summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Collapse)AuthorFilesLines
2006-11-18Import starttls 0.10, based on PR 29467 by FUKAUMI Naoki.obache4-0/+28
I modify to adapt to recent pkgsrc tree. starttls is simple wrapper program for STARTTLS on emacsen.
2006-11-17Removing gnupg-devel. It has been replaced by gnupg2.shannonjr17-453/+1
2006-11-17Added entry for gnupg2shannonjr1-1/+2
2006-11-17Update to 1.0.0.shannonjr3-11/+11
There are no actual code changes since the last release, only some cleanups and a complete manual.
2006-11-17Updated gpgsm option to use security/gnupg2 instead of security/gnupg-devel.shannonjr1-8/+9
2006-11-17This package is the sucessor to gnupg-devel.shannonjr10-0/+276
GnuPG-2 provides several utilities that are used by mail clients, such as Kmail and Balsa, including OpenPGP and S/MIME support. GnuPG-2 has a different architecture than GnuPG-1 (e.g. 1.4.5) in that it splits up functionality into several modules. However, both versions may be installed alongside without any conflict. In fact, the gpg version from GnuPG-1 is able to make use of the gpg-agent as included in GnuPG-2 and allows for seamless passphrase caching. The advantage of GnuPG-1 is its smaller size and the lack of dependency on other modules at run and build time.
2006-11-14This package does not have a man page.rillig1-1/+2
2006-11-13update to 1.4.5drochner2-6/+6
changes: minor bugfixes
2006-11-13Use md5.h in distfile instead of system provided file.obache2-24/+8
This is better solution of PR 28562 and may fix PR 34792. Also, convert a post-build sed step to use the SUBST framework, requested by PR 34792.
2006-11-12Fixed PKGMANDIR and Perl interpreter. PKGREVISION++rillig1-7/+8
2006-11-12Fixed PKGMANDIR.rillig1-3/+3
2006-11-09Descend into fwbuilder21 and libfwbuilder21.bad1-1/+3
2006-11-09These conflict with with libfwbuilder21 and fwbuilder21 becausebad2-2/+6
of the lib/libfw{builder,compiler}.{a,la.so} files.
2006-11-09Initial import of fwbuilder-2.1.7.bad9-0/+215
Changes since the 2.0.12 release: Improvements and changes in the GUI * The GUI works much faster with very large object trees. * "Where used" menu item to quickly find and show all groups and firewall rules that reference given object. Confirmation dialog shown when an object is deleted also shows all groups and rules that use it. * Built-in installer can now save a copy of .fwb file to the firewall. * Compile/install dialog is now an independent window instead of a modal dialog, this means the user can look at the policy and objects while compilation and/or installation is going on. * Network discovery driud is back, ported from fwbuilder 1.0. As before, it supports reading object definitions from a file in /etc/hosts format, can read DNS zone and also can crawl the network using SNMP queries. * Startup splash window has been removed. * Keeping track of dependencies between objects. Firewalls that refer to an object that is modified are marked with bold font. * Added bulk compile and install operations. * All object dialogs have been converted into built-in panels that appear in the right hand part of the main window. * Improvements in "Find" function: administrator can now drag an object into a well in the find dialog panel to make it search for this particular object. * The "Find and replace" operation has been implemented. New object types, new rule types and rule elements, new actions and other new features * AddressTable This object resolves to a set of IP addresses defined in an external file. * DNSName: This object resolves a host name to the IP address using DNS. Object can be confgiured to do so at compile time or run time. * TagService: This object matches tags set by action Tag. * Interface objects can now be marked as bridge ports. * Support for routing rules has been implemented. * Global policy and interface policies have been merged. Each policy rule now has rule element "Interface". * Policy rules can have the following new actions: * Queue: This action passes the packet to user space process for inspection. * Custom: This action allows administrator to define arbitrary piece of code to be used in place of an action. * Branch: This action is used to create a branch in the rule set. * Tag: This action associates internal tag with the packet. * Classify: This action allows the firewall to define QoS class for the packet that matches the rule. * Route: This action makes the firewall to route the packet that matches the rule through an interface or a gateway specified in the parameters of the action. * Firewall object now has an attribute "inactive" excluding it from bulk compiles and installs. Compiler for iptables * Support for address tables loaded from external files at compile or run time. * Support user defined chains with predefined names (using special action ) * Support for CLASSIFY, MARK, CONNMARK, QUEUE, ROUTE targets * Support for physdev module for bridging firewalls * additional optimization of rules in INPUT and OUTPUT chain: now removing firewall object from src or dst to simplify rule if it uses OUTPUT or INPUT chain. * support for modules connlimit and hashlimit. Compiler for PF * Support for load balancing rules * Support for tag and route options * Support for address ranges and network objects in TSrc in NAT rules * Support for pool types in NAT rules ('bitmask', 'random', 'source-hash', 'round-robin'), as well as 'static-port' option. * Supprot for anchors (by way of a special action) * Support for tables with predefined names (using AddressTable object) * Support for packet 'tagging' (by way of a special action and service object TagService) Compiler for ipfilter * Support for PPTP and IRC proxies * Support for route option API * internal object ID is augumented with process ID of the program that creates an object. * fwbedit Fwbedit can now create objects and repair broken object database.
