aboutsummaryrefslogtreecommitdiffstats
path: root/net/ocserv
Commit message (Collapse)AuthorAgeFilesLines
* - Update to 0.11.3cpm2016-06-202-7/+7
| | | | | | | | | | | | - Add LIB_DEPENDS for security/nettle - Switch to USES=localbase framework ChangeLog: http://lists.infradead.org/pipermail/openconnect-devel/2016-June/003720.html Reviewed by: amdmi3, junovitch (mentors) Approved by: amdmi3, junovitch (mentors) Differential Revision: D6890
* - Update to 0.11.2 releasecpm2016-04-293-75/+3
| | | | | | | | | - Remove unneeded patch (applied upstream) Changelog: http://www.infradead.org/ocserv/changelog.html Approved by: junovitch (mentor) Differential Revision: D6122
* - Update to 0.11.1 releasecpm2016-04-184-17/+77
| | | | | | | | | | | | | - Convert LICENSE= "GPLxx# or later" to "GPLxx+" - Add dependency on libev - Regenerate patches - Add MAKE_JOBS_UNSAFE; port attempts to modify man page before generation sed: ocpasswd.8: No such file or directory Changelog: http://lists.infradead.org/pipermail/openconnect-devel/2016-March/003551.html Approved by: junovitch (mentor) Differential Revision: D5890
* Remove ${PORTSDIR}/ from dependencies, categories m, n, o, and p.mat2016-04-011-10/+10
| | | | | With hat: portmgr Sponsored by: Absolight
* - Update security/gnutls to 3.4.10.tijl2016-03-271-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | - Rename the LIBDANE option DANE because that's the name of the protocol supported by libgnutls-dane and gnutls-cli. Also clarify the option description. - Add an IDN option. - libgnutls-openssl has been removed in 3.4. Some ports used this library in their LIB_DEPENDS but no port actually required it. - Some old API functions have been removed. Ports that used these have been updated or patched to use the new API. - Add a patch to print/cups to prevent overlinking of libgnutls.so. - Bump PORTREVISION on dependent ports. net-im/jabber: This port used the old API to give users fine grained control over which crypto algorithms were used via a configuration file. It's not immediately obvious how to port this to the new API so the port always uses the defaults now. www/hydra: Mark BROKEN. This uses more removed calls than the other ports, is said to be alpha quality and not fully functional and has been abandoned 10 years ago. PR: 207768 Exp-run by: antoine Approved by: portmgr (antoine)
* - Update to 0.10.12cpm2016-03-172-4/+4
| | | | | | | - Update MAINTAINER to my @FreeBSD.org address PR: 207824 Approved by: junovitch (mentor)
* - Update to 0.10.11cpm2016-01-273-3/+4
| | | | | | | | | Changes: http://lists.infradead.org/pipermail/openconnect-devel/2016-January/003362.html PR: 205244 Submitted by: Carlos J. Puga Medina <cpm@fbsd.es> Approved by: junovitch (mentor)
* net/ocserv: 0.10.8 -> 0.10.9pi2015-10-133-9/+9
| | | | | | | Changes: http://www.infradead.org/ocserv/changelog.html PR: 203739 Submitted by: Carlos J Puga Medina <cpm@fbsd.es> (maintainer)
* - Switch to options helpersamdmi32015-10-071-7/+4
| | | | | | - Pet portlint Approved by: portmgr blanket
* net/ocserv: 0.10.7 -> 0.10.8pi2015-09-078-63/+56
| | | | | | | | | - Update to 0.10.8 release - Add libtasn1 dependency - Fix patches PR: 202936 Submitted by: Carlos J Puga Medina <cpm@fbsd.es> (maintainer)
* New port: net/ocserv: server implementing the AnyConnect SSL VPN protocolpi2015-08-1712-0/+658
OpenConnect server (ocserv) is an SSL VPN server. Its purpose is to be a secure, small, fast and configurable VPN server. It implements the OpenConnect SSL VPN protocol, and has also (currently experimental) compatibility with clients using the AnyConnect SSL VPN protocol. The OpenConnect protocol provides a dual TCP/UDP VPN channel, and uses the standard IETF security protocols to secure it. Both IPv4 and IPv6 are supported. Ocserv's main features are security through provilege separation and sandboxing, accounting, and resilience due to a combined use of TCP and UDP. Authentication occurs in an isolated security module process, and each user is assigned an unprivileged worker process, and a networking (tun) device. That not only eases the control of the resources of each user or group of users, but also prevents data leak (e.g., heartbleed-style attacks), and privilege escalation due to any bug on the VPN handling (worker) process. A management interface allows for viewing and querying logged-in users. WWW: http://www.infradead.org/ocserv/ PR: 202253 Submitted by: Carlos Jacobo Puga Medina <cpm@fbsd.es> Reviewed by: pi