Commit Graph

494 Commits

Author SHA1 Message Date
reinhard
64f02cb85e increment PKGNAME; thx naddy@ for pointing out 2000-12-23 16:48:06 +00:00
reinhard
5e2899097a Security update, from the original patch:
It has been pointed out that there is another bug in the signature
verification code of GnuPG.

         * This can easily lead to false positives *

All versions of GnuPG released before today are vulnerable!

To check a detached singature you normally do this:

  gpg --verify foo.sig foo.txt

The problem here is that someone may replace foo.sig with a standard
signature containing some arbitrary signed text and its signature,
and then modify foo.txt - GnuPG does not detect this - Ooops.

The solution for this problem ist not easy and needs a change in the
semantics of the --verify command: It will not any longer be
possible to do this:

  gpg --verify foo.sig <foo.txt

Instead you have to use this

  gpg --verify foo.sig - <foo.txt

The difference here is that gpg sees 2 files on the command lines
and thereby knows that it should check a detached signature.  We
really need this information and there is no way to avoid that
change, sorry.  You should make sure that you never use the first
form, because this will lead to false positives when foo.sig is not
a detached signature - gnupg does detect the other case and warns
you, but this is not sufficient.  If you use GnuPG from other
applications, please change it.

ok markus@
2000-12-23 15:20:59 +00:00
naddy
abfa9851a8 If HOMEPAGE is defined in Makefile, reference it in DESCR, too.
authorized by espie@

Fix a few minor cosmetic issues along the way.
2000-12-21 21:20:34 +00:00
dugsong
814be5ac70 update checksum, i suk 2000-12-20 13:53:14 +00:00
espie
c287b9d0c1 Missing ports 2000-12-19 15:30:47 +00:00
naddy
beb20af917 Add pointer to home page. 2000-12-19 11:54:46 +00:00
obecian
8e18f618f5 stunnel-3.9 update
Version 3.9, 2000.12.13:
* Updated temporary key generation:
   - stunnel is now honoring requested key-lengths correctly,
   - temporary key is changed every hour.
* transfer() no longer hangs on some platforms.
  Special thanks to Peter Wagemans for the patch.
* Potential security problem with syslog() call fixed.
2000-12-19 05:46:03 +00:00
dugsong
7de996922a update to dsniff-2.3 2000-12-18 13:16:41 +00:00
brad
ce5ed433c2 - cleanup Makefile
- remove USE_LIBTOOL
- sync patch-ltconfig with my original patch
- add missing patch-ltmain.sh
- fixup PLISTs
2000-12-14 17:37:40 +00:00
espie
4bce863756 Fuck cvs, missed file again.
Make update to r11 effective.
2000-12-11 18:19:52 +00:00
obecian
a97326dff8 MASTER_SITES update
found by Brian Poole <raj@cerias.purdue.edu>
2000-12-09 05:19:29 +00:00
brad
801d914a55 oops, remove SEPARATE_BUILD. I'll come back later and fix the one minor
bug with installing the man page when using SEPARATE_BUILD.
2000-12-08 00:01:22 +00:00
brad
4f697a54b3 upgrade to mhash 0.8.3 2000-12-07 18:31:21 +00:00
avsm
f171a88d7a add in mcrypt and libmcrypt 2000-11-27 15:58:05 +00:00
avsm
91cb19a468 import mcrypt-2.5.5
--

mcrypt is intended to be a replacement of the old unix crypt(1)
under the GNU General Public License. Unix crypt(1) was a popular
file encryption program in unix boxes.

It was based on the Enigma encryption algorithm but it was considerable
trivialized. Since this was not adequate, even for individual privacy
needs, mcrypt was created as a similar program using some modern
block encryption algorithms.

Mcrypt also has a compatibility mode with unix crypt(1) and with
Solaris des(1). It supports all the algorithms and modes found in
libmcrypt and it is very extendable.

At the time writing this, it supports the algorithms: BLOWFISH,
TWOFISH, DES, TripleDES, 3-WAY, SAFER, LOKI97, GOST, RC2, RC6, MARS,
IDEA, RIJNDAEL, SERPENT, CAST, ARCFOUR and WAKE.

