5981 Commits

Author SHA1 Message Date
feinerer
1fe23f875c Update to python-axolotl 0.2.2 2019-05-09 00:40:38 +00:00
danj
164180159a Remove maintainers whose addresses bounce 2019-05-08 21:46:44 +00:00
jasper
08b4b788c4 recognize retguard; can be used through 'pwn checksec'
discussed with mortimer@
2019-05-08 21:27:29 +00:00
jasper
a07fda946e +pwntools 2019-05-08 21:16:54 +00:00
jasper
70ee705a38 import pwntools-3.12.2
Pwntools is a CTF framework and exploit development library. Written in
Python, it is designed for rapid prototyping and development, and
intended to make exploit writing as simple as possible.

NB: Only the 'pwn' script has been installed, all other end-user scripts
are available through 'pwn', e.g. 'pwn checksec'.

OK aja@
2019-05-08 21:15:42 +00:00
sebastia
b0da024c38 Update to 3.5.3 and add HOMEPAGE 2019-05-07 13:57:40 +00:00
sebastia
a9d3351373 Update to 0.5.1 2019-05-07 13:56:51 +00:00
danj
8aac5c01a8 Remove maintainers per their requests 2019-05-07 02:31:03 +00:00
sthen
4c9d7e6039 No need for a special MODGO_ENV for go.port.mk, just use normal MAKE_ENV
like the rest of the ports tree. This also allows removing a bunch of
manual setting of PATH="${PORTPATH}" HOME="${PORTHOME}" done in various
ports etc. This also makes sure CFLAGS is passed through (not everything
honours it but it does improve at least some ports).

Remove NO_CCACHE from www/honk that was added because the above problem
resulted in ccache variables not being passed through correctly breaking
the cc calls in this.

ok kmos@
2019-05-04 21:46:16 +00:00
feinerer
14a4411010 Update to pcsc-cyberjack 3.99.5final.SP13 2019-05-04 09:10:10 +00:00
danj
b584241910 Remove maintainer per their request 2019-05-04 01:18:58 +00:00
benoit
1ef03ed91c Update to py-ecdsa-0.13.2. 2019-05-03 07:54:22 +00:00
benoit
4a57fd1b8f Update to pdfcrack-0.17. 2019-05-03 06:38:46 +00:00
gonzalo
fd3931c24b Update for Suricata to 4.1.4 and suricata-update to 1.0.5.
While here we prepare Suricata for version 5 with rust included,
some patches already applied upstream thanks to bluhm@.

OK bluhm@ jasper@
2019-05-03 06:22:34 +00:00
danj
05a7ec7904 Remove giovanni@ as maintainer per his request 2019-05-02 14:51:49 +00:00
danj
8fec4808f0 Remove stephan@ as maintainer per his request 2019-05-02 14:45:41 +00:00
gonzalo
650349ac58 Update for Lynis to 2.7.4:
https://cisofy.com/changelog/lynis/#274

OK rsadowski@
2019-05-02 09:27:09 +00:00
sthen
6102919871 drop maintainers with bouncing @openbsd.org addresses; thanks danj for the list 2019-05-01 19:29:43 +00:00
sthen
ba116e89ea oops, backout accidentally committed file 2019-04-29 16:28:45 +00:00
sthen
7c4de2c524 bump REVISION 2019-04-29 16:27:52 +00:00
sthen
5be4896096 move MAINTAINER from Makefile.inc to the ports where I actually want it 2019-04-29 16:27:25 +00:00
naddy
4ee133fc66 drop workaround for gcc4.9 that is no longer needed for gcc8
ok cwen@ ajacoutot@
2019-04-29 14:28:57 +00:00
jeremy
4311e64eb4 Bump after default ruby version change to ruby 2.6 2019-04-29 00:42:08 +00:00
sthen
d7f0752227 bump all the py3 things, _SYSTEM_VERSION didn't quite work out how
we expected and it's easier|safer to do it this way than fiddle with
pkg_add now. thanks aja for update tests with a quick bulk.
2019-04-28 20:51:26 +00:00
cwen
07f2a7e0ee steghide: Use C++03 for any compiler.
It unbreaks the build with ports-gcc-8. While here, fix Perl tests
that still assumes that '.' is in @INC.
Maintainer timeout.

OK sthen@
2019-04-28 01:30:18 +00:00
sthen
53defd7102 remove more PKG_ARCH=* with pyc in PLIST 2019-04-27 23:55:04 +00:00
ajacoutot
0cb309d6a8 Remove glib-openssl. Nothing uses it and functionnality has been moved to
glib2-networking.
2019-04-27 17:24:35 +00:00
sebastia
1f884893f3 Let nikto find the DTD to save xml files out of the box
OK gonzalo@
2019-04-26 13:36:28 +00:00
sthen
0aecafabc4 update to wpa_supplicant-2.8 2019-04-26 13:32:36 +00:00
jeremy
bba746bdaa Update to pledge 1.1.0, adding support for execpromises 2019-04-25 18:21:30 +00:00
jca
a0cd788ec9 Update to keyringer-0.5.4
From Mikolaj Kucharski, ok Gregoire Jadi (maintainer)
2019-04-25 15:04:44 +00:00
sthen
b0d347c34d add a comment explaining why this is php-7.1 only (libsodium functions are
in php core in 7.2+)
2019-04-25 12:00:33 +00:00
jeremy
a73bbd1588 Stop building ports for ruby 2.4 libraries by default
Per our current ruby support policy, as ruby 2.4's normal maintenance phase
has ended.
2019-04-24 23:33:48 +00:00
sebastia
41581e95b9 xmlrpc gem is already part of ruby, no need to depend on an extra
gem that doesn't install due to conflicts
2019-04-24 20:23:21 +00:00
sthen
86852bcf6e reset unresponsive maintainers, various porters have spent a bunch of
time waiting for timeouts over the last year or more for many of these
ports.  ok danj@ jca@ kmos@
2019-04-24 16:26:54 +00:00
cwen
684425d3c2 libnipper: Fix build on archs where char is unsigned by default (ppc, arm)
Tested on arm64 by kmos@ and macppc by me.

