1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-11-30 01:15:52 +00:00
Commit Graph

2689 Commits

Author SHA1 Message Date
Carlo Strub
344b32ccd9 - Fix typos in COMMENT
- Enforce the now clarified rules from the Porter's Handbook (e.g. no dots, no
  A/An, etc.)
2012-08-02 09:02:43 +00:00
Doug Barton
59b9e0f8ee Make the MASTER_SITES URL variable too
Reminded by:	bsam
2012-07-30 20:51:37 +00:00
Doug Barton
e9cfaef621 Use the same method for github downloads as portupgrade-devel
Thanks for the pointer:	bryan@shatow.net
2012-07-30 05:59:08 +00:00
Doug Barton
6c1bc50c5a Remove my personal web site from MASTER_SITES 2012-07-29 08:17:33 +00:00
Michael Scheidell
66268a76b3 - Fix CONFLICTS and readd PKGNAMESUFFIX so we don't get in trouble with dns/powerdns
- Convert to new OptionsNG
- Add DNSSEC knob by popular demand. Disabling this will disable DNSSEC algorithms 13 and 14 and remove dependency on libcryptopp.
- Disabled botan support since it's broken with 1.8. When 1.10 becomes part of the ports tree it can be enabled again.

PR:		ports/170196
Submitted by:	Ralf van der Enden <tremere@cainites.net> (maintainer)
2012-07-28 12:21:10 +00:00
Michael Scheidell
933cc87dea - Fix CONFLICTS.
- Convert to new OptionsNG
- Add DNSSEC knob by popular demand. Disabling this will disable DNSSEC algorithms 13 and 14 and remove dependency on
libcryptopp.
- Also disabled botan support since it's broken with 1.8. When 1.10 becomes part of the ports tree it can be enabled again.

PR:		ports/170195
Submitted by:	Ralf van der Enden <tremere@cainites.net> (maintainer)
2012-07-28 12:19:03 +00:00
Ryan Steinmetz
c90f865d10 - Update to 3.2.13
- Cleanup whitespace
- Document vulnerability in dns/nsd (CVE-2012-29789)

PR:		ports/170208
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Security:	17f369dc-d7e7-11e1-90a2-000c299b62e1
2012-07-27 12:39:06 +00:00
Baptiste Daroussin
9346b215f0 new devel/pkgconf added to replace devel/pkg-config. new version of pkg-config
are no more self hosting so we are stuck with 0.25 version while pkgconf provide
the same set of features as 0.27 and a compatible frontend. A symlink to
pkg-config has been added for convenience and compatibility

This also introduces a new macro to use pkgconf in your ports:
USE_PKGCONFIG

it can take the following arguments:
 - yes (meaning build only dep)
 - build (meaning build only dep)
 - run (meaning run only dep)
 - both (meaning run and build dep)

From now USE_GNOME= pkgconfig is deprecated in favour of USE_PKGCONFIG
The old gnome macro has been modified to use pkgconf but still the sameway: run
and build dep to avoid large breakage.

While here fix some ports relying on pkg-config but not specifying it, fix some
ports broken because testing wrong .pc files, and fix ports using pkg-config
--version to determine pkg-config version instead of
pkg-config --modversion pkg-config like recommanded by pkg-config

With Hat:	portmgr
Exp-runs by:	bapt (pointhat-west), beat (pointyhat)
2012-07-26 05:40:22 +00:00
Hajimu UMEMOTO
6dbd6baa2a Update master site. 2012-07-25 17:27:23 +00:00
Carlo Strub
4ccd1fc621 Fix typos in COMMENT 2012-07-25 11:24:09 +00:00
Carlo Strub
d5fda8cb2c Fix typos in COMMENT 2012-07-25 06:32:06 +00:00
Carlo Strub
965b4433c8 Fix typos in COMMENT 2012-07-24 21:09:44 +00:00
Doug Barton
e859d6a9bf Heavy DNSSEC Validation Load Can Cause a "Bad Cache" Assertion Failure
in BIND9

High numbers of queries with DNSSEC validation enabled can cause an
assertion failure in named, caused by using a "bad cache" data structure
before it has been initialized.

CVE: CVE-2012-3817
Posting date: 24 July, 2012
2012-07-24 19:23:23 +00:00
Sunpoet Po-Chuan Hsieh
fee3a85521 - Fix option handling of THREADS
PR:		ports/170007
Reported by:	Alexey Kouznetsov <alexey@kouznetsov.com>
Submitted by:	crees
Approved by:	sem (maintainer)
2012-07-21 20:41:09 +00:00
Chris Rees
afd23bb21a Update to 3.2.12
BUG FIXES:
- Fix for VU#624931 CVE-2012-2978: NSD denial of service
vulnerability from non-standard DNS packet from any host
on the internet.

PR:		ports/170001
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Security:	CVE-2012-2978
2012-07-20 15:09:18 +00:00
Doug Barton
2b0dcf6311 Update to the latest version from the new git repository.
I'll host the (contrived) distfile for now.
2012-07-19 12:08:14 +00:00
Carlo Strub
0292b43240 - Update to 1.1.0
- Update maintainer e-mail

PR:		ports/169899
Submitted by:	Hrant Dadivanyan <ran@styx.aic.net>
Approved by:	maintainer
2012-07-18 21:39:17 +00:00
Jase Thew
6c3f98ad34 - Fix LARGEFILE option typo that resulted in largefile support being
constantly disabled.

PR:		ports/169952
Spotted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Approved by:	flo (mentor)
2012-07-17 23:49:20 +00:00
Jase Thew
9a62263693 - Update to 3.2.11 [1]
- Convert to optionsNG, add DOCS option
- Replace bsd.port.{pre,post}.mk includes
- Remove non-existent DNSSEC, TSIG, NSID options
- Fix typo in NSEC3PREHASH option CONFIGURE_ARGS
- Replace hardcoded ETCDIR in pkg-plist

PR:		ports/169731 [1]
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Approved by:	flo (mentor)
2012-07-17 10:36:25 +00:00
Michael Scheidell
1747f9c81d - Update to 1.3.9
- Add GIDs/UIDs 215

PR:		ports/169646
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2012-07-08 12:39:15 +00:00
Andrej Zverev
4641b63dd1 - Remove SITE_PERL from *_DEPENDS
Approved by: portmgr@ (bapt@)
2012-06-30 13:48:34 +00:00
Frederic Culot
02fcc02588 - Remove SITE_PERL from *_DEPENDS [1]
- Add BUILD_DEPENDS to silence build warnings

PR:		ports/169554 [1]
Submitted by:	Zane C.B-H. <vvelox@vvelox.net> (maintainer)
2012-06-30 10:16:28 +00:00
Andrej Zverev
3982ced0ba - Remove SITE_PERL from *_DEPENDS
Approved by: portmgr@ (bapt@)
2012-06-30 05:52:54 +00:00
Andrej Zverev
e214c57b8f - Remove SITE_PERL from *_DEPENDS
Approved by: portmgr@ (bapt@)
2012-06-29 18:37:54 +00:00
Andrej Zverev
042ea2947a - Remove SITE_PERL from *_DEPENDS
Approved by: portmgr@ (bapt@)
2012-06-29 18:30:42 +00:00
Johan van Selst
4c44c06b4b Remove SITE_PERL from RUN_DEPENDS
Submitted by:	az
2012-06-29 10:07:34 +00:00
Sunpoet Po-Chuan Hsieh
682140c221 - Update to 0.1.7
- Add LICENSE

Changes:	http://search.cpan.org/dist/Mozilla-PublicSuffix/Changes
2012-06-29 02:56:27 +00:00
Andrej Zverev
2f57eb0926 - Remove SITE_PERL from *_DEPENDS 2012-06-28 18:37:23 +00:00
Jason Helfman
8d5d61fa74 add new port: dns/py-publicsuffix
This module allows you to get the public suffix of a domain name using
the Public Suffix List from http://publicsuffix.org

A public suffix is one under which Internet users can directly register names.
Some examples of public suffixes are .com, .co.uk and pvt.k12.wy.us.
Accurately knowing the public suffix of a domain is useful when handling web
browser cookies, highlighting the most important part of a domain name in a
user interface or sorting URLs by web site

WWW: http://pypi.python.org/pypi/publicsuffix/

PR:	ports/169326
Submitted by:	d.pryadko@rambler-co.ru
2012-06-27 22:25:42 +00:00
Sergey Matveychuk
7c4c76c791 - Fix the port after the last commit
PR:		ports/169474
Submitted by:	Takefu <takefu at airport.fm>
2012-06-27 09:01:10 +00:00
Ryan Steinmetz
5db8b1dfe1 - Add Munin Support [1]
- Add LICENSE
- Fix ECDSA Support
- Convert to OptionsNG
- Pacify portlint(1)
- Stylistic changes
- Remove pkg-install/pkg-deinstall files

PR:		ports/156015
Submitted by:	Takefu <takefu@airport.fm> [1]
Approved by:	sem@ (maintainer)
2012-06-26 17:44:28 +00:00
Jason Helfman
5e8fb43b19 - adopt optionsNG 2012-06-25 23:09:08 +00:00
Sunpoet Po-Chuan Hsieh
2651fc3983 - Update to 0.09
Changes:	http://search.cpan.org/dist/Net-DNS-Lite/Changes
2012-06-22 01:30:56 +00:00
Ryan Steinmetz
de91845000 - Update to 1.9.1 2012-06-19 11:52:50 +00:00
Jason Helfman
a9e846e414 - update to 1.0.6
- while here pet portlint, and use optionsng for docs

PR:	ports/169170
Submitted by:	maintainer, freebsd@dns-lab.com
2012-06-17 23:59:05 +00:00
Sunpoet Po-Chuan Hsieh
caa51a69e7 - Update to 20120611
- While I'm here:
  - Add LICENSE
  - Remove unnecessary WRKSRC
  - Pet portlint

Changes:	http://dns.measurement-factory.com/tools/dnstop/src/CHANGES
PR:		ports/169091
Submitted by:	John Marshall <john.marshall@riverwillow.com.au>
Approved by:	Mark Foster <mark@foster.cc> (maintainer)
2012-06-15 15:32:12 +00:00
Baptiste Daroussin
f3381fa548 Convert to new options framework 2012-06-12 10:34:46 +00:00
Matthias Andree
781a77fac7 Fix inverted PORT_OPTIONS:MDOCS logic, regression from optionsNG migration.
Reported by: Spil Oss
Reported by: pointyhat (by way of pav@)
2012-06-11 20:49:30 +00:00
Sunpoet Po-Chuan Hsieh
cbd9f72106 - Update to 12.1.0
- Change RUN_DEPENDS to ensure same-verison twisted dependency

Changes:	http://twistedmatrix.com/trac/browser/tags/releases/twisted-12.1.0/twisted/names/topfiles/NEWS
2012-06-11 16:09:55 +00:00
Steve Wills
63d09c9c9b - Convert all remaining instances of BUILD_DEPENDS=${RUN_DEPENDS} or
RUN_DEPENDS=${BUILD_DEPENDS} to use := which portlint has warned
  about for a while.

PR:		ports/168208
Approved by:	portmgr (miwi)
2012-06-10 18:42:48 +00:00
Ryan Steinmetz
17363b49d1 - Convert to OptionsNG 2012-06-10 18:36:32 +00:00
Ryan Steinmetz
504977ada7 - Add CONFLICTS
- Use PLIST_FILES instead of pkg-plist
- Fix MASTER_SITES
- Bump PORTREVISION
2012-06-10 13:49:05 +00:00
Martin Wilke
6b98655af2 gdnsd is an Authoritative-only DNS server.
The initial g stands for Geographic, as gdnsd offers a plugin system for
geographic (or other sorts of) balancing, redirection, and service-state-conscious
failover. If you don't care about that feature, it's still quite good at being
a very fast, lean, and resilient authoritative-only server for static DNS data.

gdnsd is written in C using libev and pthreads with a focus on highi performance,
low latency service. It does not offer any form of caching or recursive service,
and does not support DNSSEC.

WWW: http://code.google.com/p/gdnsd/

PR:		ports/167946
Submitted by:	Stefan Caunter <stef@scaleengine.com>
2012-06-09 15:47:57 +00:00
Martin Wilke
b250ee1aaa - Update to 0.5
PR:		168858
Submitted by:	Hirohisa Yamaguchi <umq@ueo.co.jp> (maintainer)
2012-06-09 14:44:05 +00:00
Matthias Andree
8821d2dc0b Update to bug-fix release 2.62.
Changelog: http://www.thekelleys.org.uk/dnsmasq/CHANGELOG

Convert to OptionsNG.
2012-06-08 14:34:16 +00:00
Steve Wills
6ded9bc9ea - Update to 0.7.1 2012-06-05 15:56:50 +00:00
Jase Thew
c68c56bc22 - Update to 0.920
- Update maintainer address

Changes:	http://search.cpan.org/dist/POE-Component-Resolver/CHANGES
Approved by:	flo, culot (mentors)
2012-06-05 12:18:08 +00:00
Ryan Steinmetz
91f8eb99da - Remove SITE_PERL from *_DEPENDS 2012-06-05 10:14:55 +00:00
Doug Barton
543df633d3 Upgrade to 9.6-ESV-R7-P1, 9.7.6-P1, 9.8.3-P1, and 9.9.1-P1, the latest
from ISC. These patched versions contain a critical bugfix:

  Processing of DNS resource records where the rdata field is zero length
  may cause various issues for the servers handling them.

  Processing of these records may lead to unexpected outcomes. Recursive
  servers may crash or disclose some portion of memory to the client.
  Secondary servers may crash on restart after transferring a zone
  containing these records. Master servers may corrupt zone data if the
  zone option "auto-dnssec" is set to "maintain". Other unexpected
  problems that are not listed here may also be encountered.

All BIND users are strongly encouraged to upgrade.
2012-06-04 21:51:34 +00:00
Andrej Zverev
5542fae1ef - Remove SITE_PERL from *_DEPENDS
- Reassign maintainership from ports@ to perl@
2012-06-04 06:17:03 +00:00
Andrej Zverev
5f7e07eadd - Remove SITE_PERL from *_DEPENDS 2012-06-04 05:21:59 +00:00
Doug Barton
77c2e8801a Fix Perl package name dependencies 2012-06-03 21:41:02 +00:00
Andrej Zverev
a50c1cb647 - Remove SITE_PERL from *_DEPENDS
Approved by: maintainer (tobez@ via IM)
2012-06-03 05:56:20 +00:00
Dirk Meyer
2b74a89bc8 - update png to 1.5.10 2012-06-01 05:26:28 +00:00
Doug Barton
249914eb08 Convert to specifying the port name in _DEPENDS instead of
${SITE_PERL}/foo/bar/file.pm

http://wiki.freebsd.org/PortsLongtermTargets#Use_of_SITE_PERL_in_dependencies
2012-06-01 04:00:24 +00:00
Pav Lucistnik
b80b0fa196 - Remove dns/drill, the tool was folded into dns/ldns package
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2012-05-31 07:58:40 +00:00
Martin Wilke
884d68e374 - Disable ECDSA support
PR:		168394
Submitted by:	maintainer
2012-05-28 04:51:14 +00:00
Sergey Matveychuk
01c06198be - Update to 1.4.17
* Use ECDSA by default
  * Add a hack to build ldns with ECDSA support if it's not installed

Feature safe:	Yes
2012-05-24 15:02:38 +00:00
Alex Kozlov
b526704ea1 - Update to 1.6.13
This is mostly a bugfix release. Most notable new features are ECDSA
  support (RFC 6605) and command-line options for ldns-verify-zone for
  validating against given keys and for safety margins on signatures
  inception and expiration times.
- The examples and drill programs will now built by default.

PR:	ports/168296
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Approved by:	itetcu (mentor)
2012-05-24 14:01:39 +00:00
Doug Barton
7d79b1b01f Upgrade to BIND versions 9.9.1, 9.8.3, 9.7.6, and 9.6-ESV-R7,
the latest from ISC. These versions all contain the following:

Feature Change

*  BIND now recognizes the TLSA resource record type, created to
   support IETF DANE (DNS-based Authentication of Named Entities)
   [RT #28989]

Bug Fix

*  The locking strategy around the handling of iterative queries
   has been tuned to reduce unnecessary contention in a multi-
   threaded environment.

Each version also contains other critical bug fixes.

