Age | Commit message (Collapse) | Author | Files | Lines |
|
|
|
|
|
least particually.
|
|
|
|
|
|
Security problem is reported on bugtraq.
http://www.securityfocus.com/archive/1/320444/2003-05-02/2003-05-08/0
2003-05-01 Werner Koch <wk@gnupg.org>
Released 1.2.2.
2003-04-30 David Shaw <dshaw@jabberwocky.com>
* NEWS: Note trust bug fix.
2003-04-29 David Shaw <dshaw@jabberwocky.com>
* NEWS: Add note about TIGER being dropped from OpenPGP.
* README: Add note about the HP/UX inline problem. Fix all URLs
to point to the right place in the reorganized gnupg.org web
pages. Some minor language fixes.
2003-04-27 David Shaw <dshaw@jabberwocky.com>
* NEWS: Add sig version, pk algo, hash algo, and sig class to
VALIDSIG.
* BUGS: Fix bug reporting URL.
2003-04-24 Werner Koch <wk@gnupg.org>
* configure.ac (ALL_LINGUAS): Added Hungarian translation by Nagy
Ferenc László.
2003-04-23 David Shaw <dshaw@jabberwocky.com>
* configure.ac: "TIGER" -> "TIGER/192".
* README: Put back proper copyright line.
2003-04-16 Werner Koch <wk@gnupg.org>
Released 1.2.2rc2.
2003-04-15 Werner Koch <wk@gnupg.org>
* configure.ac (ALL_LINGUAS): Add Slovak translation.
* configure.ac (HAVE_DOSISH_SYSTEM): New automake conditional.
* acinclude.m4 (GNUPG_CHECK_ENDIAN): Fixed quoting of r.e. using
quadrigraphs.
2003-04-08 David Shaw <dshaw@jabberwocky.com>
* configure.ac: Big warning that TIGER is being removed from the
standard.
2003-04-08 Werner Koch <wk@gnupg.org>
* Makefile.am (EXTRA_DIST): Add autogen.sh wrapper which is
useful for some cross-compiling targets.
2003-04-07 David Shaw <dshaw@jabberwocky.com>
* acinclude.m4: Fix URL to faqprog.pl.
* README: Add --enable-sha512 switch and update version number and
copyright date.
* NEWS: Add note about SHA-256/384/512.
2003-03-24 Werner Koch <wk@gnupg.org>
* configure.ac: Test for ranlib and ar.
2003-03-12 Werner Koch <wk@gnupg.org>
* acinclude.m4 (GNUPG_CHECK_ENDIAN): When crosscompiling assume
little only for Intel CPUs.
2003-02-19 David Shaw <dshaw@jabberwocky.com>
* configure.ac: Define @CAPLIBS@ to link in -lcap if we are using
capabilities.
2003-02-11 David Shaw <dshaw@jabberwocky.com>
* configure.ac: Add --enable-sha512 switch to add SHA384/512
support.
2003-02-06 David Shaw <dshaw@jabberwocky.com>
* configure.ac: Do not set GNUPG_LIBEXECDIR in ./configure, so
that makefiles can override it.
2003-02-02 David Shaw <dshaw@jabberwocky.com>
* configure.ac (ALL_LINGUAS): Needs to be on one line to avoid
problems during ./configure.
* NEWS: Note new --with-colons disabled key flag and new "revuid"
command.
2003-01-07 Werner Koch <wk@gnupg.org>
Released 1.2.2rc1.
* configure.ac (ALL_LINGUAS): Added fi and zh_TW.
2003-01-06 David Shaw <dshaw@jabberwocky.com>
* NEWS: Add notes about disabled keys and trustdb tweaks.
2002-12-04 David Shaw <dshaw@jabberwocky.com>
* NEWS: Add note about convert-from-106 script.
2002-11-25 David Shaw <dshaw@jabberwocky.com>
* NEWS: Add notes about notation names and '@', the "--trust-model
always" option, and non-optimized memory wiping.
2002-11-09 Werner Koch <wk@gnupg.org>
* configure.ac: Check for ctermid().
