178 Commits

Author SHA1 Message Date
tb
d85d81da99 fetchmail: use OpenSSL 1.1 code path
Instead of relying on an untested code path that uses version fixed
TLS client methods and the made-up TLSv1_3_client_method() in case
TLS1_3_VERSION is defined, we can just use the code path provided for
the OpenSSL 1.1 API. While it seems reasonable to assume that such a
client method might be available, version fixed methods are deprecated.
TLSv1_3_client_method() never existed in either LibreSSL or OpenSSL.

This will make sure that the port works correctly now and will
continue to build and work correctly once LIBRESSL_HAS_TLS1_3
becomes publicly visible.

ok jsing
2020-09-07 09:40:53 +00:00
sthen
efab8587a8 update to fetchmail-6.4.6 2020-06-12 13:02:35 +00:00
sthen
0468f9e1b7 update to fetchmail-6.4.3 2020-04-15 19:48:39 +00:00
sthen
894d97f328 update to fetchmail-6.4.2 2020-02-15 15:55:51 +00:00
sthen
00b10cf194 update to fetchmail-6.4.1 2020-01-27 13:48:45 +00:00
sthen
3318ced016 replace simple PERMIT_PACKAGE_CDROM=Yes with PERMIT_PACKAGE=Yes 2019-07-12 20:46:54 +00:00
naddy
ebf751b927 Update gettext to 0.20.1.
Follow the upstream recommendations for packagers and switch to
multi-packages:
devel/gettext       -> devel/gettext,-runtime
devel/gettext-tools -> devel/gettext,-tools
(new)                  devel/gettext,-textstyle
2019-05-20 22:15:00 +00:00
naddy
1a87aebd2d mechanical replacement of the gettext module 2017-11-21 00:12:59 +00:00
bluhm
ea73c9a359 Do not overrun plugin string when copying it. Prevents sporadic
segmentation fault in fetchmail.  Fix reported to upstream.
OK jca@
2017-08-11 04:18:19 +00:00
espie
511c5d230a a few minor pkg_subst fixes, for the coming patch (disallow -c without -m
outside of WRKDIR)
2015-11-02 11:56:54 +00:00
sthen
691c83f9b2 Bump some ports which reference if_msghdr in their source, so that package
updates are triggered. This is following the struct if_data ABI change a few
days ago; if_msghdr has an embedded if_data.  Some may be unnecessary, but
some are definitely needed and bumps are cheaper than debugging.
Problem reported with wpa_supplicant by Mikolaj Kucharski.
2015-10-08 21:19:21 +00:00
jca
c3e194b1a4 Fixed upstream. 2015-08-25 17:44:09 +00:00
sthen
b390395ee7 cope if SSLv3 is disabled 2015-07-18 04:51:29 +00:00
jasper
5c884092b6 remove a whole bunch more @rm -f cases 2015-05-25 07:54:27 +00:00
jasper
08dd19bb58 update to fetchmail-6.3.26 2014-06-21 07:58:28 +00:00
ajacoutot
31fd7cb173 No Kerberos 4. 2014-04-21 22:24:49 +00:00
ajacoutot
03eb3a7d35 Drop kerberos support. 2014-04-21 13:18:31 +00:00
sthen
27f03b1c52 bump REVISION for any ports using route messages. regen some distinfos and
remove unnecessary USE_GROFFs while there.
2013-10-31 21:12:12 +00:00
ajacoutot
64a6588efb No need for pthread. 2013-06-20 08:26:13 +00:00
ajacoutot
25b3041f91 Unbreak after hx509 and ntlm removal from Kerberos. 2013-06-20 06:54:36 +00:00
ajacoutot
9920238d6f Unbreak with new Heimdal; get rid of self-cooked krb5-config since we
have it in base now.
2013-06-17 19:30:22 +00:00
espie
0662a4e9d6 PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:20:26 +00:00
sthen
e12fe2008d update to fetchmail 6.3.24 2013-01-14 01:42:24 +00:00
sthen
56f997a440 adjust HOMEPAGE, it moved off berlios to fetchmail.info. 2012-08-21 23:18:24 +00:00
jasper
c4ca0038b2 - let these work if sslv2 is disabled, from Brad 2012-06-26 10:10:20 +00:00
jasper
de9dbcd511 somehow i folded two commits into one, revert non-security fix. 2012-06-22 14:38:28 +00:00
jasper
c694064090 Fix potential for information disclosure under active attack. CVE-2011-3389
from brad
2012-06-21 15:43:59 +00:00
sthen
88ea72915d Change SEPARATE_BUILD=(concurrent|simple) to Yes; bsd.port.mk doesn't
make a distinction between these.  ok aja@ dcoppa@
2012-03-29 13:38:12 +00:00
sthen
b76000269d struct ifnet; bump 2011-11-16 00:02:38 +00:00
sthen
9422ba86e1 python is actually a build dep. pointed out jasper@ 2011-10-11 10:43:13 +00:00
sthen
6e18f060b0 Adjust the fetchmailconf wrapper to check ${MODPY_BIN} rather than
/usr/local/bin/python. Also check that python-tkinter is installed.
From Pascal Stumpf with tweaks from me.

