summaryrefslogtreecommitdiffstats
path: root/security
Commit message (Collapse)AuthorAgeFilesLines
...
* Assign maintainership to Dominic Marks.trevor2002-05-101-1/+1
| | | | | PR: 37907 Submitted by: Dominic Marks
* -# LICENSE: http://www.bluesine.com/licenseijliao2002-05-102-1/+2
| | | | | | | +# LICENSE: http://www.bluesine.com/license.html PR: 37901 Submitted by: Oliver Braun <obraun@informatik.unibw-muenchen.de>
* upgrade to 0.8.1ijliao2002-05-1010-52/+214
|
* Use crypto.3 as dependeny.dinoex2002-05-093-3/+3
| | | | To keep consistent with USE_SSL in bsd.port.mk
* Add port of find-zlib, a script which scans for code derived fromtrevor2002-05-095-0/+36
| | | | zlib.
* This version of mcrypt requires autoconf 2.50 or newer. Accordingly,trevor2002-05-081-10/+31
| | | | | | | | | | | | | | | | | | | | | | | | use that instead of the old autoconf. Add a pre-configure target to run autoconf, because bsd.port.mk only supports the old autoconf. Left to its own devices, the program now installs files with strange names such as /usr/local/man/man1/i386-portbld-freebsd4.4-mcrypt.1 and /usr/local/bin/i386-portbld-freebsd4.4-mcrypt. To avoid this, the whole installation now happens in a do-install target in the port's Makefile, which also does the former post-install tasks. Install supplementary documentation, unless NOPORTDOCS is defined. Use EXAMPLESDIR. The mdecrypt utility was removed. It has been replaced by a -d option to mcrypt. Drop USE_LIBTOOL and add back GNU_CONFIGURE. PORTVERSION remains nil, since this did not build. Add a warning about my laziness.
* Remove patch to extra.c, since it has been incorporated upstream.trevor2002-05-081-11/+0
| | | | | Reported by: Mario Pranjic and Valentin Zahariev PR: 37790 and 37856
* To ports@freebsd.org.obrien2002-05-0810-10/+10
|
* Update to 4202jeh2002-05-082-2/+2
|
* Update master sitesobrien2002-05-082-5/+5
| | | | | Submitted by: Cyrille Lefevre <cyrille.lefevre@laposte.net> PR: 37850
* Authforce is an HTTP authentication brute forcer.ache2002-05-0810-0/+94
|
* add hashish 0.4bijliao2002-05-086-0/+42
| | | | A file and string hashing utility
* change unknown USE_SSL into USE_OPENSSLdinoex2002-05-081-1/+1
|
* Upgrade to 20020507. Unreadable log should be fixed.sumikawa2002-05-084-4/+4
| | | | Error reported by: so many people
* Fix MASTER_SITES.sobomax2002-05-071-3/+2
| | | | Submitted by: Sergii Laskavyi <ls@gambit.com.ru>
* Chase openssl shlib version increase.sobomax2002-05-074-4/+4
| | | | Pointy hat to: dinoex
* Update to saint 3.4.9 to fix build, sort pkg-plist and removekris2002-05-053-65/+84
| | | | | | maintainer at his request. Noticed by: bento
* Update to mcrypt 2.5.13kris2002-05-052-4/+3
| | | | Approved by: trevor (maintainer)
* Chase libmcrypt version number increment.kris2002-05-052-2/+2
|
* Update to libmcrypt 2.5.0kris2002-05-053-6/+8
|
* Upgrade 0.5.1 --> 0.6cy2002-05-052-2/+2
| | | | | PR: 37700 Submitted by: MAINTAINER: Kimura Fuyuki <fuyuki@mj.0038.net>
* openssl:dinoex2002-05-047-15/+19
| | | | | | | | | - some configure scripts check the version of the lib so we need to update SHLIBVER - bump PORTREVISION openssh: - build ports with local openssl, if it exists
* * Update to 4201jeh2002-05-043-4/+4
| | | | * Update update_dat to support their slightly changed format
* Patch a heap overflow. Seenectar2002-05-032-1/+66
| | | | | | | <URL:http://online.securityfocus.com/archive/1/269356> and <URL:http://www.freeweb.hu/mantra/04_2002/KRB4.htm>. Obtained from: Heimdal repository
* Security fix for token passing, see bugtraq for details.dinoex2002-05-036-10/+21
| | | | | - fetch and use openssh-3.1-adv.token.patch to build. - bump PORTREVISION
* Now that www.crypto-publish.org has put the latest version of MIT KRB5cy2002-05-038-4/+36
| | | | | | | up on their website again, reimplementation of the Makefile patch that fetched the the tarball from their site for users outside of the US (originally in Makefile rev 1.29). USA_RESIDENT=YES still supports manual fetching from web.mit.edu.
