summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Collapse)AuthorFilesLines
2010-06-13Bump PKGREVISION for libpng shlib name change.wiz36-69/+75
Also add some patches to remove use of deprecated symbols and fix other problems when looking for or compiling against libpng-1.4.x.
2010-06-12Fix installation with latest gnome-doc-utils and depend on it.wiz1-1/+2
2010-06-11Updated security/openssh to 5.5.1martti12-144/+105
Lots of changes, including * After a transition period of about 10 years, this release disables SSH protocol 1 by default. Clients and servers that need to use the legacy protocol must explicitly enable it in ssh_config / sshd_config or on the command-line. * Remove the libsectok/OpenSC-based smartcard code and add support for PKCS#11 tokens. This support is automatically enabled on all platforms that support dlopen(3) and was inspired by patches written by Alon Bar-Lev. Details in the ssh(1) and ssh-add(1) manpages. * Add support for certificate authentication of users and hosts using a new, minimal OpenSSH certificate format (not X.509). Certificates contain a public key, identity information and some validity constraints and are signed with a standard SSH public key using ssh-keygen(1). CA keys may be marked as trusted in authorized_keys or via a TrustedUserCAKeys option in sshd_config(5) (for user authentication), or in known_hosts (for host authentication). Documentation for certificate support may be found in ssh-keygen(1), sshd(8) and ssh(1) and a description of the protocol extensions in PROTOCOL.certkeys. * Added a 'netcat mode' to ssh(1): "ssh -W host:port ..." This connects stdio on the client to a single port forward on the server. This allows, for example, using ssh as a ProxyCommand to route connections via intermediate servers. bz#1618
2010-06-11update to 2.30.1drochner7-79/+67
This switches to the gnome-2.30 release branch pkgsrc note: temporarily add a dependency on libgnome-keyring which was split out of the old gnome-keyring pkg, so that client pkgs get the same as before
2010-06-10Need pkg-config, add it to tools.wiz1-2/+2
2010-06-08Corrected PLISTpettai2-4/+5
2010-06-08Update to 1.8:wiz9-44/+48
Noteworthy changes in version 1.8 (2010-05-06) ---------------------------------------------- * Support for WindowsCE. * New option --list for gpg-error. * Interface changes relative to the 1.7 release: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ GPG_ERR_NOT_ENABLED NEW. GPG_ERR_SOURCE_G13 NEW. GPG_ERR_NO_ENGINE NEW. gpg_err_set_errno NEW.
2010-06-06Update xmlsec1 to 1.2.16.obache7-38/+77
* May 26 2010 Changes in XML Security Library 1.2.16 release: * New xmlsec-gcrypt library. * xmlsec-gcrypt: Added RSA with SHA1/SHA256/SHA384/SHA512/MD5/RIPEMD160, DSA with SHA1, AES/DES KW support. * xmlsec-gnutls: Added X509 support and converted the library to use xmlsec- crypt library for all crypto operations. * xmlsec-mscrypto: RSA/OAEP and AES/DES KW support. * Several minor bug fixes and code cleanups. * April 29 2010 Changes in XML Security Library 1.2.15 release: * xmlsec-mscrypto: Added HMAC with MD5, SHA1, SHA256/384/512; RSA with MD5, SHA256/384/512 support. * xmlsec-mscrypto: Converted to Unicode (the non-Unicode builds are still available as compile time option). * xmlsec-nss: Added MD5 and SHA256/384/512 support for digest, HMAC and RSA (the new minimum required version for NSS library is 3.9). * xmlsec-gnutls: Added SHA256/384/512 for digest and HMAC; MD5 and RIPEMD160 digests support (the new minimum required version for GnuTLS library is 2.8.0). * Fixed typo: "Copyrigth" should be "Copyright". * Several critical bug fixes and code cleanups. * December 5 2009 Changes in XML Security Library 1.2.14 release: * XMLSec library is switched from built-in LTDL library to the system LTDL library on Linux/Unix and native calls on Windows to fix security issue (CVE-2009-3736) in LTDL. * Fixed minor bugs (see log for complete list).
