1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-11-27 00:57:50 +00:00
Commit Graph

2016 Commits

Author SHA1 Message Date
Ashish SHUKLA
9092473c3c DNSCheck is a program that is designed to help people check, measure and
hopefully also understand the workings of the Domain Name System. When used to
check an domain (aka zone) is submitted to DNSCheck, it will investigate the
general health by performing various tests and sanity checks.

WWW: http://dnscheck.iis.se/

PR:		ports/148370
Submitted by:	dnscheckengine-port at academ.com (Stan Barber)
Approved by:	tabthorpe (mentor)
2010-09-01 07:15:59 +00:00
Philip M. Gollucci
403d68830d - Fix RUN_DEPENDS thus fixing net/p5-Net-LDAP-AutoServer
PR:             ports/147396
Reported by:    myself (pgollucci)
Submitted by:   "Zane C.B." <vvelox@vvelox.net> (maintainer)
2010-08-28 02:27:30 +00:00
Philip M. Gollucci
c2c7df1b9f - Update to 1.49
PR:             ports/149971
With Hat:       ruby@
2010-08-27 00:19:07 +00:00
Philip M. Gollucci
fb29498bb0 Move wen@FreeBSD.org -> ruby@FreeBSD.org for rubygem-*
Approved by:    wen
With Hat:       ruby
2010-08-26 23:52:26 +00:00
Li-Wen Hsu
4866192673 - Update to 10.1.0
PR:		ports/149784
Submitted by:	lwhsu
Approved by:	Neal Nelson <neal AT nelson.name> (maintainer)
2010-08-24 02:08:45 +00:00
Philippe Audeoud
68e63f8634 - Update to 0.5.2
- Submitter is now maintainer
- Remove useless patch file

PR:		ports/149529
Submitted by:	Sofian Brabez <sbrabez _AT_ gmail.com>
2010-08-23 18:31:39 +00:00
Philip M. Gollucci
5276f28472 - Update to 0.98
Changes:        http://search.cpan.org/dist/Net-Domain-ExpireDate/Changes
PR:             ports/147614
Submitted by:   pgollucci (myself)
Approved by:    maintainer timeout (clsung; > 2.5 months)
2010-08-23 03:58:13 +00:00
Yen-Ming Lee
d6a9e67bf5 - update to 1.13 2010-08-19 00:06:07 +00:00
Sahil Tandon
753b8f382f - Update to 1.6.6
PR:		ports/149656
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2010-08-18 03:49:46 +00:00
Olli Hauer
e3bea4f57f - add periodic daily script to force update
- connect to license framework
 - add special patch from glarkin to ensure daemon detach from tty,
   change some printf to use the warning function instead.

PR:		148586
Submitted by:	Chris Howey <howeyc _at_ gmail.com>
Approved by:	maintainer, glarkin (mentor)
2010-08-17 19:22:56 +00:00
Tilman Keskinoz
11a9d91393 Increase minimum required version of dnsruby
PR:		148887
Submitted by:	Ruben van Staveren <ruben@verweg.com>
Approved by:	maitainer
2010-08-14 19:19:10 +00:00
Tong LIU
738d612f2b - Rename net/p5-IO-INET6 to net/p5-IO-Socket-INET6.
PR:	ports/148309
Submitted by:	Sunpoet Po-Chuan Hsieh <sunpoet@sunpoet.net>
2010-08-09 08:54:36 +00:00
Bernhard Froehlich
1320694d19 - Update to 1.4.04
Approved by:	miwi (mentor)
2010-08-05 10:15:18 +00:00
Sergey Matveychuk
6dd3ca4c36 - Update to 1.4.6 2010-08-04 11:06:04 +00:00
Li-Wen Hsu
96f9e636c9 - Update to 3.2.6
PR:		ports/149234
Submitted by:	Jaap Akkerhuis <jaap AT NLnetLabs.nl> (maintainer)
2010-08-03 17:26:10 +00:00
Doug Barton
cc926de6f4 Minor tweaks 2010-08-03 01:25:54 +00:00
Philippe Audeoud
6f51bad626 - Update to 1.00
- Changelog: <http://cpansearch.perl.org/src/MSCHILLI/DNS-ZoneParse-1.00/Changes>
2010-07-29 06:29:57 +00:00
Sahil Tandon
e971ac5f26 - Update my MAINTAINER address to sahil@FreeBSD.org 2010-07-29 02:58:44 +00:00
Sylvio Cesar Teixeira
cec7778e5c - Update to 1.48
PR:		ports/148886
Submitted by:	Ruben Van Staveren <ruben@verweg.com>
Approved by:	wen@ (He is on vacation, I've his permission for commit your PR)
2010-07-26 11:39:01 +00:00
Martin Matuska
39b68bb4fe Update libevent to 1.4.14b
PR:		ports/147723
Approved by:	maintainer (timeout)
2010-07-25 15:39:20 +00:00
Max Brazhnikov
8c9b6f61c3 Update to 1.6.5
PR:		ports/147565
Submitted by:	Jaap Akkerhuis <jaap at NLnetLabs.nl>
Approved by:	Konstantin Saurbier (maintainer)
2010-07-18 21:30:57 +00:00
Doug Barton
472fcbc24a Updgrade to version 9.7.1-P2 which addresses a DNSSEC-related bug.
If a query is made explicitly for a record of type 'RRSIG' to a validating
recursive server running BIND 9.7.1 or 9.7.1-P1, and the server has one or
more trust anchors configured statically and/or via DLV, then if the answer
is not already in cache, the server enters a loop which repeatedly generates
queries for RRSIGs to the authoritative servers for the zone containing the
queried name.

