notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Port details
doas Simple sudo alternative to run commands as another user
6.1 security on this many watch lists=5 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port 6.1Version of this port present on the latest quarterly branch.
Maintainer: jsmith@resonatingmedia.com search for ports maintained by this maintainer
Port Added: 2016-06-24 00:07:23
Last Update: 2019-08-04 16:43:27
SVN Revision: 508097
License: BSD2CLAUSE ISCL
Description:
SVNWeb : Homepage
pkg-plist: as obtained via: make generate-plist
Expand this list (7 items)
  1. bin/doas
  2. man/man5/doas.conf.5.gz
  3. man/man1/doas.1.gz
  4. /usr/local/share/licenses/doas-6.1/catalog.mk
  5. /usr/local/share/licenses/doas-6.1/LICENSE
  6. /usr/local/share/licenses/doas-6.1/BSD2CLAUSE
  7. /usr/local/share/licenses/doas-6.1/ISCL
Collapse this list.
Dependency lines:
  • doas>0:security/doas
To install the port: cd /usr/ports/security/doas/ && make install clean
To add the package: pkg install doas
PKGNAME: doas
Flavors: there is no flavor information for this port.
distinfo:

Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Build dependencies:
  1. gmake : devel/gmake
This port is required by:
for Run
  1. net-mgmt/networkmgr

Configuration Options

USES:

Master Sites:
  1. https://codeload.github.com/slicer69/doas/tar.gz/6.1?dummy=/

Number of commits found: 16

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
04 Aug 2019 15:43:27
Original commit files touched by this commit  6.1
Revision:508097
kai search for other commits by this committer
security/doas: Update to 6.1

* Update the pkg-message to give users that install/upgrade the port some
  info about the changed behavior regarding the environment variables. [1]

* Make the configuration of target user's sanitized $PATH that is set at
  compile time more flexible by enabling users to configure it via
  _GLOBAL_PATH. [2]

* Also pet portlint/portclippy by placing USES to the top of the USES block
  and remove the superfluous occurence of GH_PROJECT while I'm here.

Changelog:

* Most environment variables are no longer copied to the target user's
(Only the first 15 lines of the commit message are shown above View all of this commit message)
19 Jul 2019 05:15:07
Original commit files touched by this commit  6.0p3
Revision:506905 This port version is marked as vulnerable.
tobik search for other commits by this committer
security/doas: Convert pkg-message to UCL
18 Mar 2019 21:02:01
Original commit files touched by this commit  6.0p3
Revision:496207 This port version is marked as vulnerable.
swills search for other commits by this committer
security/doas: Port update to 6.0p3

PR:		236465
Submitted by:	jsmith@resonatingmedia.com (maintainer)
12 Oct 2017 14:22:57
Original commit files touched by this commit  6.0p2
Revision:451880 This port version is marked as vulnerable.
vanilla search for other commits by this committer
Update to 6.0p2.

PR:		222936
Submitted by:	maintainer
06 Sep 2017 10:03:52
Original commit files touched by this commit  6.0p1
Revision:449334 This port version is marked as vulnerable.
tobik search for other commits by this committer
security/doas: Update to 6.0p1

This update brings the security/doas port up to date with upstream.
This gives us the added benefit of restricted path searching.  Which
means if the admin puts a relative path in the doas.conf file, doas
will limit the number of places where the executable can be found.
This prevents users from putting malicious executables with the same
name in their custom path.

PR:		222092
Submitted by:	jsmith@resonatingmedia.com (maintainer)
MFH:		2017Q3
22 Feb 2017 14:52:56
Original commit files touched by this commit  6.0p0
Revision:434585 This port version is marked as vulnerable.
jrm search for other commits by this committer
security/doas: Update to version 6.0p.

- Pull tarball from a GitHub release rather than a commit.
- Update license information.  There is code under BSD2CLAUSE and code
  under ISCL.

PR:		217176
Submitted by:	jsmith@resonatingmedia.com (maintainer)
Approved by:	mat, swills (mentor, implicit)
Differential Revision:	https://reviews.freebsd.org/D9664
07 Dec 2016 07:04:19
Original commit files touched by this commit  5.9p7
Revision:428036 This port version is marked as vulnerable.
wen search for other commits by this committer
- Update to 5.9p7

PR:		214414
Submitted by:	jsmith@resonatingmedia.com(maintainer)
01 Oct 2016 15:10:15
Original commit files touched by this commit  5.9p6
Revision:423070 This port version is marked as vulnerable.
pawel search for other commits by this committer
Update to version 5.9p6

PR:		212975
Submitted by:	maintainer
24 Aug 2016 15:31:58
Original commit files touched by this commit  5.9p5
Revision:420802 This port version is marked as vulnerable.
woodsb02 search for other commits by this committer
security/doas: Update to 5.9p5

This update enforces the correct uid and gid when -u switch is used.

