From c5fe9e1fe7f56975f6a6518054529544301361e1 Mon Sep 17 00:00:00 2001 From: mef Date: Fri, 7 Apr 2017 00:41:59 +0000 Subject: Updated security/p5-Net-SSH to 2.09.01 -------------------------------------- 2.09 2016.10.26 - Fix creation of keys in ecdsa, ed25519 key classes - Update eg/pssh-keygen to create ecdsa, ed25519 keys - Handle hostkeys-00@openssh.com global requests - Add support for 'CheckHostIP' and 'UpdateHostKeys' config options - Refactor handling of '+' syntax in options - Key fingerprints now output sha256-base64 by default. (md5 can be specified with FingerprintHash config option) - Add id_ed25519, id_ecdsa to default identity files - Documentation updates in Perl.pm to reflect new functionality in 2.XX 2.08 2016.10.14 - Use sha512 instead of md5 in Net::SSH::Perl::Cipher->new_from_key_str() to provide ChachaPoly with enough key material Tests in t/05-cipher.t should now pass on all platforms [ CPAN bug #114077 ] - Add AES128_CBC to cipher tests - Info on using features not enabled by default added to README 2.07 2016.10.13 - Fix blowfish compilation on SunOS [CPAN bug #116323] - Fix bug in Packet [CPAN bug #118335] - Add support for '+' syntax in MACs option - Remove hmac-sha1 from default MACs. It can re-enabled by passing the option: 'MACs +hmac-sha1' 2.06 2016.10.04 - Add support for additional fixed Diffie-Hellman 2K, 4K and 8K groups from OpenSSH 7.3 (draft-ietf-curdle-ssh-kex-sha2-03) - Kex defaults now updated to draft-ietf-curdle-ssh-kex-sha2-03 recommendations (diffie-hellman-group-exchange-sha1 removed) It can re-enabled by passing the option: 'KexAlgorithms +diffie-hellman-group-exchange-sha1' 2.05 2016.10.03 - Add support for '+' syntax in Ciphers, KexAlgorithms, HostKeyAlgorithms options as in OpenSSH 2.04 2016.05.11 - Add ECDSA key support - Improve extract_public() in Key.pm inspired by https://github.com/renormalist/Net-SSH-Perl/pull/12 but implement comment with backwards compat with RSA/DSA datafellows - Fix XS from being loaded more than once (warnings from Net::SFTP) 2.03 2016.05.06 - Fixes so that "make test" passes 2.02 2016.05.04 - Use CryptX to further reduce module depedencies This eliminates the need for: Math::Pari Crypt::DH Crypt::RSA Crypt::DSA Crypt::DES Crypt::Blowfish MIME::Base64 - Add support for rsa-sha2-512,rsa-sha2-256 signing with RSA keys - Implement HashKnownHosts, KexAlgorithms, MACs config directives - Add XS code for Chacha20, BSD Blowfish, Ed25519 routines - Properly handle and create known_hosts entries when port is specified - Remove obsolete ciphers, MACs, Kex from default list to duplicate upcoming OpenSSH behavior - Bug fixes 2.01 2016.02.19 - Use CryptX to reduce module depedencies This eliminates the need for: BSD::arc4random Digest::MD5 Digest::SHA Digest::HMAC_MD5 Crypt::OpenSSL::AES 2.00 2015.12.07 - Add Chacha20-Poly1305 cipher support for best security (Requires Crypt::OpenSSH::ChachaPoly, see README) - Add AES Cipher support in CTR mode (CBC mode supported in Ed25519 keys only) - Add Group Exchange (RFC4523) Diffie-Hellman Key Exchange - Add Curve25519 (curve25519-sha256@libssh.org) Key Exchange support (Requires Crypt::Curve25519) - Add hmac-sha2-256,hmac-sha2-512 MAC support - Add hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com Encrypt-then-MAC (ETM) MAC support - Use BSD::arc4random for encrypted packet padding - Add support for Ed25519 ssh/host keys (Requires Crypt::Ed25519) Encrypted Ed25519 key support requires Crypt::OpenBSD::Blowfish (See README for info) - Default ciphers order is now chacha,aes,3des,blowfish,arcfour - Default KEX order is now Curve25519, DHGEXSHA256, DHGEXSHA1, DH14, DH1 - Default MAC order is now hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, sha2-512, sha2-256, sha1, md5 - SSH Keys can now be in DOS format (no need to remove CR/LF) - SOCKS proxy support via sub class Net::SSH:Perl::Proxy - Now does not abort due to OpenSSH 6.8+ server SSH2_MSG_GLOBAL_REQUEST messages for host key rotation (pkgsrc changes) - Adjust DEPENDS base upon above note (p5-CryptX related) --- security/p5-Net-SSH/Makefile | 23 ++++++++--------------- security/p5-Net-SSH/distinfo | 10 +++++----- 2 files changed, 13 insertions(+), 20 deletions(-) (limited to 'security') diff --git a/security/p5-Net-SSH/Makefile b/security/p5-Net-SSH/Makefile index e3efcb4e553..1fda771880b 100644 --- a/security/p5-Net-SSH/Makefile +++ b/security/p5-Net-SSH/Makefile @@ -1,9 +1,8 @@ -# $NetBSD: Makefile,v 1.21 2016/06/08 19:24:24 wiz Exp $ +# $NetBSD: Makefile,v 1.22 2017/04/07 00:41:59 mef Exp $ # -DISTNAME= Net-SSH-Perl-1.42 -PKGNAME= p5-Net-SSH-1.42 -PKGREVISION= 1 +DISTNAME= Net-SSH-Perl-2.09.01 +PKGNAME= p5-${DISTNAME:C/-Perl//} CATEGORIES= security net perl5 MASTER_SITES= ${MASTER_SITE_PERL_CPAN:=Net/} @@ -13,23 +12,17 @@ COMMENT= Perl implementations of SSH1 and SSH2 protocols LICENSE= ${PERL5_LICENSE} DEPENDS+= p5-Convert-PEM>=0.05:../../textproc/p5-Convert-PEM -DEPENDS+= p5-Crypt-Blowfish-[0-9]*:../../security/p5-Crypt-Blowfish -DEPENDS+= p5-Crypt-DES-[0-9]*:../../security/p5-Crypt-DES -DEPENDS+= p5-Crypt-DH>=0.01:../../security/p5-Crypt-DH -DEPENDS+= p5-Crypt-DSA>=0.11:../../security/p5-Crypt-DSA -DEPENDS+= p5-Crypt-RSA>=1.37:../../security/p5-Crypt-RSA -DEPENDS+= p5-Crypt-IDEA-[0-9]*:../../security/p5-Crypt-IDEA +DEPENDS+= p5-CryptX-[0-9]*:../../security/p5-CryptX DEPENDS+= p5-Digest-BubbleBabble>=0.01:../../security/p5-Digest-BubbleBabble -DEPENDS+= p5-Digest-HMAC-[0-9]*:../../security/p5-Digest-HMAC -#DEPENDS+= {perl>=5.7.3,p5-Digest-MD5-[0-9]*}:../../security/p5-Digest-MD5 -DEPENDS+= p5-Digest-SHA1>=2.10:../../security/p5-Digest-SHA1 -#DEPENDS+= {perl>=5.7.3,p5-MIME-Base64-[0-9]*}:../../converters/p5-MIME-Base64 DEPENDS+= p5-Math-GMP>=1.04:../../math/p5-Math-GMP -DEPENDS+= p5-Math-Pari>=2.001804:../../math/p5-Math-Pari DEPENDS+= p5-String-CRC32>=1.2:../../textproc/p5-String-CRC32 PKG_OPTIONS_VAR= PKG_OPTIONS.p5-Net-SSH PKG_SUPPORTED_OPTIONS= idea +#KG_SUGGESTED_OPTIONS= idea + +# Omit the last micro version, for example 2.09.01 -> 2.09 +WRKSRC= ${WRKDIR}/${DISTNAME:C/([0-9]+)\.([0-9]+)[0-9.]+/\1.\2/} .include "../../mk/bsd.options.mk" diff --git a/security/p5-Net-SSH/distinfo b/security/p5-Net-SSH/distinfo index 8d55db640f6..8b781a5ff1c 100644 --- a/security/p5-Net-SSH/distinfo +++ b/security/p5-Net-SSH/distinfo @@ -1,7 +1,7 @@ -$NetBSD: distinfo,v 1.6 2016/01/31 05:49:47 mef Exp $ +$NetBSD: distinfo,v 1.7 2017/04/07 00:41:59 mef Exp $ -SHA1 (Net-SSH-Perl-1.42.tar.gz) = 3aa6c110e06be7c2b6da3881fe8ad7b60459c9e2 -RMD160 (Net-SSH-Perl-1.42.tar.gz) = 4d778b2047640b286143e99e37259508e0996554 -SHA512 (Net-SSH-Perl-1.42.tar.gz) = 67275e99890948376c7f6feb5be1979f45b5fda2afe440108b3819db192fd41b43e9ee94e7e643671384b37972842f40ce3519cbeef98b6ee796a68e4bfe20dd -Size (Net-SSH-Perl-1.42.tar.gz) = 120783 bytes +SHA1 (Net-SSH-Perl-2.09.01.tar.gz) = 926cbdbb30aa85b7503698763455ad6926c471ee +RMD160 (Net-SSH-Perl-2.09.01.tar.gz) = 235dab415b1e094f4b13313d5fe0e6ed359c8c39 +SHA512 (Net-SSH-Perl-2.09.01.tar.gz) = e7d7194e175490ba0849357ebbb504932d97b358722f2045e0acbaba9c14dc945629bd5653b36934317632e0d3894525e4f34ea48b494f2cc815959106138b44 +Size (Net-SSH-Perl-2.09.01.tar.gz) = 255286 bytes SHA1 (patch-aa) = d85b70f5f4d4ccb55aabef6671171bf64c6fcdb9 -- cgit v1.2.3