summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Collapse)AuthorFilesLines
2003-03-26De-confusify: Let emulators/suse_*/Makefile.* _not_ include bsd.pkg.mk, but ↵jschauma1-1/+2
rather make all packages that use linux emulation include bsd.pkg.mk as the last files just like any normal package.
2003-03-25grammar tweakgrant1-3/+3
2003-03-25use RCD_SCRIPTS.grant3-11/+9
2003-03-25both: use pidfilelukem3-6/+9
sfssd: support "reload" sfssd: call sfskey gen with "-K -l sfs_host_key" to prevent interactive Q's bump PKGREVISION (to 2)
2003-03-23Update MASTER_SITES.ad1-3/+3
2003-03-23use PKG_SYSCONFSUBDIR=sfslukem4-31/+19
use /var/sfs instead of /usr/pkg/var/sfs use OWN_DIRS_PERMS bump PKGREVISION
2003-03-22Correct DEPENDS line to proper formatjmc1-2/+2
2003-03-22Correct DEPENDS line to proper formatjmc1-2/+2
2003-03-22remove entries which aren't installed (and I couldn't find anylukem1-20/+1
reference to them in the distribution, either): bin/fake-agent bin/rpc_pcl bin/rpc_psrv bin/smkdirall bin/smount bin/snfsfstab bin/snfshost bin/snfsmount bin/snfspsrv bin/snfsumount bin/snfsuser bin/sumount bin/sumountall etc/rpc_pcl.conf lib/perl5/site_perl/5.6.1/SNFS.pm lib/perl5/site_perl/5.6.1/auto/SNFS/autosplit.ix
2003-03-22Install an rc.d script; closes PR pkg/20841 and PR pkg/20842 by David Ferlier.jmmv3-8/+32
Sort the Makefile a bit. Install a default configuration file in place. Bump PKGREVISION to 1.
2003-03-21* Add patch from http://www.openssl.org/news/secadv_20030317.txt:seb5-3/+132
Researchers have discovered a timing attack on RSA keys, to which OpenSSL is generally vulnerable, unless RSA blinding has been turned on. Typically, it will not have been, because it is not easily possible to do so when using OpenSSL to provide SSL or TLS. The enclosed patch switches blinding on by default. Applications that wish to can remove the blinding with RSA_blinding_off(), but this is not generally advised. It is also possible to disable it completely by defining OPENSSL_NO_FORCE_RSA_BLINDING at compile-time. The performance impact of blinding appears to be small (a few percent). This problem affects many applications using OpenSSL, in particular, almost all SSL-enabled Apaches. You should rebuild and reinstall OpenSSL, and all affected applications. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0147 to this issue. * Add patch from http://www.openssl.org/news/secadv_20030319.txt: Czech cryptologists Vlastimil Klima, Ondrej Pokorny, and Tomas Rosa have come up with an extension of the "Bleichenbacher attack" on RSA with PKCS #1 v1.5 padding as used in SSL 3.0 and TLS 1.0. Their attack requires the attacker to open millions of SSL/TLS connections to the server under attack; the server's behaviour when faced with specially made-up RSA ciphertexts can reveal information that in effect allows the attacker to perform a single RSA private key operation on a ciphertext of its choice using the server's RSA key. Note that the server's RSA key is not compromised in this attack. * Bump PKGREVISION.
2003-03-19Add and enable cy2-{login,ntlm}.jlam1-1/+3
2003-03-19Initial import of security/cy2-ntlm.jlam3-0/+34
This is the Cyrus SASL plugin that implements the NTLM (MS Windows NT) authentication mechanism.
2003-03-19Initial import of security/cy2-login.jlam3-0/+37
This is the Cyrus SASL plugin that implements the LOGIN authentication mechanism. It's recommended that it only be used if absolutely necessary since it is not a secure authentication scheme.
2003-03-19Rearrange the Makefile logic so that we can easily create Cyrus SASL 2.xjlam2-73/+98
plugin packages.
2003-03-19${SASLSOCKETDIR} is removed by the DEINSTALL script, so remove thisjlam1-2/+1
redundant command.
