announce: BIND 9.9.9-P8 addresses the security issues described in CVE-2017-3136, CVE-2017-3137, and CVE-2017-3138, and updates the built-in trusted keys for the root zone. Quote from CHANGELOG: --- 9.9.9-P8 released --- 4582. [security] 'rndc ""' could trigger a assertion failure in named. (CVE-2017-3138) [RT #44924] 4580. [bug] 4578 introduced a regression when handling CNAME to referral below the current domain. [RT #44850] --- 9.9.9-P7 released --- 4578. [security] Some chaining (CNAME or DNAME) responses to upstream queries could trigger assertion failures. (CVE-2017-3137) [RT #44734] 4575. [security] DNS64 with "break-dnssec yes;" can result in an assertion failure. (CVE-2017-3136) [RT #44653] 4564. [maint] Update the built in managed keys to include the upcoming root KSK. [RT #44579]
2017-04-13Pullup ticket #5272 - requested by tacabsiegert2-8/+7
net/bind910: security fix Revisions pulled up: - net/bind910/Makefile 1.32 - net/bind910/distinfo 1.23 --- Module Name: pkgsrc Committed By: taca Date: Thu Apr 13 01:52:42 UTC 2017 Modified Files: pkgsrc/net/bind910: Makefile distinfo Log Message: Update bind910 to 9.10.4pl8 (BIND 9.10.4-P8). Quote from release announce: BIND 9.10.4-P8 addresses the security issues described in CVE-2017-3136, CVE-2017-3137, and CVE-2017-3138, and updates the built-in trusted keys for the root zone. From CHANGELOG: --- 9.10.4-P8 released --- 4582. [security] 'rndc ""' could trigger a assertion failure in named. (CVE-2017-3138) [RT #44924] 4580. [bug] 4578 introduced a regression when handling CNAME to referral below the current domain. [RT #44850] --- 9.10.4-P7 released --- 4578. [security] Some chaining (CNAME or DNAME) responses to upstream queries could trigger assertion failures. (CVE-2017-3137) [RT #44734] 4575. [security] DNS64 with "break-dnssec yes;" can result in an assertion failure. (CVE-2017-3136) [RT #44653] 4564. [maint] Update the built in managed keys to include the upcoming root KSK. [RT #44579]
2017-04-13Pullup ticket #5243 (second part) - requested by sevanbsiegert1-2/+2
(various packages): build fix Revisions pulled up: - benchmarks/phoronix-test-suite/Makefile 1.8 - finance/magento/Makefile 1.9 - mail/roundcube/Makefile 1.87 - meta-pkgs/php56-extensions/Makefile 1.7 - meta-pkgs/php70-extensions/Makefile 1.2 - meta-pkgs/php71-extensions/Makefile 1.2 - mk/defaults/options.description 1.526 - net/php-baikal/Makefile 1.10 - textproc/php-xsl/MESSAGE deleted - textproc/php-xsl/Makefile 1.10 - www/contao35/Makefile 1.28 - www/contao43/Makefile 1.10 - www/drupal7/Makefile 1.44 - www/drupal7/options.mk 1.4 - www/fengoffice/Makefile 1.38 - www/horde/Makefile 1.81 - www/mediawiki/Makefile 1.63 - www/moodle/Makefile 1.55 - www/php-concrete5/MESSAGE 1.8 - www/php-concrete5/Makefile 1.16 - www/php-nextcloud/MESSAGE 1.2 - www/php-nextcloud/Makefile 1.4 - www/php-owncloud/MESSAGE 1.20 - www/php-owncloud/Makefile 1.63 - www/php-tt-rss/MESSAGE 1.6 - www/php-tt-rss/Makefile 1.11 - www/phraseanet/MESSAGE 1.4 - www/phraseanet/Makefile 1.20 --- Module Name: pkgsrc Committed By: fhajny Date: Wed Apr 5 12:33:49 UTC 2017 Modified Files: pkgsrc/benchmarks/phoronix-test-suite: Makefile pkgsrc/finance/magento: Makefile pkgsrc/mail/roundcube: Makefile pkgsrc/meta-pkgs/php56-extensions: Makefile pkgsrc/meta-pkgs/php70-extensions: Makefile pkgsrc/meta-pkgs/php71-extensions: Makefile pkgsrc/mk/defaults: options.description pkgsrc/net/php-baikal: Makefile pkgsrc/textproc/php-xsl: Makefile pkgsrc/www/contao35: Makefile pkgsrc/www/contao43: Makefile pkgsrc/www/drupal7: Makefile options.mk pkgsrc/www/fengoffice: Makefile pkgsrc/www/horde: Makefile pkgsrc/www/mediawiki: Makefile pkgsrc/www/moodle: Makefile pkgsrc/www/php-concrete5: MESSAGE Makefile pkgsrc/www/php-nextcloud: MESSAGE Makefile pkgsrc/www/php-owncloud: MESSAGE Makefile pkgsrc/www/php-tt-rss: MESSAGE Makefile pkgsrc/www/phraseanet: MESSAGE Makefile Removed Files: pkgsrc/textproc/php-xsl: MESSAGE Log Message: Remove traces of textproc/php-dom which is not needed anymore, now that dom is built into PHP. Bump resp. PKGREVISION.
