summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Collapse)AuthorFilesLines
2011-12-18Don't use "bool" as a variable name. This package now builds. (at long last)dholland2-1/+23
2011-12-18Include mk/curses.buildlink3.mk not mk/termcap.buildlink3.mk.sbd1-2/+2
2011-12-17Add missing mk/curses buildlink.sbd1-1/+3
Bump PKGREVISION
2011-12-17Add missing mk/termcap buildlink.sbd1-2/+3
Bump PKGREVISION
2011-12-17security/botan: Fix DragonFlymarino4-2/+32
1) Update two configuration files to include DragonFly, which results in additional generated files. 2) Update PLIST.DragonFly (it was wrong in any case)
2011-12-17Change default PKGNAME scheme for PECL packages.obache1-1/+2
Drop ${PHP_BASE_VARS} from PKGVERSION by default. It used to be required to support multiple php version. But after PHP version based ${PHP_PKG_PREFIX} was introduced, such trick is not required anymore. In addition to this, such version name schme invokes unwanted version bump when base php version is bumped, plus, such version scheme is hard to use for DEPENDS pattern. To avoid downgrading of package using such legacy version scheme, PECL_LEGACY_VERSION_SCHEME is introduced. If it is defined, current version scheme is still used for currently supported PHP version (5 and 53), but instead of ${PHP_BASE_VARS}, current fixed PHP base version in pkgsrc is used to avoid unwanted version bump from update of PHP base package. With newer PHP (54, or so on), new version scheme will be used if it is defined. This trick will not be required and should be removed after php5 and php53 will be gone away from pkgsrc.
2011-12-17security/qca2-ossl: Support OpenSSL 1.0marino3-7/+262
DragonFly in on OpenSSL 1.0 and this package wasn't building due to the missing MD5 digest that no longer builds by default on the latest versions of OpenSSL. FreeBSD already ran into this and patched qca-ossl, and this ports their fix to pkgsrc.
2011-12-17Add missing mk/termcap buildlink.sbd2-8/+6
Bump PKGREVISION
2011-12-16-explicitely disable kerberos support to avoid PLIST fluctuationsdrochner5-46/+38
(seen in bulk build) -fix obvious typo in asm code (fixes i386 build) -don't install nettle library to avoid conflict with pkgsrc/nettle bump PKGREV
2011-12-14Version 1.10.4pettai2-6/+6
* liboath: Fix build so that OATH_VERSION_NUMBER is actually defined. It was an empty value in the last release due to a bug in the build scripts. Version 1.10.3 * liboath: Allow strcmp callback to return negative to signal errors. * Fix bugs in build scripts for generating version numbers. * Update gnulib files.
2011-12-14Regenerate diffs for GNU patch.sbd2-7/+9
2011-12-13added prevention of CVE-2011-4122 taken from NetBSD srcspz3-5/+23
2011-12-12OpenDNSSEC 1.3.4pettai3-8/+10
Bugfixes: * Signer: Use debug instead of warning for drudgers queue being full, also sleep 10 ms if it is full to not hog CPU. This increased signing speed on single core machines by a factor of 2.