CVE:	http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0213
CERT:	http://www.kb.cert.org/vuls/id/211905

Versions affected:	9.7.1, 9.7.1-P1
Severity:		High
Exploitable:		remotely

http://www.isc.org/software/bind/advisories/cve-2010-0213
2010-07-17 07:54:40 +00:00
Sahil Tandon
235d1af397 - Drop maintainership 2010-07-14 04:39:47 +00:00
Doug Barton
c30ea1e9df Update to 9.7.1-P1, the latest version from ISC. 2010-07-12 01:48:56 +00:00
Marcelo Araujo
daf7cef508 - Update to 1.1.1.
PR:		ports/148476
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2010-07-11 13:34:39 +00:00
Doug Barton
31cf3e8ea8 Upgrade to version 9.7.1-P1. The patch addresses 2 areas in the resolver
code where the 9.7.x series tightened its adherence to the DNS protocol
as written, vs. the 9.6.x series which was more liberal in what it accepted.

Specifically:
1. Restore processing of certain forms of negative responses that do
   not contain all of the required elements to avoid aggressive
   re-querying of authority servers.
2. Accept answers from authority servers without the AA bit set
   if they meet the other requirements of an answer packet.

More detail can be found here:
https://www.isc.org/community/blog/201007/compatibility-issues-bind-970-and-971
2010-07-10 21:36:05 +00:00
Marcelo Araujo
ef08eaf510 - Update to 1.0.
PR:		ports/148359
Submitted by:	Frank Behrens <frank+ports@ilse.behrens.de> (maintainer)
Feature safe:	yes
2010-07-05 23:08:22 +00:00
Wen Heping
331728e9f2 Class to setup a number of nameservers that respond to specific DNS queries
(QNAME,QTYPE) by prespecified answers. This class is to be used in test suites
where you want to have servers to show predefined behavior.

If the server will do a lookup based on QNAME,QTYPE and return the specified
data. If there is no QNAME, QTYPE match the server will return a SERVFAIL.

A log will be written to STDERR it contains time, IP/PORT, QNAME, QTYPE, RCODE.

WWW:    http://search.cpan.org/dist/Net-DNS-TestNS/

PR:		ports/148161
Submitted by:	Sunpoet Po-Chuan Hsieh <sunpoet@sunpoet.net>
Feature safe:	yes
2010-06-27 01:21:47 +00:00
Martin Wilke
4cd55f4c75 - Update to 1.6.5
PR:		147905
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Feature safe:	yes
2010-06-21 04:17:46 +00:00
Doug Barton
250f5e070c Turns out that the bind.keys.h file is not a new dependency, so my previous
fix was too hasty. Employ a more robust fix that removes the _perl_ dep for
both this file and bind9.xsl.h. The pre-generated versions of these files
are identical to the newly generated ones, which is why this perl issue
never came up previously.

I still have reservations about baking the ISC DLV key into named, but given
that this was already done in 9.7.0+ at least this way we don't violate POLA.
2010-06-18 05:41:26 +00:00
Doug Barton
a1effa157f The newly added bind.keys.h file requires perl for its creation,
which is a problem, however what it's doing is baking the ISC
DLV key into named which is not something I think is reasonable
to do by default.

So, instead of adding perl as a build dependency eliminate the
need for the file altogether.
2010-06-18 02:29:06 +00:00
Doug Barton
69c8e47689 Update to version 9.7.1, the latest from ISC.
This version has numerous minor bug fixes, please refer to the
CHANGES file for details. Many (but not all) of the fixes are
DNSSEC-related, and all users who are doing DNSSEC validation
are encouraged to upgrade to this version.
2010-06-17 22:35:10 +00:00
Sergey Matveychuk
7722c237dd - Update to 1.4.5 2010-06-15 15:46:14 +00:00
Ashish SHUKLA
7012ce9f37 - Adopt unmaintained ports.
Approved by:	pgj, tabthorpe (mentors)
2010-06-14 12:56:44 +00:00
Doug Barton
9a95d46dc7 Unbreak on HEAD 2010-06-14 08:40:55 +00:00
Mario Sergio Fujikawa Ferreira
2d56508c7a Add LICENSE* information 2010-06-13 10:52:39 +00:00
Ashish SHUKLA
cffcff87c3 - Change my maintainer address.
Approved by:	   pgj (mentor)
2010-06-11 13:37:41 +00:00
Peter Pentchev
60824c62ea Update to c-ares-1.7.2 and declare the MIT license. 2010-06-11 11:24:38 +00:00
Matthias Andree
adb91f456d Upgrade to upstream bugfix release 2.55, removing version hack.
Note this version fixes two crashes on startup.

