| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
| |
PR: ports/155788
Submitted by: System Administrator <root@naboo.vindaloo.com>
Pass flag to mount to disable lockd
PR: ports/137378
Submitted by: kib
|
|
|
|
|
|
|
|
|
| |
The referenced security issues have been fixed in this version (1.5.0 beta), and
some small bugs have been found too, with many fixes from Debian's Gerrit Pape.
Obtained from: Debian (parts)
Security: CVE-2002-0351
Security: CVE-2006-3123
|
|
|
|
| |
2011-10-04 security/cfs: Locks don't work, ports/137378, unmaintained, dead upstream, insecure
|
|
|
|
|
|
|
| |
- As per policy on security issues, shorten removal date to one month.
Security: CVE-2002-0351
Security: DSA-116-1
|
|
|
|
|
|
| |
Expires on 4/Nov
PR: ports/137378 ports/155788
|
|
|
|
|
| |
PR: ports/133563
Submitted by: Thiemo Nordenholz <list@thiemo.net>, yar
|
| |
|
|
|
|
| |
s#. %%RC_SUBR%%#. /etc/rc.subr#
|
|
|
|
|
|
|
|
| |
e-mail addresses from the pkg-descr file that could reasonably
be mistaken for maintainer contact information in order to avoid
confusion on the part of users looking for support. As a pleasant
side effect this also avoids confusion and/or frustration for people
who are no longer maintaining those ports.
|
|
|
|
| |
Submitted by: ed
|
|
|
|
| |
Reported by: pointyhat
|
|
|
|
| |
Thanks to alfred@ for his help.
|
| |
|
|
|
|
| |
Hat: portmgr
|
|
|
|
| |
Approved by: krion@
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- add a CFS bootstrap directory to the port (${PREFIX}/cfsd-bootstrap)
- mount that CFS bootstrap directory in cfsd.sh (default mountpoint is /crypt,
configurable in /etc/rc.conf)
- explain how to quickly setup cfsd in pkg-message
- do display pkg-message
- while here, use USE_RC_SUBR
PR: ports/18800
Submitted by: Louis Mamakos <louie@TransSys.COM>, myself
Approved by: green (maintainer)
|
|
|
|
|
|
|
|
| |
- Fix types issues on 64-bits architectures.
PR: ports/75878
Submitted by: Ville-Pertti Keinonen <will@exomi.com>
Approved by: maintainer timeout (3 months)
|
|
|
|
| |
appears to be crashing some people (but not others).
|
|
|
|
| |
so that the version is actually bumped.
|
| |
|
|
|
|
|
|
|
|
|
|
| |
It used $RANDOM when it was a ksh script, but here it had always
been broken because ash (/bin/sh) doesn't have it.
Also, make the cfssh manpage refer to itself as cfssh instead of ssh.
Submitted by: Martin Kammerhofer <dada@sbox.tugraz.at>
PR: 65620
|
|
|
|
|
|
|
| |
checksum mechanism for pathnames so that it works for those paths.
Submitted by: Olof Samuelsson <olof@s8n.pp.se>
PR: 35353
|
| |
|
| |
|
|
|
|
|
|
|
| |
Requiem mors pacem pkg-comment,
And be calm ports tree.
E Nomini Patri, E Fili, E Spiritu Sancti.
|
|
|
|
|
|
| |
connections to register cfs with it.
Determined by: Brad Forschinger <freebsd@bnjf.id.au>
|
|
|
|
|
| |
PR: 29638
Submitted by: Scott Renfro <scott@renfro.org>
|
|
|
|
| |
Reminded by: kkenn
|
|
|
|
|
| |
PR: ports/30120
Submitted by: Scott Renfro <scott@renfro.org>
|
| |
|
| |
|
|
|
|
| |
Unrestrict port since we are able to distribute crypto
|
|
|
|
|
| |
every request doesn't return NFSERR_STALE. This CFS bug brought to
light by the letters p, h, and k :)
|
| |
|
|
|
|
| |
Submitted by: Ollivier Robert <roberto@FreeBSD.org>
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
[Has anyone figured-out what makes the number 393 so interesting to PW, now?]
I wonder what was going through Jordan's head during his infamous
$Id$-smashing commit.
Before I forget....
Thanks to naddy@mips.rhein-neckar.de (Christian Weisgerber) for prompting
this commit. See msg-id: 7geokh$tje$1@mips.rhein-neckar.de
|
|
|
|
|
|
| |
I've made myself the maintainer, as well.
Reviewed by: jdp
|
| |
|
|
|
|
| |
Reviewed by: John Polstra (Maintainer)
|
| |
|
| |
|
|
|
|
| |
* Install the cfs's ssh as cfssh.
|
|
|
|
| |
PR: ports/7651
|
|
|
|
|
| |
PR: closes ports/4757
Submitted by: saken@rmta.ml.org (Scott A. Kenney)
|
|
|
|
|
| |
Reviewed by: jdp@polstra.com
Submitted by: Theo de Raadt <deraadt@cvs.openbsd.org>
|
|
|