FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

I am looking for an LTO tape library. Do you have one to spare?
Port details
isc-dhcp31-server 3.1.ESV_1,1 net Deleted on this many watch lists=11 search for ports that depend on this port An older version of this port was marked as vulnerable.
The ISC Dynamic Host Configuration Protocol server
Was Maintained by: jpaetzel@FreeBSD.org search for ports maintained by this maintainer
Port Added: 13 Oct 2008 11:14:38
License: not specified in port
The ISC Dynamic Host Configuration Protocol Distribution provides a
freely redistributable reference implementation of all aspects of the
DHCP protocol, through a suite of DHCP tools:

  * A DHCP server (this port)
  * A DHCP client
  * A DHCP relay agent

Version 3 of the ISC DHCP Distribution includes the following features
that are new since version 2.0:

  * DHCP Failover Protocol support
  * OMAPI, an API for accessing and modifying the DHCP server and client state
  * Conditional behaviour
  * Storing arbitrary information on leases
  * Address pools with access control
  * Client classing
  * Address allocation restriction by class
  * Relay agent information option support 
  * Dynamic DNS updates
  * Many bug fixes, performance enhancements, and minor new DHCP protocol
    features. 

WWW: http://www.isc.org/products/DHCP/
SVNWeb : Main Web Site : Distfiles Availability : PortsMonThere are no ports dependent upon this port

No installation instructions: this port has been deleted.

The package name of this deleted port was: isc-dhcp31-server


Configuration Options
===> The following configuration options are available for isc-dhcp31-server-3.1.ESV_1,1:
     DHCP_PARANOIA=on (default) "add -user, -group and -chroot options"
     DHCP_JAIL=on (default) "add -chroot and -jail options"
     DHCP_SOCKETS=off (default) "use sockets instead of /dev/bpf (jail-only)"
     OPENSSL_BASE=on (default) "use the base system OpenSSL (required by TLS)"
     OPENSSL_PORT=off (default) "use OpenSSL from ports (required by TLS)"
===> Use 'make config' to modify these settings

Master Sites:
  1. ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/distfiles/
  2. ftp://ftp.ciril.fr/pub/isc/dhcp/
  3. ftp://ftp.ciril.fr/pub/isc/dhcp/dhcp-3.1-history/
  4. ftp://ftp.dti.ad.jp/pub/net/isc/dhcp/
  5. ftp://ftp.dti.ad.jp/pub/net/isc/dhcp/dhcp-3.1-history/
  6. ftp://ftp.freenet.de/pub/ftp.isc.org/isc/dhcp/
  7. ftp://ftp.freenet.de/pub/ftp.isc.org/isc/dhcp/dhcp-3.1-history/
  8. ftp://ftp.funet.fi/pub/mirrors/ftp.isc.org/isc/dhcp/
  9. ftp://ftp.funet.fi/pub/mirrors/ftp.isc.org/isc/dhcp/dhcp-3.1-history/
  10. ftp://ftp.iij.ad.jp/pub/network/isc/dhcp/
  11. ftp://ftp.iij.ad.jp/pub/network/isc/dhcp/dhcp-3.1-history/
  12. ftp://ftp.isc.org/isc/dhcp/
  13. ftp://ftp.isc.org/isc/dhcp/dhcp-3.1-history/
  14. ftp://ftp.mirrorservice.org/sites/ftp.isc.org/isc/dhcp/
  15. ftp://ftp.mirrorservice.org/sites/ftp.isc.org/isc/dhcp/dhcp-3.1-history/
  16. ftp://ftp.nominum.com/pub/isc/dhcp/
  17. ftp://ftp.nominum.com/pub/isc/dhcp/dhcp-3.1-history/
  18. ftp://ftp.ntua.gr/pub/net/isc/isc/dhcp/
  19. ftp://ftp.ntua.gr/pub/net/isc/isc/dhcp/dhcp-3.1-history/
  20. ftp://ftp.ripe.net/mirrors/sites/ftp.isc.org/isc/dhcp/
  21. ftp://ftp.ripe.net/mirrors/sites/ftp.isc.org/isc/dhcp/dhcp-3.1-history/
  22. ftp://ftp.sunet.se/pub/network/isc/dhcp/
  23. ftp://ftp.sunet.se/pub/network/isc/dhcp/dhcp-3.1-history/
  24. ftp://ftp.task.gda.pl/mirror/ftp.isc.org/isc/dhcp/
  25. ftp://ftp.task.gda.pl/mirror/ftp.isc.org/isc/dhcp/dhcp-3.1-history/
  26. ftp://ftp.u-aizu.ac.jp/pub/net/isc/dhcp/
  27. ftp://ftp.u-aizu.ac.jp/pub/net/isc/dhcp/dhcp-3.1-history/
Port Moves
  • port deleted on 2011-10-14
    REASON: Vulnerable since 2011-04-10
  • port moved here from net/isc-dhcp30-server on 2010-07-09
    REASON: Has expired: deprecated upstream since March 2009