2011-12-10Fix build failure on Solaris (PR 28226).cheusov3-7/+26
2011-12-09In OWN_DIRS_PERMS change ROOT_GROUP to REAL_ROOT_GROUPsbd1-2/+2
2011-12-08Update stunnel to 4.50 (from 4.46).jym2-7/+6
Version 4.50, 2011.12.03, urgency: MEDIUM: New features Added Android port. Updated INSTALL.FIPS. Bugfixes Fixed internal memory allocation problem in inetd mode. Fixed FIPS mode on Microsoft Vista, Server 2008, and Windows 7. This fix required to compile OpenSSL FIPS-compliant DLLs with MSVC 9.0, instead of MSVC 10.0. msvcr100.dll was replaced with msvcr90.dll. GPL compatibility issues are explained in the GPL FAQ: http://www.gnu.org/licenses/gpl-faq.html#WindowsRuntimeAndGPL POP3 server-side protocol negotiation updated to report STLS capability (thx to Anthony Morgan). Version 4.49, 2011.11.28, urgency: MEDIUM: Bugfixes Missing Microsoft Visual C++ Redistributable (msvcr100.dll) required by FIPS-compliant OpenSSL library was added to the Windows installer. A bug was fixed causing crashes on MacOS X and some other platforms. Version 4.48, 2011.11.26, urgency: MEDIUM: New features FIPS support on Win32 platform added. OpenSSL 0.9.8r DLLs based on FIPS 1.2.3 canister are included with this version of stunnel. FIPS mode can be disabled with "fips = no" configuration file option. Bugfixes Fixed canary initialization problem on Win32 platform. Version 4.47, 2011.11.21, urgency: MEDIUM: Internal improvements CVE-2010-3864 workaround improved to check runtime version of OpenSSL rather than compiled version, and to allow OpenSSL 0.x.x >= 0.9.8p. Encoding of man page sources changed to UTF-8. Bugfixes Handling of socket/SSL close in transfer() function was fixed. Logging was modified to save and restore system error codes. Option "service" was restricted to Unix, as since stunnel 4.42 it wasn't doing anything useful on Windows platform.
2011-12-08Move the *_amd64 PLIST entries out of the common file and into all of thejmmv7-9/+19
platform files except Darwin. Also add the *_sse2 entries to Darwin. Note that both *_amd64 and *_sse2 are conditional on x86_64, so this division of files per platform is easier to do by PLIST tweaks than by further Makefile conditionals. This fixes the build of botan under OS X Lion with ABI=64 and should be a no-op for all other platforms.
2011-12-06Fix build with newer GCCjoerg2-1/+14
2011-12-06Recursive bump for lang/ocaml buildlink addition.sbd1-2/+2
2011-12-05pwrite is a standard system calljoerg2-1/+33
2011-12-05Added oath-toolkitpettai1-1/+2
2011-12-05The OATH Toolkit contains a shared library, command line tool and a PAM modulepettai4-0/+55
that makes it possible to build one-time password authentication systems. Supported technologies include the event-based HOTP algorithm and the time-based TOTP algorithm. OATH is the Open AuTHentication organization which specify the algorithms.
2011-12-04Remove some i386-specific files which are no longer installed.riz1-5/+1
2011-12-03Tag the 28 locations that result in a Python 3.1 package as supporting so.joerg3-3/+9
Remove it from the default list for the rest.
2011-12-02Recursive bump for devel/apr buildlink addition.sbd1-2/+2
2011-12-01Update to version 1.17.he2-7/+6
Upstream changes: Gisle Aas (6): Less noisy 'git status' output Merge pull request #1 from schwern/bug/require_eval Don't clobber $@ in Digest->new [RT#50663] More meta info added to Makefile.PL Fix typo in RIPEMD160 [RT#50629] Add schwern's test files Michael G. Schwern (5): Turn on strict. Convert tests to use Test::More Untabify Turn Digest::Dummy into a real file which exercises the Digest->new() require logic. Close the eval "require $module" security hole in Digest->new($algorithm)
2011-12-01Fix typo.wiz1-2/+2
2011-12-01Fixed COMMENTpettai1-3/+3
2011-11-30Added pam-krb5pettai1-1/+2
2011-11-30pam-krb5 is a Kerberos v5 PAM module for either MIT Kerberos or Heimdal.pettai4-0/+36
It supports ticket refreshing by screen savers, configurable authorization handling, authentication of non-local accounts for network services, password changing, and password expiration, as well as all the standard expected PAM features.
2011-11-30Update to 2.11:wiz2-6/+6
* Noteworthy changes in release 2.11 (2011-11-25) [stable] - qa: Now builds without compiler warnings with Solaris CC. - qa: Added clang analysis. Fixed cyclomatic complexity output. - tests: Added self-test of bit string functions. - build: Added windows/libtasn14win.mk rules to produce Windows binaries. - build: Don't hard code path to perl in doc/gdoc. - Various minor fixes.