* Upgrade 1.2.4 --> 1.2.5cy2002-05-028-8/+8
|
* Update to 4200jeh2002-05-012-2/+2
|
* Fix plist at NOPORTDOC environment.kuriyama2002-05-012-30/+30
| | | | PR: ports/37621
* Upgrade to 1.0.7.kuriyama2002-04-306-26/+24
| | | | See http://www.gnupg.org/whatsnew.html#rn20020429 for changelog.
* Catch up with libgmp3 death.sobomax2002-04-301-1/+1
| | | | Pointy hat to: ijliao
* use USE_PYDISTUTILSijliao2002-04-296-43/+9
|
* Update to version 2.54 Beta 33.obrien2002-04-292-2/+2
|
* Update to 2.17.petef2002-04-282-2/+2
|
* Fix libgmp breakage on -current.sobomax2002-04-262-6/+12
|
* Upgrade to 20020426.sumikawa2002-04-264-6/+6
|
* Update to 4199jeh2002-04-262-2/+2
| | | | 4199 Emergency Dat Release due to Exploit-BackCSS False Positive
* upgrade to 1.6.1ijliao2002-04-252-9/+3
|
* update to 1.6.6mharo2002-04-253-6/+6
|
* Update to 4198jeh2002-04-242-2/+2
|
* Update to 3.0. Sigh.will2002-04-232-0/+452
|
* revert change from this morningmharo2002-04-222-4/+1
|
* Change to vi:ts=8.obrien2002-04-221-11/+11
|
* Patch sudo 1.6.5.2 with GlobalInterSec's sudo patch.mharo2002-04-222-1/+4
|
* Reclaim maintainership.anders2002-04-222-3/+3
|
* Please welcome Qt3/KDE3 to our ports tree. This includes work since thewill2002-04-218-732/+20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | original versions of these ports, so some PORTREVISIONs were bumped. See http://freebsd.kde.org/ and mailing lists linked to from there for info on the packages generated to test these ports. bsd.kde.mk has already been updated a few days ago to work with these. Some patches applied to fix a few bugs were: deskutils/kdepim3: [1] Remove kpilot from build because it wasn't ready at release. editors/koffice-kde3: [2] Fix compile time bugs for FreeBSD. misc/kdeedu3: [3] Fix compile problem with kvoctrain. x11/kdebase3: [4] Fix KDM CPU usage and login bug. Some caveats: * All PLISTs are broken for deinstall due to script bug that I didn't notice until very recently. This will be fixed when I commit an update tomorrow. These ports should still install perfectly fine though. They should also deinstall without giving errors, but will leave directories behind. * You can't install this with any other version of QT or KDE already installed. I am not sure the checks are 100% working, but fixes for these will be forthcoming. This is mainly due to a policy decision made by kde@ to make QT/KDE ports install the way the rest of the world expects it to while also still conforming to FreeBSD's hier(7). For reference on this decision, please consult the KDE/FreeBSD mailing list archives. This decision fixes 2-year-old bug reports relating to how we handled this for KDE2 vs KDE1. Submitted by: [1] Adrian de Groot <adridg@cs.kun.nl>, [2] David Faure <faure@kde.org>, Andy Fawcett <andy@athame.co.uk> Lauri Watts <lauri@kde.org> [3] Lauri Watts <lauri@kde.org> [4] Alan Eldridge <alane@geeksrus.net> Oswald Buddenhagen <ossi@kde.org> Reviewed by: kde
* - Update to 0.9.6cdinoex2002-04-216-52/+64
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | - more manpages - shift FORBIDDEN Excerpt of Changes between 0.9.6b and 0.9.6c [21 dec 2001] *) Fix BN_rand_range bug pointed out by Dominikus Scherkl *) Only add signing time to PKCS7 structures if it is not already present. *) Fix crypto/objects/objects.h: "ld-ce" should be "id-ce", OBJ_ld_ce should be OBJ_id_ce. Also some ip-pda OIDs in crypto/objects/objects.txt were incorrect (cf. RFC 3039). *) Release CRYPTO_LOCK_DYNLOCK when CRYPTO_destroy_dynlockid() returns early because it has nothing to do. *) Fix mutex callback return values in crypto/engine/hw_ncipher.c. *) Change ssl/s2_clnt.c and ssl/s2_srvr.c so that received handshake messages are stored in a single piece (fixed-length part and variable-length part combined) and fix various bugs found on the way. *) Disable caching in BIO_gethostbyname(), directly use gethostbyname() instead. BIO_gethostbyname() does not know what timeouts are appropriate, so entries would stay in cache even when they have become invalid. *) Change ssl23_get_client_hello (ssl/s23_srvr.c) behaviour when faced with a pathologically small ClientHello fragment that does not contain client_version: Instead of aborting with an error, simply choose the highest available protocol version (i.e., TLS 1.0 unless it is disabled). *) Fix SSL