notbug ipv6 ready As an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photos
All times are UTC
Ukraine
Port details on branch 2026Q1
traefik High availability reverse proxy and load balancer
3.6.12 net on this many watch lists=0 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout 3.6.13Version of this port present on the latest quarterly branch.
Maintainer: riggs@FreeBSD.org search for ports maintained by this maintainer
Port Added: 2026-01-25 01:42:26
Last Update: 2026-03-29 08:54:43
Commit Hash: 7b92e8f
License: MIT
WWW:
https://traefik.io/
Description:
Traefik (pronounced like traffic) is a modern HTTP reverse proxy and load balancer made to deploy microservices with ease. It supports several backends (Docker, Swarm mode, Kubernetes, Marathon, Consul, Etcd, Rancher, Amazon ECS, and a lot more) to manage its configuration automatically and dynamically.
Homepage    cgit ¦ Codeberg ¦ GitHub ¦ GitLab ¦ SVNWeb - no subversion history for this port

Manual pages:
FreshPorts has no man page information for this port.
pkg-plist: as obtained via: make generate-plist
Expand this list (6 items)
Collapse this list.
  1. bin/traefik
  2. @sample etc/traefik.toml.sample
  3. @sample etc/traefik.yml.sample
  4. /usr/local/share/licenses/traefik-3.6.12/catalog.mk
  5. /usr/local/share/licenses/traefik-3.6.12/LICENSE
  6. /usr/local/share/licenses/traefik-3.6.12/MIT
Collapse this list.
USE_RC_SUBR (Service Scripts)
  • traefik
Dependency lines:
  • traefik>0:net/traefik
To install the port:
cd /usr/ports/net/traefik/ && make install clean
To add the package, run one of these commands:
  • pkg install net/traefik
  • pkg install traefik
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.
PKGNAME: traefik
Flavors: there is no flavor information for this port.
distinfo:
TIMESTAMP = 1774763348 SHA256 (traefik-3.6.12.tar.xz) = 473fdfe39c5ce59b6570aec49e433d1d3a1633b5ce315594d5144c7949b51972 SIZE (traefik-3.6.12.tar.xz) = 26376628

No package information for this port in our database
Sometimes this happens. Not all ports have packages. Perhaps there is a build error. Check the fallout link: pkg-fallout
Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Build dependencies:
  1. go-bindata : devel/go-bindata
  2. go125 : lang/go125
There are no ports dependent upon this port

Configuration Options:
No options to configure
Options name:
net_traefik
USES:
cpe go:1.25+,modules tar:xz
pkg-message:
For install:
Note that traefik starts as unpriviliged user. Thus, it cannot bind to privileged ports (by default, ports below 1024) and will exit when configured to do so. If traefik should serve ports in the privileged range, there are options to achieve this: - Have traffic bind to an unprivileged port and use the packet filter configuration to redirect requests to the desired privileged port to the unprivileged port in traefik's configuration file e.g. the rdr rules in pf(4). - The mac_portacl kernel module allows unprivileged processes to bind to privileged ports.
If upgrading from < 2.0:
The version 2 of Traefik requires manual configuration changes when migrating from a legacy v1 version to v2. Please consult the Traefik migration guide at https://doc.traefik.io/traefik/migration/v1-to-v2/ for details on how to adapt existing configuration files. Note that there is a tool that can automate migration and rewrite existing configuration files (at least partially): https://github.com/traefik/traefik-migration-tool
Master Sites:
Expand this list (4 items)
Collapse this list.
  1. http://distcache.FreeBSD.org/local-distfiles/riggs/traefik/
  2. http://distcache.eu.FreeBSD.org/local-distfiles/riggs/traefik/
  3. http://distcache.us-east.FreeBSD.org/local-distfiles/riggs/traefik/
  4. http://distcache.us-west.FreeBSD.org/local-distfiles/riggs/traefik/
Collapse this list.

Number of commits found: 9

Commit History - (may be incomplete: for full details, see links to repositories near top of page)
CommitCreditsLog message
3.6.12
29 Mar 2026 08:54:43
commit hash: 7b92e8f2febe00589dab26e570efd60e84175743commit hash: 7b92e8f2febe00589dab26e570efd60e84175743commit hash: 7b92e8f2febe00589dab26e570efd60e84175743commit hash: 7b92e8f2febe00589dab26e570efd60e84175743 files touched by this commit
Thomas Zander (riggs) search for other commits by this committer
net/traefik: Update to upstream release 3.6.12

Details:
- Bugfix release, see
  https://github.com/traefik/traefik/releases/tag/v3.6.12
- Includes security fixes:
  - BasicAuth/DigestAuth Identity Spoofing via Non-Canonical headerField
  - Update dependency for a previously vulnerable gRPC-go implementation

MFH:		2026Q1
Security:	CVE-2026-33433
		CVE-2026-33186
(cherry picked from commit 3c1a911846043a4d046d8a985393fa04273f52ce)
3.6.11
22 Mar 2026 05:42:13
commit hash: 3fb20ded9c749dc2c1c2f7610f098f05af344a02commit hash: 3fb20ded9c749dc2c1c2f7610f098f05af344a02commit hash: 3fb20ded9c749dc2c1c2f7610f098f05af344a02commit hash: 3fb20ded9c749dc2c1c2f7610f098f05af344a02 files touched by this commit This port version is marked as vulnerable.
Thomas Zander (riggs) search for other commits by this committer
net/traefik: Update to upstream release 3.6.11

Details:
- Bugfix release, see
  https://github.com/traefik/traefik/releases/tag/v3.6.11
- Includes security fixes for several vulnerabilities.
  CVE-2026-32595 (BasicAuth Middleware Timing Attack)
  CVE-2026-32305 (Potential mTLS Bypass via Fragmented TLS ClientHello)
  CVE-2026-32695 (Details not yet available)

