aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Collapse)AuthorAgeFilesLines
* - mailman -- Multiple Vulnerabilitiesmnag2006-09-041-0/+44
|
* Reset inactive maintainer who has not responded to email.linimon2006-09-041-1/+1
| | | | Hat: portmgr
* Reassign from inactive maintainer to new volunteer.linimon2006-09-041-1/+1
| | | | Hat: portmgr
* Reset inactive maintainer who has not responded to email.linimon2006-09-041-1/+1
| | | | Hat: portmgr
* Suhosin is an advanced protection system for PHP installations.ale2006-09-044-0/+48
| | | | | | | | | | | | | | | | | It was designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core. Suhosin comes in two independent parts, that can be used separately or in combination. The first part is a small patch against the PHP core, that implements a few low-level protections against bufferoverflows or format string vulnerabilities and the second part is a powerful PHP extension that implements all the other protections. Suhosin is binary compatible to normal PHP installation, which means it is compatible to 3rd party binary extension like ZendOptimizer. WWW: http://www.suhosin.org/
* Mark BROKEN on recent -CURRENT since it doesn't compile with OpenSSLsimon2006-09-041-0/+4
| | | | | | 0.9.8b. Reported by: pointyhat via kris
* Mark BROKEN on recent -CURRENT since it doesn't compile with OpenSSLsimon2006-09-041-1/+5
| | | | | | | 0.9.8b. When here anyway, fix portlint warning about BROKEN when WITHOUT_NLS is defined.
* Mark BROKEN on recent -CURRENT since it doesn't compile with OpenSSLsimon2006-09-041-1/+6
| | | | | 0.9.8b, and I haven't found out how to fix it yet (patches are gladly accepted).
* RESTRICTED is intended here instead of NO_PACKAGEkris2006-09-041-1/+1
|
* Bump modification date for last jabber entry changegarga2006-09-031-1/+1
| | | | Noted by: remko
* Fix jabber entrygarga2006-09-031-1/+1
|
* - Update to 20060903tdb2006-09-032-5/+5
|
* BROKEN: Unfetchable. Since this port is unmaintained and fairly old,kris2006-09-031-0/+4
| | | | deprecate and schedule for termination on 2006-12-01.
* Allow package buildskris2006-09-031-1/+1
|
* NO_PACKAGE is superfluouskris2006-09-031-1/+0
|
* - Remove notes about "make test" since there are known problems in it.ahze2006-09-031-10/+0
|
* NO_PACKAGE is not appropriate herekris2006-09-031-1/+0
|
* NO_PACKAGE and NO_CDROM are not appropriate herekris2006-09-031-2/+0
|
* NO_CDROM and NO_PACKAGE are not appropriate herekris2006-09-031-2/+0
|
* - Update to 3.11.2ahze2006-09-032-6/+6
| | | | - s/INSTALL_PROGRAM/INSTALL_DATA/ on libs
* NO_PACKAGE is not appropriate; use RESTRICTED insteadkris2006-09-031-2/+1
|
* Remove expired portskris2006-09-031-2/+0
|
* Fix compile with OpenSSL 0.9.8b in -CURRENT.simon2006-09-032-0/+26
| | | | | PR: ports/101974 Approved by: maintainer timeout
* Remove expired ports.kris2006-09-0319-1193/+0
|
* Chase net/samba to net/samba3 in preparation for removal of the former.kris2006-09-031-1/+1
|
* Document hlstats -- multiple cross site scripting vulnerabilities.remko2006-09-031-0/+26
|
* Document gtetrinet -- remote code executionremko2006-09-031-0/+29
|
* Bump modified date in the entry changed by garga.remko2006-09-031-1/+1
| | | | Forgotten by: garga
* net-im/jabber -- Mark the correct versions with fd_set vulnerability, authorgarga2006-09-031-1/+2
| | | | | fixed the problem on trunk and 2 new releases (1.4.3.1 and 1.4.4.1) is comming soon
* Schedule these broken ports for termination on 2006-12-01kris2006-09-032-0/+4
|
* - Use OSVERSION instead of exist()rafan2006-09-021-1/+1
| | | | | Noticed by: kris Approved by: Piet Delport (maintainer, implicit)
* - Fix pkg-plist [1]miwi2006-09-021-2/+25
| | | | | Submitted by: pontyhat via krismail Sergei Vyshenski <svysh(at)cryptocom.ru> (maintainer) [1]
* The pam_abl provides auto blacklisting of hosts and userspav2006-09-0217-0/+684
| | | | | | | | | responsible for repeated failed authentication attempts. WWW: http://www.hexten.net/pam_abl/ PR: ports/100635 Submitted by: Petr Rehor <prehor@gmail.com>
* Now builds on sparc64ahze2006-09-011-4/+0
| | | | Approved by: maintainer timeout (7+ weeks)
* Update to 1.2.3 (Minor bugfix release)arved2006-09-012-5/+4
|
* BROKEN: Depends on incompatible versions of libnetkris2006-09-011-1/+3
| | | | | Also drop maintainership, I no longer use this port and do not have time to work on it.
* BROKEN: Does not buildkris2006-09-011-0/+2
|
* Mark it as BROKEN on 4.x while I cannot take a lookgarga2006-08-311-1/+7
| | | | Reported by: krismail
* - fix warning when no openssl is in the basedinoex2006-08-311-1/+1
| | | | | PR: 102639 Submitted by: Artis Caune
* Update the latest FreeBSD-SA entry, ppp got replaced by sppp.remko2006-08-311-5/+6
| | | | | Also implement a suggestion from Simon, mark all versions before the latest version vulnerable.
