FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

Port details
openafs AFS implementation from openafs.org
1.6.18.20160101 net on this many watch lists=4 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port
Ignore IGNORE: requires kernel configuration file GENERIC to build
Maintainer: bjk@FreeBSD.org search for ports maintained by this maintainer
Port Added: 25 May 2011 00:27:09
Also Listed In: kld
License: IPLv1
AFS is a distributed filesystem product, pioneered at Carnegie Mellon
University and supported and developed as a product by Transarc Corporation
(now IBM Pittsburgh Labs). It offers a client-server architecture for
federated file sharing and replicated read-only content distribution,
providing location independence, scalability, security, and transparent
migration capabilities. AFS is available for a broad range of heterogeneous
systems including UNIX, Linux, MacOS X, and Microsoft Windows.

IBM branched the source of the AFS product, and made a copy of the source
available for community development and maintenance. They called the
release OpenAFS.

WWW: http://www.openafs.org/
SVNWeb : Homepage : PortsMon

To install the port: cd /usr/ports/net/openafs/ && make install clean

A package is not available for ports marked as: Forbidden / Broken / Ignore / Restricted

PKGNAME: openafs

distinfo:

TIMESTAMP = 1464147602
SHA256 (openafs-1.6.18-src.tar.bz2) = b3c35e7be6b6c86b91e7c699fd015f53c87bc19d1ae8ec3ec9cda6b97327d3b6
SIZE (openafs-1.6.18-src.tar.bz2) = 14645551
SHA256 (openafs-1.6.18-doc.tar.bz2) = c6a72f5a8c6982202f4b19b038e76abe439f3ce2f867f39ebb6dcce943bf0a84
SIZE (openafs-1.6.18-doc.tar.bz2) = 3533400
SHA256 (CellServDB.2016-01-01) = ef37a1cc73c90619e9b6a0ab0fa8602c57c9da8ae5e65aab96cb17e2bc1bf70e
SIZE (CellServDB.2016-01-01) = 37058

There are no ports dependent upon this port


Configuration Options
===> The following configuration options are available for openafs-1.6.18.20160101:
     FUSE=off: FUSE (Filesystem in Userspace) support
===> Use 'make config' to modify these settings

USES:
cpe kmod tar:bzip2 compiler

Master Sites:
    There is no master site for this port.
Notes from UPDATING
These upgrade notes are taken from /usr/ports/UPDATING
  • 2013-07-25
    Affects: users of net/openafs
    Author: bjk@FreeBSD.org
    Reason: 
      The OpenAFS 1.6.5 release is a security release which requires substantial
      configuration changes to the AFS servers in addition to the software update,
      in order to be fully protected.  The entry for OPENAFS-SA-2013-003 on
      http://www.openafs.org/security/ has links to the upgrade documentation.
      The procedure involves rekeying the cell to a non-DES krb5 key, stored in
      a krb5 keytab named rxkad.keytab in PREFIX/etc/openafs/server/.
    
    

Number of commits found: 41

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
04 Sep 2016 07:53:07
Original commit files touched by this commit  1.6.18.20160101
Revision:421309
amdmi3 search for other commits by this committer
- Mark BROKEN in 11+: does not build: no member named 'b_saveaddr' in 'struct
buf'

Approved by:	portmgr blanket
27 May 2016 00:05:07
Original commit files touched by this commit  1.6.18.20160101
Revision:415920
bjk search for other commits by this committer
Update net/openafs to upstream 1.6.18

This includes the changes in 1.6.17, a security release.

PR:		209534
Approved by:	mat (ports committer)
Security:	CVE-2016-2860
28 Oct 2015 20:55:40
Original commit files touched by this commit  1.6.15.20150713
Revision:400419 This port version is marked as vulnerable.
bjk search for other commits by this committer
Update net/openafs to 1.6.15, a security release

OPENAFS-SA-2015-007 (CVE-2015-7762, CVE-2015-7763): rx ACK packets
leak plaintext of previous packets.

Approved by:	feld (ports-secteam, ports committer)
Security:	OPENAFS-SA-2015-007, CVE-2015-7762, CVE-2015-7763
16 Oct 2015 11:56:38
Original commit files touched by this commit  1.6.13.20130128
Revision:399434 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Extend danfe's fix to unbreak on amd64 as well

