<feed xmlns='http://www.w3.org/2005/Atom'>
<title>ports/security/dropbear/Makefile, branch main</title>
<subtitle>FreeBSD ports tree</subtitle>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/ports/'/>
<entry>
<title>security/dropbear: update to 2025.89</title>
<updated>2025-12-22T07:05:51+00:00</updated>
<author>
<name>Piotr Kubaj</name>
<email>pkubaj@FreeBSD.org</email>
</author>
<published>2025-12-22T06:26:29+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/ports/commit/?id=84ed9d88c7369ddb17229d512891e5dd795d2671'/>
<id>84ed9d88c7369ddb17229d512891e5dd795d2671</id>
<content type='text'>
Changelog:
- Security: Avoid privilege escalation via unix stream forwarding in Dropbear
  server. Other programs on a system may authenticate unix sockets via
  SO_PEERCRED, which would be root user for Dropbear forwarded connections,
  allowing root privilege escalation.
  Reported by Turistu, and thanks for advice on the fix.
  This is tracked as CVE-2025-14282, and affects 2024.84 to 2025.88.

  It is fixed by dropping privileges of the dropbear process after
  authentication. Unix stream sockets are now disallowed when a
  forced command is used, either with authorized_key restrictions or
  "dropbear -c command".

  In previous affected releases running with "dropbear -j" (will also disable
  TCP fowarding) or building with localoptions.h/distrooptions.h
  "#define DROPBEAR_SVR_LOCALSTREAMFWD 0" is a mitigation.

- Security: Include scp fix for CVE-2019-6111. This allowed
  a malicious server to overwrite arbitrary local files.
  The missing fix was reported by Ashish Kunwar.

- Server dropping privileges post-auth is enabled by default. This requires
  setresgid() support, so some platforms such as netbsd or macos will have to
  disable DROPBEAR_SVR_DROP_PRIVS in localoptions.h. Unix stream forwarding is
  not available if DROPBEAR_SVR_DROP_PRIVS is disabled.

  Remote server TCP socket forwarding will now use OS privileged port
  restrictions rather than having a fixed "allow &gt;=1024 for non-root" rule.

  A future release may implement privilege dropping for netbsd/macos.

- Fix a regression in 2025.87 when RSA and DSS are not built. This would lead
  to a crash at startup with bad_bufptr().
  Reported by Dani Schmitt and Sebastian Priebe.

- Don't limit channel window to 500MB. That is could cause stuck connections
  if peers advise a large window and don't send an increment within 500MB.
  Affects SSH.NET https://github.com/sshnet/SSH.NET/issues/1671
  Reported by Rob Hague.

- Ignore -g -s when passwords arent enabled. Patch from Norbert Lange.
  Ignore -m (disable MOTD), -j/-k (tcp forwarding) when not enabled.

- Report SIGBUS and SIGTRAP signals. Patch from Loïc Mangeonjean.

- Fix incorrect server auth delay. Was meant to be 250-350ms, it was actually
  150-350ms or possibly negative (zero). Reported by pickaxprograms.

- Fix building without public key options. Thanks to Konstantin Demin

- Fix building with proxycmd but without netcat. Thanks to Konstantin Demin

- Fix incorrect path documentation for distrooptions, thanks to Todd Zullinger

- Fix SO_REUSEADDR for TCP tests, reported by vt-alt.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Changelog:
- Security: Avoid privilege escalation via unix stream forwarding in Dropbear
  server. Other programs on a system may authenticate unix sockets via
  SO_PEERCRED, which would be root user for Dropbear forwarded connections,
  allowing root privilege escalation.
  Reported by Turistu, and thanks for advice on the fix.
  This is tracked as CVE-2025-14282, and affects 2024.84 to 2025.88.

  It is fixed by dropping privileges of the dropbear process after
  authentication. Unix stream sockets are now disallowed when a
  forced command is used, either with authorized_key restrictions or
  "dropbear -c command".

  In previous affected releases running with "dropbear -j" (will also disable
  TCP fowarding) or building with localoptions.h/distrooptions.h
  "#define DROPBEAR_SVR_LOCALSTREAMFWD 0" is a mitigation.

- Security: Include scp fix for CVE-2019-6111. This allowed
  a malicious server to overwrite arbitrary local files.
  The missing fix was reported by Ashish Kunwar.

- Server dropping privileges post-auth is enabled by default. This requires
  setresgid() support, so some platforms such as netbsd or macos will have to
  disable DROPBEAR_SVR_DROP_PRIVS in localoptions.h. Unix stream forwarding is
  not available if DROPBEAR_SVR_DROP_PRIVS is disabled.

  Remote server TCP socket forwarding will now use OS privileged port
  restrictions rather than having a fixed "allow &gt;=1024 for non-root" rule.

  A future release may implement privilege dropping for netbsd/macos.

- Fix a regression in 2025.87 when RSA and DSS are not built. This would lead
  to a crash at startup with bad_bufptr().
  Reported by Dani Schmitt and Sebastian Priebe.

- Don't limit channel window to 500MB. That is could cause stuck connections
  if peers advise a large window and don't send an increment within 500MB.
  Affects SSH.NET https://github.com/sshnet/SSH.NET/issues/1671
  Reported by Rob Hague.

- Ignore -g -s when passwords arent enabled. Patch from Norbert Lange.
  Ignore -m (disable MOTD), -j/-k (tcp forwarding) when not enabled.

- Report SIGBUS and SIGTRAP signals. Patch from Loïc Mangeonjean.

- Fix incorrect server auth delay. Was meant to be 250-350ms, it was actually
  150-350ms or possibly negative (zero). Reported by pickaxprograms.

- Fix building without public key options. Thanks to Konstantin Demin

- Fix building with proxycmd but without netcat. Thanks to Konstantin Demin

- Fix incorrect path documentation for distrooptions, thanks to Todd Zullinger

- Fix SO_REUSEADDR for TCP tests, reported by vt-alt.
</pre>
</div>
</content>
</entry>
<entry>
<title>security/dropbear: update to 2025.88</title>
<updated>2025-05-08T08:02:00+00:00</updated>
<author>
<name>Piotr Kubaj</name>
<email>pkubaj@FreeBSD.org</email>
</author>
<published>2025-05-07T20:08:39+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/ports/commit/?id=1d4b5836a9bdadc3f3365961137bf2a34cf74932'/>
<id>1d4b5836a9bdadc3f3365961137bf2a34cf74932</id>
<content type='text'>
Changelog:
- Security: Don't allow dbclient hostname arguments to be interpreted
  by the shell.

  dbclient hostname arguments with a comma (for multihop) would be
  passed to the shell which could result in running arbitrary shell
  commands locally. That could be a security issue in situations
  where dbclient is passed untrusted hostname arguments.

