Next | Query returned 39 messages, browsing 11 to 20 | Previous

History of commit frequency

CVS Commit History:


   2018-08-22 11:48:07 by Thomas Klausner | Files touched by this commit (3558)
Log message:
Recursive bump for perl5-5.28.0
   2017-09-18 00:13:30 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
p5-Net-SSH: update to 2.14.

2.14 2017.07.03
    - DSA key bugfix: verify would fail if r had unnecessary leading zeros

2.13 2017.06.30
    - Bug Fix: AES-CBC IV length needs to be blocksize, not keysize
    - Bug Fix: DES3 init needs to pass key as variable to avoid scalar error
    - Bug Fix: Packet padlen decode was using signed 8-bit unpack (should be \ 
unsigned)
    - Fix CBC inefficiency
    - Fix Key not being loaded prior to Agent use [ \ 
https://github.com/lkinley/Net-SSH-Perl/issues/10 ]
   2017-08-23 17:03:50 by Havard Eidnes | Files touched by this commit (2)
Log message:
Update to Net::SSH::Perl (here p5-Net-SSH) version 2.12.

Pkgsrc changes:
 * version number, checksum
 * Comment out WRKSRC manipulation, not needed for 2.12.

Upstream changes:

2.12 2017.04.22
    - Fix inefficiency in CTR, revealed by profiling with Devel::NYTProf
    - Avoid warnings in Host from strange/invalid known_host entries
    - Improve documentation of newer features

2.11 2017.04.16
    - Packet bugfix: Introduced in 2.07, when ETM Mac is used, sometimes
      not enough incoming bytes were available to fully read stored MAC
    - DSA key bugfix: verify would fail if r/s had highest bit set

2.10 2017.03.23
    - Add curve25519-sha256 alias for curve25519-sha256@libssh.org key exchange
    - Bugfix for when unsupported key types are encountered
    - Add support for '-' syntax in options, including wildcards
    - Add wildcard support for '+' syntax in options
   2017-08-23 16:52:53 by Havard Eidnes | Files touched by this commit (3)
Log message:
Update dependency list according to Makefile.pl, in particular
add dependency on the recently added p5-Crypt-Curve25519 package.
Bump PKGREVISION.
   2017-06-05 16:25:36 by Ryo ONODERA | Files touched by this commit (2298)
Log message:
Recursive revbump from lang/perl5 5.26.0
   2017-04-07 02:41:59 by Makoto Fujiwara | Files touched by this commit (2) | Package updated
Log message:
Updated security/p5-Net-SSH to 2.09.01
--------------------------------------
2.09 2016.10.26
    - Fix creation of keys in ecdsa, ed25519 key classes
    - Update eg/pssh-keygen to create ecdsa, ed25519 keys
    - Handle hostkeys-00@openssh.com global requests
    - Add support for 'CheckHostIP' and 'UpdateHostKeys' config options
    - Refactor handling of '+' syntax in options
    - Key fingerprints now output sha256-base64 by default.
      (md5 can be specified with FingerprintHash config option)
    - Add id_ed25519, id_ecdsa to default identity files
    - Documentation updates in Perl.pm to reflect new functionality in 2.XX

2.08 2016.10.14
    - Use sha512 instead of md5 in Net::SSH::Perl::Cipher->new_from_key_str()
      to provide ChachaPoly with enough key material
      Tests in t/05-cipher.t should now pass on all platforms [ CPAN bug #114077 ]
    - Add AES128_CBC to cipher tests
    - Info on using features not enabled by default added to README

2.07 2016.10.13

    - Fix blowfish compilation on SunOS [CPAN bug #116323]
    - Fix bug in Packet [CPAN bug #118335]
    - Add support for '+' syntax in MACs option
    - Remove hmac-sha1 from default MACs. It can re-enabled
      by passing the option: 'MACs +hmac-sha1'

2.06 2016.10.04

    - Add support for additional fixed Diffie-Hellman 2K, 4K and 8K groups
      from OpenSSH 7.3 (draft-ietf-curdle-ssh-kex-sha2-03)
    - Kex defaults now updated to draft-ietf-curdle-ssh-kex-sha2-03
      recommendations (diffie-hellman-group-exchange-sha1 removed)
      It can re-enabled by passing the option:
      'KexAlgorithms +diffie-hellman-group-exchange-sha1'

2.05 2016.10.03

    - Add support for '+' syntax in Ciphers, KexAlgorithms, HostKeyAlgorithms
      options as in OpenSSH

2.04 2016.05.11

    - Add ECDSA key support
    - Improve extract_public() in Key.pm inspired by
      https://github.com/renormalist/Net-SSH-Perl/pull/12
      but implement comment with backwards compat with RSA/DSA datafellows
    - Fix XS from being loaded more than once (warnings from Net::SFTP)

