Path to this page:
NOTICE: This package has been removed from pkgsrc./
www/squid3,
Post-Harvest_cached WWW proxy cache and accelerator
Branch: CURRENT,
Version: 3.5.28nb3,
Package name: squid-3.5.28nb3,
Maintainer: pkgsrc-usersSquid is a fully-featured HTTP/1.0 proxy with partial HTTP/1.1 support
The 3.1 series brings many new features and upgrades to the basic
networking protocols. A short list of the major new features is:
* Connection Pinning (for NTLM Auth Passthrough)
* Native IPv6
* Quality of Service (QoS) Flow support
* Native Memory Cache
* SSL Bump (for HTTPS Filtering and Adaptation)
* TProxy v4.1+ support
* eCAP Adaptation Module support
* Error Page Localization
* Follow X-Forwarded-For support
* X-Forwarded-For options extended (truncate, delete, transparent)
* Peer-Name ACL
* Reply headers to external ACL.
* ICAP and eCAP Logging
* ICAP Service Sets and Chains
* ICY (SHOUTcast) streaming protocol support
* HTTP/1.1 support on connections to web servers and peers.
(with plans to make this full support within the 3.1 series)
Required to run:[
lang/perl5] [
security/openssl] [
devel/libltdl]
Required to build:[
pkgtools/cwrappers]
Package options: inet6, snmp, squid-backend-diskd, squid-carp, squid-ipf, squid-pam-helper, squid-unlinkd, ssl
Master sites: (Expand)
SHA1: 721241a270ec27d629d65ae17a50be56510e8441
RMD160: 5c102be674a567d780590035e0ac3362e5b1a4b8
Filesize: 2250.664 KB
Version history: (Expand)
- (2020-04-25) Package deleted from pkgsrc
- (2020-01-19) Updated to version: squid-3.5.28nb3
- (2019-08-11) Updated to version: squid-3.5.28nb2
- (2018-08-22) Updated to version: squid-3.5.28nb1
- (2018-08-11) Updated to version: squid-3.5.28
- (2018-04-30) Updated to version: squid-3.5.27nb3
CVS history: (Expand)
2020-04-24 14:21:23 by Nia Alarie | Files touched by this commit (17) | |
Log message:
www: Remove squid3 - legacy squid package, broken with OpenSSL 1.1
|
2020-04-24 14:14:01 by Nia Alarie | Files touched by this commit (2) |
Log message:
www: Mark packages that fail with OpenSSL 1.1 BROKEN
|
2020-01-18 22:51:16 by Jonathan Perkin | Files touched by this commit (1836) |
Log message:
*: Recursive revision bump for openssl 1.1.1.
|
2019-11-04 23:10:16 by Roland Illig | Files touched by this commit (243) |
Log message:
www: align variable assignments
pkglint -Wall -F --only aligned --only indent -r
Manually excluded phraseanet since pkglint got the indentation wrong.
|
2019-08-11 15:25:21 by Thomas Klausner | Files touched by this commit (3557) |
Log message:
Bump PKGREVISIONs for perl 5.30.0
|
2018-08-22 11:48:07 by Thomas Klausner | Files touched by this commit (3558) |
Log message:
Recursive bump for perl5-5.28.0
|
2018-08-11 03:22:02 by Takahiro Kambe | Files touched by this commit (2) | |
Log message:
www/squid3: update to 3.5.29
Changes to squid-3.5.28 (15 Jul 2018):
- SQUID-2018:1: crash processing SSL-Bumped traffic containing ESI
- SQUID-2018:2: crash handling responses to internally generated requests
- SQUID-2018:3 / CVE-2018-1172: crash in ESI Response processing
- Bug 4861: HTTPMSGLOCK missing pointer safety
- Bug 4829: IPC shared memory leaks when disker queue overflows
- Bug 4767: SMP breaks IPv6 SNMP and cache manager queries
- Bug 2821: Ignore Content-Range in non-206 responses
- HTCP: Ignore HTCP packets with invalid URI
- SSL-Bump: fix authentication with schemes other than Basic
- TPROXY: Fix clientside_mark and client port logging
- Fix "Cannot assign requested address" for to-origin TPROXY FTP data
- Fix --with-netfilter-conntrack error message
- Validate mime icon URL before allocating store entries
- ... and many documentation changes
|
2018-04-30 10:57:49 by Takahiro Kambe | Files touched by this commit (2) |
Log message:
www/squid3: Add official security patch SQUID-2018_3
Add security patch for SQUID-2018_3.
Bump PKGREVISION.
http://www.squid-cache.org/Advisories/SQUID-2018_3.txt
__________________________________________________________________
Problem Description:
Due to incorrect pointer handling Squid is vulnerable to denial
of service attack when processing ESI responses.
__________________________________________________________________
Severity:
This problem allows a remote server delivering ESI responses
to trigger a denial of service for all clients accessing the
Squid service.
This problem is limited to Squid operating as reverse proxy.
|