2017-04-08Pullup ticket #5250 - requested by bsiegertspz2-7/+7
net/rabbitmq: security update Revisions pulled up: - net/rabbitmq/Makefile 1.29 - net/rabbitmq/distinfo 1.33 ------------------------------------------------------------------- Module Name: pkgsrc Committed By: fhajny Date: Thu Mar 30 15:19:04 UTC 2017 Modified Files: pkgsrc/net/rabbitmq: Makefile distinfo Log Message: Update net/rabbitmq to 3.6.9. Management and Management Agent Plugins - Security Vulnerability Patches - CVE-2017-4965: XSS vulnerabilities in management UI - CVE-2017-4966: authentication details are stored in browser-local storage without expiration - CVE-2017-4967: XSS vulnerabilities in management UI - Bug Fixes - Certain TCP and TLS listener configuration settings could break JSON serialisation of GET /api/overview responses. Federation Plugin - More numerical types are now handled for the "hops" property. .NET Client - Calling ExchangeBind more than once with the same arguments threw an exception. To generate a diff of this commit: cvs rdiff -u -r1.28 -r1.29 pkgsrc/net/rabbitmq/Makefile cvs rdiff -u -r1.32 -r1.33 pkgsrc/net/rabbitmq/distinfo
2017-04-05Pullup ticket #5244 - requested by kimspz5-14/+19
net/proftpd-postgresql: security update net/proftpd-sqlite; security update net/proftpd: security update Revisions pulled up: - net/proftpd-postgresql/Makefile 1.3 - net/proftpd-sqlite/Makefile 1.6 - net/proftpd/Makefile 1.85 - net/proftpd/Makefile.common 1.5 - net/proftpd/distinfo 1.46 ------------------------------------------------------------------- Module Name: pkgsrc Committed By: kim Date: Wed Apr 5 17:36:00 UTC 2017 Modified Files: pkgsrc/net/proftpd: Makefile Makefile.common distinfo pkgsrc/net/proftpd-postgresql: Makefile pkgsrc/net/proftpd-sqlite: Makefile Log Message: Update net/proftpd (and modules) to 1.3.5d with a fix for CVE-2017-7418 1.3.5d - Released 15-Jan-2017 -------------------------------- - Bug 4283 - All FTP logins treated as anonymous logins again. This is a regression of Bug#3307. 1.3.5c - Released 14-Jan-2017 -------------------------------- - Bug 4254 - SSH rekey during authentication can cause issues with clients. - Bug 4257 - Recursive SCP uploads of multiple directories not handled properly. - Bug 4259 - LIST returns different results for file, depending on path syntax. - Bug 4255 - "AuthAliasOnly on" in server config breaks anonymous logins. - Bug 4272 - CapabilitiesEngine directive not honored for <IfUser>/<IfGroup> sections. - Bug 4275 - Support OpenSSL 1.1.x API. - Bug 4278 - Memory leak when mod_facl is used. To generate a diff of this commit: cvs rdiff -u -r1.84 -r1.85 pkgsrc/net/proftpd/Makefile cvs rdiff -u -r1.4 -r1.5 pkgsrc/net/proftpd/Makefile.common cvs rdiff -u -r1.45 -r1.46 pkgsrc/net/proftpd/distinfo cvs rdiff -u -r1.2 -r1.3 pkgsrc/net/proftpd-postgresql/Makefile cvs rdiff -u -r1.5 -r1.6 pkgsrc/net/proftpd-sqlite/Makefile
2017-03-29Fix SunOS segfaults. Bump PKGREVISION.fhajny3-5/+39
2017-03-27Find native SunOS libuuid.jperkin2-1/+21
2017-03-24Requires pkg-config to build properlyfhajny1-2/+2
2017-03-24Update to parpd-1.7. Changes include:roy2-7/+8
* Don't crash enumerating interfaces without a layer 2 address. * Fix ARP filter so we're only interested in ARP REQUEST messages.
2017-03-24Fix build with clang: ISO C++ says nullptr has no relation operatorsjoerg2-1/+32
defined.