All BIND users are encouraged to upgrade to these latest versions.
2012-05-23 04:41:19 +00:00
Doug Barton
b416df6141 Remove patch that is incorporated into version 9.9.1 2012-05-23 04:40:33 +00:00
Ruslan Makhmatkhanov
799386883c - update 3.1.r3,1
- set NO_LATEST_LINK
- while I'm here, add LICENSE (GPL2) and remove mention of it from pkg-descr

PR:		168192
Submitted by:	Ralf van der Enden <tremere at cainites dot net> (maintainer)
2012-05-22 18:53:55 +00:00
Ruslan Makhmatkhanov
de2511b228 - update to 3.1
- while I'm here, add LICENSE (GPL2) and remove mention of it from pkg-descr

changelog: http://doc.powerdns.com/changelog.html#changelog-auth-3-1

PR:		168198
Submitted by:	Ralf van der Enden <tremere at cainites dot net> (maintainer)
2012-05-22 18:52:01 +00:00
Ruslan Makhmatkhanov
fee9ffe23d - update to 1.0.5
- fix build fix clang
- mark MAKE_JOBS_SAFE

PR:		168014
Submitted by:	Hirohisa Yamaguchi <umq at ueo.co dot jp>
Approved by:	freebsd at dns-lab dot com (maintainer)
2012-05-21 20:35:20 +00:00
Sunpoet Po-Chuan Hsieh
cf968d9fd1 - Add p5-Net-DNS-Zone-Parser 0.02
The Net::DNS::Zone::Parser should be considered a preprocessor that "normalizes"
a zonefile.

It will read a zonefile in a format conforming to the relevant RFCs with the
addition of BIND's GENERATE directive from disk and will write fully specified
resource records (RRs) to a filehandle. Whereby:
- All comments are stripped
- There is one RR per line
- Each RR is fully expanded i.e. all domain names are fully qualified
  (canonicalised) and the CLASS and TTLs are specified.
- Some RRs may be 'stripped' from the source or otherwise processed. For details
  see the 'read' method.

Note that this module does not have a notion of what constitutes a valid zone,
it only parses. For example, the parser will happilly parse RRs with ownernames
that are below in another zone because a NS RR elsewhere in the zone.

WWW: http://search.cpan.org/dist/Net-DNS-Zone-Parser/

PR:		ports/167708
Submitted by:	Jimmy Bergman <jimmy@sigint.se>
2012-05-18 18:50:49 +00:00
Pawel Pekala
d1ebb0f8b4 - Update to version 2.1.5 [1]
- Add option for PGSQL support [1]
- Switch to bsd.port.options

PR:		ports/167841 [1]
Submitted by:	Edmondas Girkantas <eg@fbsd.lt> (maintainer) [1]
2012-05-18 16:27:18 +00:00
Ryan Steinmetz
63f97a3e04 - Resolve rc script issues 2012-05-17 20:41:44 +00:00
Ryan Steinmetz
301598e7bd - Update to 1.20 2012-05-17 18:56:53 +00:00
Pawel Pekala
3772632854 DNSCrypt is a piece of lightweight software that everyone
should use to boost online privacy and security. It works
by encrypting all DNS traffic between the user and OpenDNS,
preventing any spying, spoofing or man-in-the-middle attacks.

WWW:	https://www.opendns.com/technology/dnscrypt/

PR:		ports/167833
Submitted by:	Leo Vandewoestijne <freebsd@dns-lab.com>
2012-05-15 20:14:53 +00:00
Frederic Culot
4625baac2a - Update to 0.918
Changes:	http://search.cpan.org/dist/POE-Component-Resolver/CHANGES
PR:		ports/167929
Submitted by:	Jase Thew <freebsd@beardz.net> (maintainer)
2012-05-15 18:22:58 +00:00
Michael Scheidell
ef67eb675f - Update to development release 3.1 RC2
PR:		ports/167045
Submitted by:	Ralf van der Enden <tremere@cainites.net> (maintainer)
Obtained from:	http://doc.powerdns.com/changelog.html#changelog-auth-3-1
2012-05-09 17:56:13 +00:00
Sylvio Cesar Teixeira
b240caf9e4 - Chase rrdtool shlib version bump. 2012-05-07 18:52:09 +00:00
Baptiste Daroussin
03a1bca500 Stop installing catpages
PR:		ports/167255
Submitted by:	bapt
Approved by:	maintainer timeout (14d)
2012-05-07 16:41:50 +00:00
Steve Wills
1b000dfa39 - Assign clsung's p5- ports to perl@
Approved by:	clsung via IRC
2012-05-01 01:47:10 +00:00
Matthias Andree
19f87ebe0d Update to new upstream release 2.61. Changes are, per Simon Kelley:
Re-write interface discovery code on *BSD to use getifaddrs. This
is more portable, more straightforward, and allows us to find the
prefix length for IPv6 addresses.

Add ra-names, ra-stateless and slaac keywords for DHCPv6.  Dnsmasq
can now synthesise AAAA records for dual-stack hosts which get IPv6
addresses via SLAAC. It is also now possible to use SLAAC and
stateless DHCPv6, and to tell clients to use SLAAC addresses as
well as DHCP ones.  Thanks to Dave Taht for help with this.

Add --dhcp-duid to allow DUID-EN uids to be used.

Explicity send DHCPv6 replies to the correct port, instead of relying
on clients to send requests with the correct source address, since
at least one client in the wild gets this wrong. Thanks to Conrda
Kostecki for help tracking this down.

Send a preference value of 255 in DHCPv6 replies when --dhcp-authoritative
is in effect. This tells clients not to wait around for other DHCP
servers.

Better logging of DHCPv6 options.

Add --host-record. Thanks to Rob Zwissler for the suggestion.

Invoke the DHCP script with action "tftp" when a TFTP file transfer
completes. The size of the file, address to which it was sent and
complete pathname are supplied. Note that version 2.60 introduced
some script incompatibilties associated with DHCPv6, and this is a
further change. To be safe, scripts should ignore unknown actions,
and if not IPv6-aware, should exit if the environment variable
DNSMASQ_IAID is set. The use-case for this is to track netboot/install.
Suggestion from Shantanu Gadgil.

Update contrib/port-forward/dnsmasq-portforward to reflect the
above.

Set the environment variable DNSMASQ_LOG_DHCP when running the
script id --log-dhcp is in effect, so that script can taylor their
logging verbosity. Suggestion from Malte Forkel.

Arrange that addresses specified with --listen-address work even
if there is no interface carrying the address. This is chiefly
useful for IPv4 loopback addresses, where any address in 127.0.0.0/8
is a valid loopback address, but normally only 127.0.0.1 appears
on the lo interface. Thanks to Mathieu Trudel-Lapierre for the idea
and initial patch.

Fix crash, introduced in 2.60, when a DHCPINFORM is received from
a network which has no valid dhcp-range.  Thanks to Stephane Glondu
for the bug report.

Add a new DHCP lease time keyword, "deprecated" for --dhcp-range.
This is only valid for IPv6, and sets the preffered lease time for
both DHCP and RA to zero. The effect is that clients can continue
to use the address for existing connections, but new connections
will use other addresses, if they exist. This makes hitless renumbering
at least possible.

Fix bug in address6_available() which caused DHCPv6 lease aquisition
to fail if more than one dhcp-range in use.

Provide RDNSS and DNSSL data in router advertisements, using the
settings provided for DHCP options option6:domain-search and
option6:dns-server.

Tweak logo/favicon.ico to add some transparency. Thanks to SamLT
for work on this.

Don't cache data from non-recursive nameservers, since it may
erroneously look like a valid CNAME to a non-exitant name. Thanks
to Ben Winslow for finding this.

Call SO_BINDTODEVICE on the DHCP socket(s) when doing DHCP on exactly
one interface and --bind-interfaces is set. This makes the OpenStack
use-case of one dnsmasq per virtual interface work. This is only
available on Linux; it's not supported on other platforms. Thanks
to Vishvananda Ishaya and the OpenStack team for the suggestion.

Updated French translation. Thanks to Gildas Le Nadan.

Give correct from-cache answers to explict CNAME queries.  Thanks
to Rob Zwissler for spotting this.

Add --tftp-lowercase option. Thanks to Oliver Rath for the patch.

Ensure that the DBus DhcpLeaseUpdated events are generated when a
lease goes through INIT_REBOOT state, even if the dhcp-script is
not in use. thanks to Antoaneta-Ecaterina Ene for the patch.

Fix failure of TFTP over IPv4 on OpenBSD platform. Thanks to Brad
Smith for spotting this.
2012-04-30 20:38:13 +00:00
Ryan Steinmetz
40ca4dd55f - Update to 1.8.0 2012-04-29 21:54:21 +00:00
Anton Berezin
429f32ee0f Add dns/validns 0.4, a high performance DNS/DNSSEC zone validator.
PR:		167299
Submitted by:	Hirohisa Yamaguchi <umq at-symbol ueo.co.jp>
2012-04-26 08:43:00 +00:00
Dennis Herrmann
84e393bcf6 - Update to 1.0.3
PR:		ports/167241
Submitted by:	Leo Vandewoestijne <freebsd@dns-lab.com> (maintainer)
2012-04-24 14:13:26 +00:00
Sunpoet Po-Chuan Hsieh
f9ca195d0a - Fix BUILD_DEPENDS: p5-HTTP-Tiny is in core since Perl 5.13.9 (check PERL_LEVEL against 501400) 2012-04-21 05:53:58 +00:00
Doug Barton
a6f06de54e BIND 9.8.2 tarball was re-rolled to remove 9.8.1 release notes. This change
was noticed by ISC at:

https://lists.isc.org/pipermail/bind-users/2012-April/087345.html

and verified by me both by comparing the contents of the old and new
distfiles and by verifying the PGP signature on the new distfile.

No PORTREVISION bump because these files were not installed.
2012-04-12 00:56:32 +00:00
Ashish SHUKLA
617524d7ad - Update to 1.2.9a
- Update MASTER_SITES
- Add LICENSE information
- Remove obsolete patches
2012-04-11 09:21:57 +00:00
Wen Heping
389130385f - Update to 1.2.1 2012-04-10 06:18:02 +00:00
Doug Barton
9ee0aabd58 Switch to using the PORTDOCS macro
Feature safe:	yes
2012-04-04 22:03:08 +00:00
Doug Barton
187aeae853 Update to version 9.6-ESV-R6, the latest from ISC, which contains numerous bug fixes.
For the port, switch to using the PORTDOCS macro.
Also, switch to the (identical) pkg-message in ../bind97 which was apparently missed
when the other ports were converted.

Feature safe:   yes
2012-04-04 22:02:15 +00:00
Doug Barton
3adb7aaf27 Update to version 9.7.5, the latest from ISC, which contains numerous bug fixes.
For the port, switch to using the PORTDOCS macro.

Feature safe:   yes
2012-04-04 21:49:17 +00:00
Doug Barton
b0981920bd Update to version 9.8.2, the latest from ISC, which contains numerous bug fixes.
For the port, switch to using the PORTDOCS macro.

Feature safe:	yes
2012-04-04 21:41:32 +00:00
Sunpoet Po-Chuan Hsieh
03d6382607 - Add p5-Mozilla-PublicSuffix 0.1.6
Mozilla::PublicSuffix provides a single function that returns the public suffix
of a domain name by referencing a parsed copy of Mozilla's Public Suffix List.
From the official website at http://publicsuffix.org:

A "public suffix" is one under which Internet users can directly register names.
Some examples of public suffixes are .com, .co.uk and pvt.k12.wy.us. The Public
Suffix List is a list of all known public suffixes.

A copy of the official list is bundled with the distribution. As the official
list continues to be updated, the bundled copy will inevitably fall out of date.
Therefore, if the bundled copy of found to be over thirty days old, this
distribution's installer provides the option to check for a new version of the
list and download/use it if one is found.

WWW: http://search.cpan.org/dist/Mozilla-PublicSuffix/

Feature safe:	yes
2012-04-03 08:28:12 +00:00
Matthias Andree
34c815a522 Fix a rare configuration-dependent crash. Simon Kelley, upstream
maintainer, wrote in message <4F70361B.7080306@thekelleys.org.uk>:

    A bug has been found in dnsmasq 2.60 that can cause crashes. This is
    configuration dependent: it either crashes frequently or not at all.
    The configuration required is one which allows dnsmasq to receive
    DHCPINFORM requests for which there is no valid dhcp-range. This is
    rare.

Adding the patch he offers for download.

Feature safe: yes
2012-04-01 11:18:18 +00:00
Sunpoet Po-Chuan Hsieh
4a83991526 - Update to 12.0.0
- Pass maintainership to python@

Changes:	http://twistedmatrix.com/trac/browser/tags/releases/twisted-12.0.0/twisted/names/topfiles/NEWS
PR:		ports/165732
Submitted by:	sunpoet (myself)
Approved by:	Neal Nelson <neal@nicandneal.net> (maintainer)
Feature safe:	yes
2012-03-28 19:37:34 +00:00
Ryan Steinmetz
f75ef89f43 - Adopt port
- Add LICENSE
- Add additional MASTER_SITE

Feature safe:	yes
2012-03-23 11:55:48 +00:00
Martin Wilke
4cd6ad2256 - Update to 1.3.7
PR:		166125
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl>(maintainer)
Feature safe:	yes
2012-03-18 04:44:00 +00:00
Michael Scheidell
518b7ede95 - Final patch
- Add back cat pkg-message
- Add knot.full.conf to ETCDIR and pkg-plist
- Bump PORTREVISON

PR:		ports/165798
Submitted by:	Leo Vandewoestijne <freebsd@dns-lab.com> (maintainer)
Approved by:	Leo Vandewoestijne <freebsd@dns-lab.com> (maintainer)
Feature safe:	yes
2012-03-17 12:44:20 +00:00
Doug Barton
59d8a15c5f Add a patch from ISC slated for 9.9.1 which fixes an assertion failure
Feature safe: yes
2012-03-17 06:37:10 +00:00
Michael Scheidell
b4aad3a6af - Unbreak for non i86 archs
- No PORTREVISION bump

PR:		ports/165798
Submitted by:	mexas@bristol.ac.uk
Approved by:	Leo Vandewoestijne <freebsd@dns-lab.com> (maintainer, implicit)
Feature safe:	yes
2012-03-16 10:28:53 +00:00
Michael Scheidell
b23e936e48 - Add ONLY_FOR_ARCHS= i386 amd64
- No PORTREVISION bump

PR:		ports/165787
Reported by:	Anton Shterenlikht <mexas@bristol.ac.uk>
Approved by:	Leo Vandewoestijne <freebsd@dns-lab.com> (maintainer, implicit)
Feature safe:	yes
2012-03-15 15:15:00 +00:00
Michael Scheidell
14622161b7 New port: dns/knot high-performance auth-only DNS server by NIC-CZ
PR:		ports/165798
Submitted by:	Leo Vandewoestijne <freebsd@dns-lab.com>
Approved by:	Leo Vandewoestijne <freebsd@dns-lab.com> (maintainer)
Feature safe:	yes
2012-03-14 21:41:59 +00:00
Philip M. Gollucci
b59621d3ae - Revert ports/165605 as requested by portmgr@
Note: devel/p5-B-Size and devel/p5-Devel-Arena
where intentionally not restored.

PR:             ports/165605
Approved by:    portmgr (bapt)
Feature safe:   yes (I sure hope so)
2012-03-13 16:15:36 +00:00
Doug Barton
e346523d43 Restore support for ${PERL_LEVEL} < 501000
Feature safe:	yes
2012-03-12 00:32:09 +00:00
Matthias Andree
375fa2ae28 Update to new upstream release 2.60. Notable new features are:
- The LUA port option enables Lua support for DHCP lease-change scripts
- DHCPv6 support
- IPv6 Router Advertisement support

Changelog:    http://www.thekelleys.org.uk/dnsmasq/CHANGELOG
Feature safe: yes
2012-03-11 23:59:44 +00:00
Doug Barton
7c588a6b6d Fix OPTIONS broken by the perl < 5.12 sweep [1]
While I'm here, reduce the number of docs variables.