MFH:		2026Q1
Security:	CVE-2026-32595
		CVE-2026-32305
		CVE-2026-32695
(cherry picked from commit e89149eb3df13071ab04a340ae8f6caa322730c0)
3.6.10
08 Mar 2026 16:52:24
commit hash: 6c56c0f3c601f52a5b20b0a00c627c039fc6d51fcommit hash: 6c56c0f3c601f52a5b20b0a00c627c039fc6d51fcommit hash: 6c56c0f3c601f52a5b20b0a00c627c039fc6d51fcommit hash: 6c56c0f3c601f52a5b20b0a00c627c039fc6d51f files touched by this commit This port version is marked as vulnerable.
Thomas Zander (riggs) search for other commits by this committer
net/traefik: Update to upstream version 3.6.10

Details:
- Bugfix release, see
  https://github.com/traefik/traefik/releases/tag/v3.6.10

MFH:		2026Q1
(cherry picked from commit d01300137d234c4dfa739f8eff5a064e41057f65)
3.6.9_1
06 Mar 2026 03:52:43
commit hash: ef8f442a3f6b40cbf3668a21fe541ebe8c8a07c9commit hash: ef8f442a3f6b40cbf3668a21fe541ebe8c8a07c9commit hash: ef8f442a3f6b40cbf3668a21fe541ebe8c8a07c9commit hash: ef8f442a3f6b40cbf3668a21fe541ebe8c8a07c9 files touched by this commit This port version is marked as vulnerable.
Adam Weinberger (adamw) search for other commits by this committer
various: Bump ports for Go 1.25.8

This is a direct commit to 2026Q1.
3.6.9
28 Feb 2026 21:07:52
commit hash: ff34b7ad2536f9e6a294a540008c0cd073c1d2f4commit hash: ff34b7ad2536f9e6a294a540008c0cd073c1d2f4commit hash: ff34b7ad2536f9e6a294a540008c0cd073c1d2f4commit hash: ff34b7ad2536f9e6a294a540008c0cd073c1d2f4 files touched by this commit This port version is marked as vulnerable.
Thomas Zander (riggs) search for other commits by this committer
net/traefik: Update to upstream release 3.6.9

Details:
- Bug and documentation fixes, see
  https://github.com/traefik/traefik/releases/tag/v3.6.9

MFH:		2026Q1
(cherry picked from commit a2bced47f0b9dc62054719f53ad969244dcb4d09)
3.6.8
14 Feb 2026 21:12:38
commit hash: ed351f94173146452c313d565d3973ee3f9f47ddcommit hash: ed351f94173146452c313d565d3973ee3f9f47ddcommit hash: ed351f94173146452c313d565d3973ee3f9f47ddcommit hash: ed351f94173146452c313d565d3973ee3f9f47dd files touched by this commit This port version is marked as vulnerable.
Thomas Zander (riggs) search for other commits by this committer
net/traefik: Update to upstream release 3.6.8

Details:
- Bugfix release, see
  https://github.com/traefik/traefik/releases/tag/v3.6.8
- Includes a fix for CVE-2026-25949, a potential DoS

MFH:		2026Q1
Security:	CVE-2026-25949
(cherry picked from commit f164467debd4f96830fe08297306d502f03b1c3f)
3.6.7
07 Feb 2026 18:40:59
commit hash: cf182c9f2a75aebacda6042ed61685e4c74064a8commit hash: cf182c9f2a75aebacda6042ed61685e4c74064a8commit hash: cf182c9f2a75aebacda6042ed61685e4c74064a8commit hash: cf182c9f2a75aebacda6042ed61685e4c74064a8 files touched by this commit This port version is marked as vulnerable.
Thomas Zander (riggs) search for other commits by this committer
net/traefik: Update to upstream release 3.6.7

Details:
- Bugfix release, see
  https://github.com/traefik/traefik/releases/tag/v3.6.7
- Addresses a potential DoS vulnerability, see
  https://github.com/traefik/traefik/security/advisories/GHSA-cwjm-3f7h-9hwq
- This may require an update to the traefik configuration:
  https://doc.traefik.io/traefik/v3.6/migrate/v3/#v367

MFH:		2026Q1
Security:	CVE-2026-22045
(cherry picked from commit a18d213f915268dbb7346b8ff1550ed418c3afff)
3.6.6_2
05 Feb 2026 18:02:36
commit hash: 010c6554e1ed5ef4312705d922e942eb4b0edc1dcommit hash: 010c6554e1ed5ef4312705d922e942eb4b0edc1dcommit hash: 010c6554e1ed5ef4312705d922e942eb4b0edc1dcommit hash: 010c6554e1ed5ef4312705d922e942eb4b0edc1d files touched by this commit This port version is marked as vulnerable.
Adam Weinberger (adamw) search for other commits by this committer
various: Bump Go ports for 1.24.13

This is a direct commit to 2026Q1.
3.6.6_1
25 Jan 2026 01:35:05
commit hash: ca7bf6089bffdf18221d51adecc35589d666a2a9commit hash: ca7bf6089bffdf18221d51adecc35589d666a2a9commit hash: ca7bf6089bffdf18221d51adecc35589d666a2a9commit hash: ca7bf6089bffdf18221d51adecc35589d666a2a9 files touched by this commit This port version is marked as vulnerable.
Adam Weinberger (adamw) search for other commits by this committer
various: Bump dependent ports for Go 1.24.12.

This is a direct commit to 2026Q1.

Number of commits found: 9