62 Commits

Author SHA1 Message Date
jca
10084a7e9e Fix quagga ospfd
Upstream assumes that they can pass an interface index instead of an ip
address in struct ip_mreq.imr_interface.  We do not support this.

ok sthen@ (maintainer)
2016-03-31 22:42:00 +00:00
jca
326ff97ca4 Fix quagga/ospfd.
Upstream assumes that we support passing an interface index instead of
an address in struct ip_mreq.imr_interface (hack supported by FreeBSD &
NetBSD).

ok sthen@ (maintainer)
2016-03-31 22:35:41 +00:00
jca
2886733742 Update to 1.0.20160315, ok sthen@ (maintainer)
Announce:

  https://lists.quagga.net/pipermail/quagga-users/2016-March/014293.html

ChangeLog:

  http://savannah.spinellicreations.com/quagga/quagga-1.0.20160315.changelog.txt
  http://savannah.spinellicreations.com/quagga/quagga-1.0.20160309.changelog.txt

Note that this update brings a fix for CVE-2016-2342.  This vulnerability
affects quagga MPLS VPN setups which probably aren't possible on OpenBSD.
2016-03-22 12:57:54 +00:00
sthen
691c83f9b2 Bump some ports which reference if_msghdr in their source, so that package
updates are triggered. This is following the struct if_data ABI change a few
days ago; if_msghdr has an embedded if_data.  Some may be unnecessary, but
some are definitely needed and bumps are cheaper than debugging.
Problem reported with wpa_supplicant by Mikolaj Kucharski.
2015-10-08 21:19:21 +00:00
sthen
391dc93fe7 REVISION bumps following the additional member in struct if_data,
to make sure packages get updated
2015-10-05 16:29:01 +00:00
sthen
885e4fc550 -RTF_XRESOLVE 2015-09-11 20:56:10 +00:00
sthen
d8e747ddd7 bump; ifmedia64 2015-09-11 16:15:31 +00:00
sthen
7526aab381 Pass --disable-pie to configure all the time and rely on the compiler using
PIE by default where supported.
2015-07-15 22:55:06 +00:00
sthen
be3b4cc4dd update to quagga 0.99.24.1, from Brad 2015-04-18 10:39:34 +00:00
sthen
5f24ef1539 build isisd in quagga, not tested but no reason not to build 2015-01-19 15:44:12 +00:00
sthen
f7f2ca03c8 update to quagga-0.99.23.1 2014-09-23 23:06:18 +00:00
sthen
c496c04b9e update to quagga-0.99.23 2014-06-27 00:06:42 +00:00
ajacoutot
cfe4be35c5 No need to explicitely SUBST_VARS LOCALSTATEDIR anymore. 2014-04-15 08:53:04 +00:00
sthen
27f03b1c52 bump REVISION for any ports using route messages. regen some distinfos and
remove unnecessary USE_GROFFs while there.
2013-10-31 21:12:12 +00:00
sthen
a6ca9046a3 update to quagga 0.9.22.4, including a security fix for an issue with
OSPF-API, and discard malformed LSAs which don't cause a problem for
quagga itself but when passed to other implementations can trigger
http://www.kb.cert.org/vuls/id/229804 (i.e. to limit the distribution
of such bad LSAs).
2013-10-19 13:26:56 +00:00
brad
bcc6825212 Update to Quagga 0.99.22.1.
ok sthen@
2013-05-14 18:41:14 +00:00
sthen
0ced1886e6 Update to quagga 0.99.22, merged from diffs from myself and Brad. Also:
- replace MESSAGE with some @sample'd config files
- install rc.d scripts
- multicast code still ported from older version (new one needs RFC3678)
2013-04-18 20:29:08 +00:00
ajacoutot
58f1a6f9f6 USE_LIBTOOL=Yes is the default now. 2013-03-21 08:45:11 +00:00
espie
eae66e4a7b PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:35:43 +00:00
sthen
f5a323c546 Don't use ${FLAVOR:L}, we only support lower-case flavours now.
OK ajacoutot@ espie@
2013-02-09 14:49:50 +00:00
sthen
1931eaa0b1 revert multicast changes in last upstream release, they do not work on OS
which require the interface IP address for IP_{ADD,DROP}_MEMBERSHIP

reported by Raphael Mazelier
2013-01-04 00:24:10 +00:00
brad
3343f77fdb Fix a BGP DoS issue in bgp_capability_orf(). CVE-2012-1820
ok sthen@
2012-12-08 18:42:43 +00:00
sthen
46b6a18c80 update to Quagga 0.99.21 2012-09-19 16:35:06 +00:00
dcoppa
862fb57f81 Remove this; committed by mistake.
ok ajacoutot@, sthen@
2012-08-05 08:14:56 +00:00
espie
39ab78796c ... and some of the patches I forgot to add 2012-08-04 14:25:33 +00:00
espie
6fdca43594 fix non-sensible libtool parameters, allows us to drop some very weird
libtool code.
2012-08-04 14:24:23 +00:00
ajacoutot
acaaa6fdba Use LOCALSTATEDIR instead of local variables. 2012-04-28 11:06:12 +00:00
ajacoutot
3f0ee525f1 Use LOCALSTATEDIR. 2012-04-28 10:51:44 +00:00
sthen
3721be5ee4 update to quagga 0.99.20.1 rolling in the security fixes which we had as
separate patches.

