naddy
3f5796b9fd
drop RCS Ids
2022-03-11 19:45:43 +00:00
tb
fe1f017a8d
net/quagga: fix for -fno-common
...
Declare instead of defining variables in headers and extern a variable
in one test; move one variable definition to a C file.
ok sthen
2021-02-04 13:17:12 +00:00
kirby
a81439a352
- switch HOMEPAGE to HTTPS
...
- move MASTER_SITES on its place as in Makefile.template and use
MASTER_SITE_SAVANNAH
2021-01-22 15:58:13 +00:00
sthen
15ac12bdde
Remove the hack from net/quagga now that we have ip_mreqn.
...
If you're using ospf/rip with quagga please test and report back if this
introduces a problem.
2021-01-09 21:51:09 +00:00
jca
ef420c133e
Minor update to quagga-1.2.4 + fix usage of getgrouplist
...
getgrouplist fix in FRR by renato@, patch and update to 1.2.4 by mgraves
at brainfat.net.
While here, sync WANTLIB of the snmp FLAVOR.
2020-09-23 22:26:02 +00:00
sthen
48b0b9660c
replace simple PERMIT_PACKAGE_CDROM=Yes with PERMIT_PACKAGE=Yes
2019-07-12 20:48:23 +00:00
sthen
f91d4a23d5
allow to build if RTM_LOSING is unavailable
2018-07-11 20:25:12 +00:00
naddy
5fd99cb252
catch up with RTM_LOCK removal; ok sthen@
2018-07-03 11:52:02 +00:00
gsoares
4900487903
update to 1.2.3
...
(this release contains a number of fixes, including potentially important BGP security fixes)
https://www.quagga.net/security/Quagga-2018-0543.txt
https://www.quagga.net/security/Quagga-2018-1114.txt
https://www.quagga.net/security/Quagga-2018-1550.txt
https://www.quagga.net/security/Quagga-2018-1975.txt
full changelog at:
https://savannah.nongnu.org/forum/forum.php?forum_id=9095
2018-02-16 21:20:05 +00:00
rpe
9a8b5ccd06
Change the shebang line from /bin/sh to /bin/ksh in all ports rc.d
...
daemon scripts and bump subpackages that contain the *.rc scripts.
discussed with and OK aja@
OK tb
2018-01-11 19:27:01 +00:00
sthen
5761f14aa1
disable libexecinfo, and garbage-collect --disable-pie which was removed upstream
2017-11-25 12:40:18 +00:00
sthen
8813959acc
Update to quagga-1.2.2, using a simpler diff to the multicast code.
...
If you start seeing new problems with OSPF and RIP relating to sending
packets, please let me know.
2017-11-03 14:28:43 +00:00
sthen
6b3f3f785e
simplify patch by removing a chunk which is #ifdef'd to only be used on
...
os with struct ip_mreqn
2017-10-31 11:02:50 +00:00
sthen
2742b32227
update to quagga-1.0.20161017 (not the latest, but a simpler change than 1.1+
...
which touches the multicast-related code that we had to patch).
add recent upstream commit to fix AS_PATH size calculation for long BGP paths.
2017-10-31 09:37:18 +00:00
jca
5dff9cbc15
Repair IPV6_MINHOPCOUNT support.
...
ok sthen@
2016-06-27 19:55:48 +00:00
jca
10084a7e9e
Fix quagga ospfd
...
Upstream assumes that they can pass an interface index instead of an ip
address in struct ip_mreq.imr_interface. We do not support this.
ok sthen@ (maintainer)
2016-03-31 22:42:00 +00:00
jca
326ff97ca4
Fix quagga/ospfd.
...
Upstream assumes that we support passing an interface index instead of
an address in struct ip_mreq.imr_interface (hack supported by FreeBSD &
NetBSD).
ok sthen@ (maintainer)
2016-03-31 22:35:41 +00:00
jca
2886733742
Update to 1.0.20160315, ok sthen@ (maintainer)
...
Announce:
https://lists.quagga.net/pipermail/quagga-users/2016-March/014293.html
ChangeLog:
http://savannah.spinellicreations.com/quagga/quagga-1.0.20160315.changelog.txt
http://savannah.spinellicreations.com/quagga/quagga-1.0.20160309.changelog.txt
Note that this update brings a fix for CVE-2016-2342. This vulnerability
affects quagga MPLS VPN setups which probably aren't possible on OpenBSD.
2016-03-22 12:57:54 +00:00
sthen
691c83f9b2
Bump some ports which reference if_msghdr in their source, so that package
...
updates are triggered. This is following the struct if_data ABI change a few
days ago; if_msghdr has an embedded if_data. Some may be unnecessary, but
some are definitely needed and bumps are cheaper than debugging.
Problem reported with wpa_supplicant by Mikolaj Kucharski.
2015-10-08 21:19:21 +00:00
sthen
391dc93fe7
REVISION bumps following the additional member in struct if_data,
...
to make sure packages get updated
2015-10-05 16:29:01 +00:00
sthen
885e4fc550
-RTF_XRESOLVE
2015-09-11 20:56:10 +00:00
sthen
d8e747ddd7
bump; ifmedia64
2015-09-11 16:15:31 +00:00
sthen
7526aab381
Pass --disable-pie to configure all the time and rely on the compiler using
...