  Now the multihop command is executed directly, no shell is involved.
  Thanks to Marcin Nowak for the report, tracked as CVE-2025-47203

- Fix compatibility for htole64 and htole32, regression in 2025.87
  Patch from Peter Fichtner to work with old GCC versions, and
  patch from Matt Robinson to check different header files.

- Fix building on older compilers or libc that don't support
  static_assert(). Regression in 2025.87

- Support ~R in the client to force a key re-exchange.

- Improve strict KEX handling. Dropbear previously would allow other
  packets at the end of key exchange prior to receiving the remote
  peer's NEWKEYS message, which should be forbidden by strict KEX.
  Reported by Fabian Bäumer.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Changelog:
- Security: Don't allow dbclient hostname arguments to be interpreted
  by the shell.

  dbclient hostname arguments with a comma (for multihop) would be
  passed to the shell which could result in running arbitrary shell
  commands locally. That could be a security issue in situations
  where dbclient is passed untrusted hostname arguments.

  Now the multihop command is executed directly, no shell is involved.
  Thanks to Marcin Nowak for the report, tracked as CVE-2025-47203

- Fix compatibility for htole64 and htole32, regression in 2025.87
  Patch from Peter Fichtner to work with old GCC versions, and
  patch from Matt Robinson to check different header files.

- Fix building on older compilers or libc that don't support
  static_assert(). Regression in 2025.87

- Support ~R in the client to force a key re-exchange.

- Improve strict KEX handling. Dropbear previously would allow other
  packets at the end of key exchange prior to receiving the remote
  peer's NEWKEYS message, which should be forbidden by strict KEX.
  Reported by Fabian Bäumer.
</pre>
</div>
</content>
</entry>
<entry>
<title>security/dropbear: update to 2025.87</title>
<updated>2025-03-16T01:14:01+00:00</updated>
<author>
<name>Piotr Kubaj</name>
<email>pkubaj@FreeBSD.org</email>
</author>
<published>2025-03-09T22:59:47+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/ports/commit/?id=05a46bbf545a6ba713205cea63079226168e0a8a'/>
<id>05a46bbf545a6ba713205cea63079226168e0a8a</id>
<content type='text'>
Changes:
Note &gt;&gt; for compatibility/configuration changes

- &gt;&gt; Disable SHA-1 algorithms by default. SHA-1 has known weakness and
  most implementations support alternatives.

- Add post-quantum key exchange. These avoid the possibility of current
  stored traffic being decrypted using a possible future quantum
  computer.

  sntrup761 added by Matt Johnston, using sntrup761 implementation from
  Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange and
  Christine van Vredendaal, with integration work from OpenSSH.

  ML-KEM added by Loganaden Velvindron, Jaykishan Mutkawoa, Kavish Nadan,
  using libcrux, also based on OpenSSH work.

  These do increase code size, at least sntrup761 is recommended,
  see default_options.h

- &gt;&gt; Decompression is disabled on the server, compression
  is still supported.
  This avoids attack surface for zlib and saves runtime memory.

- Add -D server flag to specify authorized_keys directory, from Darren Tucker.

- Include remote host in "Login attempt with wrong user" message for fail2ban,
  patch from MichaIng.

- Workaround writing hostkeys on FUSE filesystem that don't
  support hardlinks, reported by elijahr.

- Fix truncated error messages such as host key mismatch.

- &gt;&gt; Preference aes256 ahead of aes128 for the client. chacha20-poly1305
  is still first preference.

- Fix ubsan failure in curve25519 code, reported by Steven Bytnar.
  Has no effect on execution.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Changes:
Note &gt;&gt; for compatibility/configuration changes

- &gt;&gt; Disable SHA-1 algorithms by default. SHA-1 has known weakness and
  most implementations support alternatives.

- Add post-quantum key exchange. These avoid the possibility of current
  stored traffic being decrypted using a possible future quantum
  computer.

  sntrup761 added by Matt Johnston, using sntrup761 implementation from
  Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange and
  Christine van Vredendaal, with integration work from OpenSSH.

  ML-KEM added by Loganaden Velvindron, Jaykishan Mutkawoa, Kavish Nadan,
  using libcrux, also based on OpenSSH work.

  These do increase code size, at least sntrup761 is recommended,
  see default_options.h

- &gt;&gt; Decompression is disabled on the server, compression
  is still supported.
  This avoids attack surface for zlib and saves runtime memory.

- Add -D server flag to specify authorized_keys directory, from Darren Tucker.

- Include remote host in "Login attempt with wrong user" message for fail2ban,
  patch from MichaIng.

- Workaround writing hostkeys on FUSE filesystem that don't
  support hardlinks, reported by elijahr.

- Fix truncated error messages such as host key mismatch.

- &gt;&gt; Preference aes256 ahead of aes128 for the client. chacha20-poly1305
  is still first preference.

- Fix ubsan failure in curve25519 code, reported by Steven Bytnar.
  Has no effect on execution.
</pre>
</div>
</content>
</entry>
<entry>
<title>security/dropbear: update to 2024.86</title>
<updated>2024-11-19T00:10:15+00:00</updated>
<author>
<name>Piotr Kubaj</name>
<email>pkubaj@FreeBSD.org</email>
</author>
<published>2024-11-18T11:05:36+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/ports/commit/?id=5b33a1f719290cd4c63073a79eb3795fb7ddf378'/>
<id>5b33a1f719290cd4c63073a79eb3795fb7ddf378</id>
<content type='text'>
Also strip binaries.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Also strip binaries.
</pre>
</div>
</content>
</entry>
<entry>
<title>MAN?PREFIX: eleminate its usage  and move man to share/man</title>
<updated>2024-01-10T15:29:49+00:00</updated>
<author>
<name>Baptiste Daroussin</name>
<email>bapt@FreeBSD.org</email>
</author>
<published>2024-01-10T15:29:44+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/ports/commit/?id=e4610fcb8b73442ad40b744bb87c1bc428ef7c1c'/>
<id>e4610fcb8b73442ad40b744bb87c1bc428ef7c1c</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>security/dropbear: Unbundle libtom* libs by default</title>
<updated>2023-10-21T14:43:22+00:00</updated>
<author>
<name>Daniel Engberg</name>
<email>diizzy@FreeBSD.org</email>
</author>
<published>2023-10-21T14:29:07+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/ports/commit/?id=415739996a5c72024a6edbc4f74baba96107c164'/>
<id>415739996a5c72024a6edbc4f74baba96107c164</id>
<content type='text'>
Add option to use libtom* libraries from ports tree and set as default

PR:		274351
Reviewed by:	pkubaj (maintainer)
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Add option to use libtom* libraries from ports tree and set as default

PR:		274351
Reviewed by:	pkubaj (maintainer)
</pre>
</div>
</content>
</entry>
<entry>
<title>security/dropbear: update to 2022.83</title>
<updated>2022-11-15T21:52:51+00:00</updated>
<author>
<name>Piotr Kubaj</name>
<email>pkubaj@FreeBSD.org</email>
</author>
<published>2022-11-15T21:32:03+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/ports/commit/?id=17112226551be3350d06a66040413a26f252cb30'/>
<id>17112226551be3350d06a66040413a26f252cb30</id>
<content type='text'>
Features and Changes:
  Note &gt;&gt; for compatibility/configuration changes

- &gt;&gt; Disable DROPBEAR_DSS by default
  It is only 1024 bit and uses sha1, most distros disable it by default already.