2011-11-291.3.5pettai6-105/+15
* This version will be dedicated to Darren Besler, thank you for your major contribution! * libtac version is now 1.7.1 * magic.c: magic_inited is only used for linux * Finally got rid of all goto illness! * Changed tabsize to 4 * Fixed missing xalloc.h in authen_s.c * Get PAM_RHOST from PAM stack and use it as rem_addr * Added _pam_get_rhost() and _pam_get_user() * A long list of things done by Darren Besler... * A list of bugs fixed by Darren Besler... * And other things done by Darren Besler... 1.3.4 * removed encrypt option just check if there is a secret (key). * removed first_hit option because you can get the same behaviour by using only one server. * added multiple secret support. * connect.c: improved connection error handling by using getpeername() to check if connection is still valid. * properly handle multiple servers when authenticating. 1.3.3 * pam_tacplus.h: changed bitflags to hex. * Added gitignore for build stuff. * connect.c: removed ifdef for sys/socket.h, it will be included anyway for other platforms. * connect.c: improved connection error handling. 1.3.2 * Added autotool configuration files. * Added pam_tacplus.spec file. * Added license information to all files and the license itself. * All AV pairs are now available to the PAM environment. * Rewritten attribute loop in function pam_sm_acct_mgmt() for debug and future use of AV pairs. * Fixed attribute buffer in author_r.c. 1.3.1 * Added custom password prompt option. * Removed password logging when in debug mode. 1.3.0 * Released version 1.3.0 based on 1.2.13. This release finally includes support for TACACS+ chap and login authentication. The default is still pap for backward compatibility. 1.2.13 * Changed spaces into tabs for pam_tacplus.c so make it more readable. * Did some minor cleanup. * Added login option so you can choose which TACACS+ authentication you want to use. You can use pap, chap or login (ascii) at the moment. The default login option is pap. * Added cont_s.c needed for TACACS+ login authentication. 1.2.12 * Missing network byte order convertion to host byte order in function's tac_account_read, tac_authen_pap_read and tac_author_read. * Fixed potential memory leak.
2011-11-29Fix compilation failure:cheusov2-5/+13
./src/.libs/libgcrypt.so: undefined reference to `assert'
2011-11-28security/kth-krb4: Add DragonFly and FreeBSD supportmarino14-16/+299
The majority of these patches were inspired from FreeBSD's ports. FreeBSD, along with at least Debian, have removed Kerberos4 due to secuity concerns. From: http://web.mit.edu/kerberos/krb4-end-of-life.html : "Serious protocol flaws[2] have been found in Kerberos 4. These flaws permit attacks which require far less effort than an exhaustive search of the DES key space. These flaws make Kerberos 4 cross-realm authentication an unacceptable security risk and raise serious questions about the security of the entire Kerberos 4 protocol. The known insecurity of DES, combined with the recently discovered protocol flaws, make it extremely inadvisable to rely on the security of version 4 of the Kerberos protocol. These factors motivate the MIT Kerberos Team to remove support for Kerberos version 4 from the MIT implementation of Kerberos." This end-of-life announcement is dated 19 October 2006. I think it's a good question to ask why this package and the packages that depend on it are still in pkgsrc.
2011-11-28Update to 1.1.4:wiz2-6/+6
signing-party (1.1.4-1) unstable; urgency=low . [ Thijs Kinkhorst ] * caff: + Correct path of ~/.caffrc in informational messages (Closes: #582603). + Be more verbose on unexpected key ID (Closes: #645792). * gpg-key2ps: + Apply patch from Uwe Kleine-König to deal with latin1 characters (Closes: #596377). . [ Franck Joncourt ] * gpg-mailkeys: + Correct path of ~/.gpg-mailkeysrc and ~/.signature in manpage. + Add new environment variable SENDMAIL_ARGS to allow user to pass arguments to sendmail (closes: #599409). * caff: + Refactor import of own key and import for keys to sign from keyrings. + Also automatically import keys to sign from the user's normal gpg keyrings. + Use --no-auto-check-trustdb when importing keys from files or the user's normal gpg keyrings (closes: #539643). . [ Peter Palfrader ] * caff: + manpage: Refer to all of /usr/share/doc/signing-party/caff/ and not just to /usr/share/doc/signing-party/caff/caffrc.sample (closes: #568052). + Fix horrible &function calls used because of broken prototypes. + Even if all keys to sign were found in the user's normal gpg keyrings we still need to import them (again) from any keyrings passed with --key-files - the keys there might be newer, containing new subkeys (for encryption), uids (for signing) or revocations. + Make importing of keys to be signed from the normal gpg optional (--keys-from-gnupg). + refactor copying of command line options into global config variable. + Create the mail files in ~/.caff/keys even if mail is not sent (closes: #590666).