2010-06-06remove obsoleted @dirrm.obache1-9/+1
2010-06-05Update to 1.1, which allows to select what timeframe should be validated:manu2-6/+6
assertion and/or session
2010-06-05Update to 2.7:wiz2-6/+6
* Noteworthy changes in release 2.7 (2010-05-20) [stable] - Doc: Build a PDF manual using GTK-PDC. - Doc: Fix of asn1_check_version, documentation was missing from last release. - Build: Avoid warnings about ignored visibility attributes on Windows.
2010-06-03Update security/sudo package to 1.7.2p7.taca2-6/+6
For more detail: http://www.sudo.ws/sudo/alerts/secure_path.html Summary: Sudo "secure path" feature works by replacing the PATH environment variable with a value specified in the sudoers file, or at compile time if the --with-secure-path configure option is used. The flaw is that sudo only replaces the first instance of PATH in the environment. If the program being run through sudo uses the last instance of PATH in the environment, an attacker may be able to avoid the "secure path" restrictions. Sudo versions affected: Sudo 1.3.1 through 1.6.9p22 and Sudo 1.7.0 through 1.7.2p6.
2010-06-03Add patch-a{a,b} to distinfo.wiz1-1/+3
2010-06-03PR 43393: security/gsasl-1.1 fails to build on solarisdholland2-0/+25
2010-06-02This is a Python egg.gls2-12/+13
Don't hardwire paths in PLIST. As noted by Ryo HAYASAKA in PR/43405.
2010-06-02Update security/openssl package to 0.9.8o.taca2-6/+6
OpenSSL CHANGES _______________ Changes between 0.9.8n and 0.9.8o [01 Jun 2010] *) Correct a typo in the CMS ASN1 module which can result in invalid memory access or freeing data twice (CVE-2010-0742) [Steve Henson, Ronald Moesbergen <intercommit@gmail.com>] *) Add SHA2 algorithms to SSL_library_init(). SHA2 is becoming far more common in certificates and some applications which only call SSL_library_init and not OpenSSL_add_all_algorithms() will fail. [Steve Henson] *) VMS fixes: Reduce copying into .apps and .test in makevms.com Don't try to use blank CA certificate in CA.com Allow use of C files from original directories in maketests.com [Steven M. Schweda" <sms@antinode.info>]
2010-06-01Works fine with python2.6 too.bouyer1-2/+2
2010-06-01+libgnome-keyringdrochner1-1/+2
2010-06-01add libgnome-keyring-2.30.1, a library which was split from gnome-keyringdrochner5-0/+138
in gnome-2.30
2010-06-01Update netpgp to version 3.99.4/20100601agc2-6/+6
+ avoid possible free() of new value passed to netpgp_setvar(), with thanks to Anon Ymous. + netpgpkeys(1): print keys to stdout, not stderr - reported by Anon Ymous. + fix DSA signatures and verification + simplify and shorten the internals of packet processing by getting rid of the intermediate pseudo-abstraction layer, which detracted from understanding and had no benefit whatsoever. Rename some enums and some definitions. + add some checking to new key generation, and don't try to read in the keys after writing them - reported by Tyler Retzlaff + netpgpverify - avoid the separate codebase, and just use libnetpgp(3)
2010-05-31Remove patch-aagls1-21/+0
2010-05-31Update security/py-paramiko to 1.7.6.gls3-14/+27
pkgsrc changes: - patches/patch-aa no longer required - Added LICENSE Changelog: ARC4 & CTR support, IP6 support, and various bug fixes (incl. an important Windows random number generation fix)
2010-05-31Update to lasso 2.2.91. From the NEWS file:manu12-627/+407
2.2.91 - January 26th 2010 -------------------------- A new Perl binding, fix for backward compatibility with old versions of glib, LassoLogout API is more robust since it does not need anymore for all SP logout to finish to work, new macro lasso_list_add_new_xml_node, add support for WS-Security UsernameToken (equivalent of poor man HTTP Digest Authentication), make public internal APIs: lasso_session_add_assertion, lasso_session_get_assertion and lasso_session_remove_assertion. 2.2.90 - January 18th 2010 -------------------------- Lots of internal changes and some external one too. There is a new api to force, forbid or let Lasso sign messages, it is called lasso_profile_set_signature_hint. Big overhaul of the ID-WSF 1 and 2 codes, and of the SAML 2.0 profiles. Now all SAML 2.0 profile use common internal functions from the lasso_saml20_profile_ namespace to handle bindings (SOAP,Redirect,POST,Artifact,PAOS). New internal API to load SSL keys from many more formats from the public API. In ID-WSF 2.0, Data Service Template has been simplified, we no more try to apply queries, it is the responsability of the using code to handle them. In bindings land, the file bindings/utils.py has been stuffed with utility function to manipulate 'type' tuple, with are now used to transfer argument and type description, their schema is (name, C-type, { dictionary of options } ), they are now used everywhere in the different bindings. We support output argument in PHP5, Python and Java, i.e. pointer of pointer arguments with are written to in order to return multiple values. For language where the binding convert error codes to exceptions (all of them now), the ouput value is returned as the normal return value of the method, so only one output argument is handled for now. We now use GObject-introspection annotations in the documentation to transfer to the binding generator the necessary metadata about the API (content of lists, hashtables, wheter pointer are caller/callee owned, can be NULL or if argument have a default value). The file bindings/override.xml is now deprecated. In documentation land, the main reference documentation was reorganizaed and more symbols have been added to it. Many more functions are documented. There is now tools to control the evolution of the ABI/API of Lasso.
