Commit Graph

38 Commits

Author SHA1 Message Date
espie
0397d65db0 new depends 2010-11-19 22:31:32 +00:00
espie
49cc004681 new WANTLIB 2010-11-11 16:27:54 +00:00
fkr
349b89bb47 update to openvpn 2.1.4, which is a bug fix release only.
ok dcoppa@, benoit@
2010-11-10 13:50:04 +00:00
sthen
0666992301 fix tabs 2010-10-18 21:50:38 +00:00
espie
47ff75aa46 USE_GROFF=Yes 2010-10-18 18:36:45 +00:00
fkr
3ebadeeb9d update to OpenVPN 2.1.2
while here, enable dropping to _openvpn user in the sample configs.
ok and feedback ajacoutot@
2010-08-30 18:32:20 +00:00
sthen
d1c6f80880 use REVISION, checked with before/after make show=PKGNAMES (plus some
extra-careful checking where there are complicated PSEUDO_FLAVORS).
2010-07-12 22:07:37 +00:00
fkr
712a318987 unbreak and adopt to the changes to rdomains/rtables in -current.
feedback and ok sthen@
2010-07-08 09:18:25 +00:00
benoit
83af06950b - update openvpn to 2.1.0
ok fkr@, ajacoutot@
2009-12-11 23:05:37 +00:00
fkr
4c0617af08 update to OpenVPN 2.1rc22.
rdomain support from Laurent Ghigonis.

tested by various.

ok bernd@, benoit@
2009-11-26 22:55:27 +00:00
sthen
f88d556dc6 Upstream rerolled the distfile (fixed a Makefile and removed some
junk files, .svn and so on); sync distinfo and a (slightly gratuitous)
package bump. Regen patches while there.

Noticed by naddy@ and Viq. ok fkr@
2009-10-10 13:35:33 +00:00
fkr
acc40d958e update to openvpn 2.1rc20.
ok sturm@, bernd@, ajacoutot@
2009-10-07 21:44:48 +00:00
sthen
64fa08b62b move to archivers/lzo2, bump 2009-07-24 14:37:23 +00:00
sthen
ca503995d7 - add MESSAGE with a suggestion from Tom on misc@ of using hostname.tun*
to start OpenVPN; this sidesteps a problem where openvpn destroys and re-
creates the tun interface, which affects PF/altq.

- shorten DESCR to better fit 80x24

ok fkr@ (maintainer).
2009-06-18 13:02:40 +00:00
fkr
8c7b50f27f switch OpenVPN to compile with pthreads, since this is needed for plugins
like ldap auth.
ok bernd@, sthen@
2009-05-10 13:59:35 +00:00
martin
a3e1a41274 gcc2 build fixes:
- macro with variable declarations not at the begging of block
- branch prediction hints not available in gcc2

ok fkr@
2009-03-08 15:56:52 +00:00
fkr
ec1310757c update to OpenVPN 2.1rc15
tested by a few, ok mbalmer@
2008-11-27 11:38:32 +00:00
fkr
40c4ee25ab update to openvpn 2.1rc13
ok bernd@
2008-10-22 05:27:07 +00:00
fkr
0fa1c0a21f update to openvpn 2.1rc9, this includes security fixes
in earlier versions of 2.1 rc series, CVE-2008-3459

ok bernd@, ajacoutot@
2008-09-06 09:07:10 +00:00
fkr
be0b0d0633 update to OpenVPN 2.1rc7
tested by many
ok bernd@
2008-04-01 21:50:14 +00:00
fkr
500ebc256e take over maintainership as discussed on ports@ a while ago.
ok bernd@ and previous maintainer.
2007-11-20 21:39:02 +00:00
claudio
899aacf19f On -current OpenVPN no longer works because of their brain damaged way
to talk to the routing socket to get the default gateway.
Instead of pulling in net/route.h they copied parts of the contents into
their code. Update the needed bits to make it work again.
OK fkr@, jasper@ and Thomas Delaet (maintainer)
2007-09-11 15:09:14 +00:00
aanriot
5fb248d27d - maintenance update to 2.0.9 (bugfixes on the documentation/scripts) ;
- while there, remove quotes from COMMENT ;

