Commit Graph

341 Commits

Author SHA1 Message Date
sthen
220b4969a9 update to squid-5.3 2021-12-30 11:14:36 +00:00
sthen
c5a57a3b5f update to squid-5.2 2021-10-04 20:11:18 +00:00
sthen
42a9b0f316 update to squid-5.1 (which moves from db to tdb, amongst other things)
port-related changes:
- build debug packages
- XXX hack in the port makefile to work around pkg_add limitation
(can't replace a symlink with a dir)
2021-08-20 21:25:04 +00:00
sthen
188770839d squid: use execinfo, from brad, tweak to my usual style for multipackages REVISION 2021-07-09 09:32:00 +00:00
sthen
97bb136049 update to squid-4.16 2021-07-07 12:44:18 +00:00
sthen
06885230f7 update to squid-4.15
SQUID-2021:1 Denial of Service in URN processing
SQUID-2021:2 Denial of Service in HTTP Response Processing
SQUID-2021:3 Denial of Service issue in Cache Manager
SQUID-2021:4 Multiple issues in HTTP Range header
SQUID-2021:5 Denial of Service in HTTP Response Processing
2021-05-14 20:40:46 +00:00
sthen
8de639f483 update to squid-4.14 2021-02-15 09:34:19 +00:00
sthen
ac944c1e7e squid: adjust readme for pf route-to changes 2021-02-01 12:57:26 +00:00
sthen
c55ceba4a1 squid: fix some paths in pre-build seds. basically a noop, because
nobody is really using ${LOCALBASE} != /usr/local
2020-09-25 21:10:30 +00:00
sthen
4c9d198db9 www/squid: fiddle with LIB_KRB5_LIBS to let it find gssapi
partly from Matthias Pitzl
2020-08-24 13:39:00 +00:00
sthen
0fa712661f update to squid-4.13
SQUID-2020:8 HTTP(S) Request Splitting
SQUID-2020:9 Denial of Service processing Cache Digest Response
SQUID-2020:10 HTTP(S) Request Smuggling
2020-08-23 20:33:57 +00:00
sthen
06f8d7e3ed squid: missed cvs add (pfrag, and patch to cope with ancient nameser.h) 2020-07-21 18:40:30 +00:00
sthen
5e59d6c589 remove unused LIB_DEPENDS-ntlm 2020-07-21 15:52:40 +00:00
sthen
64cee9d132 www/squid: add a krb5 flavour, reworked from a diff from Matthias Pitzl
done with a multipackage to add the new files (but it affected the main
package build too so multipackages can't be used).

drop maintainer
2020-07-20 17:11:46 +00:00
sthen
6cc9779250 switch my maintainer email addresses to my own domain 2020-07-11 22:54:35 +00:00
sthen
623fe6fff9 update to squid-4.12 2020-06-11 14:22:11 +00:00
sthen
e63e83eee1 update to squid-4.11
SQUID-2020:3 - Due to incorrect buffer handling Squid is vulnerable to
cache poisoning, remote execution, and denial of service attacks when
processing ESI responses.

SQUID-2020:4 - Due to an integer overflow bug Squid is vulnerable to
credential replay and remote code execution attacks against HTTP Digest
Authentication tokens.
2020-04-23 10:54:48 +00:00
sthen
3d42d58ebf atomic for macppc base-clang 2020-04-06 22:11:21 +00:00
sthen
460f64804f update to squid-4.10 2020-01-21 21:40:46 +00:00
sthen
b2ad5502af update to squid-4.9 2019-11-08 09:53:40 +00:00
sthen
b8dcf425bf update to squid-4.8 2019-07-10 15:14:49 +00:00
cwen
3dcc6d0d90 squid: requires atomics on macppc
input and OK by sthen@ (maintainer) and jca@
2019-06-09 19:36:24 +00:00
sthen
9c6e9626b9 s/PERMIT_PACKAGE_CDROM/PERMIT_PACKAGE/ and some light whitespace tidying
in ports which I maintain
2019-06-03 16:06:50 +00:00
naddy
ebf751b927 Update gettext to 0.20.1.
Follow the upstream recommendations for packagers and switch to
multi-packages:
devel/gettext       -> devel/gettext,-runtime
devel/gettext-tools -> devel/gettext,-tools
(new)                  devel/gettext,-textstyle
2019-05-20 22:15:00 +00:00
sthen
7bedf9733f update to squid-4.7 2019-05-11 12:40:40 +00:00
matthieu
6e8a4d9a6e Add a patch to ignore ECONNABORTED in accept(2).
This was causing lockups on my squid cache at work.
Upstreem PR: https://github.com/squid-cache/squid/pull/404
ok sthen@, jca@
2019-05-11 08:17:36 +00:00
sthen
fb6232791e update to squid-4.6 2019-02-20 16:23:27 +00:00
sthen
50d6439440 major update to squid-4.5
quick update notes below, but you should still review upstream's
RELEASENOTES.html if you use this.

