summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Collapse)AuthorFilesLines
2010-01-27Supports DESTDIR.joerg1-1/+3
2010-01-27DESTDIR supportjoerg8-68/+80
2010-01-27DESTDIR support from Steven Drake.joerg1-3/+5
2010-01-27DESTDIR supportjoerg14-61/+88
2010-01-27DESTDIR supportjoerg1-11/+10
2010-01-27DESTDIR support. Fix comment.joerg1-3/+5
2010-01-27DESTDIR supportjoerg1-2/+4
2010-01-27Added security/p5-Authen-Htpasswd version 0.16.1sno1-1/+2
2010-01-27Importing security/p5-Authen-Htpasswd version 0.16.1 as dependency ofsno3-0/+34
scheduled import of www/p5-Catalyst-Authentication-Store-Htpasswd, which is recommended by the update of editors/p5-Padre-Plugin-Catalyst. This module provides a convenient, object-oriented interface to Apache-style .htpasswd files. It supports passwords encrypted via MD5, SHA1, and crypt, as well as plain (cleartext) passwords. Additional fields after username and password, if present, are accessible via the extra_info array.
2010-01-24Added LICENSE information.heinz1-1/+2
2010-01-24More PKGREVISION bumps of jpeg dependencies.wiz2-4/+4
Identified by parsing the NetBSD-i386-5.0.1/2009Q3 pkg_summary files and Robert Elz.
2010-01-23Also works with Python 2.6.joerg1-2/+2
2010-01-22Add a patch from OpenSSL's repositroy to deal with CVE-2009-4355.taca3-2/+48
Bump PKGREVISION.
2010-01-21Added LICENSE information.heinz1-2/+2
2010-01-20Update to 5.48:wiz2-7/+6
5.48 Mon Jan 4 16:32:52 MST 2010 - fixed "shasum -a0" option (ref. rt.cpan.org #53319) -- incorrectly accepted 0 as a valid algorithm -- thanks to Zefram for patch - updated URL for NIST test vectors -- ref. files t/nistbit.t, t/nistbyte.t -- thanks to Leon Brocard for patch
2010-01-20Update to 4.29:wiz2-7/+6
Version 4.29, 2009.12.02, urgency: MEDIUM: * New features sponsored by Searchtech Limited http://www.astraweb.com/ - sessiond, a high performance SSL session cache was built for stunnel. A new service-level "sessiond" option was added. sessiond is available for download on ftp://stunnel.mirt.net/stunnel/sessiond/ . stunnel clusters will be a lot faster, now! * Bugfixes - "execargs" defaults to the "exec" parameter (thx to Peter Pentchev). - Compilation fixes added for AIX and old versions of OpenSSL. - Missing "fips" option was added to the manual. Version 4.28, 2009.11.08, urgency: MEDIUM: * New features - Win32 DLLs for OpenSSL 0.9.8l. - Transparent proxy support on Linux kernels >=2.6.28. See the manual for details. - New socket options to control TCP keepalive on Linux: TCP_KEEPCNT, TCP_KEEPIDLE, TCP_KEEPINTVL. - SSL options updated for the recent version of OpenSSL library. * Bugfixes - A serious bug in asynchronous shutdown code fixed. - Data alignment updated in libwrap.c. - Polish manual encoding fixed. - Notes on compression implementation in OpenSSL added to the manual.
2010-01-20Update to 1.02:wiz2-7/+6
2010-01-10 Gisle Aas <gisle@ActiveState.com> Release 1.02 Give the distribution a META.yml file
2010-01-20Update to 2.4:wiz2-6/+6
* Noteworthy changes in release 2.4 (2010-01-18) [stable] - Doc fixes. - Updated gnulib files. - Clean up copyright notices.
2010-01-18Second try at jpeg-8 recursive PKGREVISION bump.wiz21-40/+42
2010-01-17Recursive PKGREVISION bump for jpeg update to 8.wiz83-143/+165
2010-01-16Updating security/p5-Crypt-Rijndael from 1.07nb1 to 1.08sno2-7/+8
pkgsrc changes: - Adjusting license definition Upstream changes: 1.08 - Wed Dec 9 18:20:22 2009 * Promoting development release to full release. * This release mainly clarifies the licensing. 1.07_02 - Tue Nov 4 02:21:27 2008 * RT #40511: Give a better warning when you try to use tainted data as an initialization vector. If anyone wants to use tainted data, they can patch the code to accept it. 1.07_01 - Tue Oct 14 08:59:58 2008 * Clarify that these files are under the Lesser GNU Public License (also known as the Library GNU Public License).
2010-01-16Set or updated LICENSEheinz6-10/+12
2010-01-16Remove workaround for compiler bug in gcc2 on sparc64.wiz1-4/+1
2010-01-16Fix build under Solaris.tron1-1/+7
2010-01-15Update pam_ssh_agent_auth from 0.9.1 to 0.9.2agc2-7/+7
Changes since previous version: + move from GPLv3 to modified-bsd license, with huge thanks to Jamie Beverly
2010-01-15update to 2.0.14drochner2-10/+6
changes: * The default for --include-cert is now to include all certificates in the chain except for the root certificate. * Numerical values may now be used as an alternative to the debug-level keywords. * The GPGSM --audit-log feature is now more complete. * GPG now supports DNS lookups for SRV, PKA and CERT on W32. * New GPGSM option --ignore-cert-extension. * New and changed passphrases are now created with an iteration count requiring about 100ms of CPU work.
