FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

I am looking for an LTO tape library. Do you have one to spare?
Port details
socat 1.7.2.4 net on this many watch lists=12 search for ports that depend on this port An older version of this port was marked as vulnerable.
Multipurpose relay and more
Maintained by: ehaupt@FreeBSD.org search for ports maintained by this maintainer
Port Added: 18 May 2002 16:51:41
Also Listed In: ipv6
License: GPLv2


socat is a relay for bidirectional data transfer between two independent
data channels. Each of these data channels may be a file, pipe, device
(terminal or modem etc.), socket (UNIX, IP4, IP6 - raw, UDP, TCP), a file
descriptor (stdin etc.), a program, or an arbitrary combination of two of
these.

socat can be used, e.g., as TCP relay (one-shot or daemon), as an external
socksifier, for attacking weak firewalls, as a shell interface to UNIX
sockets, IP6 relay, for redirecting TCP oriented programs like brutus to a
serial line, or to establish a relatively secure environment (su and chroot)
for running client or server shell scripts with network connections.

WWW: http://www.dest-unreach.org/socat/
SVNWeb : Main Web Site : Distfiles Availability : PortsMon

NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Required To Build:
  1. security/openssl
Required To Run:
  1. security/openssl

This port is required by:

for Run * - deleted ports are only shown under the This port is required by section. It was harder to do for the Required section. Perhaps later...

To install the port: cd /usr/ports/net/socat/ && make install clean
To add the package: pkg install net/socat


Configuration Options
===> The following configuration options are available for socat-1.7.2.4:
     DOCS=on: Build and/or install documentation
===> Use 'make config' to modify these settings

Master Sites:
  1. ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/distfiles/
  2. ftp://ftp.c.saper.info/distfiles/
  3. http://critical.ch/distfiles/
  4. http://energy.critical.ch/distfiles/
  5. http://fneu.fr/distfiles/
  6. http://snow.critical.ch/distfiles/
  7. http://www.dest-unreach.org/socat/download/

Number of commits found: 58

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
18 Mar 2014 14:26:58
Original commit files touched by this commit  1.7.2.4
Revision:348550
ehaupt search for other commits by this committer
Quiesce mkdir
14 Mar 2014 10:15:52
Original commit files touched by this commit  1.7.2.4
Revision:348200
ehaupt search for other commits by this committer
Convert USE_BZIP2=yes to USES=tar:bzip2
10 Mar 2014 07:09:35
Original commit files touched by this commit  1.7.2.4
Revision:347717
ehaupt search for other commits by this committer
Update to 1.7.2.4
12 Feb 2014 19:24:43
Original commit files touched by this commit  1.7.2.3
Revision:343985
ehaupt search for other commits by this committer
Now that this port is staged and DOCS defined we can stop testing for DOCS in
any install target.
04 Feb 2014 18:26:29
Original commit files touched by this commit  1.7.2.3
Revision:342584
sunpoet search for other commits by this committer
- Respect PREFIX
- Use procname instead of hardcoded /usr/local/bin/socat

Submitted by:	sunpoet (myself)
Approved by:	ehaupt (maintainer)
29 Jan 2014 07:32:29
Original commit files touched by this commit  1.7.2.3
Revision:341683
ehaupt search for other commits by this committer
Update to 1.7.2.3, this fixes a security issue, where socats PROXY-CONNECT
address was vulnerable to a buffer overflow with data provided on the command
line.

Security:       CVE-2014-0019
27 Jan 2014 11:50:59
Original commit files touched by this commit  1.7.2.2_2
Revision:341381 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
This patch will make the socat rc script more reliable. [1]

While here, use 'compiler' USES macro to determine compiler type.

PR:		185946 [1]
Submitted by:	feld
23 Oct 2013 13:50:36
Original commit files touched by this commit  1.7.2.2_1
Revision:331386 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Support staging.
20 Sep 2013 22:10:25
Original commit files touched by this commit  1.7.2.2_1
Revision:327755 This port version is marked as vulnerable.
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
net)
04 Aug 2013 15:57:41
Original commit files touched by this commit  1.7.2.2_1
Revision:324242 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Change the clang detector to use a pattern match instead of a conditional
define and always test. This fixes build on 9-STABLE and saves some shell
commands.

PR:		181007
Submitted by:	"r4721@tormail.org" <r4721@tormail.org>
03 Aug 2013 20:33:46
Original commit files touched by this commit  1.7.2.2_1
Revision:324202 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Fix logic in clang detection.

Notified by:	crees
24 Jul 2013 08:19:07
Original commit files touched by this commit  1.7.2.2_1
Revision:323578 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Remove MAKE_JOBS_SAFE which is now default.
15 Jul 2013 12:56:17
Original commit files touched by this commit  1.7.2.2_1
Revision:323029 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Make sure the binaries are linked against the port OpenSSL libraries when
and only when WITH_OPENSSL_PORT is defined.