handshake functions and SSL_clear() such that SSL_clear() never resets s->method to s->ctx->method when called from within one of the SSL handshake functions. *) In ssl3_get_client_hello (ssl/s3_srvr.c), generate a fatal alert (sent using the client's version number) if client_version is smaller than the protocol version in use. Also change ssl23_get_client_hello (ssl/s23_srvr.c) to select TLS 1.0 if the client demanded SSL 3.0 but only TLS 1.0 is enabled; then the client will at least see that alert. *) Fix ssl3_get_message (ssl/s3_both.c) to handle message fragmentation correctly. *) Avoid infinite loop in ssl3_get_message (ssl/s3_both.c) if a client receives HelloRequest while in a handshake. *) Bugfix in ssl3_accept (ssl/s3_srvr.c): Case SSL3_ST_SW_HELLO_REQ_C should end in 'break', not 'goto end' which circuments various cleanups done in state SSL_ST_OK. But session related stuff must be disabled for SSL_ST_OK in the case that we just sent a HelloRequest. Also avoid some overhead by not calling ssl_init_wbio_buffer() before just sending a HelloRequest. *) Fix ssl/s3_enc.c, ssl/t1_enc.c and ssl/s3_pkt.c so that we don't reveal whether illegal block cipher padding was found or a MAC verification error occured. (Neither SSLerr() codes nor alerts are directly visible to potential attackers, but the information may leak via logfiles.) ssl/s2_pkt.c failed to verify that the purported number of padding bytes is in the legal range. *) Improve RSA_padding_check_PKCS1_OAEP() check again to avoid 'wristwatch attack' using huge encoding parameters (cf. James H. Manger's CRYPTO 2001 paper). Note that the RSA_PKCS1_OAEP_PADDING case of RSA_private_decrypt() does not use encoding parameters and hence was not vulnerable. *) BN_sqr() bug fix. *) Rabin-Miller test analyses assume uniformly distributed witnesses, so use BN_pseudo_rand_range() instead of using BN_pseudo_rand() followed by modular reduction. *) Add BN_pseudo_rand_range() with obvious functionality: BN_rand_range() equivalent based on BN_pseudo_rand() instead of BN_rand(). *) s3_srvr.c: allow sending of large client certificate lists (> 16 kB). This function was broken, as the check for a new client hello message to handle SGC did not allow these large messages. *) Add alert descriptions for TLSv1 to SSL_alert_desc_string[_long](). *) Fix buggy behaviour of BIO_get_num_renegotiates() and BIO_ctrl() for BIO_C_GET_WRITE_BUF_SIZE ("Stephen Hinton" <shinton@netopia.com>). *) In ssl3_get_key_exchange (ssl/s3_clnt.c), call ssl3_get_message() with the same message size as in ssl3_get_certificate_request(). Otherwise, if no ServerKeyExchange message occurs, CertificateRequest messages might inadvertently be reject as too long. *) Modified SSL library such that the verify_callback that has been set specificly for an SSL object with SSL_set_verify() is actually being used. Before the change, a verify_callback set with this function was ignored and the verify_callback() set in the SSL_CTX at the time of the call was used. New function X509_STORE_CTX_set_verify_cb() introduced to allow the necessary settings. *) In OpenSSL 0.9.6a and 0.9.6b, crypto/dh/dh_key.c ignored dh->length and always used BN_rand_range(priv_key, dh->p). So switch back to BN_rand(priv_key, l, ...) where 'l' is dh->length if this is defined, or BN_num_bits(dh->p)-1 otherwise. *) In RSA_eay_public_encrypt, RSA_eay_private_decrypt, RSA_eay_private_encrypt RSA_eay_public_decrypt always reject numbers >= n. *) In crypto/rand/md_rand.c, use a new short-time lock CRYPTO_LOCK_RAND2 to synchronize access to 'locking_thread'. *) In crypto/rand/md_rand.c, set 'locking_thread' to current thread's ID *before* setting the 'crypto_lock_rand' flag. The previous code had a race condition if 0 is a valid thread ID.
* Update maintainer e-mail address.anders2002-04-201-1/+1
| | | | | PR: 37294 Submitted by: maintainer
* Update krb5-1.2.5-beta1 --> krb5-1.2.5-beta2cy2002-04-202-3/+3
|
* Patches from maintainer:kris2002-04-1912-0/+281
| | | | | | | | | | | | | * HKP (WWW) key submissions disabled by default, enabled via configuration file * nicer formatting of long (SHA-1) fingerprints * pksdctl usage() shows available commands/arguments * manual page fixes Bump PORTREVISION. PR: ports/34970 Submitted by: Jason Harris <jharris@widomaker.com>
OpenPOWER on IntegriCloud