FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

I am looking for an LTO tape library. Do you have one to spare?
Port details
isc-dhcp31-client 3.1.ESV,1 net Deleted on this many watch lists=2 search for ports that depend on this port This port version is marked as vulnerable.
Forbidden FORBIDDEN: Vulnerable since 2011-04-10, http://portaudit.freebsd.org/7e69f00d-632a-11e0-9f3a-001d092480a4.html
Expired This port expired on: 2011-10-14
Ignore IGNORE: is forbidden: Vulnerable since 2011-04-10, http://portaudit.freebsd.org/7e69f00d-632a-11e0-9f3a-001d092480a4.html
The ISC Dynamic Host Configuration Protocol client
Was Maintained by: jpaetzel@FreeBSD.org search for ports maintained by this maintainer
Port Added: 13 Oct 2008 12:04:36
License: not specified in port


The ISC Dynamic Host Configuration Protocol Distribution provides a
freely redistributable reference implementation of all aspects of the
DHCP protocol, through a suite of DHCP tools:

  * A DHCP server
  * A DHCP client (this port)
  * A DHCP relay agent

Version 3 of the ISC DHCP Distribution includes the following features
that are new since version 2.0:

  * DHCP Failover Protocol support
  * OMAPI, an API for accessing and modifying the DHCP server and client state
  * Conditional behaviour
  * Storing arbitrary information on leases
  * Address pools with access control
  * Client classing
  * Address allocation restriction by class
  * Relay agent information option support 
  * Dynamic DNS updates
  * Many bug fixes, performance enhancements, and minor new DHCP protocol
    features. 

WWW: http://www.isc.org/products/DHCP/
SVNWeb : Main Web Site : Distfiles Availability : PortsMon
Master port: net/isc-dhcp31-server
There are no ports dependent upon this port

No installation instructions: this port has been deleted.

The package name of this deleted port was: isc-dhcp31-client


Configuration Options
===> The following configuration options are available for isc-dhcp31-client-3.1.ESV,1:
     INTERFACE_POLLING=on (default) "interface polling support"
===> Use 'make config' to modify these settings

Master Sites:
  1. ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/distfiles/
  2. ftp://ftp.ciril.fr/pub/isc/dhcp/
  3. ftp://ftp.ciril.fr/pub/isc/dhcp/dhcp-3.1-history/
  4. ftp://ftp.dti.ad.jp/pub/net/isc/dhcp/
  5. ftp://ftp.dti.ad.jp/pub/net/isc/dhcp/dhcp-3.1-history/
  6. ftp://ftp.freenet.de/pub/ftp.isc.org/isc/dhcp/
  7. ftp://ftp.freenet.de/pub/ftp.isc.org/isc/dhcp/dhcp-3.1-history/
  8. ftp://ftp.funet.fi/pub/mirrors/ftp.isc.org/isc/dhcp/
  9. ftp://ftp.funet.fi/pub/mirrors/ftp.isc.org/isc/dhcp/dhcp-3.1-history/
  10. ftp://ftp.iij.ad.jp/pub/network/isc/dhcp/
  11. ftp://ftp.iij.ad.jp/pub/network/isc/dhcp/dhcp-3.1-history/
  12. ftp://ftp.isc.org/isc/dhcp/
  13. ftp://ftp.isc.org/isc/dhcp/dhcp-3.1-history/
  14. ftp://ftp.mirrorservice.org/sites/ftp.isc.org/isc/dhcp/
  15. ftp://ftp.mirrorservice.org/sites/ftp.isc.org/isc/dhcp/dhcp-3.1-history/
  16. ftp://ftp.nominum.com/pub/isc/dhcp/
  17. ftp://ftp.nominum.com/pub/isc/dhcp/dhcp-3.1-history/
  18. ftp://ftp.ntua.gr/pub/net/isc/isc/dhcp/
  19. ftp://ftp.ntua.gr/pub/net/isc/isc/dhcp/dhcp-3.1-history/
  20. ftp://ftp.ripe.net/mirrors/sites/ftp.isc.org/isc/dhcp/
  21. ftp://ftp.ripe.net/mirrors/sites/ftp.isc.org/isc/dhcp/dhcp-3.1-history/
  22. ftp://ftp.sunet.se/pub/network/isc/dhcp/
  23. ftp://ftp.sunet.se/pub/network/isc/dhcp/dhcp-3.1-history/
  24. ftp://ftp.task.gda.pl/mirror/ftp.isc.org/isc/dhcp/
  25. ftp://ftp.task.gda.pl/mirror/ftp.isc.org/isc/dhcp/dhcp-3.1-history/
  26. ftp://ftp.u-aizu.ac.jp/pub/net/isc/dhcp/
  27. ftp://ftp.u-aizu.ac.jp/pub/net/isc/dhcp/dhcp-3.1-history/
Port Moves
  • port deleted on 2011-10-14
    REASON: Vulnerable since 2011-04-10
  • port moved here from net/isc-dhcp30-client on 2010-07-09
    REASON: Has expired: deprecated upstream since March 2009

Number of commits found: 3

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
14 Oct 2011 22:30:49
Original commit files touched by this commit  3.1.ESV,1
 This port version is marked as vulnerable.
dougb search for other commits by this committer
As previously advertised, complete removal of vulnerable ports that
no one has stepped up to deal with:

archivers/pecl-phar             Vulnerable since 2011-01-13
comms/libsyncml                 Depends on devel/libsoup22, which is FORBIDDEN
databases/mysql323-server       Vulnerable since 2006-10-29
databases/mysql323-client       Vulnerable since 2006-10-29
databases/mysql323-scripts      Vulnerable since 2006-10-29
databases/mysql40-server        Vulnerable since 2006-10-29
databases/mysql40-client        Vulnerable since 2006-10-29
databases/mysql40-scripts       Vulnerable since 2006-10-29
databases/p5-DBD-mysql40
                Depends on databases/mysql40-server, which is FORBIDDEN
deskutils/buoh                  Depends on devel/libsoup22, which is FORBIDDEN
deskutils/libopensync-plugin-syncml
(Only the first 15 lines of the commit message are shown above View all of this commit message)
26 Sep 2011 09:24:20
Original commit files touched by this commit  3.1.ESV,1
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Mark FORBIDDEN the remaining ports that are vulnerable for more than
2 weeks according to portaudit (ranging from 23 days to 7 years).
The maintainers were notified by mail that this action would be taken
on 2011-09-03. (Ports for which maintainers responded have been/will be
dealt with separately.)

Also mark DEPRECATED ports that rely on the FORBIDDEN ports, and a few
ports that rely on those DEPRECATED ports.
13 Oct 2008 12:03:15
Original commit files touched by this commit  3.1.1
 This port version is marked as vulnerable.
edwin search for other commits by this committer
(Re)Start the update of the 3.1 versions of the ISC DHCP software

Number of commits found: 3

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
chromiumAug 26
fileAug 21
py-djangoAug 21
py-django-develAug 21
py-django14Aug 21
py-django15Aug 21
php53Aug 18
phpmyadminAug 17
chromiumAug 13
serfAug 11
subversionAug 11
subversion17Aug 11
nginxAug 09
nginx-develAug 09
mingw32-opensslAug 06

6 vulnerabilities affecting 9 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds


Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 24505
Broken 219
Deprecated 739
Ignore 563
Forbidden 36
Restricted 261
No CDROM 101
Vulnerable 23
Expired 0
Set to expire 729
Interactive 0
new 24 hours 2
new 48 hours6
new 7 days53
new fortnight95
new month253

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.