- if you explicitly configure sslcrtd_program (for advanced tls mitm
configurations) you need to change from /usr/local/libexec/squid/sslcrtd
to /usr/local/libexec/squid/security_file_certgen in your config (if you
just use options on the http_port line to enable this without extra
config, this doesn't need to change).

- if using a cert helper disk cache, you may need to clear/reinitialize
the directory (not mentioned in release notes but I needed this).

- the SMB_LM helpers (for old lanmanager protocol, which should not be
used anyway) are no longer packaged, following upstream's change in default
build.
2019-02-05 23:03:15 +00:00
sthen
41056a893f fix triggerable memory leak which is present if snmp is enabled (not on by default),
http://www.squid-cache.org/Advisories/SQUID-2018_5.txt
2018-10-30 15:41:51 +00:00
sthen
515376884b Add a patch for http://www.squid-cache.org/Advisories/SQUID-2018_4.txt,
XSS vulnerability when generating HTTPS response messages about TLS errors
(in TLS MITM support).
2018-10-29 18:43:01 +00:00
jsing
f08938ae10 Unbreak net/squid - stop using antiquated ASN.1 macros that have been
removed (apparently this diff was hiding in my ports tree...)

ok naddy@
2018-10-25 16:15:38 +00:00
espie
f4b7f81318 convert to PKGSTEM 2018-09-04 12:46:09 +00:00
sthen
05a646ea40 update to squid-3.5.28 2018-07-18 21:16:47 +00:00
tb
d0cf5b17c2 Unbreak after libssl const changes.
ok sthen
2018-04-25 07:14:19 +00:00
sthen
949b43e1d0 fix http://www.squid-cache.org/Advisories/SQUID-2018_3.txt
Due to incorrect pointer handling Squid is vulnerable to denial
of service attack when processing ESI responses.

This problem allows a remote server delivering ESI responses
to trigger a denial of service for all clients accessing the
Squid service.

This problem is limited to Squid operating as reverse proxy.
2018-04-19 21:49:35 +00:00
sthen
af3b8874ad http://www.squid-cache.org/Advisories/SQUID-2018_1.txt
Due to incorrect pointer handling Squid is vulnerable to denial
 of service attack when processing ESI responses.

 This problem allows a remote server delivering certain ESI
 response syntax to trigger a denial of service for all clients
 accessing the Squid service.

http://www.squid-cache.org/Advisories/SQUID-2018_2.txt

 Due to incorrect pointer handling Squid is vulnerable to denial
 of service attack when processing ESI responses or downloading
 intermediate CA certificates.

 This problem allows a remote client delivering certain HTTP
 requests in conjunction with certain trusted server responses to
 trigger a denial of service for all clients accessing the Squid
 service.
2018-01-23 15:00:02 +00:00
rpe
9a8b5ccd06 Change the shebang line from /bin/sh to /bin/ksh in all ports rc.d
daemon scripts and bump subpackages that contain the *.rc scripts.

discussed with and OK aja@
OK tb
2018-01-11 19:27:01 +00:00
naddy
11e3dd67b3 switch COMPILER from the old, confusing shortcuts to the more explicit format 2017-11-16 23:20:37 +00:00
sthen
30eaa4b102 sync WANTLIB and bump, gc a few gettext MODULES while there 2017-09-22 21:30:32 +00:00
sthen
dc8dda12df update to squid-3.5.27 2017-08-22 22:40:57 +00:00
sthen
5e964ab0df bump LIBCXX/LIBECXX/COMPILER_LIBCXX ports. 2017-07-26 22:45:14 +00:00
espie
8ac47fd9c6 use COMPILER_LIBCXX where applicable 2017-07-16 19:18:47 +00:00
sthen
3379847204 update to squid-3.5.26 2017-06-03 21:04:49 +00:00
espie
cc5bc426ed switch everything to new COMPILER idiom, even stuff that won't build with clang
yet, but at least that part is done.
2017-05-31 08:08:15 +00:00
sthen
0cec2e8b5c use WANT_CXX 2017-05-21 17:27:22 +00:00
schwarze
93309b5dd4 Unimportant whitespace differences only, drop USE_GROFF.
While here, fix a number of quite serious escaping errors in
four manual pages that caused loss of important information.
I will also send those upstream.

OK sthen@
2017-05-11 16:29:55 +00:00
sthen
abec0e3c77 update to squid-3.5.25 2017-04-04 21:09:30 +00:00
ajacoutot
a4751d331b Missed bump. 2017-02-18 17:33:51 +00:00
ajacoutot
1722249aa0 idn -> idn2 after gnutls WANTLIB change. 2017-02-18 17:32:37 +00:00
sthen
1bd5c493ce update to squid-3.5.24 2017-01-29 20:43:31 +00:00