Approved by: garga (mentor)
2010-06-08 20:01:50 +00:00
Gabor Kovesdan
497166b01b - Drop maintainership 2010-06-08 07:31:58 +00:00
Doug Barton
36ff43a47e Remove bms from the pkg-descr's of ports he no longer maintains. 2010-06-06 22:09:10 +00:00
Philip M. Gollucci
3d1caf37fa - Update to 0.29
PR:             ports/147387
Approved by:    greenwood.andy@gmail.com (maintainer)
Submitted by:   myself (pgollucci@)
Changes:        http://search.cpan.org/dist/Net-DNSBL-MultiDaemon/Changes
2010-06-06 20:15:52 +00:00
Martin Wilke
7cac4829ba - Add a EOL message
PR:		145780
Submitted by:	maintainer
2010-06-05 20:39:18 +00:00
Matthias Andree
3d0040e8f7 Update pkg-descr (minor fixes; formatting).
Approved by: miwi (mentor)
2010-06-05 13:14:23 +00:00
Matthias Andree
eddf9c5da3 Upgrade to new upstream release dnsmasq 2.53/2.54.
This release was inadvertently dubbed 2.54 in its logging by Simon Kelley,
so adjust our PORTVERSION to match that, but still build the 2.53 tarball.
Simon will treat 2.53 and 2.54 the same and release 2.55 next time.
http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2010q2/004105.html
Check work/dnsmasq-2.53/src/config.h for VERSION after "make extract" to see.

Approved by: garga (mentor)
2010-06-04 12:11:14 +00:00
Pav Lucistnik
fe337e0489 - Introduce a new USE_XZ knob that handles lzma/xz compressed distfiles
- Convert a bunch of ports to use it

PR:		ports/146329
Submitted by:	mm
With hat:	portmgr
2010-06-04 08:09:20 +00:00
Ade Lovett
8d837132c7 Bounce PORTREVISION for gettext-related ports. Have fun, ya'll. 2010-05-31 02:01:56 +00:00
Tilman Keskinoz
a10fa39f6a Update to 2.1.1
PR:		147225
Submitted by:	Janos Mohacsi
2010-05-30 17:44:07 +00:00
Sylvio Cesar Teixeira
106a50b69e - Update to 1.1.0
PR:		ports/147134
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2010-05-29 11:47:44 +00:00
Philip M. Gollucci
8f3a51419c - Mass conversion of RF -> RG for MASTER_SITE for rubygem- ports
[RG aka rubygems.org]

PR:             ports/147005
Submitted by:   pgollucci (myself)
Approved by:    portmgr (pav)
With Hat:       ruby@
2010-05-26 19:51:34 +00:00
Wen Heping
35f09f2e20 - Update to 1.47 2010-05-24 07:15:25 +00:00
Mark Linimon
cb4c252136 Reset perky@FreeBSD.org due to maintainer-timeouts and no response
to email.

Hat:		portmgr
2010-05-23 21:16:16 +00:00
Doug Barton
7509c01a81 Update to the latest patch set from ISC, which addresses the following:
Named could return SERVFAIL for negative responses
   from unsigned zones.
2010-05-20 06:34:15 +00:00
Wen Heping
6293fadb3e Net::DNS::RR::SRV::Helper is a perl module to order SRV records
by priority and weight for Net::DNS.

WWW: http://search.cpan.org/dist/Net-DNS-RR-SRV-Helper/

PR:		ports/146572
Submitted by:	"Zane C.B." <vvelox@vvelox.net>
2010-05-19 06:00:57 +00:00
Martin Wilke
53925f575d - Update to 3.2.5
PR:		145781
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2010-05-09 11:22:47 +00:00
Anton Berezin
129378971d Add dns/p5-BIND-Config-Parser 0.01, a Perl module that
parses BIND v8 and v9 configuration files.
2010-05-05 11:39:03 +00:00
Philip M. Gollucci
eecc309802 - Send my final p5- ports to perl@ 2010-04-29 17:32:08 +00:00
Sergey Matveychuk
9fe0c5b688 - Update to 1.4.4
* mistly bugs fix release
 * ECC-GOST is not supported by the port yet because of it requires
   OpenSSL 1.0.0 from ports. (There is in TODO).
2010-04-22 12:06:15 +00:00
Alex Dupre
bf330a57d4 Switch to use newer GMP version.
PR:		ports/144487
Submitted by:	ale
Approved by:	portmgr (-exp run by erwin)
2010-04-19 10:43:42 +00:00
Wen Heping
22919484a7 - Update to 2.1.4
PR:		ports/144383
Submitted by:	Pavel Chudakov <sonic@4rm.ru>
Approved by:	maintainer
2010-04-09 10:58:14 +00:00
Wen Heping
c9f65b7c5c - Update to 1.46 2010-04-09 06:05:03 +00:00
Wen Heping
eab18dadb1 - Update to 1.45 2010-04-06 06:32:11 +00:00
Doug Barton
5e23e2bb05 Add bind-tools:
The user space command line tools from the latest version of BIND:
	dig, host, and nslookup

