Commit Graph

109 Commits

Author SHA1 Message Date
ajacoutot
c4096e6659 Stop using the daemon class in @newuser.
If we need to make an exception we can do it and properly document the
reason but by default we should just use the default login class.
rc.d uses daemon or the login class provided in login.conf.d so this has
no impact there.

discussed with sthen@, tb@ and robert@

praying that my grep/sed skills did not break anything and still
believing in portbump :-)
2022-11-08 11:16:56 +00:00
gsoares
4c07a9b0fd update to stunnel-5.64 2022-05-24 13:00:25 +00:00
gsoares
76ef3c7c56 Update to 5.63
OK sthen

### Version 5.63, 2022.03.15, urgency: HIGH
* Security bugfixes
   - OpenSSL DLLs updated to version 3.0.2.
* New features
   - Updated stunnel.spec to support bash completion.
* Bugfixes
   - Fixed a PRNG initialization crash (thx to Gleydson Soares).

... further changelogs
https://www.stunnel.org/NEWS.html
2022-03-16 17:28:26 +00:00
naddy
8c0294c2fa drop RCS Ids 2022-03-11 19:53:16 +00:00
sthen
77f7cc9c61 replace simple PERMIT_PACKAGE_CDROM=Yes with PERMIT_PACKAGE=Yes 2019-07-12 20:49:33 +00:00
jsing
73eeecb194 Remove LIBRESSL_VERSION_NUMBER related patches that are no longer needed.
ok gsoares@
2019-03-19 16:51:13 +00:00
tb
bec5903648 Clean up some LIBRESSL_VERSION_NUMBER patches that either did nothing
or provided functions that are now available in libcrypto.

ok gsoares, sthen (for a more aggressive earlier version)

I'll revisit the other bits at p2k18.
2018-04-14 09:05:14 +00:00
sthen
d207296dee unbreak now we have SSL_CTX_get_ciphers 2018-02-23 10:26:56 +00:00
rpe
9a8b5ccd06 Change the shebang line from /bin/sh to /bin/ksh in all ports rc.d
daemon scripts and bump subpackages that contain the *.rc scripts.

discussed with and OK aja@
OK tb
2018-01-11 19:27:01 +00:00
gsoares
576043f48e update to 5.44 2017-12-01 00:08:44 +00:00
gsoares
6447d0d401 update to 5.42
OK abieber@
2017-09-12 16:15:24 +00:00
gsoares
0cea3685c6 update to stunnel-5.39 2017-01-09 15:40:30 +00:00
gsoares
6e9005158d update to 5.38 2016-12-03 22:52:01 +00:00
gsoares
75687dd11c enable cert_check_subject() 2016-11-10 10:10:50 +00:00
gsoares
872f76e258 update to 5.37
OK benoit@
2016-11-09 23:14:31 +00:00
gsoares
4c7e0e3b0e update to 5.31
OK kili@
2016-04-24 12:07:48 +00:00
naddy
ce859edcb4 garbage collect CONFIGURE_SHARED 2016-03-11 20:28:21 +00:00
gsoares
e9d2ad4711 update to 5.29 2016-01-13 12:39:55 +00:00
gsoares
54ec9975b3 update to 5.27 2015-12-04 01:38:56 +00:00
gsoares
9606ca610b update to 5.26
builds and runs fine amd64/i386...
2015-11-25 02:37:51 +00:00
gsoares
a842c398ab *** empty log message *** 2015-10-14 02:05:06 +00:00
gsoares
420c7d8871 - update to 3.19;
- switch threading model to pthread since that it is the default process model in stunnel;
- fix stunnel.pem path in pkg/MESSAGE;
- add patches to make it build with libressl;
- fix some hardcoding paths in tools/stunnel.conf-sample.in.

Tweaks and Feedback:
jca@ yasuoka@ jasper@ brad@ and Markus Lude, thanks !

tested by yasuoka@ and Markus Lude on @sparc64(markus's tests against 3.18 version, but no many changes to 3.19, assuming that should work too...)...

full changelog at:
https://www.stunnel.org/sdf_ChangeLog.html
2015-06-25 14:44:30 +00:00
bentley
b3d1077859 Update mirrors, as this comment no longer applies. 2015-06-15 07:02:52 +00:00
gonzalo
8c44bfa2a4 Update for Stunnel to 5.06:
Security bugfixes

    OpenSSL DLLs updated to version 1.0.1j.
https://www.openssl.org/news/secadv_20141015.txt
    The insecure SSLv2 protocol is now disabled by default. It can be
enabled with "options = -NO_SSLv2".
    The insecure SSLv3 protocol is now disabled by default. It can be
enabled with "options = -NO_SSLv3".
    Default sslVersion changed to "all" (also in FIPS mode) to
autonegotiate the highest supported TLS version.

