Commit Graph

188 Commits

Author SHA1 Message Date
naddy
348a3e29c5 drop RCS Ids 2022-03-11 19:34:31 +00:00
tb
ef51252a16 mail/fetchmail: the workaround that was added in the early days of the
new verifier is no longer needed.

tested by/ok bluhm
2021-12-06 20:24:57 +00:00
ajacoutot
0fe92220a4 'CFLAGS =' -> 'CFLAGS +=' so that our default CFLAGS aren't overriden. 2021-10-31 10:18:38 +00:00
sthen
555c0d8a8c update to fetchmail-6.4.22 2021-10-21 20:52:53 +00:00
sthen
441a78afd4 update to fetchmail-6.4.21 2021-08-09 19:20:26 +00:00
sthen
6ca653e2e4 update to fetchmail-6.4.20 2021-07-29 10:44:07 +00:00
sthen
6cd35da717 update to fetchmail-6.4.13. 2021-03-28 13:32:50 +00:00
sthen
3cbe1c2f30 Reverse the polarity of MODPY_VERSION; default is now 3.x,
if a port needs 2.x then set MODPY_VERSION=${MODPY_DEFAULT_VERSION_2}.

This commit doesn't change any versions currently used; it may be that
some ports have MODPY_DEFAULT_VERSION_2 but don't require it, those
should be cleaned up in the course of updating ports where possible.

Python module ports providing py3-* packages should still use
FLAVOR=python3 so that we don't have a mixture of dependencies some
using ${MODPY_FLAVOR} and others not.
2021-02-23 19:39:08 +00:00
tb
6ef422d1bd fetchmail: use legacy certificate verification
beck's shiny new validator found its first victim. bluhm saw warnings
from fetchmail's verify callback and once we investigated, it was quick
to segfault since it doesn't bother to check return values. Failures are
more visible to the callback than they previously were.  Fixing this
mess is more work than it's worth, so let it use the old garbage.

with & ok beck, tested & ok bluhm
2020-09-14 15:14:55 +00:00
tb
d879c7e6af update fetchmail to 6.4.12
Not much changed, it gained translations for Romanian and Serbian,
documentation fixes and saw some package config churn to make sure
FreeBSD links against the correct libssl.

ok kn
2020-09-13 19:01:23 +00:00
tb
d85d81da99 fetchmail: use OpenSSL 1.1 code path
Instead of relying on an untested code path that uses version fixed
TLS client methods and the made-up TLSv1_3_client_method() in case
TLS1_3_VERSION is defined, we can just use the code path provided for
the OpenSSL 1.1 API. While it seems reasonable to assume that such a
client method might be available, version fixed methods are deprecated.
TLSv1_3_client_method() never existed in either LibreSSL or OpenSSL.

This will make sure that the port works correctly now and will
continue to build and work correctly once LIBRESSL_HAS_TLS1_3
becomes publicly visible.

