notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)

Hardware failure

The website is running on the old server. The new server stopped working at about 0200 UTC on 2020-08-22. The database was restored from 2020-08-21 00:59:15+00 UTC. We think we have covered all commits. Nothing should be missing. Any changes you made to your accounts after the restore date will be lost. Sorry about that.
Port details
openvpn-devel Secure IP/Ethernet tunnel daemon
202043 security on this many watch lists=9 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port View this port on Repology. 202035Version of this port present on the latest quarterly branch.
Maintainer: ecrist@secure-computing.net search for ports maintained by this maintainer
Port Added: 2006-08-19 14:30:20
Last Update: 2020-10-30 20:41:40
SVN Revision: 553714

People watching this port, also watch: sudo, rsync, postfix, openvpn, screen

Also Listed In: net net-vpn
License: GPLv2
Description:
SVNWeb : Homepage
pkg-plist: as obtained via: make generate-plist
Expand this list (15 items)
Collapse this list.
  1. /usr/local/share/licenses/openvpn-devel-202043/catalog.mk
  2. /usr/local/share/licenses/openvpn-devel-202043/LICENSE
  3. /usr/local/share/licenses/openvpn-devel-202043/GPLv2
  4. include/openvpn-msg.h
  5. include/openvpn-plugin.h
  6. lib/openvpn/plugins/openvpn-plugin-auth-pam.so
  7. lib/openvpn/plugins/openvpn-plugin-down-root.so
  8. man/man8/openvpn.8.gz
  9. sbin/openvpn
  10. libexec/openvpn-client.down
  11. libexec/openvpn-client.up
  12. sbin/openvpn-client
  13. @owner
  14. @group
  15. @mode
Collapse this list.
Dependency lines:
  • openvpn-devel>0:security/openvpn-devel
Conflicts:
CONFLICTS_INSTALL:
  • openvpn-2.[!4].*
  • openvpn-[!2].*
  • openvpn-beta-[0-9]*
  • openvpn-devel-[0-9]*
  • openvpn-mbedtls-[0-9]*
Conflicts Matches:
There are no Conflicts Matches for this port. This is usually an error.
To install the port: cd /usr/ports/security/openvpn-devel/ && make install clean
To add the package: pkg install openvpn-devel
PKGNAME: openvpn-devel
Flavors: there is no flavor information for this port.
distinfo:
Packages: (move your mouse over the cells for more information)
openvpn-devel
ABIlatestquarterly
FreeBSD:11:aarch64201821_3202016
FreeBSD:11:amd64202043202035
FreeBSD:11:armv6201607202016
FreeBSD:11:i386202043202035
FreeBSD:11:mips-202016
FreeBSD:11:mips64-202016
FreeBSD:12:aarch64201821_3202016
FreeBSD:12:amd64202043202035
FreeBSD:12:armv6201821_3202035
FreeBSD:12:armv7201821_3202035
FreeBSD:12:i386202043202035
FreeBSD:12:mips201821_3202016
FreeBSD:12:mips64201821_3202016
FreeBSD:12:powerpc64-202016
FreeBSD:13:aarch64202016-
FreeBSD:13:amd64202043-
FreeBSD:13:armv6202043-
FreeBSD:13:armv7202043-
FreeBSD:13:i386202043-
FreeBSD:13:mips201935-
FreeBSD:13:mips64--
FreeBSD:13:powerpc64202035-
 

Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Build dependencies:
  1. cmocka>=0 : sysutils/cmocka
  2. rst2man : textproc/py-docutils
  3. pkgconf>=1.3.0_1 : devel/pkgconf
Runtime dependencies:
  1. easy-rsa>=0 : security/easy-rsa
Library dependencies:
  1. liblzo2.so : archivers/lzo2
  2. liblz4.so : archivers/liblz4
There are no ports dependent upon this port

Configuration Options

USES:

Master Sites:
Expand this list (1 items)
    Collapse this list.
  1. https://secure-computing.net/files/openvpn/
  2. Collapse this list.
Notes from UPDATING
These upgrade notes are taken from /usr/ports/UPDATING
  • 2013-01-13
    Affects: users of security/openvpn*
    Author: mandree@FreeBSD.org
    Reason: 
      security/openvpn has been upgraded to the IPv6-capable v2.3.0.
      This upgrade moves easy-rsa into a separate package in
      security/easy-rsa that is pre-selected as default run-time dependency,
      and changes installed file layout a bit.
    
      security/openvpn22 retains the prior OpenVPN 2.2.2 version.
      If you want to continue using this version, use one of these commands:
    
      # portmaster -o security/openvpn22 security/openvpn
        or
      # portupgrade -o security/openvpn22 security/openvpn
        or
      # pkg set -o security/openvpn:security/openvpn22
    
      security/openvpn20 has been marked deprecated and to be removed
      in half a year's time.  Please migrate to a newer version soonish.
    
    
  • Expand this list ( items)Collapse this list.


  • 2010-01-07
    Affects: users of security/openvpn*
    Author: mandree@FreeBSD.org
    Reason: 
      security/openvpn has been moved to security/openvpn20 and upgraded to 2.0.9.
      security/openvpn has been upgraded to 2.1.1, and security/openvpn-devel has
      been removed.
    
      Regular upgrades of the security/openvpn port should succeed without
      manual intervention, but if you want to stick to openvpn 2.0 or if you
      had been using openvpn-devel, manual intervention is needed, as
      follows:
    
      If you'd been using the security/openvpn-devel port, please use one of
      these commands for upgrading:
    
        portmaster -m-DDISABLE_CONFLICTS -o security/openvpn security/openvpn-devel
    
        portupgrade -m-DDISABLE_CONFLICTS -o security/openvpn security/openvpn-devel
    
      If you want to stick to openvpn 2.0, please use one of these two
      upgrade commands:
    
        portmaster -m-DDISABLE_CONFLICTS -o security/openvpn20 security/openvpn
    
        portupgrade -m-DDISABLE_CONFLICTS -o security/openvpn20 security/openvpn
    
    
  • Collapse this list.

