143 Commits

Author SHA1 Message Date
sthen
9c6e9626b9 s/PERMIT_PACKAGE_CDROM/PERMIT_PACKAGE/ and some light whitespace tidying
in ports which I maintain
2019-06-03 16:06:50 +00:00
sthen
59b9d5d0ef - switch librenms, roundcube and related ports to php 7.3
- mention in rcube-sieverules/pkg/DESCR that it's unmaintained upstream
(suggest using the bundled Managesieve plugin instead)
2019-05-20 13:23:44 +00:00
sthen
2a09e0c70d update to roundcubemail-1.3.9 2019-04-01 10:29:42 +00:00
sthen
a49e0c3c7a patch roundcubemail to fix typo 2018-12-21 13:18:26 +00:00
sthen
9153551649 update to roundcubemail-1.3.8
various fixes including an XSS in handling invalid style tag content
2018-10-26 20:57:55 +00:00
sthen
44f8a14fd9 switch default php version from 7.0 to 7.1 (not 7.2 yet as some things are still
using mcrypt).
2018-10-17 14:15:55 +00:00
espie
f4b7f81318 convert to PKGSTEM 2018-09-04 12:46:09 +00:00
sthen
62ae66e375 bump REVISION to be above 6.3-stable due to changes for newer PHP version
and split-off pdo_sqlite
2018-07-29 22:11:53 +00:00
sthen
7b126b1bdb update to roundcube 1.3.7
"It contains fixes to several bugs backported from the master branch
including a security fix mitigating the EFAIL issue recently discovered
in OpenPGP."

https://github.com/roundcube/roundcubemail/releases/tag/1.3.7
2018-07-29 22:09:29 +00:00
sthen
be815a74f7 bump; tweak MODPHP_PDO_DEPENDS order 2018-06-02 20:58:30 +00:00
sthen
abbcd9d662 use MODPHP_PDO_DEPENDS where it makes sense (ports that do require
PDO but it was being defaulted in from pdo_mysql in the main php
package).

hints+ok for ownCloud/nextcloud aja@
2018-05-25 14:03:36 +00:00
sthen
1cd7e295e8 drop MODPHP_VERSION=7.0 for ports which switched early 2018-05-22 08:19:06 +00:00
sthen
f8c62a01d7 flip roundcube and associated ports over to PHP 7.0, I've been using
roundcube and some of the others with 7 for ages.
2018-05-17 08:33:20 +00:00
sthen
eaf8a2a299 update to Roundcube 1.3.6, a couple of fixes, the main one being:
"In Roundcube from versions 1.2.0 to 1.3.5, with the archive
plugin enabled and configured, it's possible to exploit the
unsanitized, user-controlled "_uid" parameter (in an archive.php
_task=mail&_mbox=INBOX&_action=plugin.move2archive request) to perform
an MX (IMAP) injection attack by placing an IMAP command after a %0d%0a
sequence. NOTE: this is less easily exploitable in 1.3.4 and later
because of a Same Origin Policy protection mechanism."

https://github.com/roundcube/roundcubemail/releases/tag/1.3.6
2018-04-11 21:20:40 +00:00
sthen
cb33f6e886 Add a rewrite to the nginx config snippet to allow use of the config
setting "$config['use_secure_urls'] = true;" which adds anti-csrf tokens
to the URL.
2018-03-30 10:50:14 +00:00
sthen
3ba8a809ae portroach annotations 2018-03-17 22:03:23 +00:00
sthen
b8d149354d bugfix (including minor security fix) update to roundcubemail-1.3.5
https://github.com/roundcube/roundcubemail/releases/tag/1.3.5
2018-03-15 21:25:24 +00:00
sthen
366fdb90a3 use MODPHP_BIN to fix #! and "system php" on a few more files 2018-02-03 10:35:19 +00:00
sthen
2b7ff9724d use find -delete rather than find -exec rm {} + 2018-01-22 18:20:53 +00:00
sthen
956eb3241a update to roundcubemail-1.3.4 2018-01-14 20:18:40 +00:00
sthen
9eab8f48a7 security update to roundcubemail-1.3.3:
"Apparently this zero-day exploit is already being used by hackers to
read Roundcube’s configuration files. It requires a valid
username/password as the exploit only works with a valid session. More
details will be published soon under CVE-2017-16651.

In order to check whether your Roundcube installation has been
compromised check the access logs for requests like

?_task=settings&_action=upload-display&_from=timezone

As mentioned above, the file disclosure only works for authenticated
users and by finding such requests in the logs you should also be able
to identify the account used for this unauthorized access. For
mitigation we recommend to change the all credentials to external
services like database or LDAP address books and preferably also the
'des_key' option in your config."
2017-11-09 16:26:09 +00:00
sthen
5ff1572aac update to roundcubemail-1.3.2 2017-11-02 10:57:37 +00:00
sthen
705e7ad281 update to roundcubemail-1.3.1 2017-09-04 21:47:01 +00:00
sthen
3ef008aa35 update to roundcubemail-1.3.0, ok landry@ 2017-06-30 13:26:22 +00:00
sthen
fbd2527dff security update to roundcubemail-1.2.5
"The updates primarily fix a recently discovered vulnerability in the
virtualmin and sasl drivers of the password plugin (CVE-2017-8114).
More details about this vulnerability will be published soon by the
reporter. Security-wise the update is therefore only relevant for those
installations of Roundcube using the password plugin with either one of
these drivers."
2017-04-28 21:50:33 +00:00
sthen
45153a686a update to roundcubemail-1.2.4 2017-03-11 14:26:37 +00:00
sthen
93d8167f54 /var/www/roundcubemail/db should have been owned by root:www; pointed out by
Philippe Leledy via ajacouot@
2016-11-30 12:09:34 +00:00
sthen
2ae3195885 update to roundcubemail-1.2.3 2016-11-29 11:42:00 +00:00
sthen
b7373c6ef4 Install a sample /var/www/roundcubemail/db/ directory with valid permissions,
for sqlite3 users. Philippe Leledy reported that it had to be created manually.