ok jsing
2020-09-07 09:40:53 +00:00
sthen
efab8587a8 update to fetchmail-6.4.6 2020-06-12 13:02:35 +00:00
sthen
0468f9e1b7 update to fetchmail-6.4.3 2020-04-15 19:48:39 +00:00
sthen
894d97f328 update to fetchmail-6.4.2 2020-02-15 15:55:51 +00:00
sthen
00b10cf194 update to fetchmail-6.4.1 2020-01-27 13:48:45 +00:00
sthen
3318ced016 replace simple PERMIT_PACKAGE_CDROM=Yes with PERMIT_PACKAGE=Yes 2019-07-12 20:46:54 +00:00
naddy
ebf751b927 Update gettext to 0.20.1.
Follow the upstream recommendations for packagers and switch to
multi-packages:
devel/gettext       -> devel/gettext,-runtime
devel/gettext-tools -> devel/gettext,-tools
(new)                  devel/gettext,-textstyle
2019-05-20 22:15:00 +00:00
naddy
1a87aebd2d mechanical replacement of the gettext module 2017-11-21 00:12:59 +00:00
bluhm
ea73c9a359 Do not overrun plugin string when copying it. Prevents sporadic
segmentation fault in fetchmail.  Fix reported to upstream.
OK jca@
2017-08-11 04:18:19 +00:00
espie
511c5d230a a few minor pkg_subst fixes, for the coming patch (disallow -c without -m
outside of WRKDIR)
2015-11-02 11:56:54 +00:00
sthen
691c83f9b2 Bump some ports which reference if_msghdr in their source, so that package
updates are triggered. This is following the struct if_data ABI change a few
days ago; if_msghdr has an embedded if_data.  Some may be unnecessary, but
some are definitely needed and bumps are cheaper than debugging.
Problem reported with wpa_supplicant by Mikolaj Kucharski.
2015-10-08 21:19:21 +00:00
jca
c3e194b1a4 Fixed upstream. 2015-08-25 17:44:09 +00:00
sthen
b390395ee7 cope if SSLv3 is disabled 2015-07-18 04:51:29 +00:00
jasper
5c884092b6 remove a whole bunch more @rm -f cases 2015-05-25 07:54:27 +00:00
jasper
08dd19bb58 update to fetchmail-6.3.26 2014-06-21 07:58:28 +00:00
ajacoutot
31fd7cb173 No Kerberos 4. 2014-04-21 22:24:49 +00:00
ajacoutot
03eb3a7d35 Drop kerberos support. 2014-04-21 13:18:31 +00:00
sthen
27f03b1c52 bump REVISION for any ports using route messages. regen some distinfos and
remove unnecessary USE_GROFFs while there.
2013-10-31 21:12:12 +00:00
ajacoutot
64a6588efb No need for pthread. 2013-06-20 08:26:13 +00:00
ajacoutot
25b3041f91 Unbreak after hx509 and ntlm removal from Kerberos. 2013-06-20 06:54:36 +00:00
ajacoutot
9920238d6f Unbreak with new Heimdal; get rid of self-cooked krb5-config since we
have it in base now.
2013-06-17 19:30:22 +00:00
espie
0662a4e9d6 PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:20:26 +00:00
sthen
e12fe2008d update to fetchmail 6.3.24 2013-01-14 01:42:24 +00:00
sthen
56f997a440 adjust HOMEPAGE, it moved off berlios to fetchmail.info. 2012-08-21 23:18:24 +00:00
jasper
c4ca0038b2 - let these work if sslv2 is disabled, from Brad 2012-06-26 10:10:20 +00:00
jasper
de9dbcd511 somehow i folded two commits into one, revert non-security fix. 2012-06-22 14:38:28 +00:00
jasper
c694064090 Fix potential for information disclosure under active attack. CVE-2011-3389
from brad
2012-06-21 15:43:59 +00:00
sthen
88ea72915d Change SEPARATE_BUILD=(concurrent|simple) to Yes; bsd.port.mk doesn't
make a distinction between these.  ok aja@ dcoppa@
2012-03-29 13:38:12 +00:00
sthen
b76000269d struct ifnet; bump 2011-11-16 00:02:38 +00:00
sthen
9422ba86e1 python is actually a build dep. pointed out jasper@ 2011-10-11 10:43:13 +00:00
sthen
6e18f060b0 Adjust the fetchmailconf wrapper to check ${MODPY_BIN} rather than
/usr/local/bin/python. Also check that python-tkinter is installed.
From Pascal Stumpf with tweaks from me.

(Python + tkinter aren't RUN_DEPENDs as many fetchmail installations
don't use this and it's a heavy dependency chain).
2011-08-24 19:18:57 +00:00
jasper
3e45ae7413 - update fetchmail to 6.3.21, includes a critical fix for imap/maildir users 2011-08-21 16:41:30 +00:00
sthen
02c6211f1a update fetchmail to 6.3.20, tested by jasper@, lots of fixes including:
* CVE-2011-1947
- use timeouts for IMAP STARTTLS/POP3 STLS negotiation which could cause
  fetchmail freezes if a server was hanging.
* security improvements to defang X.509 certificate abuse
- require wildcard CN/subject alternative names to start with "*." not just "*"
- don't allow wildcards to match domain literals (such as 10.9.8.7) or
  wildcards in domain literals ("*.168.23.23").
- don't allow wildcarding top-level domains.
2011-06-06 13:57:07 +00:00
espie
bc8dc9adb1 new depends 2010-11-19 07:23:05 +00:00
sthen
0666992301 fix tabs 2010-10-18 21:50:38 +00:00
espie
051dfa8362 USE_GROFF=Yes 2010-10-18 19:59:15 +00:00
stsp
8d294869c6 Add patch from upstream to fix bogus ssl check warning when the
sslfingerprint option is used.
hints and ok sthen@
2010-06-09 08:34:59 +00:00
giovanni
09a7c52666 Update to 6.3.17
ok kili@
2010-05-19 15:27:18 +00:00
jasper
168efadf72 - update fetchmail to 6.3.15
from charles smith, thanks.
2010-03-31 19:12:06 +00:00
sthen
3927255cfd security update to 6.3.14, heap overflow in verbose mode SSL cert display
on signed char arch. http://www.fetchmail.info/fetchmail-SA-2010-01.txt

"This might be exploitable to inject code if
- - fetchmail is run in verbose mode
AND
- - the host running fetchmail considers char signed
AND
- - the server uses malicious certificates with non-printing characters
  that have the high bit set
AND
- - these certificates manage to inject shell-code that consists purely of
  printable characters.

It is believed to be difficult to achieve all this."
2010-03-22 01:28:40 +00:00