seven years...
- make aesget actually work with the default keysize (initialize it!)
- do not overflow the key filename buffers while parsing command-line options
- break out common code into a single file
- make the read()/write() loops a bit more robust
- fix lots of compiler warnings
- use snprintf() instead of strcpy()/strcat()
- write mdoc manual pages for aescrypt(1) and aesget(1)
- install the binaries and the manual pages with the correct permission mode
- Move Makefile.common from server to libraries port
- Minor fixes
PR: ports/124331 ports/124335-7 ports/124371
Submitted by: Tomoyuki Sakurai <cherry@trombik.org> (maintainer)
The affected ports are the ones with gettext as a run-dependency
according to ports/INDEX-7 (5007 of them) and the ones with USE_GETTEXT
in Makefile (29 of them).
PR: ports/124340
Submitted by: edwin@
Approved by: portmgr (pav)
are hosting browser exploits that can infect visiting users with
malware. It functions as an HTTP proxy server and intercepts all
browser requests. SpyBye uses a few simple rules to determine if
embedded links on your web page are harmlesss, unknown or maybe
even dangerous.
SpyBye analyzes all downloads in the background and provides you
with a warning notification whenever it encounters content that
is potentially malicious. At that point, you can click on the link
in the notification and receive a more detailed analysis of the web page.
WWW: http://www.spybye.org/
PR: ports/123945
Submitted by: Paul Schmel <pauls utdallas.edu>
Approved by: tabthorpe (mentor)
OpenVAS stands for Open Vulnerability Assessment System and
is a network security scanner with associated tools like a
graphical user fontend. The core is a server component with
a set of network vulnerability tests (NVTs) to detect
security problems in remote systems and applications.
WWW: http://www.openvas.org/
PR: ports/123128
Submitted by: Tomoyuki Sakurai <cherry@trombik.org>
OpenVAS stands for Open Vulnerability Assessment System and
is a network security scanner with associated tools like a
graphical user fontend. The core is a server component with
a set of network vulnerability tests (NVTs) to detect
security problems in remote systems and applications.
WWW: http://www.openvas.org/
PR: ports/123130
Submitted by: Tomoyuki Sakurai <cherry@trombik.org>
OpenVAS stands for Open Vulnerability Assessment System and
is a network security scanner with associated tools like a
graphical user fontend. The core is a server component with
a set of network vulnerability tests (NVTs) to detect
security problems in remote systems and applications.
WWW: http://www.openvas.org/
PR: ports/123127
Submitted by: Tomoyuki Sakurai <cherry@trombik.org>
OpenVAS stands for Open Vulnerability Assessment System and
is a network security scanner with associated tools like a
graphical user fontend. The core is a server component with
a set of network vulnerability tests (NVTs) to detect
security problems in remote systems and applications.
WWW: http://www.openvas.org/
PR: ports/123129
Submitted by: Tomoyuki Sakurai <cherry@trombik.org>
OpenVAS stands for Open Vulnerability Assessment System and
is a network security scanner with associated tools like a
graphical user fontend. The core is a server component with
a set of network vulnerability tests (NVTs) to detect
security problems in remote systems and applications.
WWW: http://www.openvas.org/
PR: ports/123131
Submitted by: Tomoyuki Sakurai <cherry@trombik.org>
-current archs). This has been broken for over 3 months.
configure incorrectly assumes that since FreeBSD has sqrtl,
that it also has other long math functions. Also, configure
seems to have 2 separate checks for the long math functions:
the first check looks for both asinl and sqrtl, the second
check looks for just sqrtl. FreeBSD does not currently have
asinl, so if configure just went by the first check it would
correctly determine that we do not have all the long math
functions. Remove the second check to fix the problem.
No response from: kde@
passphrases. An object of this type is a passphrase recogniser: its
job is to recognise whether an offered passphrase is the right one.
For security, such passphrase recognisers usually do not themselves
know the passphrase they are looking for; they can merely recognise it
when they see it. There are many schemes in use to achieve this
effect, and the intent of this class is to provide a consistent
interface to them all, hiding the details.
The CPAN package Authen::Passphrase contains implementations of
several specific passphrase schemes in addition to the base class.
WWW: http://search.cpan.org/dist/Authen-Passphrase/
Approved by: erwin (mentor)
key setup very expensive. ("Eks" stands for "expensive key
schedule".) This doesn't make it significantly cryptographically
stronger, but is intended to hinder brute-force attacks. It also
makes it unsuitable for any application requiring key agility. It was
designed by Niels Provos and David Mazieres for password hashing in
OpenBSD.
Eksblowfish is a parameterised (family-keyed) cipher. It takes a cost
parameter that controls how expensive the key scheduling is. It also
takes a family key, known as the "salt". Cost and salt parameters
together define a cipher family. Within each family, a key determines
an encryption function in the usual way.
This distribution also includes an implementation of "bcrypt", the
Unix crypt() password hashing algorithm based on Eksblowfish.
WWW: http://search.cpan.org/dist/Crypt-Eksblowfish/
Approved by: erwin (mentor)
If a user opts out of the first part of the pkg-install script, but
elects to interact with the second part of the script and decides to
create new certs, the creation of the certs will fail silently if the
certs directory does not exist. This is because the certs directory
is created (if necessary) in the pre-install portion of the pkg-install
script, but the certs are created in the post-install part of the script.
This PR corrects this problem by moving the creation of the certs directory
to the same subroutine that the certs are created in.
PR: ports/123883
Submitted by: Paul Schmehl <pauls at utdallas.edu> (maintainer)
2008-04-07 net-mgmt/ap-utils: Does not work with gcc4.2; appears to be abandoned
2008-03-31 multimedia/xfce4-xmms-controller-plugin: Project is dead
2008-05-15 www/pear-HTTP_Session: Use www/pear-HTTP_Session2 instead
2008-05-04 security/bioapitool: All functionallity of this tools has been merged with pam_bsdbioapi