* Document joomla -- multiple vulnerabilitiesremko2006-08-301-0/+30
| | | | | | | | Note that I only documented the high level threats, there are several others which can be found at the link provided [1] Reference: http://www.joomla.org/content/view/1841/78/ [1]
* - Update to 2.6.0clsung2006-08-304-34/+149
| | | | | | | - I'll maintain it now. PR: ports/99862 Submitted by: Linh Pham <question+fbsdports_AT_closedsrc dot org>
* - Update to 0.1.2.1miwi2006-08-303-5/+20
| | | | | PR: ports/102635 Submitted by: Peter Thoenen <peter.thoenen(at)yahoo.com> (maintainer)
* Update HPN-12 patch to version 8 (no functional changes,ale2006-08-302-4/+4
| | | | | | only documentation changes and a small bug fix on option parsing). Approved by: mnag
* Update to 1.6garga2006-08-292-4/+4
|
* - Update to 2.02sat2006-08-294-8/+8
|
* - Update to 0.9.6clsung2006-08-282-5/+4
| | | | | | | | | | | | Changelog prelude-manager-0.9.6: - In case an IDMEF-Service object contain neither name or port attribute, set name to "unknown" in order to avoid IDMEF DTD validation issue. - Normalize analyzer(*).node. - Fix OpenBSD getaddrinfo() problem. PR: ports/102593 Submitted by: maintainer (Robin Gruyters)
* - Cast the arguments of ssh_conn_send_channel_data_type() andmarius2006-08-2813-9/+220
| | | | | | | | | | | | | | | | | | | | ssh_encode_{array_alloc,buffer}() calls as appropriate in order to fix argument size problems on 64-bit platforms and that manifest themselves on amd64 and ia64. [1] - Allow the tcsetattr(3) calls in ssh_rl_{restore,set}_tty_modes_for_fd() to be interrupted by signal. This fixes occasional problems when connecting to a host for the first time. - Use the base zlib instead of the one shipping with SSH; although the latter has an enhancement allowing a minor SSH-specific optimization, using the base one has the benefit of not needing to track security vulnerabilities of zlib in this port (SSH 3.2.9.1 ships with zlib 1.1.4 which is not know to be vulnerable though). - Try to make the description of the WITHOUT_X11 option of the port Makefile to be more sentence-like. PR: 98016 [1] Approved by: netchild Obtained from: NetBSD [1]
* GnuTLS is a portable ANSI C based library which implements the TLS 1.0 andnovel2006-08-2812-0/+632
| | | | | | | | | | | | | | | | | | | SSL 3.0 protocols. The library does not include any patented algorithms and is available under the GNU Lesser GPL license. Important features of the GnuTLS library include: - Thread safety - Support for both TLS 1.0 and SSL 3.0 protocols - Support for both X.509 and OpenPGP certificates - Support for basic parsing and verification of certificates - Support for SRP for TLS authentication - Support for TLS Extension mechanism - Support for TLS Compression Methods Additionaly GnuTLS provides an emulation API for the widely used OpenSSL library, to ease integration with existing applications. WWW: http://www.gnutls.org/
* - Update to 1.0-alpha9.flz2006-08-262-4/+4
|
* - Update to 1.7clsung2006-08-252-5/+4
|
* Update to 0.3.6.novel2006-08-242-4/+4
|
* Document FreeBSD-SA-06:18.pppremko2006-08-241-0/+41
|
* - Fix pkg-plistacm2006-08-232-1/+1
| | | | | Reported by: kris Approved by: garga (mentor)
* Add mosref 2.0.b3, a secure remote execution framework using a compactrafan2006-08-236-0/+288
| | | | | | | Scheme-influenced VM. PR: ports/102238 Submitted by: Piet Delport
* - Fix to install along with setuptoolsmiwi2006-08-231-0/+19
| | | | | | PR: ports/102368 Submitted by: Martin Jackson <mhjacks(at)swbell.net> Approved by: krion (mentor), maintainer (via privat mail)
* - Update to 0.9.455miwi2006-08-233-57/+87
| | | | | | PR: ports/102008 Submitted by: Sergei Vyshenski <svysh(at)cryptocom.ru> (maintainer) Approved by: krion (mentor)
* - Update to 1.4rafan2006-08-233-5/+8
| | | | | PR: ports/102423 Submitted by: Kay Lehmann <kay_lehmann at web.de> (maintainer)
* - Update to 0.0.5rafan2006-08-233-5/+16
| | | | | | PR: ports/102310 (based on) Submitted by: Alex Samorukov <samm@os2.kiev.ua> Approved by: Dmitry Marakasov <amdmi3@mail.ru> (maintainer)
* - Update to 1.0.2pav2006-08-222-6/+5
| | | | | | | - Grant maintainership to the submitter PR: ports/97546 Submitted by: Anish Mistry <amistry@am-productions.biz>
* Fix MASTER_SITES.demon2006-08-211-1/+1
|
* - Update to 1.6.2miwi2006-08-213-4/+19
| | | | | | PR: ports/102258 Submitted by: Ulf Lilleengen <lulf(at)pvv.ntnu.no> (maintainer) Approved by: krion (mentor)
* Add port security/sinfp:sat2006-08-219-0/+271
| | | | | | | | | | | | | | | | | | SinFP is a new approach to OS fingerprinting, which bypasses limitations that nmap has. Nmap approaches to fingerprinting as shown to be efficient for years. Nowadays, with the omni-presence of stateful filtering devices, PAT/NAT configurations and emerging packet normalization technologies, its approach to OS fingerprinting is becoming to be obsolete. SinFP uses the aforementioned limitations as a basis for tests to be obsolutely avoided in used frames to identify accurately the remote operating system. That is, it only requires one open TCP port, sends only fully standard TCP packets, and limits the number of tests to 2 or 3 (with only 1 test giving the OS reliably in most cases). WWW: http://www.gomor.org/sinfp
* Fix compilation on 64bit archs.sumikawa2006-08-211-0/+18
|
* VNCcrack is a fast offline password cracker for VNC passwords.itetcu2006-08-206-0/+50
| | | | | | | | | | | | By sniffing a VNC challenge-response sequence off the network (typically when VNC is used without a decent cryptographic wrapper like SSH or SSL), you can recover the password fairly easily and quickly by letting VNCcrack pound on it. WWW: http://www.randombit.net/projects/vnccrack/ PR: ports/102279 Submitted by: Pankov Pavel <pankov_p at mail.ru>
* Minor whitespace cleanup (we need a blank line every after </entry>remko2006-08-201-0/+1
| | | | so that we can easily see the different entries).