- Added DROPBEAR_RSA_SHA1 option to allow disabling sha1 rsa signatures.
  &gt;&gt; RSA with sha1 will be disabled in a future release (rsa keys will continue
  to work OK, with sha256 signatures used instead).

- Add option for requiring both password and pubkey (-t)
  Patch from Jackkal

- Add 'no-touch-required' and 'verify-required' options for sk keys
  Patch from Egor Duda

  - &gt;&gt; DROPBEAR_SK_KEYS config option now replaces separate DROPBEAR_SK_ECDSA
  and DROPBEAR_SK_ED25519 options.

- Add 'permitopen' option for authorized_keys to restrict forwarded ports
  Patch from Tuomas Haikarainen

- &gt;&gt; Added LTM_CFLAGS configure argument to set flags for building
  bundled libtommath. This also restores the previous arguments used
  in 2020.81 (-O3 -funroll-loops). That gives a big speedup for RSA
  key generation, which regressed in 2022.82.
  There is a tradeoff with code size, so -Os can be used if required.
  https://github.com/mkj/dropbear/issues/174
  Reported by David Bernard

- Add '-z' flag to disable setting QoS traffic class. This may be necessary
  to work with broken networks or network drivers, exposed after changes to use
  AF21 in 2022.82
  https://github.com/mkj/dropbear/issues/193
  Reported by yuhongwei380, patch from Petr Štetiar

- Allow overriding user shells with COMPAT_USER_SHELLS
  Based on a patch from Matt Robinson

- Improve permission error message
  Patch from k-kurematsu

- &gt;&gt; Remove HMAC_MD5 entirely

Regression fixes from 2022.82:

- Fix X11 build

- Fix build warning

- Fix compilation when disabling pubkey authentication
  Patch from MaxMougg

- Fix MAX_UNAUTH_CLIENTS regression
  Reported by ptpt52

- Avoid using slower prime testing in bundled libtomcrypt when DSS is disabled
  https://github.com/mkj/dropbear/issues/174
  Suggested by Steffen Jaeckel

- Fix Dropbear plugin support
  https://github.com/mkj/dropbear/issues/194
  Reported by Struan Bartlett

Other fixes:

- Fix long standing incorrect compression size check. Dropbear
  (client or server) would erroneously exit with
  "bad packet, oversized decompressed"
  when receiving a compressed packet of exactly the maximum size.

- Fix missing setsid() removed in 2020.79
  https://github.com/mkj/dropbear/issues/180
  Reported and debugged by m5jt and David Bernard

- Try keyboard-interactive auth before password, in dbclient.
  This was unintentionally changed back in 2013
  https://github.com/mkj/dropbear/pull/190
  Patch from Michele Giacomoli

- Drain the terminal when reading the fingerprint confirmation response
  https://github.com/mkj/dropbear/pull/191
  Patch from Michele Giacomoli

- Fix utx wtmp variable typo. This has been wrong for a long time but
  only recently became a problem when wtmp was detected.
  https://github.com/mkj/dropbear/pull/189
  Patch from Michele Giacomoli

- Improve configure test for hardening options.
  Fixes building on AIX
  https://github.com/mkj/dropbear/issues/158

- Fix debian/dropbear.init newline
  From wulei-student

Infrastructure:

- Test off-by-default compile options
- Set -Wundef to catch typos in #if statements
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Features and Changes:
  Note &gt;&gt; for compatibility/configuration changes

- &gt;&gt; Disable DROPBEAR_DSS by default
  It is only 1024 bit and uses sha1, most distros disable it by default already.

- Added DROPBEAR_RSA_SHA1 option to allow disabling sha1 rsa signatures.
  &gt;&gt; RSA with sha1 will be disabled in a future release (rsa keys will continue
  to work OK, with sha256 signatures used instead).

- Add option for requiring both password and pubkey (-t)
  Patch from Jackkal

- Add 'no-touch-required' and 'verify-required' options for sk keys
  Patch from Egor Duda

  - &gt;&gt; DROPBEAR_SK_KEYS config option now replaces separate DROPBEAR_SK_ECDSA
  and DROPBEAR_SK_ED25519 options.

- Add 'permitopen' option for authorized_keys to restrict forwarded ports
  Patch from Tuomas Haikarainen

- &gt;&gt; Added LTM_CFLAGS configure argument to set flags for building
  bundled libtommath. This also restores the previous arguments used
  in 2020.81 (-O3 -funroll-loops). That gives a big speedup for RSA
  key generation, which regressed in 2022.82.
  There is a tradeoff with code size, so -Os can be used if required.
  https://github.com/mkj/dropbear/issues/174
  Reported by David Bernard

- Add '-z' flag to disable setting QoS traffic class. This may be necessary
  to work with broken networks or network drivers, exposed after changes to use
  AF21 in 2022.82
  https://github.com/mkj/dropbear/issues/193
  Reported by yuhongwei380, patch from Petr Štetiar

- Allow overriding user shells with COMPAT_USER_SHELLS
  Based on a patch from Matt Robinson

- Improve permission error message
  Patch from k-kurematsu

- &gt;&gt; Remove HMAC_MD5 entirely

Regression fixes from 2022.82:

- Fix X11 build

- Fix build warning

- Fix compilation when disabling pubkey authentication
  Patch from MaxMougg

- Fix MAX_UNAUTH_CLIENTS regression
  Reported by ptpt52

- Avoid using slower prime testing in bundled libtomcrypt when DSS is disabled
  https://github.com/mkj/dropbear/issues/174
  Suggested by Steffen Jaeckel

- Fix Dropbear plugin support
  https://github.com/mkj/dropbear/issues/194
  Reported by Struan Bartlett

Other fixes:

- Fix long standing incorrect compression size check. Dropbear
  (client or server) would erroneously exit with
  "bad packet, oversized decompressed"
  when receiving a compressed packet of exactly the maximum size.

