Commit Graph

355 Commits

Author SHA1 Message Date
sthen
7b4f6e326b portbump... 2022-11-08 11:41:47 +00:00
ajacoutot
c4096e6659 Stop using the daemon class in @newuser.
If we need to make an exception we can do it and properly document the
reason but by default we should just use the default login class.
rc.d uses daemon or the login class provided in login.conf.d so this has
no impact there.

discussed with sthen@, tb@ and robert@

praying that my grep/sed skills did not break anything and still
believing in portbump :-)
2022-11-08 11:16:56 +00:00
sthen
c324ada5d8 update to squid-5.7 2022-09-06 08:29:06 +00:00
sthen
0fc13db1f7 Enable the "rock" disk storage backend for www/squid, and mention in README
that to use it you will need to raise net.unix.dgram.sendspace above the
default of 2048 (it's trying to sendmsg a little above 4k). Add @sample
for the default dirs used for ipc communications.

Only lightly tested, but it's easier to test further if it's in the
default build.

Thanks tb@ for assistance in tracking down the limit that I was hitting.

For the benefit of future searches, the log message from squid when hitting
this case is:

src/comm/Write.cc(120) HandleWrite: FD 30 write failure: (40) Message too long
2022-06-10 20:04:14 +00:00
sthen
988e768f28 update to squid-5.6 2022-06-06 09:27:42 +00:00
sthen
d822bd52a5 update to squid-5.5 2022-04-15 08:25:38 +00:00
sthen
e7d39eb4ab sync WANTLIB 2022-03-24 21:44:18 +00:00
sthen
7f18136c30 fix bogus FULLPKGPATH-ldap, spotted by tb@ 2022-03-11 18:11:26 +00:00
sthen
a3bbbf40fa remove squid-ntlm subpackage. it contains ext_wbinfo_group_acl, which is
useless without samba's winbind, and an auth helper that calls smbclient via
a script to do some proxy auth, which is not exactly great, and in any
event doesn't need to be a subpackage.

For actual Squid auth against Windows directories look at the krb5 flavour
instead and the msktutil package may help; give a hint at this in the
package description.
2022-03-10 18:05:10 +00:00
sthen
b6966d2e73 GC a few more RCS ids in my ports 2022-03-07 21:45:09 +00:00
sthen
a98e0e6666 remove rcs IDs in ports that I maintain 2022-03-07 21:36:41 +00:00
sthen
9bcafef667 add login.conf.d file for squid 2022-02-21 13:43:56 +00:00
sthen
10ace0e202 update to squid-5.4.1 2022-02-13 13:40:26 +00:00
sthen
8bc5507a4e update to squid-5.4 2022-02-09 13:07:12 +00:00
sthen
220b4969a9 update to squid-5.3 2021-12-30 11:14:36 +00:00
sthen
c5a57a3b5f update to squid-5.2 2021-10-04 20:11:18 +00:00
sthen
42a9b0f316 update to squid-5.1 (which moves from db to tdb, amongst other things)
port-related changes:
- build debug packages
- XXX hack in the port makefile to work around pkg_add limitation
(can't replace a symlink with a dir)
2021-08-20 21:25:04 +00:00
sthen
188770839d squid: use execinfo, from brad, tweak to my usual style for multipackages REVISION 2021-07-09 09:32:00 +00:00
sthen
97bb136049 update to squid-4.16 2021-07-07 12:44:18 +00:00
sthen
06885230f7 update to squid-4.15
SQUID-2021:1 Denial of Service in URN processing
SQUID-2021:2 Denial of Service in HTTP Response Processing
SQUID-2021:3 Denial of Service issue in Cache Manager
SQUID-2021:4 Multiple issues in HTTP Range header
SQUID-2021:5 Denial of Service in HTTP Response Processing
2021-05-14 20:40:46 +00:00
sthen
8de639f483 update to squid-4.14 2021-02-15 09:34:19 +00:00
sthen
ac944c1e7e squid: adjust readme for pf route-to changes 2021-02-01 12:57:26 +00:00
sthen
c55ceba4a1 squid: fix some paths in pre-build seds. basically a noop, because
nobody is really using ${LOCALBASE} != /usr/local
2020-09-25 21:10:30 +00:00
sthen
4c9d198db9 www/squid: fiddle with LIB_KRB5_LIBS to let it find gssapi
partly from Matthias Pitzl
2020-08-24 13:39:00 +00:00
sthen
0fa712661f update to squid-4.13
SQUID-2020:8 HTTP(S) Request Splitting
SQUID-2020:9 Denial of Service processing Cache Digest Response
SQUID-2020:10 HTTP(S) Request Smuggling
2020-08-23 20:33:57 +00:00
sthen
06f8d7e3ed squid: missed cvs add (pfrag, and patch to cope with ancient nameser.h) 2020-07-21 18:40:30 +00:00
sthen
5e59d6c589 remove unused LIB_DEPENDS-ntlm 2020-07-21 15:52:40 +00:00
sthen
64cee9d132 www/squid: add a krb5 flavour, reworked from a diff from Matthias Pitzl
done with a multipackage to add the new files (but it affected the main
package build too so multipackages can't be used).

drop maintainer
2020-07-20 17:11:46 +00:00
sthen
6cc9779250 switch my maintainer email addresses to my own domain 2020-07-11 22:54:35 +00:00
sthen
623fe6fff9 update to squid-4.12 2020-06-11 14:22:11 +00:00
sthen
e63e83eee1 update to squid-4.11
SQUID-2020:3 - Due to incorrect buffer handling Squid is vulnerable to
cache poisoning, remote execution, and denial of service attacks when
processing ESI responses.