* - conflicts with openvpn-[0-9]*itetcu2006-08-201-0/+3
| | | | | | | - bump PORTREVISION PR: ports/102302 Submitted by: Matthias Andree (maintainer)
* - conflicts with openvpn-devel-[0-9]*itetcu2006-08-202-2/+6
| | | | | | | - bump PORTREVISION PR: ports/102301 Submitted by: Matthias Andree (maintainer)
* - Update maintainer addressesmiwi2006-08-202-2/+2
| | | | | | PR: ports/102230 Submitted by: Wesley Shields <wxs(at)atarininja.org> Approved by: krion (mentor)
* Finish adding security/openvpn-devel after repocopy.shaun2006-08-191-0/+1
|
* Convert the repocopied security/openvpn into openvpn-devel.shaun2006-08-194-44/+34
| | | | | | | | | | | OpenVPN is a robust, scalable and highly configurable VPN (Virtual Private Network) daemon which can be used to securely link two or more private networks using an encrypted tunnel over the internet. It can operate over UDP or TCP, can use SSL or a pre-shared secret to authenticate peers, and in SSL mode, one server can handle many clients. PR: ports/101802 Submitted by: Matthias Andree <matthias.andree@gmx.de> (openvpn maintainer)
* - Update to 0.8rafan2006-08-192-6/+5
| | | | | PR: ports/102216 Submitted by: Philippe Rocques <phil at teaser.fr> (maintainer)
* - Update to 0.04miwi2006-08-193-7/+8
| | | | | | PR: ports/102071 Submitted by: Jin-Shan Tseng <tjs(at)cdpa.nsysu.edu.tw> Approved by: krion (mentor), maintainer
* - Add imp to the previous entry.shaun2006-08-181-0/+6
| | | | - Add some SecurityFocus BIDs too.
* Document horde -- Phishing and Cross-Site Scripting Vulnerabilities.shaun2006-08-181-0/+40
|
* - Remove NOPORTDOCS from OPTIONS since the correct is check NOPORTDOCS andgarga2006-08-184-48/+28
| | | | | | | | | | | | | not WITH(OUT)_NOPORTDOCS - Use PORTDOCS and clean pkg-plist - Add NLS to OPTIONS as on by default and move the check after bsd.port.pre.mk - Add --with-ldap=${LOCALBASE} because it was not finding ldap libs without this PR: ports/101318 Submitted by: garga Approved by: maintainer timeout (14 days)
* Now packages againkris2006-08-171-2/+0
|
* Add bruteblock 0.0.4, software for blocking bruteforce attacks withrafan2006-08-177-0/+123
| | | | | | | ipfw. PR: ports/101254 Submitted by: Dmitry Marakasov <amdmi3 at mail.ru>
* - new option WITH_OPENSSL_COMPRESSIONdinoex2006-08-171-0/+4
| | | | Submitted by: Corey Smith
* - Update to 0.7rafan2006-08-172-4/+5
| | | | | | PR: ports/101826 Submitted by: chinsan <chinsan.tw at gmail.com> Approved by: Christopher Cowart <ccowart at rescomp.berkeley.edu> (maintainer)
* - There should be only one site in the WWW line and kame is obsolete anywaysat2006-08-161-1/+1
|
* - make -update work by using the right path in plugins/nikto_core.plugin [1]itetcu2006-08-161-7/+10
| | | | | | | | | - respect TARGETDIR - fix a PREFIX -> LOCALBASE mistake - use my @FreeBSD.org address - bump PORTREVISION Submitted by: "Scott MacGregor" <shadowbq@gmail.com> [1]
* Update to 0.8.2.marcus2006-08-164-15/+15
|
* Convert 8 spaces to tab as per the FDP for the latestremko2006-08-161-15/+15
| | | | entry.
* Add entry for globus tmpfile creation bugs.brooks2006-08-161-0/+42
|
* The lang/f2c port has been updated, update affected versions.brueffer2006-08-161-2/+2
| | | | Reviewed by: simon
* s,INSTALLS_SHLIB,USE_LDCONFIG,gume2006-08-161-1/+1
|
* - Remove directories that are not in mtree filerafan2006-08-151-0/+6
| | | | | | | | | Note that these directories are be removed by other dependency ports, so I do not bump PORTREVISION for them. These affected ports are belong to ports@. PR: ports/101586 Submitted by: Stanislav Sedov <ssedov at mbsd.msk.ru>
* - Chase libpreludedb shlib version change.clsung2006-08-151-2/+2
| | | | | | | - bump PORTREVISION PR: ports/102053 Submitted by: maintainer (Robin Gruyters)
* - s,INSTALLS_SHLIB,USE_LDCONFIG,gclsung2006-08-1518-18/+18
| | | | | | | - these include security/ sysutils/ textproc/ maintained by ports@ PR: ports/101916 Submitted by: Gea-Suan Lin <gslin_AT_gslin dot org>
* - modifies the download paths for LICENSE and distfiles.clsung2006-08-141-2/+2
| | | | | PR: ports/102009 Submitted by: maintainer (Adi Pircalabu)
* Respect DESTDIRmat2006-08-141-1/+0
| | | | | PR: 101853 Submitted by: Gea-Suan Lin <gslin@gslin.org>
* - Update to 2.19clsung2006-08-142-6/+6
| | | | | PR: ports/101986 Submitted by: Gea-Suan Lin <gslin_AT_gslin dot org>
* - Update to 0.9.9clsung2006-08-143-5/+5
| | | | | | | | | | | | | | Changelog libpreludedb: - Implement an idea from Lex van Roon <r3boot@r3blog.nl.eu.org> providing an alert/heartbeat deletion performance improvement in the order of 3000% (preludedb-admin already benefit from it, next Prewikka release will benefit from it too). - Fix --with-(perl|python|swig) detection path ordering. - Verbose error reporting on logfile opening error. - Various bug fixes. PR: ports/101995 Submitted by: maintainer (Robin Gruyters)
* - Update to 2.2.2acm2006-08-144-26/+4
| | | | Approved by: garga (mentor)
* - Respect DESTDIRclsung2006-08-141-1/+1
| | | | | PR: ports/101866 Submitted by: Gea-Suan Lin <gslin_AT_gslin dot org>
* - Respect DESTDIRclsung2006-08-141-2/+2
| | | | | | | - Use USE_LDCONFIG PR: ports/101865 Submitted by: Gea-Suan Lin <gslin_AT_gslin dot org>
* - Remove security/linux-krb5-libs, it was integrated to linux_base-fc4.acm2006-08-143-30/+0
| | | | Approved by: garga (mentor)
* Document x11vnc -- authentication bypass vulnerability.remko2006-08-141-0/+28
| | | | The 1.1111th commit, yay.
* Document alsaplayer -- multiple vulnerabilities.remko2006-08-141-0/+50
|
* Document postgresql -- encoding based SQL injection.remko2006-08-141-0/+50
| | | | Reported by: Radim Kolar <hsn at netmag dot cz>
* Bump modified date in the older entry I just corrected.remko2006-08-131-0/+1
| | | | Spotted by: simon (again)
* Document postgresql -- multiple vulnerabilities.remko2006-08-131-1/+43
| | | | | | | These are all older vulnerabilities which had not yet been documented by the Security Team. Also fix a minor mistake in an older PostgreSQL entry.
