FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

I am looking for an LTO tape library. Do you have one to spare?
Port details
mod_pubcookie 3.3.0 www Deleted on this many watch lists=0 search for ports that depend on this port This port version is marked as vulnerable.
Forbidden FORBIDDEN: vuxml:1ca8228f-858d-11e0-a76c-000743057ca2
Deprecated DEPRECATED: will be unsupported by ASF when 2.4.0 is release, migrate to 2.2.x+ now
Expired This port expired on: 2011-05-01
Ignore IGNORE: is forbidden: vuxml:1ca8228f-858d-11e0-a76c-000743057ca2
A single sign-on system for websites (apache module)
Was Maintained by: brooks@FreeBSD.org search for ports maintained by this maintainer
Port Added: 08 Feb 2006 03:07:04
Also Listed In: security
License: not specified in port


Pubcookie is an open-source package for intra-institutional
single-sign-on end-user web authentication. More generally, it is an
approach to identifying users as they browse to an institution's many
websites that require authentication. It helps an institution reuse
existing authentication services (like Kerberos, LDAP, or NIS), and it
limits the exposure of end-user passwords by ensuring they're only sent
to a trusted login service.

This port contains the Apache module portion of the Pubcookie system.

WWW: http://pubcookie.org/
SVNWeb : Main Web Site : Distfiles Availability : PortsMon

NOTE: FreshPorts displays only required dependencies information. Optional dependencies are not covered.

Required To Build:
  1. www/apache20
Required To Run:
  1. www/apache20
There are no ports dependent upon this port

No installation instructions: this port has been deleted.

The package name of this deleted port was: ap20-mod_pubcookie


Configuration Options
     No options to configure

Master Sites:
  1. ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/distfiles/
  2. http://pubcookie.org/downloads/
Port Moves
  • port deleted on 2011-06-01
    REASON: Has expired: will be unsupported by ASF when 2.4.0 is release, migrate to 2.2.x+ now

Number of commits found: 10

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
01 Jun 2011 21:55:13
Original commit files touched by this commit  3.3.0
 This port version is marked as vulnerable.
rene search for other commits by this committer
Remove expired ports:
2011-05-01 german/citrix_xenapp: "crashes with f10"
2011-05-01 japanese/citrix_xenapp: "crashes with f10"
2011-05-01 net/citrix_xenapp: "crashes with f10"
2011-05-11 comms/gammu-python: since version 1.29.0 comms/gammu uses python by
default
2011-05-01 java/gj: Upstream disapear and distfile is no more available
2011-05-09 net/ipv6socket_scrub: Upstream disapear and distfile is no more
available
2011-05-13 graphics/lodju: depends on rep-gtk, which doesn't build anymore.
2011-05-01 www/mod_pubcookie: will be unsupported by ASF when 2.4.0 is release,
migrate to 2.2.x+ now
2011-05-01 ftp/prozilla: Upstream disapear and distfile is no more available
2011-05-01 www/py-django11: Unsupported (no longer receive security updates or
bugfixes)
2011-05-13 x11-toolkits/rep-gtk: missing rep-config from librep port broke the
build.
2011-05-01 games/tnl: Upstream development has ceased, it doesn't work with
newer CEGUI and is generally broken
2011-06-01 net/vnc2swf: Development is now superseded by deskutils/vnc2flv
23 May 2011 23:04:41
Original commit files touched by this commit  3.3.0
 This port version is marked as vulnerable.
brooks search for other commits by this committer
Partially address several years of neglect of pubcookie.  Indicate the
security issues in two two ports.

I've not use pubcookie in several year and given the lack of complaint
about the deprication of mod_pubcookie, I doubt anyone else uses it from
ports.  The mod_pubcookie port has already expired and I've set a two
week expriation for pubcookie-login-server.  If not maintainer
appears I will send both to the Attic on June 6th.

While I'm here, address the use of CONF_FILES and CONF_DIRS in
pubcookie-login-server to avoid getting in the way of progress. [0]

PR:             ports/157164 [0]
Security:       vuxml:115a1389-858e-11e0-a76c-000743057ca2
                vuxml:1ca8228f-858d-11e0-a76c-000743057ca2
12 Dec 2010 08:44:49
Original commit files touched by this commit  3.3.0
 This port version is marked as vulnerable.
pgollucci search for other commits by this committer
- Corresponding to www/apache20 deprecation, deprecate ports
  that only build with www/apache20 (2.0.x)

With Hat:   apache
28 Oct 2010 21:00:21
Original commit files touched by this commit  3.3.0
 This port version is marked as vulnerable.
erwin search for other commits by this committer
Deprecate md5 in favour of sha256 checksums.  md5 checksums will no longer
be generated or checked, and will be silently ignored for now.  Also,
generalize the MD5_FILE macro to DISTINFO_FILO.

