summaryrefslogtreecommitdiff
path: root/net
AgeCommit message (Collapse)AuthorFilesLines
2005-11-06Don't advertise RC script and forget it in the PLIST. Bump revision.joerg2-3/+4
2005-11-05Add a RC script for NSD. Set default database location tojoerg6-13/+54
${VARBASE}/db/nsd.db on all platforms and use user/group nsd for the daemon to run as. Install sample configuration without .sample extension. Take maintainership. Bump revision.
2005-11-05This pkg has not been ported to big endian architectures. Set PKG_SKIP_REASON.kristerw1-1/+6
2005-11-05Add missing includes (ssl, zlib). From Geert Hendrickx.wiz3-10/+11
2005-11-05Added buildlink3.mk for this package.martti1-0/+18
2005-11-04Removed jdk13 from the PKG_JVMS_ACCEPTED.rillig1-2/+2
2005-11-04Fixed wrong use of WRKSRC. Cleaned up the Makefile. Added an overriderillig11-50/+46
for INSTALL_LIB. As the libraries are installed with the correct ownership now (LIBOWN and LIBGRP), bumped the PKGREVISION.
2005-11-04Removed invalid "jdk13" from PKG_JVMS_ACCEPTED.rillig3-6/+6
2005-11-04Use setpgrp(pid_t, pid_t) instead of setpgrp() on Darwin.minskim2-4/+4
2005-11-04Use the official utmpx patch. No functional change.martti2-6/+6
2005-11-04Patch allows build on NetBSD 2.1, but it built on everything else,gendalia1-1/+2
so increment PKGREVISION.
2005-11-04add patch to deal with statvfs not being in 2.1.gendalia2-1/+15
(NetBSD Version 299000000, not 200040000
2005-11-04Define BIND_8_COMPAT to build on Darwin.minskim1-1/+3
2005-11-03Fixed wrong use of WRKSRC.rillig5-25/+22
2005-11-03Fixed wrong use of WRKSRC.rillig9-32/+33
2005-11-03Fixed wrong use of WRKSRC.rillig10-33/+33
2005-11-03Add patch to fix a format string vulnerability in vmps_log():bouyer3-2/+22
http://www.security.nnov.ru/Jdocument889.html Patch from me, reviewed by Adrian Portelli Bump pkgrevision.
2005-11-03Updated proftpd to 1.3.0rc3martti7-80/+34
A lot of changes and bug fixes, including fix for the following security problem: http://security.lss.hr/index.php?page=details&ID=LSS-2004-10-02
2005-11-03Use real bind resolver on Interix.tv1-0/+11
2005-11-03Use ${LINK.c} to link and make sure all FLAGS are heeded.tv1-2/+2
2005-11-03Force requiring IPv6 support. (--disable-ipv6 is nowhere near enough;tv1-1/+6
it still uses AF_INET6, sockaddr_in6, and getaddrinfo().)
2005-11-03Build fixes for Interix (socklen_t; <sys/time.h> for fd_set).tv3-1/+24
2005-11-03NOT_FOR_PLATFORM Interix.tv1-2/+2
2005-11-03Don't enable privsep on Interix, which has no SCM_RIGHTS support.tv1-2/+6
2005-11-03Fix PKG_OPTIONS_VAR in previous.tv1-2/+2
2005-11-03Force requiring IPv6 capability.tv1-5/+6
2005-11-03Removed the trailing slash behind the last MASTER_SITE.rillig1-2/+2
2005-11-03Security update to version 2.0.5.salo3-9/+8
Changes: 2.0.5: ====== - Fixed bug in Linux get_default_gateway function introduced in 2.0.4, which would cause redirect-gateway on Linux clients to fail. - Restored easy-rsa/2.0 tree (backported from 2.1 beta series) which accidentally disappeared in 2.0.2 -> 2.0.4 transition. 2.0.4: ====== - Security fix -- Affects non-Windows OpenVPN clients of version 2.0 or higher which connect to a malicious or compromised server. A format string vulnerability in the foreign_option function in options.c could potentially allow a malicious or compromised server to execute arbitrary code on the client. Only non-Windows clients are affected. The vulnerability only exists if (a) the client's TLS negotiation with the server succeeds, (b) the server is malicious or has been compromised such that it is configured to push a maliciously crafted options string to the client, and (c) the client indicates its willingness to accept pushed options from the server by having "pull" or "client" in its configuration file (Credit: Vade79). CVE-2005-3393 - Security fix -- Potential DoS vulnerability on the server in TCP mode. If the TCP server accept() call returns an error status, the resulting exception handler may attempt to indirect through a NULL pointer, causing a segfault. Affects all OpenVPN 2.0 versions. CVE-2005-3409 - Fix attempt of assertion at multi.c:1586 (note that this precise line number will vary across different versions of OpenVPN). - Added ".PHONY: plugin" to Makefile.am to work around "make dist" issue. - Fixed double fork issue that occurs when --management-hold is used. - Moved TUN/TAP read/write log messages from --verb 8 to 6. - Warn when multiple clients having the same common name or username usurp each other when --duplicate-cn is not used. - Modified Windows and Linux versions of get_default_gateway to return the route with the smallest metric if multiple 0.0.0.0/0.0.0.0 entries are present. 2.0.3: ====== - openvpn_plugin_abort_v1 function wasn't being properly registered on Windows. - Fixed a bug where --mode server --proto tcp-server --cipher none operation could cause tunnel packet truncation.
