1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-11-18 00:10:04 +00:00
Commit Graph

851 Commits

Author SHA1 Message Date
Foxfair Hu
a205b4eda9 Back out my change from Oct.26, this was a misconfigured hack and should
never be taken.

Pointed out by : maintainer.
1999-12-09 14:17:09 +00:00
Don Lewis
4c18c17742 Activate chrootuid. 1999-12-09 10:40:46 +00:00
Don Lewis
1ef37aadb3 The chrootuid command combines chroot(8) and su(1) into one program,
so that there is no need to have commands such as /usr/bin/su in the
restricted environment.  Access to the file system is restricted to
the newroot subtree and privileges are restricted to those of the
newuser account (which must be a known account in the unrestricted
environment).
1999-12-09 10:37:38 +00:00
Andrey A. Chernov
69872a6f4b Change broken link to homepage to official one 1999-12-08 21:27:01 +00:00
Brian Feldman
d64b6e2fd2 I've cleaned up ${CVS_DATE} usage a bit (keep spaces correctly), and
updated to today's snapshot of OpenSSH.

Various updates from the latest ${CVS_DATE}, and requisite patch
changes, are the "big new thing".  Nothing major has changed;  the
biggest ones would be using atomicio() in a lot of places and a
fix for a SIGHUP not updating sshd(8)'s configuration until the
next connection.
1999-12-08 04:06:38 +00:00
David E. O'Brien
7c36a52e4c Update to 2.3 beta #9.
This speeds up OS scans.
1999-12-07 22:06:56 +00:00
SADA Kenji
745f62c9ad The software's www page has been moved. 1999-12-07 21:13:02 +00:00
Brian Feldman
7db4f457f6 In the meantime (while things are being worked and decided on on the
OpenBSD OpenSSH front), add ConnectionsPerPeriod to prevent DoS via
running the system out of resources.  In reality, this wouldn't
be a full DoS, but would make a system slower, but this is a better
thing to do than let the system get loaded down.
   So here we are, rate-limiting.  The default settings are now:
Five connections are allowed to authenticate (and not be rejected) in
a period of ten seconds.
One minute is given for login grace time.
   More work in this area is being done by alfred@FreeBSD.org and
markus@OpenBSD.org, at the very least.  This is, essentially, a
stopgap solution;  however, it is a properly implemented and documented
one, and has an easily modifiable framework.
1999-12-06 06:32:22 +00:00
Brian Feldman
c249079362 Under advisories, put RESTRICTED back. It more accurately reflects
reality, though.  One file, cipher.c, calls cryptographic routines
from external libraries.  This really cannot encumber OpenSSH in
any case, but I put RESTRICTED back since it would give people a
false hope of being able to install the OpenSSH package but
not the requisite, RESTRICTED (so nonexistant) openssl package.
1999-12-06 06:26:17 +00:00
Kris Kennaway
26fd302372 Upgrade to l0pht-watch 1.1
Reviewed by:	Maintainer
1999-12-06 05:15:58 +00:00
Brian Feldman
1394b1ef56 Good-bye, RESTRICTED.
Reasons:
1. It's not crypto.
2. It links with crypto.
	a. That crypto is in the public domain.
	b. Linking with crypto does not constitute cryptography.
3. Even if it were crypto, the description of the entire protocol, etc.,
   is in the public domain.  The RFC is PD in the USA, and the white paper
   in Europe.
4. Precedence?  Even if it were crypto, the Bernstein case has set
   precedence for allowing export of that.  But it's not even crypto.
1999-12-06 04:49:22 +00:00
Brian Feldman
99f8fb2572 Reduce LoginGraceTime from 10 minutes (!!!) to 30 seconds. More to
come, soon.
1999-12-04 12:40:39 +00:00
Chris Piazza
85ed02f6b6 fix buffer overflow in RSA{Public,Private}Decrypt. from CORE SDI. 1999-12-02 07:49:03 +00:00
Foxfair Hu
8020a1e16b PORTLINT rules. 1999-12-01 20:01:59 +00:00
Foxfair Hu
29b60edf91 More portlint cleanup. 1999-12-01 19:53:56 +00:00
Foxfair Hu
3ea9778c6e PORTLINT rules. 1999-12-01 19:48:40 +00:00
Foxfair Hu
325fc4a8d1 Upgrade nessus-plugins to 0.99.1 . 1999-12-01 19:46:27 +00:00
Foxfair Hu
d94887d9ad Upgrade to 0.99.1, and make portlint happy. 1999-12-01 19:35:08 +00:00
Foxfair Hu
5cc9cadf7f Active nessus-* ports. 1999-12-01 05:42:11 +00:00
Foxfair Hu
7690d17b90 PR: 14776
Submitted by:	Anders Nordby <anders@fix.no>

Import the plugins for nessus, network security scanner program.

