2015-12-30 00:58:32 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Update samba4 to 4.3.3.
=============================
Release Notes for Samba 4.3.3
December 16, 2015
=============================
This is a security release in order to address the following CVEs:
o CVE-2015-3223 (Denial of service in Samba Active Directory
server)
o CVE-2015-5252 (Insufficient symlink verification in smbd)
o CVE-2015-5299 (Missing access control check in shadow copy
code)
o CVE-2015-5296 (Samba client requesting encryption vulnerable
to downgrade attack)
o CVE-2015-8467 (Denial of service attack against Windows
Active Directory server)
o CVE-2015-5330 (Remote memory read in Samba LDAP server)
Please note that if building against a system libldb, the required
version has been bumped to ldb-1.1.24. This is needed to ensure
we build against a system ldb library that contains the fixes
for CVE-2015-5330 and CVE-2015-3223.
=======
Details
=======
o CVE-2015-3223:
All versions of Samba from 4.0.0 to 4.3.2 inclusive (resp. all
ldb versions up to 1.1.23 inclusive) are vulnerable to
a denial of service attack in the samba daemon LDAP server.
A malicious client can send packets that cause the LDAP server in the
samba daemon process to become unresponsive, preventing the server
from servicing any other requests.
This flaw is not exploitable beyond causing the code to loop expending
CPU resources.
o CVE-2015-5252:
All versions of Samba from 3.0.0 to 4.3.2 inclusive are vulnerable to
a bug in symlink verification, which under certain circumstances could
allow client access to files outside the exported share path.
If a Samba share is configured with a path that shares a common path
prefix with another directory on the file system, the smbd daemon may
allow the client to follow a symlink pointing to a file or directory
in that other directory, even if the share parameter "wide links" is
set to "no" (the default).
o CVE-2015-5299:
All versions of Samba from 3.2.0 to 4.3.2 inclusive are vulnerable to
a missing access control check in the vfs_shadow_copy2 module. When
looking for the shadow copy directory under the share path the current
accessing user should have DIRECTORY_LIST access rights in order to
view the current snapshots.
This was not being checked in the affected versions of Samba.
o CVE-2015-5296:
Versions of Samba from 3.2.0 to 4.3.2 inclusive do not ensure that
signing is negotiated when creating an encrypted client connection to
a server.
Without this a man-in-the-middle attack could downgrade the connection
and connect using the supplied credentials as an unsigned, unencrypted
connection.
o CVE-2015-8467:
Samba, operating as an AD DC, is sometimes operated in a domain with a
mix of Samba and Windows Active Directory Domain Controllers.
All versions of Samba from 4.0.0 to 4.3.2 inclusive, when deployed as
an AD DC in the same domain with Windows DCs, could be used to
override the protection against the MS15-096 / CVE-2015-2535 security
issue in Windows.
Prior to MS16-096 it was possible to bypass the quota of machine
accounts a non-administrative user could create. Pure Samba domains
are not impacted, as Samba does not implement the
SeMachineAccountPrivilege functionality to allow non-administrator
users to create new computer objects.
o CVE-2015-5330:
All versions of Samba from 4.0.0 to 4.3.2 inclusive (resp. all
ldb versions up to 1.1.23 inclusive) are vulnerable to
a remote memory read attack in the samba daemon LDAP server.
A malicious client can send packets that cause the LDAP server in the
samba daemon process to return heap memory beyond the length of the
requested value.
This memory may contain data that the client should not be allowed to
see, allowing compromise of the server.
The memory may either be returned to the client in an error string, or
stored in the database by a suitabily privileged user. If untrusted
users can create objects in your database, please confirm that all DN
and name attributes are reasonable.
Changes since 4.3.2:
--------------------
o Andrew Bartlett <abartlet@samba.org>
* BUG 11552: CVE-2015-8467: samdb: Match MS15-096 behaviour for
userAccountControl.
o Jeremy Allison <jra@samba.org>
* BUG 11325: CVE-2015-3223: Fix LDAP \00 search expression attack DoS.
* BUG 11395: CVE-2015-5252: Fix insufficient symlink verification (file
access outside the share).