Number of commits found: 121 (showing only 100 on this page)

1 | 2  »  

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
30 Oct 2020 20:41:40
Original commit files touched by this commit  202043
Revision:553714
mandree search for other commits by this committer
openvpn-devel Update to post 2.5 release development snapshot.

=== Commit Notes ===
99d217b2 Remove --disable-def-auth configure argument
0d4ca79d Remove explicit setting of peer_id to false
cb70cf51 Remove NULL checks before calling free
2c8a9877 Align reliable_free with other free methods to accept NULL
0d5aab88 Inline function tls_get_peer_info
bbcada8a Avoid passing NULL to argv_printf_cat() in temp_file error case.
a4eeef17 Add function for common env setting of verify user/pass calls
a480eaae Ignore deprecation warning for daemon on macOS
14bd92b7 Fix compilation on pre-EKM mbedTLS libraries.
f0734e49 Simplify key material exporter backend API
6dc09d0d Implement generating data channel keys via EKM/RFC 5705
1e6e083e networking_iproute2: fix memory leak in net_iface_mtu_set()
(Only the first 15 lines of the commit message are shown above View all of this commit message)
28 Aug 2020 14:14:40
Original commit files touched by this commit  202035
Revision:546735
mandree search for other commits by this committer
security/openvpn-devel: Update to 2020-W35 snapshot (take 2 + 1/2)

This also adds a fix to the optional TUNNELBLICK extra-patch that removes
context now gone from the upstream code.

Here are the changes in the W35 snapshot:

136c5f01 Fix compilation with older mbed TLS versions (mbedtls_tls_prf_types
undefined)
5e19cc2c Workaround FreeBSD 12+ race condition on tun/tap open with IPv6.
10abd656 Refactor key_state_export_keying_material functions
62560e2a Fixes a bug in management_callback_send_cc_message, should be strlen
instead of sizeof
2ab0a924 Fix client's poor man NCP fallback
ed47c097 tun.c: enable using wintun driver under SYSTEM
2da29362 Improve the documentation for --dhcp-option
bf911882 Changes.rst: fix mistyped option names
(Only the first 15 lines of the commit message are shown above View all of this commit message)
11 Aug 2020 13:12:31
Original commit files touched by this commit  202033
Revision:544685
mandree search for other commits by this committer
security/openvpn-devel: Update to 2020-W33 snapshot

Update to Week 33 snapshot:

e02616d8 Document comp-lzo no and compress being incompatible
c13d20fa Remove S_OP_NORMAL key state.
4b4f5fe2 Move parsing IV_PROTO to separate function
4edcf571 Skip existing interfaces on opening the first available utun on macOS
42b39e98 Merge check_coarse_timers and check_coarse_timers_dowork
cd88d947 Eliminate check_tls wrapper function
eed645b3 Eliminate check_incoming_control_channel wrapper function
b7aebba2 Eliminate check_fragment function
76ea0859 Rename check_ping_restart_dowork to trigger_ping_timeout_signal
ce7ddaaf Split pf_check_reload check and check timer in process_coarse_timers
feacd01c travis: don't run t_net.sh test
(Only the first 15 lines of the commit message are shown above View all of this commit message)
21 Jul 2020 19:03:28
Original commit files touched by this commit  202030
Revision:542781
mandree search for other commits by this committer
security/openvpn-devel: update to 2020-W30 snapshot

This is from the PR, with the addition of
BUILD_DEPENDS+=rst2man:textproc/py-docutils
such that the manpage gets built (it doesn't ship with
snapshots - which are from Git - any longer).

changes:

08469ca1 Remove --client-cert-not-required
2d5facaa Remove --ifconfig-pool-linear
94edc7c5 Require AEAD support in the crypto library
ec7d0e8e Drop support for OpenSSL 1.0.1
df85950a travis: Fix make distcheck failure
aad16b6c client-connect: Implement deferred connect support for plugin API v2
(Only the first 15 lines of the commit message are shown above View all of this commit message)
17 Jul 2020 10:04:21
Original commit files touched by this commit  202028
Revision:542422
mandree search for other commits by this committer
security/openvpn-devel: Update to 202028 (2020-W28 snapshot)

ChangeLog:
<https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=247974#c0>

While here:
* add cmocka as build-time requisite to include the engine test.
* use PLUGINDIR rather than hacking CPPFLAGS for PLUGIN_LIBDIR,
  the latter breaks -fPIC detection by configure (breaking the
  shared lib build for the engine unit tests)

PR:		247974
Submitted by:	Eric F. Crist (maintainer)
20 Apr 2020 14:35:52
Original commit files touched by this commit  202016
Revision:532210
mandree search for other commits by this committer
Update to new snapshot 202016.

Git changes since 202015:

* 37bc691e 2020-04-15 | Fix illegal client float (CVE-2020-11810) [Lev Stipakov]
* 3b06b57d 2020-03-13 | Fix broken async push with NCP is used [Lev Stipakov]
* d8ac887c 2020-03-28 | Fix OpenSSL 1.1.1 not using auto elliptic curve
selection [Arne Schwabe]

Approved by:	ecrist@secure-computing.net (via IRC #openvpn-devel)
Security:	CVE-2020-11810
Security:	8604121c-7fc2-11ea-bcac-7781e90b0c8f
12 Apr 2020 15:57:04
Original commit files touched by this commit  202015
Revision:531525 This port version is marked as vulnerable.
mandree search for other commits by this committer
security/openvpn-devel: update to 2020-W15 snapshot

Update openvpn-devel port to the 2020-W15 snapshot
(Changes from upstream's Git):

