Subject: CVS commit: pkgsrc/security/hitch
From: Filip Hajny
Date: 2017-01-09 14:02:21
Message id: 20170109130221.265A4FBA6@cvs.NetBSD.org

Log Message:
Update security/hitch to 1.4.4.

hitch-1.4.4 (2016-12-22)
------------------------

- OpenSSL 1.1.0 compatibility fixes. OpenSSL 1.1.0 is now fully
  supported with Hitch.
- Fix a bug in the OCSP refresh code that could make it loop with
  immediate refreshes flooding an OCSP responder.
- Force the SSL_OP_SINGLE_DH_USE setting. This protects against an
  OpenSSL vulnerability where a remote attacker could discover private
  DH exponents (CVE-2016-0701).

hitch-1.4.3 (2016-11-14)
------------------------

- OCSP stapling is now enabled by default.
  Users should create ocsp-dir (default: /var/lib/hitch/) and make it
  writable for the hitch user.
- Build error due to man page generation on FreeBSD (most likely non-Linux)
  has been fixed.

hitch-1.4.2 (2016-11-08)
------------------------

- Example configuration file hitch.conf.example has been shortened and
  defaults moved into Hitch itself. Default cipher string is now what we
  believe to be secure. Users are recommended to use the built-in default
  from now on, unless they have special requirements.
- hitch.conf(5) manual has been added.
- Hitch will now send a TLS Close notification during connection teardown.
  This fixes an incomplete read with a GnuTLS client when the backend
  (thttpd) used EOF to signal end of data, leaving some octets discarded
  by gnutls client-side. (Issue 127_)
- Autotools will now detect SO_REUSEPORT availability. (Issue 122_)
- Improved error handling on memory allocation failure.

Files:
RevisionActionfile
1.5modifypkgsrc/security/hitch/Makefile
1.3modifypkgsrc/security/hitch/PLIST
1.5modifypkgsrc/security/hitch/distinfo
1.2modifypkgsrc/security/hitch/patches/patch-hitch.conf.example
1.2modifypkgsrc/security/hitch/patches/patch-src_hitch.c
1.1addpkgsrc/security/hitch/patches/patch-src_configuration.c