* BUG 11529: CVE-2015-5299: s3-shadow-copy2: Fix missing access check on
snapdir.
o Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
* BUG 11599: CVE-2015-5330: Fix remote read memory exploit in LDB.
o Stefan Metzmacher <metze@samba.org>
* BUG 11536: CVE-2015-5296: Add man in the middle protection when forcing
smb encryption on the client side.
|
2015-12-18 16:03:35 by Tobias Nygren | Files touched by this commit (1) |
Log message:
fix master site
|
2015-12-13 09:48:36 by Thomas Klausner | Files touched by this commit (4) |
Log message:
Update samba4 to 4.3.2.
While here, comment a patch.
Changes since 4.3.1:
--------------------
o Michael Adam <obnox@samba.org>
* BUG 11577: ctdb: Open the RO tracking db with perms 0600 instead of 0000.
o Jeremy Allison <jra@samba.org>
* BUG 11452: s3-smbd: Fix old DOS client doing wildcard delete - gives an
attribute type of zero.
* BUG 11565: auth: gensec: Fix a memory leak.
* BUG 11566: lib: util: Make non-critical message a warning.
* BUG 11589: s3: smbd: If EAs are turned off on a share don't allow an SMB2
create containing them.
* BUG 11615: s3: smbd: have_file_open_below() fails to enumerate open files
below an open directory handle.
o Ralph Boehme <slow@samba.org>
* BUG 11562: s4:lib/messaging: Use correct path for names.tdb.
* BUG 11564: async_req: Fix non-blocking connect().
o Volker Lendecke <vl@samba.org>
* BUG 11243: vfs_gpfs: Re-enable share modes.
* BUG 11570: smbd: Send SMB2 oplock breaks unencrypted.
* BUG 11612: winbind: Fix crash on invalid idmap configs.
o YvanM <yvan.masson@openmailbox.org>
* BUG 11584: manpage: Correct small typo error.
o Stefan Metzmacher <metze@samba.org>
* BUG 11327: dcerpc.idl: Accept invalid dcerpc_bind_nak pdus.
* BUG 11581: s3:smb2_server: Make the logic of SMB2_CANCEL DLIST_REMOVE()
clearer.
o Marc Muehlfeld <mmuehlfeld@samba.org>
* BUG 9912: Changing log level of two entries to DBG_NOTICE.
* BUG 11581: s3-smbd: Fix use after issue in smbd_smb2_request_dispatch().
o Noel Power <noel.power@suse.com>
* BUG 11569: Fix winbindd crashes with samlogon for trusted domain user.
* BUG 11597: Backport some valgrind fixes from upstream master.
o Andreas Schneider <asn@samba.org
* BUG 11563: Fix segfault of 'net ads (join|leave) -S INVALID' with
nss_wins.
o Tom Schulz <schulz@adi.com>
* BUG 11511: Add libreplace dependency to texpect, fixes a linking error on
Solaris.
* BUG 11512: s4: Fix linking of 'smbtorture' on Solaris.
o Uri Simchoni <uri@samba.org>
* BUG 11608: auth: Consistent handling of well-known alias as primary gid.
Changes since 4.3.0:
--------------------
o Jeremy Allison <jra@samba.org>
* BUG 10252: s3: smbd: Fix our access-based enumeration on "hide \
unreadable"
to match Windows.
* BUG 10634: smbd: Fix file name buflen and padding in notify repsonse.
* BUG 11486: s3: smbd: Fix mkdir race condition.
* BUG 11522: s3: smbd: Fix opening/creating :stream files on the root share
directory.
* BUG 11535: s3: smbd: Fix NULL pointer bug introduced by previous 'raw'
* stream fix (bug #11522).
* BUG 11555: s3: lsa: lookup_name() logic for unqualified (no DOMAIN\
component) names is incorrect.
o Ralph Boehme <slow@samba.org>
* BUG 11535: s3: smbd: Fix a crash in unix_convert().
* BUG 11543: vfs_fruit: Return value of ad_pack in vfs_fruit.c.
* BUG 11549: s3:locking: Initialize lease pointer in
share_mode_traverse_fn().
* BUG 11550: s3:smbstatus: Add stream name to share_entry_forall().
* BUG 11555: s3:lib: Validate domain name in lookup_wellknown_name().
o Günther Deschner <gd@samba.org>
* BUG 11038: kerberos: Make sure we only use prompter type when available.
o Volker Lendecke <vl@samba.org>
* BUG 11038: winbind: Fix 100% loop.
