summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Collapse)AuthorFilesLines
2001-01-18ve this a chance to build on 1.5 - defined sa_family_t (taken from -current)hubertf2-0/+19
2001-01-17Should make this buildable on Solaris, too. Untested for lack of Solaris.wiz2-1/+10
2001-01-17If we have to choose if this works on Solaris or NetBSD, prefer NetBSD.wiz3-37/+40
XXX: This needs some work. How to handle platform-dependent patches? What's the problem with using the NetBSD patches on Solaris?
2001-01-15add security/scansshitojun1-1/+2
2001-01-15scanssh, ssh remote version scanneritojun5-0/+23
2001-01-14Pass "${CC}" to configure script.tron1-2/+2
2001-01-14Regen.tron1-9/+2
2001-01-14Don't force to use WS 5.0 on Solaris.tron1-0/+20
2001-01-13Use SSLCERTS for location of OpenSSL certificates directory.jlam1-16/+2
2001-01-11Fix typo.dent1-2/+2
2001-01-10Make this package work under SunOS.tron4-10/+83
2001-01-10Don't check for "/dev/urandom" under Solaris.tron2-7/+10
2001-01-09Update HOMEPAGEabs1-2/+2
2001-01-09add security/pakemonitojun1-1/+2
2001-01-09pakemon, japanese-made IDSitojun8-0/+73
2001-01-08typo. freebsd PR 24127itojun1-1/+1
2001-01-07If someone installs openssh on netbsd and then pkg_deletes it again,hubertf1-2/+2
he sure does NOT want to nuke /etc/ssh* - adjust to ssh*_config.
2001-01-07Update to 4114.wiz2-4/+4
2001-01-04The way that shared objects were handled in the PLISTs and bsd.pkg.mk wasagc11-11/+51
out of date - it was based on a.out OBJECT_FMT, and added entries in the generated PLISTs to reflect the symlinks that ELF packages uses. It also tried to be clever, and removed and recreated any symbolic links that were created, which has resulted in some fun, especially with packages which use dlopen(3) to load modules. Some recent changes to our ld.so to bring it more into line with other Operating Systems also exposed some cracks. + Modify bsd.pkg.mk and its shared object handling, so that PLISTs now contain the ELF symlinks. + Don't mess about with file system entries when handling shared objects in bsd.pkg.mk, since it's likely that libtool and the BSD *.mk processing will have got it right, and have a much better idea than we do. + Modify PLISTs to contain "ELF symlinks" + On a.out platforms, delete any "ELF symlinks" from the generated PLISTs + On ELF platforms, no extra processing needs to be done in bsd.pkg.mk + Modify print-PLIST target in bsd.pkg.mk to add dummy symlink entries on a.out platforms + Update the documentation in Packages.txt With many thanks to Thomas Klausner for keeping me honest with this.
2001-01-02Use USE_SSL and not DEPENDS=opensslveego1-2/+2
2000-12-30Add and enable sslwraprh1-1/+2
2000-12-30Resolve conflicts from earlier import (the package was apparently alreadyrh8-3/+31
added and then deleted again during the last freeze)
2000-12-30Initial import of sslwrap-206, a simple SSL TCP wrapper.rh3-0/+63
2000-12-28Enable on alpha again; according to itojun, the referenced PR doesn'twiz1-3/+3
apply to the package.
2000-12-28add and enable ridwiz1-1/+2
2000-12-21Update to dat-4112abs2-4/+4
2000-12-21Import rip-1.11:hubertf5-0/+40
Remote Intrusion Detection to track down compromised hosts Purpose: To use intrusion fingerprints to track down compromised hosts. Scope: TCP/UDP/ICMP (No fragmentation reassembly) Specs: Program can create somewhat arbitrary UDP/ICMP/TCP packets/streams and send them to a range of hosts. It also listens promiscuously for predefined intrusion "fingerprints".
2000-12-20it seems that the tar.gz was replaced without filename change.itojun1-2/+2
2000-12-19Update stunnel to 3.9. For NetBSD, if in-tree OpenSSL exists, then thejlam8-65/+89
default certificate directory is now /etc/openssl/certs (matches OpenSSL's default), but if stunnel uses the pkgsrc OpenSSL, then the default is ${PREFIX}/certs. Changes from version 3.8 include: * Updated temporary key generation: - stunnel is now honoring requested key-lengths correctly, - temporary key is changed every hour. * transfer() no longer hangs on some platforms. Special thanks to Peter Wagemans for the patch. * Potential security problem with syslog() call fixed. * use daemon() function instead of daemonize, if available * added -S flag, allowing you to choose which default verify sources to use * relocated service name output logging until after log_open. (no longer outputs log info to inetd socket, causing bad SSL) * -V flag now outputs the default values used by stunnel * Added rigerous PRNG seeding * PID changes (and related security-fix) * Man page fixes * Client SSL Session-IDs now used * -N flag to specify tcpwrapper service name * UPGRADE NOTE: this version seriously changes several previous stunnel default behaviours. There are no longer any default cert file/dirs compilied into stunnel, you must use the --with-cert-dir and --with-cert-file configure arguments to set these manually, if desired. Stunnel does not use the underlying ssl library defaults by default unless configured with --enable-ssllib-cs. Note that these can always be enabled at run time with the -A,-a, and -S flags. Additionally, unless --with-pem-dir is specified at compile time, stunnel will default to looking for stunnel.pem in the current directory.
