14 Commits

Author SHA1 Message Date
jca
51c1008b69 Maintenance update to dnscrypt-proxy-1.4.2
ok sthen@, MAINTAINER timeout.
2015-01-02 20:21:06 +00:00
sthen
2eb8df2f0d update to dnscrypt-proxy-1.4.1 2014-09-23 23:56:33 +00:00
ajacoutot
9d087a11f1 Tweak documentation according to recent rc changes.
ok jasper@
2014-07-22 10:55:40 +00:00
ajacoutot
497984ddf0 rc.conf.local is in man(1) section 8, at least for now. 2014-07-10 13:09:06 +00:00
sthen
6600b9de43 update to dnscrypt-proxy 1.4.0 2014-04-25 17:11:26 +00:00
sthen
a522f6c88e don't pick up uuid/uuid.h if it's present at build time (not used here
anyway), spotted by naddy
2013-12-05 10:45:32 +00:00
sthen
9ce9081d50 BUILD_DEPENDS=foo works better when you don't have it twice in the Makefile,
hit by naddy and landry
2013-10-25 21:01:50 +00:00
sthen
fc1cab1dc1 switch to upstream's code for arc4random_addrandom removal, suggested by
Pablo Méndez Hernández
2013-10-23 13:14:07 +00:00
sthen
31a110625f update to dnscrypt-proxy 1.3.3 2013-10-23 12:42:20 +00:00
jca
c348e7b9d4 Fixup after arc4random_addrandom/arc4random_stir removal.
This is an embedded copy of libevent2, so don't bother with compat
patches for upstream.  ok naddy@
2013-10-22 19:51:59 +00:00
sthen
1b4cb18398 don't force PIE; fixes arm (and it's enabled by default on OpenBSD on arches
where it works).
2013-08-15 11:02:23 +00:00
jasper
303d273d30 fix BUILD_DEPENDS 2013-07-09 13:43:06 +00:00
espie
eae66e4a7b PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:35:43 +00:00
sthen
d00e751efc import ports/net/dnscrypt-proxy, from Frank Denis with small tweaks
by me, ok jasper@

DNSCrypt-proxy provides local service which can be used directly
as your local resolver or as a DNS forwarder, encrypting requests
using the DNSCrypt protocol and passing them to an upstream server,
by default OpenDNS who run this on their resolvers.

The DNSCrypt protocol is very similar to DNSCurve, but focuses on
securing communications between a client and its first-level resolver.
While not providing end-to-end security, it protects the local
network, which is often the weakest point of the chain, against
man-in-the-middle attacks. It also provides some confidentiality to
DNS queries.
2012-10-12 15:20:00 +00:00