summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Collapse)AuthorFilesLines
2007-05-25Pass PAM location to configure script.obache1-1/+2
Pointed out in PR 36386 by Ondrej Tuma.
2007-05-18Update to 1.3.6adrianp3-9/+10
Lots of updates but some highlights in brief: - Added base64 encoding support for ICMP payload additional table in base_qr y_alert.php -- Juergen Leising - Changed input type of the password field to actually be password in setup3 .php -- Nikns - Fixed Time error in searches -- Jeff Kell - Added FQDN to display -- Jonathan W Miner - Fixed issues with graphing -- Kevin J - Updated tons of HTML for complience -- Marek Cruz
2007-05-18Add PKG_APACHE_ACCEPTED=apache13 apache2 as this package is notadrianp1-2/+7
supported with apache 2.2.x
2007-05-18Remove myself as maintainer, I don't have the time anymore to keep thesepeter2-4/+4
packages up to date.
2007-05-1811 Apr 2007 - 2.1.1adrianp3-16/+11
------------------- * Add the PCRE_DOLLAR_ENDONLY option when compiling regular expression for the @rx operator and variables. * Really set PCRE_DOTALL option when compiling the regular expression for the @rx operator as the docs state. * Fixed potential memory corruption when expanding macros. * Fixed error when a collection was retrieved from storage in the same second as creation by setting the rate to zero. * Fixed ASCIIZ (NUL) parsing for application/x-www-form-urlencoded forms. * Fixed the faulty REQUEST_FILENAME variable, which used to change the internal Apache structures by mistake. * Updates to quiet some compiler warnings. * Fixed some casting issues for compiling on NetWare (patch from Guenter Knauf)
2007-05-17Updated to version 0.14.heinz2-10/+12
Pkgsrc changes: - Added support for installation to DESTDIR. - p5-Digest-SHA is a new requirement. Changes since version 0.12: =========================== 0.14 February 14, 2005 FIX: The introducion of the keytag warning triggered a bug with RSAMD5 keys, causing RSAMD5 keys not to be loaded. 0.13 December 9, 2005 FEAT: rt.cpan.org 14588 Added support for passing (a reference to) an array of keys to the RRSIG verify function. FIX/FEAT: The Net::DNS::SEC::Private function will for RSA based keys verify if the keytag in the filename is actually correct. Since at parsing the value of the DNSKEY RR flags is not known we test against the currently defined flag values 256 and 257. If we cannot find a keytag match a warning is printed and Private key generation fails This inconsistency was spotted by Jakob Shlyter. FEAT: Added support for SHA256 to the DS RR. Assigned the expected digest type2 for SHA256 type hashes. Note that this makes the Net::DNS::SEC depend on Digest::SHA instead of Digest::SHA1. The default digest type is still set to 1. NB. The code makes assumptions about the IANA assignment of the digest type. The assignment may change. Do not use SHA256 in production zones!! FIX: rt.cpan.org #15662 Roy Arends noticed and patched the label counting did not ignore an initial asterisk label. FIX: Wes Hardaker noticed the default TTL values for created signatures to be different from the TTLs from the data that is being signed. FIX: Wes Hardaker reported there was a problem with validating RRsets that had ownernames with capitals. The fix depends on a fix in Net::DNS::RR that is available in version 0.53_03 or later of the Net::DNS distribution. FEAT: Propper dealing with mnemonics for algorithm and digest type added to DS FIX/FEAT: Mnemonics were written as RSA/MD5 and RSA/SHA1. This has been corrected tp RSASHA1 and RSAMD5, as in the IANA registry. 0.12_02 June 6, 2005 (beta 2 release for 0.13) Bug: new_from_hash would not correctly create the RR since internally typebm is used to store the data this has been fixed so that the following works Net::DNS::RR->new(name=>$name, ttl=>$ttl, type=>"NSEC", nxtdname=>$nxtdname, typelist=>join(" ",@types) ); FEAT: Introduced the "use bytes" pragma to force character interpretation of all the scalars. Any utf processing by perl makes the code behave unpredictable. 0.12_01 April 18, 2005. (beta release for version 0.13) FEAT (!!!): Changed the symantics of the Net::DNS::Keyset::verify method. Read the perldoc for details. The requirement that each key in a keyset has to be selfsigned has been loosened. FEAT: Added a "carp" to the new methods of the NXT RR. Warning that that record is depricated. FEAT: Cleaned the tests so that RRSIG and DNSKEY are used except for SIG0 based tests. FEAT: Changed the name of the siginceptation[SIC] to siginception. Thanks Jakob Schlyter for notifying me of this mistyping. An alias for the method remains available. FEAT: Renamed unset_sep() to clear_sep(). NOTE: To avoid confusion the Net::DNS::SIG::Private class has been removed. Use Net::DNS::SEC::Private! DOC: Added references to RFC 4033, RFC 4034 and RFC 4035. Rewrote parts of the perlpod.