2.03 2016.05.06

    - Fixes so that "make test" passes

2.02 2016.05.04

    - Use CryptX to further reduce module depedencies
      This eliminates the need for:
        Math::Pari
        Crypt::DH
        Crypt::RSA
        Crypt::DSA
        Crypt::DES
        Crypt::Blowfish
        MIME::Base64
    - Add support for rsa-sha2-512,rsa-sha2-256 signing with RSA keys
    - Implement HashKnownHosts, KexAlgorithms, MACs config directives
    - Add XS code for Chacha20, BSD Blowfish, Ed25519 routines
    - Properly handle and create known_hosts entries when port is specified
    - Remove obsolete ciphers, MACs, Kex from default list to duplicate
      upcoming OpenSSH behavior
    - Bug fixes

2.01 2016.02.19

    - Use CryptX to reduce module depedencies
      This eliminates the need for:
        BSD::arc4random
        Digest::MD5
        Digest::SHA
        Digest::HMAC_MD5
        Crypt::OpenSSL::AES

2.00 2015.12.07

    - Add Chacha20-Poly1305 cipher support for best security
      (Requires Crypt::OpenSSH::ChachaPoly, see README)
    - Add AES Cipher support in CTR mode (CBC mode supported in Ed25519
      keys only)
    - Add Group Exchange (RFC4523) Diffie-Hellman Key Exchange
    - Add Curve25519 (curve25519-sha256@libssh.org) Key Exchange support
      (Requires Crypt::Curve25519)
    - Add hmac-sha2-256,hmac-sha2-512 MAC support
    - Add hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com
      Encrypt-then-MAC (ETM) MAC support
    - Use BSD::arc4random for encrypted packet padding
    - Add support for Ed25519 ssh/host keys (Requires Crypt::Ed25519)
      Encrypted Ed25519 key support requires Crypt::OpenBSD::Blowfish
      (See README for info)
    - Default ciphers order is now chacha,aes,3des,blowfish,arcfour
    - Default KEX order is now Curve25519, DHGEXSHA256, DHGEXSHA1, DH14, DH1
    - Default MAC order is now hmac-sha2-512-etm@openssh.com,
      hmac-sha2-256-etm@openssh.com, sha2-512, sha2-256, sha1, md5
    - SSH Keys can now be in DOS format (no need to remove CR/LF)
    - SOCKS proxy support via sub class Net::SSH:Perl::Proxy
    - Now does not abort due to OpenSSH 6.8+ server
      SSH2_MSG_GLOBAL_REQUEST messages for host key rotation

(pkgsrc changes)
    - Adjust DEPENDS base upon above note (p5-CryptX related)
   2016-06-08 21:25:20 by Thomas Klausner | Files touched by this commit (2236)
Log message:
Bump PKGREVISION for perl-5.24.
   2016-01-31 06:52:06 by Makoto Fujiwara | Files touched by this commit (1)
Log message:
Add ${PERL5_LICENSE}
   2016-01-31 06:49:47 by Makoto Fujiwara | Files touched by this commit (3)
Log message:
Update 1.34 to 1.42
-------------------
1.42 2015.09.28
    - Fix issue with long selects getting interrupted by signals and dying \ 
(Andrew Hoying)
    - fix version cpan meta info

1.41 2015.09.18
    - use Errno constants in more portable way, see perldoc Errno

1.40 2015.09.17
    - declare new dependency to File::HomeDir in Makefile.PL

1.39 2015.09.15

    - RT #83978 - fix shell terminal width and height (lharey)
    - RT #94574 - fix Algorithm negotiation issue in ::Kex.pm
      (Brian Curnow, Michael Gray)
    - RT #105728 - fix VERSION methods (reported by Karen Etheridge)
    - code modernization (strict+warnings) (gh0stwizard)
    - pass tests on Win32 (gh0stwizard)
    - use Win32::LoginName on Windows (Michael Gray)
    - use File::HomeDir to simplify handling (Michael Gray)

1.38 2014.10.06

    - RT #99284 - install valid SIGNATURE file (Greg Sabino Mullane)

1.37 2014.03.17

    - RT #91840 - enabled config option "StrictHostKeyChecking"
                  (the corresponding code already existed)

1.36 2013.08.09

  Apply many bugfixes from RT discussions.

    - RT #48338 - FIX race condition with SSHv2
    - RT #55195 - FIX race condition in KEXINIT
    - RT #67586 - FIX test '03-packet.t' hangs forever
    - RT #64517 - enable PTY support in SSH2
    - RT #23947 - Replacement for KeyboardInt.pm

1.35 2012.12.03

    - rt#76482 - apply patch to t/03-packet.t for 5.15+ (chisel++)
   2015-11-04 02:18:12 by Alistair G. Crooks | Files touched by this commit (434)
Log message:
Add SHA512 digests for distfiles for security category

Problems found locating distfiles:
	Package f-prot-antivirus6-fs-bin: missing distfile fp-NetBSD.x86.32-fs-6.2.3.tar.gz
	Package f-prot-antivirus6-ws-bin: missing distfile fp-NetBSD.x86.32-ws-6.2.3.tar.gz
	Package libidea: missing distfile libidea-0.8.2b.tar.gz
	Package openssh: missing distfile openssh-7.1p1-hpn-20150822.diff.bz2
	Package uvscan: missing distfile vlp4510e.tar.Z

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.

Next | Query returned 39 messages, browsing 11 to 20 | Previous