summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Collapse)AuthorFilesLines
2010-05-18* keychain 2.7.1 (07 May 2010)pettai3-11/+11
- Addition of a "make clean" target. removal of runtests as it is currently broken. - New release process in Makefile and release.sh - keychain release tarball will now contain pre-generated keychain, keychain.1 and keychain.spec so that users do not need to run "make". Updated README.rst to refer to the "source code" as a "release archive" since it contains both source code and ready-to-go script and man page. - GPG fix from Gentoo bug 203871; This fix will fix the issue with pinentry starting in the background and not showing up in the terminal. * keychain 2.7.0 (23 Oct 2009) - lockfile() replacement from Parallels Inc. OpenVZ code, takelock() rewrite, resulting in ~100 line code savings. Default lock timeout set to 5 seconds, and now keychain will try to forcefully acquire the lock if the timeout aborts, rather than simply failing and aborting. - MacOS X/BSD improvements: fix sed call in Makefile for MacOS X and presumably other *BSD environments. Rename COPYING to COPYING.txt + slight COPYING.txt formatting change. Fixed POD errors (removed '=end'). - Disable "Identity added" messages when --quiet is specified. (Gentoo bug #250328) --help will print output to stdout (Gentoo bug #196060) output cleanup and colorization changes - moving away from blue and over to cyan as it displays better terminals with black background. Also some additional colorization. * keychain 2.6.9 (26 Jul 2009) - Close Gentoo bug 222953 fix potential issues with GNU grep, Mac OS X color fix when called with --eval. - Perl 5.10 Makefile fix. Transition README to README.rst (reStructuredText). Updated maintainership information. Simplified default output
2010-05-17LICENSE=2-cluase-bsdobache1-1/+2
2010-05-16+ ruby-oauthobache1-1/+2
2010-05-16Import ruby-oauth-0.4.0 as security/ruby-oauth.obache4-0/+111
This is a RubyGem for implementing both OAuth clients and servers in Ruby applications.
2010-05-09New better documentation is available, so point to those insteadpettai1-2/+2
2010-05-09SoftHSM 1.1.4 - 2010-04-06pettai3-15/+15
* Respect --disable-64bit * Respect $DESTDIR for config files * The binaries can now show the version number * softhsm-keyconv could not handle --ttl properly * Link softhsm static with libsofthsm * Build libsofthsm.so without version number * libsofthsm.so is now a loadable module
2010-05-08Set correct architecture on Darwinadam1-1/+8
2010-05-08Upgrade netpgp to version 3.99.2/20100507.agc2-6/+6
Changes to 3.99.2/20100507 + add detached armoured signature creation and verification + fix manual pages + rationalisation of debug messages
2010-05-07Drop maintainership on these packages, I am no longer interested.ahoka1-2/+2
2010-05-06fixed emailpettai1-2/+2
2010-05-06+ opendnssecpettai1-1/+2
2010-05-06The OpenDNSSEC project announces the development of Open Source softwarepettai7-0/+236
that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.
2010-05-05Update p5-IO-Socket-SSL from version 1.32 to version 1.33.seb2-6/+6
Upstream changes: v1.33 2010.03.17 - attempt to make t/memleak_bad_handshake.t more stable, it fails for unknown reason on various systems - fix hostname checking: an IP should only be checked against subjectAltName GEN_IPADD, never against GEN_DNS or CN. Thanks to rusch[AT]genua[DOT]de for bug report
2010-05-02Remove an old Mac OS X build fix which now breaks the build.tron1-8/+2
2010-05-02Update to 2.6:wiz2-6/+6
* Noteworthy changes in release 2.6 (2010-04-20) [stable] - Fix build failure on platforms without support for GNU LD version scripts. - libtasn1: Simplified implementation of asn1_check_version. - tests: Improved self-checks. - Update gnulib files, fix many syntax-check nits, indent code, fix license templates.
2010-05-01Upgrade py-asn1 to version 0.0.11a.tonnerre3-76/+73
Changes since 0.0.8a: - Decoder can now treat values of unknown types as opaque OctetString. - Fix to Set/SetOf type decoder to handle uninitialized scalar SetOf components correctly. - API versioning mechanics retired (pyasn1.v1 -> pyasn1) what makes it possible to zip-import pyasn1 sources (used by egg and py2exe). - Allow any non-zero values in Boolean type BER decoder, as it's in accordnance with the standard.