2006-11-09Initial import of libfwbuilder-2.1.7.bad11-0/+315
Changes since the the 2.0.12 release: Improvements and changes in the GUI * The GUI works much faster with very large object trees. * "Where used" menu item to quickly find and show all groups and firewall rules that reference given object. Confirmation dialog shown when an object is deleted also shows all groups and rules that use it. * Built-in installer can now save a copy of .fwb file to the firewall. * Compile/install dialog is now an independent window instead of a modal dialog, this means the user can look at the policy and objects while compilation and/or installation is going on. * Network discovery driud is back, ported from fwbuilder 1.0. As before, it supports reading object definitions from a file in /etc/hosts format, can read DNS zone and also can crawl the network using SNMP queries. * Startup splash window has been removed. * Keeping track of dependencies between objects. Firewalls that refer to an object that is modified are marked with bold font. * Added bulk compile and install operations. * All object dialogs have been converted into built-in panels that appear in the right hand part of the main window. * Improvements in "Find" function: administrator can now drag an object into a well in the find dialog panel to make it search for this particular object. * The "Find and replace" operation has been implemented. New object types, new rule types and rule elements, new actions and other new features * AddressTable This object resolves to a set of IP addresses defined in an external file. * DNSName: This object resolves a host name to the IP address using DNS. Object can be confgiured to do so at compile time or run time. * TagService: This object matches tags set by action Tag. * Interface objects can now be marked as bridge ports. * Support for routing rules has been implemented. * Global policy and interface policies have been merged. Each policy rule now has rule element "Interface". * Policy rules can have the following new actions: * Queue: This action passes the packet to user space process for inspection. * Custom: This action allows administrator to define arbitrary piece of code to be used in place of an action. * Branch: This action is used to create a branch in the rule set. * Tag: This action associates internal tag with the packet. * Classify: This action allows the firewall to define QoS class for the packet that matches the rule. * Route: This action makes the firewall to route the packet that matches the rule through an interface or a gateway specified in the parameters of the action. * Firewall object now has an attribute "inactive" excluding it from bulk compiles and installs. Compiler for iptables * Support for address tables loaded from external files at compile or run time. * Support user defined chains with predefined names (using special action ) * Support for CLASSIFY, MARK, CONNMARK, QUEUE, ROUTE targets * Support for physdev module for bridging firewalls * additional optimization of rules in INPUT and OUTPUT chain: now removing firewall object from src or dst to simplify rule if it uses OUTPUT or INPUT chain. * support for modules connlimit and hashlimit. Compiler for PF * Support for load balancing rules * Support for tag and route options * Support for address ranges and network objects in TSrc in NAT rules * Support for pool types in NAT rules ('bitmask', 'random', 'source-hash', 'round-robin'), as well as 'static-port' option. * Supprot for anchors (by way of a special action) * Support for tables with predefined names (using AddressTable object) * Support for packet 'tagging' (by way of a special action and service object TagService) Compiler for ipfilter * Support for PPTP and IRC proxies * Support for route option API * internal object ID is augumented with process ID of the program that creates an object. * fwbedit Fwbedit can now create objects and repair broken object database.