WWW: http://www.nessus.org/
1999-12-01 05:40:10 +00:00
Foxfair Hu
ef5033c94b PR: 14775
Submitted by:		Anders Nordby <anders@fix.no>

NASL is a scripting language designed for the Nessus security scanner. Its
aim is to allow anyone to write a test for a given security hole in a few
minutes, to allow people to share their tests without having to worry
about their operating system, and to garantee everyone that a NASL script
can not do anything nasty except performing a given security test against
a given target.

NASL is not a powerful scripting language. Its purpose is to make scripts
that are security tests. So, do not expect to write a third generation web
server in this language, nor a file conversion utility. Use perl, python
or whatever scripting language to do this.

WWW: http://www.nessus.org/doc/nasl.html
1999-12-01 05:35:29 +00:00
Foxfair Hu
b08bfa9ba0 PR: 14774
Submitted by:		Anders Nordby <anders@fix.no>
Split nessus-libraries from nessus port.
1999-12-01 05:32:20 +00:00
Foxfair Hu
788058aac1 PR: ports/14773
Submitted by:		maintainer
Update to 0.99.1, and disable nessus for compiling in -current.
Original patch submitted by the maintainer, and some fixes from me.
1999-12-01 05:27:13 +00:00
Archie Cobbs
99d5b650ca Update one of the master sites.
Submitted by:	Brent <brent@kearneys.ca>
1999-11-30 06:39:34 +00:00
Brian Feldman
c52ee5193f Add the PAM SSH RSA key authentication module. For example, you can add,
"login  auth    sufficient      pam_ssh.so" to your /etc/pam.conf, and
users with a ~/.ssh/identity can login(1) with their SSH key :)

PR:		15158
Submitted by:	Andrew J. Korty <ajk@waterspout.com>
Reviewed by:	obrien
1999-11-29 07:09:45 +00:00
Brian Feldman
8e53bbefee Update to a current CVS_DATE. The only real change I see is the (big)
change of KNFization being finalized :)

Patches had to be modified, but should look "better" according to
style(9), now.
1999-11-28 22:40:28 +00:00
Brian Feldman
cc029c1647 Change CFLAGS to get modified in Makefile.inc, fixing the
problem several people have reported with make.conf setting ${CFLAGS}.

Partially submitted by:	Jos Backus <Jos.Backus@nl.origin-it.com>
1999-11-28 21:40:58 +00:00
Nick Sayer
f900a41e79 Update to 0.6.1
Submitted by:	sascha@schumann.cx
1999-11-28 16:26:42 +00:00
Steve Price
af5234ea2c Re-importing in net.
Suggested by:	kris
1999-11-26 23:18:39 +00:00
Steve Price
1aa203a2e7 Activate the dante and p5-Authen-PAM ports. 1999-11-26 20:35:28 +00:00
Steve Price
8d71c26261 Initial import of p5-Authen-PAM version 0.08.
A Perl interface to the PAM library.

PR:		14137
Submitted by:	Matt Behrens <matt@zigg.com>
1999-11-26 20:32:25 +00:00
Chris Piazza
e8bddd06d0 Forgot a line 1999-11-25 21:26:38 +00:00
Chris Piazza
37014e3b5d Patches are now available from www.ssh.org/patches
Submitted by:	Issei Suzuki <issei@jp.freebsd.org>
1999-11-25 21:26:03 +00:00
SADA Kenji
03825be304 Removed an obsoleted patch.
PR:		15059
Submitted by:	Maintainer
1999-11-24 21:45:32 +00:00
Brian Feldman
56a0d0c739 Also, set SSH_PROGRAM correctly. 1999-11-24 03:39:54 +00:00
Brian Feldman
f0ca59b2b5 Update the CVS_DATE. This brings in support for TIS authentication,
obsoleting a couple patches (it's the same code, though, except for
additions).