* Fix the discovery date in the latest MySQL entry.remko2006-08-131-1/+1
| | | | Spotted by: simon
* Document mysql -- format string vulnerability.remko2006-08-131-0/+30
|
* - Fix build on 4.Xpav2006-08-132-0/+12
| | | | | | | - Respect CC and CFLAGS PR: ports/101750 Submitted by: Babak Farrokhi <babak@farrokhi.net> (maintainer)
* OK after some more discussions with Simon it appeared that the ,2remko2006-08-131-1/+4
| | | | | | | | | | | | | | | marked all future releases of squirrelmail as vulnerable. The negative side-effect of PORTEPOCH. Split the previous entry into two seperated entries again, restoring the old entry for squirrelmail, and having the 'new' entry for ja-squirrelmail. This would grab any future versions of ja-squirrelmail if it were to be readded, and does not conflict with future versions of squirrelmail. For more information about the portepoch discussion etc: http://lists.freebsd.org/pipermail/freebsd-vuxml/2006-July/000185.html
* Simon provided me with the necessary clue to mark the appropriate portsremko2006-08-131-4/+1
| | | | as vulnerable. I was soo close..
* Document squirrelmail -- random variable overwrite vulnerability.remko2006-08-131-0/+32
| | | | | | Note that I marked all ja-squirrelmail entries as vulnerable, it does no longer exist on it's own and the portepoch is giving me matching problems.
* Install to /... instead of to /...se2006-08-122-4/+4
|
* Fix compile with OpenSSL 0.9.8b from -CURRENT.simon2006-08-122-0/+26
| | | | Problem reported by: kris
* Update to 1.4.2.novel2006-08-122-4/+4
|
* Update to 0.5.9.novel2006-08-122-10/+4
|
* - Update to 3.19.1miwi2006-08-112-4/+4
| | | | | | PR: ports/101716 Submitted by: David Thiel <lx(at)redundancy.redundancy.org> (maintainer) Approved by: krion (mentor)
* Document rubygem-rails -- evaluation of ruby code.simon2006-08-111-0/+32
| | | | Submitted by: Marius Nuennerich <marius.nuennerich@gmx.net>
* Fix compile with OpenSSL 0.9.8b from -CURRENT.simon2006-08-111-3/+6
| | | | Problem reported by: kris
* - update to 0.23clsung2006-08-102-6/+4
| | | | | | PR: ports/101760 Submitted by: clsung Approved by: maintainer <chinsan dot tw_AT_gmail dot com>
* - ruby-crypt is a pure-ruby implementation of a number of popularclsung2006-08-105-0/+51
| | | | encryption algorithms.
* - Update to 0.9.10.2rafan2006-08-103-14/+4
| | | | | PR: ports/101585 Submitted by: Robin Gruyters <r.gruyters at yirdis.nl> (maintainer)
* Add optional OpenSC PIN patch which make it possible for OpenSSH to asksimon2006-08-092-0/+137
| | | | | | | for a PIN when using an OpenSC smartcard. Approved by: mnag (maintainer) Patch obtained from: http://bugzilla.mindrot.org/show_bug.cgi?id=608
* - INSTALLS_SHLIBS is obsolete, USE_LDCONFIG should be used insteadsergei2006-08-091-1/+1
| | | | Noticed by: garga
* - Update to 0.81sergei2006-08-093-8/+40
| | | | | - Require bglibs >= 1.100 for shlib support - Add INSTALLS_SHLIBS as the port now installs shared libraries, too
* - Update to 0.7.5clsung2006-08-092-4/+4
| | | | | | | | | | | | | | | | original package changes: - fixed invalid filename encoding with german umlauts in base64 - Fixed display of UTF8 characters in the GUI - Add environment variable - Fixed crash when CA is created with nsCertType - Enhanced version detection - Changed command for openssl due to changed openssl behavior regarding fingerprints - Added "friendly name" to PKCS#12 export - Corrected exit call PR: ports/101558 Submitted by: maintainer (Janos Mohacsi)
* Primary MASTER_SITE appears to be down right now. Put my copy upade2006-08-091-1/+3
| | | | into MASTER_SITE_LOCAL and temporarily adjust accordingly.
* Add p5-PerlCryptLib 1.03, perl interface to Peter Guttman cryptlib API.clsung2006-08-095-0/+48
| | | | | PR: ports/101658 Submitted by: Gea-Suan Lin <gslin at gslin.org>
* - fix dependencyclsung2006-08-091-5/+7
| | | | | | | | - bump PORTREVISION PR: ports/101541 Submitted by: Jin-Shan Tseng <tjs_AT_cdpa dot nsysu dot edu dot tw> Approved by: maintainer
* Add CVE name to recent ClamAV entry.simon2006-08-091-0/+1
|
* Respect DESTDIRgarga2006-08-092-36/+46
| | | | | Reworked by: gabor Tested by: gabor
* Document clamav and clamav-devel vulnerabilitygarga2006-08-081-0/+43
| | | | Reviewed by: secteam (mnag)
* - Update to 20060808garga2006-08-082-5/+5
| | | | - s/INSTALLS_SHLIB/USE_LDCONFIG/
* - Fix discovery date in latest entrymnag2006-08-081-2/+3
| | | | - Remove extra "." in latest entry
* - Change to use MASTER_SITE_RUBYFORGE macro to fix fetch problem.jmelo2006-08-082-2/+4
| | | | Approved by: portmgr (erwin)
* - Update to 0.88.4garga2006-08-082-7/+6
| | | | | | | - Use USE_LDCONFIG instead obsolete INSTALLS_SHLIB - Use new MASTER_SITES magic to SF Security: http://www.clamav.net/security/0.88.4.html
* - Update to 0.002clsung2006-08-082-4/+4
| | | | | | PR: ports/101629 Submitted by: clsung Approved by: maintainer (Gea-Suan Lin)
* - Fix typo, unbreak INDEX, salvage the worldpav2006-08-081-1/+1
| | | | Pointy hat to: clsung
* - Update to 5.43clsung2006-08-073-9/+19
