summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Collapse)AuthorFilesLines
2004-11-20Bump PKGREVISION due to security fixes in libxml (dependency adjusted tojmmv1-2/+2
1.8.17nb3).
2004-11-19Honor PKG_SYSCONFDIR by looking for the LDAP configuration file injlam2-3/+4
${PKG_SYSCONFDIR}/ldap.conf (by default, /usr/pkg/etc/ldap.conf) instead of hard-coding /etc/ldap.conf. Bump the PKGREVISION.
2004-11-19Correctly detect the old DES API in the OpenSSL in NetBSD's basejlam4-8/+152
install. This prevents Heimdal from building and installing its own DES library and headers. Bump the PKGREVISION.
2004-11-19Update security/pam-ldap to version 176. pkgsrc-related changes in thisjlam5-44/+87
update include: * The configuration file (shared with nss_ldap.so and sudo) has been moved to ${PKG_SYSCONFDIR}/ldap.conf. Any secrets file is found in ${PKG_SYSCONFDIR}/ldap.secret. * Use the pkg.install framework to copy the config file from the example directory to the real location. * Use libtool to build and install the PAM module. Changes from version 150 include: * preliminary SASL bind support * include password policy schema file * preliminary support for draft-behera-ldap-password-policy-07.txt * support for service-based authorization (based on patch from Manon Goo) * add ignore_authinfo_unavail flag * pam_filter works again * fix from Thorsten Kukuk (SuSE) to handle scope-less nss_base_passwd configuration * AD password change fix * fix from Thorsten Kukuk (SuSE) to handle aborted password changes * support for multiple service search descriptors from Symas * support non-experimental password change exop * patch from Howard Chu to use linker grouping on Solaris
2004-11-19Cosmetic changes to align with Makefile.template.jlam1-6/+7
2004-11-19Fix brokenness I introduced in the conversion of security/PAM to usejlam11-29/+50
libtool: the PAM libraries weren't being built with -DPAM_DYNAMIC, which made it impossible to dlopen PAM modules. Bump PKGREVISION.
2004-11-18The universal option to enable PAM support is "PAM" not "pam". We strivejlam1-3/+3
to use common option names were possible, so change these instances of "pam" to "PAM" to match existing usage.
2004-11-18Remove fortify... it only worked on ancient versions of Netscape Navigator.jlam8-1114/+1
We're well past those days now.
2004-11-18Sort.wiz1-2/+2
2004-11-18PKGNAME should include the version number. Also remove the redundantminskim1-2/+2
"py" prefix from PKGNAME.
2004-11-17Remove obsolete variables. You'll want to use:xtraeme1-5/+1
PKG_OPTIONS.<pkg>+= foo blah
2004-11-17no need to duplicate HOMEPAGE in description; also don't mentionjdolecek1-3/+0
the author's e-mail address there, since we don't appear to do it for other packages neither
2004-11-16The distfiles changed but the version numbers in the filenames did not.ben2-9/+9
The only change is an update of the virus definition files. Change the DIST_SUBDIR and update distinfo to deal with this.
2004-11-16Libtoolize security/PAM so that the appropriate options are passed tojlam16-168/+929
the compiler to build shared modules, and so that it builds correctly across different platforms. Bump the PKGREVISION. In particular, this should fix problems building this package on NetBSD/amd64.
2004-11-16With the updated gnustep-base dependency, CONFLICTS is superfluous.rh1-4/+1
Pointed out in private mail by wiz@ -- thanks!
2004-11-16Update gnustep-ssl to 1.10.1 to sync with gnustep-base (no other changes).rh2-8/+8
Add CONFLICTS with broken gnustep-base-1.10.1. This closes PR pkg/28112 by Francois Briere, thanks!
2004-11-15Update security/cyrus-sasl2 and associated plugins to 2.1.20. Changesjlam20-209/+133
from version 2.1.19 include: * Fixes to cram plugin to avoid attempting to canonify uninitialized data (This removes the need for patch-af). * NTLM portability fixes. * Avoid potential attack using SASL_PATH when sasl is used in a setuid environment. * A trivial number of small bugfixes.
