summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Collapse)AuthorFilesLines
2003-04-22fix lastgrant1-2/+2
2003-04-22add missing trailing / on a master site.grant1-2/+2
2003-04-22Update sudo package to 1.6.7.4 (1.6.7p4). This closes PR pkg/21256.taca2-5/+5
508) Fixed remaining Kerberos V issues with MIT Kerberos V and old Heimdal.
2003-04-21Add RCS tagcjep1-0/+1
2003-04-17Upgrade to amavis-perl-0.1, which is the first non-snapshot release ofmanu3-10/+51
amavis-perl. Fixed milter support for amavis-perl. NB: the package was named amavis-perl-200xxxxx, now the version is 0.1, which is lexicographically lower. I wrote v0.1 instead of 0.1 in order to make 0.1 newer than 200xxxxx
2003-04-17Remove a paragraph with the following comment:wiz2-50/+1
# This hack goes away, once we formally de-support NetBSD-1.4.x. We did that half a year ago.
2003-04-13Update of security/smimemsg to 1.5.cjep2-6/+6
Suggested by Robert Elz in PR#18825. Changelog unavailable.
2003-04-11Allow this to build on NetBSD when gtar is installed by only looking forcjep3-12/+35
tar. Do not pass P to tar when testing for removal of leading /'s. This is a fix for PR#20928. XXX On Solaris this package will be broken. It probably needs to XXX depend on gtar in this case.
2003-04-10add some faster mirrors to MASTER_SITES.grant1-2/+5
2003-04-10make usage of pax more consistent, use -O to bomb on broken archivesgrant1-2/+2
(suggested by lukem), group z, r and f flags. some whitespace cleanup.
2003-04-10Update to 3.6.1p1. No NEWS file included, only a ChangeLog, and thewiz2-6/+6
relevant changes are > 500 lines, see ftp://ftp.ca.openbsd.org/pub/OpenBSD/OpenSSH/portable/ChangeLog Personal selection: rekeying bugfixes and automatic rekeying bandwidth limitation (scp -l) Add a -t life option to ssh-agent that set the default lifetime. The default can still be overriden by using -t in ssh-add. sftp progress meter support. allow usernames with embedded '@', e.g. scp user@vhost@realhost:file /tmp; [scp.c] 1) include stalling time in total time 2) truncate filenames to 45 instead of 20 characters 3) print rate instead of progress bar, no more stars 4) scale output to tty width
2003-04-10make ${PAX} usage consistent:grant3-7/+7
- group 'zrw' and 'p' args, -s last - use the && operator consistently - strip unneeded parens - some whitespace cleanup
2003-04-07Update of security/sudo to 1.6.7p3.cjep2-5/+5
Changes since 1.6.7p2: * Kerberos V support should work on latest MIT Kerberos V and Heimdal.
2003-04-03Update sudo package to 1.6.7.2.taca2-5/+5
Changes since Sudo 1.6.7p1: o Fixed an unterminated comment that broke Kerberos V authentication. o The krb5-config script is now used to determine Kerberos V CPPFLAGS and LDFLAGS/LIBS if it exists. o Backed out changes to mkinstalldirs from autoconf 2.57 that caused problems on Tru64 Unix.