* 05229fb5 2020-04-07 | OpenSSL: Fix --crl-verify not loading multiple
			CRLs in one file [Maxim Plotnikov]
* e23fb6b8 2020-04-03 | Fix off-by-one in tls-crypt-v2 client wrapping
			with custom metadata [Arne Schwabe]

PR:		245573
Submitted by:	ecrist@secure-computing.net (maintainer)
05 Apr 2020 12:05:06
Original commit files touched by this commit  202014
Revision:530771 This port version is marked as vulnerable.
mandree search for other commits by this committer
security/openvpn-devel: update to 2020-W14 snapshot

update to the 2020-W14 snapshot, Git log:

* 57578310 2020-03-30 | When auth-user-pass file has no password query the
management interface (if available). (HEAD -> master-2020-14, origin/master,
origin/HEAD, master) [Selva Nair]
* 8e5d30cf 2020-03-30 | Move querying username/password from management to a
function [Selva Nair]
* 3608d890 2020-04-02 | Fix OpenSSL error stack handling of
tls_ctx_add_extra_certs [Arne Schwabe]
* 09ae6280 2020-03-14 | tun.c: revise the IPv4 ifconfig flow on Windows [Simon
Rozman]
* 3e0e1692 2020-04-01 | Fetch OpenSSL versions via source/old links [Arne
Schwabe]
* a59e0754 2020-03-31 | mbedTLS: Make sure TLS session survives move [Tom van
Leeuwen]
* a2a2132c 2020-03-25 | docs: Add reference to X509_LOOKUP_hash_dir(3) [WGH]
* e8106537 2020-03-10 | tapctl: Support multiple hardware IDs [Simon Rozman]
* c6f8d1a7 2020-03-09 | openvpnmsica: Merge FindTUNTAPAdapters into
FindSystemInfo [Simon Rozman]

PR:		245373
Submitted by:	ecrist@secure-computing.net (maintainer)
30 Mar 2020 18:16:49
Original commit files touched by this commit  202013
Revision:529902 This port version is marked as vulnerable.
mandree search for other commits by this committer
security/openvpn-devel: update to 2020-W13 snapshot

Changes since the 2020-W12 snapshot:

* be453156 2020-03-12 | Normalise ncp-ciphers option and restrict it to 127
bytes (HEAD -> master-2020-13, origin/master, origin/HEAD, master) [Arne
Schwabe]
* f67efa94 2019-10-21 | Fix OpenSSL private key passphrase notices [Santtu
Lakkala]
* 072f7d35 2020-03-22 | travis-ci: add arm64, s390x builds. [Ilya Shipitsin]
* 50d68142 2020-03-09 | openvpnmsica, tapctl: Revise default hardware ID
management [Simon Rozman]
* d263e4f3 2020-03-09 | openvpnmsica: Extend to support arbitrary HWID network
adapters [Simon Rozman]
* 8c487854 2020-03-09 | openvpnmsica: "TAP" => "TUN/TAP" [Simon Rozman]
* 52b2414d 2020-03-09 | openvpnmsica, tapctl: "interface" => "adapter" [Simon
Rozman]
* c8de3ddb 2020-03-09 | openvpnmsica: Simplify static function names [Simon
Rozman]
* e24049d5 2020-03-09 | openvpnmsica: Revise MSI custom actions interop [Simon
Rozman]
* d15bc3ad 2020-03-09 | tapctl: Add functions for enabling/disabling adapters
[Simon Rozman]

PR:		245192
Submitted by:	ecrist@secure-computing.net (maintainer)
27 Mar 2020 12:10:37
Original commit files touched by this commit  202012
Revision:529243 This port version is marked as vulnerable.
mandree search for other commits by this committer
security/openvpn-devel: Update to new 2020-W12 snapshot.

Git history since 202010:
* e1eb630d 2020-03-14 | Fix building with --enable-async-push in FreeBSD [Lev
Stipakov]
* f3ef6ced 2020-03-10 | tun.c: reorder IPv6 ifconfig on Windows [Simon Rozman]
* 5d28b47c 2020-03-12 | tun.c: fix 'use after free' error [Lev Stipakov]
* 04f4b4fe 2020-02-05 | Skip DNS address validation [Domagoj Pensa]
* 089fbe65 2020-02-05 | wintun: upgrade error message in case of ring
registration failure [Simon Rozman]
* 57fe5a26 2020-03-09 | tapctl: Update documentation [Simon Rozman]
* 36493bf6 2020-03-09 | openvpnmsica: Fix TAPInterface.DisplayName field
interpretation [Simon Rozman]
* 026cf3e5 2020-03-09 | openvpnmsica: Remove required Windows driver
certification detection [Simon Rozman]
* 1828f9c1 2020-02-21 | Move NCP related function into a seperate file and add
unit tests [Arne Schwabe]
* 53e7d8db 2020-02-05 | wintun: check for conflicting options [Simon Rozman]
* baef44fc 2020-02-05 | tun.c: uncrustify [Simon Rozman]
* 4c71a647 2020-02-05 | tun.c: refactor driver detection and make it
case-insensitive [Simon Rozman]
* b111aa80 2020-02-29 | interactive.c: remove unused function [Lev Stipakov]

PR:		245098
Submitted by:	ecrist@secure-computing.net
06 Mar 2020 14:27:56
Original commit files touched by this commit  202010
Revision:527880 This port version is marked as vulnerable.
mandree search for other commits by this committer
security/openvpn-devel update to snapshot 202010

PR:		244632
Submitted by:	ecrist@secure-computing.net (maintainer)
07 Sep 2019 07:37:58
Original commit files touched by this commit  201935
Revision:511396 This port version is marked as vulnerable.
mandree search for other commits by this committer
security/openvpn-devel: Maintainer update to 201935

This commit updates the port to the latest development snapshot.

