| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
Add HTML documentation OPTION knob.
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Implement options that will allow the user to:
- rename ftp and ftpd to kftp and kftpd
- rename telnet and telnetd to ktelnet and ktelnetd
- rename rlogin to krlogin
- rename rsh to krsh
- rename rcp to krcp
This avoids shadowing by or being shadowed by, depending on one's PATH,
system utilities of the same name.
|
|
|
|
|
|
|
|
|
| |
Security: US-CERT Technical Cyber Security Alert TA08-079B --
MIT Kerberos Updates for Multiple Vulnerabilities
US-CERT Vulnerability Note VU#895609,
US-CERT Vulnerability Note VU#374121
MIT krb5 Security Advisory 2008-001
MIT krb5 Security Advisory 2008-002
|
|
|
|
| |
Approved by: portmgr (linimon)
|
|
|
|
| |
Approved by: portmgr (self)
|
|
|
|
|
| |
PR: 117552
Submitted by: Hirohisa Yamaguchi <umq@umo.co.jp>
|
| |
|
|
|
|
|
| |
PR: 117469
Submitted by: Karen Andrews <dearmiss@optusnet.com.au>
|
|
|
|
|
|
|
| |
Security: fix CVE-2007-3999, CVE-2007-4743 svc_auth_gss.c buffer overflow
fix CVE-2007-4000 modify_policy vulnerability
Also: add PKINIT support
|
|
|
|
|
| |
overflow, uninitialized pointer
Security: MIT krb5 Security Advisory 2007-006
|
| |
|
|
|
|
|
|
|
|
| |
MITKRB5-SA-2007-004: kadmind affected by multiple RPC library vulnerabilities
MITKRB5-SA-2007-005: kadmind vulnerable to buffer overflow
Security: US CERT Technical Cyber Security Alert TA07-177A --
MIT Kerberos Vulnerabilities
|
|
|
|
|
| |
- Set X11BASE to ${LOCALBASE} for recent ${OSVERSION}.
- Bump PORTREVISION for ports intalling files in ${X11BASE}.
|
|
|
|
| |
Pointy hat to: yours truly
|
| |
|
|
|
|
|
|
|
|
|
|
| |
1. MIT krb5 Security Advisory 2007-001: Telnetd allows login as arbitrary user
CVE: CVE-2007-0956
CERT: VU#220816
2. MIT krb5 Security Advisory 2007-002: KDC, kadmind stack overflow in krb5_klog_syslog
CVE: CVE-2007-0957
CERT: VU#704024
|
|
|
|
|
| |
Obtained from: MIT krb5 Security Advisory 2007-003
Security: US-CERT Technical Cyber Security Alert TA07-093B -- MIT Kerberos Vulnerabilities
|
|
|
|
| |
Reported by: pointyhat
|
|
|
|
|
|
| |
ports
With hat: portmgr
|
| |
|
|
|
|
| |
Conditionally build and install documentation using a new knob.
|
|
|
|
|
| |
Security: MITKRB5-SA-2006-002, MITKRB5-SA-2006-003, and
US-CERT Technical Cyber Security Alert TA07-009B
|
|
|
|
|
|
|
|
|
|
|
| |
securiry/krb5.
Bump PORTREVISION accordingly.
PR: ports/105442
Submitted by: Ruben van Staveren <ruben@verweg.com>
Reviewed by: shaun@, cy@
Approved by: flz (mentor)
|
|
|
|
| |
Submitted by: Paul Vixie <paul@vix.com>
|
|
|
|
|
| |
for situations when the database is replicated to a secure environment
that does not have network access, by hand.
|
| |
|
| |
|
| |
|
|
|
|
| |
Approved by: portmgr (kris)
|
|
|
|
| |
Approved by: krion@
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
in bsd.autotools.mk essentially makes this a no-op given that all the
old variables set a USE_AUTOTOOLS_COMPAT variable, which is parsed in
exactly the same way as USE_AUTOTOOLS itself.