2004-11-15Rework the Berkeley DB detection in buildlink3:jlam1-5/+2
* Add a db1.builtin.mk file that detects whether DB-1.85 functionality exists in the base system, and remove the distinction between "native" and the other Berkeley DB packages -- we now refer to db[1234]. This paves the way for any future databases/db1 package. * USE_DB185 shouldn't need to be set by any packages -- its correct value is now automatically determined by bdb.buildlink3.mk depending on whether we explicitly request db1 or not. By default, if you include bdb.buildlink3.mk, you want DB-1.85 functionality and USE_DB185 defaults to "yes", but if you explicitly remove db1 from the list of acceptable DBs, then USE_DB185 defaults to "no". * Set BDB_LIBS to the library options needed to link against the DB library when bdb.buildlink3.mk is included. * We only add the DB library to the linker command automatically if we want DB-1.85 functionality; otherwise assume that the package configure process can figure out how to probe for the correct headers and libraries. Edit package Makefiles to nuke redundant settings of USE_DB185.
2004-11-15Add a new variable BROKEN_READLINE_DETECTION which should be set tojlam1-10/+4
yes/no by a package Makefile, depending on whether the configure process properly detects the additional libraries needed to link against -lreadline (typically, you need either "-lreadline -ltermcap", or "-lreadline -lcurses" to properly link against -lreadline). If this variable is set to "yes", then we automatically expand "-lreadline" into "-lreadline -l<termcap functions library>". BROKEN_READLINE_DETECTION defaults to "no". Set BROKEN_READLINE_DETECTION to "yes" in security/heimdal and remove the custom logic that did the same work.
2004-11-15Solaris does need librfuncs for getenv_r() or someone needs to teach themarkd2-7/+3
configure script that have_thread_safe_getenv=yes in that case.
2004-11-14As it was, libtool failed to link to libgcrypt on NetBSD 1.6.x becauseben1-1/+2
buildlink did not bring in PTH. For example, this made opencdk fail to build. Fix this by adding mk/pthread.buildlink3.mk to security/gcrypt/buildlink3.mk
2004-11-13Explicitly disable gpgsm support. Otherwise, if gpgsm is installed, thejmmv1-1/+3
build of this package fails.
2004-11-12Adjust the warning flags so that this pkg builds when using thekristerw1-1/+4
security/openssl package.
2004-11-12Update to version 1.6.8pl2. Fixes a security flaw for the sad people usingcube4-9/+11
bash-as-sh (and people allowing bash scripts to be run through sudo). The user could override commands by functions of her own. ChangeLog: 549) Bash exported functions and the CDPATH variable are now stripped from the environment passed to the program to be executed.
2004-11-12Addhe1-1/+2
net/p5-Net-XWhois security/p5-Crypt-RandPasswd to their respective parent Makefiles.
2004-11-12Import p5-Crypt-RandPasswd version 0.02.he4-0/+25
This is an implementation of the Automated Password Generator standard, defined in FIPS Publication 181, "Standard for Automated Password Generator": http://www.itl.nist.gov/fipspubs/fip181.htm
2004-11-12Add new package py-crackdarcy1-1/+2
2004-11-12Initial import of pycrack 0.01darcy5-0/+55
Python interface to cracklib
2004-11-11Add & enable p5-Module-Signature.seb1-1/+2
2004-11-11Initial addition of p5-Module-Signature version 0.41 in the NetBSD Packagesseb5-0/+70
Collection. The Perl 5 module Module::Signature adds cryptographic authentications to CPAN distributions, via the special SIGNATURE file. If you are a module user, all you have to do is to remember running cpansign -v (or just cpansign) before issuing perl Makefile.PL or perl Build.PL; that will ensure the distribution has not been tampered with. For module authors, you'd want to add the SIGNATURE file to your MANIFEST, then type cpansign -s before making a distribution. You may also want to consider adding a signature check as part of your test suite.
2004-11-11Add & enable p5-Digest-SHA.seb1-1/+2
2004-11-11Initial addition of p5-Digest-SHA version 5.27 in the NetBSD Packagesseb4-0/+28
Collection. The Perl 5 module Digest::SHA is a complete implementation of the NIST Secure Hash Standard. It gives Perl programmers a convenient way to calculate SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512 message digests. The module can handle all types of input, including partial-byte data.
2004-11-11add additional libraries required by libradius.grant1-1/+2
2004-11-11include libradius/buildlink3.mk only if we're including radiusgrant1-2/+2
support.
2004-11-11include some additional header files on FreeBSD >= 5.grant2-1/+23
2004-11-11allow radius support to be disabled by moving it to PKG_OPTIONS.grant1-2/+12
no PKGREVISION bump as it is still enabled by default.
