ok kmos
Fuzzer and test suite for TLS implementations (SSLv2-TLSv1.3). Provides
ready-to-use scripts testing for many vulnerabilities (ROBOT, DROWN, etc.)
and general standards conformity (RFC 5246, RFC 7627, RFC 7905, etc.)
Early alpha version - no API stability guarantees.
- https homepage
- time_t printf
- fix stray semicolon in if
- stop using dnssec-keygen -r, it was removed after BIND 9.12.
I don't have a working setup to validate things so I'm not sure if this
is enough to fix with the current version of bind+tools in ports so more
work maybe needed, but at least it can't work without this.
- remove bits from my "testing" version (pubkey, SIGFILES, .asc ref in distinfo)
- whack DISTFILES (left over from initial hosting of tarball at sr.ht)
- add man page
by abieber@
CFSSL is CloudFlare's PKI/TLS swiss army knife. It is both a command
line tool and an HTTP API server for signing, verifying, and bundling
TLS certificates.
"pcscd --debug" prints dark blue lines background, rendering them unreadable
on dark background. The daemon has "-T" to enforce colored output, but no
switch to disable colors on TTYs.
Disable all detection logic such that "-T" is the only way to get colors.
OK sthen
* Fixed CVE-2019-18634, a buffer overflow when the "pwfeedback"
sudoers option is enabled on systems with uni-directional pipes.
* The "sudoedit_checkdir" option now treats a user-owned directory
as writable, even if it does not have the write bit set at the
time of check. Symbolic links will no longer be followed by
sudoedit in any user-owned directory. Bug #912
* Fixed sudoedit on macOS 10.15 and above where the root file system
is mounted read-only. Bug #913.
* Fixed a crash introduced in sudo 1.8.30 when suspending sudo
at the password prompt. Bug #914.
* Fixed compilation on systems where the mmap MAP_ANON flag
is not available. Bug #915.