2003-03-19cyrus-sasl2 libraries have no library dependencies on PAM.jlam1-5/+1
2003-03-19Add and enable cy-loginjlam1-1/+2
2003-03-19Initial import of security/cy-login.jlam3-0/+42
This is the Cyrus SASL plugin that implements the LOGIN authentication mechanism. It's recommended that it only be used if absolutely necessary since it is not a secure authentication scheme.
2003-03-19Add a section to deal with SASL plugins, and clarify where this filejlam1-3/+8
should be included in package Makefiles.
2003-03-19Rearrange some of the Makefile logic so that we can create Cyrus SASLjlam2-63/+79
plugin packages.
2003-03-17Add and enable sfs.agc1-1/+2
2003-03-17Initial import of sfs-0.7.2 into the NetBSD Packages Collection.agc9-0/+409
Based on the sfs-0.6 package provided by Michael Santos in PR 18528. SFS is a secure, global network file system with completely decentralized control. SFS lets you access your files from anywhere and share them with anyone, anywhere. Anyone can set up an SFS server, and any user can access any server from any client. SFS lets you share files across administrative realms without involving administrators or certification authorities.
2003-03-14(1) Publicly export the value of _OPSYS_RPATH_NAME as RPATH_FLAG;jlam2-4/+8
Makefiles simply need to use this value often, for better or for worse. (2) Create a new variable FIX_RPATH that lists variables that should be cleansed of -R or -rpath values if ${_USE_RPATH} is "no". By default, FIX_RPATH contains LIBS, X11_LDFLAGS, and LDFLAGS, and additional variables may be appended from package Makefiles.
2003-03-11Updated to latest stable version 0.3.15.salo4-9/+11
Changes: - The progress status is sent via the progress callbacks in gpgme_op_edit. - Bug fix for signing operations with explicit signer settings for the CMS protocol.
2003-03-09Update to 1.22.wiz2-5/+5
This release changes the output format slightly to improve integration with other tools, and improves the RPM packaging.
2003-03-05Update fsh to 1.2. Changes since 1.1:jschauma3-6/+7
Use Bugzilla for bug reporting. * README: Mention Bugzilla. * fsh.texi (Bugs): Mention Bugzilla. Port to Python 2.2. (Bug 332). * fshcompat.py: New module, that finds some constants in os, fcntl, FCNTL or thin air depending on Python version. * fshlib.py: Use fshcompat instead of FCNTL. * infshd.py: Ditto. * Makefile.am (pkgdata_DATA): Added fshcompat.py.
2003-03-05Pass prefix to openssl as argument to the configure stage: helpsseb1-1/+2
when openssl is not in places planned by Makefile.PL (like LOCALBASE).
2003-03-05Remove obsolete and vulnerable libmcrypt22 package.wiz7-85/+1
2003-03-05Use the libmcrypt package instead of the obsolete libmcrypt22 one.wiz3-5/+19
Bump PKGREVISION.