Block algorithms are implemented in modes: CFB, CBC, ECB, OFB (8
bit and n bit, where n is the size of the algorithm's block length).
For a brief description of the algorithms and the modes look at the
mcrypt manpage (this may be out of date).  In mcrypt it is on the
user to decide which algorithm he considers best for encrypting his
data.
2000-11-27 15:56:03 +00:00
avsm
7769275ab2 import of libmcrypt-2.4.7
--

libmcrypt is the library which implements all the algorithms and
modes found in mcrypt. It is currently under development but it
seems to work pretty good.

Unlike most encryption libraries libmcrypt does not have everything
(random number generators, hashes, hmac implementation, key exchange,
public key encryption etc.).  Libmcrypt only implements an interface
to access block and stream encryption algorithms.

Its purpose was to assist in the development of mcrypt by providing
a uniform interface to access several different encryption algorithms,
so that the main program is independent of the encryption algorithms
and the modes used.

Libmcrypt supports the algorithms: BLOWFISH, TWOFISH, DES, TripleDES,
3-WAY, SAFER-sk64, SAFER-sk128, SAFER+, LOKI97, GOST, RC2, RC6,
MARS, IDEA, RIJNDAEL-128 (AES), RIJNDAEL-192, RIJNDAEL-256, SERPENT,
CAST-128 (known as CAST5), CAST-256, ARCFOUR and WAKE.  Block
algorithms can be used in: CBC, ECB, CFB and OFB (8 bit and n bit,
where n is the size of the algorithm's block length).
2000-11-27 15:41:46 +00:00
jakob
821a4a7f10 update to v1.1.6.
***  Tuesday, November 21, 2000 -- Dante v1.1.6

 o fix a bug related to hostnamelength parsing in server.
   Thanks to "Thomas Jarosch" <thomas.jarosch@styletec.de>.
2000-11-21 10:38:25 +00:00
camield
eb22302678 - update to version 2.2 (no longer requires any patches)
- make adding users more user-friendly in MESSAGE

From maintainer: Joshua Stein <jcs@rt.fm>
2000-11-20 07:38:02 +00:00
jakob
dfa4244b6b update to v1.1.15. NEWS excerpt:
***  Monday, October 16, 2000 -- Dante v1.1.5

 o New prototype for gethostbyaddr in RedHat 7.0 added.
   First reported by Paul R Streitman <prs@us.ibm.com>.

 o RedHat needs libnsl for tcpwrappers to work.

***  Thursday, October 5, 2000 -- Dante v1.1.4

 o fix bug affecting clients going through socks v4 servers.
   Reported and nicely diagnosed by Jack Keane (jkeane@OpenReach.com).

 o increase default listen backlog to 511, based on request by
   Doug Hardie (bc979@lafn.org).

***  Monday, September 25, 2000 -- Dante v1.1.3

 o some fixes/additions to example/ files.

 o HP-UX 11.00 should now work.
   Thanks to Malte Cornils <malte@cornils.net> for testing.

 o httpproxysupport in client (meaning "socksify" can work
   when going through webproxies too).

 o expire badmarking on bad/non-working routes/proxyservers after
   configured time.  Default to never expiring, as in previous
   versions.  See BADROUTE_EXPIRE in config.h.

 o say what address we expected the bindreply to come from in
   "unexpected bindreply ..."

 o don't close controlconnection if another socket is using it.
   Fixes a bug triggered when using the bindextension in certain
   cases.  Problem reported by Jacques A. Vidrine (n@nectar.com).

 o compilation outside source directory fixed, based on patch from
   NISHIMURA Daisuke <nishi@graco.c.u-tokyo.ac.jp>

 o bsdi uses elf; NISHIMURA Daisuke <nishi@graco.c.u-tokyo.ac.jp>

 o dlib/hostcache.c now compiled again. First reported by
   "Jacques A. Vidrine" <n@nectar.com>
2000-11-19 12:26:07 +00:00
dugsong
2886304e62 fix port - markus@ 2000-11-18 06:27:25 +00:00
espie
82f34a7ab5 r10 vanished.
r11 includes most patches.