PR:		ports/165930 [1]
Submitted by:	Alexey Markov <redrat@mail.ru> [1]

Feature safe:	yes
2012-03-11 21:25:55 +00:00
Philip M. Gollucci
2cf4c1e2c8 - Remove ports that only work with < perl 5.12 (devel/p5-B-Size, devel/p5-Devel-Arena)
- Remove conditionals for PERL_LEVEL < 501200
- Remove regression-test targets b/c this will be centralized in Mk/bsd.perl.mk
- Other minor cleanups
  RUN_DEPENDS = ${BUILD_DEPENDS} -> RUN_DEPENDS:= ${BUILD_DEPENDS}

PR:             ports/165605
Submitted by:   pgollucci (myself)
Approved by:    portmgr (linimon)
Exp Run by:     linimon
Tested by:      make index
2012-03-08 18:45:38 +00:00
Sunpoet Po-Chuan Hsieh
0d39fffab4 - Update to 0.22
- Sort *_DEPENDS

Changes:	http://search.cpan.org/dist/POE-Component-Server-DNS/Changes
2012-03-08 08:42:28 +00:00
Frederic Culot
efdaeb59bf - Update to 0.916
Changes:	http://search.cpan.org/dist/POE-Component-Resolver/CHANGES
PR:		ports/165718
Submitted by:	Jase Thew <freebsd@beardz.net> (maintainer)
2012-03-06 09:42:34 +00:00
Steve Wills
e43571dc73 A Perl POE component that provides non-blocking DNSBL lookups
WWW:	http://search.cpan.org/dist/POE-Component-Client-DNSBL/
2012-03-01 16:34:33 +00:00
Sunpoet Po-Chuan Hsieh
9581436a3f - Update to 1.04
- Sort *_DEPENDS

Changes:	http://search.cpan.org/dist/POE-Component-Client-DNS-Recursive/Changes
2012-03-01 10:53:48 +00:00
Doug Barton
4281e345bf Release version of 9.9.0. Code is identical to rc4. 2012-02-29 18:41:12 +00:00
Steve Wills
ecc6bd0b82 - Update to 1.41
- Add TEST_DEPENDS to enable testing
- Add patch to fix tests, submitted upstream
2012-02-29 16:21:16 +00:00
Steve Wills
ee406a9fe3 - Add missing BUILD_DEPENDS and RUN_DEPENDS
- Bump PORTREVISION due to new RUN_DEPENDS changing package
2012-02-29 04:52:36 +00:00
Steve Wills
4db0639e54 A recursive DNS client for POE
WWW:	http://search.cpan.org/dist/POE-Component-Client-DNS-Recursive/
2012-02-29 04:41:15 +00:00
Greg Larkin
b48da6b6c5 - Reassign to the heap
Requested by:	roam (on ports-developers@)
2012-02-27 20:32:31 +00:00
Martin Matuska
8c26bbc254 Return maintainership back to pool 2012-02-26 12:10:28 +00:00
Ryan Steinmetz
2cada48d0a - Update to 1.7.5
- Add additional MASTER_SITES
2012-02-25 14:59:11 +00:00
Ryan Steinmetz
6cb55cd984 - Adopt port per maintainers request
Approved by:	roam@
2012-02-25 14:08:09 +00:00
Ryan Steinmetz
47c0ac176c - Adpot port per request of maintainer
Approved by:	roam@
2012-02-25 14:01:08 +00:00
Michael Scheidell
e65e70eeab - Change boost-libs from BUILD_DEPENDS to LIB_DEPENDS. This fixes installing from packages.
PR:		ports/165352
Reported by:	Marat Bakeev <hawara@hawara.com>
Submitted by:	Ralf van der Enden <tremere@cainites.net> (maintainer)
Approved by:	gabor (mentor, implicit)
Feature safe:	yes
2012-02-24 13:00:45 +00:00
Doug Barton
42a96bb523 Upgrade to rc4, rndc and dlz fixes, including DNSSEC key maintenance timer 2012-02-24 07:26:21 +00:00
Jason Helfman
4eed42b968 - Update to 20110809-2
- Builds now on 9.x, drop conditional
- while here use include of bpm and loop on portdocs

PR:	ports/165388
Submitted by:	maintainer, mc@hack.org
2012-02-22 20:07:31 +00:00
Doug Barton
aaca6c8912 Upgrade to 9.9.0rc3, various small bug fixes 2012-02-19 02:41:42 +00:00
David Thiel
859882f486 Add DNSCurve support for dnscache, using Michael Dempsky's patch.
PR:		ports/164833
2012-02-18 00:34:05 +00:00
Jason Helfman
8c5c548ed6 - Update to 1.3.6
PR:	ports/165216
Submitted by:	maintainer, jaap at NLnetLabs.nl
2012-02-17 17:52:44 +00:00
Frederic Culot
551d6df7e9 - Update to 3.2.10
PR:		ports/165185
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2012-02-16 17:04:08 +00:00
Doug Barton
b2f3cb124b Update to version 0.68; Jan 30, 2012
Lots of fixes for older Perl versions, and several other bug fixes
The parse and data methods are renamed to decode and encode respectively
New feature: IDN query support, requires Net::LibIDN
New modules: Mailbox.pm, Text.pm

For the port:
* Add TEST_DEPENDS (probably won't work on its own due to CONFIGURE_ARGS)
* Add an OPTION for IDN support, off by default
* Use the PORTDOCS macro
* Move the OPTIONS= to the more standard location
2012-02-15 09:44:39 +00:00
Jason Helfman
7c5fc3c202 - Add new port (dns/py-easyzone)
Easyzone is a package to manage the common record types of a zone file,
including SOA records. This module sits on top of the dnspython package
and provides a higher level abstraction for common zone file manipulation
use cases.

WWW: http://www.psychofx.com/easyzone/

PR:	ports/164961
Submitted by: Attila Nagy <bra at fsn.hu>
2012-02-10 22:31:17 +00:00
Baptiste Daroussin
a91afe4525 give all my p5-* ports to perl team 2012-02-06 23:34:57 +00:00
Ruslan Makhmatkhanov
1650401477 - update to 2.3.6 2012-02-05 19:09:57 +00:00
Sergey Matveychuk
03054de8a5 - Update to 1.4.16
* Bugfix release
2012-02-02 13:53:27 +00:00
Doug Barton
9e59fe46d7 Update to 9.9.0rc2, which addresses mostly in-line signing bugs 2012-02-01 02:12:20 +00:00
Frederic Culot
754a546358 - Update to 1.3.5
Changes:	http://www.opendnssec.org/2012/01/23/opendnssec-1-3-5/
PR:		ports/164628
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2012-01-30 12:27:28 +00:00
Alexander Logvinov
8c253efa55 - Fix broken binary caused by using INSTALL_SCRIPT on some architectures
- Use INSTALL_MAN for the man files and respect NO_INSTALL_MANPAGES knob
- Use INSTALL_DATA for PORTDOCS file
- Hide post-extract and post-patch procedure
- Bump PORTREVISION

PR:		ports/163942 [1]
Submitted by:	Garrett Cooper <yanegomi AT gmail.com> [1]
Approved by:	maintainer via private mail
2012-01-29 10:56:06 +00:00
Martin Wilke
3a141ba29e - Update to 1.6.12
PR:		164224
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl>
2012-01-28 17:49:34 +00:00
Sergey Matveychuk
c3b5da5af5 - Bump unbound library version 2012-01-28 17:28:26 +00:00
Doug Barton
37ba3cc3a7 By popular demand add a port for the newest BIND branch, 9.9.x. This will
stay as a -devel until it's formally released, which should be soon'ish.

BIND 9.9 includes a number of changes from BIND 9.8 and earlier releases,
including:
	NXDOMAIN redirection
	Improved startup and reconfiguration time, especially with large
		numbers of authoritative zones
	New "inline-signing" option, allows named to sign zones completely
		transparently, including static zones
	Many other new features, especially for DNSSEC

See the CHANGES file for more information on features.

https://kb.isc.org/article/AA-00592
2012-01-28 05:28:10 +00:00
Sergey Matveychuk
2d1cdcbe42 - Fix plist
Submitted by:	dougb
2012-01-27 09:40:40 +00:00
Sergey Matveychuk
4050999bef - Update to 1.4.15
* Fixed a little memory leak
  * Couple other bugs fixed
- Run unbound-checkconf before start.
2012-01-26 13:44:58 +00:00
Martin Matuska
1d63a569b8 Update to 0.2 2012-01-25 08:44:51 +00:00
Sergey Matveychuk
85d61de6e5 - Run unbound-anchor with unbound user. It solves a permissions problem. 2012-01-24 17:23:00 +00:00
Sergey Matveychuk
ba77634c78 - Run unbound-anchor before unbound to obtain a trust anchor for DNSSEC.
Requested by:	des
2012-01-24 14:40:13 +00:00
Eitan Adler
c59a3834c4 At the moment 1385 ports use BUILD_DEPENDS= ${RUN_DEPENDS} and 450
ports use BUILD_DEPENDS:= ${RUN_DEPENDS}. This patch fixes ports that are
currently broken. This is a temporary measure until we organically stop using
:= or someone(s) spend a lot of time changing all the ports over.

Explicit duplication > := > = and this just moves ports one step to the left

Approved by:	portmgr
2012-01-21 17:40:15 +00:00
Bernhard Froehlich
dd402c87e4 - Update to 1.4.10
PR:		ports/164233
Submitted by:	Takefu <takefu@airport.fm>
2012-01-17 11:02:58 +00:00
Doug Barton
82eea8c595 Properly fix the rc.d script patch, both for the set_rcvar change,
and generally improve the script (most of which was unneeded).

While I'm here, fix some other problems with the port:
1. Remove a dead MASTER_SITE
2. Make the rc.d script honor PREFIX
3. Install a link for /usr/local/bin/dnscheck-dispatcher so that
   the rc.d script has something to start

Bump PORTREVISION due to package changes
2012-01-16 00:26:17 +00:00
Doug Barton
83eb2c3700 In the rc.d scripts, change assignments to rcvar to use the
literal name_enable wherever possible, and ${name}_enable
when it's not, to prepare for the demise of set_rcvar().

In cases where I had to hand-edit unusual instances also
modify formatting slightly to be more uniform (and in
some cases, correct). This includes adding some $FreeBSD$
tags, and most importantly moving rcvar= to right after
name= so it's clear that one is derived from the other.
2012-01-14 08:57:23 +00:00
Ruslan Makhmatkhanov
236864125a - update to 3.0.1
This update fixes a Denial of Service Vulnerability, which affects versions < 3.0.1 (CVE-2012-0206)

Changes:
http://doc.powerdns.com/changelog.html#changelog-auth-3-0-1

PR:		164019
2012-01-11 18:59:53 +00:00
Michael Scheidell
1ab5239b25 - Need to include bsd.port.options.mk to make OPTIONS work [1]
PR:		ports/163734 [1]
Submitted by:	Matthew Seaman <m.seaman@infracaninophile.co.uk> [1]
Approved by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer), gabor (mentor, implicit)
2012-01-11 14:59:06 +00:00
Thomas Abthorpe
e0ac1afbf4 - The proper acronym for Apache Software License 2 is really AL2
- Thanks to crees@ for generating the initial patch

PR:		ports/163521
Submitted by:	Pedro Giffuni <pfg apache.org>
Hat:		portmgr
Exp run by:	pav
2012-01-09 15:41:08 +00:00
Sunpoet Po-Chuan Hsieh
40706ba6ab - Update to 1.16
Changes:	http://search.cpan.org/dist/Net-DNS-ZoneFile-Fast/Changes
2012-01-06 06:52:27 +00:00
Steve Wills
c8afd8e9b7 - Add TEST_DEPENDS to enable testing 2012-01-05 15:39:07 +00:00
Ryan Steinmetz
b6a591f28e - Remove problematic empty variable assignment
Reported by:	dougb
2012-01-04 22:59:28 +00:00
Ryan Steinmetz
a7e522e2ab - Add SSL to OPTIONS
- Do not force the user to run ddclient as a daemon

PR:		ports/163271
Submitted by:	Rob Farmer <rfarmer@predatorlabs.net> (maintainer)
2012-01-04 01:47:21 +00:00
Alexander Logvinov
acd195b391 - Fix build with clang 2012-01-03 05:30:26 +00:00
Emanuel Haupt
33fcf400f8 End WWW CPAN URL with a "/" 2011-12-28 08:20:20 +00:00
Emanuel Haupt
48b16bc177 Pacify portlint
Feature safe:	yes
2011-12-27 15:14:23 +00:00
Sunpoet Po-Chuan Hsieh
091dde81a1 - Update to 0.9.1
- Fix WWW links in pkg-descr

Changes:	https://github.com/weppos/public_suffix_service/blob/master/CHANGELOG.md
2011-12-26 09:50:12 +00:00
Jason Helfman
d343539d3a move contributor address => jgh
Approved by:	crees (mentor)
2011-12-20 17:10:19 +00:00
Bernhard Froehlich
be135f91ea - Update to 1.4.07
- Add LICENSE

PR:		ports/163325
Submitted by:	Takefu <takefu@airport.fm>
2011-12-20 15:24:30 +00:00
Steve Wills
ecffd73f1b - Add missing BUILD_DEPENDS to silence build warnings
- Add TEST_DEPENDS to enable testing
2011-12-20 04:49:13 +00:00
Philip M. Gollucci
7832ddf953 - Point at the homepage consistently as defined by rubygems.org 2011-12-20 00:21:54 +00:00
Sergey Matveychuk
df278d1dfa - Update to 1.4.14
* CVE-2011-4528 fixed
2011-12-19 13:44:11 +00:00
Martin Wilke
7a8533cd34 - Update to 1.3.4
PR:		163080
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2011-12-18 08:54:22 +00:00
Wen Heping
51fd089f92 - Update to 1.2.0
Feature safe:	yes
2011-12-13 06:15:44 +00:00
Steve Wills
1a88d3c887 - Update to 1.53
Feature safe:	yes
2011-12-04 22:31:17 +00:00
Martin Wilke
be50b81f37 - Update to 2.1.3
PR:		162986
Submitted by:	Armin Pirkovitsch <armin@frozen-zone.org>
Feature safe:	yes
2011-12-04 09:52:10 +00:00
Ryan Steinmetz
b1a382328d - Remove post-install check to conditionally run 'nsdc patch'
Submitted by:	me
Approved by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Feature safe:	yes
2011-11-30 22:56:10 +00:00
Martin Wilke
2b119fdfb6 - Update to 3.2.9
PR:		162782
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Feature safe:	yes
2011-11-28 11:36:53 +00:00
Martin Wilke
87ce265324 Internationalized Domain Name toolkit 2 (idnkit-2) provides useful
APIs (libraries) for application developers to make softwares
IDNA2008-compliant, and also provides tools for system administrators
to process IDNs appropriately according to IDNA2008 specification.
The idnkit-2 is a toolkit revised by JPRS from the idnkit-1.0
developed by JPNIC, and it is released as an open source
free software modified to comply with IDNA2008.

idnkit-2 consists from its main part written in C and additional
API packages for other languages (Java, Python, and Perl).

WWW:	http://jprs.co.jp/idn/index-e.html

PR:		ports/162521
Submitted by:	Rafal Lesniak <fbsd@grid.einherjar.de>
Feature safe:	yes
2011-11-24 14:16:47 +00:00
Pav Lucistnik
c4445d6abc - Fix plist
Reported by:	pointyhat
Feature safe:	yes
2011-11-20 19:53:11 +00:00
Cheng-Lung Sung
b2c7fde9b3 - Update to 0.45
Feature safe:	yes
2011-11-18 08:46:58 +00:00
Chris Rees
fb972f4e3b Add LATEST_LINK line to avoid conflict with idnkit
Pointyhat:	erwin --> crees
Feature safe:	yes
2011-11-17 19:34:11 +00:00
Doug Barton
59eefda0a9 Upgrade to the latest security patch releases to address the
following DDOS bug:

Recursive name servers are failing with an assertion:
INSIST(! dns_rdataset_isassociated(sigrdataset))

At this time it is not thought that authoritative-only servers
are affected, but information about this bug is evolving rapidly.

Because it may be possible to trigger this bug even on networks
that do not allow untrusted users to access the recursive name
servers (perhaps via specially crafted e-mail messages, and/or
malicious web sites) it is recommended that ALL operators of
recursive name servers upgrade immediately.

For more information see:
https://www.isc.org/software/bind/advisories/cve-2011-tbd
which will be updated as more information becomes available.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313

Feature safe:	yes
2011-11-16 23:41:13 +00:00
Sunpoet Po-Chuan Hsieh
ef6c22b0a2 - Fix CATEGORIES: it should be rubygems, not ruby
Feature safe:	yes
2011-11-16 18:57:10 +00:00
Chris Rees
2f164dbbf7 Internationalized Domain Name toolkit 2 (idnkit-2) provides useful
APIs (libraries) for application developers to make softwares
IDNA2008-compliant, and also provides tools for system administrators
to process IDNs appropriately according to IDNA2008 specification.
The idnkit-2 is a toolkit revised by JPRS from the idnkit-1.0
developed by JPNIC, and it is released as an open source
free software modified to comply with IDNA2008.

idnkit-2 consists from its main part written in C and additional
API packages for other languages (Java, Python, and Perl).