2005-11-03Using MASTER_SITE_SOURCEFORGE instead of hard-coded URL.rillig1-2/+2
2005-11-03Removed empty line from PLIST.rillig2-5/+2
2005-11-03Using MASTER_SITE_DEBIAN instead of hard-coded URL.rillig1-2/+2
2005-11-03Removed empty line from PLIST.rillig2-4/+2
2005-11-03Remove supporting ruby16-base package.taca1-7/+1
2005-11-03Delete removed ruby related pacakge's entries.taca1-3/+1
2005-11-03Remove ruby-xmlrpc4r pacakge since it is part of ruby18-base pacakge.taca5-126/+0
2005-11-03Remove packages which supported by ruby16-base (Ruby 1.6.8) pacakge onlytaca4-132/+0
and now bundled in ruby18-base pacakges.
2005-11-03Remove dependency to ruby-dbm and ruby-digest package.taca1-6/+3
Bump PKGREVISION.
2005-11-03mydns-* packages need gettext-lib.minskim4-6/+8
2005-11-02Update net/skype to 1.2.0.18 (from 1.2.0.11)abs2-6/+6
25.10.2005 Skype for Linux version 1.2.0.18 * bugfix: fixed a bug in networking code that made Skype vulnerable to remotely induced crash (Skype Security Bulletin SKYPE-SB/2005-003) 22.09.2005 Skype for Linux version 1.2.0.17 * change: New multilingual EULA in Help.Licence * change: Call quality improvements * change: "Find in chat" engine rewritten * change: Refreshing icons on start tab * change: Cleaned up RPM packaging * bugfix: Menu items not disabled when going offline * bugfix: Crash when a new message was received * bugfix: Crash when password changed * bugfix: Crash when chat search string contained "+331234567" * bugfix: Crash when chat search string contained emoticon * bugfix: Auth requests from previous user being shown * bugfix: Crash while history was loading * bugfix: Find crash when searching for empty text * bugfix: Auth request remaining on event panel after authorization Only minimally startup tested as there is a font issue (seen in both old and new versions) on my NetBSD-3 xorg system...
2005-11-02Update to 1.1, provided by Emil Skoeldberg in private mail.wiz7-218/+7
Changes for 1.1 * added Emil Skoldberg's Interix patch * removed all changes prior to 1.0 * added listen-address * added .cache processing * started making html configurable * gmap2cache now obsolete
2005-11-02NOT_FOR_PLATFORM Interix.tv1-1/+3
2005-11-02Require IPv6 support via the options framework.tv1-1/+6
2005-11-02Use the options framework to force the requirement that IPv6 be available.tv1-6/+5
2005-11-02Not everything has YP. Make it autoconf-conditional.tv6-4/+78
Install documentation (only available in HTML). Bump PKGREVISION.
2005-11-02Update openafs to release 1.4.0.gendalia2-7/+7
The OpenAFS Gatekeepers are pleased to announce the release of version 1.4.0 of OpenAFS. This version incorporates hundreds of enhancements and improvements since the 1.2 series. Many bugs and programming inefficiencies (some of which have been present since IBM's donation of AFS to the open source community) have been eliminated, resulting in a much more stable product. Improvements for Windows users are particularly dramatic. OpenAFS 1.4.0 also represents a significant step forward for Kerberos 5 integration. This release allows Kerberos 5 KDCs including Microsoft Active Directory to be the source of AFS client authentication. Changes under UNIX (tm) and *nix Operating Systems - -------------------------------------------------- Increased Performance and Stability: The addition of pthreaded servers and thread optimizations in the RPC and RX libraries provide increased performance over the 1.2 release. Cache chunk locking has been refined, and native operating system vnodes on Linux and MacOS X are now supported. Support for files larger than two Gigabytes in the AFS file system is now available to operating systems providing native support for large files. ntp, rlogind, rsh and other unnecessary and potentially insecure services have been removed. Increased Server Efficiency in Handling Mobile Clients: Use of multi-host probing has been improved, reducing the time a server needs to timeout clients no longer accessible on the network. Server load is reduced by new functionality allowing servers to queue callback notifications for unreachable clients until the client contacts the server. Improved Administration: Audit logs are available for all servers augmenting existing server monitoring and debugging tools. All logs can be output to named pipes allowing organizations to deploy custom filters. Groups of groups (a.k.a. Supergroups) can now be created on the protection server providing additional flexibility in the administration of user access. The Kerberos 5 authentication tool, aklog, is now distributed as part of OpenAFS. Other New Features: The new "vos copy" command allows an administrator to create a new volume and copy the contents of an existing volume in one step. This eliminates the need to perform a "vos dump" followed by a "vos restore". The "vos convertROtoRW" command allows an administrator to convert an existing RO replica into a new RW site in the event the current RW site is down. The -vattachpar file server option reduces file server startup time by instructing the file server to attach volumes from multiple vice partitions in parallel.
2005-11-02Disable packages used with ruby16-base only or bundled withtaca1-3/+3
ruby18-base packages.
2005-11-01lablgtk2 interface is stable with lablgtk2>=2.6.0,wiz1-5/+3
update comment and depend on appropriate version.
2005-11-01Update for new patch-ab.frueauf1-1/+2
2005-11-01Add patch for security issue published at http://secunia.com/product/1228/frueauf2-1/+27
taken from http://www.gentoo.org/cgi-bin/viewcvs.cgi/*checkout*/net-analyzer/ethereal/files/ethereal-0.10.13-fix-irc-loop-DoS-CVE-2005-3313.diff?hideattic=1 Also bump version to 0.10.13nb1.
2005-11-01NOT_FOR_PLATFORM Interix.tv1-1/+3