- Fix missing setsid() removed in 2020.79
  https://github.com/mkj/dropbear/issues/180
  Reported and debugged by m5jt and David Bernard

- Try keyboard-interactive auth before password, in dbclient.
  This was unintentionally changed back in 2013
  https://github.com/mkj/dropbear/pull/190
  Patch from Michele Giacomoli

- Drain the terminal when reading the fingerprint confirmation response
  https://github.com/mkj/dropbear/pull/191
  Patch from Michele Giacomoli

- Fix utx wtmp variable typo. This has been wrong for a long time but
  only recently became a problem when wtmp was detected.
  https://github.com/mkj/dropbear/pull/189
  Patch from Michele Giacomoli

- Improve configure test for hardening options.
  Fixes building on AIX
  https://github.com/mkj/dropbear/issues/158

- Fix debian/dropbear.init newline
  From wulei-student

Infrastructure:

- Test off-by-default compile options
- Set -Wundef to catch typos in #if statements
</pre>
</div>
</content>
</entry>
<entry>
<title>Add WWW entries to port Makefiles</title>
<updated>2022-09-07T21:10:59+00:00</updated>
<author>
<name>Stefan Eßer</name>
<email>se@FreeBSD.org</email>
</author>
<published>2022-09-07T21:06:12+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/ports/commit/?id=b7f05445c00f2625aa19b4154ebcbce5ed2daa52'/>
<id>b7f05445c00f2625aa19b4154ebcbce5ed2daa52</id>
<content type='text'>
It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.

Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.

There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.

This commit implements such a proposal and moves one of the WWW: entries
of each pkg-descr file into the respective port's Makefile. A heuristic
attempts to identify the most relevant URL in case there is more than
one WWW: entry in some pkg-descr file. URLs that are not moved into the
Makefile are prefixed with "See also:" instead of "WWW:" in the pkg-descr
files in order to preserve them.

There are 1256 ports that had no WWW: entries in pkg-descr files. These
ports will not be touched in this commit.

The portlint port has been adjusted to expect a WWW entry in each port
Makefile, and to flag any remaining "WWW:" lines in pkg-descr files as
deprecated.

Approved by:		portmgr (tcberner)
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.

Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.

There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.

This commit implements such a proposal and moves one of the WWW: entries
of each pkg-descr file into the respective port's Makefile. A heuristic
attempts to identify the most relevant URL in case there is more than
one WWW: entry in some pkg-descr file. URLs that are not moved into the
Makefile are prefixed with "See also:" instead of "WWW:" in the pkg-descr
files in order to preserve them.

There are 1256 ports that had no WWW: entries in pkg-descr files. These
ports will not be touched in this commit.

The portlint port has been adjusted to expect a WWW entry in each port
Makefile, and to flag any remaining "WWW:" lines in pkg-descr files as
deprecated.

Approved by:		portmgr (tcberner)
</pre>
</div>
</content>
</entry>
<entry>
<title>security: remove 'Created by' lines</title>
<updated>2022-07-20T14:22:56+00:00</updated>
<author>
<name>Tobias C. Berner</name>
<email>tcberner@FreeBSD.org</email>
</author>
<published>2022-07-20T14:22:56+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/ports/commit/?id=857c05f8674c5f4c990f49f9d0fb7034ebd340fe'/>
<id>857c05f8674c5f4c990f49f9d0fb7034ebd340fe</id>
<content type='text'>
A big Thank You to the original contributors of these ports:

