summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Collapse)AuthorFilesLines
2001-05-10use -C with rpcgen to generate ansi code. Makes sure some needed headersdmcmahill2-10/+11
are included.
2001-05-10add missing example file, caught by latest bulk build.agc1-1/+2
2001-05-10Add missing manual page, from results of last bulk build.agc1-1/+2
2001-05-10Add missing manual page, pointed out by the last bulk buildagc1-1/+2
2001-05-09Move to SHA1, and add size.wiz1-2/+3
2001-05-09Define USE_LTDL as this library requires it.jlam1-1/+2
2001-05-07Remove py-crypto, which has been obsoleted by py-amkCrypto.wiz14-328/+0
2001-05-07Replace py-crypto with py-amkCrypto.wiz1-2/+2
2001-05-07Initial import of py-amkCrypto, crypto functions for python, towiz5-0/+137
replace security/py-crypto (which isn't python-2.0-ready, and failed the last dozen bulk builds for that reason). Some help provided by Ty Sarna -- thanks!
2001-05-02o we don't want it to depend on X, so disable X support -> don't built niftyzuntum2-3/+4
Fixes bulk build problem.
2001-04-30Change build dependency from perl-5.* to perl>=${PERL5_REQD}. Also changejlam3-6/+6
dependency from libperl-5.* to libperl>=${PERL5_REQD}.
2001-04-29Update to SHA1 instead of MD5. The MD5 of the distfile downloaded fromrh1-2/+3
both the original MASTER_SITE and the Austrian ftp.netbsd.org mirror matched the MD5 recorded for the package.
2001-04-27Install the README & INSTALL docabs2-2/+9
2001-04-27add & enable netrametzuntum1-1/+2
2001-04-27Initial import of netramet-4.4.8zuntum4-0/+78
Network Traffic Meter - the implementation of the Internet Accounting Architecture (RFC 2063 and RFC 2064). Fixes pkg/12647 by Dave Burgess <burgess@neonramp.com>
2001-04-27Update audit-packages to 1.8:agc2-4/+10
Fix a problem which occurs if the vulnerability list does not already exist. This fixes PR 12763 from Brian de Alwis (bsd@cs.ubc.ca), albeit in a slightly different manner. (I also added a check for the existence of the new vulnerabilities file, in case it was not downloaded for some reason).
2001-04-24Update to version 1.7 of audit-packages.agc3-12/+14
Incorporates the following changes from Anne Bennett (anne@alcor.concordia.ca) in PR 12538: (1) Running download-vulnerability-list as it stands from cron will spam the sysadmin with ftp output. Easy to fix: redirect output to /dev/null as per the example in pkg/MESSAGE. Problem: now we lose some error messages as well. Patch: make sure error complaints in that script are spouted to STDERR, not STDOUT. (3) Minor readability issue: set the source location for the vulnerability list in a variable at the top of the script. (4) PR 12457 reported that audit-packages complained spuriously when the vulnerability list had not been updated in over a week, and suggested touching it as a solution. This loses the information of when the file was really last updated. I'd prefer to always "mv" the new file into place, and use mtime instead of ctime in the file freshness test. I did this part of the PR differently, as I was worried about incomplete vulnerability lists being downloaded, and overwriting an existing vulnerability list: (2) ftp failure in download-vulnerability-list is not being detected properly by the current "${FETCH_CMD} .. || (complain; exit 1)" test. Patch: test for a non-zero vulnerability file instead. Don't forget to remove any zero-length droppings, if any. We know that the vulnerability list size will increase, and not decrease, so test the size of the newly-downloaded file. If the new file is smaller than the existing file, then a bad transfer has taken place - log this fact, and remove the new list.
2001-04-22Update uvscan-dat to 4134 (old distfile is no longer available). Thisrh2-6/+7
should fix brokenness in bulk-builds. As usual, changes include the detection of several new viruses.