While there, add a sample nginx config section to the README.
2016-11-17 21:56:59 +00:00
sthen
0bdd0c3e1e update to roundcube-1.2.2 2016-10-11 15:49:00 +00:00
sthen
56acd0dc9d update to roundcube 1.2.0, including PHP7 compatibility, PGP encryption
(either server-side or client-side using the Mailvelope browser plugin),
and various other improvements and bug fixes.
2016-05-22 19:22:22 +00:00
sthen
585968c7db cleanup apache1 and some other old bits 2016-04-29 09:36:59 +00:00
sthen
d2a6f37df9 update to roundcubemail-1.1.5 2016-04-21 00:46:07 +00:00
sthen
a759f6904b stop bundling composer in roundcube, there's a sane way to install it from
packages now. patch docs to match.
2016-02-29 23:58:09 +00:00
ajacoutot
98bca201ef @sample /var/www/conf/modules.sample/
ok sthen@
2015-12-30 10:01:25 +00:00
sthen
458e5c742a update to roundcubemail-1.1.4 2015-12-27 21:58:29 +00:00
sthen
97889e162c switch my distfiles mirror to https 2015-12-03 21:24:29 +00:00
sthen
76b3a0829b remove the STREAM_CRYPTO_METHOD_TLS_CLIENT patch from previous commit
now that it's fixed in the PHP package instead.

zap stray ; spotted by ajacoutot.
2015-10-22 13:06:23 +00:00
sthen
0bbf9f3cdd Patch roundcubemail to use STREAM_CRYPTO_METHOD_SSLv23_CLIENT when making an
imap connection.

PHP's STREAM_CRYPTO_METHOD_TLS_CLIENT is TLSv1.0 only "for BC with pre-5.6".
There's a STREAM_CRYPTO_METHOD_TLS_ANY_CLIENT but it doesn't seem to actually
work, so use STREAM_CRYPTO_METHOD_SSLv23_CLIENT which (at least with libressl)
is TLS-only anyway.

Thanks PHP.

While there, add an explicit note to the README about the requirement to
disable suhosin session encryption now that we're using the extension in the
standard PHP packages.
2015-10-21 16:48:50 +00:00
sthen
945e9c92df update to roundcubemail-1.1.3 2015-09-16 21:04:07 +00:00
sthen
d4c3a2a91d "httpd from OpenBSD base system" is no longer apache, fix readme 2015-09-10 09:25:56 +00:00
sthen
57c0b91953 Roundcube forces its own error_reporting options; adjust the mask to avoid
reporting E_DEPRECATED messages as there is a deprecation warning with Net_SMTP
that is unfixed upstream resulting in a lot of noise in roundcube's error log
for each sent message.
2015-06-25 12:00:25 +00:00
sthen
5aa2b4e1cc bump REVISION again to ensure -current version is above -stable version
(because PHP dependency path is different between the two)
2015-06-08 09:18:15 +00:00
sthen
a60638b86d update to roundcubemail-1.1.2 including a fix for an XSS and a potential
arbitrary file read.

http://trac.roundcube.net/query?group=status&component=Security&milestone=1.1.2
2015-06-08 09:14:32 +00:00
robert
9c1017ae2d bump revision due to the change of the default php version to 5.6
ok aja@
2015-06-05 06:00:20 +00:00
espie
2ace40bfb8 don't depend on modes in the ports tree being what we want installed 2015-05-08 09:08:44 +00:00
sthen
943d3bcb0a mirror the composer distfile, it changed upstream
reported by robert@
2015-04-26 22:44:32 +00:00
sthen
166e8a22f8 update to roundcube-1.1.1
http://trac.roundcube.net/wiki/Changelog

there's a minor schema update for non-sqlite dbs,
/var/www/roundcubemail/bin/update.sh applies it
2015-03-19 11:21:11 +00:00
sthen
12e75bb25f missing run deps for roundcubemail (a.k.a. commit from correct directory),
problems reported by ajacoutot
2015-02-10 11:36:06 +00:00
sthen
2edbca5bb7 update to roundcube 1.1.0, allows searches across multiple folders, better
support for screen readers and more.

Note: IE7/8 no longer supported by default but can be added with the
"legacy_browser" plugin.

There is new experimental anti-CSRF code (per-session tokens in URLs making
it harder for an attacker to generate a valid URL), this is not enabled by
default (requires rewrite support from the web server), for more info see
http://trac.roundcube.net/wiki/Howto_Config/Secure_URLs
2015-02-10 11:05:33 +00:00