2007-05-17Updated to version 5.44.heinz2-6/+10
Pkgsrc changes: - The package supports installation to DESTDIR - A C compiler is necessary. Changes since version 5.43: =========================== 5.44 Sat Oct 14 00:42:44 MST 2006 - removed SIGNATURE file from distribution -- spurious errors from CPANPLUS can break build - eliminated ppport.h header file -- significantly reduces size of distribution - modified C functions in src/hmac.c to use ANSI prototypes -- thanks to Jarkko Hietaniemi for patch
2007-05-17Updated to version 0.24.heinz4-20/+24
Pkgsrc changes: - Package supports installation to DESTDIR. - Removed patch-aa (missing includes when using OpenSSL 0.9.8 were fixed). - patch-ab corrects wrong test count. Changes since version 0.22: ===================================== 0.24 Mon Nov 13 2006 08:21:14 - Fix a bug reported by Mark Martinec <Mark.Martinec@ijs.si> where encrypt could segfault if called with insufficient data; it now informatively croaks instead. - Fix a bug reported by Mark Martinec where check_key would segfault instead of croaking when called on a public key. - Fix decrypt and private_encrypt to croak instead of segfault when called on a public key. - Add an is_private method. - Silence a few compiler warnings about ignoring return values from certain BIO_* methods. 0.23 Wed Apr 12 2006 00:06:10 - Provide 32 bytes of seeding in tests, up from 19. - Stop relying on implicit includes, which disappeared in the 0.98 release of OpenSSL. - Apply patch from Jim Radford <radford@blackbean.org> to add support for SHA{224,256,384,512}
2007-05-16The package supports installation to DESTDIR.heinz1-1/+3
2007-05-15Update to 0.9.14. Changes:shannonjr2-6/+6
- Implement TCP keepalive settings on platform that support it, check client.conf for details. - When reading prelude-adduser password from a file, remove newline at the end of the string (fix #221). - When we fail to read an IDMEF message, provide more information about the place where the error happened. - Fix an issue with idmef_path_get() on empty path (pointing to the root message). - Various bug fixes and minor API improvements.
2007-05-13Add a cast to appease gcc4.agc2-1/+15
2007-05-13Remove some GNOME1 packages that are unmaintained upstream and/or inwiz5-78/+1
pkgsrc, in preparation for gnome1-libs removal(*). There was no feedback for keeping these packages after my HEADS UP mail to pkgsrc-users a week ago. (*) More to come before that can happen, though.
2007-05-12Update to 0.9.8. Changes:shannonjr3-7/+10
- Initial implementation of the 'thresholding' plugin, allowing you to suppress events after a certain limit/threshold. - Filters hooking to a reporting plugin are now OR'ed instead of being AND'ed. AND is already possible by hooking filtering plugin one with another. - Improved error reporting. - Minor bug fixes.
