notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)

Why was the website so slow for so long?

The cause of the slowdown was a change to the ZFS dataset. In conjunction with the database server, very little caching was being done. This combination resulted in increased disk I/O as the system churned through the database. Details in the blog post which outlines the various things which changed. Many graphs.

non port: security/wpa_supplicant/distinfo
SVNWeb

Number of commits found: 13

Thu, 22 Aug 2019
[ 03:33 cy ] Original commit   Revision:509576
509576 security/wpa_supplicant/Makefile
509576 security/wpa_supplicant/distinfo
Update 2.8 --> 2.9
Mon, 22 Apr 2019
[ 15:56 cy ] Original commit   Revision:499654
499654 net/hostapd/Makefile
499654 net/hostapd/distinfo
499654 security/wpa_supplicant/Makefile
499654 security/wpa_supplicant/distinfo
Update wpa_supplicant/hostapd 2.7 --> 2.8
Thu, 6 Dec 2018
[ 20:11 cy ] Original commit   Revision:486779
486779 security/wpa_supplicant/Makefile
486779 security/wpa_supplicant/distinfo
486779 security/wpa_supplicant/files/patch-src-l2_packet-l2_packet_freebsd.c
486779 security/wpa_supplicant/files/patch-src_crypto_crypto__openssl.c
486779 security/wpa_supplicant/files/patch-src_crypto_tls__openssl.c
486779 security/wpa_supplicant/files/patch-src_l2__packet_l2__packet__freebsd.c
Update 2.6 --> 2.7
Tue, 14 Aug 2018
[ 20:21 cy ] Original commit   Revision:477202
477202 security/wpa_supplicant/Makefile
477202 security/wpa_supplicant/distinfo
WPA: Ignore unauthenticated encrypted EAPOL-Key data

Ignore unauthenticated encrypted EAPOL-Key data in supplicant
processing. When using WPA2, these are frames that have the Encrypted
flag set, but not the MIC flag.

When using WPA2, EAPOL-Key frames that had the Encrypted flag set but
not the MIC flag, had their data field decrypted without first verifying
the MIC. In case the data field was encrypted using RC4 (i.e., when
negotiating TKIP as the pairwise cipher), this meant that
unauthenticated but decrypted data would then be processed. An adversary
could abuse this as a decryption oracle to recover sensitive information
in the data field of EAPOL-Key messages (e.g., the group key).
(CVE-2018-14526)

Signed-off-by: Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>

Security:	CVE-2018-14526
Security:	VuXML: 6bedc863-9fbe-11e8-945f-206a8a720317
Mon, 16 Oct 2017
[ 20:08 cy ] Original commit   Revision:452250
452250 security/wpa_supplicant/Makefile
452250 security/wpa_supplicant/distinfo
Add patch set 2017-1

A vulnerability was found in how a number of implementations can be
triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by
replaying a specific frame that is used to manage the keys. Such
reinstallation of the encryption key can result in two different types
of vulnerabilities: disabling replay protection and significantly
reducing the security of encryption to the point of allowing frames to
be decrypted or some parts of the keys to be determined by an attacker
depending on which cipher is used.

Security:	https://w1.fi/security/2017-1/ \
		wpa-packet-number-reuse-with-replayed-messages.txt
Security:	https://www.krackattacks.com/
MFH:		2017Q4
Thu, 17 Nov 2016
[ 17:43 jrm ] Original commit   Revision:426292
426292 security/wpa_supplicant/Makefile
426292 security/wpa_supplicant/distinfo
426292 security/wpa_supplicant/files/patch-2015-6-backported-WNM-Ignore-Key-Data-in-WNM-Sleep-Mode-Response-frame
426292 security/wpa_supplicant/files/patch-2015-7-EAP-pwd-peer-Fix-last-fragment-length-validation
426292 security/wpa_supplicant/files/patch-2015-7-EAP-pwd-server-Fix-last-fragment-length-validation
426292 security/wpa_supplicant/files/patch-2015-8-EAP-pwd-peer-Fix-error-path-for-unexpected-Confirm-m
426292 security/wpa_supplicant/files/patch-2016_1_1-WPS-Reject-a-Credential-with-invalid-passphrase
426292 security/wpa_supplicant/files/patch-2016_1_2-Reject-psk-parameter-set-with-invalid-passphrase-cha
426292 security/wpa_supplicant/files/patch-2016_1_3-Remove-newlines-from-wpa_supplicant-config-network-o
426292 security/wpa_supplicant/files/patch-2016_1_4-Reject-SET_CRED-commands-with-newline-characters-in