Additional changes over PR:
- leave CATEGORIES alone (leaving net-vpn in)
- move IGNORE_SSL upwards and remove USE_LDCONFIG to please portlint -CA

PR:		240376
Submitted by:	ecrist@secure-computing.net (maintainer)
06 Sep 2019 19:19:01
Original commit files touched by this commit  201907
Revision:511355 This port version is marked as vulnerable.
mandree search for other commits by this committer
Patch sed(1) regexp in self-test script from GNU to POSIX syntax.

PR:		240307
Submitted by:	kevans@
Approved by:	ecrist@secure-computing.net (maintainer)
14 Aug 2019 12:16:13
Original commit files touched by this commit  201907
Revision:508909 This port version is marked as vulnerable.
mat search for other commits by this committer
Convert to UCL & cleanup pkg-message (categories s)
14 Aug 2019 03:26:09
Original commit files touched by this commit  201907
Revision:508887 This port version is marked as vulnerable.
meta search for other commits by this committer
Implement new virtual category: net-vpn for VPN related ports

based on discussion at ports@ [1]. As VPN softwares are put in different
physical category net and security. This is a little bit confusing. Let's
give them new virtual category net-vpn.

[1] https://lists.freebsd.org/pipermail/freebsd-ports/2019-April/115915.html

PR:		239395
Submitted by:	myself
Approved by:	portmgr (mat)
Differential Revision:	https://reviews.freebsd.org/D21174
28 Feb 2019 21:52:17
Original commit files touched by this commit  201907
Revision:494211 This port version is marked as vulnerable.
swills search for other commits by this committer
security/openvpn-devel: fix whitespace from r494062

Reported by:	Peter Jeremy <peter@rulingia.com>
Pointyhat to:	swills
27 Feb 2019 15:31:00
Original commit files touched by this commit  201907
Revision:494062 This port version is marked as vulnerable.
swills search for other commits by this committer
security/openvpn-devel: Update to 201907 development snapshot

PR:		235859
Submitted by:	ecrist@secure-computing.net (maintainer)
14 Sep 2018 12:04:53
Original commit files touched by this commit  201821_3
Revision:479770 This port version is marked as vulnerable.
tijl search for other commits by this committer
Update security/mbedtls to 2.13.0 and bump dependent ports.
10 Aug 2018 14:23:16
Original commit files touched by this commit  201821_2
Revision:476834 This port version is marked as vulnerable.
tijl search for other commits by this committer
Update security/mbedtls to 2.12.0 and bump dependent ports.

MFH:		2018Q3
Security:	https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-02
07 Jun 2018 12:16:47
Original commit files touched by this commit  201821_1
Revision:471909 This port version is marked as vulnerable.
tijl search for other commits by this committer
Update security/mbedtls to 2.9.0 and bump dependent ports.
30 May 2018 16:10:57
Original commit files touched by this commit  201821
Revision:471136 This port version is marked as vulnerable.
joneum search for other commits by this committer
security/openvpn-devel: Update to 201821

PR:		228589
Submitted by:	ecrist@secure-computing.net (maintainer)
24 May 2018 02:53:01
Original commit files touched by this commit  201815
Revision:470755 This port version is marked as vulnerable.
meta search for other commits by this committer
security/openvpn-devel: Update to 201815

PR:		227567
Submitted by:	ecrist@secure-computing.net (maintainer)
Approved by:	pi (mentor)
23 Apr 2018 19:26:32
Original commit files touched by this commit  201811_1
Revision:468134 This port version is marked as vulnerable.
tijl search for other commits by this committer
Update security/mbedtls to 2.8.0 and bump dependent ports.

MFH:		2018Q2
Security:	https://tls.mbed.org/tech-updates/releases/mbedtls-2.8.0-2.7.2-and-2.1.11-released
14 Mar 2018 14:45:10
Original commit files touched by this commit  201811
Revision:464495 This port version is marked as vulnerable.
swills search for other commits by this committer
security/openvpn-devel: update to latest 2018-11 snapshot

PR:		226588
Submitted by:	ecrist@secure-computing.net (maintainer)
12 Mar 2018 13:01:53
Original commit files touched by this commit  201725_2
Revision:464247 This port version is marked as vulnerable.
tijl search for other commits by this committer
Update security/mbedtls to 2.7.1.

PR:		226550
MFH:		2018Q1
10 Mar 2018 18:49:04
Original commit files touched by this commit  201725_1
Revision:464085 This port version is marked as vulnerable.
tijl search for other commits by this committer
- Update security/polarssl13 to 1.3.22.
- Update security/mbedtls to 2.7.0 and bump dependent ports.

MFH:		2018Q1
Security:	https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-01
11 Jan 2018 14:18:01
Original commit files touched by this commit  201725
Revision:458739 This port version is marked as vulnerable.
danfe search for other commits by this committer
Do not abuse INSTALL_MAN when installing documentation, examples, and
other miscellaneous files that are not actually manual pages (part 2).
21 Jun 2017 19:19:26
Original commit files touched by this commit  201725
Revision:444072 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Update to latest version

PR:	220183
Submitted by:	ecrist@secure-computing.net
15 May 2017 22:40:43
Original commit files touched by this commit  201719
Revision:440983 This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to new snapshot.

Note I didn't take the original patch because it needed to NOT conflict
with itself, and I had to fix indentation - be sure to use TAB, not
blanks, after the VARIABLE= part.

PR:		219305
Submitted by:	ecrist@secure-computing.net (maintainer)
04 Jan 2017 14:38:59
Original commit files touched by this commit  201652
Revision:430558 This port version is marked as vulnerable.
mandree search for other commits by this committer
Update openvpn-devel to 2016-52 snapshot.

Align with security/openvpn for RC script improvements, dropping the
TUNNELBLICK patch (integrated upstream) and pkg-help file (no longer
required).