| | | | | | | | | - PurePerl.pm has used "eval" to try MIME::Base64 & Digest::base, so add these dependencies. PR: ports/101406 Submitted by: Gea-Suan Lin <gslin_AT_gslin dot org> Approved by: maintainer (gkovesdan_AT_t-hosting dot hu)
* Fix MASTER_SITES and make it fetchable againgarga2006-08-071-1/+2
| | | | | PR: ports/101581 Submitted by: Yonatan <onatan at gmail.com> (maintainer)
* - Fix build on 4.xmiwi2006-08-074-2/+4
| | | | | | | - Fix pkg-plist Submitted by: pointyhat via kris Approved by: krion (mentor)
* - Respect DESTDIR for all my portsmiwi2006-08-071-1/+1
| | | | | Reviewed by: gabor Approved by: krion (mentor)
* - Add readline as dependency when it was already installed. The programrafan2006-08-071-1/+1
| | | | | | | | will be linked against it anyway, not against a system one. PR: ports/101439 Submitted by: Stanislav Sedov <ssedov at mbsd.msk.ru> Approved by: David Thiel <lx at redundancy.redundancy.org> (maintainer)
* - Release maintainership:sat2006-08-071-1/+1
| | | | | | | | | | | | | | | | I have jumped in over my head with maintaining the port, both in terms of my skills with significantly modifying a port (particularly in getting the port from 2.4.5 to 2.6.0), not using snort enough to really test the full package, and not enough time to improve the port. With that said, there still is ports/99862 that is still open (re: bring security/snort to 2.6.0) which I have it the wall on trying to get the port to deinstall cleanly due to the optional nature of some components. I will continue to help out with other ports that I can take on and those that I can still take on maintainership. PR: ports/101526 Submitted by: Linh Pham <question+fbsdports@closedsrc.org> (maintainer)
* Fix build on FreeBSD 4.x.shaun2006-08-071-0/+3
| | | | Submitted by: pointyhat via kris
* Update to 0.1.1.23arved2006-08-063-8/+10
| | | | | PR: 101331 Submitted by: Peter Thoenen <peter.thoenen@yahoo.com> (maintainer)
* Support DESTDIRerwin2006-08-061-1/+1
| | | | | PR: 101431 Submitted by: gabor (maintainer)
* Support DESTDIRerwin2006-08-061-1/+2
| | | | | PR: 101429 Submitted by: gabor (maintainer)
* - update to 5.43clsung2006-08-052-4/+4
| | | | | PR: ports/101405 Submitted by: Gea-Suan Lin <gslin_AT_gslin dot org>
* Fix build after DESTDIR update.erwin2006-08-051-1/+11
| | | | Submitted by: gabor
* - Fix pkg-plistrafan2006-08-051-0/+1
| | | | | Noticed by: pointyhat via erwin Pointyhat to: rafan
* This library implements Blowfish, DES, and Triple-DES.itetcu2006-08-054-0/+59
| | | | | | | | Author: Gerd Stolpmann WWW: http://www.ocaml-programming.de/packages/ PR: ports/101213 Submitted by: Stanislav Sedov <ssedov at mbsd.msk.ru>
* - New port: security/linux-krb5-libsacm2006-08-0412-0/+349
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Kerberos V5 is an authentication system developed at MIT. (Linux version) WWW: http://web.mit.edu/kerberos/ - New port: security/linux-openssl The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL tookit and its related documentation. OpenSSL is based on the excellent SSLeay library developed by Eric A. Young and Tim J. Hudson. The OpenSSL toolkit is licensed under an Apache-style licence, which basically means that you are free to get and use it for commercial and non-commercial purposes subject to some simple license conditions. (Linux version) WWW: http://www.openssl.org/ Approved by: garga (mentor)
* Add support for DESTDIR part I.erwin2006-08-043-7/+6
| | | | | | | | | | | | | | This commit should largele be a NOOP as it only adds support for DESTDIR undefined. This does allow us to start testing ports with DESTDIR set, but this is as of yet not supported. Although this has been extensively tested on pointyhat, this is a very intrusive change and some cases may have been overlooked. Please contact Gabor and me if you find any. PR: 100555 Submitted by: gabor Sponsored by: Google Summer of Code 2006
* - Mark BROKEN [1]erwin2006-08-041-0/+4
| | | | | | - Mark DEPRECATED [2] Submitted by: pointyhat [1], maintainer [2]
* - update to 1.4aleeym2006-08-042-9/+5
|
* - Update tor to 1.1.20 (former development branch)johans2006-08-039-74/+170
| | | | | | | | | - Submitter becomes new maintainer (approved by old maintainer) - Use rc.subr PR: 98373 Submitted by: Peter Thoenen Approved by: flz (mentor)
* Mark DEPRECATED, as free license keys are no longer availablemarius2006-08-031-0/+3
| | | | | | | | | | | since September 2005, with an EXPIRATION_DATE of 2006-08-31, as all free license keys that still might be in use should have expired by then. If anyone is actually using this port with a commercial license key, feel free to adopt this port. Otherwise this port will be deleted after the above EXPIRATION_DATE. Approved by: netchild
* Update drupal to 4.6.9 to fix yet another XSS vulnerability.brooks2006-08-031-0/+27
| | | | Security: vuxml vid c905298c-2274-11db-896e-000ae42e9b93
* Add p5-Crypt-OICQ, cryptographic algorithm used by OICQ protocol.rafan2006-08-035-0/+41
| | | | This is for chinese/oicq.