(Python + tkinter aren't RUN_DEPENDs as many fetchmail installations
don't use this and it's a heavy dependency chain).
2011-08-24 19:18:57 +00:00
jasper
3e45ae7413 - update fetchmail to 6.3.21, includes a critical fix for imap/maildir users 2011-08-21 16:41:30 +00:00
sthen
02c6211f1a update fetchmail to 6.3.20, tested by jasper@, lots of fixes including:
* CVE-2011-1947
- use timeouts for IMAP STARTTLS/POP3 STLS negotiation which could cause
  fetchmail freezes if a server was hanging.
* security improvements to defang X.509 certificate abuse
- require wildcard CN/subject alternative names to start with "*." not just "*"
- don't allow wildcards to match domain literals (such as 10.9.8.7) or
  wildcards in domain literals ("*.168.23.23").
- don't allow wildcarding top-level domains.
2011-06-06 13:57:07 +00:00
espie
bc8dc9adb1 new depends 2010-11-19 07:23:05 +00:00
sthen
0666992301 fix tabs 2010-10-18 21:50:38 +00:00
espie
051dfa8362 USE_GROFF=Yes 2010-10-18 19:59:15 +00:00
stsp
8d294869c6 Add patch from upstream to fix bogus ssl check warning when the
sslfingerprint option is used.
hints and ok sthen@
2010-06-09 08:34:59 +00:00
giovanni
09a7c52666 Update to 6.3.17
ok kili@
2010-05-19 15:27:18 +00:00
jasper
168efadf72 - update fetchmail to 6.3.15
from charles smith, thanks.
2010-03-31 19:12:06 +00:00
sthen
3927255cfd security update to 6.3.14, heap overflow in verbose mode SSL cert display
on signed char arch. http://www.fetchmail.info/fetchmail-SA-2010-01.txt

"This might be exploitable to inject code if
- - fetchmail is run in verbose mode
AND
- - the host running fetchmail considers char signed
AND
- - the server uses malicious certificates with non-printing characters
  that have the high bit set
AND
- - these certificates manage to inject shell-code that consists purely of
  printable characters.

It is believed to be difficult to achieve all this."
2010-03-22 01:28:40 +00:00
sthen
706b5d1ee3 update to 6.3.13, fixing a regression introduced in 6.3.12. ok jasper@ 2009-11-02 19:47:49 +00:00
sthen
4ab60c1904 SECURITY update to 6.3.12, fixes CVE-2009-2666 (bad handling of nulls
in SSL domain names).  ok jasper@
2009-10-11 20:52:17 +00:00
jasper
5141823be7 - update fetchmail to 6.3.9
ok sthen@
2009-02-17 12:08:44 +00:00
bernd
457b898d2a Fix stunnel usage with TLS1 encryption.
From https://lists.berlios.de/pipermail/fetchmail-users/2007-December/001396.html
via Dieter Rauschenberger. Thank you!

Regen PLIST and drop maintainership. I don't use it anymore.
2009-02-02 11:42:13 +00:00
bernd
e260daa457 Remove the pre-generated yacc files so they will be re-build.
This fixes a problem with gcc2. Also fix a format string.

From miod@, thanks!
2008-10-30 15:33:59 +00:00
jasper
e073be6eab SECURITY FIX for http://secunia.com/advisories/30742/
(Fetchmail Large Header Processing Denial of Service)

Patch was taken from upstream advisory.
http://www.fetchmail.info/fetchmail-SA-2008-01.txt

ok bernd@ (MAINTAINER)
2008-08-19 22:41:24 +00:00
merdely
8b76ad71d8 Remove surrounding quotes in COMMENT*/PERMIT_* 2007-09-16 00:17:04 +00:00
rui
1dd81a5ac2 SECURITY: roll in a distribution patch which fixes CVE-2007-4565
Reference: http://securitytracker.com/alerts/2007/Aug/1018627.html

ok bernd@
2007-08-31 14:20:46 +00:00
bernd
573299d695 Security update to fetchmail-6.3.8. (CVE-2007-1558)
Make the APOP challenge parser more distrustful and have it reject challenges
that do not conform to RFC-822 msg-id format, in the hope to make mounting
man-in-the-middle attacks (MITM) against APOP a bit more difficult.

Detailed information:
http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt
2007-04-13 13:22:25 +00:00
espie
9eafbbfb35 base64 checksums. 2007-04-05 16:19:55 +00:00