ok Thomas Delaet (maintainer).
2007-07-27 21:20:29 +00:00
espie
9eafbbfb35 base64 checksums. 2007-04-05 16:19:55 +00:00
robert
595afec84a - use the _openvpn uid/gid istead of nobody/nogroup; from Tamas Tevesz
- remove USE_GMAKE because it is not needed
- use a different method for installing the sample config files to prevent
installing .orig files left behind after patching
- bump PKGNAME
2006-12-15 09:56:14 +00:00
bernd
1900906dcc Security update to openvpn-2.0.6.
* Security Vulnerability affecting OpenVPN 2.0 through 2.0.5.
  An OpenVPN client connecting to a
  malicious or compromised server could potentially receive
  "setenv" configuration directives from the server which could
  cause arbitrary code execution on the client via a LD_PRELOAD
  attack.

Detailed information: http://openvpn.net/changelog.html

ok Thomas Delaet <thomas at delaet.org> (MAINTAINER)
2006-04-05 11:49:36 +00:00
sturm
a6bcab8d25 maintenance update to 2.0.5
maintainer timeout
2005-12-04 17:19:51 +00:00
bernd
b277fb26e7 Security update to openvpn-2.0.4.
- Format string vulnerability in the foreign_option function in options.c.
  (CVE-2005-3393)
- Potential DoS vulnerability on the server in TCP mode. (CVE-2005-3409)

More info:
http://openvpn.net/changelog.html

"just do it" pvalchev@
2005-11-02 02:34:56 +00:00
bernd
450c2d9bcf Fix some file modes. Bump PKGNAME.
ok sturm@
2005-11-01 18:07:08 +00:00
robert
f142cc568d upgrade to version 2.0.2;
* Fixed bug in route.c in FreeBSD, Darwin, OpenBSD and NetBSD
  version of get_default_gateway.  Allocated socket for route
  manipulation is never freed so number of mbufs continuously
  grow and exhaust system resources after a while (Jaroslav Klaus).

ok pvalchev@
2005-08-29 14:22:04 +00:00
robert
b2b5a3021d SECURITY: update to version 2.0.1;
fixes serveral vulnerabilities;
http://www.vuxml.org/openbsd/a7ce7b3c-136a-11da-bb92-00065bd5b0b6.html

ok pvalchev@
2005-08-23 00:32:39 +00:00
sturm
8d4e5fb58d update to openvpn 2.0
from maintainer Thomas Delaet <thomas at delaet.org>
2005-05-01 21:28:49 +00:00
espie
0c7ccaf65a don't install lzo 2005-04-17 19:36:46 +00:00
naddy
fedfc3867f SIZE 2005-01-05 17:14:37 +00:00
alek
2344f6d18c Add WANTLIB markers 2004-12-16 00:31:20 +00:00
sturm
d0a0688651 update to openvpn 1.6.0
new style PLIST

from new maintainer Thomas Daleat <thomas@daleat.org>
2004-08-08 18:48:38 +00:00
sturm
9e8e9e2e26 s,/bin/bash,/bin/sh, in example scripts
from Han Boetes <han at mijncomputer dot nl>
2003-12-30 21:29:53 +00:00
sturm
39e263896c Initial import of OpenVPN 1.5.0
OpenVPN is an easy-to-use, robust, and highly configurable VPN (Virtual
Private Network) daemon which can be used to securely link two or more
private networks using an encrypted tunnel over the internet.

WWW: http://openvpn.sourceforge.net/

from Jorge A. Cortes Montiel <jcortes at bsdcoders dot org>
2003-11-25 17:27:50 +00:00