WWW: https://www.isc.org/software/bind
2010-04-02 02:46:11 +00:00
Bernhard Froehlich
7eae482233 - Change to my FreeBSD email address
Approved by:	miwi (mentor), beat (co-mentor)
2010-04-01 12:45:37 +00:00
Dirk Meyer
de78af3ac5 - update to 1.4.1
Reviewed by:	exp8 run on pointyhat
Supported by:	miwi
2010-03-28 06:47:48 +00:00
Doug Barton
204523bd3c Cleanse more RC_SUBR and RC_SUBR_SUFFIX variables 2010-03-28 05:52:12 +00:00
Doug Barton
1d6b4b3f91 Begin the process of deprecating sysutils/rc_subr by
s#. %%RC_SUBR%%#. /etc/rc.subr#
2010-03-27 00:15:24 +00:00
Peter Pentchev
27109dac2c Update to c-ares 1.7.1 and redo the config patch to also support
IPv6 nameserver addresses.
2010-03-25 11:54:02 +00:00
Peter Pentchev
2b2456bcb8 Update to c-ares-1.7.0. In the process:
- actually pass the options-enabled arguments to the configure script!
- add the "hide symbols" configurable knob, though I've no idea why
  anybody would want to turn that off... except maybe for debugging
- install the "acountry", "adig", and "ahost" programs, since they do
  come in useful every now and then
- refresh the patches and add descriptions at the top
2010-03-22 10:56:04 +00:00
Mark Linimon
e163b1f34b Mark as broken on sparc64: fails to install.
Hat:		portmgr
2010-03-22 06:03:48 +00:00
Martin Wilke
b0c6169445 - Update to 1.8.0
PR:		144737
Submitted by:	ghostonthewire <ghostonthewire@gmail.com> (maintainer)
2010-03-20 19:12:44 +00:00
Martin Wilke
18ac089009 - Pass maintainership to Jaap Akkerhuis <jaap@nlnetlabs.nl>
PR:		144864
Submitted by:	Olafur Osvaldsson <osvaldsson@icelandic.net> (previous maintainer)
2010-03-20 18:02:23 +00:00
Martin Wilke
537c86d600 - Pass maintainership to Jaap Akkerhuis <jaap@nlnetlabs.nl>
PR:		144865
Submitted by:	Olafur Osvaldsson <osvaldsson@icelandic.net> (previous maintainer)
2010-03-20 18:00:32 +00:00
Martin Wilke
9ca6c279f1 - Mark BROKEN on HEAD: fails to build with new utmpx
Reported by:	pointyhat
2010-03-20 16:17:50 +00:00
Doug Barton
e0bc892a0e Update to the latest patchfix releases to deal with the problems
related to the handling of broken DNSSEC trust chains.

This fix is only necessary for those who have DNSSEC validation
enabled and configure trust anchors from third parties, either
manually, or through a system like DLV.
2010-03-17 05:35:03 +00:00
Anton Berezin
7cb5c6088a Update to 0.16.
Changes:	http://search.cpan.org/dist/Net-DNS-SEC/Changes
2010-03-13 08:25:54 +00:00
Alberto Villa
9ad1c46cf5 - Update to 3.2.
- Respect O3 cflags as requested by the author.

PR:		144535
Submitted by:	Sten Spans <sten@blinkenlights.nl> (maintainer)
Approved by:	tabthorpe (mentor)
2010-03-12 18:54:22 +00:00
Sergey Matveychuk
65f3f3ca62 - Update to 1.4.3 2010-03-12 12:54:34 +00:00
Wen Heping
0b7b7696ed - Update to 1.44 2010-03-10 12:08:48 +00:00
Doug Barton
3b7f26a8ca Upgrade to version 9.6.2. This version includes all previously released
security patches to the 9.6.1 version, as well as many other bug fixes.

Due to the fact that the DNSSEC algorithm that will be used to sign the
root zone is only included in this version and in 9.7.x those who wish
to do validation MUST upgrade to one of these prior to July 2010.

Feature safe:	yes
2010-03-02 04:06:10 +00:00
Gabor Kovesdan
4d10416a66 - Update to 1.2.8
Feature safe:	yes
2010-02-24 09:59:09 +00:00
Johan van Selst
532e84e129 Update my mail address to @FreeBSD.org
Feature safe:	yes
2010-02-23 18:03:45 +00:00
Doug Barton
064004f4ef Update to the release version of BIND 9.7.0, and remove the -devel
suffix as a result.

Feature safe:	yes
2010-02-17 06:13:15 +00:00
Li-Wen Hsu
063255fa5d - Update to 2.1.0
PR:		ports/143957
Submitted by:	Janos Mohacsi <janos.mohacsi AT bsd.hu> (maintainer)
2010-02-15 16:54:31 +00:00
Philip M. Gollucci
6e165bf799 - Fix permission issues
PR:             ports/143550
Submitted by:   Marko Njezic <mrmax063@maxempire.com>
Approved by:    Olafur Osvaldsson <osvaldsson@icelandic.net> (maintainer)
2010-02-11 19:37:10 +00:00
Pav Lucistnik
a639b8cc99 - Update to 1.0.0 release
PR:		ports/143712
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2010-02-11 10:33:58 +00:00
Philip M. Gollucci
b339872c92 - Reset more ports I don't use anymore 2010-02-10 21:47:48 +00:00
Philip M. Gollucci
178d590d92 - Fix installation permissions
- Submitter is now MAINTAINER