Suggested by:	danfe
Approved by:	portmgr blanket
MFH:		2015Q4
12 Oct 2015 19:08:08
Original commit files touched by this commit  1.6.13.20130128
Revision:399149 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Mark BROKEN on 10.2: does not build. It was not fixed by previous commit by
danfe@

make[4]: don't know how to make ./param.amd64_fbsd_102.h. Stop

Approved by:	portmgr blanket
09 Sep 2015 08:01:00
Original commit files touched by this commit  1.6.13.20130128
Revision:396453 This port version is marked as vulnerable.
danfe search for other commits by this committer
Unbreak the build on FreeBSD 10.2 (until official support arrives).
08 Sep 2015 18:41:05
Original commit files touched by this commit  1.6.13.20130128
Revision:396425 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Mark BROKEN on 10.2: does not build

make[4]: don't know how to make ./param.amd64_fbsd_102.h. Stop

Approved by:	portmgr blanket
30 Jul 2015 04:49:05
Original commit files touched by this commit  1.6.13.20130128
Revision:393218 This port version is marked as vulnerable.
bjk search for other commits by this committer
Update to upstream openafs security release 1.6.13

OPENAFS-SA-2015-001 - vos leaks stack data onto the wire in the clear
when creating vldb entries

OPENAFS-SA-2015-002 - bos commands can be spoofed, including some
which alter server state

OPENAFS-SA-2015-003 - pioctls leak kernel memory contents

OPENAFS-SA-2015-004 - kernel pioctl support for OSD command passing can
trigger a panic

OPENAFS-SA-2015-006 - Buffer overflow in OpenAFS vlserver

Approved by:	delphij (ports committer)
MFH:		2015Q3
Security:	CVE-2015-3282, CVE-2015-3283, CVE-2015-3284, CVE-2015-3285
13 Apr 2015 13:30:08
Original commit files touched by this commit  1.6.10.20130128_1
Revision:383916 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Add CPE info

Approved by:	portmgr blanket
25 Mar 2015 23:51:06
Original commit files touched by this commit  1.6.10.20130128_1
Revision:382278 This port version is marked as vulnerable.
marino search for other commits by this committer
net category: Remove $PTHREAD_LIBS

openafs did not pass check-plist (pre-existing) so fixed and bumped.
Also, pkg-plist was sorted.  mediatomb and spread also fail plist-checks
but they weren't fixed.

approved by:	PTHREAD blanket
12 Nov 2014 23:02:46
Original commit files touched by this commit  1.6.10.20130128
Revision:372506 This port version is marked as vulnerable.
hrs search for other commits by this committer
Fix build on 11.X after r273707 (__FreeBSD_version: 1100041).

Approved by:	bjk (maintainer)
24 Oct 2014 19:42:48
Original commit files touched by this commit  1.6.10.20130128
Revision:371461 This port version is marked as vulnerable.
ak search for other commits by this committer
- Update to 1.6.10 [1]
  * Add support for FreeBSD 9.3 and 10.1
  * Remove a bug preventing the use of a disk cache on FreeBSD clients (as
opposed to a memory cache)
- Remove obsolete OSVERSION check
- Unmute install commands

PR:	194362 [1]
Submitted by:	Benjamin Kaduk <bjk@FreeBSD.org> (maintainer) [1]
23 Sep 2014 10:28:10
Original commit files touched by this commit  1.6.9.20130128
Revision:369026 This port version is marked as vulnerable.
bapt search for other commits by this committer
Simplify plist
11 Sep 2014 08:40:58
Original commit files touched by this commit  1.6.9.20130128
Revision:367910 This port version is marked as vulnerable.
hrs search for other commits by this committer
Update to 1.6.9.

Submitted by:	bjk (maintainer)
22 Aug 2014 09:01:52
Original commit files touched by this commit  1.6.7.20130128
Revision:365619 This port version is marked as vulnerable.
antoine search for other commits by this committer
IBM Public License allows distribution
09 Apr 2014 14:38:27
Original commit files touched by this commit  1.6.7.20130128
Revision:350715 This port version is marked as vulnerable.
zi search for other commits by this committer
- Update to 1.6.7

Submitted by:	bjk@ (maintainer)
Security:	c0c31b27-bff3-11e3-9d09-000c2980a9f3
18 Feb 2014 03:50:18
Original commit files touched by this commit  1.6.6.20130128
Revision:344833 This port version is marked as vulnerable.
hrs search for other commits by this committer
- Update to 1.6.6.
- Fix build on 10 or later.
- Add STAGEDIR support.
- Use USES=kmod.
- Use *_USES, CONFIGURE_OFF instead of PORT_OPTIONS:MFUSE.
- Use ${CFLAGS} for XCFLAGS.
- Style cleanups.

Approved by:	bjk (maintainer)
02 Dec 2013 05:01:20
Original commit files touched by this commit  1.6.5.20130128_1
Revision:335451 This port version is marked as vulnerable.
hrs search for other commits by this committer
Update to 1.6.5.