* BUG 11053: source3/lib/msghdr.c: Fix compiling error on Solaris.
o Stefan Metzmacher <metze@samba.org>
* BUG 11316: s3:ctdbd_conn: make sure we destroy tevent_fd before closing
the socket.
* BUG 11515: s4:lib/messaging: Use 'msg.lock' and 'msg.sock' for messaging
related subdirs.
* BUG 11526: lib/param: Fix hiding of FLAG_SYNONYM values.
o Björn Jacke <bj@sernet.de>
* BUG 10365: nss_winbind: Fix hang on Solaris on big groups.
* BUG 11355: build: Use as-needed linker flag also on OpenBSD.
o Har Gagan Sahai <SHarGagan@novell.com>
* BUG 11509: s3: dfs: Fix a crash when the dfs targets are disabled.
o Andreas Schneider <asn@samba.org>
* BUG 11502: pam_winbind: Fix a segfault if initialization fails.
o Uri Simchoni <uri@samba.org>
* BUG 11528: net: Fix a crash with 'net ads keytab create'.
* BUG 11547: vfs_commit: set the fd on open before calling SMB_VFS_FSTAT.
|
2015-11-04 01:35:47 by Alistair G. Crooks | Files touched by this commit (748) |
Log message:
Add SHA512 digests for distfiles for net category
Problems found with existing digests:
Package haproxy distfile haproxy-1.5.14.tar.gz
159f5beb8fdc6b8059ae51b53dc935d91c0fb51f [recorded]
da39a3ee5e6b4b0d3255bfef95601890afd80709 [calculated]
Problems found locating distfiles:
Package bsddip: missing distfile bsddip-1.02.tar.Z
Package citrix_ica: missing distfile citrix_ica-10.6.115659/en.linuxx86.tar.gz
Package djbdns: missing distfile djbdns-1.05-test25.diff.bz2
Package djbdns: missing distfile djbdns-cachestats.patch
Package djbdns: missing distfile 0002-dnscache-cache-soa-records.patch
Package gated: missing distfile gated-3-5-11.tar.gz
Package owncloudclient: missing distfile owncloudclient-2.0.2.tar.xz
Package poink: missing distfile poink-1.6.tar.gz
Package ra-rtsp-proxy: missing distfile rtspd-src-1.0.0.0.tar.gz
Package ucspi-ssl: missing distfile ucspi-ssl-0.70-ucspitls-0.1.patch
Package waste: missing distfile waste-source.tar.gz
Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden). All existing
SHA1 digests retained for now as an audit trail.
|
2015-09-28 19:37:04 by Ryo ONODERA | Files touched by this commit (6) | |
Log message:
Update to 4.3.0
Changelog:
=============================
Release Notes for Samba 4.3.0
September 8, 2015
=============================
This is the first stable release of Samba 4.3.
UPGRADING
=========
Read the "New FileChangeNotify subsystem" and "smb.conf \
changes" sections
(below).
NEW FEATURES
============
Logging
-------
The logging code now supports logging to multiple backends. In
addition to the previously available syslog and file backends, the
backends for logging to the systemd-journal, lttng and gpfs have been
added. Please consult the section for the 'logging' parameter in the
smb.conf manpage for details.
Spotlight
---------
Support for Apple's Spotlight has been added by integrating with Gnome
Tracker.
For detailed instructions how to build and setup Samba for Spotlight,
please see the Samba wiki: <https://wiki.samba.org/index.php/Spotlight>
New FileChangeNotify subsystem
------------------------------
Samba now contains a new subsystem to do FileChangeNotify. The
previous system used a central database, notify_index.tdb, to store
all notification requests. In particular in a cluster this turned out
to be a major bottleneck, because some hot records need to be bounced
back and forth between nodes on every change event like a new created
file.
The new FileChangeNotify subsystem works with a central daemon per
node. Every FileChangeNotify request and every event are handled by an
asynchronous message from smbd to the notify daemon. The notify daemon
maintains a database of all FileChangeNotify requests in memory and
will distribute the notify events accordingly. This database is
asynchronously distributed in the cluster by the notify daemons.