PR:             ports/143450
Submitted by:   Alexey V.Degtyarev <alexey@renatasystems.org>
2010-02-10 02:58:33 +00:00
Martin Wilke
6f2c20c1ab - Update to 1.6.4
PR:		143605
Submitted by:	Cristiano Rolim Pereira <cristianorolim@hotmail.com>
Approved by:	maintainer
2010-02-08 22:03:13 +00:00
Martin Wilke
9285f749d9 - Update to 1.4.03
PR:		143534
Submitted by:	Bernhard Froehlich <decke@bluelife.at> (maintainer)
2010-02-08 15:08:44 +00:00
Li-Wen Hsu
bd472979ca - Update to 9.0.0
PR:		ports/140937
Submitted by:	wen
2010-02-07 09:34:28 +00:00
Dirk Meyer
ca9c60461c - update to jpeg-8 2010-02-05 11:46:55 +00:00
Ion-Mihai Tetcu
fae8374e9f libasyncns is a C library for Linux/Unix for executing name service queries
asynchronously. It is an asynchronous wrapper around getaddrinfo(3),
getnameinfo(3), res_query(3) and res_search(3) from libc and libresolv.

In contrast to GNU's asynchronous name resolving API getaddrinfo_a(),
libasyncns does not make use of UNIX signals for reporting completion of name
queries. Instead, the API exports a standard UNIX file descriptor which may be
integerated cleanly into custom main loops.

In contrast to asynchronous DNS resolving libraries like libdenise, skadns,
adns, libasyncns is just an asynchronous wrapper around the libc's synchronous
getaddrinfo() API, which has the advantage of allowing name resolution using
techniques like Multicast DNS, LDAP or NIS using standard libc NSS (Name
Service Switch) modules. libasyncns is compatible with IPv6 if the underlying
libc is.

libasyncns is very tiny, consisting of just one header and one source file. It
has no dependencies besides libc.

WWW: http://0pointer.de/lennart/projects/libasyncns/
2010-02-04 08:25:54 +00:00
Wen Heping
c14f63bd39 - Update to 1.43 2010-02-04 00:33:47 +00:00
Sergey Matveychuk
28d4421e7e - OpenSSL has no sha256 functions on 6.x
Reported by:	Michael Meelis <m.meelis at easybow.com>
2010-02-02 15:34:31 +00:00
Doug Barton
c595c1f9f0 Upgrade to 9.4-ESV, the first of the "Extended Support Releases"
from ISC. It has numerous bug fixes compared to 9.4.3*, however
in the case of this version "extended" only applies till 2010/12/31
so serious BIND users are still encouraged to upgrade to 9.6.x.
2010-02-02 07:14:33 +00:00
Doug Barton
f89b15d117 Update to 9.7.0rc2 which has numerous bug fixes, especially
for DNSSEC.
2010-02-01 20:57:31 +00:00
Jun Kuriyama
935c866afb - Remove unneeded dependencies which is in perl-5.8.9 dist
(part 13).

Approved by:	portmgr (itetcu)
2010-01-28 04:53:50 +00:00
Jun Kuriyama
3f795ed795 - Remove unneeded dependencies which is in perl-5.8.9 dist
(part 12).

Approved by:	portmgr (itetcu)
2010-01-28 02:32:30 +00:00
Martin Wilke
a602da42eb * Fix for Bug #0000040 http://bugs.mydns-ng.com/view.php?id=40
child processes must not shutdown() their sockets
* Fixes and reports a problem occuring with jumping system time,
  as reported when running inside some virtual machine. Time jumps
  are reported to the log with loglevel NOTICE.
* Delegation now has precedence over wildcard matching
  Thanks to Fab for the fix
  Fixes bugs #0000038, #0000042

PR:		143223
Submitted by:	Hung-Yi Chen <gaod@hychen.org> (maintainer)
2010-01-27 13:03:31 +00:00
Philippe Audeoud
3fa59a7fd4 - Update to 1.16
- Removed useless patches

PR:		ports/143274
Submitted by:	Sofian Brabez <sbrabez gmail.com>
2010-01-27 08:44:43 +00:00
Doug Barton
6769638166 Blah ... forgot to re-add this patch for the slave port again. 2010-01-26 18:18:50 +00:00
Sergey Matveychuk
fd36702b5e - Forgot to set : ${unbound_enable:-"NO"}
- Allow user to set a pid file location with unbound_pidfile="..."

PR:		ports/142793 (based on)
Submitted by:	Keith Gaughan <k at stereochro.me>
2010-01-25 14:30:05 +00:00
Martin Wilke
ab9b313b00 - Update to 1.6.4
PR:		143060
Submitted by:	Konstantin Saurbier <konstantin@saurbier.net> (maintainer)
2010-01-25 08:53:29 +00:00
Doug Barton
9b77b5a942 Upgrade to BIND 9.4.3-P5, 9.5.2-P2, and 9.6.1-P3. These versions address
the following vulnerabilities:

BIND 9 Cache Update from Additional Section
https://www.isc.org/advisories/CVE-2009-4022v6
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022
A nameserver with DNSSEC validation enabled may incorrectly add
unauthenticated records to its cache that are received during the
resolution of a recursive client query

BIND 9 DNSSEC validation code could cause bogus NXDOMAIN responses
https://www.isc.org/advisories/CVE-2010-0097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0097
There was an error in the DNSSEC NSEC/NSEC3 validation code that could
cause bogus NXDOMAIN responses (that is, NXDOMAIN responses for records
proven by NSEC or NSEC3 to exist) to be cached as if they had validated
correctly

These issues only affect systems with DNSSEC validation enabled.
2010-01-25 00:25:08 +00:00
Matthias Andree
e05b66b4de Change MAINTAINER to my FreeBSD address.
Update to new upstream release 2.52. Changelog excerpt below the approval.