Number of commits found: 22

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
14 Oct 2011 22:30:49
Original commit files touched by this commit  3.1.ESV_1,1
dougb search for other commits by this committer
As previously advertised, complete removal of vulnerable ports that
no one has stepped up to deal with:

archivers/pecl-phar             Vulnerable since 2011-01-13
comms/libsyncml                 Depends on devel/libsoup22, which is FORBIDDEN
databases/mysql323-server       Vulnerable since 2006-10-29
databases/mysql323-client       Vulnerable since 2006-10-29
databases/mysql323-scripts      Vulnerable since 2006-10-29
databases/mysql40-server        Vulnerable since 2006-10-29
databases/mysql40-client        Vulnerable since 2006-10-29
databases/mysql40-scripts       Vulnerable since 2006-10-29
databases/p5-DBD-mysql40
                Depends on databases/mysql40-server, which is FORBIDDEN
deskutils/buoh                  Depends on devel/libsoup22, which is FORBIDDEN
deskutils/libopensync-plugin-syncml
(Only the first 15 lines of the commit message are shown above View all of this commit message)
14 Aug 2011 01:44:11
Original commit files touched by this commit  3.1.ESV_1,1
wxs search for other commits by this committer
- Update to 3.1-ESV-R3 to address DoS issue.

PR:             ports/159698
Submitted by:   wxs@
Approved by:    jpaetzel@ (maintainer)
Security:       510b630e-c43b-11e0-916c-00e0815b8da8
10 Jul 2011 03:24:46
Original commit files touched by this commit  3.1.ESV,1
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Expand CONFLICTS to handle isc-dhcp42 and beyond

Prompted by:    sunpoet
15 May 2011 02:49:17
Original commit files touched by this commit  3.1.ESV,1
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Remove painful examples of foo="", with particular prejudice against
constructions that parse out to [ -z "$foo" ] && foo=""

These are bad examples that get copied and pasted into new code, so the
hope is that with less bad examples there will be less need for me to
bring this up in review.

In a few of these files all that were changed were comments so that next
time I search for these patterns I won't trip on the file for no reason.

In a few places, add $FreeBSD$

No functional changes, so no PORTREVISION bumps
20 Mar 2011 12:54:45
Original commit files touched by this commit  3.1.ESV,1
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Get Rid MD5 support
14 Oct 2010 15:45:39
Original commit files touched by this commit  3.1.ESV,1
 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Upgrade to 3.1-ESV, the final release in the 3.1.x branch
Support will be ending soon, users are encouraged to migrate to 4.1.x
26 Jun 2010 13:16:09
Original commit files touched by this commit  3.1.3_1
 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Long overdue change to get dhcp31 to match dhcp30's behavior of using a static
UID/GID

PR:     ports/127995
Submitted by:   Ashish Shukla <wahjava@gmail.com>
Approved by:    itetcu@ (mentor)
Feature safe:   yes
09 Jun 2010 00:34:31
Original commit files touched by this commit  3.1.3_1
 This port version is marked as vulnerable.
wxs search for other commits by this committer
Don't register conflicts with a package that is gone. Don't bump
PORTREVISION as it's not necessary to rebuild just for this.
06 May 2010 20:32:16
Original commit files touched by this commit  3.1.3_1
 This port version is marked as vulnerable.
wxs search for other commits by this committer
Set net/isc-dhcp30-* as DEPRECATED. It's EOL by authors.
Set net/isc-dhcp30-* to expire in just under one month.
Add CONFLICTS for net/isc-dhcp3[0-1]-* and bump PORTREVISION for this.
27 Mar 2010 00:15:24
Original commit files touched by this commit  3.1.3
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Begin the process of deprecating sysutils/rc_subr by
s#. %%RC_SUBR%%#. /etc/rc.subr#
17 Oct 2009 11:15:45
Original commit files touched by this commit  3.1.3
 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Update to 3.1.3

