324 Commits

Author SHA1 Message Date
sthen
3d42d58ebf atomic for macppc base-clang 2020-04-06 22:11:21 +00:00
sthen
460f64804f update to squid-4.10 2020-01-21 21:40:46 +00:00
sthen
b2ad5502af update to squid-4.9 2019-11-08 09:53:40 +00:00
sthen
b8dcf425bf update to squid-4.8 2019-07-10 15:14:49 +00:00
cwen
3dcc6d0d90 squid: requires atomics on macppc
input and OK by sthen@ (maintainer) and jca@
2019-06-09 19:36:24 +00:00
sthen
9c6e9626b9 s/PERMIT_PACKAGE_CDROM/PERMIT_PACKAGE/ and some light whitespace tidying
in ports which I maintain
2019-06-03 16:06:50 +00:00
naddy
ebf751b927 Update gettext to 0.20.1.
Follow the upstream recommendations for packagers and switch to
multi-packages:
devel/gettext       -> devel/gettext,-runtime
devel/gettext-tools -> devel/gettext,-tools
(new)                  devel/gettext,-textstyle
2019-05-20 22:15:00 +00:00
sthen
7bedf9733f update to squid-4.7 2019-05-11 12:40:40 +00:00
matthieu
6e8a4d9a6e Add a patch to ignore ECONNABORTED in accept(2).
This was causing lockups on my squid cache at work.
Upstreem PR: https://github.com/squid-cache/squid/pull/404
ok sthen@, jca@
2019-05-11 08:17:36 +00:00
sthen
fb6232791e update to squid-4.6 2019-02-20 16:23:27 +00:00
sthen
50d6439440 major update to squid-4.5
quick update notes below, but you should still review upstream's
RELEASENOTES.html if you use this.

- if you explicitly configure sslcrtd_program (for advanced tls mitm
configurations) you need to change from /usr/local/libexec/squid/sslcrtd
to /usr/local/libexec/squid/security_file_certgen in your config (if you
just use options on the http_port line to enable this without extra
config, this doesn't need to change).

- if using a cert helper disk cache, you may need to clear/reinitialize
the directory (not mentioned in release notes but I needed this).

- the SMB_LM helpers (for old lanmanager protocol, which should not be
used anyway) are no longer packaged, following upstream's change in default
build.
2019-02-05 23:03:15 +00:00
sthen
41056a893f fix triggerable memory leak which is present if snmp is enabled (not on by default),
http://www.squid-cache.org/Advisories/SQUID-2018_5.txt
2018-10-30 15:41:51 +00:00
sthen
515376884b Add a patch for http://www.squid-cache.org/Advisories/SQUID-2018_4.txt,
XSS vulnerability when generating HTTPS response messages about TLS errors
(in TLS MITM support).
2018-10-29 18:43:01 +00:00
jsing
f08938ae10 Unbreak net/squid - stop using antiquated ASN.1 macros that have been
removed (apparently this diff was hiding in my ports tree...)

ok naddy@
2018-10-25 16:15:38 +00:00
espie
f4b7f81318 convert to PKGSTEM 2018-09-04 12:46:09 +00:00
sthen
05a646ea40 update to squid-3.5.28 2018-07-18 21:16:47 +00:00
tb
d0cf5b17c2 Unbreak after libssl const changes.
ok sthen
2018-04-25 07:14:19 +00:00
sthen
949b43e1d0 fix http://www.squid-cache.org/Advisories/SQUID-2018_3.txt
Due to incorrect pointer handling Squid is vulnerable to denial
of service attack when processing ESI responses.

This problem allows a remote server delivering ESI responses
to trigger a denial of service for all clients accessing the
Squid service.

This problem is limited to Squid operating as reverse proxy.
2018-04-19 21:49:35 +00:00
sthen
af3b8874ad http://www.squid-cache.org/Advisories/SQUID-2018_1.txt
Due to incorrect pointer handling Squid is vulnerable to denial
 of service attack when processing ESI responses.

 This problem allows a remote server delivering certain ESI
 response syntax to trigger a denial of service for all clients
 accessing the Squid service.

http://www.squid-cache.org/Advisories/SQUID-2018_2.txt

 Due to incorrect pointer handling Squid is vulnerable to denial
 of service attack when processing ESI responses or downloading
 intermediate CA certificates.

 This problem allows a remote client delivering certain HTTP
 requests in conjunction with certain trusted server responses to
 trigger a denial of service for all clients accessing the Squid
 service.
2018-01-23 15:00:02 +00:00
rpe
9a8b5ccd06 Change the shebang line from /bin/sh to /bin/ksh in all ports rc.d
daemon scripts and bump subpackages that contain the *.rc scripts.