Note that pkcs11* and mbedTLS currently do not mix (I randomly checked
different option sets), an issue this port shares with security/openvpn.
"checking mbedtls pkcs11 support...
configure: error: mbedtls has no pkcs11 wrapper compiled in"

PR:		215734
Submitted by:	Eric F. Crist (maintainer)
08 Dec 2016 08:55:57
Original commit files touched by this commit  201647
Revision:428107 This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to 2016-W47 snapshot (2.4 beta).

PR:		214930
Submitted by:	ecrist@secure-computing.net (maintainer)
03 Nov 2016 22:32:26
Original commit files touched by this commit  201643
Revision:425277 This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to latest snapshot (week 43)

PR:		213982
Submitted by:	ecrist@secure-computing.net (maintainer)
28 Jun 2016 16:20:11
Original commit files touched by this commit  201623
Revision:417735 This port version is marked as vulnerable.
pi search for other commits by this committer
security/openvpn-devel: 201607 -> 201623

Port Changes:
- password-save option is always on now, no longer optional
- LibreSSL has been renamed mbed TLS

Upstream Changes:
- Implement --push-remove option to remove options pushed by server
- Use mbedTLS 2.x now, instead of PolarSSL 1.x

PR:		210259
Submitted by:	ecrist@secure-computing.net (maintainer)
19 May 2016 11:09:14
Original commit files touched by this commit  201607
Revision:415503 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Fix trailing whitespace in pkg-messages

Approved by:	portmgr blanket
01 Apr 2016 14:25:18
Original commit files touched by this commit  201607
Revision:412349 This port version is marked as vulnerable.
mat search for other commits by this committer
Remove ${PORTSDIR}/ from dependencies, categories r, s, t, and u.

With hat:	portmgr
Sponsored by:	Absolight
27 Feb 2016 20:28:26
Original commit files touched by this commit  201607
Revision:409687 This port version is marked as vulnerable.
pi search for other commits by this committer
security/openvpn-devel: 201548 -> 201607

- update to the latest development snapshot

PR:		207489
Submitted by:	ecrist@secure-computing.net (maintainer)
30 Nov 2015 11:08:57
Original commit files touched by this commit  201548
Revision:402661 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Update to 2015-48

PR:		        204805
Submitted by:	ecrist@secure-computing.net (maintainer)
Approved by:	mat (mentor)
21 Oct 2015 14:16:19
Original commit files touched by this commit  201541
Revision:399908 This port version is marked as vulnerable.
mat search for other commits by this committer
Update to 201541. [1]

Convert to options helpers.

PR:		203823 [1]
Submitted by:	maintainer
Sponsored by:	Absolight
02 Aug 2015 15:03:20
Original commit files touched by this commit  201523_1
Revision:393429 This port version is marked as vulnerable.
tijl search for other commits by this committer
By default libtool replaces -export-symbols <file> with -retain-symbols-file
<file> on ELF systems, but this doesn't really do what -export-symbols is
meant to do.  On GNU ELF systems it converts <file> to a simple version
script first and then uses -version-script instead of -retain-symbols-file.
Let USES=libtool patch libtool scripts to do this on all systems with GNU
ld(1).

Bump PORTREVISION on all ports where the build log contains -export-symbols.

audio/calf: This port builds a module that now exports only one function,
but it also builds a number of executables that link to this module and
expect to see other functions.  Because it's already a bit dodgy to link to
a module (libtool warns about this) let the module continue to export only
one function and instead build an ordinary library from the same source that
the executables can link to.  Fix a number of other issues in the same
(Only the first 15 lines of the commit message are shown above View all of this commit message)
30 Jul 2015 21:13:38
Original commit files touched by this commit  201523
Revision:393271 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Drop @dirrm* from plist

Approved by:	portmgr blanket
16 Jun 2015 01:29:48
Original commit files touched by this commit  201523
Revision:389811 This port version is marked as vulnerable.
delphij search for other commits by this committer
Update to 201523.

PR:		200774
Submitted by:	maintainer
12 Jun 2015 16:14:54
Original commit files touched by this commit  201516_1
Revision:389281 This port version is marked as vulnerable.
tijl search for other commits by this committer
- Update security/polarssl13 to 1.3.11
- Patch a Makefile so regular make install works
- Replace a patch with MAKE_ENV
- Bump dependent ports

PR:		200816
21 Apr 2015 16:39:57
Original commit files touched by this commit  201516
Revision:384431 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Update to 201516 development snapshot

PR:	199580
Submitted by:	ecrist@secure-computing.net
17 Apr 2015 13:37:37
Original commit files touched by this commit  201449
Revision:384160 This port version is marked as vulnerable.
tijl search for other commits by this committer
Specify library version when depending on libpolarssl and switch ports to
PolarSSL 1.3 when they fail to build with 1.2.
05 Dec 2014 16:51:47
Original commit files touched by this commit  201449
Revision:374053 This port version is marked as vulnerable.
feld search for other commits by this committer
Update to the 201449 snapshot

PR:		195651
Submitted by:	ecrist (maintainer)
23 Jul 2014 20:33:53
Original commit files touched by this commit  201425
Revision:362728 This port version is marked as vulnerable.
rakuco search for other commits by this committer
Update to the 201425 snapshot.

PR:		192006
Submitted by:	ecrist@secure-computing.net (maintainer)
16 Jul 2014 08:44:05
Original commit files touched by this commit  201421_1
Revision:362053 This port version is marked as vulnerable.
bapt search for other commits by this committer
Fix some non default LIB_DEPENDS

With hat:	portmgr
15 Jul 2014 16:57:39
Original commit files touched by this commit  201421_1
Revision:361977 This port version is marked as vulnerable.
adamw search for other commits by this committer
Add DOCS to OPTIONS_DEFINE to ports that check for PORT_OPTIONS:MDOCS.
16 Jun 2014 15:16:18
Original commit files touched by this commit  201421_1
Revision:358015 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Add missing USES=libtool to archivers/snappy
- Bump dependent ports as .so version has changed

Approved by:	portmgr blanket
08 Jun 2014 19:51:28
Original commit files touched by this commit  201421
Revision:357070 This port version is marked as vulnerable.
olgeni search for other commits by this committer
Remove all space characters from Makefile assignments.