2000-12-18upgrade to 2.3. XXX not sure if patch-aa is right or not.itojun5-7/+26
pcap-int.h is normally installed, as it is internal to libpcap. $Id: CHANGES,v 1.54 2000/12/17 16:39:05 dugsong Exp $ v2.3 Sun Dec 17 11:35:38 EST 2000 - Add VRRP parsing to dsniff, from Eric Jackson <shinobi@monkey.org>. - Require pcap filter argument for tcpkill, tcpnice. - Add Microsoft PPTP MS-CHAP (v1, v2) parsing to dsniff, based on anger.c by Aleph One <aleph1@securityfocus.com>. - Fix pcAnywhere 7, 9.x parsing in dsniff. - Add -t trigger[,...] flag to dsniff, to specify individual triggers on the command line. - Convert most everything to use new buf interface. - New programs: dnsspoof, msgsnarf, sshmitm, webmitm. - Fix inverted regex matching in *snarf programs. - Consistent arpspoof, macof, tcpnice, tcpkill output. - Rename arpredirect to arpspoof (maintain consistent *sniff, *snarf, *spoof, *spy nomenclature). - Consistent pcap filter argument to dsniff, *snarf programs. - Add trigger for Checkpoint Firewall-1 Session Authentication Agent (261/tcp), as suggested by Joe Segreti <seg@clark.net>. - Add SMTP parsing to dsniff, as requested by Denis Ducamp <Denis.Ducamp@hsc.fr>. - Add rexec and RPC ypserv parsing to dsniff, as requested by Oliver Friedrichs <of@securityfocus.com>. - Add HTTP proxy auth parsing back to dsniff, it got lost in the shuffle. Reported by Denis Ducamp <Denis.Ducamp@hsc.fr>. - Add NNTPv2 and other AUTHINFO extensions to dsniff.
2000-12-15Update to latest distfile.wiz2-4/+4
2000-12-14Update to 1.1 because of a possible security problem:wiz3-5/+6
The socket creation code in fshd was not paranoid enough. There were are at least two possible attacks: - If a malicious user has symlinked /tmp/fshd-<UID> to another file, fshd will chmod 0700 that file. - A race condition made it possible for an attacker to create an unsafe socket directory, so that the attacker can access an fshd tunnel. The attacker must alread have a local shell on the computer where fsh or fshd is invoked. Other changes: New timeout option, fixed to work with openssh2, now also usable if you have to enter a password to connect, and some others.
2000-12-13Rename `pwcheck' rc.d control script to `sasl_pwcheck' to avoid name clashjlam3-9/+10
with NetBSD 1.5's existing /etc/rc.d/pwcheck script.
2000-12-12remove bogus bound-check. need revisit (DoS issue is not re-introduced).itojun2-1/+14
sync with kame
2000-12-12Unify Makefiles -- mostly headers: remove FreeBSD Ids.wiz1-2/+1
Consistent 4 character indentation of SUBDIR entries.
2000-12-11Better whitespace control in message.jlam1-2/+3
2000-12-11Replace a few more utilities with their paths from bsd.pkg.mk.jlam2-6/+11
2000-12-11upgrade to the latest (2000/12/11). most important change is that prioritojun2-4/+4
versions had DoS possiblity, due to insufficient length check.
2000-12-11Replace @ADDGROUP@ in pkg/INSTALL file.jlam1-1/+2
2000-12-10Update cyrus-sasl to 1.5.24nb2:jlam22-112/+966
* Move headers to ${PREFIX}/include and get rid of need for the MD5 headers. * Move creation of cyrus user and mail group from cyrus-imapd to cyrus-sasl. * Always compile support for pwcheck. * Supply a ${PREFIX}/etc/rc.d/pwcheck script that drops in the rc.d startup scheme. * Supply a sasl-config script that can return compiler flags needed for linking against -lsasl. * Install documentation. * Supply DEINSTALL/INSTALL scripts to manage the /var/pwcheck directory and /etc/sasldb shared secrets database. * Improve the descriptions in the COMMENT and DESCR files. * Make me the maintainer.
2000-12-09Fix MASTER_SITES and HOMEPAGE, noted by Brian Poole.wiz1-3/+3
2000-12-08Fix kerberos4 recognition if ${PREFIX} != /usr/local.wiz3-5/+17
Also change libdes recognition so that it builds with openssl. Fixes pkg/11170.
2000-12-08Move code from REQ file to INSTALL.wiz3-32/+19
2000-12-07Undo previous commit. These packages apparently handle patches specially.rh1-5/+11
2000-12-07Sync w/ realityrh1-11/+5
2000-12-06Look for build dependency in path instead.jlam1-2/+2
2000-12-06* Cosmetic changes to Makefile.jlam5-35/+159
* Use DEINSTALL/INSTALL scripts to handle config files. * Install the UPGRADE file and add a MESSAGE file to refer to it, instead of spewing a big file every time sudo is installed.
2000-12-05Update sudo to 1.6.3p5. Changes from version 1.6.3p4:jlam2-4/+4
* Fixed listpw and verifypw sudoers options. * Do not write NUL when writing passwd prompt.
2000-11-30change DEPENDS on gettext to BUILD_DEPENDS on msgfmtwiz1-2/+2
2000-11-29Warn about IDEA licence restrictions.rh1-1/+7