Approved by: miwi (mentor)

Upstream changelog excerpt (omitting Linux, Solaris and MacOS X specifics):
[...] Re-read the set of network interfaces when re-loading /etc/resolv.conf
  if --bind-interfaces is not set. This handles the case that loopback
  interfaces do not exist when dnsmasq is first started.

  Tweak the PXE code to support port 4011. This should reduce broadcasts and
  make things more reliable when other servers are around. It also improves
  inter-operability with certain clients.

  Make a pxe-service configuration with no filename or boot service type legal:
  this does a local boot. eg.  pxe-service=x86PC, "Local boot"

  Be more conservative in detecting "A for A" queries. Dnsmasq checks if the
  name in a type=A query looks like a dotted-quad IP address and answers the
  query itself if so, rather than forwarding it. Previously dnsmasq relied in
  the library function inet_addr() to convert addresses, and that will accept
  some things which are confusing in this context, like 1.2.3 or even just
  1234. Now we only do A for A processing for four decimal numbers delimited by
  dots.
[...]
  Increased the default limit on number of leases to 1000 (from 150). This is
  mainly a defence against DoS attacks, and for the average "one for two class
  C networks" installation, IP address exhaustion does that just as well.
  Making the limit greater than the number of IP addresses available in such an
  installation removes a surprise which otherwise can catch people out.

  Removed extraneous trailing space in the value of the DNSMASQ_TIME_REMAINING
  DNSMASQ_LEASE_LENGTH and DNSMASQ_LEASE_EXPIRES environment variables. Thanks
  to Gildas Le Nadan for spotting this.

  Provide the network-id tags for a DHCP transaction to the lease-change script
  in the environment variable DNSMASQ_TAGS. A good suggestion from Gildas Le
  Nadan.

  Add support for RFC3925 "Vendor-Identifying Vendor Options". The syntax looks
  like this:
  --dhcp-option=vi-encap:<enterprise number>, .........

  Add support to --dhcp-match to allow matching against RFC3925
  "Vendor-Identifying Vendor Classes". The syntax looks like this:
  --dhcp-match=tag,vi-encap<enterprise number>, <value>

  Add some application specific code to assist in implementing the Broadband
  forum TR069 CPE-WAN specification. The details are in contrib/CPE-WAN/README

  Increase the default DNS packet size limit to 4096, as recommended by RFC5625
  section 4.4.3. This can be reconfigured using --edns-packet-max if needed.
  Thanks to Francis Dupont for pointing this out.

  Rewrite query-ids even for DNSSEC signed packets, since this is allowed by
  RFC5625 section 4.5.
[...]
  Fix link error when including Dbus but excluding DHCP.
  Thanks to Oschtan for the bug report.

  Updated French translation. Thanks to Gildas Le Nadan.

  Updated Polish translation. Thanks to Jan Psota.

  Updated Spanish translation. Thanks to Chris Chatham.
2010-01-23 11:24:31 +00:00
Sergey A. Osokin
69a365881d Fix build on 6.4-STABLE by add pthread's compiler/linker flags.
Bump PORTREVISION.

Reported by:	pointyhat via erwin@
Approved by:	maintainer aka jaap at NLnetLabs dot nl
2010-01-18 20:02:27 +00:00
Martin Wilke
2104a91372 - Update to 1.4.02
- Pass maintainership to submitter

PR:		142723
Submitted by:	Bernhard Froehlich <decke@bluelife.at>
2010-01-18 07:58:26 +00:00
Sergey A. Osokin
01bb4b3b91 Fix build by change dependences.
Fix COMMENT.
Respect CC/CFLAGS.
Write install target.
Bump PORTREVISION.

Report by:	QAT@
Approved by:	Jaap Akkerhuis aka jaap at NLnetLabs dot nl (maintainer)
Pointy hat to:	nemoliu@
2010-01-13 14:20:09 +00:00
Tong LIU
fec356c200 Add autotrust 0.3.1, a a tool to automatically update DNSSEC trust
anchors.