2006-11-09Made the package work for unprivileged users. Moved the man page torillig4-21/+11
man1, since the binaries are installed in bin/. PKGREVISION++
2006-11-08Update openssh package to 4.5.1 (openssh-4.5p1).taca4-59/+58
Changes: Security bugs resolved in this release: * Fix a bug in the sshd privilege separation monitor that weakened its verification of successful authentication. This bug is not known to be exploitable in the absence of additional vulnerabilities. This release includes the following non-security fixes: * Several compilation fixes for portable OpenSSH * Fixes to Solaris SMF/process contract support (bugzilla #1255)
2006-11-07Update to 0.82. From the changelog:schmonz2-6/+6
- Fixed handling of user/domain name splitting in the client library when the caller doesn't initially provide a domain name. - cvm_client_setenv now also sets $MAILDIR for use with Courier IMAP.
2006-11-07Due to a bug, INSTALLATION_DIRS originally was not prefixed correctlyjoerg1-9/+9
in the DESTDIR case, fix this.
2006-11-07Update hpn-patch to hpn12v13 since old one has gone.taca3-8/+8
Bump PKGREVISION.
2006-11-05Add in a BUILDLINK depends on apache>=2.0.59nb2 as that contains theadrianp1-1/+3
libtool fix this package needs to build. Riding on the initial import - no PKGREVISION bump
2006-11-05DESTDIR support.joerg15-58/+74
2006-11-05+ap-modsecurity2adrianp1-1/+2
2006-11-05ModSecurity is an open source intrusion detection and prevention engine foradrianp8-0/+161
web applications (or a web application firewall). Operating as an Apache Web server module or standalone, the purpose of ModSecurity is to increase web application security, protecting web applications from known and unknown attacks. This is the 2.x branch of modsecurity and only supports Apache 2.x
2006-11-03Use custom install rules to get user-destdir ready and most likelyjoerg3-7/+40
also fix unprivileged builds in general.
2006-11-03DESTDIR support.joerg1-2/+3
2006-11-02Force to detect correct library when ${SASL_DBTYPE}=="berkeley".obache5-10/+41
Reported by David Carrel in pkgsrc-users@.
2006-11-02 Added missing fflush to scp when priting statistics. Fixed bugkivinen4-5/+59
in the reverse dns queries for IPv6 addresses (overwriting 12 bytes of local variables on the stack). Disabled x11-security on all platforms, as it does not seem to work on i386 either. Incremented PKGREVISION to 7.
2006-10-31Update to 0.5.11:wiz3-7/+8
Noteworthy changes in version 0.5.11 (2006-10-26) ------------------------------------------------ * Add a new self test "basic" to test cdk_check_version. * Add prototype of cdk_stream_decrypt to opencdk.h, reported by Adam Langley. * Fix crash in cdk_data_transform triggered by self-tests.