+ gcc -shared to build object module.
2000-11-02 17:39:46 +00:00
espie
1c1b99c22d Repair john.
Flavorize k6, as package buildings should be reproducible
2000-10-31 14:53:58 +00:00
markus
07aae00303 security update, since 1.0.3 does not detect modifications of files with multiple signatures 2000-10-30 12:52:32 +00:00
espie
aff2e05260 Maintainer 2000-10-22 17:02:40 +00:00
espie
64eb9106d9 Another one 2000-10-22 16:30:10 +00:00
espie
03116ad3c6 A few more. 2000-10-22 16:21:17 +00:00
espie
46b5f232b5 Kill
FAKE=Yes
HAS_CONFIGURE, GNU_CONFIGURE, USE_IMAKE, NO_INSTALL_MANPAGES, USE_AUTOCONF
and bump NEED_VERSION accordingly.
2000-10-22 15:41:23 +00:00
espie
aa4a7733cc Complete a few MAINTAINER names. 2000-10-22 14:02:46 +00:00
espie
944fbc0454 Fix bogus dependency.
I shouldn't have to do this. Jakob, your quality control is lacking...
2000-10-22 12:45:36 +00:00
fgsch
45aeb71d96 add real names to MAINTAINER. 2000-10-16 13:30:30 +00:00
avsm
ffbbe033d3 add real name to MAINTAINER and minor cleanups 2000-10-09 00:18:48 +00:00
jakob
f3f6dc0a6e rename patchfile 2000-10-08 22:35:56 +00:00
jakob
ce7dadcdb0 add fullname to MAINTAINER 2000-10-04 21:53:59 +00:00
jakob
2ef981add6 add mhash & shash 2000-10-04 21:18:00 +00:00
jakob
69f32fc494 secure hash generator 2000-10-04 21:16:18 +00:00
jakob
daf5e064a7 secure hash library 2000-10-04 21:11:09 +00:00
dugsong
3997978a57 update to 1.1.1 2000-10-03 05:41:01 +00:00
dugsong
e09d6443dc PFRAG, not PLIST. i suk 2000-10-02 20:21:36 +00:00
dugsong
d2c01dc9e2 add no_x11 flavor 2000-10-02 20:06:07 +00:00
matt
501c5c5bdd reflect DIST_SUBDIR change 2000-10-01 00:45:03 +00:00
matt
588bbc9101 - update to 1.0.5
- patch names, MAINTAINER -> current conventions
2000-10-01 00:41:45 +00:00
matt
a6ba53fea6 - update to 1.0.5
- patch names, MAINTAINER -> current conventions
2000-10-01 00:35:50 +00:00
avsm
5c943aea03 add p5-Crypt-SSLeay to subdir list 2000-09-29 10:24:33 +00:00
avsm
08fd8852b8 import CPAN module p5-Crypt-SSLeay-0.17
--

This Perl module provides support for the https protocol under LWP,
so that a LWP::UserAgent can make https GET & HEAD & POST requests.

Please see 'perldoc LWP' for more information on POST requests.
2000-09-29 10:20:46 +00:00
brad
f99c40395e - use DISTNAME as part of PKGNAME
- better COMMENT
- sort PLIST and add missing @dirrm tags
2000-09-28 22:19:01 +00:00
avsm
ebbd2e1767 - update to latest version 2.12
- correct bad master site subdirectory
- bump NEED_VERSION
- add MAINTAINER name

ok'ed by maintainer
2000-09-26 17:25:15 +00:00
jakob
c56c52ded2 update to version 4094 2000-09-25 21:16:33 +00:00
brad
3918ceb4a1 add name to MAINTAINER 2000-09-24 07:03:59 +00:00
aaron
41a5d86f80 Fix some pkg/COMMENT formatting:
- Decapitalize first letter of comment if appropriate.
- Remove trailing blank lines.
- Remove punctuation.
- Remove version numbers which are often overlooked when updating.
- espie@ ok
2000-09-22 14:55:55 +00:00
brad
1ea6743d0d upgrade to gnupg 1.0.3 2000-09-19 13:18:50 +00:00