summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Collapse)AuthorFilesLines
2010-01-22Add a patch from OpenSSL's repositroy to deal with CVE-2009-4355.taca3-2/+48
Bump PKGREVISION.
2010-01-21Added LICENSE information.heinz1-2/+2
2010-01-20Update to 5.48:wiz2-7/+6
5.48 Mon Jan 4 16:32:52 MST 2010 - fixed "shasum -a0" option (ref. rt.cpan.org #53319) -- incorrectly accepted 0 as a valid algorithm -- thanks to Zefram for patch - updated URL for NIST test vectors -- ref. files t/nistbit.t, t/nistbyte.t -- thanks to Leon Brocard for patch
2010-01-20Update to 4.29:wiz2-7/+6
Version 4.29, 2009.12.02, urgency: MEDIUM: * New features sponsored by Searchtech Limited http://www.astraweb.com/ - sessiond, a high performance SSL session cache was built for stunnel. A new service-level "sessiond" option was added. sessiond is available for download on ftp://stunnel.mirt.net/stunnel/sessiond/ . stunnel clusters will be a lot faster, now! * Bugfixes - "execargs" defaults to the "exec" parameter (thx to Peter Pentchev). - Compilation fixes added for AIX and old versions of OpenSSL. - Missing "fips" option was added to the manual. Version 4.28, 2009.11.08, urgency: MEDIUM: * New features - Win32 DLLs for OpenSSL 0.9.8l. - Transparent proxy support on Linux kernels >=2.6.28. See the manual for details. - New socket options to control TCP keepalive on Linux: TCP_KEEPCNT, TCP_KEEPIDLE, TCP_KEEPINTVL. - SSL options updated for the recent version of OpenSSL library. * Bugfixes - A serious bug in asynchronous shutdown code fixed. - Data alignment updated in libwrap.c. - Polish manual encoding fixed. - Notes on compression implementation in OpenSSL added to the manual.
2010-01-20Update to 1.02:wiz2-7/+6
2010-01-10 Gisle Aas <gisle@ActiveState.com> Release 1.02 Give the distribution a META.yml file
2010-01-20Update to 2.4:wiz2-6/+6
* Noteworthy changes in release 2.4 (2010-01-18) [stable] - Doc fixes. - Updated gnulib files. - Clean up copyright notices.
2010-01-18Second try at jpeg-8 recursive PKGREVISION bump.wiz21-40/+42
2010-01-17Recursive PKGREVISION bump for jpeg update to 8.wiz83-143/+165
2010-01-16Updating security/p5-Crypt-Rijndael from 1.07nb1 to 1.08sno2-7/+8
pkgsrc changes: - Adjusting license definition Upstream changes: 1.08 - Wed Dec 9 18:20:22 2009 * Promoting development release to full release. * This release mainly clarifies the licensing. 1.07_02 - Tue Nov 4 02:21:27 2008 * RT #40511: Give a better warning when you try to use tainted data as an initialization vector. If anyone wants to use tainted data, they can patch the code to accept it. 1.07_01 - Tue Oct 14 08:59:58 2008 * Clarify that these files are under the Lesser GNU Public License (also known as the Library GNU Public License).
2010-01-16Set or updated LICENSEheinz6-10/+12
2010-01-16Remove workaround for compiler bug in gcc2 on sparc64.wiz1-4/+1
2010-01-16Fix build under Solaris.tron1-1/+7
2010-01-15Update pam_ssh_agent_auth from 0.9.1 to 0.9.2agc2-7/+7
Changes since previous version: + move from GPLv3 to modified-bsd license, with huge thanks to Jamie Beverly
2010-01-15update to 2.0.14drochner2-10/+6
changes: * The default for --include-cert is now to include all certificates in the chain except for the root certificate. * Numerical values may now be used as an alternative to the debug-level keywords. * The GPGSM --audit-log feature is now more complete. * GPG now supports DNS lookups for SRV, PKA and CERT on W32. * New GPGSM option --ignore-cert-extension. * New and changed passphrases are now created with an iteration count requiring about 100ms of CPU work.
