The Signal Protocol is a ratcheting forward secrecy protocol that works in
synchronous and asynchronous messaging environments.
From Alex Holst; thanks!
ok bcallah@
DHCP: Ensure dhcp is running on the interface received from
BSD: Link handling has been simplified, however it is expected
that if an interface supports SIOCGIFMEDIA then it reports
the correct link status via route(4) for reliable operations
BPF: ARP filter is more robust
BSD and sun: Validate RTM message lengths
DHCPv6 (security): Fix a potential read overflow with D6_OPTION_PD_EXCLUDE
like the rest of the ports tree. This also allows removing a bunch of
manual setting of PATH="${PORTPATH}" HOME="${PORTHOME}" done in various
ports etc. This also makes sure CFLAGS is passed through (not everything
honours it but it does improve at least some ports).
Remove NO_CCACHE from www/honk that was added because the above problem
resulted in ccache variables not being passed through correctly breaking
the cc calls in this.
ok kmos@
to the THREDDS data server, which is the primary target of users
of this port.
From a tip by Stefan Wollny - Thank you
OK from kn@ and Martin Reindl (maintainer)
remote data services. Much of Siphon's current functionality focuses
on access to data hosted on a THREDDS Data Server. It also provides
clients to a variety of simple web services.
From Martin Reindl
OK sthen@
net/libupnp update is coming, but amule's latest release (from 2016) fails
to build with it, so disable this feature to avoid blocking the update and
other consumers.
OK juanfra solene
1. the pyc files aren't truly arch independent (they can be used cross-arch
but aren't identical), and
2. @version isn't used on PKG_ARCH=* ports so the py3 switch is tripping PLIST_DB
* auth: Use consttime_memequal to avoid latency attack
consttime_memequal is supplied if libc does not support it
dhcpcd >=6.2 <7.2.1 are vulnerable
* DHCP: Fix a potential 1 byte read overflow with DHO_OPTSOVERLOADED
dhcpcd >=4 <7.2.1 are vulnerable
* DHCPv6: Fix a potential buffer overflow reading NA/TA addresses
dhcpcd >=7 <7.2.1 are vulnerable