discussed with and OK aja@
OK tb
2018-01-11 19:27:01 +00:00
naddy
11e3dd67b3 switch COMPILER from the old, confusing shortcuts to the more explicit format 2017-11-16 23:20:37 +00:00
sthen
30eaa4b102 sync WANTLIB and bump, gc a few gettext MODULES while there 2017-09-22 21:30:32 +00:00
sthen
dc8dda12df update to squid-3.5.27 2017-08-22 22:40:57 +00:00
sthen
5e964ab0df bump LIBCXX/LIBECXX/COMPILER_LIBCXX ports. 2017-07-26 22:45:14 +00:00
espie
8ac47fd9c6 use COMPILER_LIBCXX where applicable 2017-07-16 19:18:47 +00:00
sthen
3379847204 update to squid-3.5.26 2017-06-03 21:04:49 +00:00
espie
cc5bc426ed switch everything to new COMPILER idiom, even stuff that won't build with clang
yet, but at least that part is done.
2017-05-31 08:08:15 +00:00
sthen
0cec2e8b5c use WANT_CXX 2017-05-21 17:27:22 +00:00
schwarze
93309b5dd4 Unimportant whitespace differences only, drop USE_GROFF.
While here, fix a number of quite serious escaping errors in
four manual pages that caused loss of important information.
I will also send those upstream.

OK sthen@
2017-05-11 16:29:55 +00:00
sthen
abec0e3c77 update to squid-3.5.25 2017-04-04 21:09:30 +00:00
ajacoutot
a4751d331b Missed bump. 2017-02-18 17:33:51 +00:00
ajacoutot
1722249aa0 idn -> idn2 after gnutls WANTLIB change. 2017-02-18 17:32:37 +00:00
sthen
1bd5c493ce update to squid-3.5.24 2017-01-29 20:43:31 +00:00
sthen
d2f20ed67b update to squid-3.5.23
<http://www.squid-cache.org/Advisories/SQUID-2016_10.txt>
Incorrect HTTP Request header comparison results in Collapsed
Forwarding feature mistakenly identifying some private responses as
being suitable for delivery to multiple clients.

<http://www.squid-cache.org/Advisories/SQUID-2016_11.txt>
Incorrect processing of responses to If-None-Modified HTTP conditional
requests leads to client-specific Cookie data being leaked to other
clients. Attack requests can easily be crafted by a client to probe a
cache for this information.
2016-12-18 22:36:52 +00:00
sthen
bc924e53fc update to squid-3.5.22 2016-10-11 13:47:44 +00:00
sthen
b8e4361f30 update to squid-3.5.21 2016-09-13 19:27:11 +00:00
sthen
cad1945c38 update to squid-3.5.20, various fixes including some asserts 2016-07-04 12:13:40 +00:00
sthen
d7bb82ebb8 Switch squid to ports gcc, it's already used on powerpc, fixes some problems
on arm (found by Steven Chamberlain), so it seems like it may be a safer
approach (and the next major version requires newer c++ anyway).  Based on
a diff from Steven Chamberlain.
2016-06-11 18:10:00 +00:00
sthen
5448cb79e8 fix no_ldap builds 2016-05-12 16:15:58 +00:00
sthen
2012b0ace2 update to squid-3.5.19 (compared to 3.5.18, fixes a problem with interception
proxies)
2016-05-09 13:52:45 +00:00
sthen
df3b722c65 update to squid-3.5.18 2016-05-07 14:06:41 +00:00
sthen
38a830c8b0 add upstream patches to Squid (there should be an upstream release
soon, but the patches make sense for now) -

1) Cache Poisoning issue in HTTP Request handling
http://www.squid-cache.org/Advisories/SQUID-2016_7.txt

2) Header Smuggling issue in HTTP Request processing
http://www.squid-cache.org/Advisories/SQUID-2016_8.txt

3) Multiple Denial of Service issues in ESI Response processing.
http://www.squid-cache.org/Advisories/SQUID-2016_9.txt
2016-05-06 19:44:11 +00:00
sthen
685c415639 update to squid-3.5.17, fixing some buffer overflows and possible
disclosure of stack contents. when available, reports will be at
http://www.squid-cache.org/Advisories/SQUID-2016_5.txt
http://www.squid-cache.org/Advisories/SQUID-2016_6.txt
2016-04-20 16:36:50 +00:00
sthen
b8de09f036 update to squid-3.5.16, various fixes including a buffer overflow in pinger
with icmp6.
2016-04-02 10:44:18 +00:00
naddy
ce859edcb4 garbage collect CONFIGURE_SHARED 2016-03-11 20:28:21 +00:00
sthen
f8011b5675 update to squid 3.5.15, dos fix 2016-02-25 00:47:20 +00:00
sthen
370a9fb9c0 Security update to squid-3.5.14, ok jasper@ rpointel@
http://www.squid-cache.org/Advisories/SQUID-2016_1.txt

"Due to incorrectly handling server errors Squid is vulnerable to a
denial of service attack when connecting to TLS or SSL servers."
2016-02-16 13:21:07 +00:00
sthen
eeede057c8 update to squid-3.5.13, a couple of fixes, mostly TLS-intercept-related 2016-01-10 20:09:58 +00:00
sthen
aa7f6d8dac update to squid-3.5.12 2015-11-30 10:26:16 +00:00
sthen
2a41ed34cd fix autoconf check which used SSLv3_method; results in assert failure in
some ssl interception modes
2015-11-04 15:39:55 +00:00