2011-11-27Recursive bump for www/serf buildlink addition.sbd1-2/+2
2011-11-27Recursive bump for security/libssh buildlink addition.sbd1-2/+2
2011-11-27Add missing devel/zlib buildlink.sbd2-3/+7
Bump PKGREVISION
2011-11-26Fix preprocessor usage.joerg2-1/+15
2011-11-26regen distinfo (hi joerg!)dholland1-2/+8
2011-11-26Add missing devel/zlib buildlink.sbd3-4/+9
Bump PKGREVISION
2011-11-25Wants APU, so no apache2joerg1-2/+2
2011-11-25Fix build with modern GCCjoerg5-10/+60
2011-11-25Recursive bump for Botonjoerg1-1/+2
2011-11-25Update to Botan 1.8.13:joerg7-133/+13
* 1.8.13, 2011-07-02 - A race in Algorithm_Factory that could cause crashes in multithreaded code has been fixed. * 1.8.12, 2011-06-20 - If EMSA3(Raw) was used for more than one signature, it would produce incorrect output. - Fix the --enable-debug option to configure.py - Improve OS detection on Cygwin - Fix compilation under Sun Studio 12 on Solaris - Fix a memory leak in the constructors of DataSource_Stream and DataSink_Stream which would occur if opening the file failed. PR 144 * 1.8.11, 2010-11-02 - Fix a number of CRL encoding and decoding bugs - When building a debug library under VC++, use the debug runtime - Fix compilation under Sun Studio on Linux and Solaris - Add several functions for compatability with 1.9 - In the examples, read most input files as binary - The Perl build script has been removed in this release * 1.8.10, 2010-08-31 - Switch default PKCS #8 encryption algorithm from 3DES to AES-256 - Increase default hash iterations from 2048 to 10000 in PBES1 and PBES2 - Use small tables in the first round of AES - Add PBKDF typedef and get_pbkdf for better compatability with 1.9 - Add version of S2K::derive_key taking salt and iteration count - Enable the /proc-walking entropy source on NetBSD - Fix the doxygen makefile target * 1.8.9, 2010-06-16 - Use constant time multiplication in IDEA - Avoid possible timing attack against OAEP decoding - Add new X509::BER_encode and PKCS8::BER_encode - Enable DLL builds under Windows - Add Win32 installer support - Add support for the Clang compiler - Fix problem in semcem.h preventing build under Clang or GCC 3.4 - Fix bug that prevented creation of DSA groups under 1024 bits - Fix crash in GMP_Engine if library is shutdown and reinitialized - Work around problem with recent binutils in x86-64 SHA-1 - The Perl build script is no longer supported and refuses to run by default * 1.8.8, 2009-11-03 - Alter Skein-512 to match the tweaked 1.2 specification - Fix use of inline asm for access to x86 bswap function - Allow building the library without AES enabled - Add 'powerpc64' alias to ppc64 arch for Gentoo ebuild
2011-11-24Fix build with newer GCCjoerg3-1/+27
2011-11-24Fix missing includes exposed by newer GCCjoerg7-1/+77
2011-11-24Enable build with ruby19/193 with dependency to net/ruby-soap4r.taca1-2/+7
2011-11-24security/gsasl: Remove windows functionmarino3-2/+25
gss-extra.c fails compilation on DragonFly: line 43: error: unexpected identifier or '(' before '&' token It's on code that is only intended for a windows target. Gentoo patched it by wrapping it in "if (defined _WIN32 || defined __WIN32__)" macro which is effectively the same is deleting the definition completely, which is what is being done here.
2011-11-23Updating security/py-crypto to 2.4.1gls2-6/+6
upstream Changelog: 2.4.1 ===== * Fix "error: Setup script exited with error: src/config.h: No such file or directory" when installing via easy_install. (Sebastian Ramacher)