| Port details on branch 2026Q1 |
- traefik High availability reverse proxy and load balancer
- 3.6.12 net
=0 3.6.13Version of this port present on the latest quarterly branch. - Maintainer: riggs@FreeBSD.org
 - Port Added: 2026-01-25 01:42:26
- Last Update: 2026-03-29 08:54:43
- Commit Hash: 7b92e8f
- License: MIT
- WWW:
- https://traefik.io/
- Description:
- Traefik (pronounced like traffic) is a modern HTTP reverse proxy and load
balancer made to deploy microservices with ease. It supports several backends
(Docker, Swarm mode, Kubernetes, Marathon, Consul, Etcd, Rancher, Amazon ECS,
and a lot more) to manage its configuration automatically and dynamically.
¦ ¦ ¦ ¦ 
- Manual pages:
- FreshPorts has no man page information for this port.
- pkg-plist: as obtained via:
make generate-plist - USE_RC_SUBR (Service Scripts)
-
- Dependency lines:
-
- To install the port:
- cd /usr/ports/net/traefik/ && make install clean
- To add the package, run one of these commands:
- pkg install net/traefik
- pkg install traefik
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.- PKGNAME: traefik
- Flavors: there is no flavor information for this port.
- distinfo:
- TIMESTAMP = 1774763348
SHA256 (traefik-3.6.12.tar.xz) = 473fdfe39c5ce59b6570aec49e433d1d3a1633b5ce315594d5144c7949b51972
SIZE (traefik-3.6.12.tar.xz) = 26376628
No package information for this port in our database- Sometimes this happens. Not all ports have packages. Perhaps there is a build error. Check the fallout link:

- Dependencies
- NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
- Build dependencies:
-
- go-bindata : devel/go-bindata
- go125 : lang/go125
- There are no ports dependent upon this port
Configuration Options:
- No options to configure
- Options name:
- net_traefik
- USES:
- cpe go:1.25+,modules tar:xz
- pkg-message:
- For install:
- Note that traefik starts as unpriviliged user. Thus, it cannot
bind to privileged ports (by default, ports below 1024) and
will exit when configured to do so.
If traefik should serve ports in the privileged range, there
are options to achieve this:
- Have traffic bind to an unprivileged port and use the
packet filter configuration to redirect requests to the
desired privileged port to the unprivileged port in
traefik's configuration file e.g. the rdr rules in pf(4).
- The mac_portacl kernel module allows unprivileged processes
to bind to privileged ports.
- If upgrading from < 2.0:
- The version 2 of Traefik requires manual configuration changes
when migrating from a legacy v1 version to v2.
Please consult the Traefik migration guide at
https://doc.traefik.io/traefik/migration/v1-to-v2/
for details on how to adapt existing configuration files.
Note that there is a tool that can automate migration and
rewrite existing configuration files (at least partially):
https://github.com/traefik/traefik-migration-tool
- Master Sites:
|
| Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
| Commit | Credits | Log message |
3.6.12 29 Mar 2026 08:54:43
    |
Thomas Zander (riggs)  |
net/traefik: Update to upstream release 3.6.12
Details:
- Bugfix release, see
https://github.com/traefik/traefik/releases/tag/v3.6.12
- Includes security fixes:
- BasicAuth/DigestAuth Identity Spoofing via Non-Canonical headerField
- Update dependency for a previously vulnerable gRPC-go implementation
MFH: 2026Q1
Security: CVE-2026-33433
CVE-2026-33186
(cherry picked from commit 3c1a911846043a4d046d8a985393fa04273f52ce) |
3.6.11 22 Mar 2026 05:42:13
    |
Thomas Zander (riggs)  |
net/traefik: Update to upstream release 3.6.11
Details:
- Bugfix release, see
https://github.com/traefik/traefik/releases/tag/v3.6.11
- Includes security fixes for several vulnerabilities.
CVE-2026-32595 (BasicAuth Middleware Timing Attack)
CVE-2026-32305 (Potential mTLS Bypass via Fragmented TLS ClientHello)
CVE-2026-32695 (Details not yet available)
MFH: 2026Q1
Security: CVE-2026-32595
CVE-2026-32305
CVE-2026-32695
(cherry picked from commit e89149eb3df13071ab04a340ae8f6caa322730c0) |
3.6.10 08 Mar 2026 16:52:24
    |
Thomas Zander (riggs)  |
net/traefik: Update to upstream version 3.6.10
Details:
- Bugfix release, see
https://github.com/traefik/traefik/releases/tag/v3.6.10
MFH: 2026Q1
(cherry picked from commit d01300137d234c4dfa739f8eff5a064e41057f65) |
3.6.9_1 06 Mar 2026 03:52:43
    |
Adam Weinberger (adamw)  |
various: Bump ports for Go 1.25.8
This is a direct commit to 2026Q1. |
3.6.9 28 Feb 2026 21:07:52
    |
Thomas Zander (riggs)  |
net/traefik: Update to upstream release 3.6.9
Details:
- Bug and documentation fixes, see
https://github.com/traefik/traefik/releases/tag/v3.6.9
MFH: 2026Q1
(cherry picked from commit a2bced47f0b9dc62054719f53ad969244dcb4d09) |
3.6.8 14 Feb 2026 21:12:38
    |
Thomas Zander (riggs)  |
net/traefik: Update to upstream release 3.6.8
Details:
- Bugfix release, see
https://github.com/traefik/traefik/releases/tag/v3.6.8
- Includes a fix for CVE-2026-25949, a potential DoS
MFH: 2026Q1
Security: CVE-2026-25949
(cherry picked from commit f164467debd4f96830fe08297306d502f03b1c3f) |
3.6.7 07 Feb 2026 18:40:59
    |
Thomas Zander (riggs)  |
net/traefik: Update to upstream release 3.6.7
Details:
- Bugfix release, see
https://github.com/traefik/traefik/releases/tag/v3.6.7
- Addresses a potential DoS vulnerability, see
https://github.com/traefik/traefik/security/advisories/GHSA-cwjm-3f7h-9hwq
- This may require an update to the traefik configuration:
https://doc.traefik.io/traefik/v3.6/migrate/v3/#v367
MFH: 2026Q1
Security: CVE-2026-22045
(cherry picked from commit a18d213f915268dbb7346b8ff1550ed418c3afff) |
3.6.6_2 05 Feb 2026 18:02:36
    |
Adam Weinberger (adamw)  |
various: Bump Go ports for 1.24.13
This is a direct commit to 2026Q1. |
3.6.6_1 25 Jan 2026 01:35:05
    |
Adam Weinberger (adamw)  |
various: Bump dependent ports for Go 1.24.12.
This is a direct commit to 2026Q1. |