* - ignore OpenSSL 0.9.7* on CUREENT >= 700019dinoex2006-08-021-1/+18
| | | | - break out if shared lib version in port is less than base
* Add recent gnupg issue.kuriyama2006-08-021-0/+28
|
* - Upgrade to 1.4.5.kuriyama2006-08-026-14/+26
| | | | | | | | | (fixes 2 more possible memory allocation attacks). - Enable OPTIONS [1]. Security: http://lists.gnupg.org/pipermail/gnupg-announce/2006q3/000229.html PR: ports/93540 [1] Submitted by: Pawel Wieleba <P.Wieleba@iem.pw.edu.pl> [1]
* Add pecl-tcpwrap 1.0, a PECL extension which provides tcpwrappersclsung2006-08-014-0/+33
| | | | | | | binding. PR: ports/101136 Submitted by: chinsan <chinsan.tw at gmail.com>
* Add httprint 301, web server fingerprinting tool.rafan2006-08-015-0/+89
| | | | | PR: ports/101004 Submitted by: Yonatan <onatan at gmail.com>
* New port: security/gpassacm2006-08-015-0/+75
| | | | | | | | | | | | | | | | | | | | | | | | | | The GNOME Password Manager - GPass for short - is a simple application, written for the GNOME 2 desktop, that lets you manage a collection of passwords. The password collection is stored in an encrypted file, protected by a master-password. GPass is released under the GNU GPL2 licence. Features: * Clean and easy-to-use user interface. * Quick-search facility. * Username and password may easily be copied to the clipboard. * Encryption is done using the OpenSSL cryptographics library. * The built-in password generator helps you generate secure passwords. * You can launch a website and the associated username/passwords direct from GPass Author: Kouji TAKAO <kouji -at- netlab.jp> WWW: http://projects.netlab.jp/gpass/ PR: ports/100845 Submitted by: ports_at_c0decafe.net <ports at c0decafe.net> Approved by: garga (mentor)
* Fix typo in UNZOO optionerwin2006-08-011-2/+2
| | | | | PR: 101129 Submitted by: gabor (maintainer)
* Update to 1.1.2ade2006-08-015-10/+30
| | | | | | | Submitter (author) taking over maintainership from myself PR: 100916 Submitted by: andrew@arda.homeunix.net
* - Update to latest release (0.1.1.23)clsung2006-08-012-5/+4
| | | | | PR: ports/101131 Submitted by: maintainer (Peter Thoenen)
* A new port, security/metasploit-devel is coming to town.itetcu2006-08-012-0/+6
| | | | | | | | | | | | It will be based on Ruby instead of perl, have a different license, and some utilities (msfconsole, msfencode...) will conflict with the current metasploit package. This update comes to preempt the conflicts and to clarify the pkg-descr. Bump PORTREVISION. PR: ports/101090 Submitted by: Yonatan (maintianer)
* - Update to 0.10novel2006-08-013-17/+8
| | | | | | | - Pass maintainership to submitter PR: 101112 Submitted by: chinsan <chinsan.tw@gmail.com>
* - Fix a bug when using LMTP transfererwin2006-07-312-11/+74
| | | | | | | - Make some archiver support optionally PR: 101071 Submitted by: gabor (maintainer)
* - update to 0.55clsung2006-07-312-5/+4
|
* - Provide additional mirrors where neededsat2006-07-312-9/+2
| | | | | - Convert to "magic" master sites - Various minor portlint-prodded fixes
* Add isnprober 1.02, penTest tool for TCP Initial Sequence Numbersrafan2006-07-314-0/+43
| | | | | | | research. PR: ports/101005 Submitted by: Yonatan <onatan at gmail.com>
* We are not affected by: CAN-2005-0018 in theremko2006-07-301-1/+1
| | | | | | | f2c entry (43cb40b3-c8c2-11da-a672-000e0c2e438a). We do not have the shellscript, and it is not installed. Reported by: thierry
* Unbreak latest ruby entry by adding missing </lt>.simon2006-07-301-1/+1
|
* Run make tidy to clean up some style issues.simon2006-07-301-159/+104
|
* Only sort on entry date, not modified date. It simply causes too muchsimon2006-07-301-1/+1
| | | | | repo churn with little value to resort all entries which have been modified.
* - The last vulnerabilities was fixed in ruby18 portsem2006-07-301-1/+2
|
* - Update to 1.2.2miwi2006-07-302-5/+4
| | | | | | PR: ports/101002 Submitted by: miwi Approved by: krion (mentor), maintainer
* OK, I misunderstood Simon with this one. The <gt>1.8.*</gt> entryremko2006-07-301-0/+1
| | | | | | should have stayed and I interpreted that wrong. Pointyhat: remko
* - Add NAT keepalive capability as per RFC 3947miwi2006-07-302-1/+49
| | | | | | | | - Bump PORTREVISION PR: ports/100814 Submitted by: Daniel Roethlisberger <daniel(at)roe.ch> Approved by: krion (mentor), maintainer
* Fix my previous version commit. The two entries matched twice when youremko2006-07-301-2/+1
| | | | | | have ruby installed. You learn something new everyday... Noticed/discussed with: simon
* - Update to 1.2.6miwi2006-07-302-6/+5
| | | | | | | | | - Remove snort from depends [1] PR: ports/100783 Submitted by: Linh Pham <question+fbsdports(at)closedsrc.org> Kian Mohageri <kian.mohageri(at)gmail.com> [1] Approved by: krion (mentor)
* Mark all 1.6 and 1.8 versions as vulnerable, we do not have a fixremko2006-07-301-2/+2
| | | | | | | | yet and are unable to tell what the naming scheme will be with those patches. We can narrow down the scope later, we should not do so before we know the mentioned scheme. Triggered by: sem
* Add a BID to the latest vuxml entry.remko2006-07-301-28/+16
| | | | Some minor changes to the markup of the entry.
* - Document Ruby vulnerability. [1]shaun2006-07-301-1/+53
| | | | | | - Fix URL in previous mutt entry while here. Reported by: Joel Hatton via freebsd-ports [1]
* Add linux-thunderbird to mozilla -- multiple vulnerabilities entry.simon2006-07-291-1/+2
| | | | Prodded by: sat
* - Added post-extract on Makefiles.units. It remove the svn directories fromacm2006-07-292-0/+2
| | | | | | | | | | | some fpc ports. - Added PORTREVISION for each port - Fixed pkg-plist on fpc-gtk2 and fpc-gtk ports - Fixed the gtk, glib and gdk libraries linking for fpc-gtk - Removed obsolete patches from fpc-gtk. Now it's using ${REINPLACE_CMD} - Removed post-extract from fpc-fcl. I just added it to makefiles.units file Approved by: garga (mentor)
* Document apache -- mod_rewrite ldap buffer overflow vulnerability.simon2006-07-291-0/+99
| | | | | Thanks to remko for doing initial list of apache package names in an earlier VuXML entry.