2010-05-30Mark as make-jobs-safe again; a comment said the problem was reportedwiz1-5/+1
upstream and supposedly fixed in 2.0.6 (pkgsrc is at 2.0.14 now). Multiple builds with 16 jobs showed no problem.
2010-05-29+ py-xmlsecobache1-1/+2
2010-05-29Import py-xmlsec-0.3.0 as security/py-xmlsec.obache5-0/+56
Based on PR#42948 by Patrick McPhee. PyXMLSec is a set of Python bindings for XML Security Library (XMLSec).
2010-05-29Add buildlink with libxml2 and libxslt.obache1-1/+3
shlib linked with those library and pkg-config also notice requirement.
2010-05-24Update p5-Module-Signature from version 0.63 to version 0.64.seb3-12/+13
Pkgsrc changes: - placate pkglint Upstream changes: [Changes for 0.64 - Sun, 9 May 2010 00:50:11 +0200] * Avoid creating gnupg configuration files for the user invoking Makefile.PL (Closes RT#41978). * Correctly detect the version of gnupg on cygwin and add tests for it (Paul Fenwick) (Closes RT#39258).
2010-05-20fix CVE-2010-1321 (MITKRB5-SA-2010-005) and take maintainershiptez3-4/+24
2010-05-18* keychain 2.7.1 (07 May 2010)pettai3-11/+11
- Addition of a "make clean" target. removal of runtests as it is currently broken. - New release process in Makefile and release.sh - keychain release tarball will now contain pre-generated keychain, keychain.1 and keychain.spec so that users do not need to run "make". Updated README.rst to refer to the "source code" as a "release archive" since it contains both source code and ready-to-go script and man page. - GPG fix from Gentoo bug 203871; This fix will fix the issue with pinentry starting in the background and not showing up in the terminal. * keychain 2.7.0 (23 Oct 2009) - lockfile() replacement from Parallels Inc. OpenVZ code, takelock() rewrite, resulting in ~100 line code savings. Default lock timeout set to 5 seconds, and now keychain will try to forcefully acquire the lock if the timeout aborts, rather than simply failing and aborting. - MacOS X/BSD improvements: fix sed call in Makefile for MacOS X and presumably other *BSD environments. Rename COPYING to COPYING.txt + slight COPYING.txt formatting change. Fixed POD errors (removed '=end'). - Disable "Identity added" messages when --quiet is specified. (Gentoo bug #250328) --help will print output to stdout (Gentoo bug #196060) output cleanup and colorization changes - moving away from blue and over to cyan as it displays better terminals with black background. Also some additional colorization. * keychain 2.6.9 (26 Jul 2009) - Close Gentoo bug 222953 fix potential issues with GNU grep, Mac OS X color fix when called with --eval. - Perl 5.10 Makefile fix. Transition README to README.rst (reStructuredText). Updated maintainership information. Simplified default output
2010-05-17LICENSE=2-cluase-bsdobache1-1/+2
2010-05-16+ ruby-oauthobache1-1/+2
2010-05-16Import ruby-oauth-0.4.0 as security/ruby-oauth.obache4-0/+111
This is a RubyGem for implementing both OAuth clients and servers in Ruby applications.