PR:             180395 (based on)
Submitted by:   "r4721@tormail.org" <r4721@tormail.org>
28 May 2013 09:27:20
Original commit files touched by this commit  1.7.2.2
Revision:319300 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Rework previous commit. The problem is not clang 3.3 but rather the fact that
with 1000024 CC became 'cc' rather than 'clang'.
28 May 2013 09:12:08
Original commit files touched by this commit  1.7.2.2
Revision:319299 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Handle clang 3.3 fallout. I wish we had a __FreeBSD_version tag from when the
clang 3.3 import happened, that way we wouldn't have to resort to such hacks.
26 May 2013 21:34:55
Original commit files touched by this commit  1.7.2.2
Revision:319137 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Update to 1.7.2.2

Security:	CVE-2013-3571
08 Mar 2013 06:40:13
Original commit files touched by this commit  1.7.2.1_1
Revision:313620 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Change rc script to launch socat using daemon and remove the unnecessary
wrapper script.

PR:		176321
Submitted by:	Mark Felder <feld@feld.me>
15 Jan 2013 13:40:29
Original commit files touched by this commit  1.7.2.1
Revision:310443 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
- Use DOC instead of NOPORTDOCS
- Pacify portlint
- Convert header
04 Sep 2012 02:58:37
Original commit files touched by this commit  1.7.2.1
Revision:303632 This port version is marked as vulnerable.
linimon search for other commits by this committer
Mark as broken on ARM.

Approved by:	maintainer
21 May 2012 07:10:03
Original commit files touched by this commit  1.7.2.1
 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Fix build with clang

PR:             168164
Submitted by:   bapt
14 May 2012 18:42:14
Original commit files touched by this commit  1.7.2.1
 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Update to 1.7.2.1
14 Apr 2012 19:05:46
Original commit files touched by this commit  1.7.2.0_1
 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Fix startup script issue with a wrapper script obtained from www/gatling.

This wrapper tries to emulate part of the functionality usually supplied by
software like daemontools or runit. It is used to start socat which does not
daemonize itself and logs to stdout/stderr. It redirects stdout and stderr to
logger(1) via a fifo.

While here also remove if-statement around PORTDOCS based on NOPORTDOCS since
it's redundant with checks in ports/Mk/bsd.ports.mk.

PR:             166947
Submitted by:   Mark Felder <feld@feld.me>
14 Jan 2012 08:57:23
Original commit files touched by this commit  1.7.2.0
 This port version is marked as vulnerable.
dougb search for other commits by this committer
In the rc.d scripts, change assignments to rcvar to use the
literal name_enable wherever possible, and ${name}_enable
when it's not, to prepare for the demise of set_rcvar().

In cases where I had to hand-edit unusual instances also
modify formatting slightly to be more uniform (and in
some cases, correct). This includes adding some $FreeBSD$
tags, and most importantly moving rcvar= to right after
name= so it's clear that one is derived from the other.
06 Dec 2011 08:49:25
Original commit files touched by this commit  1.7.2.0
 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
- Update to 1.7.2.0 (this release allows tun/tap interfaces without IP
  addresses)
- Remove the option to build without OpenSSL, we're supposed to provide
  sensible default configurations and options. Building a port without
  OpenSSL support in 2011 makes no sense. This has also been discussed at the
  Dev Summit 2011

Feature safe:   yes
25 Jan 2011 19:59:40
Original commit files touched by this commit  1.7.1.3
 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Add LICENSE and remove MD5 sums.

Feature safe:   yes
02 Aug 2010 08:58:12
Original commit files touched by this commit  1.7.1.3
 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Update to 1.7.1.3
27 Mar 2010 00:15:24
Original commit files touched by this commit  1.7.1.2
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Begin the process of deprecating sysutils/rc_subr by
s#. %%RC_SUBR%%#. /etc/rc.subr#
10 Jan 2010 22:35:14
Original commit files touched by this commit  1.7.1.2
 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Update to 1.7.1.2
16 Dec 2009 15:11:40
Original commit files touched by this commit  1.7.1.1
 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Update to 1.7.1.1
15 Jul 2009 16:56:10
Original commit files touched by this commit  1.7.0.0
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Fix a few "bad example" problems in the rc.d scripts that have been
propogated by copy and paste.