The notify daemon is supposed to scale a lot better than the previous
implementation. The functional advantage is cross-node kernel change
notify: Files created via NFS will be seen by SMB clients on other
nodes per FileChangeNotify, despite the fact that popular cluster file
systems do not offer cross-node inotify.
Two changes to the configuration were required for this new subsystem:
The parameters "change notify" and "kernel change notify" are not
per-share anymore but must be set globally. So it is no longer
possible to enable or disable notify per share, the notify daemon has
no notion of a share, it only works on absolute paths.
New SMB profiling code
----------------------
The code for SMB (SMB1, SMB2 and SMB3) profiling uses a tdb instead
of sysv IPC shared memory. This avoids performance problems and NUMA
effects. The profile stats are a bit more detailed than before.
Improved DCERPC man in the middle detection for kerberos
--------------------------------------------------------
The gssapi based kerberos backends for gensec have support for
DCERPC header signing when using DCERPC_AUTH_LEVEL_PRIVACY.
SMB signing required in winbindd by default
-------------------------------------------
The effective value for "client signing" is required
by default for winbindd, if the primary domain uses active directory.
Experimental NTDB was removed
-----------------------------
The experimental NTDB library introduced in Samba 4.0 has been
removed again.
Improved support for trusted domains (as AD DC)
-----------------------------------------------
The support for trusted domains/forests has improved a lot.
samba-tool got "domain trust" subcommands to manage trusts:
create - Create a domain or forest trust.
delete - Delete a domain trust.
list - List domain trusts.
namespaces - Manage forest trust namespaces.
show - Show trusted domain details.
validate - Validate a domain trust.
External trusts between individual domains work in both ways
(inbound and outbound). The same applies to root domains of
a forest trust. The transitive routing into the other forest
is fully functional for kerberos, but not yet supported for NTLMSSP.
While a lot of things are working fine, there are currently a few limitations:
- Both sides of the trust need to fully trust each other!
- No SID filtering rules are applied at all!
- This means DCs of domain A can grant domain admin rights
in domain B.
- It's not possible to add users/groups of a trusted domain
into domain groups.
SMB 3.1.1 supported
-------------------
Both client and server have support for SMB 3.1.1 now.
This is the dialect introduced with Windows 10, it improves the secure
negotiation of SMB dialects and features.
There's also a new optinal encryption algorithm aes-gcm-128,
but for now this is only selected as fallback and aes-ccm-128
is preferred because of the better performance. This might change
in future versions when hardware encryption will be supported.
See https://bugzilla.samba.org/show_bug.cgi?id=11451.
New smbclient subcommands
-------------------------
- Query a directory for change notifications: notify <dir name>
- Server side copy: scopy <source filename> <destination filename>
New rpcclient subcommands
-------------------------
netshareenumall - Enumerate all shares
netsharegetinfo - Get Share Info
netsharesetinfo - Set Share Info
netsharesetdfsflags - Set DFS flags
netfileenum - Enumerate open files
netnamevalidate - Validate sharename
netfilegetsec - Get File security
netsessdel - Delete Session
netsessenum - Enumerate Sessions
netdiskenum - Enumerate Disks
netconnenum - Enumerate Connections
netshareadd - Add share
netsharedel - Delete share
New modules
-----------
idmap_script - see 'man 8 idmap_script'
vfs_unityed_media - see 'man 8 vfs_unityed_media'
vfs_shell_snap - see 'man 8 vfs_shell_snap'
New sparsely connected replia graph (Improved KCC)
--------------------------------------------------
The Knowledge Consistency Checker (KCC) maintains a replication graph
for DCs across an AD network. The existing Samba KCC uses a fully
connected graph, so that each DC replicates from all the others, which
does not scale well with large networks. In 4.3 there is an
experimental new KCC that creates a sparsely connected replication
graph and closely follows Microsoft's specification. It is turned off
by default. To use the new KCC, set "kccsrv:samba_kcc=true" in
smb.conf and let us know how it goes. You should consider doing this
if you are making a large new network. For small networks there is
little benefit and you can always switch over at a later date.
Configurable TLS protocol support, with better defaults
-------------------------------------------------------
The "tls priority" option can be used to change the supported TLS
protocols. The default is to disable SSLv3, which is no longer
considered secure.