Moreover, USE_AUTOTOOLS has already been extensively tested by the GNOME
team -- all GNOME 2.12.x ports use it.
Preliminary documentation can be found at:
http://people.FreeBSD.org/~ade/autotools.txt
which is in the process of being SGMLized before introduction into the
Porters Handbook.
Light blue touch-paper. Run.
|
|
|
|
| |
PR: 87888
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
- Portlint
PR: ports/85027
Submitted by: lofi
Approved by: maintainer timeout (cy, 7 weeks)
|
| |
|
|
|
|
|
|
| |
- MIT KRB5 Security Advisory 2005-002: Buffer overflow, heap corruption in KDC
- MIT KRB5 Security Advisory 2005-003: Double free in krb5_recvauth
|
|
|
|
| |
Package list fixup when KRB5_KRB4_COMPAT is not specified.
|
|
|
|
|
| |
Noticed by: kris
Pointy hat to: yours truly
|
| |
|
| |
|
| |
|
|
|
|
|
| |
Approved by: portsmgr (krion)
Obtained from: Tom Yu <tlyu@mit.edu> on kerberos-announce
|
| |
|
|
|
|
| |
Remove code to alternatively fetch from that site.
|
| |
|
|
|
|
|
|
| |
in KDC and libraries
Heads-up by: nectar
|
|
|
|
| |
Heads-up by: nectar
|
| |
|
|
|
|
| |
Obtained from: Tom Yu <tlyu@mit.edu> on BUGTRAQ
|
|
|
|
| |
Obtained from: Tom Yu <tlyu@MIT.EDU> on kerberos-announce list
|
| |
|
|
|
|
|
|
|
| |
1.3.2 yet, when USE_KRB5_TARBALL=CRYPTO-PUBLISH is specified, 1.3.1
will be installed.)
- Add SIZE to distinfo
|
|
|
|
| |
interpreter.
|
|
|
|
| |
Reported by: kris
|
|
|
|
| |
(Part 1)
|
|
|
|
|
|
| |
commit fixes that error.
Reported by: bento
|
| |
|
| |
|
|
|
|
|
|
| |
Unfortunately MIT and crypto-publish.org distribute two distinctly
different tarballs and the user must select the source/format they
wish to fetch. MIT now becomes the default.
|
|
|
|
|
|
| |
2. Fix build on -STABLE.
PR: 57128
|
|
|
|
|
| |
after Feb 2 2004 if they are still broken at that time and no fixes
have been submitted by PR.
|
| |
|
|
|
|
|
| |
Noticed by: wollman
Approved by: marcus (wearing his portsmgr hat)
|
| |
|
|
|
|
|
| |
PR: 56169
Submitted by: Sergey Matveychuk <sem@ciam.ru>
|
| |
|
| |
|
|
|
|
| |
Submitted by: wollman
|
|
|
|
|
|
| |
for new installations.
Submitted by: wollman
|
|
|
|
|
|
|
| |
by USE_MIT_TARBALL. Users can still fetch manually from MIT by
setting USE_MIT_TARBALL=YES.
Suggested by: wollman
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- MITKRB5-SA-2003-005:
Buffer overrun and underrun in principal name handling
- MITKRB5-SA-2003-004:
Cryptographic weaknesses in Kerberos v4 protocol; KDC and realm
compromise possible.
- MITKRB5-SA-2003-003:
Faulty length checks in xdrmem_getbytes may allow kadmind DoS.
- Additional patches from RedHat.
Approved by: kris (wearing his portmgr hat)
Obtained from: MIT Website and Nalin Dahyabhai <nalin@redhat.com>
|
|
|
|
|
|
|
| |
Requiem mors pacem pkg-comment,
And be calm ports tree.
