Its aim is to ease the process of using KBFS on FreeBSD. It takes care of
the configuration the Keybase user would have to do manually otherwise.
Reviewed by: mat
Approved by: mat (mentor)
Differential Revision: https://reviews.freebsd.org/D16821
Since the opieprint port has been removed, and since the S/Key
utilities are no longer included with FreeBSD, it makes sense to
patch this port to make it functional once again - and there is
nothing gained by leaving it unusable.
PR: 32936, 71089, 219177
Submitted by: crahman@gmail.com
2018-08-20 net/openmq: Broken for more than 5 months
2018-08-20 net/coda6_server: Broken for more than 5 months
2018-08-20 net/ceph-devel: Broken for more than 5 months
2018-08-20 java/jgrapht: Broken for more than 5 months
2018-08-20 mail/mutt14: mutt 1.4.x has been out of support for 10+ years use mail/mutt
2018-08-20 www/pydio: Broken for more than 5 months
2018-08-20 security/fastd-devel: Broken for more than 5 months
2018-08-20 security/fastd: Broken for more than 5 months
2018-08-20 devel/bhyve-vm-goagent: Broken for more than 5 months
2018-08-20 devel/cherivis-devel: Depends on broken and expiring cheritrace-devel
2018-08-20 devel/cheritrace-devel: Broken for more than 5 months
2018-08-20 devel/javolution: Broken for more than 5 months
2018-08-20 devel/bisoncpp: Depends on broken and expiring libbobcat
2018-08-20 databases/php5-pdo_cassandra: Broken for more than 5 months
2018-08-20 games/crafty-open-large: Broken for more than 5 months
2018-08-20 games/crafty-open-enormous: Broken for more than 5 months
2018-08-20 games/crafty-open-medium: Broken for more than 5 months
2018-08-20 math/jakarta-commons-math: Broken for more than 5 months
2018-08-20 math/hfst: Broken for more than 5 months
2018-08-20 math/octave-forge-communications: Broken for more than 5 months
2018-08-20 lang/v8-devel: Broken for more than 5 months
2018-08-20 sysutils/rubygem-fluentd010: Broken for more than 5 months
- Use a source tarball already patched and remove patch from files/
- Add new available Russian translation
- Set NO_ARCH
- Transfer maintainership to submitter
PR: 230060
Submitted by: Vinícius Zavam <egypcio@gmail.com>
Sponsored by: Rubicon Communications, LLC (Netgate)
Ignore unauthenticated encrypted EAPOL-Key data in supplicant
processing. When using WPA2, these are frames that have the Encrypted
flag set, but not the MIC flag.
When using WPA2, EAPOL-Key frames that had the Encrypted flag set but
not the MIC flag, had their data field decrypted without first verifying
the MIC. In case the data field was encrypted using RC4 (i.e., when
negotiating TKIP as the pairwise cipher), this meant that
unauthenticated but decrypted data would then be processed. An adversary
could abuse this as a decryption oracle to recover sensitive information
in the data field of EAPOL-Key messages (e.g., the group key).
(CVE-2018-14526)
Signed-off-by: Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>
Security: CVE-2018-14526
Security: VuXML: 6bedc863-9fbe-11e8-945f-206a8a720317
* CVE-2018-1139 (Weak authentication protocol allowed.)
* CVE-2018-1140 (Denial of Service Attack on DNS and LDAP server.)
* CVE-2018-10858 (Insufficient input validation on client directory
listing in libsmbclient.)
* CVE-2018-10918 (Denial of Service Attack on AD DC DRSUAPI server.)
* CVE-2018-10919 (Confidential attribute disclosure from the AD LDAP
server.)
Security: CVE-2018-1139
CVE-2018-1140
CVE-2018-10858
CVE-2018-10918
CVE-2018-10919
Sponsored by: iXsystems Inc.
Port changes:
* sqlite3 dependency is need as a workaround for bug#230613
* Backport the fix of the problem of python3 compatibility
* Backport the fix of python2 build error
* Backport the fix of windows newline in the shell script
* Backport the Onionoo protocol version mismatch fix
PR: 230599
Submitted by: Carsten Larsen <cs@innolan.net> (sqlite3 part)