Submitted by:	bjk (maintainer)
PR:		ports/183946
20 Sep 2013 22:10:25
Original commit files touched by this commit  1.6.5.20130128
Revision:327755 This port version is marked as vulnerable.
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
net)
14 Aug 2013 22:35:54
Original commit files touched by this commit  1.6.5.20130128
Revision:324744  Sanity Test Failure This port version is marked as vulnerable.
ak search for other commits by this committer
- Remove MAKE_JOBS_SAFE variable

Approved by:	portmgr (bdrewery)
25 Jul 2013 18:29:27
Original commit files touched by this commit  1.6.5.20130128
Revision:323659 This port version is marked as vulnerable.
bjk (doc committer) search for other commits by this committer
Update to 1.6.5

This is a security release by upstream, and requires configuration changes
in addition to the software update.  See UPDATING.

Reviewed by:	ports-security (zi, remko)
Approved by:	hrs (mentor, ports committer)
04 Jul 2013 18:40:02
Original commit files touched by this commit  1.6.4.20130128
Revision:322286 This port version is marked as vulnerable.
bjk (doc committer) search for other commits by this committer
Update to 1.6.4

Build fixes for 10-CURRENT will come in a separate commit.

Approved by:	hrs (mentor, ports committer)
03 Jun 2013 19:26:50
Original commit files touched by this commit  1.6.2.20130128
Revision:319802 This port version is marked as vulnerable.
crees search for other commits by this committer
Restore a couple of patches to fix plist, and add missed manpage

Submitted by:	QAT (glad you're back!)
03 Jun 2013 18:29:51
Original commit files touched by this commit  1.6.2.20130128
Revision:319798 This port version is marked as vulnerable.
crees search for other commits by this committer
Update to 1.6.2

* Fix buffer overflows in fileserver and ptserver.
* Fix rare file corruption during background sync (Gerrit 8796).
* Fix corrupting clients' metadata cache during certain errors (Gerrit 6957).
* Fix cache corruption when reading from a file another client is simultaneously
writing to (Gerrit 7994).
* Fix fileservers to properly report >2 TiB partitions.

and some other less serious changes.

PR:		ports/179259
Submitted by:	Adam Nowacki <nowak@tepeserwery.pl>
Submitted by:	bjk (maintainer)
Security:	CVE-2013-1794
06 Mar 2013 16:52:02
Original commit files touched by this commit  1.6.1.20110814_1
Revision:313527 This port version is marked as vulnerable.
bapt search for other commits by this committer
Convert USE_FUSE macros into USES feature.

While here trim headers
Convert some USE_GNOME= gnomehack -> USES= pathfix
04 Jan 2013 21:06:26
Original commit files touched by this commit  1.6.1.20110814_1
Revision:309940 This port version is marked as vulnerable.
hrs search for other commits by this committer
- Fix build on 10.0-CURRENT.
- Update MAINTAINER line.
- Drop kaserver (kerberos4) support.

Submitted by:	bjk
14 Dec 2012 15:47:01
Original commit files touched by this commit  1.6.1.20110814
Revision:308910 This port version is marked as vulnerable.
flo search for other commits by this committer
- introduce a USE_FUSE macro
- convert all fuse ports to use the new macro

The macro makes sure sysutils/fusefs-libs gets installed and depending on
fuse being in base or not it installs sysutils/fusefs-kmod.

Approved by:	portmgr (bapt)
06 Jul 2012 02:45:26
Original commit files touched by this commit  1.6.1.20110814
 This port version is marked as vulnerable.
hrs search for other commits by this committer
- Update to 1.6.1.
- Mark MAKE_JOBS_SAFE=yes.
- Use OPTIONSng.

Submitted by:   bjk (maintainer)
14 Jan 2012 08:57:23
Original commit files touched by this commit  1.6.0.20110814_3
 This port version is marked as vulnerable.
dougb search for other commits by this committer
In the rc.d scripts, change assignments to rcvar to use the
literal name_enable wherever possible, and ${name}_enable
when it's not, to prepare for the demise of set_rcvar().

In cases where I had to hand-edit unusual instances also
modify formatting slightly to be more uniform (and in
some cases, correct). This includes adding some $FreeBSD$
tags, and most importantly moving rcvar= to right after
name= so it's clear that one is derived from the other.
09 Dec 2011 13:10:24
Original commit files touched by this commit  1.6.0.20110814_3
 This port version is marked as vulnerable.
scheidell search for other commits by this committer
-Add patch to compile on 9.x [1]
-Fixed patch, with addition by maintainer [2]

PR:             163133
Submitted by:   William Ewing <will@skaion.com> [1]
Reviewed by:    Benjamin Kaduk <kaduk@MIT.EDU> (maintainer) [2]
Approved by:    Benjamin Kaduk <kaduk@MIT.EDU> (maintainer), gabor (mentor)
Feature safe:   yes
27 Nov 2011 08:42:19
Original commit files touched by this commit  1.6.0.20110814_2
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Unbreak build on 9.0