WWW:	http://jprs.co.jp/idn/index-e.html

PR:		ports/162520
Submitted by:	Rafal Lesniak <fbsd@grid.einherjar.de>
Feature safe:	yes
2011-11-16 17:48:53 +00:00
Sunpoet Po-Chuan Hsieh
a1a8e50af0 - Fix PLIST
- Bump PORTREVISION for package change

Reported by:	pointyhat
Feature safe:	yes
2011-11-11 15:49:39 +00:00
Ruslan Makhmatkhanov
1d3015aac7 Change email for my ports to FreeBSD one.
Approved by:	novel (mentor)
Feature safe:	yes
2011-11-10 22:20:18 +00:00
Doug Barton
13894b9f00 The fact that Net::DNS no longer depends on Net::IP means that
%%SITE_PERL%%/Net may be empty when this port is deinstalled,
so @dirrmtry it.

Poked by:	pavmail
Feature safe:	yes
2011-11-10 21:13:29 +00:00
Cheng-Lung Sung
c5ed472a4b - Update to 0.44 2011-11-10 07:33:17 +00:00
Mark Linimon
7d8608ab13 Mark broken on powerpc as well as sparc64. (In fact, on all the tier-2s.)
Hat:		portmgr
2011-11-10 05:38:32 +00:00
Sunpoet Po-Chuan Hsieh
172e0995d7 - Add rubygem-public_suffix_service 0.9.0
Public Suffix Service is a Ruby domain name parser based on the Public Suffix
List.

The Public Suffix Service is a cross-vendor initiative to provide an accurate
list of domain name suffixes.

The Public Suffix Service is an initiative of the Mozilla Project, but is
maintained as a community resource. It is available for use in any software, but
was originally created to meet the needs of browser manufacturers.

A "public suffix" is one under which Internet users can directly register names.
Some examples of public suffixes are ".com", ".co.uk" and "pvt.k12.wy.us". The
Public Suffix List is a list of all known public suffixes.

WWW: http://www.simonecarletti.com/code/public_suffix_service/
WWW: https://github.com/weppos/public_suffix_service
WWW: https://rubygems.org/gems/public_suffix_service
2011-11-10 03:15:21 +00:00
Emanuel Haupt
cfe7a8b985 Freshmeat is now called Freecode. Change all freshmeat.net URLs for to
freecode.com (for ports@ and ehaupt@).
2011-11-09 21:53:33 +00:00
Martin Wilke
e1c6649edf - Remove WITH_FBSD10_FIX, is no longer needed 2011-11-09 15:26:04 +00:00
Doug Barton
de4dd2f62d **** 0.67 Nov 4, 2011
Fixes:
======

Suppress IO::Socket::INET(6)::peerhost usage with TCP. On some systems
it doesn't work after receiving data.

Prevent TCP accepts from blocking on unfinished 3-way handshakes.

Named nameserver should be reachable by IPv6 too.

Typo that prevented TCP traffic from being replied from the same
socket as it was received on.

Suppress warnings of the deprecated use of qw as parentheses in
perl 5.14.

Gracefully handle corrupted incoming packets in Net::DNS::Nameserver.

Make Net::DNS::Resolver load even if /etc/resolv.conf is unreadable.

Assembly of segmented TCP traffic.

Fix documentation to reflect code behaviour where on successful packet
creation, the error should be ignored.

A Net::DNS::Nameserver without a NotifyHandler now responds NOTIMP
to NOTIFY requests.

Documentation now reflects Net::DNS::Packet construction behaviour.

Replace TSIG key with the signature of the whole packet when signing
a packet, even when the TSIG key is not the first in the additional
section.

Various typo fixes.

Enhancements:
=============

Allow ReplyHandlers to indicate that no answer should be returned
by the Net::DNS::Nameserver.

Use a class method ReplyHandler for classes inheriting from
Net::DNS::Nameserver.

New improved version of the check_soa script in the contrib section.

Removed dependency on Net::IP

Perform presentation to wire format conversion more efficiently.

Manage serial numbers in SOA records in a modular and extensible way.
Three modules are provided. Strictly sequential, Date Encoded and
Time Encoded.  A contribution from Dick Franks.

Provide a configurable IdleTimeout for Net::DNS::Namserver.
2011-11-09 06:31:46 +00:00
Martin Wilke
74bbe43875 - Fix INDEX 2011-11-07 05:47:42 +00:00
Martin Wilke
3cabe21a2d - Get rid FreeBSD 6 support 2011-11-07 04:24:55 +00:00
Olli Hauer
696043f866 - add fix from upstream vendor to preserve slowdowns during (re)start
PowerDNS with BIND backend

PR:		ports/160308
Submitted by:	Ralf van der Enden <tremere@cainites.net> (maintainer)
2011-11-06 20:00:56 +00:00
Cheng-Lung Sung
e8afb8ed52 - Update to 1.02 2011-11-06 14:27:45 +00:00
Doug Barton
a1b8c7234f Remove ports@ ports that have been DEPRECATED for at least 1 month
audio/shoutcast		Unfetchable; website rearranged
audio/linux-shoutcast	Unfetchable; website rearranged
chinese/scim-chewing	Does not configure
converters/py-cjkcodecs	Integrated into every python version in the tree
databases/kpogre	Does not compile
deskutils/mhc		Does not fetch
deskutils/org-mode.el6	Does not fetch
deskutils/gemcal	Does not fetch
devel/erlang-thrift	Does not build
dns/domtools		Does not fetch
editors/richtext	Does not compile
games/vultures-claw	Does not fetch
games/bomb		Does not fetch
games/lgeneral-data	Bad plist
games/linux-enemyterritory-jaymod	Does not fetch
games/xphotohunter	Does not fetch
graphics/gimpshop	Fails to patch
graphics/lightspark-devel	Does not compile
graphics/xmms-plazma	Does not fetch
graphics/py-cgkit	Does not fetch, does not compile on ia64, powerpc, or sparc64
japanese/rxvt		Does not fetch, fails to build with new utmpx
japanese/epic4		Some distfiles do not fetch
java/jde		Does not fetch
java/kaffe		Does not fetch
korean/gdick	HTMLs from the Yahoo! Korea Dictionary cannot be parsed, other runtime problems
korean/hanterm-xf86	Does not compile
korean/stardict2-dict-kr Does not fetch
lang/p5-JavaScript	Does not fetch
lang/TenDRA	Website disappeared; last release 2006, Does not compile on recent FreeBSD-9
mail/freepops		Does not build
mail/itraxp		Does not build
misc/tellico		Leaves file behind on deinstall
net/gsambad		Does not fetch
net/nocatauth-gateway	Uses a UID registered to another port
net/nocatauth-server	Uses a UID registered to another port
net/libosip2		Does not fetch
net/kmuddy		Does not fetch
net/netboot		Does not build
net-mgmt/jffnms		Does not fetch
net-p2p/frostwire	Does not fetch
net-p2p/azureus		Does not fetch
news/cleanscore		Does not fetch
news/nntpswitch		Does not fetch
news/p5-NewsLib		Does not fetch
russian/cyrproxy	Does not fetch
science/gerris		Does not fetch
security/opensaml	Does not fetch
sysutils/wmbattery	Does not fetch
sysutils/cpuburn	No more public distfiles
textproc/tei-guidelines-p4	Does not fetch
textproc/tei-p4		Does not fetch
textproc/py-hyperestraier	Does not fetch
textproc/tdtd.el	Does not fetch
textproc/tei-lite	Does not fetch
www/phpwiki13		Does not fetch
www/p5-Apache-Scoreboard	Depends on mod_perl
www/p5-B-LexInfo	Broken due the new mod_perl2 API
www/phpwiki		Does not fetch
www/smb2www		Apache13 is deprecated, migrate to 2.2.x+ now
www/spip		Checksum is changing daily
www/monkey		Does not fetch
x11-toolkits/jdic	Does not fetch
x11-toolkits/py-kde	Does not compile
2011-11-02 01:35:45 +00:00
Koop Mast
8e3f371244 Fix build on FreeBSD 10.
Approved by:	portmgr (miwi)
2011-10-29 09:37:46 +00:00
Martin Wilke
3a61669522 - Fix build FreeBSD 10 2011-10-28 18:00:25 +00:00
Cheng-Lung Sung
fb72faec09 - Update to 0.08 2011-10-27 01:42:02 +00:00
Ryan Steinmetz
d3310d0094 - Update MAINTAINER to ruby@ for my ruby ports 2011-10-26 11:21:50 +00:00
Doug Barton
989772c9ac The vast majority of pkg-descr files had the following format when they
had both lines:

Author: ...
WWW: ....

So standardize on that, and move them to the end of the file when necessary.

Also fix some more whitespace, and remove more "signature tags" of varying
forms, like -- name, etc.

s/AUTHOR/Author/

A few other various formatting issues
2011-10-24 09:11:38 +00:00
Doug Barton
2b1dacc826 Remove more tags from pkg-descr files fo the form:
- Name
em@i.l

or variations thereof. While I'm here also fix some whitespace and other
formatting errors, including moving WWW: to the last line in the file.
2011-10-24 04:17:37 +00:00
Stanislav Sedov
422bce3414 - Return my ports back to the pool. I was unable to make any fixes to
my ports in the past 3 weeks while ports were broken on any 10.x
  machines, which means I'm unable to maintain them.  So let people know
  that there's no available support for them until things are back to
  normal (which also means that anyone with spare time will be able
  to fix them without getting approval).
2011-10-24 03:33:20 +00:00
Matthias Andree
a8550101df Fix BUILD_DEPENDS (use += not =) creation in port.
Upgrade to new upstream regression fix release 2.59:

	    Fix regression in 2.58 which caused failure to start up
	    with some combinations of dnsmasq config and IPv6 kernel
	    network config. Thanks to Brielle Bruns for the bug
	    report.

	    Improve dnsmasq's behaviour when network interfaces are
	    still doing duplicate address detection (DAD). Previously,
	    dnsmasq would wait up to 20 seconds at start-up for the
	    DAD state to terminate. This is broken for bridge
	    interfaces on recent Linux kernels, which don't start DAD
	    until the bridge comes up, and so can take arbitrary
	    time. The new behaviour lets dnsmasq poll for an arbitrary
	    time whilst providing service on other interfaces. Thanks
	    to Stephen Hemminger for pointing out the problem.

Note the 2.59.tar.lzma tarball causes the startup banner to print
2.59rc1 which I deem harmless.
2011-10-18 22:24:47 +00:00
Doug Barton
4eb5b88d9e As previously advertised, complete removal of vulnerable ports that
no one has stepped up to deal with:

archivers/pecl-phar		Vulnerable since 2011-01-13
comms/libsyncml			Depends on devel/libsoup22, which is FORBIDDEN
databases/mysql323-server	Vulnerable since 2006-10-29
databases/mysql323-client	Vulnerable since 2006-10-29
databases/mysql323-scripts	Vulnerable since 2006-10-29
databases/mysql40-server	Vulnerable since 2006-10-29
databases/mysql40-client	Vulnerable since 2006-10-29
databases/mysql40-scripts	Vulnerable since 2006-10-29
databases/p5-DBD-mysql40
		Depends on databases/mysql40-server, which is FORBIDDEN
deskutils/buoh			Depends on devel/libsoup22, which is FORBIDDEN
deskutils/libopensync-plugin-syncml
		Depends on comms/libsyncml, which is DEPRECATED
devel/libsoup22			Vulnerable since 2011-07-28
dns/bind9-sdb-ldap		Vulnerable since 2011-06-04
dns/bind9-sdb-postgresql	Vulnerable since 2011-06-04
ftp/wgetpro			Vulnerable since 2004-12-14
games/quake2forge		Vulnerable since 2005-01-21
graphics/linux-tiff		Vulnerable since 2004-10-13
japanese/mutt			Vulnerable since 2007-07-29
japanese/asterisk14-sounds	Depends on net/asterisk14, which is FORBIDDEN
net/asterisk14			Vulnerable since 2011-06-25
net/isc-dhcp31-client		Vulnerable since 2011-04-10
net/isc-dhcp31-server		Vulnerable since 2011-04-10
net/isc-dhcp31-relay		Vulnerable since 2011-04-10
net/asterisk-app-ldap		Depends on net/asterisk14, which is FORBIDDEN
net/asterisk-app-notify		Depends on net/asterisk14, which is FORBIDDEN
net/asterisk-oh323
   Depends on net/asterisk14, which is FORBIDDEN, does not compile on sparc64
net/asterisk14-addons		Depends on net/asterisk14, which is FORBIDDEN
net/astfax			Depends on net/asterisk14, which is FORBIDDEN
net-mgmt/nagios2		Vulnerable since 2009-06-30
www/gforge			Vulnerable since 2005-08-09
www/linux-flashplugin7		Vulnerable since at least 2008-05-30
www/opera-devel			Vulnerable since 2010-06-25, does not fetch
www/plone3			Vulnerable and unsupported upstream
www/serendipity-devel		Vulnerable since 2008-04-25
www/ziproxy			Vulnerable since 2010-06-15
www/asterisk-gui		Depends on net/asterisk14, which is FORBIDDEN
x11-toolkits/linux-pango	Vulnerable since 2009-05-13
2011-10-14 22:30:49 +00:00
Pav Lucistnik
e7da07659a - Mark BROKEN on FreeBSD 9.X: does not compile
radns.c:164: error: redefinition of 'struct nd_opt_rdnss'
  radns.c:177: error: redefinition of 'struct nd_opt_dnssl'

Reported by:	pointyhat
2011-10-12 21:51:17 +00:00
Cheng-Lung Sung
9098aab791 - Update to 2.01 2011-10-08 16:26:50 +00:00
Cheng-Lung Sung
78b224f0a2 - Update to 0.11 2011-10-08 16:25:44 +00:00
Frederic Culot
a288d48de7 - Fix LICENSE (Artistic 1 instead of Artistic 2)
- Pet portlint(1)

PR:		ports/161336
Submitted by:	Simon Olofsson <simon@olofsson.de>
2011-10-07 11:22:46 +00:00
Ryan Steinmetz
3a2b65bc5d - Update to 1.6.11
- Fix up whitespace

PR:		ports/161133
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2011-10-06 22:43:49 +00:00
Doug Barton
04f4501eff Remove dns/nsd2 at maintainer's request:
This version of nsd is end of life since 2007 and unsupported.
See the details at http://nlnetlabs.nl/projects/nsd/nsd-v2.html.

The current version also contains a vulnerability. It is much
more sensible to move to a supported version (as available in
the port dns/nsd).

PR:		ports/161122
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2011-09-30 18:58:39 +00:00
Doug Barton
2778716571 As previously advertised, remove ports that previously had been
DEPRECATED without EXPIRATION_DATE, and the ports that depend
on them.

audio/mt-daapd
	Use audio/firefly instead
databases/p5-DBIx-Class-Validation
	Depends on textproc/p5-FormValidator-Simple, which is DEPRECATED
devel/p5-Class-Data-Accessor
	Please consider using p5-Class-Accessor-Grouped or p5-Moose
graphics/libflash
	gplflash is no longer supported. Please use gnash instead
graphics/flashplayer
	Depends on DEPRECATED graphics/libflash
japanese/p5-FormValidator-Simple-Plugin-Number-Phone-JP
	Depends on textproc/p5-FormValidator-Simple, which is DEPRECATED
net/p5-OAuth-Lite
	Depends on devel/p5-Class-Data-Accessor, which is DEPRECATED
net-mgmt/py-snmp
	use net-mgmt/py-snmp4 instead
net-mgmt/py-twistedSNMP
	Relies on net-mgmt/py-snmp, which is DEPRECATED
net-p2p/gift
	unmaintained upstream for several years
net-p2p/giftcurs
	unmaintained upstream for several years
net-p2p/giftoxic
	unmaintained upstream for several years
net-p2p/giftui
	unmaintained upstream for several years
net-p2p/apollon
	Depends on net-p2p/gift, which is DEPRECATED
textproc/p5-FormValidator-Simple
	Depends on devel/p5-Class-Data-Accessor, which is DEPRECATED
www/flashplugin-mozilla
	gplflash is no longer supported. Please use graphics/gnash, \
www/p5-HTML-Widget
	Depends on devel/p5-Class-Data-Accessor, which is DEPRECATED
www/p5-Catalyst-Plugin-AutoRestart
	Depends on devel/p5-Class-Data-Accessor, which is DEPRECATED
www/p5-Catalyst-Example-InstantCRUD
	Depends on www/p5-HTML-Widget, which is DEPRECATED
www/p5-Catalyst-Plugin-FormValidator-Simple
	Depends on textproc/p5-FormValidator-Simple, which is DEPRECATED
www/p5-Catalyst-Plugin-HTML-Widget
	Depends on www/p5-HTML-Widget, which is DEPRECATED
www/asterisk-fop
	Depends on www/flashplugin-mozilla which is DEPRECATED
www/p5-Handel
	Depends on textproc/p5-FormValidator-Simple, which is DEPRECATED
www/p5-DBIx-Class-HTMLWidget
	Depends on www/p5-HTML-Widget, which is DEPRECATED
www/p5-HTML-Widget-DBIC
	Disappear from CPAN
x11-wm/fvwm24
	No longer supported by fvwm.org
2011-09-30 08:58:22 +00:00
Baptiste Daroussin
0f3eb33db7 Router Advertisement DNS (radns)
radns is an IPv6 DNS server address autoconfiguration client. It
listens for IPv6 Router Advertisements with the Recursive DNS Server
(RDNSS) and the DNS Search List (DNSSL) options and stores the search
list and address(es) in a file in the same syntax as resolv.conf(5).