* - Update to 0.5acm2006-07-292-4/+4
| | | | Approved by: garga (mentor)
* - Fix MASTER_SITESsat2006-07-281-1/+1
| | | | Pointy hat to: garga
* 1 - build and install lib/openvpn-down-root.so plugin (see --plugin option initetcu2006-07-2812-9/+165
| | | | | | | | | | | | | | | | | the man page) and README.openvpn-down-root 2 - match rc.d filename as printed post install in pkg-message to actual file name on newer systems (which use openvpn rather than openvpn.sh) Reported by: Jean-Baptiste Quenot (Bcc'd) The maintainer wishes to thank Jean-Baptiste for his report and patience. 3 - add a pkg-req script to prevent installation of 6.1 packages on older machines, which is a frequent source of "rc.d script doesn't work" complaints. Added file(s): - files/pkg-req.in PR: ports/100917 Submitted by: Matthias Andree (maintainer)
* - Updating the Osiris integrity checking system to 4.2.1. This version includesitetcu2006-07-283-72/+5
| | | | | | | | | the format string exploit fixes that were also in the patch in 4.2.0_1 (hence removed). - Also updating master site to the new official one. PR: ports/100952 Submitted by: David Thiel (maintainer)
* fix option textmharo2006-07-281-1/+1
| | | | Reported by: Nick Fishman <kwlogical@bellsouth.net>
* Fix error in latest mozilla entry which marked all firefox version assimon2006-07-281-1/+2
| | | | | | vulnerable. Reported by: Craig Leres
* Fix typo in previous commit.shaun2006-07-281-1/+1
|
* - Fix build on 64-bit machines.shaun2006-07-283-8/+19
| | | | | | | | | - Mark IGNORE on !i386, due to a run-time issue. - Use DATADIR macro in pkg-plist while here. PR: ports/99949 Submitted by: shaun (me) Approved by: Maintainer timeout (19 days)
* Document mozilla -- multiple vulnerabilities.simon2006-07-271-0/+99
| | | | | Note I assume that linux-firefox-devel 3.0.a2006.07.26 is fixed, I haven't actually checked (way to many issues to check for).
* Fix build on 4.xgarga2006-07-272-4/+10
| | | | Submitted by: Robin Gruyters <r.gruyters@yirdis.nl> (maintainer) by email
* (c) Rong-En Fan's, http://rafan.infor.org/patch/sshit.diffrafan2006-07-272-0/+40
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | In the code, the author uses two level hash, and IPC::Shareable will create a share memory for those anonymouse object (the second level hash). Those share memory will not be removed when sshit exists or when the rule is removed. Running sshit for a period of time, the number of share memory and semaphore will reach the limit for one process, then sshit.pl can not get more share memory, thus it quits. The only solution is to manually remove all share memory and semaphore. This is somehow the limitation of using IPC::Shareable. To workaround this problem. The patch will removes associated firewall rules when syslogd closes the fd [1], and use IPC::Shareable->clean_up to remove all shm/sem created by this process. I also set 'destroy' to 1 so the shm tied to %list can be removed. The second hunk is to fix a typo for ipfw2. Due to this typo, ip in ipfw2's table cat not be removed. That means once blocked, the client is blocked until reboot or admin cleanup the table. [1] if any log files are rotated, newsyslog sends a HUP to syslogd, syslogd will close *all* current open fd and reopen them. At that time, the sshit.pl's stdin will be closed, thus the main program will exit. PR: ports/100726 Submitted by: Alex Samorukov <samm at os2.kiev.ua> Approved by: Jui-Nan Eric Lin <jnlin at csie.NCTU.edu.tw> (maintainer) Obtained from: rafan
* Add courieruserinfo 1.1.2, user account information retrieval utility.clsung2006-07-276-0/+101
| | | | | PR: ports/100900 Submitted by: Andrew St. Jean <andrew at arda.homeunix.net>
* - Update to release 1.1.2clsung2006-07-274-6/+76
| | | | | | | | - Port now installs some extra documentation into ${DOCSDIR}. - Added pkg-message and pkg-plist to port. PR: ports/100897 Submitted by: maintainer (andrew_AT_arda dot homeunix)
* - Update to 0.9.10.1garga2006-07-262-4/+8
| | | | | | | - Mark it as BROKEN on 4.x. Maintainer will alert authors to fix it. PR: ports/100854 Submitted by: Robin Gruyters <r.gruyters@yirdis.nl> (maintainer)
* Patching osiris in response to CVE-2006-3120.itetcu2006-07-262-1/+68
| | | | | | | | | | | "Ulf Harnhammar and Max Vozeler from the Debian Security Audit Project have found several format string security bugs in osiris, a network-wide system integrity monitor control interface. A remote attacker could exploit them and cause a denial of service or execute arbitrary code." PR: ports/100793 Submitted by: David Thiel (maintainer) Security: CVE-2006-3120
* * Update to 0.7.5garga2006-07-253-4/+5
| | | | | | | | | | | | | | CHANGES: - Added parsing for multiple route-to's - Added parsing of "set skip" statements - Added Optionsclass unit test script - Fixed the natedit page so that is reloads automatically when it should. - Fixed a small XHTML compliance problem which sometimes would generate & instead of &amp; - Moved the stylesheet fromt the body to the header on a lot of web scripts for xhtml compliance reasons - Changed from statically defining font size on the screen to a relative measurement. This allows changing of font size on IE
* Update to 20060724garga2006-07-242-4/+4
|
* - update to 5.42clsung2006-07-242-4/+4
|
* - Update mastersite.jmelo2006-07-242-36/+6
| | | | | | | - Update pkg-descr. PR: ports/100715 Submitted by: Babak Farrokhi <babak@farrokhi.net> (maintainer)
* - The big change on ports of freepascal, now all ports are compiledacm2006-07-244-4/+34
| | | | | | - Adding entry for lang/fpc-utils Approved by: garga (mentor)
* - Respect CC and CFLAGSgarga2006-07-231-4/+4
| | | | - Unquote RESTRICTED
* - Update to 0.3.4sat2006-07-232-5/+5
|
* Change maintainer address to my @FreeBSD.org emailacm2006-07-233-3/+3
| | | | Approved by: garga (mentor)
* - Update to 0.1.0miwi2006-07-234-12/+13
| | | | | | PR: ports/100717 Submitted by: Fabian Keil <fk@fabiankeil.de> Approved by: krion (mentor)
* - Update to 0.1.0miwi2006-07-233-5/+5
| | | | | | PR: ports/100716 Submitted by: Fabian Keil <fk@fabiankeil.de> Approved by: krion (mentor)
* Add trans-proxy-tor, transparent proxy used to redirect TCPmiwi2006-07-2210-0/+321
| | | | | | | | | | | | | | | | connections into Tor. trans-proxy-tor is a transparent proxy that uses PF to redirect TCP connections through Tor (http://tor.eff.org/). Programs that aren't aware of Tor will use it without their knowledge, and their traffic no longer leaves the system unencrypted. PR: ports/99034 Submitted by: Fabian Keil <fk at fabiankeil.de>
* Add dns-proxy-tor, resolves DNS requests through Tor.miwi2006-07-229-0/+283
| | | | | | | | | | | | dns-proxy-tor is a DNS server that stops DNS leaks with applications that don't support or aren't configured to use socks4a or Tor's DNS resolution. WWW: http://http://p56soo2ibjkx23xo.onion/ PR: ports/99033 Submitted by: Fabian Keil <fk at fabiankeil.de>
* - Update to 0.9.402rafan2006-07-213-134/+169
| | | | | PR: ports/100612 Submitted by: maintainer
* - Update to 0.9.8.1rafan2006-07-213-19/+15
| | | | | | | | | - OPTIONS'ify Note that now MySQL is the default backend, which is also recommended by Prelude team. PR: ports/100530 Submitted by: maintainer
* - Update mastersite.jmelo2006-07-211-4/+3
| | | | | | PR: ports/99783 Submitted by: tjs <tjs@cdpa.nsysu.edu.tw> Approved by: maintainer (timeout 15 days)
* Add p5-Data-Entropy 0.000, entropy (randomness) management.clsung2006-07-205-0/+77
| | | | | PR: ports/100547 Submitted by: Gea-Suan Lin <gslin at gslin.org>
* Clean up sig_stop values. In most cases this means removing a leading -,dougb2006-07-202-2/+1
| | | | | since rc.subr adds that already. In 3 cases it meant removing a wrongly specified TERM, since that is the default.