2003-03-05Unneeded after 2.5.6 update.wiz1-13/+0
2003-03-05Update to 2.6.4.wiz3-6/+8
21Feb2003: Version 2.6.4 - Updated Spanish-Argentina translation by Ariel Fermani. - Some fixes for compiling under win32. - Some fixes to allow compiling gaaout.c with external CFLAGS and CPPFLAGS. 04Oct2002: Version 2.6.3 - Added support for 64 bit file offsets. Based on patch by Keven Belanger. 23Jun2002: Version 2.6.2 - Corrections in localization - Added Spanish-Argentina translation. Translated by Ariel Fermani. 15Jun2002: Version 2.6.1 - Better error checking - Added rndunix random gatherer from gnupg. It is a gatherer for random bytes, written by Peter Gutmann. - Added some kind of random byte generator for Win32 systems. - Corrected bug in configuration file parsing. - Corrected bug in bare mode which put an IV in the encrypted file even if the mode did not support IV. 29May2002: Version 2.6.0 - Added OpenPGP support (added by Timo Schulz) - Removed all of file locking code. - Several improvements and corrections on the old codebase (still a mess). 11Mar2002: Version 2.5.13 - Corrected stream modes in block algorithms 29Jan2002: Version 2.5.12 - Added some missing files 26Jan2002: Version 2.5.11 - SHA1 is the default digest used 01Dec2001: - Added --time option
2003-03-05Update to 2.5.6.wiz4-108/+13
January 19 2003: (version 2.5.6) - Fixes in win32 detection and DLL building. - Fixes for solaris (a symbol was not exported) - Corrected bug which made algorithm symbols to be inserted twice in symbol table. December 22 2002: (version 2.5.5) - Better win32 detection and DLL building. - Changed some variables names in gost.c to allow compiling with gcc and K6 optimizations. - Some buffer overrun checks on input. Patches and suggestions by Ilia A. - Made the default behaviour to include all algorithms into the main library, instead of using dynamic modules. Dynamic loading is disabled by default. The --enable-dynamic-loading flag can be used in the configure script, to get the old behaviour. - Some fixes in ECB mode. August 16 2002: (version 2.5.3) - The const keyword is now used in the exported functions - Corrected problem in libltdl's configure script June 22 2002: (version 2.5.2) - Fixed bug in the returned IV size of ARCFOUR - Fixed bug in mcrypt_readdir() which prevented the test programs to work. May 30 2002: (version 2.5.1) - Corrected the license. COPYING.LIB (LGPL) is now included instead of COPYING (GPL) Mar 09th 2002: (version 2.5.0) - Several corrections in stream and block cipher modes. - Added --disable-dynamic-loading configure option - The IV modifications in Arcfour and Wake have been disabled by default. - Added CTR mode for block ciphers. - Fixes in nCFB and nOFB modes. - Added mcrypt_enc_get_state() function. - Added test for nCFB, CFB, nOFB and CTR with AES Feb 14th 2002: - nOFB and nCFB modes can now encrypt and decrypt plaintext of size less than block size.
2003-03-03Use new IMAKE_MAN_PATH variables in PLISTs to make these packages morejschauma2-3/+4
portable. Bump PKGREVISION accordingly.
2003-02-28tweak linking of libssl so it can find libcrypto.grant2-12/+75
2003-02-27Update to version 2.1.12.seb9-44/+94
New in 2.1.12 ------------- * Distribute in Solaris tar (not GNU tar format) * Fix a number of build/configure related issues. New in 2.1.11 ------------- * Add the fastbind auth method to the saslauthd LDAP module. * Fix a potential memory leak in the doors version of saslauthd. * NTLM now only requires one of LM or NT, not both. * Fix a variety of Berkeley DB, LDAP, OpenSSL, and other build issues. * Win32 support compiles, but no documentation as of yet.
2003-02-20Add patch from http://www.openssl.org/news/secadv_20030219.txt:wiz3-2/+105
In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked via timing by performing a MAC computation even if incorrrect block cipher padding has been found. This is a countermeasure against active attacks where the attacker has to distinguish between bad padding and a MAC verification error. (CAN-2003-0078) Bump PKGREVISION.
2003-02-18GConf2's buildlink2.mk now creates a gconftool-2 wrapper which prevents thejmmv2-17/+3
configuration database from beeing modified by packages that do not honour the --disable-schemas-install option. There is no need to patch these broken packages any more. Okay'ed by wiz.
2003-02-18Use the omf.mk file provided by the scrollkeeper package to automaticallyjmmv2-3/+5
rebuild the documentation database at install/deinstall time. This means that: - PLIST's do not need to call scrollkeeper-{update,rebuilddb} directly; this is done by a bsd.pkg.install.mk template. - The share/omf directory is only removed by scrollkeeper, which is the last package in the dependancy tree. - PKGREVISION is bumped. Reviewed by wiz.
2003-02-17convert to use test target from bsd.pkg.mkdillo1-4/+2
addresses PR pkg/19416
2003-02-16Add and enable kssh.markd1-1/+2
2003-02-16Initial import of kssh-0.7.markd4-0/+38
From Juan RP in PR 20346. KSSH is a KDE front-end to ssh. It can work as a standard KDE application that launches ssh connections in a terminal or as a konsole session. This means that you can press in any konsole "New Session" and then select "Secure Shell".