PR:             162901
Submitted by:   maintainer
Feature safe:   yes
24 Oct 2011 04:17:38
Original commit files touched by this commit  1.6.0.20110814_1
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Remove more tags from pkg-descr files fo the form:

- Name
em@i.l

or variations thereof. While I'm here also fix some whitespace and other
formatting errors, including moving WWW: to the last line in the file.
15 Oct 2011 00:37:24
Original commit files touched by this commit  1.6.0.20110814_1
 This port version is marked as vulnerable.
zi search for other commits by this committer
- Resolve build failures in 9.0-STABLE and 10-CURRENT

PR:             ports/161405, ports/161366
Submitted by:   Ben Kaduk <kaduk@mit.edu> (maintainer)
19 Sep 2011 19:58:16
Original commit files touched by this commit  1.6.0.20110814
 This port version is marked as vulnerable.
pawel search for other commits by this committer
Upgrade to the final OpenAFS 1.6.0 release

PR:             ports/160808
Submitted by:   Ben Kaduk <kaduk@mit.edu> (maintainer)
Approved by:    miwi, wen (mentors implicit)
20 Aug 2011 15:43:54
Original commit files touched by this commit  1.6.0.p7.20110814
 This port version is marked as vulnerable.
crees search for other commits by this committer
Apparently 1.6.0.p7.d20110814 < 1.6.0.p7, so cut the 'd' to keep numerical order

PR:             ports/159829
drosomail:      crees
19 Aug 2011 17:46:28
Original commit files touched by this commit  1.6.0.p7.d20110814
 This port version is marked as vulnerable.
crees search for other commits by this committer
Update database version, and ensure they're versioned in future.

PR:             ports/159829
Submitted by:   Ben Kaduk <kaduk@mit.edu> (maintainer)
19 Jul 2011 21:49:20
Original commit files touched by this commit  1.6.0.p7
 This port version is marked as vulnerable.
zi search for other commits by this committer
Update to 1.6.0pre7
Redirect config output to /dev/null
Add LICENSE

PR:             ports/158961
Submitted by:   Ben Kaduk <kaduk@mit.edu> [maintainer]
Approved by:    wxs (mentor)
04 Jul 2011 02:48:04
Original commit files touched by this commit  1.6.0.p6_2
 This port version is marked as vulnerable.
sunpoet search for other commits by this committer
- Mark CONFLICTS between net/openafs and net/coda6_server: both install
sbin/backup
- Bump PORTREVISION for PLIST change

PR:             ports/158584
Submitted by:   Ben Kaduk <kaduk@mit.edu> (maintainer of net/openafs)
27 Jun 2011 03:33:55
Original commit files touched by this commit  1.6.0.p6_1
 This port version is marked as vulnerable.
hrs search for other commits by this committer
- Add directories for mount points and caching.
- Fix linker.hints leftover.
- Fix build in the case that $KERNCONF has multiple configuration files.

Submitted by:   Benjamin Kaduk (maintainer)
20 Jun 2011 07:09:36
Original commit files touched by this commit  1.6.0.p6
 This port version is marked as vulnerable.
hrs search for other commits by this committer
Update to 1.6.0pre6.

Submitted by:   Benjamin Kaduk (maintainer)
25 May 2011 00:09:37
Original commit files touched by this commit  1.6.0.p3
 This port version is marked as vulnerable.
wxs search for other commits by this committer
AFS is a distributed filesystem product, pioneered at Carnegie Mellon
University and supported and developed as a product by Transarc Corporation
(now IBM Pittsburgh Labs). It offers a client-server architecture for
federated file sharing and replicated read-only content distribution,
providing location independence, scalability, security, and transparent
migration capabilities. AFS is available for a broad range of heterogeneous
systems including UNIX, Linux, MacOS X, and Microsoft Windows.

IBM branched the source of the AFS product, and made a copy of the source
available for community development and maintenance. They called the
release OpenAFS.

WWW: http://www.openafs.org/

PR:             ports/152467
Submitted by:   Ben Kaduk <kaduk@mit.edu>

Number of commits found: 41

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
openssl*Sep 23
openssl-devel*Sep 23
irssi*Sep 22
irssi*Sep 22
firefoxSep 20
firefox*Sep 20
firefox-esrSep 20
firefox-esr*Sep 20
libxulSep 20
libxul*Sep 20
linux-firefoxSep 20
linux-firefox*Sep 20
linux-seamonkeySep 20
linux-seamonkey*Sep 20
linux-thunderbirdSep 20

13 vulnerabilities affecting 38 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 26270
Broken 376
Deprecated 219
Ignore 640
Forbidden 0
Restricted 199
No CDROM 83
Vulnerable 61
Expired 15
Set to expire 205
Interactive 0
new 24 hours 5
new 48 hours7
new 7 days30
new fortnight58
new month111

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.