  *  &lt;ports@c0decafe.net&gt;
  *  Aaron Dalton &lt;aaron@FreeBSD.org&gt;
  *  Adam Weinberger &lt;adamw@FreeBSD.org&gt;
  *  Ade Lovett &lt;ade@FreeBSD.org&gt;
  *  Aldis Berjoza &lt;aldis@bsdroot.lv&gt;
  *  Alex Dupre &lt;ale@FreeBSD.org&gt;
  *  Alex Kapranoff &lt;kappa@rambler-co.ru&gt;
  *  Alex Samorukov &lt;samm@freebsd.org&gt;
  *  Alexander Botero-Lowry &lt;alex@foxybanana.com&gt;
  *  Alexander Kriventsov &lt;avk@vl.ru&gt;
  *  Alexander Leidinger &lt;netchild@FreeBSD.org&gt;
  *  Alexander Logvinov &lt;ports@logvinov.com&gt;
  *  Alexander Y. Grigoryev &lt;alexander.4mail@gmail.com&gt;
  *  Alexey Dokuchaev &lt;danfe@FreeBSD.org&gt;
  *  Alfred Perlstein
  *  Alfred Perlstein &lt;alfred@FreeBSD.org&gt;
  *  Anders Nordby &lt;anders@FreeBSD.org&gt;
  *  Anders Nordby &lt;anders@fix.no&gt;
  *  Andreas Klemm &lt;andreas@klemm.gtn.com&gt;
  *  Andrew Lewis &lt;freeghb@gmail.com&gt;
  *  Andrew Pantyukhin &lt;infofarmer@FreeBSD.org&gt;
  *  Andrew St. Jean &lt;andrew@arda.homeunix.net&gt;
  *  Anes Mukhametov &lt;anes@anes.su&gt;
  *  Antoine Brodin &lt;antoine@FreeBSD.org&gt;
  *  Anton Berezin &lt;tobez@FreeBSD.org&gt;
  *  Antonio Carlos Venancio Junior (&lt;antonio@inf.ufsc.br&gt;)
  *  Antonio Carlos Venancio Junior &lt;antonio@inf.ufsc.br&gt;
  *  Ashish SHUKLA &lt;ashish@FreeBSD.org&gt;
  *  Attila Nagy &lt;bra@fsn.hu&gt;
  *  Autrijus Tang &lt;autrijus@autrijus.org&gt;
  *  Axel Rau &lt;axel.rau@chaos1.de&gt;
  *  Babak Farrokhi &lt;farrokhi@FreeBSD.org&gt;
  *  Ben Woods &lt;woodsb02@FreeBSD.org&gt;
  *  Bernard Spil &lt;brnrd@FreeBSD.org&gt;
  *  Bernard Spil &lt;brnrd@freebsd.org&gt;
  *  Blaz Zupan &lt;blaz@si.FreeBSD.org&gt;
  *  Bob Hockney &lt;zeus@ix.netcom.com&gt;
  *  Boris Kochergin &lt;spawk@acm.poly.edu&gt;
  *  Brendan Molloy &lt;brendan+freebsd@bbqsrc.net&gt;
  *  Bruce M Simpson
  *  Bruce M Simpson &lt;bms@FreeBSD.org&gt;
  *  Bruce M. Simpson &lt;bms@FreeBSD.org&gt;
  *  Carlo Strub
  *  Carlo Strub &lt;cs@FreeBSD.org&gt;
  *  Carlos J Puga Medina &lt;cpm@FreeBSD.org&gt;
  *  Carlos J Puga Medina &lt;cpm@fbsd.es&gt;
  *  Charlie Root &lt;se@FreeBSD.org&gt;
  *  Cheng-Lung Sung &lt;clsung@FreeBSD.org&gt;
  *  Cheng-Lung Sung &lt;clsung@dragon2.net&gt;
  *  Chie Taguchi &lt;taguchi.ch@gmail.com&gt;
  *  Chris Cowart &lt;ccowart@rescomp.berkeley.edu&gt;
  *  Chris D. Faulhaber &lt;jedgar@FreeBSD.org&gt;
  *  Christer Edwards &lt;christer.edwards@gmail.com&gt;
  *  Christian Lackas
  *  Christopher Hall &lt;hsw@bitmark.com&gt;
  *  Clement Laforet &lt;sheepkiller@cultdeadsheep.org&gt;
  *  Clive Lin &lt;clive@CirX.ORG&gt;
  *  Colin Percival
  *  Cory McIntire (loon@noncensored.com)
  *  Craig Leres &lt;leres@FreeBSD.org&gt;
  *  Cristiano Deana &lt;cris@gufi.org&gt;
  *  Cy Schubert (Cy.Schubert@uumail.gov.bc.ca)
  *  Cy Schubert &lt;Cy.Schubert@uumail.gov.bc.ca&gt;
  *  Cy Schubert &lt;cy@FreeBSD.org&gt;
  *  Damian Gerow &lt;dgerow@afflictions.org&gt;
  *  Damien Bobillot
  *  Dan Langille
  *  Dan Langille &lt;dan@freebsddiary.org&gt;
  *  Dan Langille &lt;dvl@FreeBSD.org&gt;
  *  Dan Langille &lt;dvl@freebsd.org&gt;
  *  Dan Langille &lt;dvl@sourcefire.com&gt;
  *  Daniel Kahn Gillmor &lt;dkg@fifthhorseman.net&gt;
  *  Daniel Roethlisberger &lt;daniel@roe.ch&gt;
  *  Danilo Egea Gondolfo &lt;danilo@FreeBSD.org&gt;
  *  Danton Dorati &lt;urisso@bsd.com.br&gt;
  *  Dave McKay &lt;dave@mu.org&gt;
  *  David E. Thiel &lt;lx@FreeBSD.org&gt;
  *  David O'Brien (obrien@NUXI.com)
  *  David O'Brien &lt;obrien@FreeBSD.org&gt;
  *  David Thiel &lt;lx@redundancy.redundancy.org&gt;
  *  Dean Hollister &lt;dean@odyssey.apana.org.au&gt;
  *  Denis Shaposhnikov &lt;dsh@vlink.ru&gt;
  *  Dereckson &lt;dereckson@gmail.com&gt;
  *  Dirk Froemberg &lt;dirk@FreeBSD.org&gt;
  *  Ditesh Shashikant Gathani &lt;ditesh@gathani.org&gt;
  *  Dom Mitchell &lt;dom@happygiraffe.net&gt;
  *  Dominic Marks &lt;dominic.marks@btinternet.com&gt;
  *  Don Croyle &lt;croyle@gelemna.org&gt;
  *  Douglas Thrift &lt;douglas@douglasthrift.net&gt;
  *  Edson Brandi &lt;ebrandi@fugspbr.org&gt;
  *  Edwin Groothuis &lt;edwin@mavetju.org&gt;
  *  Ekkehard 'Ekki' Gehm &lt;gehm@physik.tu-berlin.de&gt;
  *  Emanuel Haupt &lt;ehaupt@FreeBSD.org&gt;
  *  Emanuel Haupt &lt;ehaupt@critical.ch&gt;
  *  Eric Crist &lt;ecrist@secure-computing.net&gt;
  *  Erwin Lansing &lt;erwin@FreeBSD.org&gt;
  *  Eugene Grosbein &lt;eugen@FreeBSD.org&gt;
  *  Fabian Keil &lt;fk@fabiankeil.de&gt;
  *  Felix Palmen &lt;felix@palmen-it.de&gt;
  *  Florent Thoumie &lt;flz@xbsd.org&gt;
  *  Foxfair Hu &lt;foxfair@FreeBSD.org&gt;
  *  Frank Laszlo &lt;laszlof@vonostingroup.com&gt;
  *  Frank Wall &lt;fw@moov.de&gt;
  *  Franz Bettag &lt;franz@bett.ag&gt;
  *  Gabor Kovesdan
  *  Gabor Kovesdan &lt;gabor@FreeBSD.org&gt;
  *  Gabriel M. Dutra &lt;0xdutra@gmail.com&gt;
  *  Gary Hayers &lt;Gary@Hayers.net&gt;
  *  Gasol Wu &lt;gasol.wu@gmail.com&gt;
  *  Gea-Suan Lin &lt;gslin@gslin.org&gt;
  *  George Reid &lt;greid@ukug.uk.freebsd.org&gt;
  *  George Reid &lt;services@nevernet.net&gt;
  *  Greg Larkin &lt;glarkin@FreeBSD.org&gt;