WWW: http://hack.org/mc/hacks/radns/

PR:		ports/159626
Submitted by:	Michael Cardell Widerkrantz <mc@hack.org>
2011-09-28 09:48:16 +00:00
Cheng-Lung Sung
91f4232a15 - Update to 2.00 2011-09-27 01:51:32 +00:00
Cheng-Lung Sung
ac03c764d2 - Update to 0.43 2011-09-26 10:31:51 +00:00
Doug Barton
75fbecdf73 Mark FORBIDDEN the remaining ports that are vulnerable for more than
2 weeks according to portaudit (ranging from 23 days to 7 years).
The maintainers were notified by mail that this action would be taken
on 2011-09-03. (Ports for which maintainers responded have been/will be
dealt with separately.)

Also mark DEPRECATED ports that rely on the FORBIDDEN ports, and a few
ports that rely on those DEPRECATED ports.
2011-09-26 09:24:20 +00:00
Cheng-Lung Sung
be9d6b9639 - Update to 0.10 2011-09-26 04:43:13 +00:00
Doug Barton
369c12167b Incremental improvements to the rc.d script per
http://lists.freebsd.org/pipermail/cvs-all/2011-July/341217.html

Approved by:	maintainer timeout (2 months)
2011-09-25 07:17:15 +00:00
Dmitry Marakasov
6f6fbe4bdf - Add LDFLAGS to CONFIGURE_ENV and MAKE_ENV (as it was done with LDFLAGS)
- Fix all ports that add {CPP,LD}FLAGS to *_ENV to modify flags instead

PR:		157936
Submitted by:	myself
Exp-runs by:	pav
Approved by:	pav
2011-09-23 22:26:39 +00:00
Dennis Herrmann
4e7192e3ce - Update to 1.3.2
PR:		ports/160828
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2011-09-20 17:40:35 +00:00
Pav Lucistnik
bf55ad1a47 - Chase libev shlib bump
Pointy hat to:	vsevolod
2011-09-19 21:06:11 +00:00
Sunpoet Po-Chuan Hsieh
6fb6597c89 - Change PERL_CONFIGURE to "yes" for all values less than or equal to 5.8.0+
With hat:	perl
2011-09-17 06:49:29 +00:00
Sergey Matveychuk
e2c9da64eb - Update to 1.4.13 2011-09-15 12:04:09 +00:00
Pav Lucistnik
efa5c62dfd - Update to 3.0.5
PR:		ports/159920
Submitted by:	Janos Mohacsi <janos.mohacsi@bsd.hu> (maintainer)
2011-09-13 10:57:17 +00:00
Emanuel Haupt
6bb8e6f41d Fix network interface detection. Pass maintainership to submitter.
PR:		160677
Submitted by:	sthalik@tehran.lain.pl
2011-09-12 14:01:42 +00:00
Doug Barton
bf583d94c7 BIND version 9.7 with support for sdb database drivers, including ldap and
postgresql.

WWW: https://www.isc.org/software/bind/

PR:		ports/157752
Submitted by:	Josh Carroll <josh.carroll@gmail.com>
2011-09-09 20:55:32 +00:00
Dennis Herrmann
d8c3acf988 - Fix Build on 9.x
- Update files/pkg-message.in [1]

PR:		ports/160441
Submitted by:	Ruslan Mahmatkhanov <cvs-src@yandex.ru>
Approved by:	maintainer ([1] via mail)
2011-09-09 18:43:28 +00:00
Anton Berezin
0384302b96 Update to 1.69.
Changes:	http://search.cpan.org/dist/Net-Domain-TLD/Changes
2011-09-08 08:40:17 +00:00
Andrej Zverev
a015f2e5d0 - Replace ../../authors in MASTER_SITE_SUBDIR with CPAN:CPANID macro.
See http://wiki.freebsd.org/Perl for details.
- Change maintainership from ports@ to perl@ for ports in this changeset.

With perl@ hat
2011-09-08 08:36:43 +00:00
Chris Rees
893ca6053d Pass maintainership to Mikhail Tsatsenko.
Thank you for volunteering.
2011-09-07 19:34:00 +00:00
Sofian Brabez
36b48d77cf - Update to 11.0.0
- Update MASTER_SITES
- Add LICENSE

Reviewed by:	lwhsu@
Approved by:	jadawin@ (mentor)
2011-09-07 09:27:54 +00:00
Alex Dupre
3b0886cfe4 Fix IPv6 support.
PR:		ports/160344
Submitted by:	Viktor Gal <wiking@maeth.com>
2011-09-05 12:14:19 +00:00
Wen Heping
b342a941c7 - Update to 1.1.4 2011-09-05 08:37:21 +00:00
Baptiste Daroussin
eafa5f559b 2011-09-01 deskutils/gkrellm-gtodo: No more public distfiles
2011-09-01 deskutils/xopps: No more public distfiles
2011-09-01 devel/adocman: No more public distfiles
2011-09-01 devel/bisongen: No more public distfiles
2011-09-01 devel/crow: BROKEN for more than 6 month
2011-09-01 devel/p5-Config-INI-MVP: Disappear from CPAN
2011-09-01 devel/p5-Date-Set: Disappear from CPAN
2011-09-01 devel/p5-File-FTS: No more public distfiles
2011-09-01 devel/p5-PerlMenu: No more public distfiles
2011-09-01 devel/p5-Proc-PIDFile: No more public distfiles
2011-09-01 devel/p5-UNIVERSAL-exports: Disappear from CPAN
2011-09-01 devel/ruby-rbtree: No Master Site
2011-09-01 dns/host: No more public distfiles
2011-09-01 emulators/linux-padjoy: No more public distfiles
2011-09-01 emulators/mame-extras: No more public distfiles
2011-09-01 emulators/snespp: BROKEN for more than 6 month
2011-09-01 emulators/xgs: No more public distfiles
2011-09-01 ftp/gproftpd: No more public distfiles
2011-09-01 ftp/muddleftpd: No more public distfiles
2011-09-01 07:03:48 +00:00
Doug Barton
24bf9016b8 Upgrade to version 9.8.1. Release notes at:
https://deepthought.isc.org/article/AA-00446/81/
or
/usr/local/share/doc/bind98/CHANGES

Remove the patch incorporated upstream, and add new include to plist.
2011-09-01 04:43:58 +00:00
Sunpoet Po-Chuan Hsieh
1555248914 - Pet portlint 2011-08-30 06:41:13 +00:00
Matthias Andree
0bd5efa950 Update to new upstream release 2.58
Changes: http://thekelleys.org.uk/dnsmasq/CHANGELOG

Suggested by: Loic Pefferkorn.
2011-08-26 22:32:47 +00:00
Eitan Adler
e1f907bc92 - change the email address I use to maintain ports
Approved by:	bapt (mentor)
2011-08-21 20:51:40 +00:00
Eitan Adler
74db235785 - change the email address I use to maintain ports
Approved by:	bapt (mentor)
2011-08-21 16:12:46 +00:00
Chris Rees
c2538a4521 - Update to 1.3.1
- Pass maintainership to submitter (thank you for volunteering)
- Add LICENSE
- Unbreak -- fix dependencies

PR:		ports/158948
Submitted by:	Jason Helfman <jhelfman@experts-exchange.com>
2011-08-16 09:07:11 +00:00
Steve Wills
22b3f87c05 - Fix building when security/polarssl is already installed
PR:		ports/159741
Submitted by:	Ralf van der Enden <tremere@cainites.net> (maintainer)
2011-08-14 02:46:28 +00:00
Koop Mast
0e682dded4 Remove USE_GNOME=gnometarget from ports. It has been a empty keyword since
mid 2008.

PR:		ports/159624
Submitted by:	Ruslan Mahmatkhanov <cvs-src@yandex.ru>
2011-08-11 19:20:17 +00:00
Steve Wills
63a9771093 - Fix/add usage of SQLITE3_CFLAGS and SQLITE3_LIBS as detected by pkg-config
- Fixes compilation on systems that don't have math/gmp installed

PR:		ports/159617
Submitted by:	Ralf van der Enden <tremere@cainites.net> (maintainer)
2011-08-10 17:16:26 +00:00
Pav Lucistnik
b196076da0 - Update to 3.0
PR:		ports/159349
Submitted by:	Ralf van der Enden <tremere@cainites.net> (maintainer)
2011-08-08 12:38:59 +00:00
Steve Wills
65b5b82404 - Update to 0.913
- Make use of CPAN:USER macro
- Correct LICENSE (ART10 instead of ART20)
- Pet portlint(1) by reordering LICENSE section

PR:		ports/159314
Submitted by:	Jase Thew <freebsd@beardz.net> (maintainer)
2011-08-07 04:39:14 +00:00
Steve Wills
603811e2cc - Mark broken with Ruby 1.9
With hat:	ruby@
2011-08-06 14:40:47 +00:00
Mark Linimon
646c7d94fb Assign to new volunteer.
PR:		ports/159394
Submitted by:	ports@eitanadler.com
2011-08-03 04:17:20 +00:00
Frederic Culot
cf21065204 - Update to 0.07
- Add LICENSE (Artistic 1 & GPLv1)

Changes:	http://search.cpan.org/dist/Net-DNS-Lite/Changes
2011-08-02 19:05:27 +00:00
Baptiste Daroussin
d389c2f0a8 Deprecate some ports where I can't find distfiles and upstream 2011-08-02 17:04:00 +00:00
Baptiste Daroussin
bdf39c48d5 Mark BROKEN: Does not fetch 2011-08-02 11:31:36 +00:00
Doug Barton
ceb0439ba5 Update to version 9.7.4 which contains various bug fixes and improvements:
ftp://ftp.isc.org/isc/bind9/9.7.4/RELEASE-NOTES-BIND-9.7.4.html
2011-08-02 07:03:06 +00:00
Doug Barton
5dd3657b45 Remove patch incorporated into version 9.7.4 2011-08-02 07:01:37 +00:00
Doug Barton
696877900f Update to version 9.6-ESV-R5 which contains various bug fixes
and improvements:

ftp://ftp.isc.org/isc/bind9/9.6-ESV-R5/RELEASE-NOTES-BIND-9.6-ESV.html
2011-08-02 06:55:18 +00:00
Doug Barton
585dab5af8 Remove patch incorporated into version 9.6-ESV-R5 2011-08-02 06:53:03 +00:00
Ryan Steinmetz
d7ecc7c232 Update to 1.8.1 [1]
Add LICENSE

PR:		ports/159199
Submitted by:	Rob Farmer <rfarmer@predatorlabs.net> (maintainer) [1]
Approved by:	tabthorpe (mentor)
2011-07-28 21:59:28 +00:00
Chris Rees
65f55dc660 Removed dns/dhid -- expired 25/July
2011-07-25 dns/dhid: Unmaintained, distfile has changed with no explanation
2011-07-28 07:16:00 +00:00
Mark Linimon
06e6677793 Now that the Java 1.3 and Java 1.4 ports are deprecated and will expire soon,
remove support for them from bsd.java.mk.  As Jikes is not available in Java 1.5
or higher, remove it from bsd.java.mk too (suggested by hq@) and from the ports
which used it (only occurences were USE_JIKES=no).  Support for the Blackdown VM
is also removed, as it is not available in Java 1.5 and higher.

Also remove the mapping from Java 1.1-1.4 to Java 1.5+ in bsd.java.mk to detect
old, broken ports; therefore bump the minimal value of JAVA_VERSION to 1.5.
While here, replace static values of JAVA_VERSION in files/*.in by
%%JAVA_VERSION%% .

PR:		ports/158969
Submitted by:	rene
Tested on:	pointyhat-west -exp
2011-07-21 05:03:02 +00:00
Chris Rees
5b93f10851 - Use USERS and GROUPS
- Stop clobbering config files on deinstall

PR:		ports/157854
Submitted by:	Leo Vandewoestijne <freebsd@dns-lab.com>
Approved by:	rene (mentor, implicit), maintainer timeout (14 days)
2011-07-19 17:44:30 +00:00
Doug Barton
2b4caa4539 Fix the location of the default pid file in named.8
Problem pointed out in the PR

PR:		conf/155006
Submitted by:	Helmut Schneider <jumper99@gmx.de>
2011-07-17 04:08:59 +00:00
Mark Linimon
57a8d7d6ed Mark as broken on sparc64: does not compile. 2011-07-16 05:23:59 +00:00
Ryan Steinmetz
72a02a04ab Update my email address on the ports I maintain.
Approved by: wxs@ (mentor)
2011-07-15 21:15:29 +00:00
Julien Laffaye
76b41420b1 Update to 1.3.0
PR:		ports/158865
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Approved by:	bapt (mentor)
2011-07-15 20:55:00 +00:00
Sergey Matveychuk
567660bb5f - Update to 1.4.12 (a bugfix release)
- Disable GOST by default
- Depend on dns/ldns
2011-07-15 12:53:51 +00:00
Julien Laffaye
edc7b95ba3 Update to 1.22
PR:		ports/158785
Submitted by:	Hung-Yi Chen <gaod@hychen.org> (maintainer)
Approved by:	bapt (mentor, implicit)
2011-07-11 12:44:42 +00:00
Chris Rees
103090375c Pass maintainership to submitter
PR:		ports/156029
Approved by:	rene (mentor, implicit), maintainer (linimon, in PR close message)
2011-07-10 15:53:36 +00:00
Mark Linimon
0a888c56fd Update to 2.3.5. Changes:
- Add SPF support
 - Added rotation of name servers - SF Patch ID: 2795929.
 - Address sourceforge patch requests 2981978, 2795932 to add revlookupall
   and raise DNSError instead of IndexError on server fail.
 - Use blocking IO with timeout for TCP replies.
 - Don't try to close socket when never opened.
 - Clarify CNRI (academic-style) license.