2010-01-15don't depend on gnupg directly, gpgme/bl3 will do this for us, and itdrochner2-6/+6
will deal with gnupg1/gnupg2 correctly bump PKGREVISION
2010-01-15Update openssl package to 0.9.8l, fixing security problem.taca5-29/+28
Approved by agc@. Changes between 0.9.8k and 0.9.8l [5 Nov 2009] *) Disable renegotiation completely - this fixes a severe security problem (CVE-2009-3555) at the cost of breaking all renegotiation. Renegotiation can be re-enabled by setting SSL3_FLAGS_ALLOW_UNSAFE_LEGACY_RENEGOTIATION in s3->flags at run-time. This is really not recommended unless you know what you're doing. [Ben Laurie]
2010-01-09streamlined syntax, using ${SETENV} instead of env.schwarz1-2/+2
2010-01-04Expose the gpg binary gpgme is build against and use that in security/gpa.joerg2-2/+14
2010-01-03improved CC and CFLAGS supportschwarz4-13/+33
2010-01-02Needs pod2man.joerg1-2/+4
2009-12-28Moderate the wording slightly.he1-1/+1
OK'ed by agc@
2009-12-27polkit-explicit-grant-helper and polkit-grant-helper should alsoabs1-2/+6
be setgid polkit (apparently). Bump pkgrevision
2009-12-25Fixes and improvement for Interixobache4-10/+17
* Not only interix-3, but also treat all interix release, allow to build on SUA. * Gave up randomized image base, use 0x5e000000, as in mk/platform/Interix.mk. It is workaround of PR 42369. * Use -D_REENTRANT flags for threads. * replace -Wl,soname= linker flags with -Wl,h, for Interix
2009-12-21Not MAKE_JOBS_SAFE.joerg1-1/+2
2009-12-21Mark as broken: as conflicts with its own dependencyjoerg1-1/+3
2009-12-20Update security/sudo pacakge to 1.7.2p2.taca5-42/+35
Major changes between sudo 1.7.2p1 and 1.7.2p2: * Fixed a a bug where the negation operator in a Cmnd_List was not being honored. * Sudo no longer produces a parse error when #includedir references a directory that contains no valid filenames. * The sudo.man.pl and sudoers.man.pl files are now included in the distribution for people who wish to regenerate the man pages. * Fixed the emulation of krb5_get_init_creds_opt_alloc() for MIT kerberos. * When authenticating via PAM, set PAM_RUSER and PAM_RHOST early so they can be used during authentication.
2009-12-18put back the (non-default) "idea" option which got lost a while agodrochner7-7/+127
2009-12-18kill the "idea" option -- gnupg2 uses libgcrypt which used to havedrochner4-28/+22
an "idea" option, but that was removed more than a year ago when it got updated from 1.2 to 1.4 The patch was was used on gnupg2 in the "idea" case was just a four-line memory initialization fix, there is no point in LICENSE restrictions due to this, so I've pulled it in as regular patch so that it doesn't get lost for the case someone fixes idea support in libgcrypt (which isn't hard).
2009-12-18Remove removal of the hack which was needed for libtool 1.x.hasso2-21/+1
From Rumko <rumcic at gmail.com> via private mail.
2009-12-16don't install the gpg-zip.1 manpage, avoids CONFLICT with gnupg1,drochner4-5/+18
noticed by OBATA Akio per mail to pkgsrc-users. This makes most sense to me since gnupg2 doesn't install a gpg-zip intentionally. Since possible clients of gpg-zip should have a dependency on gnupg1, we can't take over easily. Once we are sure that gnupg2 can fully replace gnupg1, we might consider to install eg symlinks gpg->gpg2 etc and make gnupg1 obsolete, but this needs careful testing.
2009-12-16Add checksum for idea patch.wiz1-1/+4
2009-12-15Recursive bump for libltdljoerg25-48/+48
2009-12-15make s/mime support, which implies use of gnupg2, default,drochner1-2/+3
bump PKGREVISION
2009-12-15update to 2.0.13drochner7-39/+73
changes: many fixes and improvements reviewed by John R. Shannon pkgsrc notes: -since S/MIME support is the biggest difference in functionality over gnupg1, enable it per default -- my tests (with the s/mime plugin of claws-mail) worked -left the build against a private libassuan with GNU-pth support alone for now, just updated libassuan to 1.0.5. We might build pkgsrc/libassuan against pkgsrc/pth at some point, but this needs to be checked for side effects. (As this pkg doesn't export a library which might propagate the pth dependency, the possibility of pthread-pth conflicts should be limited. Other uses of libassuan need to be checked.)
2009-12-15update to 0.7.6drochner3-39/+6
changes: misc improvements reviewed by John R. Shannon
2009-12-15update to 1.0.3drochner6-32/+85
changes: * New option --url for the LOOKUP command and dirmngr-client. * The LOOKUP command does now also consults the local cache. New option --cache-only for it and --local for dirmngr-client. * Port to Windows completed. * Improved certificate chain construction. * Support loading of PEM encoded CRLs via HTTP. * Client based trust anchors are now supported. * Configured certificates with the suffix ".der" are now also used. * Libgcrypt 1.4 is now required. reviewed by John R. Shannon pkgsrc notes: I've left the build against a private libassuan with GNU-pth support alone for now, just updated libassuan to 1.0.5. We might build pkgsrc/libassuan against pkgsrc/pth at some point, but this needs to be checked for side effects. (As this pkg doesn't export a library which might propagate the pth dependency, the possibility of pthread-pth conflicts should be limited. Other uses of libassuan need to be checked.) Beiing here, support DESTDIR.
2009-12-15update to 1.0.7drochner2-6/+6
changes: -misc fixes and improvements -Support DSA -Support SHA-{384,512} based signature generation reviewed by John R. Shannon
2009-12-15minor fixes for gnupg2 support:drochner1-1/+3
-don't pull in gnupg2's "gpgconf" if both gnupg1 and gnupg2 are installed but we are building against gnupg1, this caused a build failure -fix a selftest to work with gnupg2