2003-02-15Update to 0.7.0. Changes since 0.5.0:jmmv1-0/+27
seahorse 0.7.0 -------------- * Add a user ID * Add a subkey * Delete a subkey * Change a subkey's expiration * Revoke a subkey * Properties shows subkey status (good, revoked, expired) * Key Manager shows user IDs instead of subkeys * Sort keys by user ID & validity in Key Manager and Recipients * Subkeys hidden by default in properties seahorse 0.6.2 -------------- * Bug fix in GPGME check * Supported languages: cs, de, es, hu, ja, nl, no, sv, tr * Interface fixups so buttons are not sensitive when they cannot be used seahorse 0.6.1 -------------- * Correctly check for GPGME 0.3.14 and GnuPG 1.2 during build * More and updated translations * Key manager updates all keys when changed * Preferences loads faster * More HIG compliant windows & dialogs * Failure to install schemas does not stop installation * Better about dialog: shows version & lists translators seahorse 0.6.0 -------------- * Key properties cleanups * Less passphrase crashes * Only one window of each type or of each type per key allowed open * Less memory leaks * Preferences is slower to load, but keeps track of default signer better * Updated help manual with figures * More translations * Migration to GNOME (missed in previous commit)
2003-02-15Update to 0.7.0. Changes since 0.5.0:jmmv3-22/+61
seahorse 0.7.0 -------------- * Add a user ID * Add a subkey * Delete a subkey * Change a subkey's expiration * Revoke a subkey * Properties shows subkey status (good, revoked, expired) * Key Manager shows user IDs instead of subkeys * Sort keys by user ID & validity in Key Manager and Recipients * Subkeys hidden by default in properties seahorse 0.6.2 -------------- * Bug fix in GPGME check * Supported languages: cs, de, es, hu, ja, nl, no, sv, tr * Interface fixups so buttons are not sensitive when they cannot be used seahorse 0.6.1 -------------- * Correctly check for GPGME 0.3.14 and GnuPG 1.2 during build * More and updated translations * Key manager updates all keys when changed * Preferences loads faster * More HIG compliant windows & dialogs * Failure to install schemas does not stop installation * Better about dialog: shows version & lists translators seahorse 0.6.0 -------------- * Key properties cleanups * Less passphrase crashes * Only one window of each type or of each type per key allowed open * Less memory leaks * Preferences is slower to load, but keeps track of default signer better * Updated help manual with figures * More translations * Migration to GNOME
2003-02-09fix compilation problems on systems that don't have ldconfig.dmcmahill3-2/+19
2003-02-09Updated to p5-SSLeay-0.47shell4-20/+34
Changes from 0.45 + Added patch from Pavel Hlavnicka for freeing memory leaks from SSL_CTX_use_pkcs12_file() whose functionality is triggered by the $ENV{HTTPS_PKCS12_*} settings + Set timeout to 15 seconds for ./net_ssl_test and lwp-ssl-test sample scripts for better testing of timeout behavior + Added alarm() during Net::SSL->read() to honor socket timeout setting for more robust applications. read() will die_with_error() which in consistent with previous semantics used during SSL read() failure Thanks to Pavel Hlavnicka for prompting this change. + Removed code that supported versions of SSLeay before version 0.8 I believe SSLeay v.8 was released back in 1998 + Added patch from Devin Heitmueller so that initial random seed would be taken from /dev/urandom if available via RAND_load_file API
2003-02-08do not disable asm on alpha. fixes recently noted compile problemsdmcmahill1-2/+3
2003-02-08fix some format strings for 64 bit systems so this can build with -Werrordmcmahill3-1/+41
2003-02-05add newline to end of perl script. while I'm here, clean upgrant3-15/+21
post-configure target and whitespace. fixes PR pkg/20210 from Jesse Kempf.
2003-02-02Set "USE_LIBTOOL" even if we use the bundled "libtool" so thattron1-2/+2
buildlink2 will do the right thing.