PR:             149657
Submitted by:   rene
Approved by:    portmgr
Tested on:      pointyhat i386 7-exp
27 May 2010 21:19:17
Original commit files touched by this commit  3.3.0
 This port version is marked as vulnerable.
pgollucci search for other commits by this committer
- 1/3:
    - apxs -a is install
    - apxs -A is uninstall

PR:             ports/147139
Reviewed by:    portmgr (pav)
With Hat:       apache@
25 May 2010 20:17:37
Original commit files touched by this commit  3.3.0
  Sanity Test Failure This port version is marked as vulnerable.
pgollucci search for other commits by this committer
Mk/bsd.apache.mk can not sufficiently alter things before Mk/bsd.options.mk
in Mk/bsd.ports.mk due to ordering in Mk/bsd.port.mk.  This causes OPTIONSFILE
to be incorrectly set during some make phases as a result of the recent
PKGNAMEPREFIX for apache ports.

'Revert' some of the PKGNAMEPREFIX changes for apXX-.
   - Must be manually requested in tbe port Makefile either by
     a) AP_FAST_BUILD=yes
     b) PKGNAMEPREFIX=${APACHE_PKGNAMEPREFIX}
   - Going forward, we will only do this for ports where WITH_APACHE
       is NOT optional, but required.  mod_* ports are a good fit.

141 ports are mod_ ports
  80 of those use AP_FAST_BUILD and thus are auto hooked by this patch [a].
  61 remaining are then patched to mirror the other $lang frameworks [b].

PR:             ports/146956
Reported by:    Hans F. Nordhaug <Hans.F.Nordhaug@hiMolde.no>, several
Discussed with: pav, itectu on #bsdports
Tested by:      P6 TB run
Approved by:    portmgr (pav)
21 May 2009 20:42:56
Original commit files touched by this commit  3.3.0
 This port version is marked as vulnerable.
pgollucci search for other commits by this committer
- Mark MAKE_JOBS_UNSAFE=yes

PR:             ports/134611
Approved by:    Pav (#bsdports)
05 Apr 2006 03:46:56
Original commit files touched by this commit  3.3.0
 This port version is marked as vulnerable.
brooks search for other commits by this committer
Upgrade pubcookie from 3.3.0-beta2 to 3.3.0a fixing serious XSS
vulnerabilities.
09 Feb 2006 23:43:50
Original commit files touched by this commit  3.3.0.b2
 This port version is marked as vulnerable.
brooks search for other commits by this committer
Actually compile on amd64.  This required copying in the config.guess
replacement code from bsd.port.mk because pubcookie lives in a
subdirectory of PREFIX and thus actually defining GNU_CONFIGURE won't
work.

Point hat:      brooks
08 Feb 2006 03:06:22
Original commit files touched by this commit  3.3.0.b2
 This port version is marked as vulnerable.
brooks search for other commits by this committer
Add www/mod_pubcookie:

Pubcookie is an open-source package for intra-institutional
single-sign-on end-user web authentication. More generally, it is an
approach to identifying users as they browse to an institution's many
websites that require authentication. It helps an institution reuse
existing authentication services (like Kerberos, LDAP, or NIS), and it
limits the exposure of end-user passwords by ensuring they're only sent
to a trusted login service.

This port contains the apache module portion of the Pubcookie system.

Number of commits found: 10

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
gpgmeAug 02
gpgme03Aug 02
kdelibs3Jul 31
kdelibs4Jul 31
torJul 30
torJul 30
tor-develJul 30
i2pJul 28
i2pJul 28
i2pJul 28
bugzilla44Jul 25
apache22Jul 24
apache22-event-mpmJul 24
apache22-itk-mpmJul 24
apache22-peruser-mpmJul 24

12 vulnerabilities affecting 38 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds


Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 24402
Broken 182
Deprecated 806
Ignore 517
Forbidden 16
Restricted 263
No CDROM 101
Vulnerable 27
Expired 1
Set to expire 793
Interactive 13
new 24 hours 6
new 48 hours12
new 7 days28
new fortnight42
new month117

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.