2017-03-24Add SHA512sborrill1-1/+2
2017-03-24Update ntp4 to 4.2.8p10 including security fixes.taca2-7/+7
NTF's NTP Project is releasing ntp-4.2.8p10, which addresses: * 6 MEDIUM severity vulnerabilities (1 is about the Windows PPSAPI DLL) * 5 LOW severity vulnerabilities (2 are in the Windows Installer) * 4 Informational-level vulnerabilities * 15 other non-security fixes and improvements All of the security issues in this release are listed in VU#633849. ntp-4.2.8p10 was released on 21 March 2017. * Sec 3389 / CVE-2017-6464 / VU#325339: NTP-01-016 NTP: Denial of Service via Malformed Config (Pentest report 01.2017) - Reported by Cure53. * Sec 3388 / CVE-2017-6462 / VU#325339: NTP-01-014 NTP: Buffer Overflow in DPTS Clock (Pentest report 01.2017) - Reported by Cure53. * Sec 3387 / CVE-2017-6463 / VU#325339: NTP-01-012 NTP: Authenticated DoS via Malicious Config Option (Pentest report 01.2017) - Reported by Cure53. * Sec 3386: NTP-01-011 NTP: ntpq_stripquotes() returns incorrect Value (Pentest report 01.2017) - Reported by Cure53. * Sec 3385: NTP-01-010 NTP: ereallocarray()/eallocarray() underused (Pentest report 01.2017) - Reported by Cure53. * Sec 3384 / CVE-2017-6455 / VU#325339: NTP-01-009 NTP: Windows: Privileged execution of User Library code (Pentest report 01.2017) - Reported by Cure53. * Sec 3383 / CVE-2017-6452 / VU#325339: NTP-01-008 NTP: Windows Installer: Stack Buffer Overflow from Command Line (Pentest report 01.2017) - Reported by Cure53. * Sec 3382 / CVE-2017-6459 / VU#325339: NTP-01-007 NTP: Windows Installer: Data Structure terminated insufficiently (Pentest report 01.2017) - Reported by Cure53. * Sec 3381: NTP-01-006 NTP: Copious amounts of Unused Code (Pentest report 01.2017) - Reported by Cure53. * Sec 3380: NTP-01-005 NTP: Off-by-one in Oncore GPS Receiver (Pentest report 01.2017) - Reported by Cure53. * Sec 3379 / CVE-2017-6458 / VU#325339: NTP-01-004 NTP: Potential Overflows in ctl_put() functions (Pentest report 01.2017) - Reported by Cure53. * Sec 3378 / CVE-2017-6451 / VU#325339: NTP-01-003 Improper use of snprintf() in mx4200_send() (Pentest report 01.2017) - Reported by Cure53. * Sec 3377 / CVE-2017-6460 / VU#325339: NTP-01-002 Buffer Overflow in ntpq when fetching reslist (Pentest report 01.2017) - Reported by Cure53. * Sec 3376: NTP-01-001 Makefile does not enforce Security Flags (Pentest report 01.2017) - Reported by Cure53. * Sec 3361 / CVE-2016-9042 / VU#325339: 0rigin - Reported by Matthew Van Gundy of Cisco ASIG.
2017-03-23Extend SHA512 checksums to various files I have on my local distfilejoerg14-14/+28
mirror.
2017-03-21Fix a PLIST glitchhauke2-3/+4
pkglint whitespace
2017-03-21Explicitly disable mysql, so it's not detected if mysql-config is found.wiz1-1/+2
Addresses build problem reported by Louis Guillaume <louis@zabrico.com> on pkgsrc-users.
2017-03-21Fix build on SunOS with IPv6.fhajny2-1/+17
2017-03-20Unbreak go-crypto and go-net, they no longer depend on one another.bsiegert1-4/+2
Bump go-crypto and go-tools, which now depends on go-crypto-acme. Fixes PR pkg/52081 breakage.
2017-03-20Update net/youtube-dl to 20170320.leot3-11/+20
Changes: version 2017.03.20 Core + [YoutubeDL] Allow multiple input URLs to be used with stdout (-) as output template + [adobepass] Detect and output error on authz token extraction (#12472) Extractors + [bostonglobe] Add extractor for bostonglobe.com (#12099) + [toongoggles] Add support for toongoggles.com (#12171) + [medialaan] Add support for Medialaan sites (#9974, #11912) + [discoverynetworks] Add support for more domains and bypass geo restiction * [openload] Fix extraction (#10408) version 2017.03.16 Core + [postprocessor/ffmpeg] Add support for flac + [extractor/common] Extract SMIL formats from jwplayer Extractors + [generic] Add forgotten return for jwplayer formats * [redbulltv] Improve extraction version 2017.03.15 Core * Fix missing subtitles if --add-metadata is used (#12423) Extractors * [facebook] Make title optional (#12443) + [mitele] Add support for ooyala videos (#12430) * [openload] Fix extraction (#12435, #12446) * [streamable] Update API URL (#12433) + [crunchyroll] Extract season name (#12428) * [discoverygo] Bypass geo restriction + [discoverygo:playlist] Add support for playlists (#12424) version 2017.03.10 Extractors * [generic] Make title optional for jwplayer embeds (#12410) * [wdr:maus] Fix extraction (#12373) * [prosiebensat1] Improve title extraction (#12318, #12327) * [dplayit] Separate and rewrite extractor and bypass geo restriction (#12393) * [miomio] Fix extraction (#12291, #12388, #12402) * [telequebec] Fix description extraction (#12399) * [openload] Fix extraction (#12357) * [brightcove:legacy] Relax videoPlayer validation check (#12381)
2017-03-20Update ruby-slack-api to 1.4.0.tsutsui3-13/+12
No upstream changelog.