E Nomini Patri, E Fili, E Spiritu Sancti.
|
|
|
|
| |
Approved by: kris (implicitly)
|
|
|
|
|
| |
Note: Since crypto-publish.org does not yet have krb5-1.2.7 up on their
website, fetch from their site has been temporarily disabled.
|
|
|
|
|
|
|
|
| |
is better studied
o Turn PORTCOMMENT variable in Makefile back into pkg-comment files
Approved by: kris (portmgr hat),
portmgr, re (silence)
|
| |
|
|
|
|
| |
Submitted by: Craig Boston <craig@olyun.gank.org>
|
|
|
|
| |
PR: 44446
|
|
|
|
|
|
|
| |
KDC host).
Obtained from: Tom Yu <tlyu@mit.edu> on kerberos-announce mailing list,
MIT krb5 Security Advisory 2002-002
|
|
|
|
|
|
|
| |
patch reimplements code to fetch MIT Kerberos from their site when
USA_RESIDENT=NO.
Approved by: kris
|
|
|
|
|
| |
Note: Since crypto-publish.org does not yet have krb5-1.2.6 up on their
website, fetch from their site has been temporarily disabled.
|
|
|
|
|
| |
Noticed by: nectar
Pointy hat to: cy
|
|
|
|
|
| |
<URL:http://online.securityfocus.com/archive/1/285308>
<URL:http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823>
|
|
|
|
|
| |
PR: 39936
Submitted by: Matthew West <mwest@uct.ac.za>
|
|
|
|
|
|
|
|
| |
ENOENT. Obtained from /cvs/krbdev/krb5/src/kdc/kdc_preauth.c,v rev 5.31
in MIT KRB5 tree (fix etype info; wrong termination condition used in
get_etype_info).
Obtained from: Sam Hartman <hartmans@mit.edu>
|
| |
|
|
|
|
|
|
|
| |
up on their website again, reimplementation of the Makefile patch that
fetched the the tarball from their site for users outside of the US
(originally in Makefile rev 1.29). USA_RESIDENT=YES still supports
manual fetching from web.mit.edu.
|
| |
|
|
|
|
| |
Reported by: bento
|
|
|
|
|
|
|
|
|
|
| |
that contains the distribution itself, in a tar.gz file, and a signature
certificate, contained in a detached .tar.gz.asc file. Prior to this
patch, users installing MIT KRB5 had to extract the tarball into
/usr/ports/distfiles, then proceed with the installation. This caused
confusion among those installing the port. This patch addresses the
problem by extracting the .tar.gz file from the tarball, then unpacking
the .tar.gz file before continuing with the build.
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
now makes use of login.conf and login.access. This is performed by
using FreeBSD login(1) instead of MIT KRB5 login.krb5(8).
The MIT KRB5 login.krb5(8) can still be used by specifying "-L" in
the klogind and telnetd arguments in inetd.conf. This is documented
in a new file called README.FreeBSD.
Reviewed by: nectar
|
|
|
|
|
|
|
|
|
|
| |
<msa@dinosauricon.com> provided the original patches.
= For users outside of the US, point to www.crypto-publish.org for the
distfiles. It was Chris Knight <chris@aims.com.au>'s idea.
Submitted by: Cy.Schubert@uumail.gov.bc.ca (MAINTAINER)
PR: ports/29865
|
| |
|
|
|
|
| |
Submitted by: Cy Schubert <Cy.Schubert@uumail.gov.bc.ca>
|
|
|
|
| |
Update telnetd vulnerability fixes from FreeBSD.
|
|
|
|
| |
Submitted by: Cy Schubert <Cy.Schubert@uumail.gov.bc.ca>
|
|
|
|
| |
Submitted by: Cy Schubert <Cy.Schubert@uumail.gov.bc.ca>
|
| |
|
|
|
|
|
|
|
|
| |
``Buffer overflows exist in the FTP daemon included with MIT krb5.''
See <URL:http://web.mit.edu/kerberos/www/advisories/ftpbuf.txt> and
<URL:http://web.mit.edu/kerberos/www/advisories/ftpbuf_122_patch.txt>.