PR:		ports/156029
Submited by:	Ruslan Mahmatkhanov <cvs-src@yandex.ru>
2011-07-09 23:51:44 +00:00
Chris Rees
c32d99baaf Use USERS
PR:		ports/157597
Submitted by:	crees (me)
Reviewed by:	rene (mentor, implicit), maintainer timeout (sem, 34 days)
2011-07-09 16:30:19 +00:00
Doug Barton
8ad17aaad7 Update to versions 9.8.0-P4, 9.7.3-P3, and 9.6-ESV-R4-P3.
ALL BIND USERS ENCOURAGED TO UPGRADE IMMEDIATELY

This update addresses the following vulnerabilities:

CVE-2011-2464
=============
Severity:	High
Exploitable:	Remotely

Description:

A defect in the affected BIND 9 versions allows an attacker to remotely
cause the "named" process to exit using a specially crafted packet. This
defect affects both recursive and authoritative servers. The code location
of the defect makes it impossible to protect BIND using ACLs configured
within named.conf or by disabling any features at compile-time or run-time.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464
https://www.isc.org/software/bind/advisories/cve-2011-2464

CVE-2011-2465
=============
Severity:	High
Exploitable:	Remotely

Description:

A defect in the affected versions of BIND could cause the "named" process
to exit when queried, if the server has recursion enabled and was
configured with an RPZ zone containing certain types of records.
Specifically, these are any DNAME record and certain kinds of CNAME
records.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2465
https://www.isc.org/software/bind/advisories/cve-2011-2465

Additional changes in this version:

* If named is configured to be both authoritative and resursive and
  receives a recursive query for a CNAME in a zone that it is
  authoritative for, if that CNAME also points to a zone the server
  is authoritative for, the recursive part of name will not follow
  the CNAME change and the response will not be a complete CNAME
  chain. [RT #24455]

  Thus the patch for this bug has been removed from the port

* Using Response Policy Zone (RPZ) to query a wildcard CNAME label
  with QUERY type SIG/RRSIG, it can cause named to crash. Fix is
  query type independant. [RT #24715] [CVE-2011-1907]
2011-07-05 21:19:20 +00:00
Doug Barton
f62fd077b1 Update to versions 9.7.3-P3, and 9.6-ESV-R4-P3.
ALL BIND USERS ARE ENCOURAGED TO UPGRADE IMMEDIATELY

This update addresses the following vulnerability:

CVE-2011-2464
=============
Severity:	High
Exploitable:	Remotely

Description:

A defect in the affected BIND 9 versions allows an attacker to remotely
cause the "named" process to exit using a specially crafted packet. This
defect affects both recursive and authoritative servers. The code location
of the defect makes it impossible to protect BIND using ACLs configured
within named.conf or by disabling any features at compile-time or run-time.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464
https://www.isc.org/software/bind/advisories/cve-2011-2464
2011-07-05 21:18:24 +00:00
Chris Rees
35d361ad63 - Use USERS and GROUPS
PR:		ports/157601
Approved by:	rene (mentor, implicit)
2011-07-04 19:05:05 +00:00
Chris Rees
501ee714ab - Use USERS and GROUPS
PR:		ports/157587
Submitted by:	Chris Rees <utisoft@gmail.com>
Approved by:	rene (mentor)
2011-07-03 15:12:31 +00:00
Sergey Matveychuk
7855dfcc04 - Update to 1.4.11 2011-07-01 14:46:19 +00:00
Matthias Andree
983a91c89d Fix clang build, using REINPLACE_CMD to change gcc to ${CC}.
Add missing #include <string.h> in dns.c (adds files/patch-dns.c)
Fix obvious format string error in html.c (adds files/patch-html.c)
2011-07-01 01:33:11 +00:00
Chris Rees
29fb0f538c - Use USERS and GROUPS
PR:		ports/157578
Submitted by:	Chris Rees (utisoft@gmail.com)
Approved by:	tabthorpe (co-mentor)
2011-06-27 17:54:21 +00:00
Sunpoet Po-Chuan Hsieh
6be06238e9 - Update to 0.111300
Changes:	http://search.cpan.org/dist/Net-Amazon-Route53/Changes
PR:		ports/158288
Submitted by:	Jin-Sih Lin <linpct@gmail.com>
Approved by:	Jui-Nan Lin <jnlin@csie.nctu.edu.tw> (maintainer)
2011-06-26 15:18:01 +00:00
Chris Rees
6bd66d92b3 - Deprecate; Unmaintained, distfile has changed with no explanation, uses pw directly
Expires in one month

PR:		ports/157603
Approved by:	rene (mentor)
2011-06-25 20:26:47 +00:00
Philip M. Gollucci
8d254b7c31 - Cannoicalize the WWW: [again],
- Save redirects s/http/https/ for github
2011-06-23 17:51:43 +00:00
Juergen Lock
f7ef738b39 Fix build with clang.
PR:		ports/158180
Submitted by:	Niclas Zeising <niclas.zeising@gmail.com>
2011-06-22 23:25:31 +00:00
Wesley Shields
c05bcd80f5 - Update to 20110502.
- Add LICENSE.

PR:		ports/157675
Submitted by:	Ryan Steinmetz <rpsfa@rit.edu>
Approved by:	maintainer timeout
2011-06-22 00:23:38 +00:00
Andrej Zverev
302b9a7c36 - Replace ../../authors in MASTER_SITE_SUBDIR with CPAN:CPANID macro.
See http://wiki.freebsd.org/Perl for details.
- Change maintainership from ports@ to perl@ for ports in this changeset.
- Remove MD5 checksum
- Utilize CPAN macro
2011-06-21 06:58:49 +00:00
Andrej Zverev
dec946ad51 - Replace ../../authors in MASTER_SITE_SUBDIR with CPAN:CPANID macro.
See http://wiki.freebsd.org/Perl for details.
- Change maintainership from ports@ to perl@ for ports in this changeset.
- Remove MD5 checksum
2011-06-20 08:37:15 +00:00
Steve Wills
63b9b4b7d9 Net::DNS is a pure Ruby DNS library, with a clean
OO interface and an extensible API

WWW: http://rubygems.org/gems/net-dns

PR:		ports/158012
Submitted by:	rpsfa at rit.edu
2011-06-19 16:29:21 +00:00
Emanuel Haupt
3bebff90a1 Update to 1.2.1 2011-06-17 18:54:56 +00:00
Baptiste Daroussin
85fcbc81d7 ftp master site no more available 2011-06-16 06:17:32 +00:00
Julien Laffaye
e93d85f4d6 Update my e-mail to my FreeBSD one.
While I am here, use GOOGLE_CODE instead of ${MASTER_SITE_GOOGLE_CODE}

Approved by:	bapt (mentor)
2011-06-08 16:52:32 +00:00
Steve Wills
9b6734d93d - Update to 1.01
- Add build depend to silence build warning

Changes:	http://search.cpan.org/dist/Net-Domain-ExpireDate/Changes
2011-06-05 01:37:41 +00:00
Frederic Culot
1abd16b102 Net::DNS::Check is a collection of OOP Perl modules allowing easy
implementation of applications for domain name checking.

WWW: http://search.cpan.org/dist/Net-DNS-Check/

PR:		ports/157445
Submitted by:	Ryan Steinmetz <rpsfa@rit.edu>
2011-06-01 08:53:22 +00:00
Wen Heping
88d610f023 - Update to 1.6.10
PR:		ports/157478
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2011-06-01 01:18:24 +00:00
Doug Barton
d88f9b8236 BIND 9.4.x is now EOL 2011-06-01 00:22:22 +00:00
Doug Barton
15406a2370 Fix PKGVERSION for 9.7.3-P1
Submitted by:	Craig Leres <leres@ee.lbl.gov>
2011-05-28 00:16:58 +00:00
Doug Barton
cc27c4205b Upgrade to 9.8.0-P2, which addresses the following issues:
1. Very large RRSIG RRsets included in a negative cache can trigger
an assertion failure that will crash named (BIND 9 DNS) due to an
off-by-one error in a buffer size check.

This bug affects all resolving name servers, whether DNSSEC validation
is enabled or not, on all BIND versions prior to today. There is a
possibility of malicious exploitation of this bug by remote users.

2. Named could fail to validate zones listed in a DLV that validated
insecure without using DLV and had DS records in the parent zone.

Add a patch provided by ru@ and confirmed by ISC to fix a crash at
shutdown time when a SIG(0) key is being used.

Add a patch from ISC that will be in 9.8.1 to handle intermittent
failure of recursive queries involving CNAMEs and previously cached
responses.
2011-05-27 23:47:56 +00:00
Doug Barton
55533b257f Upgrade to 9.6-ESV-R4-P1 and 9.7.3-P1, which address the following issues:
1. Very large RRSIG RRsets included in a negative cache can trigger
an assertion failure that will crash named (BIND 9 DNS) due to an
off-by-one error in a buffer size check.

This bug affects all resolving name servers, whether DNSSEC validation
is enabled or not, on all BIND versions prior to today. There is a
possibility of malicious exploitation of this bug by remote users.

2. Named could fail to validate zones listed in a DLV that validated
insecure without using DLV and had DS records in the parent zone.

Add a patch provided by ru@ and confirmed by ISC to fix a crash at
shutdown time when a SIG(0) key is being used.
2011-05-27 23:47:39 +00:00
Doug Barton
612e91cca5 Upgrade to 9.4-ESV-R4-P1, which addresses the following issues:
1. Very large RRSIG RRsets included in a negative cache can trigger
an assertion failure that will crash named (BIND 9 DNS) due to an
off-by-one error in a buffer size check.

This bug affects all resolving name servers, whether DNSSEC validation
is enabled or not, on all BIND versions prior to today. There is a
possibility of malicious exploitation of this bug by remote users.

2. Named could fail to validate zones listed in a DLV that validated
insecure without using DLV and had DS records in the parent zone.
2011-05-27 23:46:58 +00:00
Sergey Matveychuk
45c89956ba - Update to 1.4.10
* CVE-2011-1922 VU#531342 fixed
2011-05-25 09:30:38 +00:00
Sylvio Cesar Teixeira
d7b0faf648 - Add license 2011-05-20 19:49:23 +00:00
Doug Barton
31ae302eb6 Miscellaneous cleanups and fixes, some of the windowmaker stuff
gracefully provided by danfe.
2011-05-16 05:22:09 +00:00
Baptiste Daroussin
5c9c7a01ff adsuck is a DNS relay that returns NXdomain for hosts that match names in a
blacklist for quick and non browser plugin based ad blocking.

WWW: http://opensource.conformal.com/wiki/Adsuck

PR:		ports/156644
Submitted by:	Philippe Pepiot <phil@philpep.org>
2011-05-07 15:13:53 +00:00
Doug Barton
8d169919ad Upgrade to version 9.8.0-P1:
Certain response policy zone configurations could trigger an INSIST
when receiving a query of type RRSIG.

https://www.isc.org/CVE-2011-1907

This vulnerability is only possible if you have enable the new RPZ feature.
2011-05-06 21:13:52 +00:00
Wen Heping
702ffcd614 - Update to 1.1.0 2011-05-05 08:25:10 +00:00
Wen Heping
306ba47c93 - Update to 0.912
- Add LICENSE

PR:		ports/156804
Submitted by:	Jase Thew <freebsd@beardz.net> (maintainer)
2011-05-05 01:37:50 +00:00
Sunpoet Po-Chuan Hsieh
706a29abfe - Mark CONFLICTS between devel/py-boto-devel and dns/p5-Net-Amazon-Route53
- Bump PORTREVISION
2011-05-03 05:01:11 +00:00
Sunpoet Po-Chuan Hsieh
d322d675a6 - Add p5-Net-Amazon-Route53 0.110310
The Net::Amazon::Route53 Perl module allows you to manage DNS
records for your domains via Amazon's Route 53 service.

For more information, visit http://aws.amazon.com/route53/

WWW: http://search.cpan.org/dist/Net-Amazon-Route53/

PR:		ports/156611, ports/156661
Submitted by:	Jui-Nan Lin <jnlin@csie.nctu.edu.tw>
2011-04-26 18:33:10 +00:00
Emanuel Haupt
ee6849718b Update to 1.2.0 2011-04-16 20:44:14 +00:00
Emanuel Haupt
20ab4dcc97 Add an option for installing python bindings.
PR:		156419
Approved by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2011-04-16 20:36:06 +00:00
Bernhard Froehlich
48c298fafc - Add missing USERS/GROUPS for bind
- Improve ident for syslog messages to only show "maradns:" instead of "/usr/local/sbin/maradns:"
- Bump PORTREVISION

Submitted by:	n j <nino80@gmail.com>
2011-04-12 09:35:14 +00:00
Martin Wilke
7fce048818 - Update to 1.9.4
PR:		156069
Submitted by:	Ruslan Mahmatkhanov <cvs-src@yandex.ru>
Approved by:	maintainer
2011-04-12 03:48:21 +00:00
Baptiste Daroussin
f874e732f2 This is Net::Bonjour, a set of perl modules to utilize DNS for service
discovery. This method of service discovery is branded as Bonjour by
Apple Computer.

WWW:    http://search.cpan.org/dist/Net-Bonjour/
2011-04-05 16:21:01 +00:00
Rene Ladan
5fafbc0f8b Garbage collect expired ports
2011-04-01 accessibility/linux-f8-atk: End of Life since Jan 7, 2009
2011-04-01 archivers/linux-f8-ucl: End of Life since Jan 7, 2009
2011-04-01 archivers/linux-f8-upx: End of Life since Jan 7, 2009
2011-04-01 audio/linux-f8-alsa-lib: End of Life since Jan 7, 2009
2011-04-01 audio/linux-f8-arts: End of Life since Jan 7, 2009
2011-04-01 audio/linux-f8-esound: End of Life since Jan 7, 2009
2011-04-01 audio/linux-f8-freealut: End of Life since Jan 7, 2009
2011-04-01 audio/linux-f8-libaudiofile: End of Life since Jan 7, 2009
2011-04-01 audio/linux-f8-libogg: End of Life since Jan 7, 2009
2011-04-01 audio/linux-f8-libvorbis: End of Life since Jan 7, 2009
2011-04-01 audio/linux-f8-mikmod: End of Life since Jan 7, 2009
2011-04-01 audio/linux-f8-nas-libs: End of Life since Jan 7, 2009
2011-04-01 audio/linux-f8-openal: End of Life since Jan 7, 2009
2011-04-01 audio/linux-f8-sdl_mixer: End of Life since Jan 7, 2009
2011-04-01 databases/linux-f8-sqlite3: End of Life since Jan 7, 2009
2011-04-02 databases/postgresql81-server: EOL see http://wiki.postgresql.org/wiki/PostgreSQL_Release_Support_Policy
2011-04-02 databases/postgresql73-server: EOL see http://wiki.postgresql.org/wiki/PostgreSQL_Release_Support_Policy
2011-04-02 databases/postgresql74-server: EOL see http://wiki.postgresql.org/wiki/PostgreSQL_Release_Support_Policy
2011-04-02 databases/postgresql80-server: EOL see http://wiki.postgresql.org/wiki/PostgreSQL_Release_Support_Policy
2011-04-01 devel/linux-f8-libglade: End of Life since Jan 7, 2009
2011-04-01 devel/linux-f8-sdl12: End of Life since Jan 7, 2009
2011-04-01 devel/linux-f8-allegro: End of Life since Jan 7, 2009
2011-04-01 devel/linux-f8-libsigc++20: End of Life since Jan 7, 2009
2011-04-01 devel/linux-f8-libglade2: End of Life since Jan 7, 2009
2011-04-01 devel/linux-f8-nspr: End of Life since Jan 7, 2009
2011-04-01 dns/linux-f8-libidn: End of Life since Jan 7, 2009
2011-04-01 emulators/linux_base-f8: End of Life since Jan 7, 2009
2011-04-01 emulators/linux_base-f9: End of Life since Jul 10, 2009
2011-04-01 emulators/linux_base-fc6: End of Life since December 7, 2007
2011-04-01 emulators/linux_base-f7: End of Life since June 13, 2008
2011-04-01 ftp/linux-f8-curl: End of Life since Jan 7, 2009
2011-04-01 graphics/linux-f8-sdl_image: End of Life since Jan 7, 2009
2011-04-01 graphics/linux-f8-ungif: End of Life since Jan 7, 2009
2011-04-01 graphics/linux-f8-imlib: End of Life since Jan 7, 2009
2011-04-01 graphics/linux-f8-cairo: End of Life since Jan 7, 2009
2011-04-01 graphics/linux-f8-dri: End of Life since Jan 7, 2009
2011-04-01 graphics/linux-f8-gdk-pixbuf: End of Life since Jan 7, 2009
2011-04-01 graphics/linux-f8-jpeg: End of Life since Jan 7, 2009
2011-04-01 graphics/linux-f8-png: End of Life since Jan 7, 2009
2011-04-01 graphics/linux-f8-libGLU: End of Life since Jan 7, 2009
2011-04-01 graphics/linux-f8-libmng: End of Life since Jan 7, 2009
2011-04-01 graphics/linux-f8-png10: End of Life since Jan 7, 2009
2011-04-01 graphics/linux-f8-tiff: End of Life since Jan 7, 2009
2011-04-01 lang/linux-f8-libg2c: End of Life since Jan 7, 2009
2011-04-01 lang/linux-f8-tcl84: End of Life since Jan 7, 2009
2011-04-01 multimedia/linux-f8-libtheora: End of Life since Jan 7, 2009
2011-04-02 net-p2p/dcd: No fetch sources and looks like project abandoned
2011-03-31 net/straw: abandoned upstream and does not work with python 2.6+
2011-04-01 security/linux-f8-libssh2: End of Life since Jan 7, 2009
2011-04-01 security/linux-f8-nss: End of Life since Jan 7, 2009
2011-04-01 security/linux-f8-openssl: End of Life since Jan 7, 2009
2011-04-01 textproc/linux-f8-libxml2: End of Life since Jan 7, 2009
2011-04-01 textproc/linux-f8-scim-gtk: End of Life since Jan 7, 2009
2011-04-01 textproc/linux-f8-scim-libs: End of Life since Jan 7, 2009
2011-04-01 textproc/linux-f8-expat: End of Life since Jan 7, 2009
2011-04-01 textproc/linux-f8-libxml: End of Life since Jan 7, 2009
2011-04-01 textproc/linux-f8-aspell: End of Life since Jan 7, 2009
2011-04-01 www/linux-f8-flashplugin10: End of Life since Jan 7, 2009
2011-03-30 www/mediawiki112: abandoned upstream
2011-03-30 www/mediawiki113: abandoned upstream
2011-03-30 www/mediawiki114: abandoned upstream
2011-03-30 www/mediawiki16: abandoned upstream
2011-04-01 x11-fonts/linux-f8-fontconfig: End of Life since Jan 7, 2009
2011-03-01 x11-themes/gnome-icons-cool-gorilla: "no mastersite"
2011-04-01 x11-themes/linux-f8-hicolor-icon-theme: End of Life since Jan 7, 2009
2011-04-01 x11-toolkits/linux-f8-gtk: End of Life since Jan 7, 2009
2011-04-01 x11-toolkits/linux-f8-gtk2: End of Life since Jan 7, 2009
2011-04-01 x11-toolkits/linux-f8-openmotif: End of Life since Jan 7, 2009
2011-04-01 x11-toolkits/linux-f8-pango: End of Life since Jan 7, 2009
2011-04-01 x11-toolkits/linux-f8-qt33: End of Life since Jan 7, 2009
2011-04-01 x11-toolkits/linux-f8-tk84: End of Life since Jan 7, 2009
2011-04-01 x11/linux-f8-xorg-libs: End of Life since Jan 7, 2009
2011-04-04 17:12:43 +00:00
Olli Hauer
7e8a592d40 - change maintainers mail address
Appoved by maintainer via mail
2011-03-30 16:13:42 +00:00
Olli Hauer
b12306e4bc - update to version 3.2.8
Bugfixes:
    Do setusercontext before chroot, otherwise login.conf etc. are required inside chroot.
    Bugfix #216: Fix leak of compressiontable when the domain table increases in size.
    Bugfix #348: Don't include header/library path if OpenSSL is in /usr.
    Bugfix #350: Refused notifies should log client ip.
    Bugfix #352: Fix hard coded paths in man pages.
    Bugfix #354: The realclean target deletes a bit too much.
    Bugfix #357, make xfrd quit with many zones.
    Bugfix #362: outgoing-interface and v4 vs. v6 leads to spurious warning messages.
    Bugfix #363: nsd-checkconf -v does not print outgoing-interface ok.
    Bugfix: nsd-checkconf -o outgoing-interface omits NOKEY.
    Undo Bugfix #235: Don't skip dname compression, messes up packets that do need compression.