2002-10-31 David Shaw <dshaw@jabberwocky.com>
* Makefile.am: Put gnupg.spec in the root directory so rpm -ta
works.
* configure.ac: Add a check for volatile.
|
|
PKG_SYSCONFDIR. This is already done by bsd.pkg.install.mk in a better way.
|
|
|
|
|
|
dependency bumps.
|
|
|
|
|
|
|
|
|
|
Use OWN_DIRS to handle directories under /var.
Move the logcheck.sh script to where it belongs, the bin directory.
Use buildlink2.
Bump PKGREVISION to 1.
|
|
to "0.1" hence. This fixes PR pkg/21295 by Todd Vierling.
|
|
|
|
store the vulnerabilities file. This variable was already recognized by
audit-packages but not by bsd.pkg.mk which hardcoded DISTDIR.
|
|
|
|
|
|
508) Fixed remaining Kerberos V issues with MIT Kerberos V and old Heimdal.
|
|
|
|
amavis-perl. Fixed milter support for amavis-perl.
NB: the package was named amavis-perl-200xxxxx, now the version is 0.1,
which is lexicographically lower. I wrote v0.1 instead of 0.1 in order
to make 0.1 newer than 200xxxxx
|
|
# This hack goes away, once we formally de-support NetBSD-1.4.x.
We did that half a year ago.
|
|
Suggested by Robert Elz in PR#18825. Changelog unavailable.
|
|
tar. Do not pass P to tar when testing for removal of leading /'s.
This is a fix for PR#20928.
XXX On Solaris this package will be broken. It probably needs to
XXX depend on gtar in this case.
|
|
|
|
(suggested by lukem), group z, r and f flags.
some whitespace cleanup.
|
|
relevant changes are > 500 lines, see
ftp://ftp.ca.openbsd.org/pub/OpenBSD/OpenSSH/portable/ChangeLog
Personal selection:
rekeying bugfixes and automatic rekeying
bandwidth limitation (scp -l)
Add a -t life option to ssh-agent that set the default lifetime.
The default can still be overriden by using -t in ssh-add.
sftp progress meter support.
allow usernames with embedded '@', e.g. scp user@vhost@realhost:file /tmp;
[scp.c]
1) include stalling time in total time
2) truncate filenames to 45 instead of 20 characters
3) print rate instead of progress bar, no more stars
4) scale output to tty width
|
|
- group 'zrw' and 'p' args, -s last
- use the && operator consistently
- strip unneeded parens
- some whitespace cleanup
|
|
Changes since 1.6.7p2:
* Kerberos V support should work on latest MIT Kerberos V and Heimdal.
|
|
Changes since Sudo 1.6.7p1:
o Fixed an unterminated comment that broke Kerberos V authentication.
o The krb5-config script is now used to determine Kerberos V
CPPFLAGS and LDFLAGS/LIBS if it exists.
o Backed out changes to mkinstalldirs from autoconf 2.57 that
caused problems on Tru64 Unix.
|
|
|
|
478) Wildcards now work correctly in the env_keep Defaults directive.
479) Added support for non-root timestamp dirs. This allows the timestamp
dir to be shared via NFS (though this is not recommended).
480) Removed double printing of bad environment variable table in -V mode.
481) configure script has been regenerated with autoconf 2.5.7.
This required some changes to configure.in.
482) Fixed a compilation problem on SunOS; thanks to Alek O. Komarnitsky.
483) SecurID 5.0 API support from Michael Stroucken.
484) Restore state of signal handlers to what we had upon startup.
Fixes a problem when using sudo with nohup; thanks to Paul Markham.
485) Revamp set_perms() to use setresuid() or setreuid() when available
in preference to POSIX stuff since they allow us to properly
implement "stay_setuid" whereas POSIX does not really.
486) In strict mode sudo did not throw an error for undefined User_Aliases.
487) Fixed a Makefile bug on IRIX.
488) Write the prompt *after* turning off echo to avoid some password
characters being echoed on heavily-loaded machines with fast typists.
489) Added %U and %H escapes in the prompt and fixed treatment of %%.