2010-04-17remove pacnet mirror. service down.zafer1-3/+2
2010-04-16Update sudo package from sudo-1.7.2p4 to sudo-1.7.2p6.taca3-13/+13
Sudo versions 1.7.2p6 and 1.6.9p22 are now available. These releases fix a privilege escalation bug in the sudoedit functionality. Summary: A flaw exists in sudo's -e option (aka sudoedit) in sudo versions 1.6.8 through 1.7.2p5 that may give a user with permission to run sudoedit the ability to run arbitrary commands. This bug is related to, but distinct from, CVE 2010-0426. Sudo versions affected: 1.6.8 through 1.7.2p5 inclusive.
2010-04-15SUBDIR+=kstartjakllsch1-1/+2
2010-04-15Import kstart-3.16.jakllsch4-0/+48
k5start, and krenew are modified versions of kinit which add support for running as a daemon to maintain a ticket cache, running a command with credentials from a keytab and maintaining a ticket cache until that command completes, obtaining AFS tokens (via an external aklog) after obtaining tickets, and creating an AFS PAG for a command. They are primarily useful in conjunction with long-running jobs; for moving ticket handling code out of servers, cron jobs, or daemons; and to obtain tickets and AFS tokens with a single command.
2010-04-15Update "stunnel" package to version 4.33. Changes since 4.29:tron3-15/+14
- New features - New service-level "libwrap" option for run-time control whether /etc/hosts.allow and /etc/hosts.deny are used for access control. Disabling libwrap significantly increases performance of stunnel. - Log file reopen on USR1 signal was added. - Graceful configuration reload with HUP signal on Unix and with GUI on Windows. - Bugfixes - Inetd mode fixed - Fixed a transfer() loop issue with SSLv2 connections. - Fixed a "setsockopt IP_TRANSPARENT" warning with "local" option. - Logging subsystem bugfixes and cleanup. - Installer bugfixes for Vista and later versions of Windows. - FIPS mode can be enabled/disabled at runtime.
2010-04-14DESTDIR supportjoerg3-7/+22
2010-04-14Upgrade to 1.6.1.elric2-8/+8
2010-04-14Remove patch-aa as the upstream maintainer (elric@) incorporated it.elric2-17/+1
2010-04-14Add and enable knc.schmonz1-1/+2
2010-04-14Add knc, Kerberised NetCat. It works in basically the same way asschmonz5-0/+56
either netcat or stunnel except that it is Kerberised. You can use it to construct client/server applications while keeping the Kerberos libraries out of your programs address space quickly and easily.
2010-04-13update to 2.8.6drochner3-8/+8
changes: -interoperability improvements (especially for VeriSign) -misc fixes -translation updates
2010-04-13update to 2.5drochner2-6/+6
changes: -Improve GTK-DOC comments -Updated gnulib files
2010-04-12Update openssl package from 0.9.8m to 0.9.8n.taca3-27/+6
Changes between 0.9.8m and 0.9.8n [24 Mar 2010] *) When rejecting SSL/TLS records due to an incorrect version number, never update s->server with a new major version number. As of - OpenSSL 0.9.8m if 'short' is a 16-bit type, - OpenSSL 0.9.8f if 'short' is longer than 16 bits, the previous behavior could result in a read attempt at NULL when receiving specific incorrect SSL/TLS records once record payload protection is active. (CVE-2010-0740) [Bodo Moeller, Adam Langley <agl@chromium.org>] *) Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL could be crashed if the relevant tables were not present (e.g. chrooted). [Tomas Hoger <thoger@redhat.com>]
2010-04-11Update p5-Module-Signature from version 0.61 to version 0.63.seb2-6/+6
Upstream changes: [Changes for 0.63 - Sun, 28 Mar 2010 04:46:27 +0100] * Fix diagnostic message from Makefile.PL when the user dosn't have gnupg or Crypt::OpenPGP (miyagawa). [Changes for 0.62 - Tue, 23 Mar 2010 22:17:39 +0100] * Change the default keyserver from the outdated pgp.mit.edu to pool.sks-keyservers.net.