2001-04-22remove "twofish" from sample configuration file, as the algorithmitojun2-8/+22
is not available in *BSD integrated KAME IPsec tree.
2001-04-19Move to sha1 digests, add distfile sizes.agc66-126/+198
2001-04-19Remove a file which was committed in error.agc1-2/+0
2001-04-18upgrade to latest racoon snapshot tar.gz on ftp.kame.net (20010418a).itojun2-4/+5
Wed Apr 11 18:52:26 JST 2001 sakane@ydc.co.jp * racoon: Supported to get a certificate from DNS CERT RR. Also getcertsbyname() is implemented In order to get CERT RRs. This function can use lwres.a if HAVE_LWRES is defined when racoon is compiled. XXX need more local test and interoperability test. XXX should be arranged too many certificate stuff in racoon.conf. 2001-04-10 Jason R. Thorpe <thorpej@zembu.com> * racoon/pfkey.c: pk_recvacquire(): Make sure the phase1 and phase2 handlers are unbound before the phase 2 handler is deleted. * racoon/isakmp.c: ph1_main(), quick_main(): Add the message to the received-list before processing to ensure the packet isn't processed twice in case of an error. isakmp_post_acquire(): Don't unbind the phase1/phase2 handlers; let the caller do it. isakmp_newcookie(): Plug memory leaks. From George Yang <gyang@zembu.com>. * racoon/ipsec_doi.c: get_ph2approvalx(): When we find a matching saprop, make sure to flushsaprop(pr0), as the returned saprop is a copy. Fixes a memory leak. From George Yang <gyang@zembu.com>. * racoon/isakmp_quick.c: quick_r2send(): Make sure to vfree(data) if we fail to allocate a new body. Fixes a memory leak. From George Yang <gyang@zembu.com>. Fri Apr 6 23:25:19 JST 2001 sakane@ydc.co.jp * racoon: implemented to generate the policy in the responder side automatically. If the responder does not have any policy in SPD during phase 2 negotiation, and the directive is set on, then racoon will choice the first proposal in the SA payload from the initiator, and generate policy entries from the proposal. This function is for the responder, and ignored in the initiator case. XXX should be checked tunnel mode case. 2001-04-04 Jason R. Thorpe <thorpej@zembu.com> * racoon: Add support for the Dmalloc debugging malloc library. This library gives very nice memory usage statistics and leak information. Wed Apr 4 22:47:27 JST 2001 sakane@ydc.co.jp * racoon: support scopeid. base code was from <Francis.Dupont@enst-bretagne.fr>. it should be considered more. 2001-04-03 Jason R. Thorpe <thorpej@zembu.com> * racoon: Better integration of debugging malloc libraries. Use wrapper macros (racoon_{malloc,calloc,free,realloc}()) so that debugging malloc implementations can get file/line info, and also put traditional malloc/calloc/free/realloc stubs in the main program so that libraries linked with racoon get the debugging allocators, as well. 2001-03-26 Jason R. Thorpe <thorpej@zembu.com> * racoon/isakmp_ident.c: ident_ir2sendmx(): plug memory leak -- gsstoken wasn't being freed at function exit. 2001-03-26 Jason R. Thorpe <thorpej@zembu.com> * racoon: Changes to Vendor ID payload handling. Determine which VID we will send on a per-proposal basis; we may need to send a different one for each proposal depending on the proposal contents (e.g. GSSAPI auth method). We no longer set the Vendor ID in the localconf. When matching the Vendor ID in check_vendorid(), use a table of known Vendor IDs, and return the index, and maintain a list of extensions that vendors implement (e.g. GSSAPI auth method). XXX We have a slight hack to recognize the Windows 2000 Vendor ID. Need to clarify with the Microsoft IPsec guys. In Aggressive Mode, as responder, when sending first