PR:		ports/142523
Submitted by:	Jaap Akkerhuis <jaap at nlnetlabs.nl>
2010-01-13 06:33:07 +00:00
Sergey Matveychuk
7c55f9279a - A patch from SVN. It fixes a regression in IPv6 caching in
1.4.1 version.
2010-01-12 15:28:11 +00:00
Wen Heping
bc12913b52 - Update to 3.2.4
PR:		ports/142718
Submitted by:	Olafur Osvaldsson <osvaldsson@icelandic.net> (maintainer)
2010-01-12 00:41:23 +00:00
Wen Heping
bbf76ee423 - Update to 1.42
PR:		ports/142607
Submitted by:	"Philip M. Gollucci" <pgollucci@freebsd.org>
2010-01-10 23:38:14 +00:00
Mark Linimon
f61aa69467 With portmgr hat on, reset the maintainership of skv@ for ports that
he has had one or more maintainer-timeouts on in the past 12 months.
2010-01-10 03:54:09 +00:00
Xin LI
cb259a5abd Security update to 3.1.7.2.
Submitted by:	maintainer
Security:	vuln dd8f2394-fd08-11de-b425-00215c6a37bb
2010-01-09 10:59:16 +00:00
Wen Heping
5431cb2cac OpenDNSSEC was created as an open-source turn-key solution for
DNSSEC. It secures zone data just before it is published in an
authoritative name server.

WWW: http://www.opendnssec.org

PR:		ports/142103
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl>
2010-01-07 06:25:07 +00:00
Philippe Audeoud
69edd3c376 - Update to 3.8.0
PR:		ports/142345
Submitted by:	Rob Farmer <rfarmer predatorlabs.net>
Approved by:	maintainer
2010-01-06 09:00:03 +00:00
Doug Barton
3bf3bb4653 Update to version 0.66, which is a major upgrade. Users are cautioned
to thoroughly test this version before updating production systems.

For the port, introduce a new dependency, security/p5-Digest-SHA

Changes in this version, in addition to numerous minor bug fixes:

Feature: Truncation for Nameserver
    TAKE CARE:
    this feature may cause unexpected behavior for your nameservers

    Net::DNS::Packet::truncate is a new method that is called from
    within Net::DNS::Nameserver that truncates a packet according to
    the rules of RFC2181 section 9.

Feature: Added Net::DNS::Domain
    Net::DNS::Domain is an attemt to consistently approach the various
    ways we interface with what RFC 1035 calls <domain-name>.

Feature: KX RR
    Added support for the KX RR, RFC2230

Feature: HIP RR
    Added support for the HIP RR, RFC5205

Feature: DHCID RR
    Added rudimentary support for the DHCID RR.

Fix improved fuzzy matching of CLASS and TYPE in the Question
    constructor method.

Fix AAAA dynamic update
2010-01-01 00:28:07 +00:00
Martin Wilke
8ca9f0d689 - Convert NOMANCOMPRESS to NO_MANCOMPRESS to sync with src
PR:	ports/136065 ports/127469
Submitted by:	N.J. Mann <njm@njm.me.uk> and Aldis Berjoza <killasmurf86@gmail.com>

- Early identify port CONFLICTS

PR:	137855
Submitted by:		Piotr Smyrak <smyru@heron.pl>

- Add --no-same-permissions to the EXTRACT_AFTER_ARGS command.

Tijl Coosemans has been reported an issue that when root is extracting from the
tarball, and the tarball contains world writable files
(sysutils/policykit as an example), there is a chance that the files
gets changed by malicious third parties right after the extraction,
which makes it possible to inject code into the package thus compromise
the system.

Submitted by:	Tijl Coosemans <tijl@coosemans.org> Xin LI (delphij@)

- Fix some whitespaces

Tested with:	exp-run
2009-12-29 10:25:55 +00:00
Martin Wilke
c5c811f904 - Update to 1.0.51
Changes:
	http://cpansearch.perl.org/src/RCAPUTO/POE-Component-Client-DNS-1.051/CHANGES

PR:		140208
Submitted by:	ehaupt@
Approved by:	maintainer timeout
2009-12-25 23:57:22 +00:00
Martin Wilke
88420dc1eb An experiment in benchmarking DNS name services. This tool
is designed to help you as a user determine what name services
are the best to use for an individual machine.

WWW: http://namebench.googlecode.com/

PR:		ports/141202
Submitted by:	Sahil Tandon <sahil at tandon.net>
2009-12-25 19:24:24 +00:00
Wen Heping
7c80b97183 - Update to 2.0.8 2009-12-24 02:42:09 +00:00
Doug Barton
2fadfa2cfb For ports maintained by ports@FreeBSD.org, remove names and/or
e-mail addresses from the pkg-descr file that could reasonably
be mistaken for maintainer contact information in order to avoid
confusion on the part of users looking for support. As a pleasant
side effect this also avoids confusion and/or frustration for people
who are no longer maintaining those ports.
2009-12-21 02:19:12 +00:00
Wen Heping
a1513a0b78 - Update to 1.41
PR:		ports/141725
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl>
2009-12-18 01:22:19 +00:00
Philip M. Gollucci
30a675022a - Update to 0.12
PR:             ports/141525
Approved by:    maintainer
Submitted by:   myself (pgollucci@)
2009-12-17 22:28:24 +00:00
Sergey Matveychuk
e2ae93b2ae - Update to 1.4.1
- Use --disable-sha2 on 6.4 because of broken OpenSSL in base.
2009-12-17 12:45:52 +00:00
Philip M. Gollucci
368dad8611 - Update to 0.27
PR:             ports/141557
Approved by:     maintainer
Submitted by:   myself (pgollucci@)
2009-12-15 21:08:45 +00:00
Doug Barton
271ea45669 Disable the (optional, debugging) symtable feature till I can figure
out the depth of the perl dependency.
2009-12-14 07:50:20 +00:00
Doug Barton
cbdc7d619f Update CONFLICTS for bind97 2009-12-14 06:29:30 +00:00
Doug Barton
57152b64e6 Add BIND 9.7.0rc1 with a -devel suffix for now so that people can
start testing it sooner rather than later. When the final version
is released the -devel will be removed.