2007-05-12Updated embedded libassuan to 1.0.1shannonjr3-12/+12
2007-05-12Update to version 1.0.1. Changes not provided in release announcement.shannonjr2-6/+6
2007-05-12Update to Version 2.0.4. Changes are not described in release announcement.shannonjr8-48/+61
2007-05-12Update to 0.9.9. Changes:shannonjr3-7/+9
- Pattern can now be used to specify file to be monitored. - Fix an issue in the detection of buggy writev() FAM notification. - Add bonding.rules, by Paul Robert Marino <prmarino1@gmail.com>. - ModSecurity ruleset update: remove unnecessary fields + ModSecurity 2.0 compatibility. - New Cisco IOS common ruleset, by Alexandre Racine. - Avoid duplicating information in node name and node address. - Add rule ID and revision to the generated alert for each matched rule. Fix #206. - Handle "last" keyword even if the rule does not contain any IDMEF assignment. Fix #218. - Various bug fixes.
2007-05-10Add and enable sbdagc1-1/+2
2007-05-10Initial import of sbd-0.5 into the Packages Collection.agc6-0/+123
One-time cipher based back door program for executing emergency commands. Secure Back Door(SBD) is an alternative to leaving SSH open all the time. It is based on a secure one-time keypad method, that insures maximum security. Since SBD is very small, it is less likely to have security exploits, as compared to SSH. Therefore, you could leave an important computer up and running with just sbdd running in the background, and if an emergency came about, you could simple execute a command to bring ssh up, then work on the computer as regular. It would be as simple as doing ./sbd domain.com "/etc/init.d/sshd start", and with the proper key file set, the remote computer would have ssh up and running shortly.
2007-05-10p5-Net is not needed anymore as ghen@ reported, bump PKGREVISION.xtraeme1-2/+2
2007-05-08Doesn't create subdirectory, premake.joerg1-1/+3
2007-05-05Update to 2.5.0. Too many changes to list here, please see:xtraeme3-7/+11
http://www.ijs.si/software/amavisd/release-notes.txt
2007-05-05Add and enable py-SSLCryptoagc1-1/+2
2007-05-05Initial import of py-SSLCrypto-0.1.1 into the Packages Collection.agc5-0/+74
SSLCrypto is a package for Python that dramatically eases the task of adding encryption to Python programs. It provides a unified API that is almost totally compatible with that of ezPyCrypto, except that it takes advantage of the OpenSSL Crypto Library to deliver massive improvements in speed and security. After using ezPyCrypto myself, I found that while it performed ok with smaller public key sizes, it proved impossibly slow with larger keys. This slowness, resulting from non-optimal code in its backend (the Python Cryptography Toolkit) meant that on a 1.5 GHz Athlon XP, it was taking several minutes to generate 4096-bit keys. Completely unacceptable if you need real security. Performance is absolutely critical for an encryption API. If slowness deters people from using adequate-sized keys, security will be severely compromised, almost to the extent that there's little point in using encryption in the first place.
2007-05-03Fix typo in "SUBST_MESSAGE.dl".tron1-2/+2
2007-05-03Update to 1.05:wiz2-6/+6
v1.05 - make session cache working even if the IO::Socket::SSL object was not created with IO::Socket::SSL->new but with IO::Socket::SSL->start_SSL on an established socket
2007-04-30Changes 2.6.5:adam3-13/+27
* Added all of the patches on Sourceforge, plus those included by Red Hat's Fedora Extras
2007-04-30Changes 2.5.8:adam3-13/+17
* Stuff from the Fedora Extras crew
2007-04-30Changes 0.9.9:adam3-8/+14
- Added patch for sigbus error on unaligned data, when doing rapid copies. Changes 0.9.8.1: - Another round of bugfixes
2007-04-30Update home-page URL.tron1-2/+2
2007-04-28PR 36233: Make libgcrypt build on NetBSD/hp700. From David H. Gutteridge.tnn1-2/+3
Also makes it build on HP-UX and Linux/hppa, tested by me.
2007-04-26Also link with the "dl" library when creating the shared libraries.tron3-15/+24
Another attempt to fix PR pkg/36086.