2010-01-15don't depend on gnupg directly, gpgme/bl3 will do this for us, and itdrochner2-6/+6
will deal with gnupg1/gnupg2 correctly bump PKGREVISION
2010-01-15Update openssl package to 0.9.8l, fixing security problem.taca5-29/+28
Approved by agc@. Changes between 0.9.8k and 0.9.8l [5 Nov 2009] *) Disable renegotiation completely - this fixes a severe security problem (CVE-2009-3555) at the cost of breaking all renegotiation. Renegotiation can be re-enabled by setting SSL3_FLAGS_ALLOW_UNSAFE_LEGACY_RENEGOTIATION in s3->flags at run-time. This is really not recommended unless you know what you're doing. [Ben Laurie]
2010-01-09streamlined syntax, using ${SETENV} instead of env.schwarz1-2/+2
2010-01-04Expose the gpg binary gpgme is build against and use that in security/gpa.joerg2-2/+14
2010-01-03improved CC and CFLAGS supportschwarz4-13/+33
2010-01-02Needs pod2man.joerg1-2/+4
2009-12-28Moderate the wording slightly.he1-1/+1
OK'ed by agc@
2009-12-27polkit-explicit-grant-helper and polkit-grant-helper should alsoabs1-2/+6
be setgid polkit (apparently). Bump pkgrevision
2009-12-25Fixes and improvement for Interixobache4-10/+17
* Not only interix-3, but also treat all interix release, allow to build on SUA. * Gave up randomized image base, use 0x5e000000, as in mk/platform/Interix.mk. It is workaround of PR 42369. * Use -D_REENTRANT flags for threads. * replace -Wl,soname= linker flags with -Wl,h, for Interix
2009-12-21Not MAKE_JOBS_SAFE.joerg1-1/+2
2009-12-21Mark as broken: as conflicts with its own dependencyjoerg1-1/+3
2009-12-20Update security/sudo pacakge to 1.7.2p2.taca5-42/+35
Major changes between sudo 1.7.2p1 and 1.7.2p2: * Fixed a a bug where the negation operator in a Cmnd_List was not being honored. * Sudo no longer produces a parse error when #includedir references a directory that contains no valid filenames. * The sudo.man.pl and sudoers.man.pl files are now included in the distribution for people who wish to regenerate the man pages. * Fixed the emulation of krb5_get_init_creds_opt_alloc() for MIT kerberos. * When authenticating via PAM, set PAM_RUSER and PAM_RHOST early so they can be used during authentication.
2009-12-18put back the (non-default) "idea" option which got lost a while agodrochner7-7/+127
2009-12-18kill the "idea" option -- gnupg2 uses libgcrypt which used to havedrochner4-28/+22
an "idea" option, but that was removed more than a year ago when it got updated from 1.2 to 1.4 The patch was was used on gnupg2 in the "idea" case was just a four-line memory initialization fix, there is no point in LICENSE restrictions due to this, so I've pulled it in as regular patch so that it doesn't get lost for the case someone fixes idea support in libgcrypt (which isn't hard).
2009-12-18Remove removal of the hack which was needed for libtool 1.x.hasso2-21/+1
From Rumko <rumcic at gmail.com> via private mail.
2009-12-16don't install the gpg-zip.1 manpage, avoids CONFLICT with gnupg1,drochner4-5/+18
noticed by OBATA Akio per mail to pkgsrc-users. This makes most sense to me since gnupg2 doesn't install a gpg-zip intentionally. Since possible clients of gpg-zip should have a dependency on gnupg1, we can't take over easily. Once we are sure that gnupg2 can fully replace gnupg1, we might consider to install eg symlinks gpg->gpg2 etc and make gnupg1 obsolete, but this needs careful testing.
2009-12-16Add checksum for idea patch.wiz1-1/+4
2009-12-15Recursive bump for libltdljoerg25-48/+48
2009-12-15make s/mime support, which implies use of gnupg2, default,drochner1-2/+3
bump PKGREVISION
2009-12-15update to 2.0.13drochner7-39/+73
changes: many fixes and improvements reviewed by John R. Shannon pkgsrc notes: -since S/MIME support is the biggest difference in functionality over gnupg1, enable it per default -- my tests (with the s/mime plugin of claws-mail) worked -left the build against a private libassuan with GNU-pth support alone for now, just updated libassuan to 1.0.5. We might build pkgsrc/libassuan against pkgsrc/pth at some point, but this needs to be checked for side effects. (As this pkg doesn't export a library which might propagate the pth dependency, the possibility of pthread-pth conflicts should be limited. Other uses of libassuan need to be checked.)
2009-12-15update to 0.7.6drochner3-39/+6
changes: misc improvements reviewed by John R. Shannon
2009-12-15update to 1.0.3drochner6-32/+85
changes: * New option --url for the LOOKUP command and dirmngr-client. * The LOOKUP command does now also consults the local cache. New option --cache-only for it and --local for dirmngr-client. * Port to Windows completed. * Improved certificate chain construction. * Support loading of PEM encoded CRLs via HTTP. * Client based trust anchors are now supported. * Configured certificates with the suffix ".der" are now also used. * Libgcrypt 1.4 is now required. reviewed by John R. Shannon pkgsrc notes: I've left the build against a private libassuan with GNU-pth support alone for now, just updated libassuan to 1.0.5. We might build pkgsrc/libassuan against pkgsrc/pth at some point, but this needs to be checked for side effects. (As this pkg doesn't export a library which might propagate the pth dependency, the possibility of pthread-pth conflicts should be limited. Other uses of libassuan need to be checked.) Beiing here, support DESTDIR.