2010-05-09New better documentation is available, so point to those insteadpettai1-2/+2
2010-05-09SoftHSM 1.1.4 - 2010-04-06pettai3-15/+15
* Respect --disable-64bit * Respect $DESTDIR for config files * The binaries can now show the version number * softhsm-keyconv could not handle --ttl properly * Link softhsm static with libsofthsm * Build libsofthsm.so without version number * libsofthsm.so is now a loadable module
2010-05-08Set correct architecture on Darwinadam1-1/+8
2010-05-08Upgrade netpgp to version 3.99.2/20100507.agc2-6/+6
Changes to 3.99.2/20100507 + add detached armoured signature creation and verification + fix manual pages + rationalisation of debug messages
2010-05-07Drop maintainership on these packages, I am no longer interested.ahoka1-2/+2
2010-05-06fixed emailpettai1-2/+2
2010-05-06+ opendnssecpettai1-1/+2
2010-05-06The OpenDNSSEC project announces the development of Open Source softwarepettai7-0/+236
that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.
2010-05-05Update p5-IO-Socket-SSL from version 1.32 to version 1.33.seb2-6/+6
Upstream changes: v1.33 2010.03.17 - attempt to make t/memleak_bad_handshake.t more stable, it fails for unknown reason on various systems - fix hostname checking: an IP should only be checked against subjectAltName GEN_IPADD, never against GEN_DNS or CN. Thanks to rusch[AT]genua[DOT]de for bug report
2010-05-02Remove an old Mac OS X build fix which now breaks the build.tron1-8/+2
2010-05-02Update to 2.6:wiz2-6/+6
* Noteworthy changes in release 2.6 (2010-04-20) [stable] - Fix build failure on platforms without support for GNU LD version scripts. - libtasn1: Simplified implementation of asn1_check_version. - tests: Improved self-checks. - Update gnulib files, fix many syntax-check nits, indent code, fix license templates.
2010-05-01Upgrade py-asn1 to version 0.0.11a.tonnerre3-76/+73
Changes since 0.0.8a: - Decoder can now treat values of unknown types as opaque OctetString. - Fix to Set/SetOf type decoder to handle uninitialized scalar SetOf components correctly. - API versioning mechanics retired (pyasn1.v1 -> pyasn1) what makes it possible to zip-import pyasn1 sources (used by egg and py2exe). - Allow any non-zero values in Boolean type BER decoder, as it's in accordnance with the standard.
2010-04-17remove pacnet mirror. service down.zafer1-3/+2
2010-04-16Update sudo package from sudo-1.7.2p4 to sudo-1.7.2p6.taca3-13/+13
Sudo versions 1.7.2p6 and 1.6.9p22 are now available. These releases fix a privilege escalation bug in the sudoedit functionality. Summary: A flaw exists in sudo's -e option (aka sudoedit) in sudo versions 1.6.8 through 1.7.2p5 that may give a user with permission to run sudoedit the ability to run arbitrary commands. This bug is related to, but distinct from, CVE 2010-0426. Sudo versions affected: 1.6.8 through 1.7.2p5 inclusive.
2010-04-15SUBDIR+=kstartjakllsch1-1/+2
2010-04-15Import kstart-3.16.jakllsch4-0/+48
k5start, and krenew are modified versions of kinit which add support for running as a daemon to maintain a ticket cache, running a command with credentials from a keytab and maintaining a ticket cache until that command completes, obtaining AFS tokens (via an external aklog) after obtaining tickets, and creating an AFS PAG for a command. They are primarily useful in conjunction with long-running jobs; for moving ticket handling code out of servers, cron jobs, or daemons; and to obtain tickets and AFS tokens with a single command.
2010-04-15Update "stunnel" package to version 4.33. Changes since 4.29:tron3-15/+14
- New features - New service-level "libwrap" option for run-time control whether /etc/hosts.allow and /etc/hosts.deny are used for access control. Disabling libwrap significantly increases performance of stunnel. - Log file reopen on USR1 signal was added. - Graceful configuration reload with HUP signal on Unix and with GUI on Windows. - Bugfixes - Inetd mode fixed - Fixed a transfer() loop issue with SSLv2 connections. - Fixed a "setsockopt IP_TRANSPARENT" warning with "local" option. - Logging subsystem bugfixes and cleanup. - Installer bugfixes for Vista and later versions of Windows. - FIPS mode can be enabled/disabled at runtime.