PR:		ports/155785
Submitted by:	Jaap Akkerhuis <jaap _at_ nlnetlabs.nl> (maintainer)
2011-03-30 13:48:13 +00:00
Emanuel Haupt
dcab57a368 - Pass -Dbsd_with_getifaddrs to CFLAGS in order to get a correct network
interface list [1]

PR:		155974 [1]
Submitted by:	David Naylor <naylor.b.david@gmail.com> [1]
2011-03-28 16:54:46 +00:00
Pav Lucistnik
27246fe086 - Mark BROKEN on 9.X: does not configure
Reported by:	pointyhat
2011-03-25 20:16:51 +00:00
Baptiste Daroussin
929a575d88 - update to 1.15 2011-03-25 14:52:16 +00:00
Dennis Herrmann
4087c700d7 - Update to 1.2.1
PR:		ports/155889
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2011-03-24 16:33:57 +00:00
Sergey Matveychuk
b819ba41df - Update to 1.4.9 2011-03-24 13:24:05 +00:00
Martin Matuska
e3a244403e - Add LICENSE knob(s) 2011-03-23 15:53:22 +00:00
Edwin Groothuis
782cbcdf8e Remove some leftover files from a long time ago. 2011-03-22 21:24:35 +00:00
Edwin Groothuis
a8cd94066b Update to version 134
Submitted by:	"Wessels, Duane" <dwessels@verisign.com>
2011-03-22 21:23:03 +00:00
Martin Matuska
50bd9f1ba9 Fix distinfo
Reported by:	pointyhat (pav)
2011-03-22 19:44:59 +00:00
Martin Matuska
048b386764 - Update to 0.1 [1]
- Add LICENSE information (GPLv2)

PR:		ports/155191 [1]
Submitted by:	Ruslan Mahmatkhanov <cvs-src@yandex.ru> [1]
2011-03-22 08:10:06 +00:00
Martin Wilke
bb86cbe5d2 - Get Rid MD5 support 2011-03-20 12:54:45 +00:00
Cheng-Lung Sung
07134517ba - Update to 1.52 2011-03-20 08:25:25 +00:00
Alex Dupre
1bda2b2725 Bump PORTREVISION for ports linking to default libmysqlclient. 2011-03-19 13:15:34 +00:00
Sofian Brabez
d7c5457ddf Update my MAINTAINER address to sbz at FreeBSD.org.
Approved by:	jadawin@ (mentor)
2011-03-18 10:04:54 +00:00
Martin Wilke
9299f26d36 - Update to 0.06
PR:		155630
Submitted by:	maintainer
2011-03-18 03:26:06 +00:00
Wen Heping
d26cbeafa9 - Update to 1.6.9
PR:		ports/155613
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2011-03-17 09:30:22 +00:00
Baptiste Daroussin
b8253c4f7c update MASTER_SITES
while here remove md5
2011-03-16 07:33:39 +00:00
Wen Heping
7c72e3d968 - Update to 2.1.1 2011-03-14 10:54:52 +00:00
Wen Heping
43721c23d5 - Bump PORTREVISION to chase the update of dns/libidn 2011-03-14 08:40:06 +00:00
Wen Heping
a2c526c1ca - Update to 1.19
PR:		ports/153499
Submitted by:	Hung-Yi Chen <gaod@hychen.org> (maintainer)
2011-03-14 08:37:55 +00:00
Max Brazhnikov
d725cb21aa - fix with non-standard PREFIX/LOCALBASE
- fix error with undefined variables on some services. This is upstream ticket #2:
  http://sourceforge.net/apps/trac/ddclient/ticket/2

PR:		ports/155486
Submitted by:	Rob Farmer (maintainer)
2011-03-13 14:53:21 +00:00
Wen Heping
01be2d21a4 - Pass maintainership to new volunteer
Submitted by:	rfarmer@predatorlabs.net (new maintainer, via email)
2011-03-10 01:20:38 +00:00
Wen Heping
8d7dad5cd2 - Reset maintainer [1]
- Drop MD5

PR:		ports/155424 [1]
Submitted by:	Radek Kozlowski <radek@raadradd.com> (previous maintainer) [1]
2011-03-10 00:10:24 +00:00
Martin Wilke
da17574d77 - Add missing files
PR:		155351
2011-03-08 07:15:39 +00:00
Martin Wilke
8b8ffc6b8b CurveDNS is a forwarding nameserver adding DNSCurve to DNS,
and it's the first publicly released forwarding implementation
that implements the DNSCurve protocol.

WWW:    http://curvedns.on2it.net/

PR:		ports/153881
Submitted by:	Leo Vandewoestijne <freebsd at dns-lab.com>
2011-03-04 13:45:40 +00:00
Doug Barton
16710e3397 This is 9.8.0, the first release version in the 9.8 series.
New features versus previous release candidates include:

* There is a new option in dig, +onesoa, that allows the final SOA
  record in an AXFR response to be suppressed. [RT #20929
* There is additional information displayed in the recursing log
  (qtype, qclass, qid and whether we are following the original
  name). [RT #22043]
* Added option 'resolver-query-timeout' in named.conf (max query
  timeout in seconds) to set a different value than the default (30
  seconds). A value of 0 means 'use the compiled in default';
  anything longer than 30 will be silently set to 30. [RT #22852]
* For Mac OS X, you can now have the test interfaces used during
  "make test" stay beyond reboot. See bin/tests/system/README for
  details.

There are also numerous bug fixes and enhancements. See
http://ftp.isc.org/isc/bind9/9.8.0/RELEASE-NOTES-BIND-9.8.html
for more information.
2011-03-02 00:27:33 +00:00
Alexander Leidinger
252e481b40 Deprecate all non-default Fedora based linux_base respectively linux-fx-*
ports. All of them are End of Life (no security updates) since a loooong time.

As they are not the default, I decided to go with a short expiration date (one
month). The maintainer of the few ports which depend upon the f8 infrastructure
is informed to take action (update to the default f10 infrastructure, or to
deprecate).
2011-02-28 14:07:23 +00:00
Sergey Skvortsov
e961e5e2d2 Add p5-POE-Component-Resolver 0.911, a non-blocking getaddrinfo()
resolver.
2011-02-26 16:32:49 +00:00
Martin Wilke
751051df9d - Update to 1.0.7 2011-02-26 06:45:29 +00:00
Xin LI
03b42818c9 Chase after net/openldap24-server update.
Reminded by:	miwi
2011-02-25 01:32:17 +00:00
Martin Wilke
021fc3a529 - Move over to py25+ or above
- While here kick md5 support
2011-02-25 00:12:12 +00:00
Matthias Andree
a4a731547c Update dnsmasq rc.d script again (sorry for the churn with portrev. 1)
- Start before named, to unbreak named_wait if /etc/resolv.conf points
  to dnsmasq (when named is the resolver that dnsmasq forwards to).
  Is also more robust/maintenance friendly if other scripts depend on "named".

- Track if the configuration has changed since start, and upgrade reload
  to restart by default in that case (can be disabled with
  dnsmasq_restart="NO" in /etc/rc.conf[.local]), to work around dnsmasq
  shortcoming

- Add a "logstats" action to the rcscript, and document it.

- Document the "reload" action and the new dnsmasq_restart variable.

- Properly quote variable expansions.

- Enhance pkg-message to point to the rcfile for feature documentation.

- Bump PORTREVISION to 2.
2011-02-22 19:20:17 +00:00
Matthias Andree
85662e5623 Change rc.d file to ensure proper startup order:
- depend on named, in case dnsmasq uses named as resolver
- start before ntpdate and rpcbase (which require named).

Bump PORTREVISION.
2011-02-22 17:19:28 +00:00
Matthias Andree
fbd2a84e40 Upgrade to new upstream release 2.57.
Remove support for FreeBSD releases 6.X.

Allow build with IDN but without NLS (this requires that dns/libidn
is also built WITHOUT_NLS) to expose an upstream change. Useful for embedded
devices.

Warn user if this is requested but libidn needs NLS libraries
because in that case dnsmasq inherits the NLS dependencies from libidn.

Remove files/patch-aa, it was a preview patch from a 2.57 test release,
fixing a regression in 2.56 that caused hex constants to be rejected in
the configuratino if they contained the '*' wildcard.

Further upstream changes:
- use own header for DNS protocol, rather than using arpa/nameser.h
- correct ctype.h function argument casts (isdigit(), isxdigit(), etc.)
- Accept extra empty arguments on command line to avoid libvirt breakage.
2011-02-21 08:50:57 +00:00
Martin Wilke
7afe451d00 - Update to 1.9.2
PR:		154535
Submitted by:	Ruslan Mahmatkhanov <cvs-src@yandex.ru>
Approved by:	maintainer
2011-02-19 12:47:37 +00:00
Matthias Andree
ca7718476b Expand NLS/IDN comment. 2011-02-16 15:57:59 +00:00
Matthias Andree
a2173530ac Update pkg-descr and add author attribution since it's a full quote. 2011-02-16 15:56:30 +00:00
Matthias Andree
26036ca0dd Fix regression in config parser.
http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2011q1/004750.html
2011-02-16 14:34:14 +00:00
Matthias Andree
94102e1a09 Update to new upstream release 2.56.
Replace uni-paderborn.de master site by MASTER_SITE_LOCAL.
Add LICENSE=GPLv2.
Changelog:
http://www.thekelleys.org.uk/dnsmasq/CHANGELOG
2011-02-15 21:49:06 +00:00
Doug Barton
aeedf88383 Update to 9.8.0rc1, the latest from ISC:
* The ADB hash table stores informations about which authoritative
   servers to query about particular domains. Previous versions of
   BIND had the hash table size as a fixed value. On a busy recursive
   server, this could lead to hash table collisions in the ADB cache,
   resulting in degraded response time to queries. Bind 9.8 now has a
   dynamically scalable ADB hash table, which helps a busy server to
   avoid hash table collisions and maintain a consistent query
   response time.
2011-02-15 01:50:19 +00:00
Doug Barton
29ea282225 Update to 9.7.3, the latest from ISC:
* Zones may be dynamically added and removed with the "rndc addzone"
   and "rndc delzone" commands. These dynamically added zones are
   written to a per-view configuration file. Do not rely on the
   configuration file name nor contents as this will change in a
   future release. This is an experimental feature at this time.
 * A new command "rndc secroots" was added to dump a combined summary
   of the currently managed keys combined with statically configured
   trust anchors.
 * Added support to load new keys into managed zones without signing
   immediately with "rndc loadkeys". Added support to link keys with
   "dnssec-keygen -S" and "dnssec-settime -S".
2011-02-15 01:47:13 +00:00
Wen Heping
07ac2a9d7e - Update to 1.0.1 2011-02-13 07:25:27 +00:00
Doug Barton
a41122cd17 Update to BIND 9.6.3, the latest from ISC on the 9.6 branch.
All 9.6 users with DNSSEC validation enabled should upgrade to this
version, or the latest version in the 9.7 branch, prior to 2011-03-31 in
order to avoid validation failures for names in .COM as described here:

https://www.isc.org/announcement/bind-9-dnssec-validation-fails-new-ds-record

In addition the fixes for this and other bugs, there are also the following:

* Various fixes to kerberos support, including GSS-TSIG
* Various fixes to avoid leaking memory, and to problems that could prevent
  a clean shutdown of named

Feature safe:	yes
2011-02-05 02:47:18 +00:00
Bernhard Froehlich
af69377779 - Update to 1.4.06
- Remove MD5 checksum

Submitted by:	n j <nino80 at gmail dot com>
Security:	8015600f-2c80-11e0-9cc1-00163e5bf4f9
Feature safe:	yes
2011-01-31 09:49:07 +00:00
Rene Ladan
d543942f15 Remove expired ports:
2011-01-24 dns/staticcharge: abandoned by author
2011-01-21 shells/bash3-static: Use shells/bash or shells/bash-static instead

shells/bash3 is still used by devel/quilt

Feature safe:	yes
2011-01-29 23:28:35 +00:00
Pav Lucistnik
eff4f6213a - Update to 1.6.8
PR:		ports/154269
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Feature safe:	yes
2011-01-26 11:38:30 +00:00
Pav Lucistnik
99c5cae31f - Update to 3.2.7
PR:		ports/154264
Submitted by:	Jaap Akkerhuis <jaap@nlnetlabs.nl> (maintainer)
Feature safe:	yes
2011-01-26 11:32:51 +00:00
Pav Lucistnik
793ea827ee - Update to 1.6.8
PR:		ports/154268
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Feature safe:	yes
2011-01-26 11:28:03 +00:00
Emanuel Haupt
ce1197e105 Add LICENSE and remove MD5 sums.
Feature safe:	yes
2011-01-25 19:59:40 +00:00
Sergey Matveychuk
4ff51aa3a5 - Update to 1.4.8
Feature safe:	yes
2011-01-24 16:19:05 +00:00
Doug Barton
7745231f02 Update to 9.8.0b1, which in addition to DNS64 support also has
the following new features:

* BIND now supports a new zone type, static-stub. This allows the
administrator of a recursive nameserver to force queries for a
particular zone to go to IP addresses of the administrator's choosing,
on a per zone basis, both globally or per view.

* BIND now supports Response Policy Zones, a way of expressing
"reputation" in real time via specially constructed DNS zones. See the
draft specification here:
http://ftp.isc.org/isc/dnsrpz/isc-tn-2010-1.txt

* Dynamically Loadable Zones (DLZ) now support dynamic updates.
Contributed by Andrew Tridgell of the Samba Project.

* Added a "dlopen" DLZ driver, allowing the creation of external DLZ
drivers that can be loaded as shared objects at runtime rather than
having to be linked with named at compile time. Currently this is
switched on via a compile-time option, "configure --with-dlz-dlopen".
Note: the syntax for configuring DLZ zones is likely to be refined in
future releases. Contributed by Andrew Tridgell of the Samba Project.

* numerous GSS-TSIG improvements

* There is a new update-policy match type "external". This allows
named to decide whether to allow a dynamic update by checking with an
external daemon. Contributed by Andrew Tridgell of the Samba Project.