PIE by default where supported.
2015-07-15 22:55:06 +00:00
sthen
be3b4cc4dd
update to quagga 0.99.24.1, from Brad
2015-04-18 10:39:34 +00:00
sthen
5f24ef1539
build isisd in quagga, not tested but no reason not to build
2015-01-19 15:44:12 +00:00
sthen
f7f2ca03c8
update to quagga-0.99.23.1
2014-09-23 23:06:18 +00:00
sthen
c496c04b9e
update to quagga-0.99.23
2014-06-27 00:06:42 +00:00
ajacoutot
cfe4be35c5
No need to explicitely SUBST_VARS LOCALSTATEDIR anymore.
2014-04-15 08:53:04 +00:00
sthen
27f03b1c52
bump REVISION for any ports using route messages. regen some distinfos and
...
remove unnecessary USE_GROFFs while there.
2013-10-31 21:12:12 +00:00
sthen
a6ca9046a3
update to quagga 0.9.22.4, including a security fix for an issue with
...
OSPF-API, and discard malformed LSAs which don't cause a problem for
quagga itself but when passed to other implementations can trigger
http://www.kb.cert.org/vuls/id/229804 (i.e. to limit the distribution
of such bad LSAs).
2013-10-19 13:26:56 +00:00
brad
bcc6825212
Update to Quagga 0.99.22.1.
...
ok sthen@
2013-05-14 18:41:14 +00:00
sthen
0ced1886e6
Update to quagga 0.99.22, merged from diffs from myself and Brad. Also:
...
- replace MESSAGE with some @sample'd config files
- install rc.d scripts
- multicast code still ported from older version (new one needs RFC3678)
2013-04-18 20:29:08 +00:00
ajacoutot
58f1a6f9f6
USE_LIBTOOL=Yes is the default now.
2013-03-21 08:45:11 +00:00
espie
eae66e4a7b
PERMIT_* / REGRESS->TEST sweep
2013-03-11 11:35:43 +00:00
sthen
f5a323c546
Don't use ${FLAVOR:L}, we only support lower-case flavours now.
...
OK ajacoutot@ espie@
2013-02-09 14:49:50 +00:00
sthen
1931eaa0b1
revert multicast changes in last upstream release, they do not work on OS
...
which require the interface IP address for IP_{ADD,DROP}_MEMBERSHIP
reported by Raphael Mazelier
2013-01-04 00:24:10 +00:00
brad
3343f77fdb
Fix a BGP DoS issue in bgp_capability_orf(). CVE-2012-1820
...
ok sthen@
2012-12-08 18:42:43 +00:00
sthen
46b6a18c80
update to Quagga 0.99.21
2012-09-19 16:35:06 +00:00
dcoppa
862fb57f81
Remove this; committed by mistake.
...
ok ajacoutot@, sthen@
2012-08-05 08:14:56 +00:00
espie
39ab78796c
... and some of the patches I forgot to add
2012-08-04 14:25:33 +00:00
espie
6fdca43594
fix non-sensible libtool parameters, allows us to drop some very weird
...
libtool code.
2012-08-04 14:24:23 +00:00
ajacoutot
acaaa6fdba
Use LOCALSTATEDIR instead of local variables.
2012-04-28 11:06:12 +00:00
ajacoutot
3f0ee525f1
Use LOCALSTATEDIR.
2012-04-28 10:51:44 +00:00
sthen
3721be5ee4
update to quagga 0.99.20.1 rolling in the security fixes which we had as
...
separate patches.
multicast support changed in 0.99.20 and not fully tested, no response to
my ports@ call for testing, so if this breaks things send me a mail with
details.
2012-03-31 10:51:47 +00:00
sthen
88ea72915d
Change SEPARATE_BUILD=(concurrent|simple) to Yes; bsd.port.mk doesn't
...
make a distinction between these. ok aja@ dcoppa@
2012-03-29 13:38:12 +00:00
sthen
3a547a5052
add SECURITY patches from quagga 0.99.20.1
...
CVE-2012-0249 - Quagga ospfd DoS on malformed LS-Update packet
CVE-2012-0250 - Quagga ospfd DoS on malformed Network-LSA data
CVE-2012-0255 - Quagga bgpd DoS on malformed OPEN message
2012-03-20 20:56:26 +00:00
sthen
c598d08ea3
use SYSCONFDIR/BASESYSCONFDIR to avoid "CONFIGURE_STYLE=gnu old" hack
2012-01-17 17:22:56 +00:00
sthen
52c177c5ac
bumps; net/if.h
2011-11-16 00:20:08 +00:00
sthen
56616ca74e
fix ospf segfault introduced in 0.99.19, backported from 0.99.20
2011-10-02 02:01:07 +00:00
sthen
87d697fd01
SECURITY update to quagga 0.99.19
...
CVE-2011-3323: ospf6d *stack-based buffer overflow*, inter-area-prefix LSAs
CVE-2011-3324: ospf6d assertion failure; DD LSAs with over-length header
CVE-2011-3325: ospf crash(?) if a hello has a truncated header or invalid type
CVE-2011-3326: ospf null deref if a link state update LSA has an unknown type
CVE-2011-3327: bgp buffer overflow with malformed UPDATE (extended communities)
2011-09-27 09:45:53 +00:00