response, make sure to include a Vendor ID payload. In Main Mode, as responder, when sending first response, make sure to include a Vendor ID payload. XXX Still more Vendor ID processing fixes to go. And GSSAPI auth doesn't interoperate with Windows 2000 yet. Thu Mar 22 08:06:30 JST 2001 sakane@ydc.co.jp * racoon: fixed to parse modp1536 of DH group. reported by <shigeru@iij.ad.jp> Thu Mar 22 04:56:57 JST 2001 sakane@ydc.co.jp * racoon/policy.c: fixed to compare between policies when the responder decides to accept the proposal or not. the upper layer protocol is represented by 0 in ID payload. Thu Mar 22 01:45:32 JST 2001 sakane@ydc.co.jp * racoon: fixed potencial of a buffer overrun when adding a ID payload to the ISAKMP payload. It happened when policy is both to use IPSec transport mode and not to specify a transport protocol. reported by <cs@purdue.edu>. Thu Mar 15 20:39:03 JST 2001 sakane@ydc.co.jp * racoon: - fixed a phase 2 handler deletion. racoon will delete a phase2 handler immediately when hard lifetime expires. - check a unit of the timer in the configuration file. 2001-03-06 Jason R. Thorpe <thorpej@zembu.com> * kame/racoon/schedule.c: Implement sched_scrub_param(), which kills all scheduler work queue entries which a specified parameter. * kame/racoon/handler.c: Use sched_scrub_param() to make sure no references to a handler exist when it is freed. 2001-03-05 Jason R. Thorpe <thorpej@zembu.com> * kame/racoon/gssapi.c: Use GSS_C_MECH_CODE when reporting GSSAPI errors. 2001-03-05 Jason R. Thorpe <thorpej@zembu.com> * kame/racoon/handler.c: Implement deleteallph2(), which deletes all Phase 2 handlers for a given src/dst/proto. * kame/racoon/isakmp_inf.c: When processing INITIAL-CONTACT, try to use the SADB_DELETE `delete all' extension and deleteallph2() before doing it The Hard Way. For both The Easy Way and The Hard Way, make sure we only delete SAD entries for SATYPEs that we manage. * kame/racoon/pfkey.c: Use a table of SATYPEs that we manage, and use that table to initialize our PF_KEY state. Thu Feb 22 10:08:27 JST 2001 sakane@ydc.co.jp * racoon: fixed to check the outbound policy when the responder received the 1st packet in phase 2. the tunnel mode and the transport specified the pair of IP addresses of the end of the SA had failed.
2001-04-17clarify comment on LICENSE line.itojun1-2/+2
2001-04-17As pointed out by Havard Eidnes: run "make patch" before attempting toagc1-1/+13
run "make makepatchsum", so that patch digests get calculated properly. !!!This needs to be fixed properly to fit in with pkgsrc infrastructure.!!!
2001-04-17+ move the distfile digest/checksum value from files/md5 to distinfoagc164-500/+387
+ move the patch digest/checksum values from files/patch-sum to distinfo
2001-04-16Don't try to build the "openssl" package if we got "openssl-0.96a" in thetron1-2/+4
base system
2001-04-12Do not install man/man5/krb.equiv.5 to avoid a conflict withwennmach4-13/+28
cyrus-imapd. kth-krb4 thus no longer conflicts with cyrus-imapd.
2001-04-12Add a CONFLICTS entry for sftp.wennmach1-1/+3
Detected by pkgconflict.
2001-04-12Update:jun2-4/+4
0.08 2001/04/12 * Fixing IV length. Stefan H. Holek <stefan@epy.co.at> disastry@saiknes.lv * Skipping the tail of armor. Stefan H. Holek <stefan@epy.co.at>
2001-04-11Add a conflict -- both packages have a `pgps' executable.jtb1-1/+3
From Lex Wennmacher's pkgconflict results.
2001-04-09Make this package work with version 0.9.6 of the "openssl" package.tron1-4/+6
2001-04-09- Install new include files so that this package can be used to buildtron3-28/+22
applications again. - Fix patch sum for Solaris.