2007-04-25Bump PKGREVISIONs to chase update of devel/libevent.tnn4-8/+8
2007-04-24Use all necessary means to convince OpenSSL's "special" build systemtron1-4/+10
to link with the "dl" library under Mac OS X if necessary. This should finally fix PR pkg/36086.
2007-04-22Added DESTDIR support.heinz1-1/+2
2007-04-22As suggested by Joerg Sonnenberger, replaced CHECK_INTERPRETER_SKIPheinz2-5/+10
with appropriate values for REPLACE_PERL.
2007-04-20Update to 1.6.2:wiz4-12/+12
* Version 1.6.2 (released 2007-04-18) ** Fix X.509 signing with RSA-PKCS#1 to set a NULL parameters fields. Before, we remove the parameters field, which resulted in a slightly different DER encoding which in turn caused signature verification failures of GnuTLS-generated RSA certificates in some other implementations (e.g., GnuPG 2.x's gpgsm). Depending on which RFCs you read, this may or may not be correct, but our new behaviour appear to be consistent with other widely used implementations. ** Regenerate the PKIX ASN.1 syntax tree. For some reason, after changing the ASN.1 type of ldap-UID in the last release, the generated C file built from the ASN.1 schema was not refreshed. This can cause problems when reading/writing UID components inside X.500 Distinguished Names. Reported by devel <dev001@pas-world.com>. ** Updated translations. ** API and ABI modifications: No changes since last version.
2007-04-18Make sure that the "dlcompat" related options are actually added totron1-1/+3
"LDFLAGS". This is another attempt to fix PR pkg/36086.
2007-04-17Because OpenSSL uses dlfcn(3) only internally and Mac OS X supports sharedtron1-3/+1
library dependences we don't need to include "dlopen.buildlink3.mk" here.
2007-04-17Use "pkgsrc/mk/dlopen.buildlink3.mk" instead of manually includingtron2-9/+6
"pkgsrc/devel/dlcompat/buildlink3.mk" under Darwin. This might finally fix PR pkg/36086.
2007-04-17Needs msgfmt.joerg1-1/+3
2007-04-15Update to 1.04:wiz2-6/+6
v1.04 - added way to create SSL object with predefined session cache, thus making it possible to share the cache between objects even if the rest of the context is not shared key SSL_session_cache Note that the arguments of IO::Socket::SSL::SessionCache::new changed (but you should never have used this class directly because it's internal to IO::Socket::SSL)
2007-04-11update to 1.0.1drochner14-203/+292
This moves this pkg to the new stable gnome branch, too much to list here.
2007-04-11update to 2.18.0drochner3-9/+16
This moves this pkg to the new stable gnome branch, too much to list here.
2007-04-11Update to ipsec-tools 0.6.7.ghen2-6/+6
o Fixed SHA256 detection on some systems o Fixed a DoS in Informationnal messages processing (CVE-2007-1841).
2007-04-10update to 0.8.1drochner2-6/+6
changes: * Fixes some a null pointer crashes when called with a NULL keyring * Translations
2007-04-09Update to 0.9.10. Changes:shannonjr3-10/+11
- Allow filtering plugins to hook others filters plugins. - Update reporting code to latest specification for the SNMPService class. - Warn about Un-handled command line arguments. - Properly dump IDMEF-XML output (fix #186). - Various bug fixes.
2007-04-09Update to 0.9.7.2. Changes:shannonjr2-6/+6
- Allow filtering plugins to hook others filters plugins. - Update reporting code to latest specification for the SNMPService class. - Warn about Un-handled command line arguments. - Properly dump IDMEF-XML output (fix #186). - Various bug fixes.
2007-04-09Update to 0.9.12. Changes:shannonjr2-6/+6
- Fix preludedb-admin copy/move operations.
2007-04-09Update to 0.9.13.2. Changes:shannonjr2-6/+6
- Improve error reporting with the central option interface. - Fix a bug when comparing IDMEF object with optional fields. - Fix a problem with the logger, where large log entry wouldn't be logged.