* many other improvements

Feature safe:	yes
2011-01-22 07:43:53 +00:00
Pav Lucistnik
0d50c5a540 - Update to 1.2.0
PR:		ports/154026
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Feature safe:	yes
2011-01-19 10:49:08 +00:00
Tilman Keskinoz
b547cbbd42 Mark DEPRECATED and set an EXPIRATION_DATE
PR:		153737
Submitted by:	Mahlon E. Smith
2011-01-10 14:41:38 +00:00
Anton Berezin
54ab34e457 Update to 0.10.
Changes:	http://search.cpan.org/dist/Data-Validate-Domain/Changes
2011-01-10 12:06:34 +00:00
Frederic Culot
7fe960c640 - Update to 20110107
Changes:	http://dns.measurement-factory.com/tools/dnstop/src/CHANGES
PR:		ports/153806
Submitted by:	Mark Foster <mark AT foster.cc> (maintainer)
Approved by:	sahil@/wen@ (mentors, implicit)
2011-01-09 09:53:09 +00:00
Doug Barton
ff4a30f27b The actual EOL date is 2011-05-31, as clarified in
https://lists.isc.org/pipermail/bind-users/2011-January/082285.html
2011-01-08 02:31:09 +00:00
Doug Barton
cdac3d6e78 Remove dns/bind95 which entered EOL 2010-09 2011-01-01 00:38:44 +00:00
Rene Ladan
b7d7206e33 Garbage-collect expired ports:
2010-12-30 databases/p5-sqlrelay: broken and upstream disapeared
2010-12-30 devel/php-dbg2: No upstream support
2010-12-30 dns/fourcdns: upstream has disapeared
2010-12-31 emulators/win4bsd: Development has ceased and distfile is no longer available
2010-12-31 french/mozilla-flp: www/seamonkey port is deprecated. Consider using the www/firefox-i18n.
2010-12-31 french/xtel: Minitel services will be discontinued at the end of 2010.
2010-12-30 ftp/ftpq: upstream has disapeared
2010-12-30 graphics/paintlib: does not compile with new tiff and no more maintained upstream
2010-12-30 graphics/g3dviewer: does not build with gcc 4.2, upstream disapeared
2010-12-30 lang/scriba: Does not compile with gcc 4.2+, looks like abandonware
2010-12-30 math/rascal: Broken on every arch since 2008, looks like an abandonware
2010-12-31 net-mgmt/nrg: Project has vanished. Use cacti instead.
2010-12-31 security/hostsentry: Project is dead.
2010-12-31 sysutils/kcube: Project has vanished
2010-12-31 www/cybercalendar: has been unmaintained since 2001 and is unusable with dates after 2010 (see ports/150974)
2010-12-31 www/flock: Flock 3 moves from Firefox to Chromium
2010-12-31 www/linux-flock: Flock 3 moves from Firefox to Chromium
2010-12-30 x11-clocks/xtu: Looks like abandonware

Leave java/tya in for now, as it has outstanding PRs.
2010-12-31 17:35:17 +00:00
Philip M. Gollucci
116ec22ac1 - DISTNAME= ${PORTNAME}-${PORTVERSION} is the default and not needed.
PR:             ports/153292
Submitted by:   myself (pgollucci)
Tested by:      -exp run by pav
Approved by:    portmgr (pav)
2010-12-29 20:04:42 +00:00
Mark Linimon
5a8cd00aad Over to submitter of last update. 2010-12-28 10:07:46 +00:00
Mark Linimon
1e7fac30a4 Reset krion@FreeBSD.org due to 6 months of inactivity and maintainer-
timeouts.

Hat:		portmgr
2010-12-28 08:11:16 +00:00
Frederic Culot
c77d940d19 - Update to 1.2.8.31
PR:		ports/153446
Submitted by:	Hung-Yi Chen <gaod at hychen.org> (maintainer)
Approved by:	sahil@/wen@ (mentors, implicit)
2010-12-26 09:16:43 +00:00
Ade Lovett
843f8123d4 Sync to final (for now) bsd.autotools.mk 2010-12-22 20:05:49 +00:00
Olli Hauer
4658ba19c4 - change maintainer to submitter (NLnetNLabs)
- patch includes fix for PR ports/153165
   port dns/ldns fails to build with config (EXAMPLES=on and GOST=off)
 - bump PORTREVISION

PR:		ports/153228 ports/153165
Submitted by:	Jaap Akkerhuis <jaap _at_ NLnetLabs.nl> (new maintainer)
Approved by:	Konstantin Saurbier <konstantin _at_ saurbier.net> (old maintainer)
2010-12-20 21:41:30 +00:00
Peter Pentchev
f97736f66f Update to c-ares-1.7.4 and fix a bashism in the configure script. 2010-12-19 19:10:48 +00:00
Doug Barton
56edb49edb We need _all_ the fixes from ../bind97 2010-12-18 09:50:45 +00:00
Doug Barton
e8e662732e We need the fixes from bind97 for the perl problem here, not bind96 2010-12-18 08:58:26 +00:00
Doug Barton
4e6ba6d16c CONFLICTS for bind98 2010-12-18 02:19:41 +00:00
Doug Barton
31a9b93c1f Continue BIND cleanup:
DEPRECATED=             Past EOL
EXPIRATION_DATE=        2011-01-01

While I'm here, update CONFLICTS for bind98.
2010-12-18 01:34:07 +00:00
Doug Barton
7cf061ee36 Give people fair warning:
DEPRECATED=		Reaches EOL May 2011
EXPIRATION_DATE=	2011-04-30

While I'm here update CONFLICTS for bind98
2010-12-18 01:29:34 +00:00
Doug Barton
1520b8d691 Add a -devel port for 9.8.0a1, which will allow people to experiment
with DNS64. Once 9.8.0 is released officially the -devel tag will be
removed.

BIND version 9 is a major rewrite of nearly all aspects of the underlying BIND
architecture.  Some of the important features of BIND 9 are:

DNS Security: DNSSEC (signed zones), TSIG (signed DNS requests)
IP version 6: Answers DNS queries on IPv6 sockets, IPv6 resource records (AAAA)
     Experimental IPv6 Resolver Library
DNS Protocol Enhancements: IXFR, DDNS, Notify, EDNS0
     Improved standards conformance
Views: One server process can provide multiple "views" of the DNS namespace,
     e.g. an "inside" view to certain clients, and an "outside" view to others.
Multiprocessor Support

BIND 9.8 includes a number of changes from BIND 9.7 and earlier releases,
including:
	Preliminary DNS64 support (AAAA synthesis only initially)

See the CHANGES file for more information on features.

WWW: https://www.isc.org/software/bind
2010-12-17 22:48:55 +00:00
Frederic Culot
c9ea580c38 - Update to 1.6.7
PR:		ports/153192
Submitted by:	Jaap Akkerhuis <jaap at NLnetLabs.nl>
Approved by:	sahil@/wen@ (mentors, implicit)
2010-12-16 18:51:07 +00:00
Philip M. Gollucci
f4bf3d23a3 - Pass to perl@ 2010-12-12 21:34:18 +00:00
Philip M. Gollucci
b160335ca1 - @comment cleanup in p5-* pkg-plist 2010-12-12 03:52:24 +00:00
Nicola Vitale
924fe8b26c - Add databases/sqlite3 to BUILD_DEPENDS (minimal version required 3.4.2)
- Bump PORTREVISION
- Remove MD5 checksum from distinfo

PR:		ports/152542
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2010-12-11 22:48:20 +00:00
Beech Rintoul
a089336030 Update to 1.6.7
PR:		ports/152578
Submitted by:	Jaap Akkerhuis (jaap@NLnetLabs.nl)
Approved by:	Konstantin Saurbier (konstantin@saurbier.net) (maintainer)
		itetcu (mentor) (implicit)
2010-12-10 22:27:57 +00:00
Mark Linimon
0b69b1da88 With portmgr hat, reassign some ports from clsung to perl, since clsung
is apparently having some trouble with email.
2010-12-07 19:35:25 +00:00
Ade Lovett
4a8684e352 Sync to new bsd.autotools.mk 2010-12-04 07:34:27 +00:00
Doug Barton
ee030af2cc Update to version 9.4-ESV-R4, the latest from ISC, which addresses
the following security vulnerability.

For more information regarding these issues please see:
http://www.isc.org/announcement/guidance-regarding-dec-1st-2010-security-advisories

Key algorithm rollover

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3614

Affects resolver operators who are validating with DNSSEC,
and querying zones which are in a key rollover period.
The bug will cause answers to incorrectly be marked as insecure.

For the port:
1. Add CONFLICT for the ../bind-tools port
2. Remove CONFLICT for the removed ../bind9 port
3. Remove OPTION for threads on < RELENG_7
4. Remove MD5 from distinfo
5. Switch to pkg-install to create the symlinks to /etc/namedb/ as
   requested in [1]

PR:		ports/151635 [1]
Submitted by:	Benjamin Lee <ben@b1c1l1.com> [1]
2010-12-03 23:57:16 +00:00
Doug Barton
73ce7e99bb Update to version 9.6-ESV-R3, the latest from ISC, which addresses
the following security vulnerabilities.

For more information regarding these issues please see:
http://www.isc.org/announcement/guidance-regarding-dec-1st-2010-security-advisories

1. Cache incorrectly allows ncache and rrsig for the same type

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3613

   Affects resolver operators whose servers are open to potential
   attackers. Triggering the bug will cause the server to crash.

   This bug applies even if you do not have DNSSEC enabled.

2. Using "allow-query" in the "options" or "view" statements to
   restrict access to authoritative zones has no effect.

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3615

   Affects authoritative server operators who wish to generally
   restrict queries to their authoritative zones, and are running
   9.6.2-P2 or any version of 9.7.x. The bug will allow unauthorized
   end users to receive answers to queries they should not.

For the port:
1. Add CONFLICT for the ../bind-tools port
2. Remove CONFLICT for the removed ../bind9 port
3. Remove OPTION for threads on < RELENG_7
4. Switch to pkg-install to create the symlinks to /etc/namedb/ as
   requested in [1]

PR:		ports/151635 [1]
Submitted by:	Benjamin Lee <ben@b1c1l1.com> [1]
2010-12-03 23:21:31 +00:00
Doug Barton
0030fdbc6f Actually remove the MD5, oops 2010-12-03 23:02:42 +00:00
Doug Barton
2a271253ff For the port:
1. Add CONFLICT for the ../bind-tools port
2. Remove CONFLICT for the removed ../bind9 port
3. Remove OPTION for threads on < RELENG_7
4. Remove MD5 from distinfo
5. Switch to pkg-install to create the symlinks to /etc/namedb/ as
   requested in [1]

PR:		ports/151635 [1]
Submitted by:	Benjamin Lee <ben@b1c1l1.com> [1]
2010-12-03 23:01:37 +00:00
Doug Barton
8a993c4fbb Update to version 9.7.2-P3, the latest from ISC, which addresses
the following security vulnerabilities.

For more information regarding these issues please see:
http://www.isc.org/announcement/guidance-regarding-dec-1st-2010-security-advisories

1. Cache incorrectly allows ncache and rrsig for the same type

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3613

   Affects resolver operators whose servers are open to potential
   attackers. Triggering the bug will cause the server to crash.

   This bug applies even if you do not have DNSSEC enabled.

2. Using "allow-query" in the "options" or "view" statements to
   restrict access to authoritative zones has no effect.

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3615

   Affects authoritative server operators who wish to generally
   restrict queries to their authoritative zones, and are running
   9.6.2-P2 or any version of 9.7.x. The bug will allow unauthorized
   end users to receive answers to queries they should not.

3. Key algorithm rollover

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3614

   Affects resolver operators who have 9.7.2-P2 installed,
   are validating with DNSSEC, and querying zones which are
   in a key rollover period. The bug will cause answers to
   incorrectly be marked as insecure.

For the port:
1. Add CONFLICT for the ../bind-tools port
2. Switch to pkg-install to create the symlinks to /etc/namedb/ as
   requested in [1]

PR:		ports/151635 [1]
Submitted by:	Benjamin Lee <ben@b1c1l1.com> [1]
2010-12-03 22:39:44 +00:00
Doug Barton
eba4de052c This is now a proper slave port to the latest version, atm ../bind97 2010-12-03 19:40:17 +00:00
Doug Barton
3fef21d400 Convert this to a master port for ../bind-tools
Remove CONFLICTS for the now-removed BIND 9.3

Remove OPTION for threads on < RELENG_7

Remove MD5 from distinfo
2010-12-03 19:39:48 +00:00
Doug Barton
2b4bcb4479 Fix build by referring to the most recent version of BIND, instead
of the long-EOL and now-removed one. :)
2010-12-01 01:14:03 +00:00
Doug Barton
6d28a277f8 As previously advertised, remove BIND 9.3.x coincident with the
EOL of RELENG_6.
2010-12-01 00:48:10 +00:00
Sunpoet Po-Chuan Hsieh
86130d5d53 - Update MASTER_SITES, MAINTAINER and WWW
References:
- ports/150525
- http://www.robtex.com/dns/netleader.com.au.html
- http://www.robtex.com/dns/downtools.com.au.html

PR:		ports/152392
Submitted by:	Jarrod Sayers <jarrod@downtools.com.au>
Approved by:	Jarrod Sayers <jarrod@netleader.com.au> (maintainer)
2010-11-27 14:12:19 +00:00
Philip M. Gollucci
db062f2e4d This module provides a replacement function for Socket::inet_aton,
with support for timeouts.

WWW:	http://search.cpan.org/dist/Net-DNS-Lite/

PR:		ports/152591
Submitted by:	Gea-Suan Lin <gslin at gslin.org>
2010-11-26 21:16:38 +00:00
Philip M. Gollucci
543d6dc189 - Update to 1.00
PR:             ports/152138
Submitted by:   Gea-Suan Lin <gslin@gslin.org>
Approved by:    maintainer timeout (clsung ; 15 days)
Changes:        http://search.cpan.org/dist/Net-Domain-ExpireDate/Changes
2010-11-26 21:13:48 +00:00
Baptiste Daroussin
02e52a4d95 - fix status command in rc file
- while here remove MD5 entry
bump port revision

PR:		ports/152565
Submitted by:	eli <elij.mx _at_ gmail.com>
Approved by:	Jaap Akkerhuis <jaap _at_ nlnetlabs.nl>
2010-11-25 16:04:00 +00:00
Baptiste Daroussin
ada37ff89a improvements on rc script:
- support reload command
 - use nsdc cli has command and let it perform the actual start,stop,... of the daemon
 - at start check if the database exists if not built it (this prevent the daemon to fail at starting)
 - remove the now userless sleep in stop command

bump portrevision

PR:             ports/152331
Submitted by:   Philippe Pepiot <phil _at_ philpep.org>
Approved by:    Jaap Akkerhuis <jaap _at_ NLnetLabs.nl> (maintainer)
2010-11-24 15:44:15 +00:00
Philip M. Gollucci
d704e535d6 - Update to 1.51
With Hat:       ruby@
Sponsored by:   RideCharge Inc. / TaxiMagic
2010-11-16 06:55:26 +00:00
Sergey Matveychuk
a16e8de40f - Update to 1.4.7
* It uses GOST by default and depends on port's openssl 1.0.0
    (may be turned off by an option).
2010-11-09 14:09:52 +00:00
Emanuel Haupt
eaaa56efb5 Update WWW 2010-11-01 08:13:38 +00:00
Doug Barton
e07a8dc09a Update to 9.6-ESV-R2, the latest from ISC.
This version contains bug fixes that are relevant to any
caching/resolving name server; as well as DNSSEC-related
fixes.
2010-10-30 20:34:04 +00:00
Baptiste Daroussin
f0a4495d8c Mark as deprecated and set expiration date to 2010-12-30 for unmaintained
ports (ports@) that are broken and which seems abandonned upstream and
are broken for long or only build on 6.x which will be unsupported at that
time
2010-10-29 22:24:57 +00:00
Emanuel Haupt
8a417239e1 Update to 1.1.6 2010-10-28 16:35:47 +00:00
Wen Heping
8c7c7753ee - Update to 0.1.0
PR:		ports/151787
Submitted by:	Chris St Denis <chris@ctgameinfo.com> (maintainer)
2010-10-28 06:15:13 +00:00
Wen Heping
8a130b4765 pear-Net_DNS2 provides (roughly) the same functionality as Net_DNS, but
using PHP5 objects, exceptions for error handling, better sockets support.

This release is (in most cases) 2x - 10x faster than Net_DNS, as well as
includes more RR's (including DNSSEC RR's), and improved sockets and streams
support.

WWW: http://pear.php.net/package/Net_DNS2/
2010-10-27 01:26:24 +00:00
Doug Barton
2b4908b3d0 Update to 9.4-ESV-R3, the latest from ISC. 2010-10-19 00:12:11 +00:00
Doug Barton
3a31fdeb00 Update to 9.7.2-P2, the latest version from ISC 2010-10-18 21:06:09 +00:00