1. Primarily the "empty variable" default assignment, which is mostly
${name}_flags="", but fix a few others as well.
2. Where they are not already documented, add the existence of the _flags
(or other deleted empties) option to the comments, and in some cases add
comments from scratch.
3. Replace things that look like:
prefix=%%PREFIX%%
command=${prefix}/sbin/foo
to just use %%PREFIX%%. In many cases the $prefix variable is only used
once, and in some cases it is not used at all.
4. In a few cases remove ${name}_flags from command_args
5. Remove a long-stale comment about putting the port's rc.d script in
/etc/rc.d (which is no longer necessary).

No PORTREVISION bumps because all of these changes are noops.
27 Mar 2009 09:53:36
Original commit files touched by this commit  1.7.0.0
 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Mark MAKE_JOBS_SAFE
16 Jan 2009 16:50:02
Original commit files touched by this commit  1.7.0.0
 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Set PORTSCOUT in order to skip beta version of the distfile
15 Jan 2009 16:26:30
Original commit files touched by this commit  1.7.0.0
 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
- Update to 1.7.0.0
- Add ipv6 sub category
- Add additional master sites
- Provide an rc script
- Take maintainer-ship
20 Aug 2008 06:50:58
Original commit files touched by this commit  1.6.0.0_1
 This port version is marked as vulnerable.
linimon search for other commits by this committer
Reset nivo+kw+ports.bfa274@is-root.com due to lack of time to work
on FreeBSD at the moment.

Hat:            portmgr
06 Jun 2007 13:46:45
Original commit files touched by this commit  1.6.0.0_1
 This port version is marked as vulnerable.
pav search for other commits by this committer
- Incorporate Sainsbury's service name resolution patch:
  http://www.dest-unreach.org/socat/contrib/socat-servicenames.html
- Incorporate Lucq's file descriptor patch:
  http://www.dest-unreach.org/socat/contrib/socat-maxfds.html

PR:             ports/113283
Submitted by:   bf <bf2006a@yahoo.com>
Approved by:    Nils Vogels <nivo@is-root.com> (maintainer)
08 Apr 2007 16:31:14
Original commit files touched by this commit  1.6.0.0
 This port version is marked as vulnerable.
rafan search for other commits by this committer
- Update to 1.6.0.0

PR:             ports/111372
Submitted by:   Nils Vogels <nivo+kw+ports.bfa274 at is-root.com> (maintainer)
24 Sep 2006 11:46:10
Original commit files touched by this commit  1.5.0.0
 This port version is marked as vulnerable.
bsam search for other commits by this committer
- Update to 1.5.0.0
- Transfer maintainership to submitter

PR:             103556
Submitted by:   Nils Vogels <nivo+kw+ports.bfa274 at is-root.com>
05 Sep 2006 04:34:24
Original commit files touched by this commit  1.4.3.1_1
 This port version is marked as vulnerable.
linimon search for other commits by this committer
Reset inactive maintainer who has not responded to email.

Hat:            portmgr
29 Apr 2006 18:41:39
Original commit files touched by this commit  1.4.3.1_1
 This port version is marked as vulnerable.
mnag search for other commits by this committer
- Patches to make libwrap usage functional
- Bump PORTREVISION
- portlint(1)

PR:             93708
Submitted by:   Rudolf Cejka <cejkar___fit.vutbr.cz>
Approved by:    maintainer timeout (66 days)
14 Apr 2006 10:29:53
Original commit files touched by this commit  1.4.3.1
 This port version is marked as vulnerable.
brueffer search for other commits by this committer
Update to version 1.4.3.1.

The changes since 1.4.2.0 are listed on http://www.dest-unreach.org/socat/

Approved by:    markus, maintainer
22 Jan 2006 21:24:05
Original commit files touched by this commit  1.4.2.0
 This port version is marked as vulnerable.
edwin search for other commits by this committer
SHA256ify

Approved by: krion@
22 Jun 2005 10:11:05
Original commit files touched by this commit  1.4.2.0
 This port version is marked as vulnerable.
jylefort search for other commits by this committer
- Update to 1.4.2.0 [1]
- OPTIONSify
- Fix the packing list when NOPORTDOCS is defined
- Polish the Makefile

PR:             ports/82387 [1]
Submitted by:   maintainer [1]
12 Apr 2005 03:26:57
Original commit files touched by this commit  1.4.0.3
 This port version is marked as vulnerable.
obrien search for other commits by this committer
At Kris's request, back out the MACHINE_ARCH spelling correction until
after 5.4-RELEASE.
11 Apr 2005 08:04:41
Original commit files touched by this commit  1.4.0.3
 This port version is marked as vulnerable.
obrien search for other commits by this committer
Assist getting more ports working on AMD64 by obeying the
Ports Collection documentation and use 'ARCH' rather than 'MACHINE_ARCH'.
10 Nov 2004 23:18:53
Original commit files touched by this commit  1.4.0.3
 This port version is marked as vulnerable.
pav search for other commits by this committer
- Update to 1.4.0.3 and close vulnerability

PR:             ports/73783
Submitted by:   rik <freebsd-ports@rikrose.net> (maintainer)
19 Jul 2004 23:33:07
Original commit files touched by this commit  1.4.0.0_1
 This port version is marked as vulnerable.
eik search for other commits by this committer
socat 1.4.0.0 has buggy SOCKS4A code. The maintainer patch on the web site has
(probably had, now) a platform-specific bug,
which was resolved in conjunction with the socat author earlier. The problem
will be corrected in socat 1.4.0.1, but in the
meantime is provided separately. This patch adds the fix as a replacement
xio-socks.c.