2006-10-31Update openssh package to 4.4.1 (openssh-4.4p1).taca30-359/+218
- A few pkglint warning clean up. - Major changes are here. For complete changes, see http://www.openssh.com/txt/release-4.4. Changes since OpenSSH 4.3: ============================ Security bugs resolved in this release: * Fix a pre-authentication denial of service found by Tavis Ormandy, that would cause sshd(8) to spin until the login grace time expired. * Fix an unsafe signal hander reported by Mark Dowd. The signal handler was vulnerable to a race condition that could be exploited to perform a pre-authentication denial of service. On portable OpenSSH, this vulnerability could theoretically lead to pre-authentication remote code execution if GSSAPI authentication is enabled, but the likelihood of successful exploitation appears remote. * On portable OpenSSH, fix a GSSAPI authentication abort that could be used to determine the validity of usernames on some platforms. This release includes the following new functionality and fixes: * Implemented conditional configuration in sshd_config(5) using the "Match" directive. This allows some configuration options to be selectively overridden if specific criteria (based on user, group, hostname and/or address) are met. So far a useful subset of post- authentication options are supported and more are expected to be added in future releases. * Add support for Diffie-Hellman group exchange key agreement with a final hash of SHA256. * Added a "ForceCommand" directive to sshd_config(5). Similar to the command="..." option accepted in ~/.ssh/authorized_keys, this forces the execution of the specified command regardless of what the user requested. This is very useful in conjunction with the new "Match" option. * Add a "PermitOpen" directive to sshd_config(5). This mirrors the permitopen="..." authorized_keys option, allowing fine-grained control over the port-forwardings that a user is allowed to establish. * Add optional logging of transactions to sftp-server(8). * ssh(1) will now record port numbers for hosts stored in ~/.ssh/authorized_keys when a non-standard port has been requested. * Add an "ExitOnForwardFailure" option to cause ssh(1) to exit (with a non-zero exit code) when requested port forwardings could not be established. * Extend sshd_config(5) "SubSystem" declarations to allow the specification of command-line arguments. * Replacement of all integer overflow susceptible invocations of malloc(3) and realloc(3) with overflow-checking equivalents. * Many manpage fixes and improvements * New portable OpenSSH-specific features: - Add optional support for SELinux, controlled using the --with-selinux configure option (experimental) - Add optional support for Solaris process contracts, enabled using the --with-solaris-contracts configure option (experimental) This option will also include SMF metadata in Solaris packages built using the "make package" target - Add optional support for OpenSSL hardware accelerators (engines), enabled using the --with-ssl-engine configure option.
2006-10-30Fix man path - this should fix PR# 34948 opened by Robert Elzadrianp1-2/+2
2006-10-29PLIST correctionshannonjr3-17/+45
2006-10-28Some more HOMEPAGE/MASTER_SITES updates from Sergey Svishchev.wiz1-3/+3
2006-10-28fixed code to satisfy picky SGI ido ccschwarz2-7/+16
2006-10-27Update to 5.2adrianp4-39/+44
Fix builds on -current Grab MAINTAINER pkglintification From CHANGES: v5.2 September 2005 (THC public release) ! THIS IS A THC TAX ANNIVERSARY SPECIAL RELEASE ! HAVE FUN ! * Included patch from ka0ttic@gentoo.org for cleaner gcc compile * Added SSL_Pending() to prevent rare locking on SSL ports, thanks to michel(at)arboi.fr.eu.org for reporting * Added lots of fingerprints, most from Johnny Cyberpunk / THC - THANKS! v5.1 June 2005 (THC public release) * Big appdefs.resp update. Thanks to all contributors! * Finally and forever fixed the --prefix= issue * Fixed the web update function for bad inet_pton implementations * Added support for nmap files with IPv6 addresses * You can scan/check port 0 now (wish from nbach<at>deloitte.dk) * Less error prone "make install"
2006-10-25Update ipsec-tools to 0.6.6.bad2-6/+6