No functional changes included.

CR:		D193 (except math/sedumi)
Approved by:	portmgr (bapt)
06 Jun 2014 17:12:08
Original commit files touched by this commit  201421
Revision:356822 This port version is marked as vulnerable.
bdrewery search for other commits by this committer
- Update to latest snapshot 201421
- Support staging
- Sync more with security/openvpn

PR:		190312
Submitted by:	ecrist@secure-computing.net (maintainer)
03 Jun 2014 14:34:06
Original commit files touched by this commit  201326_2
Revision:356371 This port version is marked as vulnerable.
vanilla search for other commits by this committer
Upgrade snappy to 1.1.1, and bump all related PORTREVISION to chase shared
library version.

PR:		ports/190409
Submitted by:	ports at robakdesign.com
Approved by:	portmgr@ (for NO_STAGE)
12 Feb 2014 14:03:25
Original commit files touched by this commit  201326_1
Revision:343923 This port version is marked as vulnerable.
mat search for other commits by this committer
Fix old makeplist bug.

Pointy hat to:	people who blindly use makeplist
Sponsored by:	Absolight
20 Sep 2013 22:55:26
Original commit files touched by this commit  201326
Revision:327769 This port version is marked as vulnerable.
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
security)
01 Jul 2013 18:10:27
Original commit files touched by this commit  201326
Revision:322134 This port version is marked as vulnerable.
lme search for other commits by this committer
Update to version 201326

PR:		ports/180167
Submitted by:	maintainer
21 May 2013 23:32:54
Original commit files touched by this commit  201321
Revision:318735 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Update to latest snapshot

PR:	ports/178814
Submitted by:	Eric F Crist <ecrist@secure-computing.net>
Sponsored by:	Claimlynx
18 Dec 2012 19:59:35
Original commit files touched by this commit  201250
Revision:309198 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Update to 201250 snapshot

PR:	ports/174520
Submitted by:	Eric F. Crist <ecrist@secure-computing.net>
11 Oct 2012 20:13:19
Original commit files touched by this commit  201240
Revision:305741 This port version is marked as vulnerable.
bdrewery search for other commits by this committer
- Update to latest snapshot [1]
- Properly install symlinks for auth-pam and down-root plugins [1]
- Fix pkg-message description of locations of these plugins [1]
- Fix plist for nonexistent DOCSDIR/openvpn and DOCSDIRS/sample

PR:		ports/172587 [1]
Submitted by:	Eric F Crist <ecrist@secure-computing.net> (maintainer) [1]
Feature safe:	yes
01 Oct 2012 15:01:14
Original commit files touched by this commit  201237
Revision:305132 This port version is marked as vulnerable.
bdrewery search for other commits by this committer
- Fix header to proper format

Reported by:	danfe
28 Sep 2012 18:45:59
Original commit files touched by this commit  201237
Revision:305007 This port version is marked as vulnerable.
bdrewery search for other commits by this committer
- Update to 201237 snapshot [1]
- Convert to new options framework
- Remove ABI versions from LIB_DEPENDS
- Update to new header

PR:		ports/171743 [1]
Submitted by:	Eric F Crist <ecrist@secure-computing.net> (maintainer) [1]
05 Aug 2012 23:19:40
Original commit files touched by this commit  201230
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Move the rc.d scripts of the form *.sh.in to *.in

Where necessary add $FreeBSD$ to the file

No PORTREVISION bump necessary because this is a no-op
25 Jul 2012 16:52:25
Original commit files touched by this commit  201230
 This port version is marked as vulnerable.
scheidell search for other commits by this committer
- Update to latest snapshot

PR:		ports/170111
Submitted by:	Eric F Crist <ecrist@secure-computing.net> (maintainer)
27 Feb 2012 19:20:42
Original commit files touched by this commit  201208
 This port version is marked as vulnerable.
jgh search for other commits by this committer
- Update to 201208 snapshot
- while here use INSTALL_LIB for library installation

PR:     ports/165504
Submitted by:   maintainer, ecrist@secure-computing.net
23 Jan 2012 20:47:46
Original commit files touched by this commit  201204
 This port version is marked as vulnerable.
ohauer search for other commits by this committer
- update to DISTVERSION 201204
- sort pkg-plist with help from ports-mgmt/genplist

PR:             164407
Submitted by:   Eric F Crist <ecrist@secure-computing.net> (maintainer)
14 Jan 2012 08:57:23
Original commit files touched by this commit  201139
 This port version is marked as vulnerable.
dougb search for other commits by this committer
In the rc.d scripts, change assignments to rcvar to use the
literal name_enable wherever possible, and ${name}_enable
when it's not, to prepare for the demise of set_rcvar().

In cases where I had to hand-edit unusual instances also
modify formatting slightly to be more uniform (and in
some cases, correct). This includes adding some $FreeBSD$
tags, and most importantly moving rcvar= to right after
name= so it's clear that one is derived from the other.
04 Oct 2011 21:51:04
Original commit files touched by this commit  201139
 This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to new snapshot 201139, removing files/patch-t_cltsrv.sh [1].

Remove files/pkg-req.in and references in SUB_FILES and pre-install,
it was a (now obsolete) workaround to warn users that installed newer
6.X packages on older 6.X systems and ended up with the new rc world
order scripts unfound and openvpn not running. [2]

Fix version number in CONFLICTS to encompass openvpn (not just
openvpn20), and demote to CONFLICTS_INSTALL. Neither port installs
headers or libraries that might get in the way.