490) Visudo will now add a final newline to sudoers if the user's editor
not add one before EOF.
491) The lexer state is now reset to its initial value on EOF.
Previously, the state was not reset between parser invocations
which could cause problems for visudo in rare cases.
492) Added support for Defaults that apply based on the RunasUser.
493) Sudo now includes copies of strlc{at,py} and uses them throughout.
494) Sudo is now careful to avoid interger overflow when allocating
memory. This is one of those "should not happen" situations.
495) Added a configure option (--with-stow) to make sudo compatible
with GNU stow.
496) auth/kerb5.c now compiles under Heimdal.
497) The volatile prefix is used in the hopes of preventing compilers
from optimizing away memory zeroing. Unfortunately, this results
in some warnings from gcc.
498) Better Kerberos IV/V support in the configure script.
499) Fixed a logic thinko in the SIGCHLD handler that caused problems
with rlogin on HP-UX.
500) configure now adds -R to LDFLAGS when it adds -L for Solaris and
SVR4. There is a configure option, --with-rpath, to control this.
501) On AIX, configure will pass extra directory paths to the linker
via the -blibpath ld option. This is only active when additional
library paths are used. It may be disabled via the
--without-blibpath configure option.
502) The --with-skey and --with-opie configure options now take
an optional directory argument that should have an include and
lib dir for the skey/opie include file and library respectively.
503) Fixed false positives in the overflow detection of expand_prompt().
|
|
|
|
|
|
|
|
rather
make all packages that use linux emulation include bsd.pkg.mk as the
last files just like any normal package.
|
|
|
|
|
|
sfssd: support "reload"
sfssd: call sfskey gen with "-K -l sfs_host_key" to prevent interactive Q's
bump PKGREVISION (to 2)
|
|
|
|
use /var/sfs instead of /usr/pkg/var/sfs
use OWN_DIRS_PERMS
bump PKGREVISION
|
|
|
|
|
|
reference to them in the distribution, either):
bin/fake-agent
bin/rpc_pcl
bin/rpc_psrv
bin/smkdirall
bin/smount
bin/snfsfstab
bin/snfshost
bin/snfsmount
bin/snfspsrv
bin/snfsumount
bin/snfsuser
bin/sumount
bin/sumountall
etc/rpc_pcl.conf
lib/perl5/site_perl/5.6.1/SNFS.pm
lib/perl5/site_perl/5.6.1/auto/SNFS/autosplit.ix
|
|
Sort the Makefile a bit. Install a default configuration file in place.
Bump PKGREVISION to 1.
|
|
Researchers have discovered a timing attack on RSA keys, to which
OpenSSL is generally vulnerable, unless RSA blinding has been turned
on.
Typically, it will not have been, because it is not easily possible to
do so when using OpenSSL to provide SSL or TLS.
The enclosed patch switches blinding on by default. Applications that
wish to can remove the blinding with RSA_blinding_off(), but this is
not generally advised. It is also possible to disable it completely by
defining OPENSSL_NO_FORCE_RSA_BLINDING at compile-time.
The performance impact of blinding appears to be small (a few
percent).
This problem affects many applications using OpenSSL, in particular,
almost all SSL-enabled Apaches. You should rebuild and reinstall
OpenSSL, and all affected applications.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0147 to this issue.
* Add patch from http://www.openssl.org/news/secadv_20030319.txt:
Czech cryptologists Vlastimil Klima, Ondrej Pokorny, and Tomas Rosa
have come up with an extension of the "Bleichenbacher attack" on RSA
with PKCS #1 v1.5 padding as used in SSL 3.0 and TLS 1.0. Their
attack requires the attacker to open millions of SSL/TLS connections
to the server under attack; the server's behaviour when faced with
specially made-up RSA ciphertexts can reveal information that in
effect allows the attacker to perform a single RSA private key
operation on a ciphertext of its choice using the server's RSA key.
Note that the server's RSA key is not compromised in this attack.
* Bump PKGREVISION.
|
|
|
|
This is the Cyrus SASL plugin that implements the NTLM (MS Windows NT)
authentication mechanism.
|