2003-04-01Don't try to use asm on any version of Darwin.thorpej2-1/+13
2003-04-01Update to 1.6.7p1 (1.6.7.1):wiz7-174/+34
478) Wildcards now work correctly in the env_keep Defaults directive. 479) Added support for non-root timestamp dirs. This allows the timestamp dir to be shared via NFS (though this is not recommended). 480) Removed double printing of bad environment variable table in -V mode. 481) configure script has been regenerated with autoconf 2.5.7. This required some changes to configure.in. 482) Fixed a compilation problem on SunOS; thanks to Alek O. Komarnitsky. 483) SecurID 5.0 API support from Michael Stroucken. 484) Restore state of signal handlers to what we had upon startup. Fixes a problem when using sudo with nohup; thanks to Paul Markham. 485) Revamp set_perms() to use setresuid() or setreuid() when available in preference to POSIX stuff since they allow us to properly implement "stay_setuid" whereas POSIX does not really. 486) In strict mode sudo did not throw an error for undefined User_Aliases. 487) Fixed a Makefile bug on IRIX. 488) Write the prompt *after* turning off echo to avoid some password characters being echoed on heavily-loaded machines with fast typists. 489) Added %U and %H escapes in the prompt and fixed treatment of %%. 490) Visudo will now add a final newline to sudoers if the user's editor not add one before EOF. 491) The lexer state is now reset to its initial value on EOF. Previously, the state was not reset between parser invocations which could cause problems for visudo in rare cases. 492) Added support for Defaults that apply based on the RunasUser. 493) Sudo now includes copies of strlc{at,py} and uses them throughout. 494) Sudo is now careful to avoid interger overflow when allocating memory. This is one of those "should not happen" situations. 495) Added a configure option (--with-stow) to make sudo compatible with GNU stow. 496) auth/kerb5.c now compiles under Heimdal. 497) The volatile prefix is used in the hopes of preventing compilers from optimizing away memory zeroing. Unfortunately, this results in some warnings from gcc. 498) Better Kerberos IV/V support in the configure script. 499) Fixed a logic thinko in the SIGCHLD handler that caused problems with rlogin on HP-UX. 500) configure now adds -R to LDFLAGS when it adds -L for Solaris and SVR4. There is a configure option, --with-rpath, to control this. 501) On AIX, configure will pass extra directory paths to the linker via the -blibpath ld option. This is only active when additional library paths are used. It may be disabled via the --without-blibpath configure option. 502) The --with-skey and --with-opie configure options now take an optional directory argument that should have an include and lib dir for the skey/opie include file and library respectively. 503) Fixed false positives in the overflow detection of expand_prompt().
2003-03-29Place WRKSRC where it belongs, to make pkglint happy; ok'ed by wiz.jmmv15-38/+30
2003-03-28Remove unnecessary empty lines.wiz1-2/+1
2003-03-28NO_PATCH is deprecated, says pkglint. Remove it.wiz1-2/+1
2003-03-26De-confusify: Let emulators/suse_*/Makefile.* _not_ include bsd.pkg.mk, but ↵jschauma1-1/+2
rather make all packages that use linux emulation include bsd.pkg.mk as the last files just like any normal package.
2003-03-25grammar tweakgrant1-3/+3
2003-03-25use RCD_SCRIPTS.grant3-11/+9
2003-03-25both: use pidfilelukem3-6/+9
sfssd: support "reload" sfssd: call sfskey gen with "-K -l sfs_host_key" to prevent interactive Q's bump PKGREVISION (to 2)
2003-03-23Update MASTER_SITES.ad1-3/+3
2003-03-23use PKG_SYSCONFSUBDIR=sfslukem4-31/+19
use /var/sfs instead of /usr/pkg/var/sfs use OWN_DIRS_PERMS bump PKGREVISION
2003-03-22Correct DEPENDS line to proper formatjmc1-2/+2
2003-03-22Correct DEPENDS line to proper formatjmc1-2/+2
2003-03-22remove entries which aren't installed (and I couldn't find anylukem1-20/+1
reference to them in the distribution, either): bin/fake-agent bin/rpc_pcl bin/rpc_psrv bin/smkdirall bin/smount bin/snfsfstab bin/snfshost bin/snfsmount bin/snfspsrv bin/snfsumount bin/snfsuser bin/sumount bin/sumountall etc/rpc_pcl.conf lib/perl5/site_perl/5.6.1/SNFS.pm lib/perl5/site_perl/5.6.1/auto/SNFS/autosplit.ix
2003-03-22Install an rc.d script; closes PR pkg/20841 and PR pkg/20842 by David Ferlier.jmmv3-8/+32
Sort the Makefile a bit. Install a default configuration file in place. Bump PKGREVISION to 1.
2003-03-21* Add patch from http://www.openssl.org/news/secadv_20030317.txt:seb5-3/+132
Researchers have discovered a timing attack on RSA keys, to which OpenSSL is generally vulnerable, unless RSA blinding has been turned on. Typically, it will not have been, because it is not easily possible to do so when using OpenSSL to provide SSL or TLS. The enclosed patch switches blinding on by default. Applications that wish to can remove the blinding with RSA_blinding_off(), but this is not generally advised. It is also possible to disable it completely by defining OPENSSL_NO_FORCE_RSA_BLINDING at compile-time. The performance impact of blinding appears to be small (a few percent). This problem affects many applications using OpenSSL, in particular, almost all SSL-enabled Apaches. You should rebuild and reinstall OpenSSL, and all affected applications. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0147 to this issue. * Add patch from http://www.openssl.org/news/secadv_20030319.txt: Czech cryptologists Vlastimil Klima, Ondrej Pokorny, and Tomas Rosa have come up with an extension of the "Bleichenbacher attack" on RSA with PKCS #1 v1.5 padding as used in SSL 3.0 and TLS 1.0. Their attack requires the attacker to open millions of SSL/TLS connections to the server under attack; the server's behaviour when faced with specially made-up RSA ciphertexts can reveal information that in effect allows the attacker to perform a single RSA private key operation on a ciphertext of its choice using the server's RSA key. Note that the server's RSA key is not compromised in this attack. * Bump PKGREVISION.
