* Fixed bug in route.c in FreeBSD, Darwin, OpenBSD and NetBSD
version of get_default_gateway. Allocated socket for route
manipulation is never freed so number of mbufs continuously
grow and exhaust system resources after a while (Jaroslav Klaus).
ok pvalchev@
packing-lists was changes in significant ways, and they do not have
enough dependencies that pkg_add can detect they changed through their
signature.
Bump the pkgname, so that pkg_add -r will choose to update them.
okay pvalchev@
upgrade to version 200508R1;
This fixes several potential security problems, so everyone
should upgrade immidiately.
From Bernd Ahlers <bernd@ba-net.org>, Matthias Kilian <kili@outback.escape.de>
ok pvalchev@
As noted on ports@ recently, pkg_add -r relies on conflicts, and the
sheer existence of updates means we MUST take the past into account in
conflicts now.
Note the renaming of hugs98 to valid package names where versions are
concerned.
This commit shows clearly the renaming of the xfce4 plugin packages, the
ditching of eclipse flavors, the splitting of nessus into subpackages,
the splitting of various other software documentations, some packaging bugs
in kdeedu, and a lot of files moving around...
okay pvalchev@
Fix a buffer overflow that could be used to perform a DoS attack
and possible code execution.
From: Gerardo Santana Gomez Garrido <santana@openbsd.org.mx>
ftpsesame helps the FTP protocol get through your pf firewall. It does
this by passively analysing FTP control connections and adding rules
into a pf anchor when an FTP data connection is about to commence.
You might want to try ftpsesame instead of ftp-proxy(8) from the OpenBSD
base system for the following reasons:
- it runs on "transparent" (no IP address) bridges
- you need packetfilter performance on all data connections
- you have to handle lots of simultaneous sessions
- you do not want to redirect any traffic to the firewall itself: for IP
accounting or other reasons
client under some bizarre conditions would not start, no error messages
or anything.
nasty diff from mjc@, poor marco@ was suffering due to this issue.
Kismet is an 802.11 layer2 wireless network detector, sniffer, and
intrusion detection system. Kismet will work with any wireless card
which supports raw monitoring (rfmon) mode, and can sniff 802.11b,
802.11a, and 802.11g traffic.
Kismet identifies networks by passively collecting packets and detecting
standard named networks, detecting (and given time, decloaking) hidden
networks, and infering the presence of nonbeaconing networks via data
traffic.
from Matthias Kilian <kili@outback.escape.de> and from a lot of
other people.