PR:           ports/161285
Submitted by: Eric F. Crist (maintainer) [1]
Approved by:  Eric F. Crist (maintainer) [2]
07 Aug 2011 17:23:40
Original commit files touched by this commit  201126
 This port version is marked as vulnerable.
pav search for other commits by this committer
- Turn off self-tests on pointyhat, they fail

Reported by:    pointyhat
25 Jul 2011 20:03:10
Original commit files touched by this commit  201126
 This port version is marked as vulnerable.
mandree search for other commits by this committer
Move LICENSE= up into a block of its own to silence portlint.

Remove the lzo/lzo2 version switch now that we only have lzo2.

Approved by: ecrist@secure-computing.net (maintainer)
25 Jul 2011 20:01:06
Original commit files touched by this commit  201126
 This port version is marked as vulnerable.
mandree search for other commits by this committer
Fix Pointyhat build failures by skipping (not failing) network-based tests.

Approved by: ecrist@secure-computing.net (maintainer)
05 Jul 2011 15:20:01
Original commit files touched by this commit  201126
 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Unbreak port by adjusting plist to match reality of new version.
01 Jul 2011 17:59:41
Original commit files touched by this commit  201126
 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Update to week 26 snapshot.

PR:     ports/158568
Submitted by:   Eric F Crist <ecrist@secure-computing.net>
Sponsored by:   ClaimLynx, Inc
15 Jun 2011 08:43:54
Original commit files touched by this commit  201124
 This port version is marked as vulnerable.
culot search for other commits by this committer
- Update to 201124

PR:             ports/157812
Submitted by:   Jin-Sih Lin <linpct@gmail.com>
Approved by:    Eric Crist <ecrist@secure-computing.net> (maintainer)
15 May 2011 02:49:17
Original commit files touched by this commit  201118
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Remove painful examples of foo="", with particular prejudice against
constructions that parse out to [ -z "$foo" ] && foo=""

These are bad examples that get copied and pasted into new code, so the
hope is that with less bad examples there will be less need for me to
bring this up in review.

In a few of these files all that were changed were comments so that next
time I search for these patterns I won't trip on the file for no reason.

In a few places, add $FreeBSD$

No functional changes, so no PORTREVISION bumps
04 May 2011 18:12:27
Original commit files touched by this commit  201118
 This port version is marked as vulnerable.
dhn search for other commits by this committer
- Update to 201118

PR:             ports/156812
Submitted by:   Eric F Crist <ecrist@secure-computing.net> (maintainer)
22 Mar 2011 13:34:12
Original commit files touched by this commit  201111
 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Update to latest snapshot.

PR:     ports/155770
Submitted by:   Eric F Crist <ecrist@secure-computing.net>
Sponsored by:   ClaimLynx, Inc
25 Jan 2011 23:31:23
Original commit files touched by this commit  201104
 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Update to week 4 snapshot

PR:     ports/154296
Submitted by:   Eric F Crist <ecrist@secure-computing.net>
Feature safe:   yes
Sponsored by:   ClaimLynx, Inc
10 Dec 2010 15:04:29
Original commit files touched by this commit  201049
 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Update to latest snapshot.

PR:     ports/152992
Submitted by:   Eric F Crist <ecrist@secure-computing.net>
Sponsored by:   ClaimLynx, Inc
14 Oct 2010 20:27:16
Original commit files touched by this commit  201041
 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Update to latest snapshot

PR:     ports/151462
Submitted by:   Eric F Crist <ecrist@secure-computing.net>
Sponsored by:   ClaimLynx, Inc
22 Aug 2010 15:22:05
Original commit files touched by this commit  201034
 This port version is marked as vulnerable.
lwhsu search for other commits by this committer
- Update to the latest week 34 snapshot.
- While here, resolve portlint(1) warning: Package conflicts with itself.

PR:             ports/149878
Submitted by:   Eric F Crist <ecrist@secure-computing.net>
14 Aug 2010 15:39:42
Original commit files touched by this commit  201031
 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Update CONFLICTS in preperation for new port security/openvpn-beta

PR:     ports/149618
Submitted by:   Eric F Crist <ecrist@secure-computing.net>
04 Aug 2010 16:02:48
Original commit files touched by this commit  201031
 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Update to latest weekly snapshot.
Add softrestart command to rc script.

PR:     ports/149272
Submitted by:   Eric F Crist <ecrist@secure-computing.net>
20 Jul 2010 15:55:22
Original commit files touched by this commit  201029
 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Update weekly snapshot

PR:     ports/148787
Submitted by:   Eric F Crist <ecrist@secure-computing.net>
28 Jun 2010 17:54:59
Original commit files touched by this commit  201026
 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Update to weekly snapshot

PR:     148212
Submitted by:   Eric F Crist <ecrist@secure-computing.net>
Approved by:    itetcu@ (mentor)
Feature safe:   yes
16 Jun 2010 22:35:14
Original commit files touched by this commit  201024
 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Update to week 24 snapshot

PR:     147850
Submitted by:   Eric F Crist <ecrist@secure-computing.net>
Approved by:    itetcu@ (mentor)
03 Jun 2010 17:20:30
Original commit files touched by this commit  201022
 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Update to latest snapshot

PR:     ports/147330
Submitted by:   Eric F Crist <ecrist@secure-computing.net>
Approved by:    itetcu@ (mentor)
14 May 2010 21:17:42
Original commit files touched by this commit  201019
 This port version is marked as vulnerable.
jpaetzel search for other commits by this committer
Update to week 19 tarball

PR:     ports/146594
Submitted by:   Eric F Crist <ecrist@secure-computing.net>
Approved by:    itetcu@ (mentor)
26 Apr 2010 03:02:20
Original commit files touched by this commit  201017
 This port version is marked as vulnerable.
sylvio search for other commits by this committer
- Update to 201017