(Only the first 10 of 15 ports in this commit are shown above. View all ports for this commit)
security/wpa_supplicant: Update to version 2.6 and patch for LibreSSL support

Port changes:
- Remove patches that have been incorporated upstream
- Add patches for LibreSSL support

Approved by:	AMDmi3 (mentor)
Differential Revision:	https://reviews.freebsd.org/D8451
Sun, 11 Oct 2015
[ 22:52 marino ] Original commit   Revision:399108
399108 security/wpa_supplicant/Makefile
399108 security/wpa_supplicant/distinfo
399108 security/wpa_supplicant/files/patch-src_ap_wmm.c
399108 security/wpa_supplicant/files/patch-src_eap__peer_eap__pwd.c
399108 security/wpa_supplicant/files/patch-src_eap__server_eap__server__pwd.c
399108 security/wpa_supplicant/files/patch-src_p2p_p2p.c
399108 security/wpa_supplicant/files/patch-src_utils_os__unix.c
399108 security/wpa_supplicant/files/patch-src_wps_httpread.c
399108 security/wpa_supplicant/files/patch-src_wps_ndef.c
399108 security/wpa_supplicant/files/patch-wpa__supplicant_scan.c
security/wpa_supplicant: Upgrade version 2.4 => 2.5
Mon, 16 Mar 2015
[ 20:45 marino ] Original commit   Revision:381444
381444 security/wpa_supplicant/Makefile
381444 security/wpa_supplicant/distinfo
381444 security/wpa_supplicant/files/patch-src-l2_packet-l2_packet_freebsd.c
381444 security/wpa_supplicant/files/patch-src_drivers_driver__bsd.c
381444 security/wpa_supplicant/files/patch-src_drivers_driver__ndis.c
381444 security/wpa_supplicant/files/patch-src_drivers_driver__privsep.c
381444 security/wpa_supplicant/files/patch-src_utils_os__unix.c
381444 security/wpa_supplicant/files/patch-src_wps_wps__upnp.c
381444 security/wpa_supplicant/files/patch-wpa__supplicant_Makefile
381444 security/wpa_supplicant/files/patch-wpa__supplicant_main.c

(Only the first 10 of 14 ports in this commit are shown above. View all ports for this commit)
security/wpa_supplicant: Upgrade version 2.3 => 2.4

See http://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog for list
of changes since version 2.3.
Sun, 12 Oct 2014
[ 21:20 marino ] Original commit   Revision:370742
370742 MOVED
370742 security/Makefile
370742 security/wpa_supplicant
370742 security/wpa_supplicant/Makefile
370742 security/wpa_supplicant/distinfo
370742 security/wpa_supplicant/files/Packet32.c
370742 security/wpa_supplicant/files/Packet32.h
370742 security/wpa_supplicant/files/config.bsd
370742 security/wpa_supplicant/files/ntddndis.h
370742 security/wpa_supplicant/files/patch-Makefile

(Only the first 10 of 22 ports in this commit are shown above. View all ports for this commit)
Revive security/wpa_supplicant after 6.5 years => version 2.3

This port was retired at version 0.3.8 because wpa_supplicant is
part of FreeBSD base.  However, the last few releases have had a period
of only a few months, so the base is always going to be behind.  DragonFly
is also affected, so I'm bringing the port back at the latest version.