Samba-tool now supports all 7 FSMO roles
-------------------------------------------------------
Previously "samba-tool fsmo" could only show, transfer or seize the
five well-known FSMO roles:
Schema Master
Domain Naming Master
RID Master
PDC Emulator
Infrastructure Master
It can now also show, transfer or seize the DNS infrastructure roles:
DomainDnsZones Infrastructure Master
ForestDnsZones Infrastructure Master
CTDB logging changes
--------------------
The destination for CTDB logging is now set via a single new
configuration variable CTDB_LOGGING. This replaces CTDB_LOGFILE and
CTDB_SYSLOG, which have both been removed. See ctdbd.conf(5) for
details of CTDB_LOGGING.
CTDB no longer runs a separate logging daemon.
CTDB NFS support changes
------------------------
CTDB's NFS service management has been combined into a single 60.nfs
event script. This updated 60.nfs script now uses a call-out to
interact with different NFS implementations. See the CTDB_NFS_CALLOUT
option in the ctdbd.conf(5) manual page for details. A default
call-out is provided to interact with the Linux kernel NFS
implementation. The 60.ganesha event script has been removed - a
sample call-out is provided for NFS Ganesha, based on this script.
The method of configuring NFS RPC checks has been improved. See
ctdb/config/nfs-checks.d/README for details.
Improved Cross-Compiling Support
--------------------------------
A new "hybrid" build configuration mode is added to improve
cross-compilation support.
A common challenge in cross-compilation is that of obtaining the results
of tests that have to run on the target, during the configuration
phase of the build. The Samba build system already supports the following
means to do so:
- Executing configure tests using the --cross-execute parameter
- Obtaining the results from an answers file using the --cross-answers
parameter
The first method has the drawback of inaccurate results if the tests are
run using an emulator, or a need to be connected to a running target
while building, if the tests are to be run on an actual target. The
second method presents a challenge of figuring out the test results.
The new hybrid mode runs the tests and records the result in an answer file.
To activate this mode, use both --cross-execute and --cross-answers in the
same configure invocation. This mode can be activated once against a
running target, and then the generated answers file can be used in
subsequent builds.
Also supplied is an example script that can be used as the
cross-execute program. This script copies the test to a running target
and runs the test on the target, obtaining the result. The obtained
results are more accurate than running the test with an emulator, because
they reflect the exact kernel and system libraries that exist on the
target.
Improved Sparse File Support
----------------------------
Support for the FSCTL_SET_ZERO_DATA and FSCTL_QUERY_ALLOCATED_RANGES
SMB2 requests has been added to the smbd file server.
This allows for clients to deallocate (hole punch) regions within a
sparse file, and check which portions of a file are allocated.
######################################################################
Changes
#######
smb.conf changes
----------------
Parameter Name Description Default
-------------- ----------- -------
logging New (empty)
msdfs shuffle referrals New no
smbd profiling level New off
spotlight New no
tls priority New NORMAL:-VERS-SSL3.0
use ntdb Removed
change notify Changed to [global]
kernel change notify Changed to [global]
client max protocol Changed default SMB3_11
server max protocol Changed default SMB3_11
Removed modules
---------------
vfs_notify_fam - see section 'New FileChangeNotify subsystem'.
KNOWN ISSUES
============
Currently none.