  *  Greg V &lt;greg@unrelenting.technology&gt;
  *  Gregory Neil Shapiro &lt;gshapiro@FreeBSD.org&gt;
  *  Grzegorz Blach &lt;gblach@FreeBSD.org&gt;
  *  Guangyuan Yang &lt;ygy@FreeBSD.org&gt;
  *  Hakisho Nukama &lt;nukama@gmail.com&gt;
  *  Hammurabi Mendes &lt;hmendes@brturbo.com&gt;
  *  Henk van Oers &lt;hvo.pm@xs4all.nl&gt;
  *  Horia Racoviceanu &lt;horia@racoviceanu.com&gt;
  *  Hung-Yi Chen &lt;gaod@hychen.org&gt;
  *  Jaap Akkerhuis &lt;jaap@NLnetLabs.nl&gt;
  *  Jaap Boender &lt;jaapb@kerguelen.org&gt;
  *  Jacek Serwatynski &lt;tutus@trynet.eu.org&gt;
  *  James FitzGibbon &lt;jfitz@FreeBSD.org&gt;
  *  James Thomason &lt;james@divide.org&gt;
  *  Jan-Peter Koopmann &lt;Jan-Peter.Koopmann@seceidos.de&gt;
  *  Janky Jay &lt;ek@purplehat.org&gt;
  *  Janos Mohacsi
  *  Janos Mohacsi &lt;janos.mohacsi@bsd.hu&gt;
  *  Jean-Yves Lefort &lt;jylefort@brutele.be&gt;
  *  Jim Geovedi &lt;jim@corebsd.or.id&gt;
  *  Jim Ohlstein &lt;jim@ohlste.in&gt;
  *  Joe Clarke &lt;marcus@marcuscom.com&gt;
  *  Joe Marcus Clarke &lt;marcus@FreeBSD.org&gt;
  *  Johann Visagie &lt;johann@egenetics.com&gt;
  *  Johann Visagie &lt;wjv@FreeBSD.org&gt;
  *  John Ferrell &lt;jdferrell3@yahoo.com&gt;
  *  John Hixson &lt;jhixson@gmail.com&gt;
  *  John Polstra &lt;jdp@polstra.com&gt;
  *  John W. O'Brien &lt;john@saltant.com&gt;
  *  John-Mark Gurney &lt;jmg@FreeBSD.org&gt;
  *  Jose Alonso Cardenas Marquez &lt;acardenas@bsd.org.pe&gt;
  *  Joseph Benden &lt;joe@thrallingpenguin.com&gt;
  *  Joshua D. Abraham &lt;jabra@ccs.neu.edu&gt;
  *  Jov &lt;amutu@amutu.com&gt;
  *  Jui-Nan Lin &lt;jnlin@freebsd.cs.nctu.edu.tw&gt;
  *  Ka Ho Ng &lt;khng300@gmail.com&gt;
  *  Kay Lehmann &lt;kay_lehmann@web.de&gt;
  *  Keith J. Jones &lt;kjones@antihackertoolkit.com&gt;
  *  Kevin Zheng &lt;kevinz5000@gmail.com&gt;
  *  Kimura Fuyuki &lt;fuyuki@hadaly.org&gt;
  *  Kimura Fuyuki &lt;fuyuki@mj.0038.net&gt;
  *  Klayton Monroe &lt;klm@uidzero.org&gt;
  *  Konstantin Menshikov &lt;kostjnspb@yandex.ru&gt;
  *  Koop Mast &lt;kwm@FreeBSD.org&gt;
  *  Kris Kennaway &lt;kris@FreeBSD.org&gt;
  *  Kubilay Kocak &lt;koobs@FreeBSD.org&gt;
  *  Kurt Jaeger &lt;fbsd-ports@opsec.eu&gt;
  *  LEVAI Daniel &lt;leva@ecentrum.hu&gt;
  *  Lars Engels &lt;lme@FreeBSD.org&gt;
  *  Lars Thegler &lt;lth@FreeBSD.org&gt;
  *  Laurent LEVIER &lt;llevier@argosnet.com&gt;
  *  Luiz Eduardo R. Cordeiro
  *  Lukas Slebodnik &lt;lukas.slebodnik@intrak.sk&gt;
  *  Lukasz Komsta
  *  Mageirias Anastasios &lt;anastmag@gmail.com&gt;
  *  Marcel Prisi &lt;marcel.prisi@virtua.ch&gt;
  *  Marcello Coutinho
  *  Mario Sergio Fujikawa Ferreira &lt;lioux@FreeBSD.org&gt;
  *  Mark Felder &lt;feld@FreeBSD.org&gt;
  *  Mark Hannon &lt;markhannon@optusnet.com.au&gt;
  *  Mark Murray &lt;markm@FreeBSD.org&gt;
  *  Mark Pulford &lt;mark@kyne.com.au&gt;
  *  Marko Njezic &lt;sf@maxempire.com&gt;
  *  Martin Matuska &lt;martin@tradex.sk&gt;
  *  Martin Matuska &lt;mm@FreeBSD.org&gt;
  *  Martin Mersberger
  *  Martin Wilke &lt;miwi@FreeBSD.org&gt;
  *  Martti Kuparinen &lt;martti.kuparinen@ericsson.com&gt;
  *  Mateusz Piotrowski &lt;0mp@FreeBSD.org&gt;
  *  Matt &lt;matt@xtaz.net&gt;
  *  Matt Behrens &lt;matt@zigg.com&gt;
  *  Matthias Andree &lt;mandree@FreeBSD.org&gt;
  *  Matthias Fechner &lt;mfechner@FreeBSD.org&gt;
  *  Matthieu BOUTHORS &lt;matthieu@labs.fr&gt;
  *  Maxim Sobolev &lt;sobomax@FreeBSD.org&gt;
  *  Meno Abels &lt;meno.abels@adviser.com&gt;
  *  Michael Haro &lt;mharo@FreeBSD.org&gt;
  *  Michael Johnson &lt;ahze@FreeBSD.org&gt;
  *  Michael Nottebrock &lt;lofi@FreeBSD.org&gt;
  *  Michael Reifenberger &lt;mr@FreeBSD.org&gt;
  *  Michael Schout &lt;mschout@gkg.net&gt;
  *  Michal Bielicki &lt;m.bielicki@llizardfs.com&gt;
  *  Michiel van Baak &lt;michiel@vanbaak.eu
  *  Mij &lt;mij@bitchx.it&gt;
  *  Mike Heffner &lt;mheffner@vt.edu&gt;
  *  Mikhail T. &lt;m.tsatsenko@gmail.com&gt;
  *  Mikhail Teterin &lt;mi@aldan.algebra.com&gt;
  *  Milan Obuch
  *  Mosconi &lt;mosconi.rmg@gmail.com&gt;
  *  Muhammad Moinur Rahman &lt;5u623l20@gmail.com&gt;
  *  Mustafa Arif &lt;ma499@doc.ic.ac.uk&gt;
  *  Neil Booth
  *  Neil Booth &lt;kyuupichan@gmail.com&gt;
  *  Nick Barkas &lt;snb@threerings.net&gt;
  *  Nicola Vitale &lt;nivit@FreeBSD.org&gt;
  *  Niels Heinen
  *  Nikola Kolev &lt;koue@chaosophia.net&gt;
  *  Nobutaka Mantani &lt;nobutaka@FreeBSD.org&gt;
  *  Oliver Lehmann
  *  Oliver Lehmann &lt;oliver@FreeBSD.org&gt;
  *  Olivier Duchateau
  *  Olivier Duchateau &lt;duchateau.olivier@gmail.com&gt;
  *  Olli Hauer
  *  Patrick Li &lt;pat@databits.net&gt;
  *  Paul Chvostek &lt;paul@it.ca&gt;
  *  Paul Schmehl &lt;pauls@utdallas.edu&gt;
  *  Pavel I Volkov &lt;pavelivolkov@googlemail.com&gt;
  *  Pete Fritchman &lt;petef@databits.net&gt;
  *  Peter Ankerstal &lt;peter@pean.org&gt;
  *  Peter Haight &lt;peterh@sapros.com&gt;
  *  Peter Johnson &lt;johnson.peter@gmail.com&gt;
  *  Peter Pentchev &lt;roam@FreeBSD.org&gt;
  *  Petr Rehor &lt;rx@rx.cz&gt;
  *  Philippe Audeoud &lt;jadawin@tuxaco.net&gt;
  *  Philippe Rocques &lt;phil@teaser.fr&gt;
  *  Piotr Kubaj &lt;pkubaj@FreeBSD.org&gt;