SQUID-2020:4 - Due to an integer overflow bug Squid is vulnerable to
credential replay and remote code execution attacks against HTTP Digest
Authentication tokens.
2020-04-23 10:54:48 +00:00
sthen
3d42d58ebf atomic for macppc base-clang 2020-04-06 22:11:21 +00:00
sthen
460f64804f update to squid-4.10 2020-01-21 21:40:46 +00:00
sthen
b2ad5502af update to squid-4.9 2019-11-08 09:53:40 +00:00
sthen
b8dcf425bf update to squid-4.8 2019-07-10 15:14:49 +00:00
cwen
3dcc6d0d90 squid: requires atomics on macppc
input and OK by sthen@ (maintainer) and jca@
2019-06-09 19:36:24 +00:00
sthen
9c6e9626b9 s/PERMIT_PACKAGE_CDROM/PERMIT_PACKAGE/ and some light whitespace tidying
in ports which I maintain
2019-06-03 16:06:50 +00:00
naddy
ebf751b927 Update gettext to 0.20.1.
Follow the upstream recommendations for packagers and switch to
multi-packages:
devel/gettext       -> devel/gettext,-runtime
devel/gettext-tools -> devel/gettext,-tools
(new)                  devel/gettext,-textstyle
2019-05-20 22:15:00 +00:00
sthen
7bedf9733f update to squid-4.7 2019-05-11 12:40:40 +00:00
matthieu
6e8a4d9a6e Add a patch to ignore ECONNABORTED in accept(2).
This was causing lockups on my squid cache at work.
Upstreem PR: https://github.com/squid-cache/squid/pull/404
ok sthen@, jca@
2019-05-11 08:17:36 +00:00
sthen
fb6232791e update to squid-4.6 2019-02-20 16:23:27 +00:00
sthen
50d6439440 major update to squid-4.5
quick update notes below, but you should still review upstream's
RELEASENOTES.html if you use this.

- if you explicitly configure sslcrtd_program (for advanced tls mitm
configurations) you need to change from /usr/local/libexec/squid/sslcrtd
to /usr/local/libexec/squid/security_file_certgen in your config (if you
just use options on the http_port line to enable this without extra
config, this doesn't need to change).

- if using a cert helper disk cache, you may need to clear/reinitialize
the directory (not mentioned in release notes but I needed this).

- the SMB_LM helpers (for old lanmanager protocol, which should not be
used anyway) are no longer packaged, following upstream's change in default
build.
2019-02-05 23:03:15 +00:00
sthen
41056a893f fix triggerable memory leak which is present if snmp is enabled (not on by default),
http://www.squid-cache.org/Advisories/SQUID-2018_5.txt
2018-10-30 15:41:51 +00:00
sthen
515376884b Add a patch for http://www.squid-cache.org/Advisories/SQUID-2018_4.txt,
XSS vulnerability when generating HTTPS response messages about TLS errors
(in TLS MITM support).
2018-10-29 18:43:01 +00:00
jsing
f08938ae10 Unbreak net/squid - stop using antiquated ASN.1 macros that have been
removed (apparently this diff was hiding in my ports tree...)

ok naddy@
2018-10-25 16:15:38 +00:00
espie
f4b7f81318 convert to PKGSTEM 2018-09-04 12:46:09 +00:00
sthen
05a646ea40 update to squid-3.5.28 2018-07-18 21:16:47 +00:00
tb
d0cf5b17c2 Unbreak after libssl const changes.
ok sthen
2018-04-25 07:14:19 +00:00
sthen
949b43e1d0 fix http://www.squid-cache.org/Advisories/SQUID-2018_3.txt
Due to incorrect pointer handling Squid is vulnerable to denial
of service attack when processing ESI responses.

This problem allows a remote server delivering ESI responses
to trigger a denial of service for all clients accessing the
Squid service.

This problem is limited to Squid operating as reverse proxy.
2018-04-19 21:49:35 +00:00
sthen
af3b8874ad http://www.squid-cache.org/Advisories/SQUID-2018_1.txt
Due to incorrect pointer handling Squid is vulnerable to denial
 of service attack when processing ESI responses.

 This problem allows a remote server delivering certain ESI
 response syntax to trigger a denial of service for all clients
 accessing the Squid service.

http://www.squid-cache.org/Advisories/SQUID-2018_2.txt

 Due to incorrect pointer handling Squid is vulnerable to denial
 of service attack when processing ESI responses or downloading
 intermediate CA certificates.

 This problem allows a remote client delivering certain HTTP
 requests in conjunction with certain trusted server responses to
 trigger a denial of service for all clients accessing the Squid
 service.
2018-01-23 15:00:02 +00:00