summaryrefslogtreecommitdiff
path: root/security/doas
AgeCommit message (Collapse)AuthorFilesLines
2021-12-09security/doas: change Maintainernikita1-2/+2
2021-10-26security: Replace RMD160 checksums with BLAKE2s checksumsnia1-2/+2
All checksums have been double-checked against existing RMD160 and SHA512 hashes Unfetchable distfiles (fetched conditionally?): ./security/cyrus-sasl/distinfo cyrus-sasl-dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d.patch.v2
2021-10-07security: Remove SHA1 hashes for distfilesnia1-2/+1
2021-01-01security/doas: add conflict msgpin1-1/+3
Prepare to import opendoas
2020-10-26security/doas: remove vidoas functionalitypin2-6/+14
Security concerns have been raised by Kimmo Suominen on pkgsrc-security. See also, https://github.com/slicer69/doas/pull/46
2020-10-21security/doas: update to 6.3p2pin3-9/+9
6.3p2 This release introduces a new utility called vidoas (vi doas). This tool is a shell script which creates a copy of the doas.conf file, allows the admin to edit the file, and then checks its syntax for errors. If a problem is found, vidoas reports which line the error was on and asks us to try editing the file again. Once the new doas.conf file contains the proper syntax, it is installed and overwrites the old doas.conf file. This tool is designed to assist admins and avoid introducing errors to doas.conf which might accidentally revoke admin access to the machine. 6.3p1 In this release, we work around a quirk of the GNU parameter parser which required us to use double-dashes (--) after doas's parameters and before a target command's parameters. In the past we used "doas -- pacman -Syu" and now we can use simply "doas pacman -Syu". This change affects only GNU/Linux systems, other platforms like FreeBSD, NetBSD, etc already had this behaviour. 6.3 This release introduces a few minor changes: -Added command line parameter (-S) which launches an interactive shell. This is equivalent to "su -l" or "sudo -i". -Updated documentation to include the new -S flag. -Updated documentation to assist users in installing doas on some Linux distributions, such as CentOS, that prevent PAM authentication from working by default. 6.2p5 This release simply adds a new sample PAM configuration file for FreeBSD (and compatible systems). The new sample configuration file is named campat/pam.conf.freebsd.
2020-10-21doas: Use setusercontext(3)kim4-3/+39
Calling setusercontext(3) makes per-user temporary storage work (see per_user_tmp in security(7) and rc.conf(5)). May as well use our reallocarray(3) instead of the bundled compat code.
2020-10-21doas: Pass PKG_SYSCONFDIR to makekim1-2/+3
2020-04-28adjust maintainer to my new loginnikita1-2/+2
2020-04-28security/doas: fix no-op SUBST blockrillig1-7/+3
The Makefile has changed to GNU format, using round parentheses, which turned the substitution a no-op.
2020-01-01security/doas: update to version 6.2p4ng03-84/+7
Changelog picked from https://github.com/slicer69/doas/releases: 6.2p4: * Keeping environment variables with keepenv On some platforms (seemingly Linux and macOS) it is possible for repeated calls to getpwuid() can over-write the original struct passwd structure. (This behaviour may vary depending on which C library is used. This can lead to the original user's environment data being overwritten by the target user's, even when "keepenv" is specified in the doas.conf file. We now do a deep copy of the original and target users' struct passwd information to avoid over-writing the original on platforms where libc uses a static area for all calls.
2019-12-14security/doas: resolve PR pkg/54717.ng03-2/+79
patch in the correct installed location of the config file in the manpages.
2019-11-29security/doas: assign myself as maintainer.ng01-2/+2
2019-10-15security/doas: Update to 6.2p2ng02-7/+7
Significant items from https://github.com/slicer69/doas/releases: doas 6.2p2 * Introducing macOS support Due to the dedicated work by Gordon Bergling, the doas command now builds and runs on macOS. This release contains no functionality changes, just the ability to build and run on macOS.
2019-09-14security/doas: Remove system mentions in DESCR and fix a typo.ng01-3/+2
2019-09-14security/doas: Update to 6.2p1ng02-9/+9
Significant items from https://github.com/slicer69/doas/releases: doas 6.2p1 * Fixes a crash on Linux systems when a specified user on the command line did not match a valid entry in the doas.conf file. In the past, doas would first try to find an exact username match when the "-u" flag was used and, if one could not be found, it would try to find a matching numeric UID. Now doas requires that an exact username be specified when "-u" is used. This avoids confusion (and, on Linux, fuzzy matches when a username begins with a number). This means "doas -u 0" can no longer be used to run a command as root, and "duas -u 1000" is not ambigious if there is a user with the name "1000" on the system. doas 6.2 * Group permissions of the original user are now dropped on Linux. This prevents the original user's group access from interfering with the target user's owned files. Group permissions were already dropped on FreeBSD (and I believe) NetBSD, and this brings doas's Linux behaviour into line with the other systems. * Fixed a couple of compiler warnings that get rid of either unneeded variables or introduce sanity checks on return functions. This should make doas more secure, across platforms/compilers. doas 6.1p1 * ported to illumos, added support for SmartOS and OpenIndiana. * Better pkgsrc integration.
2019-08-24security/doas: change license to add bsd-3 and isc.ng01-2/+2
2019-08-23security/doas: Add version 6.1 (from wip)ng04-0/+54
doas is a port of OpenBSD's doas which runs on FreeBSD, Linux and NetBSD. The doas utility is a program originally written for OpenBSD which allows a user to run a command as though they were another user. Typically doas is used to allow non-privleged users to run commands as though they were the root user. The doas program acts as an alternative to sudo, which is a popular method in the Linux community for granting admin access to specific users. The doas program offers two benefits over sudo: its configuration file has a simple syntax and it is smaller, requiring less effort to audit the code. This makes it harder for both admins and coders to make mistakes that potentially open security holes in the system.