Approved by:    itetcu@ (mentor)
02 Sep 2009 13:47:05
Original commit files touched by this commit  3.1.2p1_2
 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Fix syntax errors in rcNG script

PR:     ports/138461
Submitted by:   Neil Darlow <neil@darlow.co.uk>
Approved by:    itetcu@ (mentor)
30 Jul 2009 00:16:51
Original commit files touched by this commit  3.1.2p1_1
 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Fix bug in rcNG script for restart action.

Approved by:    itetcu@ (mentor)
29 Jul 2009 01:43:57
Original commit files touched by this commit  3.1.2p1
 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Fixup typo in patch that affected whitespace.
pointyhat to me

Approved by:    itetcu@ (mentor)
28 Jul 2009 12:42:29
Original commit files touched by this commit  3.1.2p1
 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Fix typo in patch

Approved by:    itetcu@ (mentor)
27 Jul 2009 23:30:43
Original commit files touched by this commit  3.1.2p1
 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Update to 3.1.2p1
add jail support
add a checkconfig function to rcNG script to aid restarting

PR:     ports/136890
Approved by:    itetcu@ (mentor)
15 Jul 2009 16:56:10
Original commit files touched by this commit  3.1.1
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Fix a few "bad example" problems in the rc.d scripts that have been
propogated by copy and paste.

1. Primarily the "empty variable" default assignment, which is mostly
${name}_flags="", but fix a few others as well.
2. Where they are not already documented, add the existence of the _flags
(or other deleted empties) option to the comments, and in some cases add
comments from scratch.
3. Replace things that look like:
prefix=%%PREFIX%%
command=${prefix}/sbin/foo
to just use %%PREFIX%%. In many cases the $prefix variable is only used
once, and in some cases it is not used at all.
4. In a few cases remove ${name}_flags from command_args
5. Remove a long-stale comment about putting the port's rc.d script in
/etc/rc.d (which is no longer necessary).

No PORTREVISION bumps because all of these changes are noops.
12 Jun 2009 15:24:15
Original commit files touched by this commit  3.1.1
 This port version is marked as vulnerable.
wxs search for other commits by this committer
- Minor grammar fixes.

Approved by:    jpaetzel (maintainer)
12 May 2009 22:31:41
Original commit files touched by this commit  3.1.1
 This port version is marked as vulnerable.
linimon search for other commits by this committer
Reassign these ports to new volunteer; current maintainer has been
inactive for 3 months and has not responded to email.
06 Jan 2009 17:59:31
Original commit files touched by this commit  3.1.1
 This port version is marked as vulnerable.
pav search for other commits by this committer
- Remove conditional checks for FreeBSD 5.x and older
13 Oct 2008 12:03:15
Original commit files touched by this commit  3.1.1
 This port version is marked as vulnerable.
edwin search for other commits by this committer
(Re)Start the update of the 3.1 versions of the ISC DHCP software
13 Oct 2008 11:11:18
Original commit files touched by this commit  3.0.5_2
 This port version is marked as vulnerable.
edwin search for other commits by this committer
Give warning about the not-yet-being-integrated of the newer versions of the
isc-dhcp daemons.

Number of commits found: 22

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
ntpDec 20
ntp-develDec 20
gitDec 19
otrsDec 16
mod_dav_svnDec 15
subversionDec 15
subversion16Dec 15
subversion17Dec 15
nvidia-driverDec 14
nvidia-driver-173Dec 14
nvidia-driver-304Dec 14
asterisk11Dec 11
bind99Dec 11
xorg-serverDec 10
unboundDec 09

10 vulnerabilities affecting 27 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 24434
Broken 144
Deprecated 70
Ignore 397
Forbidden 2
Restricted 207
No CDROM 93
Vulnerable 19
Expired 0
Set to expire 65
Interactive 0
new 24 hours 3
new 48 hours3
new 7 days25
new fortnight41
new month136

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.