Changes since 0.6.3: 0.6.6 * src/racoon/isakmp_xauth.c: Build fix * src/racoon/pfkey.c: Sets NAT-T ports to 0 if no NAT encapsulation in pk_sendgetspi(). * src/racoon/pfkey.c: Sets NAT-T ports to 0 if no NAT encapsulation in pk_sendupdate(). * src/racoon/isakmp_xauth.c: fix memory leak * src/racoon/{cfparse.y|handler.h}: typos 0.6.5 * src/racoon/isakmp.c: Fixed zombie PH1 handler when isakmp_send() fails in isakmp_ph1resend() * src/racoon/{cfparse.y|ipsec_doi.c}: Temporary fix for /32 subnets parsing. * src/racoon/isakmp_cfg.c: make software behave as the documentation advertise for INTERNAL_NETMASK4. Keep the old INTERNAL_MASK4 to avoid breaking backward compatibility. * src/racoon/session.c: Fixed / cleaned up signal handling. 0.6.4 * configure.ac src/racoon/plog.c: backported Fred's workaround for %zu problems on (at least) FreeBSD4. * src/racoon/session.c: backport: fix possible race conditions in signal handlers (see session.c 1.17). * src/libipsec/pfkey_dump.c: fixed compilation when NAT_T disabled (Fred has still some CVS problems). * src/libipsec/{libpfkey.h|pfkey_dump.c}: add a sadump_withports function to display SAD entries with their associated ports. * src/setkey/{parse.y|setkey.c|setkey.8}: allow to use setkey -p flag in conjunction with -D to show SADs with the port, allow both get and delete commands to use bracketed ports if needed. * src/racoon/racoon.conf.5: Style changes
2006-10-23Update to 1.2.5adrianp2-8/+9
- Added check for base_users and base_roles tables in base_main.php - Kevin Johnson - Added . to VAR_PUNC to fix query issue - Kevin johnson - Fixed issue with base_users table being required - Kevin Johnson - Added search punctuation fix - Bruce Briggs - Added FQDN to display -- Jonathan W Miner - PrintForm() fixes - Bruce Briggs - Settings for automatic expansion of the IP and Payload Criteria on Search screen - Bruce Briggs - Save the fields entered on the Search screen for Back button proper refilling - Bruce Briggs - RFE 1520185 Add support for managing last_cid - Eric Jacobsen - Changed show_rows to 49 in base_conf.php.dist to fix IE 6/7 bug - Bruce Briggs - Fixed link to FAQ - Juergen Leising - Fixed VAR_BOOLEAN error and some typos in the footer - Eric Jacobsen - Trivial patch to make base_stat_time.php use GET insted of POST to avoid the 'resend data' warning on refresh - GaRaGeD - Added base-rss.php to the contrib section - Dan Michitsch
2006-10-23Remove another directory created by the package. Bump revision.joerg2-3/+4
2006-10-23Update to 0.5.10:wiz3-7/+10
Noteworthy changes in version 0.5.10 (2006-10-11) ------------------------------------------------ * Fix double-free in cdk_pklist_encrypt, reported by Adam Langley. * Fix keydb_idx_search() to handle keys at offset 0, thanks to Adam Langley. * A pkg-config script was added, thanks to Andreas Metzler. * Autobuild time stamps are used, for easier build robot testing.
2006-10-22Disable expressly database drivers which is not specified by option.obache1-1/+7
Possibly fix PR 34555.
2006-10-21Sort PLISTadrianp1-3/+3
2006-10-21Update to 1.9.4adrianp3-20/+33
This package used to register as ap-modsecurity regardless of which apache version it built against. It will now register as ap13-modsecurity if building against apache 1.x and ap2-modsecurity if building against apache 2.x. Lots of changes including: * Enhanced memory utilisation. * Log level is now present on every entry in the debug log. * Added new actions (e.g. setenv, setnote, auditlog, noauditlog) * 404 responses are no longer considered relevant. * Added performance measurement to the Apache 2 versions. See CHANGES for all the details
2006-10-21Update sfs to 0.7.2nb7agc48-5/+1879
+ add support for gcc4
2006-10-21+rainbowcrackadrianp1-1/+2
2006-10-21Import rainbowcrack from pkgsrc-wip, packaged by David Howlandadrianp5-0/+100
RainbowCrack is a general propose implementation of Philippe Oechslin's faster time-memory trade-off technique. In short, the RainbowCrack tool is a hash cracker. A traditional brute force cracker try all possible plaintexts one by one in cracking time. It is time consuming to break complex password in this way. The idea of time-memory trade-off is to do all cracking time computation in advance and store the result in files so called "rainbow table". It does take a long time to precompute the tables. But once the one time precomputation is finished, a time-memory trade-off cracker can be hundreds of times faster than a brute force cracker, with the help of precomputed tables.
2006-10-20PLIST correctionshannonjr2-2/+7
2006-10-20Bump PKGREVISION for gpgsm change just committed.shannonjr1-1/+2
2006-10-20Fix gpgsm option so that it builds and works.shannonjr5-2/+57
2006-10-20Re: pkg/34856: upgrade to GnuPG 1.9.93shannonjr13-12/+308
This release is mainly to fix bugs found in 1.9.92.
2006-10-20Update to 1.4 (Required by gnupg-devel 1.93)shannonjr2-6/+6