2017-03-20Fix HOMEPAGE, make GitHub url to use ssl.taca2-4/+4
2017-03-20Update ruby-net-ldap t 0.16.0.taca3-9/+12
=== Net::LDAP 0.16.0 * Sasl fix {#281}[https://github.com/ruby-ldap/ruby-net-ldap/pull/281] * enable TLS hostname validation {#279}[https://github.com/ruby-ldap/ruby-net-ldap/pull/279] * update rubocop to 0.42.0 {#278}[https://github.com/ruby-ldap/ruby-net-ldap/pull/278]
2017-03-20Update ruby-domain_name to 0.5.20170223.taca2-7/+7
# Change Log ## [v0.5.20161129](https://github.com/knu/ruby-domain_name/tree/v0.5.20170223) (2017-02-23) [Full Changelog](https://github.com/knu/ruby-domain_name/compare/v0.5.20161129...v0.5.20170223) - Update the eTLD database to 2017-02-23T00:52:11Z ## [v0.5.20161129](https://github.com/knu/ruby-domain_name/tree/v0.5.20161129) (2016-11-29) [Full Changelog](https://github.com/knu/ruby-domain_name/compare/v0.5.20160826...v0.5.20161129) - Update the eTLD database to 2016-11-29T01:22:03Z
2017-03-20Update ruby-amqp to 1.7.0.taca2-7/+7
Changes Between 1.6.0 and 1.7.0 (Feb 2nd, 2017) * Clear Framesets on Exception Unprocessed frames received on a connection are now correctly cleared when an exception occurs. Contributed by Michael Lutsiuk. GitHub issue: #218 * amq-protocol Update Minimum amq-protocol version is now 2.1.0.
2017-03-20Update net/rabbitmq to 3.6.8.fhajny3-18/+23
3.6.8 - Erlang/OTP R16B03 and 17.x compatibility restored - Minor bug fixes 3.6.7 - Distributed management plugin, including minor breaking HTTP API changes. - Bug fixes - Usability improvements
2017-03-20Update ruby-amq-protocolto 2.1.0.taca2-7/+7
## Changes between 2.0.0 and 2.1.0 ### Ruby Warnings Squashed Contributed by Akira Matsuda. GitHub issue: [#62](https://github.com/ruby-amqp/amq-protocol/pull/62) ### Byte Array Decoding Byte array values in types now can be decoded (to the extent Ruby type system permits) by this library. GitHub issue: [#58](https://github.com/ruby-amqp/amq-protocol/issues/58)
2017-03-20Mark go-net and go-crypto as BROKEN, since they DEPEND on each other.wiz1-2/+4
2017-03-20Fix strip_domain patch to work in anonymous case.sborrill3-9/+10
Bump PKGREVISION
2017-03-19Update mikutter to 3.5.5.tsutsui2-7/+7
Upstream changes: mikutter 3.5.5 * avoid posts with full-width spaces only in Postbox (thanks @ahiru3net) * user_detail_view: put auto new lines on printing Twitter start date etc.
2017-03-17Add support for strip_domainsborrill5-2/+63
Fix reading of can_skip_base_prefix setting Bump PKGREVISION
2017-03-17Update pear-Net_Socket to 1.1.0.taca2-7/+7
Release date: 2017-03-08 14:32 UTC Changelog: * Set minimum PHP version to 5.4.0 * Set minimum PEAR version to 1.10.1 * Bug #18262: Incomplete buffer sent with fwrite after bugfix #14619 * Bug #20113: package.xml does not validate * Bug #21031: Warning on connection error(stream_socket_client) * PR #7: Fix for "Maximum execution time of 30 seconds exceeded" error * PR #8: Make PHP5 compatible
2017-03-17Update pear-Net_IDNA2 to 0.2.0.taca2-7/+7
Release Date: 2017-03-06 15:50 UTC Changelog: * Set minimum PHP version to 5.4.0 * Set minimum PEAR version to 1.10.1 * Bug #19375: Add static to the fuction getInstance * Bug #21123: Signing the source package
2017-03-17Update net/py-lexicon to 2.0.0.fhajny2-7/+7
- Add OTP to test filters - Remove unnecessary filter from test - Update DNSimple provider to v2 - Add username/password authentication (with optional 2fa) to dnsimplev