2010-04-11Fix PLIST: add missing locale bn.jmmv1-1/+2
2010-04-09Make sure qmake can be found during the build.markd1-1/+4
2010-03-31Fix PLIST when installing in Linux.jmmv1-1/+5
2010-03-26Apply some sense to the build system by always linking the .la archivesjoerg5-32/+27
in src/lib as that is the location it wants to pick it up. Work around the dependencies in other places by symlinking to that, effectively reverting the direction. Link telnet(d) consistently. Add DESTDIR support.
2010-03-26Add a patch for Fix for CVE-2010-0740, DoS problem.taca3-3/+23
http://www.openssl.org/news/secadv_20100324.txt Bump PKGREVISION.
2010-03-24Recursive revision bump for GMP update.asau5-8/+10
2010-03-23Install data files to share/examples to make sure they end up in thejoerg4-20/+35
binary package. Fixes DESTDIR installation at the same time. Bump revision.
2010-03-23Reset maintainer, lost his commit bit.wiz1-2/+2
2010-03-21Reset maintainer, developer lost his commit bit.wiz2-4/+4
2010-03-21use PHP_VERSIONS_ACCEPTED=52 rather then PHP_VERSIONS_REQD=5 for packages,jdolecek1-2/+2
which are PHP 5.2.* only
2010-03-21Store the result of dbm_fetch() before dbm_close() (apparently) clobbers it.scottr2-1/+17
2010-03-21Work around a bug described in security/39313.scottr1-1/+10
2010-03-19Needs pkg-config.joerg1-2/+2
2010-03-16Restrict to php5 with PHP_VERSION_REQD.taca1-1/+3
These packages are dropped on PHP 5.3 or has build problem. No functional change.
2010-03-16Updating security/p5-Net-DNS-SEC from 0.15 to 0.16sno2-8/+9
pkgsrc changes: - Adjust dependencies - Add license definition Upstream changes: ***0.16 March 12, 2010 Feature: KEY inherits DNSKEY This helps maintenance in one part of the code. Feature: keylength methode rt.cpan.org #53468 Added keylength method for RSA and DSA Acknowledgements Hugo Salgado Fix: rt.cpan.org #51778 Empty bitmap would cause error about undefined ARRAY in NSEC/NSEC3. Now the code will allow empty bitmaps gracefully Feature: New Algorithm Support (rt.cpan.org #51092) SHA2 algorithm support, including NSEC3 algorithm parameters updated Acknowledgement Jakob Shlyter Fix: rt.cpan.org #42089 NSEC3 Algorithm support in NSEC3 broken patch by Wes Hardaker
2010-03-16Updating security/p5-Authen-SASL from 2.13 to 2.14sno2-6/+6
Upstream changes: Authen-SASL 2.14 -- Thu Mar 11 08:21:07 CST 2010 * Documentation updates [Yann Kerherve] * Added server API description [Yann Kerherve] * Bugfixes to LOGIN, PLAIN and DIGEST_MD5 [Yann Kerherve] * Added server support for LOGIN, PLAINaand DIGEST_MD5 [Yann Kerherve] * Compatiblity with Authen::SASL::XS [Yann Kerherve]
2010-03-16Updating security/p5-Crypt-Eksblowfish from 0.007 to 0.008sno2-9/+10
pkgsrc changes: - Adding license definition - Adjusting dependencies Upstream changes: version 0.008; 2010-03-11 * bugfix: avoid memory leak when returning block to Perl space * check for required Perl version at runtime * in XS, avoid using "class" as a variable name, for compatibility with C++ compilers * in Build.PL, explicitly declare configure-time requirements * remove bogus "exit 0" from Build.PL
2010-03-15+ opensamlpettai1-1/+2
2010-03-15OpenSAML is a set of open source C++ libraries meant to support developerspettai5-0/+154
working with the Security Assertion Markup Language (SAML). OpenSAML 2, the current version, supports SAML 1.0, 1.1, and 2.0.
2010-03-15Installs shlibs nowadays, so don't default to a build-only dependency.schmonz1-2/+1