2001-04-09Update to OpenSSL 0.9.6. Update contributed by Dave Burgess,fredb9-230/+385
in PR pkg/12569. Major changes between OpenSSL 0.9.5a and OpenSSL 0.9.6: o Some documentation for BIO and SSL libraries. o Enhanced chain verification using key identifiers. o New sign and verify options to 'dgst' application. o Support for DER and PEM encoded messages in 'smime' application. o New 'rsautl' application, low level RSA utility. [*] o MD4 now included. o Bugfix for SSL rollback padding check. o Support for external crypto devices [1]. o Enhanced EVP interface. [1] The support for external crypto devices is currently a separate distribution. See the file README.ENGINE. [*] Not installed with the package.
2001-04-09Make an explicit BUILD_DEPENDS on perl5, rather than the run-time DEPENDSfredb1-2/+3
that USE_PERL implies, as the core functionality of this package does not depend on perl. The user can always install perl later, to format the "pod" docs or to run the installed scripts.
2001-04-08upgrade to 1.6.3p7. p6 is no longer available.itojun2-4/+4
416) Fix negation of path-type Defaults entries in a boolean context.
2001-04-06Update scanssh to 1.55zuntum2-4/+4
o fix for address generation problems for networks with more than 64,000 adresses o new option that causes a different log message on the scanned machines.
2001-04-05no need to link libgmp.itojun3-1/+41
2001-04-05Improve the description by borrowing from the web site ;)wiz1-24/+9
2001-04-05Standardize patch file names.wiz8-9/+9
2001-04-05Update:jun3-5/+6
0.07 2001/04/05 * New scheme to handle partial bodies. * Sophisticated buffering mechanism. No temporary files are created. * Creating pgpdump.1. Stefan H. Holek <stefan@epy.co.at> kindly contributes the followings: * Fixed keyserver preferences (can be >1 octet) * Changed display of time fields to include timezone information * Added -u flag to display time fields in UTC instead of the local timezone (PGP time fields == seconds since 00:00:00, January 1, 1970, UTC) * Fixed key and signature expiration time calculations (expiration time == seconds since creation time) * Added capability to read from stdin when no file is specifed on the commandline * Implemented missing subpackets - revocation_key - reason_for_revocation - key_flags - signer_user_id (not tested) - notation_data (not tested)
2001-04-04Example files are in 'openssh' dir, not in 'ssh'.hubertf1-2/+2
Pointed out in PR 12546 by Martti Kuparinen <martti.kuparinen@iki.fi>
2001-04-04stability; do not free memory region twice.itojun2-1/+20
openbsd sbin/isakmpd/x509.c 1.46 -> 1.47
2001-04-03upgrade to latest openbsd tree.itojun4-20/+12
(isakmpd-20010403.tar.gz is placed into ftp.netbsd.org LOCAL_PORTS directory). major changes from source-changes@openbsd mailing list: use the hash algorithm found in original certificate for the signature after it has been patched. from angelos@ For the GETSPI PFKEY message, use the sequence number from the ACQUIRE message. Make DES a feature, so isakmpd can compile on Linux (most of the fixed by newsham@lava.net) x509 verified to work on NetBSD now
2001-04-02Bump audit-packages to 1.6.agc2-6/+8
Always touch the downloaded vulnerability list, so that the audit-packages script doesn't moan erroneously. From Jim Bernard, in PR 12457.
2001-03-31o Fix/add quotingzuntum1-2/+2
o Respect ${CFLAGS}
2001-03-30upgrade to 0.06.itojun2-4/+4
* Supporting old-format packet length 3 ("until the end of the file").
2001-03-29Added CONFLICTS to cyrus-imapd, lukemftp, zephyr, and libdes.wennmach1-2/+5
2001-03-29This conflicts with wu-ftpd.kim1-1/+3
2001-03-28add pgpdumpjun1-1/+2
2001-03-28Initial import of "pgpdump":jun4-0/+30
PGP packet visualizer