It features the same patches as FreeBSD including the conversion to use
libutil's pidfile routines.  There are some additional patches for
DragonFly support and to fix some bugs from the 9 Oct 2014 release.

The WPA Supplicant build system has been converted to ports options, and
there are dozens of them.  I've set the defaults to match the
configuration in base and verified that it builds with all options
selected at once.
Fri, 25 Apr 2008
[ 23:21 pav ] Original commit 
1.1579 MOVED
1.955 security/Makefile
1.15 security/wpa_supplicant/Makefile
1.4 security/wpa_supplicant/distinfo
1.4 security/wpa_supplicant/files/config.bsd
1.2 security/wpa_supplicant/files/patch-Makefile
1.2 security/wpa_supplicant/files/patch-crypto.c
1.2 security/wpa_supplicant/files/patch-pidfile
1.2 security/wpa_supplicant/files/patch-wpa__ctrl.c
1.2 security/wpa_supplicant/pkg-descr
- Remove, it's ancient and newer version is included in base of all supported
  releases

Suggested by:   sam
Fri, 11 Nov 2005
[ 19:03 brooks ] Original commit 
1.11 audio/slimserver/distinfo
1.2 databases/ruby-dbdbd/distinfo
1.6 ftp/tftp-hpa/distinfo
1.3 misc/chef/distinfo
1.4 misc/gpt/distinfo
1.4 misc/gpt31/distinfo
1.2 net/openmpi/distinfo
1.2 net/pypvm/distinfo
1.2 net/vncreflector/distinfo
1.3 security/wpa_supplicant/distinfo

(Only the first 10 of 16 ports in this commit are shown above. View all ports for this commit)
add SHA256
Wed, 16 Feb 2005
[ 07:03 brooks ] Original commit 
1.6 security/wpa_supplicant/Makefile
1.2 security/wpa_supplicant/distinfo
1.3 security/wpa_supplicant/files/config.bsd
1.3 security/wpa_supplicant/files/patch-grp.h
1.1 security/wpa_supplicant/files/patch-pidfile
1.3 security/wpa_supplicant/files/patch-type
- Update to 0.3.8.  See ChangeLog for details.
- Install sample config file in etc/wpa_supplication.conf.sample instead
  of DOCSDIR.
- Obey PREFIX.
- Follow move of binaries from bin to sbin.

Committed from a laptop running this version against an AP with WPA-PSK
and AES encription.

Submitted by:   Yamamoto Shigeru <shigeru at iij dot ad dot jp>
PR:             75609 (by Rong-En Fan <rafan at infor dot org>)
Sun, 12 Dec 2004
[ 22:23 imp ] Original commit 
1.561 security/Makefile
1.1 security/wpa_supplicant/Makefile
1.1 security/wpa_supplicant/distinfo
1.1 security/wpa_supplicant/files/config.bsd
1.1 security/wpa_supplicant/pkg-descr
1.1 security/wpa_supplicant/pkg-plist
WPA supplicant daemon for 802.11 networks.

Submitted by: sam

Number of commits found: 13

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
gitlab-ceMar 26
rubygem-jsonMar 26
jenkinsMar 25
jenkins-ltsMar 25
phpmyadminMar 25
phpmyadmin5Mar 25
puppet6Mar 23
puppetdb5Mar 23
puppetdb6Mar 23
puppetserver5Mar 23
puppetserver6Mar 23
py-bleachMar 18
zeekMar 15
okularMar 13
gitlab-ceMar 12

9 vulnerabilities affecting 54 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2020-03-27 14:06:31


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 38925
Broken 595
Deprecated 535
Ignore 867
Forbidden 5
Restricted 150
No CDROM 72
Vulnerable 23
Expired 2
Set to expire 509
Interactive 0
new 24 hours 10
new 48 hours19
new 7 days53
new fortnight73
new month147

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2020 Dan Langille. All rights reserved.