2009-12-15update to 1.0.7drochner2-6/+6
changes: -misc fixes and improvements -Support DSA -Support SHA-{384,512} based signature generation reviewed by John R. Shannon
2009-12-15minor fixes for gnupg2 support:drochner1-1/+3
-don't pull in gnupg2's "gpgconf" if both gnupg1 and gnupg2 are installed but we are building against gnupg1, this caused a build failure -fix a selftest to work with gnupg2
2009-12-15remove obsolete "hal" dependency, ride on recent updatedrochner1-9/+1
2009-12-15Update to 2.28.2:wiz3-7/+8
Changes in version 2.28.2 are: * Add license to reference documentation. * Sent output of g_printerr to syslog. * No error when can't unlock login keyring. * Fix assertion when comparing attributes. * Fix freeing of unallocated memory in test. * Don't barf on certificates with unsupported algorithm. * Fix some memory leaks.
2009-12-15Update to 0.61, set LICENSE to public-domain (see below).wiz2-8/+7
[Changes for 0.61] * Added "=encoding utf8" to POD to fix author name display. No functional changes. [Changes for 0.60] * LICENSING CHANGE: This compilation and all individual files in it are now under the nullary CC0 1.0 Universal terms: To the extent possible under law, 唐鳳 has waived all copyright and related or neighboring rights to Module-Signature. * Updated Module::Install to 0.91, prompted by Florian Ragwitz.
2009-12-15Update to 0.42, set LICENSE (still depend on gpg1 for now).wiz4-58/+8
0.42 Wed Sep 30 23:20:58 JST 2009 * Support for GPG2 0.41_01 Fri Sep 25 02:56:33 JST 2009 * Beginnings of support for GPG2 0.40_04 Tue Apr 21 19:50:12 JST 2009 * Use Any::Moose instead of Moose for Mouse celerity (Sartak) 0.40_1 Sat Nov 15 12:35:59 EST 2008 * [rt.cpan.org #40963] Replace Class::MethodMaker with Moose (Chris Prather)
2009-12-15Update to 1.4.5:wiz2-8/+7
Noteworthy changes in version 1.4.5 (2009-12-11) ------------------------------------------------ * Fixed minor memory leak in DSA key generation. * No more switching to FIPS mode if /proc/version is not readable. * Fixed a sigill during Padlock detection on old CPUs. * Fixed a hang on some W2000 machines. * Boosted SHA-512 performance by 30% on ia32 boxes and gcc 4.3; SHA-256 went up by 25%.
2009-12-15Update netpgp to version 20091210.agc2-6/+6
Apart from infrastructure changes, there are the following functional ones: + Update to version 1.99.14/20091210 + provide a new netpgp_match_list_keys(3) function to perform a regular-expression based search of all the keys in the keyring. If no pattern is specified to match, then all keys are returned. + provide a new netpgp_set_homedir(3) function, and use it to set the home directory from the library, rather than individually in all the programs which use the library + provide a new netpgp_incvar(3) function which will add a constant increment (which may be negative) to the value of an internal variable. This is primarily used for the verbosity level within the library, and is again a movement of the function into the library from the individual programs which use the library + move to the specification of an ssh key file by internal variable, rather than the directory holding an ssh key file + autoconf infrastructure changes + take a hammer to the _GNU_SOURCE definitions problems + don't rely on strnlen(3) being present everywhere + add rudimentary support for ssh keys + add a netpgp library function - netpgp_get_key(3) - to print a specific key + add functionality to call this function in netpgpkeys(1) + add test for netpgp_get_key + add a verbose switch to the tst script + add netpgp functions to expose the memory signing and verification functions - netpgp_sign_memory(3) and netpgp_verify_memory(3) + coalesced signing and verification ops file functions
2009-12-14Add and enable seccureagc1-1/+2
2009-12-14Initial import of seccure-0.4 into the Packages Collection.agc5-0/+84
The seccure toolset implements a selection of asymmetric algorithms based on elliptic curve cryptography (ECC). In particular it offers public key encryption / decryption, signature generation / verification and key establishment. ECC schemes offer a much better key size to security ratio than classical systems (RSA, DSA). Keys are short enough to make direct specification of keys on the command line possible (sometimes this is more convenient than the management of PGP-like key rings). seccure builds on this feature and therefore is the tool of choice whenever lightweight asymmetric cryptography -- independent of key servers, revocation certificates, the Web of Trust or even configuration files -- is required.
2009-12-13Remove unused file.wiz1-15/+0
2009-12-13Added support for DESTDIR.martti3-2/+30
2009-12-11Add and enable pam_ssh_agent_authagc1-1/+2
2009-12-11- LICENSE is gnu-gpl-v2heinz3-11/+29
- Added DESTDIR support. All permission settings were kept as before. - TEMPDIR is now changeable in the Makefile (see patch-ab).