2004-11-11Remove lex and yacc generated files before building: they might notmanu1-1/+5
match with the libraries installed on the system.
2004-11-10Add patches checksummanu1-1/+3
2004-11-10Fix minor LP64 problemsmanu2-0/+39
2004-11-10Disable nat-t by default as the kernel does not have support for itmanu1-3/+5
without an unofficial patch yet.
2004-11-10This package needs openssl bl3.mk... and it needs NAT-T kernel optionxtraeme1-1/+2
to build...
2004-11-10No need to set BUILDLINK_DEPMETHOD.libradius-linux?= build here...xtraeme1-3/+1
2004-11-10* Fix HOMEPAGE.xtraeme1-7/+5
* No need to use LIBTOOL_OVERRIDE. * Remove unneeded ${EXAMPLESDIR} (??!!) after bl3.mk includes * Remove unneeded BUILD_DEPEND, because this pkg uses bl3 Still libradius is broken...
2004-11-10+ ipsec-tools (hi manu!)xtraeme1-1/+2
2004-11-09racoon speaks IKE (ISAKMP/Oakley) key management protocol, tomanu4-0/+82
establish IPsec security association with other hosts. This is based on KAME racoon, with some enhancements such as NAT-Traversal (needs a kernel patch), hybrid authentication, ISAKMP mode config, RADIUS support, IKE fragmentation and others. Ipsec-tools' racoon is able to act as a VPN server for the Cisco VPN client using hybrid authentication.
2004-11-09Fix location of heimdal mirror at ftp.sunet.se.jlam1-2/+2
2004-11-08The correct name of this program is "GNU Privacy Guard" (not "Privacy Guard").tv1-2/+2
2004-11-08Update to 1.0.22:jmmv3-7/+11
Version 1.0.22 (28/10/2004) - Print DN of certificates with unknown characters in them, but in hexform only. - Corrected bug in _gnutls_x509_get_dn_oid(), and returns the actual OID. - Added second precision to the X.509 parsing functions. - Add parameter --la-file to libgnutls-config and libgnutls-extra-config, tiny patch contributed by Joe Orton <joe@manyfish.co.uk>. - Add pkg-config meta files, suggested by Stéphane LOEUILLET <stephane.loeuillet@tiscali.fr>. - Fix memory initializaion bug in gnutls_certificate_set_x509_trust, tiny patch by Aleix Conchillo Flaque <aleix@member.fsf.org>. - Fix certtool --password for PKCS #12, back ported from 1.1.x branch. - Fix library order in libgnutls*-config --libs output, to permit static linking, reported by Yoann Vandoorselaere <yoann@prelude-ids.org>. Version 1.0.21 (07/10/2004) - Fix memory leak in gnutls_certificate_verify_peers and gnutls_certificate_free_credentials, report and patch by Simon Posnjak <simon.posnjak@cetrtapot.si>. - Fix crash in `certtool --to-p12 --load-privkey foo', i.e. exporting a key and no certificate to PKCS#12. - Fix objdir != srcdir builds, reported by "Gerrit P. Haase" <gp@familiehaase.de>. - Avoid redefining getpass if system already has it, reported by Yoann Vandoorselaere <yoann@prelude-ids.org>. - Add new example "ex-rfc2818" for certificate verification, from Nikos. - Known bug: the library require snprintf.
2004-11-07Update to 0.7.5. While here, apply a patch from shannonjr@ that avoids thejmmv4-22/+45
use of a deprecated gpgme function. Changes in this version: * Loading large key rings is now many orders of magnitude faster * A simple panel with common tasks shows up in the key manager the first time a new user starts [Adam Schreiber] * Gnome HIG (Human Interface Guidelines) compliancy fixes * gedit plugin compiles with GNOME 2.8 * gedit plugin now works on BSD [Julio M. Merino Vidal] * seahorse-agent now works properly on BSD [Julio M. Merino Vidal] * disable password caching prefs when using a different agent * seahorse-agent restores gpg.conf when exiting * seahorse-agent icon now shows properly in the notification area * Properly detect mlock for secure memory usage. * Fixed crash when changing expiry date on a subkey * Fixed crash when using 'Encrypt To Self' without a default key * Default key selection now works properly in edge cases. * Updated RPM spec file * A multitude of smaller bug fixes
2004-11-07Ew... also let this work if getenv_r returns no errors...jmmv2-4/+4