Some of the new features of BIND 9.7.x are:

	- Fully automatic signing of zones by "named"
	- Simplified configuration of DNSSEC Lookaside Validation (DLV)
	- Simplified configuration of Dynamic DNS, using the "ddns-confgen"
	  command line tool or the "local" update-policy option
	- New named option "attach-cache" that allows multiple views to
	  share a single cache
	- DNS rebinding attack prevention
	- New default values for dnssec-keygen parameters
	- Support for RFC 5011 automated trust anchor maintenance
	  (see README.rfc5011 for additional details)
	- Smart signing: simplified tools for zone signing and key
	  maintenance
	- Improved PKCS#11 support
2009-12-14 06:25:17 +00:00
Martin Wilke
1b1b29c5e6 - Get rip python 2.3+
Note:
Python 2.3 is't longer supported and have a lot of security issues.
Convert 2.3+ to yes/or 2.4/5+

With hat:	portmgr
2009-12-13 17:00:14 +00:00
Martin Wilke
2c75e63b79 - Update to 1.6.3
PR:		141208
Submitted by:	Cristiano Rolim Pereira <cristianorolim@hotmail.com>
Approved by:	maintainer
2009-12-13 00:21:11 +00:00
Martin Wilke
3b465395de - Update to 1.6.3
PR:		141214
Submitted by:	Konstantin Saurbier <konstantin@saurbier.net> (maintainer)
2009-12-13 00:21:07 +00:00
Doug Barton
2a7170f798 If you install the port it creates an empty directory which is not packaged.
Subsequently installing the package will result in a plist entry to remove a
directory that does not exist
So, change @dirrm to @dirrmtry to make them both happy.
2009-12-05 20:14:19 +00:00
Doug Barton
90b5f0aa16 Add back the geoip patch that was mistakenly deleted in the upgrade 2009-12-05 02:12:12 +00:00
Sergey Matveychuk
025a8e2a2a - A patch from developer
* Fix crash when iterator without validator used
2009-12-01 16:18:41 +00:00
Sergey Matveychuk
2a0b22d752 - Fixe build on 6.4 amd64
Reported by:	pav
Tested by:	bud@RusNET.irc
2009-11-30 18:07:29 +00:00
Doug Barton
7e9b2460de Update to the latest patchlevels for BINDs 9.[456]. The vulnerability
this is designed to fix is related to DNSSEC validation on a resolving
name server that allows access to untrusted users. If your system does
not fall into all 3 of these categories you do not need to update
immediately.
2009-11-30 02:46:12 +00:00
Sylvio Cesar Teixeira
ba072d1713 - Update my mail address to FreeBSD
Approved by:	miwi (mentor)
2009-11-27 22:52:30 +00:00
Sergey Matveychuk
658a748d85 - Update to 1.4.0 2009-11-26 15:19:48 +00:00
Martin Wilke
ac4c3d1a7b - Update to 1.6.2
PR:		140841
Submitted by:	Konstantin Saurbier <konstantin@saurbier.net> (maintainer)
2009-11-26 14:19:46 +00:00
Pav Lucistnik
8c2aab382d - Mark MAKE_JOBS_UNSAFE
Reported by:	pointyhat
2009-11-22 19:49:43 +00:00
Pav Lucistnik
07b2788864 - Mark MAKE_JOBS_UNSAFE
Reported by:	pointyhat
2009-11-19 22:07:43 +00:00
Emanuel Haupt
bfcec71ece - Update to 2.1.9
- Take maintainership

PR:		140643
Approved by:	kay.abendroth@raxion.net (maintainer)
2009-11-17 20:56:28 +00:00
Sergey Matveychuk
8bd36732f2 - Update to 1.3.4
PR:		ports/140639
Submitted by:	Kurt Jaeger <pi at fa8.opsec.eu>
2009-11-17 14:38:37 +00:00
Kirill Ponomarev
492305aaa3 Update to 1.15 2009-11-16 12:22:40 +00:00
Cheng-Lung Sung
e86989b554 - Update to 0.97
! my very last commit was about a patch from
  http://rt.cpan.org/Public/Bug/Display.html?id=46644
  for fix handler for .jp domains
  - but my commit msg was wrong

Changes:	http://search.cpan.org/dist/Net-Domain-ExpireDate/Changes
2009-11-16 07:58:45 +00:00
Cheng-Lung Sung
705f4ce1f3 - Update to 0.96
Changes:	http://search.cpan.org/dist/Net-Domain-ExpireDate/Changes
2009-11-16 07:55:07 +00:00
Wen Heping
4ff8a7fbfb - Update to 1.40 2009-11-15 03:17:20 +00:00
Doug Barton
b963e20e9e Update WWW 2009-11-12 21:45:43 +00:00