* - Update to 0.9.10rafan2006-07-193-8/+11
| | | | | | | | Note that though shlib version bumped, no ports need to be changed. - OPTIONS'ify PR: ports/100490 Submitted by: maintainer
* - update to 3.7.0clsung2006-07-194-9/+10
| | | | | PR: ports/100517 Submitted by: maintainer
* - Update to 1.2.20miwi2006-07-192-4/+4
| | | | | | PR: ports/99269 Submitted by: miwi Approved by: markus (co mentor), maintainer timeout
* Update to 1.5.8miwi2006-07-192-5/+4
| | | | | | PR: ports/99271 Submitted by: miwi Approved by: markus (co mentor), maintainer timeout
* Upgrade to 20060712a.sumikawa2006-07-185-26/+36
|
* - update to 2.0.3clsung2006-07-173-12/+14
| | | | | | | - adopt maintainership PR: ports/100386 Submitted by: maintainer (Babak Farrokhi)
* Mark broken as appropriate: does not compile on 4.X, does not package on 5.X.linimon2006-07-171-0/+8
|
* Cause the KDC to also listen on the loopback interface. This is usefulcy2006-07-178-0/+304
| | | | | for situations when the database is replicated to a secure environment that does not have network access, by hand.
* Fix plugin loader. This fixes krb5kdc and kdb5_util.cy2006-07-1748-0/+1344
|
* - update to 3.26.1clsung2006-07-163-11/+11
| | | | | | | | - take maintainership - pet portlint PR: ports/100387 Submitted by: maintainer (Babak Farrokhi)
* Fix WWWgarga2006-07-161-1/+1
| | | | | PR: ports/100354 Submitted by: maintainer
* Use PLIST_FILES instead of PLIST.linimon2006-07-161-1/+1
| | | | Pointy hat to: miwi
* Update the portrevision that wasn't part of the patchjeh2006-07-151-1/+1
|
* Add support for amd64jeh2006-07-152-7/+18
| | | | | PR: 100263 Submitted by: swhetzel@gmail.com
* Update 1.4.3 --> 1.5cy2006-07-1520-104/+100
|
* - Update to 1.4.1novel2006-07-153-5/+7
| | | | | - Remove --with-included-libtasn1 from CONFIGURE_ARGS (should have been done that earlier actually)
* This is a pure perl implementation of the new AES Rijndael. You wanterwin2006-07-145-0/+38
| | | | | | | | | | to use Crypt::Rijndael where available. This implementation is really slow, but I am working on it. WWW: http://search.cpan.org/dist/Crypt-Rijndael_PP/ PR: ports/100262 Submitted by: Gea-Suan Lin <gslin at gslin.org>
* Add "zope -- information disclosure vulnerability" entrygarga2006-07-141-0/+30
| | | | Reviewed by: simon
* For latest drupal entry:simon2006-07-141-14/+3
| | | | | | - Unbreak vuln.xml format by adding content to the references section. - Remove vulnerabilities already documented in 40a0185f-ec32-11da-be02-000c6ec775d9.
* Update to 3.2.3 release:ale2006-07-149-26/+83
| | | | | | - OPTIONSify (respect CFLAGS / OPTIMIZED_CFLAGS) - Add support for PKCS#11 tokens - Grap maintainership
* - Fix error to build on 4.Xclsung2006-07-141-1/+6
| | | | | | | - Take maintainership PR: ports/100205 Submitted by: chinsan <chinsan dot tw_AT_gmail dot com>
* Add entry for drupal issues.brooks2006-07-141-0/+42
|
* - security/libtomcrypt is up to 1.13 now. The attached patch updates theclsung2006-07-132-5/+5
| | | | | | | port and makes the IGNORE string read properly. PR: ports/100210 Submitted by: maintainer (Wesley Shields)
* - Add OPTIONS for nmap (default on) and lsof (default off) RUN_DEPENDs foritetcu2006-07-131-2/+13
| | | | | | | | | additional checks - bump portrevision PR: ports/99432 Submitted by: Babak Farrokhi <babak@farrokhi.net> Approved by: maintianer timeout
* Add a port of "knock" - a flexible port-knocking server and client.shaun2006-07-136-0/+129
| | | | | | PR: ports/94626 Submitted by: shaun (me) Approved by: ahze (mentor, implicit)
* Forgot to add the script itselfsem2006-07-121-0/+24
|
* - Fix PROVIDE: line in a startup scriptsem2006-07-123-36/+2
| | | | | | | - New style of startup script install PR: ports/100139 Submitted by: Alexander Logvinov <user_at_blg.akavia.ru>
* - Updating the CSP Certificate Authority tool to 0.33, a bugfix release.clsung2006-07-122-4/+4
| | | | | PR: ports/100128 Submitted by: maintainer (David Thiel)
* - Updating libssh2 to 0.14. Changes:clsung2006-07-122-4/+4
| | | | | | | | | | | | | - Plug leaks in EVP cipher init/shutdown. (Selcuk Gueney) - Allow socket_fd == 0 in libssh2_session_startup(). (puudeli) - Swap ordering of packet_add/packet-inspection to avoid inspect after - free. (Selcuk) - Swap KEX_INIT ordering, send our KEX_INIT first. - Add check for oportunistic KEX_INIT packets. Burn bad guess if necessary. - Fix OpenSSL detection using pkg-config. (Dan Casey) PR: ports/100127 Submitted by: maintainer (David Thiel)
* Fix build on 4.xitetcu2006-07-121-1/+3
| | | | Submitted by: maintainer (on irc)