I have also set myself as the maintainer as part of the patch below. I am
willing to take on maintainership of this port.

PR:             69317
Submitted by:   rik <freebsd-ports@rikrose.net>
30 Jun 2004 07:25:43
Original commit files touched by this commit  1.4.0.0
 This port version is marked as vulnerable.
krion search for other commits by this committer
Update to 1.4.0.0

PR:             ports/68483
Submitted by:   Nicolas Jombart <ecu@ipv42.net>
29 Jan 2004 16:13:06
Original commit files touched by this commit  1.3.2.2
 This port version is marked as vulnerable.
trevor search for other commits by this committer
SIZEify.
23 Oct 2003 06:28:01
Original commit files touched by this commit  1.3.2.2
 This port version is marked as vulnerable.
sergei search for other commits by this committer
- Update to 1.3.2.2

PR:             58291
Submmitted by:  Nicolas Jombart <ecu@ipv42.net>
Approved by:    krion (implicitly)
27 Aug 2003 12:07:01
Original commit files touched by this commit  1.3.2.1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update to 1.3.2.1

Submitted by:   Nicolas Jombart <ecu@ipv42.net>
PR:             56032
10 Jul 2003 07:22:59
Original commit files touched by this commit  1.3.2.0
 This port version is marked as vulnerable.
erwin search for other commits by this committer
Update net/socat: 1.3.1.0 -> 1.3.2.0

* A new mode allows you to directly connect an
  executed program to the other side of the relay.
* A couple of minor improvements and corrections
  have been made.

PR:             54284
Submitted by:   Kirill Ponomarew <ponomarew@oberon.net>
09 Jun 2003 10:57:27
Original commit files touched by this commit  1.3.1.0
 This port version is marked as vulnerable.
erwin search for other commits by this committer
Update net/socat to 1.3.1.0
Add a few docs
Change COMMENT to something < 70 chars

PR:             53083
Submitted by:   Nicolas Jombart <ecu@ipv42.net>
Approved by:    edwin (mentor)
20 Feb 2003 18:51:13
Original commit files touched by this commit  1.3.0.1
 This port version is marked as vulnerable.
knu search for other commits by this committer
De-pkg-comment.
03 Jan 2003 17:42:08
Original commit files touched by this commit  1.3.0.1
 This port version is marked as vulnerable.
arved search for other commits by this committer
Update to 1.3.0.1

PR:             46306
Submitted by:   KATO Tsuguru <tkato@prontomail.com>
05 Oct 2002 14:02:55
Original commit files touched by this commit  1.3.0.0
 This port version is marked as vulnerable.
ijliao search for other commits by this committer
upgrade to 1.3.0.0
28 Jun 2002 11:52:51
Original commit files touched by this commit  1.2.0.0
 This port version is marked as vulnerable.
ijliao search for other commits by this committer
upgrade to 1.2.0.0
31 May 2002 07:56:07
Original commit files touched by this commit  1.1.0.0
 This port version is marked as vulnerable.
ijliao search for other commits by this committer
upgrade to 1.1.0.0
14 May 2002 11:20:59
Original commit files touched by this commit  1.0.4.2
 This port version is marked as vulnerable.
ijliao search for other commits by this committer
add socat 1.0.4.2
A relay for bidirectional data transfer between two indep. data channels

Number of commits found: 58

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
otrsDec 16
mod_dav_svnDec 15
subversionDec 15
subversion16Dec 15
subversion17Dec 15
nvidia-driverDec 14
nvidia-driver-173Dec 14
nvidia-driver-304Dec 14
nvidia-driver-71Dec 14
nvidia-driver-96Dec 14
asterisk11Dec 11
bind99Dec 11
xorg-serverDec 10
unboundDec 09
freetype2Dec 07

11 vulnerabilities affecting 47 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds


Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 24437
Broken 139
Deprecated 70
Ignore 394
Forbidden 3
Restricted 206
No CDROM 93
Vulnerable 22
Expired 0
Set to expire 65
Interactive 0
new 24 hours 0
new 48 hours2
new 7 days29
new fortnight47
new month244

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.