This also brings in KNFization of everything (please hold the cheering
down :) and made me reroll all my patches.

My patches have been almost entirely rewritten.  The places are the
same, but the code's rewritten.  It fits with the style (KNF) now,
and looks better.

I've also added strlcat.c to the build, which, just like strlcpy.c, is
necessary for compatibility with older libcs.  After strlcat() snuck
into the OpenSSH code recently, this would prevent OpenSSH from
building on (e.g.) FreeBSD 3.2.  Adding it to ssh/lib/ makes it work
yet again :)
1999-11-24 03:36:23 +00:00
Brian Feldman
f9d23e53cc Correct ssh-keygen usage.
Submitted by:	Larry Baird <lab@gta.com>
1999-11-23 03:04:05 +00:00
Brian Feldman
64c59a88a8 Clean up some shell scripting and replace it with proper Makefile
syntax.  Run ssh-keygen for ssh_host_key on port install, not just
package install.
1999-11-22 22:45:47 +00:00
Brian Feldman
64484c75cf I wish CVS would report new files. This broke the carefully designed
mirroring system.  The tarball was fine, but the extraction was not
1999-11-22 22:44:47 +00:00
Brian Feldman
41408c5a51 And away we go! Here comes the source mirror, thanks Mark!
Submitted by:	markm
1999-11-21 23:10:48 +00:00
David E. O'Brien
f3c0ba55b9 Update to 2.3 Beta8.
* Added "firewall mode" timing optimizations which can decrease the
  amount of time neccessary to SYN or connect scan some heavily filtered
  hosts.
* Changed "TCP Ping" to use a random ACK value rather than 0 (an IDS
  called Snort was using this to detect Nmap TCP pings).
* better FDDI support
* changes which should lead to tremendous speedups against some firewalled
  hosts.
1999-11-21 23:09:22 +00:00
SADA Kenji
8dbe81438d Mastersite has moved. 1999-11-21 20:45:26 +00:00
Brian Feldman
7b3d367711 Update to the latest CVS_DATE, obsoleting patches patch-a[yz].
Add "ignorelogin" login.conf functionality to sshd.

The biggest change: new port functionality.  Making "fetchsrctarball"
will soon work for those of you who cannot use CVS to get OpenSSH.
Mark Murray, the savior he is :), will use "make makesrctarball" and
put the snapshots of OpenSSH source in the proper place.

The current ${MASTER_SITES} is just a guess at where the snapshot
files could be hosted; something definite should be worked out very
soon.
1999-11-21 16:42:44 +00:00
Brian Feldman
f12ea805b6 Set all the default PATHs correctly, removing a "hack"-ish ${PERL}
transform.

Prompted by:	deraadt
1999-11-20 22:54:06 +00:00
Warner Losh
ab96a24696 Default to not allowing root logins. This makes it consistant with
OpenSSH.  Users desiring the old functionality can edit their
sshd-config files by hand for new installs.
1999-11-20 19:54:31 +00:00
Brian Feldman
5ef3dcc5cb Give OpenSSH TIS client-side authentication.
Submitted by:	peter
1999-11-20 06:59:57 +00:00
Brian Feldman
db8a62a578 ARGH! Remember the echo -n ' sshd'. 1999-11-20 03:55:29 +00:00
Brian Feldman
7382aa363a Change around sshd.sh for the last time. 1999-11-20 03:42:05 +00:00
Brian Feldman
c2edf69286 Turn on HAVE_OPENPTY so more than 16 terminals work with sshd.
Put sshd.sh installation in the pre-install, ssh_host_key generation
back in the PLIST, and check for ssh_config, too.  This port now
works much better as a package.  The configuration files and sshd.sh
are also part of the package, and as such removed on deinstall.

The proper upgrade procedure from one OpenSSH version to a newer one is:
chflags schg /usr/local/etc/ssh*	# preserve them from deletion
cd /usr/ports/security/openssh
make all deinstall reinstall clean

Partially submitted by:	peter
1999-11-20 03:05:31 +00:00
Brian Feldman
8e684ae74d Add that pesky slogin link to the packing list. 1999-11-20 01:55:53 +00:00