PR:             ports/145762
Submitted by:   Eric F Crist <ecrist@secure-computing.net> (maintainer)
27 Mar 2010 06:14:03
Original commit files touched by this commit  201012
 This port version is marked as vulnerable.
dougb search for other commits by this committer
RC_SUBR_SUFFIX has not been needed for a long time now, all supported
versions of FreeBSD now use /etc/rc.subr and rc.d scripts without .sh
appended to the script name.
27 Mar 2010 00:15:24
Original commit files touched by this commit  201012
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Begin the process of deprecating sysutils/rc_subr by
s#. %%RC_SUBR%%#. /etc/rc.subr#
24 Mar 2010 13:17:32
Original commit files touched by this commit  201012
 This port version is marked as vulnerable.
niels search for other commits by this committer
This is the bi-weekly update of openvpn-devel (week 12)

PR:     ports/144945
Submitted by:   Eric F Crist <ecrist@secure-computing.net> (maintainer)
Approved by:    miwi (mentor)
15 Mar 2010 14:13:14
Original commit files touched by this commit  201010
 This port version is marked as vulnerable.
niels search for other commits by this committer
Maintainer updated to 201010 snapshot

PR:     ports/144699
Submitted by:   Eric F Crist <ecrist@secure-computing.net> (maintainer)
Approved by:    itetcu (mentor)
23 Feb 2010 12:22:15
Original commit files touched by this commit  201007
 This port version is marked as vulnerable.
mandree search for other commits by this committer
Revive openvpn-devel port and pass maintainership to Eric F. Christ.

NOTE that the port is more of a development snapshot than it used to be,
so it should be used SOLELY for testing and development, NOT IN PRODUCTION.

PR: ports/144115
Approved by: mandree@ (previous maintainer)
Approved by: garga@ (mentor)
Feature safe: yes
07 Jan 2010 16:28:57
Original commit files touched by this commit  2.1.r20
 This port version is marked as vulnerable.
mandree search for other commits by this committer
Move security/openvpn to security/openvpn20 (after previous repocopy).
Update security/openvpn20 to 2.0.9, revising pkg-message.

Move security/openvpn-devel to security/openvpn and
update security/openvpn to 2.1.1.

Remove security/openvpn-devel, adding a MOVED entry.

Update security/Makefile to remove openvpn-devel and add openvpn20 to
SUBDIRS.

Add a UPDATING entry for this shuffle.  Currently without upgrade
instructions since neither portupgrade nor portmaster are up to the
task (because of the CONFLICTS).

Approved by:  garga@ (mentor)
14 Oct 2009 10:34:55
Original commit files touched by this commit  2.1.r20
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Update to 2.1_rc20

PR:             139584
Submitted by:   Matthias Andree <matthias.andree@gmx.de> (maintainer)
07 Aug 2009 17:47:28
Original commit files touched by this commit  2.1.r19
 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Update to 2.1_rc19
- Fix on FreeBSD 8.x

PR:             137516
Submitted by:   Matthias Andree <matthias.andree@gmx.de> (maintainer)
15 Jul 2009 16:56:10
Original commit files touched by this commit  2.1.r18
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Fix a few "bad example" problems in the rc.d scripts that have been
propogated by copy and paste.

1. Primarily the "empty variable" default assignment, which is mostly
${name}_flags="", but fix a few others as well.
2. Where they are not already documented, add the existence of the _flags
(or other deleted empties) option to the comments, and in some cases add
comments from scratch.
3. Replace things that look like:
prefix=%%PREFIX%%
command=${prefix}/sbin/foo
to just use %%PREFIX%%. In many cases the $prefix variable is only used
once, and in some cases it is not used at all.
4. In a few cases remove ${name}_flags from command_args
5. Remove a long-stale comment about putting the port's rc.d script in
/etc/rc.d (which is no longer necessary).

No PORTREVISION bumps because all of these changes are noops.
13 Jun 2009 22:55:19
Original commit files touched by this commit  2.1.r18
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Update to 2.1_rc18

PR:             135392
Submitted by:   Matthias Andree <matthias.andree@gmx.de> (maintainer)
02 Jun 2009 21:41:36
Original commit files touched by this commit  2.1.r17
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Update to 2.1_rc17

PR:             135148
Submitted by:   Matthias Andree <matthias.andree@gmx.de> (maintainer)
25 Jan 2009 08:10:59
Original commit files touched by this commit  2.1.r15
 This port version is marked as vulnerable.
beech search for other commits by this committer
- Add logging knob

PR:             ports/130893
Submitted by:   Michael Scheidell <scheidell@secnap.net>
Approved by:    Matthias Andree <matthias.andree@gmx.de> (maintainer)
22 Nov 2008 22:29:16
Original commit files touched by this commit  2.1.r15
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Update to 2.1_rc15

PR:             129062
Submitted by:   Matthias Andree <matthias.andree@gmx.de> (maintainer)

Number of commits found: 121 (showing only 100 on this page)

1 | 2  »  

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
giteaNov 21
nodeNov 21
node12Nov 21
node14Nov 21
muttNov 20
mantisNov 14
goNov 12
py-saltNov 12
openoffice-4Nov 10
openoffice-develNov 10
raptor2Nov 09
py-notebookNov 08
mariadb103-server*Nov 07
mariadb104-server*Nov 07
mariadb105-server*Nov 07

9 vulnerabilities affecting 54 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2020-11-22 15:51:41


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 41473
Broken 61
Deprecated 279
Ignore 301
Forbidden 4
Restricted 142
No CDROM 73
Vulnerable 19
Expired 4
Set to expire 249
Interactive 0
new 24 hours 2
new 48 hours16
new 7 days36
new fortnight85
new month178

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2020 Dan Langille. All rights reserved.