  *  Piotr Kubaj &lt;pkubaj@anongoth.pl&gt;
  *  Po-Chuan Hsieh &lt;sunpoet@FreeBSD.org&gt;
  *  RaRa Rasputin &lt;rasputin@submonkey.net&gt;
  *  Radim Kolar
  *  Ralf Meister
  *  Remington Lang &lt;MrL0Lz@gmail.com&gt;
  *  Renaud Chaput &lt;renchap@cocoa-x.com&gt;
  *  Roderick van Domburg &lt;r.s.a.vandomburg@student.utwente.nl&gt;
  *  Roland van Laar &lt;roland@micite.net&gt;
  *  Romain Tartiere &lt;romain@blogreen.org&gt;
  *  Roman Bogorodskiy
  *  Roman Bogorodskiy &lt;novel@FreeBSD.org&gt;
  *  Roman Shterenzon &lt;roman@xpert.com&gt;
  *  Rong-En Fan &lt;rafan@FreeBSD.org&gt;
  *  Ryan Steinmetz &lt;zi@FreeBSD.org&gt;
  *  Sahil Tandon &lt;sahil@tandon.net&gt;
  *  Sascha Holzleiter &lt;sascha@root-login.org&gt;
  *  SeaD
  *  Seamus Venasse &lt;svenasse@polaris.ca&gt;
  *  Sean Greven &lt;sean.greven@gmail.com&gt;
  *  Sebastian Schuetz &lt;sschuetz@fhm.edu&gt;
  *  Sergei Kolobov &lt;sergei@FreeBSD.org&gt;
  *  Sergei Kolobov &lt;sergei@kolobov.com&gt;
  *  Sergei Vyshenski
  *  Sergei Vyshenski &lt;svysh.fbsd@gmail.com&gt;
  *  Sergey Skvortsov &lt;skv@protey.ru&gt;
  *  Seth Kingsley &lt;sethk@meowfishies.com&gt;
  *  Shaun Amott &lt;shaun@inerd.com&gt;
  *  Simeon Simeonov &lt;sgs@pichove.org&gt;
  *  Simon Dick &lt;simond@irrelevant.org&gt;
  *  Sofian Brabez &lt;sbrabez@gmail.com&gt;
  *  Stanislav Sedov &lt;ssedov@mbsd.msk.ru&gt;
  *  Stefan Esser &lt;se@FreeBSD.org&gt;
  *  Stefan Grundmann
  *  Stefan Walter &lt;sw@gegenunendlich.de&gt;
  *  Stephon Chen &lt;stephon@gmail.com&gt;
  *  Steve Wills &lt;steve@mouf.net&gt;
  *  Steve Wills &lt;swills@FreeBSD.org&gt;
  *  Steven Kreuzer
  *  Steven Kreuzer &lt;skreuzer@exit2shell.com&gt;
  *  Sunpoet Po-Chuan Hsieh &lt;sunpoet@FreeBSD.org&gt;
  *  TAKAHASHI Kaoru &lt;kaoru@kaisei.org&gt;
  *  TAKATSU Tomonari &lt;tota@FreeBSD.org&gt;
  *  Tatsuki Makino &lt;tatsuki_makino@hotmail.com&gt;
  *  Thibault Payet &lt;monwarez@mailoo.org&gt;
  *  Thierry Thomas (&lt;thierry@pompo.net&gt;)
  *  Thierry Thomas &lt;thierry@pompo.net&gt;
  *  Thomas Hurst &lt;tom@hur.st&gt;
  *  Thomas Quinot &lt;thomas@cuivre.fr.eu.org&gt;
  *  Thomas Zander &lt;riggs@FreeBSD.org&gt;
  *  Thomas von Dein &lt;freebsd@daemon.de&gt;
  *  Tilman Linneweh &lt;arved@FreeBSD.org&gt;
  *  Tim Bishop &lt;tim@bishnet.net&gt;
  *  Tom Judge &lt;tom@tomjudge.com&gt;
  *  Tomoyuki Sakurai &lt;cherry@trombik.org&gt;
  *  Toni Viemerö &lt;toni.viemero@iki.fi&gt;
  *  Tony Maher
  *  Torsten Zuhlsdorff &lt;ports@toco-domains.de&gt;
  *  Travis Campbell &lt;hcoyote@ghostar.org&gt;
  *  Tsung-Han Yeh &lt;snowfly@yuntech.edu.tw&gt;
  *  Ulf Lilleengen
  *  Vaida Bogdan &lt;vaida.bogdan@gmail.com&gt;
  *  Valentin Zahariev &lt;curly@e-card.bg&gt;
  *  Valerio Daelli &lt;valerio.daelli@gmail.com&gt;
  *  Veniamin Gvozdikov &lt;vg@FreeBSD.org&gt;
  *  Victor Popov
  *  Victor Popov &lt;v.a.popov@gmail.com&gt;
  *  Vsevolod Stakhov
  *  Vsevolod Stakhov &lt;vsevolod@FreeBSD.org&gt;
  *  Wen Heping &lt;wen@FreeBSD.org&gt;
  *  Wen Heping &lt;wenheping@gmail.com&gt;
  *  Yarodin &lt;yarodin@gmail.com&gt;
  *  Yen-Ming Lee &lt;leeym@FreeBSD.org&gt;
  *  Yen-Ming Lee &lt;leeym@cae.ce.ntu.edu.tw&gt;
  *  Yen-Ming Lee &lt;leeym@leeym.com&gt;
  *  Ying-Chieh Liao &lt;ijliao@FreeBSD.org&gt;
  *  Yonatan &lt;Yonatan@Xpert.com&gt;
  *  Yonatan &lt;onatan@gmail.com&gt;
  *  Yoshisato YANAGISAWA
  *  Yuri Victorovich
  *  Yuri Victorovich &lt;yuri@rawbw.com&gt;
  *  Zach Thompson &lt;hideo@lastamericanempire.com&gt;
  *  Zane C. Bowers &lt;vvelox@vvelox.net&gt;
  *  Zeus Panchenko &lt;zeus@gnu.org.ua&gt;
  *  ache
  *  adamw
  *  ajk@iu.edu
  *  alex@FreeBSD.org
  *  allan@saddi.com
  *  alm
  *  andrej@ebert.su
  *  andrew@scoop.co.nz
  *  andy@fud.org.nz
  *  antoine@FreeBSD.org
  *  arved
  *  barner
  *  brix@FreeBSD.org
  *  buganini@gmail.com
  *  chinsan
  *  chris@still.whet.org
  *  clement
  *  clsung
  *  crow
  *  cy@FreeBSD.org
  *  dominik karczmarski &lt;dominik@karczmarski.com&gt;
  *  dwcjr@inethouston.net
  *  eivind
  *  erich@rrnet.com
  *  erwin@FreeBSD.org
  *  girgen@FreeBSD.org
  *  glen.j.barber@gmail.com
  *  hbo@egbok.com
  *  ijliao
  *  jesper
  *  jfitz
  *  johans
  *  joris
  *  kftseng@iyard.org
  *  kris@FreeBSD.org
  *  lx
  *  markm
  *  mharo@FreeBSD.org
  *  michaelnottebrock@gmx.net
  *  mnag@FreeBSD.org
  *  mp39590@gmail.com
  *  nbm
  *  nectar@FreeBSD.org
  *  nork@FreeBSD.org
  *  nork@cityfujisawa.ne.jp
  *  nsayer@FreeBSD.org
  *  nsayer@quack.kfu.com
  *  ntarmos@cs.uoi.gr
  *  oly
  *  onatan@gmail.com
  *  pandzilla
  *  patrick@mindstep.com
  *  pauls
  *  perl@FreeBSD.org
  *  petef@FreeBSD.org
  *  peter.thoenen@yahoo.com
  *  ports@c0decafe.net
  *  ports@rbt.ca
  *  roam@FreeBSD.org
  *  rokaz
  *  sada@FreeBSD.org
  *  scrappy
  *  se
  *  shane@freebsdhackers.net aka modsix@gmail.com
  *  snb@threerings.net
  *  sumikawa
  *  sviat
  *  teramoto@comm.eng.osaka-u.ac.jp
  *  thierry@pompo.net
  *  tobez@FreeBSD.org
  *  torstenb@FreeBSD.org
  *  trasz &lt;trasz@pin.if.uz.zgora.pl&gt;
  *  trevor
  *  truckman
  *  vanhu
  *  vanilla@
  *  wen@FreeBSD.org
  *  will