CHANGES SINCE 4.2.0rc4
======================
o Andrew Bartlett <abartlet@samba.org>
* Bug 10973: No objectClass found in replPropertyMetaData on ordinary
objects (non-deleted)
* Bug 11429: Python bindings don't check integer types
* Bug 11430: Python bindings don't check array sizes
o Ralph Boehme <slow@samba.org>
* Bug 11467: Handling of 0 byte resource fork stream
o Volker Lendecke <vl@samba.org>
* Bug 11488: AD samr GetGroupsForUser fails for users with "()" in
their name
o Stefan Metzmacher <metze@samba.org>
* Bug 11429: Python bindings don't check integer types
o Matthieu Patou <mat@matws.net>
* Bug 10973: No objectClass found in replPropertyMetaData on ordinary
objects (non-deleted)
CHANGES SINCE 4.2.0rc3
======================
o Ralph Boehme <slow@samba.org>
* Bug 11444: Crash in notify_remove caused by change notify = no
o Günther Deschner <gd@samba.org>
* Bug 11411: smbtorture does not build when configured --with-system-mitkrb5
o Volker Lendecke <vl@samba.org>
* Bug 11455: fix recursion problem in rep_strtoll in lib/replace/replace.c
* Bug 11464: xid2sid gives inconsistent results
* Bug 11465: ctdb: Fix the build on FreeBSD 10.1
o Roel van Meer <roel@1afa.com>
* Bug 11427: nmbd incorrectly matches netbios names as own name
o Stefan Metzmacher <metze@samba.org>
* Bug 11451: Poor SMB3 encryption performance with AES-GCM
* Bug 11458: --bundled-libraries=!ldb,!pyldb,!pyldb-util doesn't
disable ldb build and install
o Andreas Schneider <asn@samba.org>
* Bug 9862: Samba "map to guest = Bad uid" doesn't work
CHANGES SINCE 4.3.0rc2
======================
o Andrew Bartlett <abartlet@samba.org>
* Bug 11436: samba-tool uncaught exception error
* Bug 10493: revert LDAP extended rule 1.2.840.113556.1.4.1941
LDAP_MATCHING_RULE_IN_CHAIN changes
o Ralph Boehme <slow@samba.org>
* Bug 11278: Stream names with colon don't work with
fruit:encoding = native
* Bug 11426: net share allowedusers crashes
o Amitay Isaacs <amitay@gmail.com>
* Bug 11432: Fix crash in nested ctdb banning
* Bug 11434: Cannot build ctdbpmda
* Bug 11431: CTDB's eventscript error handling is broken
o Stefan Metzmacher <metze@samba.org>
* Bug 11451: Poor SMB3 encryption performance with AES-GCM (part1)
* Bug 11316: tevent_fd needs to be destroyed before closing the fd
o Arvid Requate <requate@univention.de>
* Bug 11291: NetApp joined to a Samba/ADDC cannot resolve SIDs
o Martin Schwenke <martin@meltin.net>
* Bug 11432: Fix crash in nested ctdb banning
CHANGES SINCE 4.3.0rc1
======================
o Jeremy Allison <jra@samba.org>
* BUG 11359: strsep is not available on Solaris
o Björn Baumbach <bb@sernet.de>
* BUG 11421: Build with GPFS support is broken
o Justin Maggard <jmaggard@netgear.com>
* BUG 11320: "force group" with local group not working
o Martin Schwenke <martin@meltin.net
* BUG 11424: Build broken with --disable-python
#######################################
Reporting bugs & Development Discussion
#######################################
Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical IRC channel on irc.freenode.net.
If you do report problems then please try to send high quality
feedback. If you don't provide vital information to help us track down
the problem then you will probably be ignored. All bug reports should
be filed under the "Samba 4.1 and newer" product in the project's Bugzilla
database (https://bugzilla.samba.org/).
======================================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
======================================================================
|
2015-08-23 16:30:43 by Thomas Klausner | Files touched by this commit (125) |
Log message:
Bump PKGREVISION for nettle shlib major bump.
|
2015-06-26 18:09:49 by Jonathan Perkin | Files touched by this commit (8) |
Log message:
Attempt to fix various build issues:
- Explicitly disable samba-regedit for now, it is built depending on
various curses characteristics that we do not currently support.
- Avoid epoll implementation on SmartOS.
- Pull in Active Directory and LDAP options from net/samba, LDAP support
is dynamically configured and we need to ensure that, if enabled, we
correctly pull in openldap. The SunOS native LDAP is missing some TLS
functions that Samba depends upon.
Tested with various PKG_OPTIONS combinations, fixes build on SmartOS.
|
2015-06-12 12:52:19 by Thomas Klausner | Files touched by this commit (3152) |
Log message:
Recursive PKGREVISION bump for all packages mentioning 'perl',
having a PKGNAME of p5-*, or depending such a package,
for perl-5.22.0.
|
2015-05-26 17:17:56 by Jonathan Perkin | Files touched by this commit (3) |
Log message:
Move rc.d-specific MESSAGE file out of the way and only display if rc.d
is used. Bump PKGREVISION.
|
2015-05-26 17:11:26 by Jonathan Perkin | Files touched by this commit (7) |
Log message:
Various changes to fix the build and install on SunOS.
|