OK phessler@
2019-04-23 18:09:00 +00:00
sthen
ab9f4ccb21 update to wpa_supplicant-2.7, ok kn@, maintainer timeout 2019-04-23 11:50:10 +00:00
sebastia
ad14613ad4 hook up ruby-cms_scanner and wpscan 2019-04-23 11:46:06 +00:00
sebastia
94308f9802 import wpscan:
WPScan is a black box WordPress vulnerability scanner.

hint about GEM_FLAGS and MODRUBY_HANDLE_FLAVORS from jeremy@

OK gonzalo@, jasper@
2019-04-23 11:44:25 +00:00
sebastia
39978de2d8 import ruby-cms_scanner:
Framework to provide an easy way to implement CMS Scanners.

the main dependency of wpscan

OK gonzalo@, jasper@
2019-04-23 11:42:12 +00:00
landry
c746990b9c Update to nss 3.43, required by gecko 67.
See https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.43_release_notes
been in my tree for a while...
2019-04-22 09:24:22 +00:00
cwen
e9e5cced4f suricata: Change COMPILER to unbreak on !clang archs
Use ports-gcc on !clang archs, because suricata needs thread local storage.
While here, make spacing consistent in the Makefile.
Tested on macppc with gcc-4.9 and gcc-8.3.

ok jasper@ (maintainer)
2019-04-21 15:34:02 +00:00
rsadowski
3981a435b1 Update keepassxc to 2.4.1
Upstream removed KeePassHttp support which means there is no legacy browser
support in OpenBSD.

Full chnagelog:
- https://github.com/keepassxreboot/keepassxc/releases/tag/2.4.0
- https://github.com/keepassxreboot/keepassxc/releases/tag/2.4.1
2019-04-21 11:29:44 +00:00
bluhm
a1d9dd6b9e Implement pledge support for suricata.
from Emmanuel Roullit; OK gonzalo@
2019-04-19 12:22:27 +00:00
sthen
5c78ffdd12 update to pyca cryptography 2.6.1 2019-04-19 10:18:16 +00:00
bket
a517da9b32 Update to lastpass-cli-1.3.3.
Changelog: https://github.com/lastpass/lastpass-cli/blob/master/CHANGELOG.md

Upstream provides distfile via githubs release infrastructure.
2019-04-17 06:39:55 +00:00
sebastia
43ad299727 hook up pixiewps and reaver 2019-04-16 20:48:28 +00:00
sebastia
acdd4eac5f import reaver
Reaver implements a brute force attack against Wifi Protected Setup
(WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as
described in Brute forcing Wi-Fi Protected Setup When poor design meets
poor implementation. by Stefan Viehboeck.  Reaver has been designed to
be a robust and practical attack against Wi-Fi Protected Setup (WPS)
registrar PINs in order to recover WPA/WPA2 passphrases and has been
tested against a wide variety of access points and WPS implementations.
Depending on the target's Access Point (AP), to recover the plain text
WPA/WPA2 passphrase the average amount of time for the transitional
online brute force method is between 4-10 hours. In practice, it will
generally take half this time to guess the correct WPS pin and recover
the passphrase. When using the offline attack, if the AP is vulnerable,
it may take only a matter of seconds to minutes.

feedback and OK already some time ago sthen@, gonzalo@
2019-04-16 20:45:43 +00:00
sebastia
8ae69add2f import pixiewps:
Pixiewps is a tool written in C used to bruteforce offline the WPS PIN
exploiting the low or non-existing entropy of some software
implementations, the so-called "pixie-dust attack" discovered by
Dominique Bongard in summer 2014. It is meant for educational purposes
only.

As opposed to the traditional online brute-force attack, implemented in
tools like Reaver or Bully which aim to recover the pin in a few hours,
this method can get the PIN in only a matter of seconds or minutes,
depending on the target, if vulnerable.

feedback and OK already a while ago sthen@, gonzalo@
2019-04-16 20:38:52 +00:00
jca
86a1029472 Use ld(1) version scripts to fix symbol conflicts (hopefully) for good
Remove the symbol renaming workaround.  Use version scripts as done on
Linux and FreeBSD to hide internal symbols (eg HMAC_Update) that
conflict with libcrypto.

Tested in a bul by ajacoutot@, ok sthen@ naddy@, no objection landry@
(maintainer)
2019-04-16 18:45:41 +00:00