Obtained from: MIT Kerberos mailing list
|
|
|
|
|
|
|
|
| |
``Buffer overflows exist in the FTP daemon included with MIT krb5.''
See <URL:http://web.mit.edu/kerberos/www/advisories/ftpbuf.txt> and
<URL:http://web.mit.edu/kerberos/www/advisories/ftpbuf_122_patch.txt>.
Obtained from: MIT Kerberos mailing list
|
| |
|
|
|
|
| |
Reminded by: kris
|
|
|
|
|
|
|
|
| |
from <paths.h> (if available) like login.krb5 does. As a result,
on FreeBSD 4.2 these two programs end up using different paths
for the nologin file (which is /var/run/nologin on FreeBSD).
Submitted by: <djm@test.pubnix.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The MIT Kerberos Team announces the availibility of MIT Kerberos 5
Release 1.2.1. This is primarily a bugfix release. Changes include:
* A bug in the gssapi library that prevented kadmin clients from
working has been fixed. For some reason this was not caught during
beta testing.
* login.c now correctly sets the default ccache name.
* A memory leak in conv_princ.c has been fixed.
|
|
|
|
| |
1.2-beta4.
|
| |
|
|
|
|
|
|
|
|
|
| |
previous commit message to bsd.port.mk, which said INSTALL_SHLIBS. Boo.)
Line up the rhs of variable assignments nicely. Remove a couple of extra
whitespaces while I'm here.
Suggested by: sobomax
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
TGT).
Obtained from: MIT Kerberos GNATS PR krb5-appl/762, 763
|
| |
|
|
|
|
|
| |
Prompted by PR: 13476, 13477
Submitted by: KATO Tsuguru
|
| |
|
|
|
|
|
|
| |
mv -> ${MV}
rm -> ${RM}
tr -> ${TR}
|
|
|
|
| |
chown -> ${CHOWN}
|
|
|
|
|
|
|
|
|
|
|
|
| |
[Has anyone figured-out what makes the number 393 so interesting to PW, now?]
I wonder what was going through Jordan's head during his infamous
$Id$-smashing commit.
Before I forget....
Thanks to naddy@mips.rhein-neckar.de (Christian Weisgerber) for prompting
this commit. See msg-id: 7geokh$tje$1@mips.rhein-neckar.de
|
|
|
|
| |
in bsd.port.mk and this helps to unify the check and install.
|
| |
|
| |
|
|
|
|
|
|
|
| |
In other words,
/dev/pty[p-zP-T][0-9a-f] -> /dev/pty[p-sP-S][0-9a-v]
Submitted by: John Polstra <jdp@polstra.com>
|
|
|
|
|
| |
PR: 9587
Submitted by: Sheldon Hearn <axl@iafrica.com>
|
|
|
|
|
| |
shell loops to make loops. Use EXTRA_PKG_FLAGS to add install scripts
instead of adding it to PKG_FLAGS after bsd.port.mk.
|
| |
|
| |
|
|
|
|
| |
fetch as well.
|
|
|
|
| |
PR: ports/7651
|
| |
|
| |
|
|
|
|
| |
has for example)
|
|
|
|
|
|
|
|
| |
* Allow override of CONFIGURE_ARGS.
* Control building of KerberosIV compatible libraries with
KRB5_KRB4_COMPAT.
* Use ECHO, FALSE, and DO_NADA as appropriate.
* Combine pre-fetch and do-fetch targets.
|
|
|
|
|
|
|
|
|
|
|
| |
* Paths corrected in applications
* ftpd now logs to facility LOG_FTP
* use openpty to obtain pseudo-terminal
* corrected detection of TCL libraries
* fix a forwarding bug
* add -m flag to ksu (preserve USER, HOME, SHELL)
* cosmetic bug fix to telnet.c
Submitted by: Dima Ruban <dima@best.net>
|
|
PR: ports/6870
Submitted by: Jacques Vidrine <n@nectar.com>
|