PR:		211622
Reported by:	telnetuserid@sdf.org
Submitted by:	jsmith@resonatingmedia.com (maintainer)
Approved by:	koobs, adamw (mentors)
Relnotes:	https://github.com/slicer69/doas/releases/tag/v5.9-5
Differential Revision:	https://reviews.freebsd.org/D7630
05 Jul 2016 21:13:30
Original commit files touched by this commit  5.9p4
Revision:418113 This port version is marked as vulnerable.
naddy search for other commits by this committer
Update to 5.9p4, which fixes a bug where command output is not displayed
properly when the user authenticates with "nopass" specified in the
doas.conf configuration file.

PR:		210851
Submitted by:	jsmith@resonatingmedia.com (maintainer)
27 Jun 2016 18:58:52
Original commit files touched by this commit  5.9p2
Revision:417675 This port version is marked as vulnerable.
pi search for other commits by this committer
security/doas: 5.9p1 -> 5.9p2

- fixed a bug where, when the user authenticates successfully as root,
  only the user's effective user id (euid) becomes zero (0).
  This leads to file permission errors when performing upgrades or
  other file-oriented operations.
- introduced gmake as a dependency as it is needed to process upstream's
  makefile.

PR:		210596
Submitted by:	jsmith@resonatingmedia.com (maintainer)
25 Jun 2016 11:41:18
Original commit files touched by this commit  5.9p1
Revision:417463 This port version is marked as vulnerable.
roberto search for other commits by this committer
Fix filename in distinfo.

PR:		210553
Submitted by:	t@tobik.me
24 Jun 2016 23:17:39
Original commit files touched by this commit  5.9p1
Revision:417452 This port version is marked as vulnerable.
roberto search for other commits by this committer
Change PORTREVISION to something sensible as upstream did not change.

Reported by:	mat
24 Jun 2016 21:00:07
Original commit files touched by this commit  5.9
Revision:417446 This port version is marked as vulnerable.
roberto search for other commits by this committer
Missed the fact that ${ETCDIR} includes the port's name.

Submitted by:	@mordin_ on Twitter.
24 Jun 2016 20:34:30
Original commit files touched by this commit  5.9
Revision:417445 This port version is marked as vulnerable.
roberto search for other commits by this committer
Update to commit 720db72 to fix a security issue.

Reported by:	Bryan Steele (@canadianbryan on Twitter)
24 Jun 2016 00:07:14
Original commit files touched by this commit  5.9
Revision:417407 This port version is marked as vulnerable.
roberto search for other commits by this committer
New port: security/doas

The doas program allows users to run commands as another user (usually
root). The doas program was written by the OpenBSD team to provide a
lightweight, simplified (and more secure) alternative to the sudo command.

Original upstream (OpenBSD) source:
http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/doas/

FreeBSD version: https://github.com/slicer69/doas

NOTE: I added the two patch files to workaround issues mentioned in the PR
about hardcoding of /usr/local.

PR:		210473
Submitted by:	jsmith@resonatingmedia.com
Modified by:	jrm@ftfl.ca (see PR) and me (roberto)

Number of commits found: 16

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
vlcAug 20
nsdAug 19
libgit2Aug 18
xdmAug 18
apache24Aug 17
userminAug 17
webminAug 17
cupsAug 16
libnghttp2Aug 16
nghttp2Aug 16
doas*Aug 15
traefikAug 15
nginx*Aug 14
nginx-devel*Aug 14
gitlab-ceAug 13

16 vulnerabilities affecting 93 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2019-08-20 15:29:04


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 37274
Broken 457
Deprecated 148
Ignore 715
Forbidden 3
Restricted 162
No CDROM 74
Vulnerable 34
Expired 8
Set to expire 118
Interactive 0
new 24 hours 24
new 48 hours26
new 7 days50
new fortnight92
new month143

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2019 Dan Langille. All rights reserved.