New features

    Added missing SSL options to match OpenSSL 1.0.1j.
    New "-options" commandline option to display the list of supported
SSL options.

Bugfixes

    Fixed FORK threading build regression bug.


OK gsoares@ (maintainer) OK schwarze@
2014-10-27 13:16:48 +00:00
ajacoutot
8d28dad502 Cope with openssl(1) move from /usr/sbin to /usr/bin
ok landry@
2014-08-27 06:58:00 +00:00
gsoares
05bfcfc5de update to 5.03
OK kili@
2014-08-22 02:22:25 +00:00
sthen
883319840e we don't have RAND_egd 2014-04-19 12:29:02 +00:00
dcoppa
03e0bb9161 Disable libwrap support.
Ok gsoares@ (maintainer)
2014-03-24 21:44:09 +00:00
sthen
4291ce340c SECURITY update to stunnel 5.00, fixes an issue similar to libssh and
postgresql where a forked child process doesn't correctly reset RNG state.
See CVE-2014-0016, http://www.openwall.com/lists/oss-security/2014/03/05/1

ok gsoares@

Note from upstream release notes:

"stunnel 5.00 disables some features previously enabled by default.
Users should review whether the new defaults are appropriate for their
particular deployments."

These changes include: FIPS mode, pid file generation and
libwrap disabled by default, and the default cipher list has
been updated to "HIGH:MEDIUM:+3DES:+DH:!aNULL:!SSLv2".
2014-03-17 13:03:11 +00:00
gsoares
3bb2993c2f missing RCS id. 2014-01-03 20:20:58 +00:00
gsoares
d4674b9ecc update to 4.56; OK benoit@ 2013-04-02 12:34:31 +00:00
ajacoutot
58f1a6f9f6 USE_LIBTOOL=Yes is the default now. 2013-03-21 08:45:11 +00:00
espie
eae66e4a7b PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:35:43 +00:00
gsoares
665d95b509 Security UPDATE to 4.55; Fix CVE-2013-1762
full changelog at:
https://www.stunnel.org/sdf_ChangeLog.html

OK sthen@
2013-03-05 14:10:40 +00:00
gsoares
9520aca711 - update to 2.54
- take maintainership

OK sthen@ (former maintainer)
2012-10-20 15:37:40 +00:00
gsoares
6457aa1c8d - update to 4.53
- drop maintainer per his request

ok sthen@
2012-08-09 14:13:59 +00:00
ajacoutot
689f54b24a --localstatedir=/var is the default now. 2012-04-28 10:52:08 +00:00
sthen
88ea72915d Change SEPARATE_BUILD=(concurrent|simple) to Yes; bsd.port.mk doesn't
make a distinction between these.  ok aja@ dcoppa@
2012-03-29 13:38:12 +00:00
ajacoutot
a89a75cd04 Garbage collect the /dev/arandom patches.
from Brad
ok landry@ sthen@
2012-03-08 12:13:00 +00:00
sthen
38fa0cfdea update to stunnel 4.50; use better MASTER_SITES while there. 2011-12-08 13:42:05 +00:00
sthen
1532a55649 update to stunnel 4.49 2011-11-30 19:37:21 +00:00
sthen
9aee28cec4 update to stunnel 4.44 2011-09-19 14:21:02 +00:00
sthen
911192190c update to stunnel 4.43, ok jakob@, reads good to william@
- take maintainer, suggested by jakob
- pid is now created inside the chroot jail, note you may want to set
"pid = /stunnel.pid" in config.
2011-09-15 00:42:21 +00:00
william
7832d1549c add rcscript
ok ajacoutot jakob (MAINTAINER)
2011-09-14 01:45:31 +00:00
ajacoutot
2d702b0153 Sanitize some @unexec/@extraunexec calls to rm: move them up in the
PLIST and delete everything under the @sample'd directory instead of the
directory itself to prevent a warning from pkg_delete(1) trying to
remove a non existing directory and to help preventing left-over files
and directories.
2011-05-11 08:24:40 +00:00
espie
6c283d7e98 new depends 2010-11-20 17:22:40 +00:00
espie
2ef1026971 USE_GROFF=Yes 2010-10-18 21:41:44 +00:00
ajacoutot
f7296e021c Remove PKGNAME=${DISTNAME} constructs where possible, as this is the
default anyway.

ok jasper@
2010-08-31 08:15:44 +00:00
jakob
f7188a8991 upgrade to stunnel v4.28 2009-11-14 06:32:25 +00:00
jakob
01b252f4ad update to stunnel v4.27 2009-05-28 18:08:49 +00:00