multicast support changed in 0.99.20 and not fully tested, no response to
my ports@ call for testing, so if this breaks things send me a mail with
details.
2012-03-31 10:51:47 +00:00
sthen
88ea72915d Change SEPARATE_BUILD=(concurrent|simple) to Yes; bsd.port.mk doesn't
make a distinction between these.  ok aja@ dcoppa@
2012-03-29 13:38:12 +00:00
sthen
3a547a5052 add SECURITY patches from quagga 0.99.20.1
CVE-2012-0249 - Quagga ospfd DoS on malformed LS-Update packet
CVE-2012-0250 - Quagga ospfd DoS on malformed Network-LSA data
CVE-2012-0255 - Quagga bgpd DoS on malformed OPEN message
2012-03-20 20:56:26 +00:00
sthen
c598d08ea3 use SYSCONFDIR/BASESYSCONFDIR to avoid "CONFIGURE_STYLE=gnu old" hack 2012-01-17 17:22:56 +00:00
sthen
52c177c5ac bumps; net/if.h 2011-11-16 00:20:08 +00:00
sthen
56616ca74e fix ospf segfault introduced in 0.99.19, backported from 0.99.20 2011-10-02 02:01:07 +00:00
sthen
87d697fd01 SECURITY update to quagga 0.99.19
CVE-2011-3323: ospf6d *stack-based buffer overflow*, inter-area-prefix LSAs
CVE-2011-3324: ospf6d assertion failure; DD LSAs with over-length header
CVE-2011-3325: ospf crash(?) if a hello has a truncated header or invalid type
CVE-2011-3326: ospf null deref if a link state update LSA has an unknown type
CVE-2011-3327: bgp buffer overflow with malformed UPDATE (extended communities)
2011-09-27 09:45:53 +00:00
jasper
4fee5ffce0 Sanitize some @unexec/@extraunexec calls to rm: move them up in the
PLIST and delete everything under the @sample'd directory instead of the
directory itself to prevent a warning from pkg_delete(1) trying to
remove a non existing directory and to help preventing left-over files
and directories.

ok aja@
2011-05-11 12:03:19 +00:00
sthen
ef738c2300 - SECURITY update to 0.99.18 (pointed out by Brad)
CVE-2010-1674 null pointer deref with malformed BGP Extended Communities
CVE-2010-1675 BGP session reset with malformed AS-path

- install info documentation

- patches added: build fixes from upstream
2011-03-26 12:00:53 +00:00
espie
0397d65db0 new depends 2010-11-19 22:31:32 +00:00
espie
47ff75aa46 USE_GROFF=Yes 2010-10-18 18:36:45 +00:00
sthen
0f4ed1bf33 update to 0.99.17 2010-09-24 09:30:04 +00:00
sthen
46626dc2f9 update to 0.99.16 2010-07-09 11:46:02 +00:00
sthen
a4b4ab60a8 bugfix update to 0.99.12; rolls in patches for the problem where 4-byte
ASNs with long prepends are seen.
2009-05-12 12:18:04 +00:00
sthen
fe74d76cfe fix 4-byte ASN related crash in quaggga's bgpd. from upstream repo. 2009-05-01 13:48:26 +00:00
sthen
be64909751 update quagga to 0.99.11. the SNMP flavour was already broken,
disable it for now.
2009-02-18 00:37:53 +00:00
claudio
55ed8e1d9a quagga does not handel multiple RTM_VERSIONs gracefully. Patch it to ignore
messages with wrong RTM_VERSION instead of trying to parse them and crashing
doing so. OK rui@, jasper@, looks good mbalmer@
2008-05-23 12:55:58 +00:00
merdely
241b722760 Remove surrounding quotes in COMMENT*/PERMIT_*/BROKEN/ERRORS
Add $OpenBSD$ to p5-SNMP-Info/Makefile (ok kili@, simon@)
2007-09-15 22:36:51 +00:00
rui
0f87571adf SECURITY: update quagga to 0.99.9 which fixes some DoS vulnerabilities.
Reference: http://secunia.com/advisories/26744/

ok pyr@
2007-09-12 20:31:17 +00:00
rui
445fdc8f47 update quagga to 0.99.7
help and ok pyr@
2007-06-20 18:05:36 +00:00
espie
9eafbbfb35 base64 checksums. 2007-04-05 16:19:55 +00:00
david
adbd88b406 remove myself from MAINTAINER 2006-04-12 21:01:45 +00:00