2003-03-19Add and enable cy2-{login,ntlm}.jlam1-1/+3
2003-03-19Initial import of security/cy2-ntlm.jlam3-0/+34
This is the Cyrus SASL plugin that implements the NTLM (MS Windows NT) authentication mechanism.
2003-03-19Initial import of security/cy2-login.jlam3-0/+37
This is the Cyrus SASL plugin that implements the LOGIN authentication mechanism. It's recommended that it only be used if absolutely necessary since it is not a secure authentication scheme.
2003-03-19Rearrange the Makefile logic so that we can easily create Cyrus SASL 2.xjlam2-73/+98
plugin packages.
2003-03-19${SASLSOCKETDIR} is removed by the DEINSTALL script, so remove thisjlam1-2/+1
redundant command.
2003-03-19cyrus-sasl2 libraries have no library dependencies on PAM.jlam1-5/+1
2003-03-19Add and enable cy-loginjlam1-1/+2
2003-03-19Initial import of security/cy-login.jlam3-0/+42
This is the Cyrus SASL plugin that implements the LOGIN authentication mechanism. It's recommended that it only be used if absolutely necessary since it is not a secure authentication scheme.
2003-03-19Add a section to deal with SASL plugins, and clarify where this filejlam1-3/+8
should be included in package Makefiles.
2003-03-19Rearrange some of the Makefile logic so that we can create Cyrus SASLjlam2-63/+79
plugin packages.
2003-03-17Add and enable sfs.agc1-1/+2
2003-03-17Initial import of sfs-0.7.2 into the NetBSD Packages Collection.agc9-0/+409
Based on the sfs-0.6 package provided by Michael Santos in PR 18528. SFS is a secure, global network file system with completely decentralized control. SFS lets you access your files from anywhere and share them with anyone, anywhere. Anyone can set up an SFS server, and any user can access any server from any client. SFS lets you share files across administrative realms without involving administrators or certification authorities.
2003-03-14(1) Publicly export the value of _OPSYS_RPATH_NAME as RPATH_FLAG;jlam2-4/+8
Makefiles simply need to use this value often, for better or for worse. (2) Create a new variable FIX_RPATH that lists variables that should be cleansed of -R or -rpath values if ${_USE_RPATH} is "no". By default, FIX_RPATH contains LIBS, X11_LDFLAGS, and LDFLAGS, and additional variables may be appended from package Makefiles.
2003-03-11Updated to latest stable version 0.3.15.salo4-9/+11
Changes: - The progress status is sent via the progress callbacks in gpgme_op_edit. - Bug fix for signing operations with explicit signer settings for the CMS protocol.
2003-03-09Update to 1.22.wiz2-5/+5
This release changes the output format slightly to improve integration with other tools, and improves the RPM packaging.
2003-03-05Update fsh to 1.2. Changes since 1.1:jschauma3-6/+7
Use Bugzilla for bug reporting. * README: Mention Bugzilla. * fsh.texi (Bugs): Mention Bugzilla. Port to Python 2.2. (Bug 332). * fshcompat.py: New module, that finds some constants in os, fcntl, FCNTL or thin air depending on Python version. * fshlib.py: Use fshcompat instead of FCNTL. * infshd.py: Ditto. * Makefile.am (pkgdata_DATA): Added fshcompat.py.
2003-03-05Pass prefix to openssl as argument to the configure stage: helpsseb1-1/+2
when openssl is not in places planned by Makefile.PL (like LOCALBASE).
2003-03-05Remove obsolete and vulnerable libmcrypt22 package.wiz7-85/+1
2003-03-05Use the libmcrypt package instead of the obsolete libmcrypt22 one.wiz3-5/+19
Bump PKGREVISION.
2003-03-05Unneeded after 2.5.6 update.wiz1-13/+0