With hat:	portmgr
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
A big Thank You to the original contributors of these ports:

  *  &lt;ports@c0decafe.net&gt;
  *  Aaron Dalton &lt;aaron@FreeBSD.org&gt;
  *  Adam Weinberger &lt;adamw@FreeBSD.org&gt;
  *  Ade Lovett &lt;ade@FreeBSD.org&gt;
  *  Aldis Berjoza &lt;aldis@bsdroot.lv&gt;
  *  Alex Dupre &lt;ale@FreeBSD.org&gt;
  *  Alex Kapranoff &lt;kappa@rambler-co.ru&gt;
  *  Alex Samorukov &lt;samm@freebsd.org&gt;
  *  Alexander Botero-Lowry &lt;alex@foxybanana.com&gt;
  *  Alexander Kriventsov &lt;avk@vl.ru&gt;
  *  Alexander Leidinger &lt;netchild@FreeBSD.org&gt;
  *  Alexander Logvinov &lt;ports@logvinov.com&gt;
  *  Alexander Y. Grigoryev &lt;alexander.4mail@gmail.com&gt;
  *  Alexey Dokuchaev &lt;danfe@FreeBSD.org&gt;
  *  Alfred Perlstein
  *  Alfred Perlstein &lt;alfred@FreeBSD.org&gt;
  *  Anders Nordby &lt;anders@FreeBSD.org&gt;
  *  Anders Nordby &lt;anders@fix.no&gt;
  *  Andreas Klemm &lt;andreas@klemm.gtn.com&gt;
  *  Andrew Lewis &lt;freeghb@gmail.com&gt;
  *  Andrew Pantyukhin &lt;infofarmer@FreeBSD.org&gt;
  *  Andrew St. Jean &lt;andrew@arda.homeunix.net&gt;
  *  Anes Mukhametov &lt;anes@anes.su&gt;
  *  Antoine Brodin &lt;antoine@FreeBSD.org&gt;
  *  Anton Berezin &lt;tobez@FreeBSD.org&gt;
  *  Antonio Carlos Venancio Junior (&lt;antonio@inf.ufsc.br&gt;)
  *  Antonio Carlos Venancio Junior &lt;antonio@inf.ufsc.br&gt;
  *  Ashish SHUKLA &lt;ashish@FreeBSD.org&gt;
  *  Attila Nagy &lt;bra@fsn.hu&gt;
  *  Autrijus Tang &lt;autrijus@autrijus.org&gt;
  *  Axel Rau &lt;axel.rau@chaos1.de&gt;
  *  Babak Farrokhi &lt;farrokhi@FreeBSD.org&gt;
  *  Ben Woods &lt;woodsb02@FreeBSD.org&gt;
  *  Bernard Spil &lt;brnrd@FreeBSD.org&gt;
  *  Bernard Spil &lt;brnrd@freebsd.org&gt;
  *  Blaz Zupan &lt;blaz@si.FreeBSD.org&gt;
  *  Bob Hockney &lt;zeus@ix.netcom.com&gt;
  *  Boris Kochergin &lt;spawk@acm.poly.edu&gt;
  *  Brendan Molloy &lt;brendan+freebsd@bbqsrc.net&gt;
  *  Bruce M Simpson
  *  Bruce M Simpson &lt;bms@FreeBSD.org&gt;
  *  Bruce M. Simpson &lt;bms@FreeBSD.org&gt;
  *  Carlo Strub
  *  Carlo Strub &lt;cs@FreeBSD.org&gt;
  *  Carlos J Puga Medina &lt;cpm@FreeBSD.org&gt;
  *  Carlos J Puga Medina &lt;cpm@fbsd.es&gt;
  *  Charlie Root &lt;se@FreeBSD.org&gt;
  *  Cheng-Lung Sung &lt;clsung@FreeBSD.org&gt;
  *  Cheng-Lung Sung &lt;clsung@dragon2.net&gt;
  *  Chie Taguchi &lt;taguchi.ch@gmail.com&gt;
  *  Chris Cowart &lt;ccowart@rescomp.berkeley.edu&gt;
  *  Chris D. Faulhaber &lt;jedgar@FreeBSD.org&gt;
  *  Christer Edwards &lt;christer.edwards@gmail.com&gt;
  *  Christian Lackas
  *  Christopher Hall &lt;hsw@bitmark.com&gt;
  *  Clement Laforet &lt;sheepkiller@cultdeadsheep.org&gt;
  *  Clive Lin &lt;clive@CirX.ORG&gt;
  *  Colin Percival
  *  Cory McIntire (loon@noncensored.com)
  *  Craig Leres &lt;leres@FreeBSD.org&gt;
  *  Cristiano Deana &lt;cris@gufi.org&gt;
  *  Cy Schubert (Cy.Schubert@uumail.gov.bc.ca)
  *  Cy Schubert &lt;Cy.Schubert@uumail.gov.bc.ca&gt;
  *  Cy Schubert &lt;cy@FreeBSD.org&gt;
  *  Damian Gerow &lt;dgerow@afflictions.org&gt;
  *  Damien Bobillot
  *  Dan Langille
  *  Dan Langille &lt;dan@freebsddiary.org&gt;
  *  Dan Langille &lt;dvl@FreeBSD.org&gt;
  *  Dan Langille &lt;dvl@freebsd.org&gt;
  *  Dan Langille &lt;dvl@sourcefire.com&gt;
  *  Daniel Kahn Gillmor &lt;dkg@fifthhorseman.net&gt;
  *  Daniel Roethlisberger &lt;daniel@roe.ch&gt;
  *  Danilo Egea Gondolfo &lt;danilo@FreeBSD.org&gt;
  *  Danton Dorati &lt;urisso@bsd.com.br&gt;
  *  Dave McKay &lt;dave@mu.org&gt;
  *  David E. Thiel &lt;lx@FreeBSD.org&gt;
  *  David O'Brien (obrien@NUXI.com)
  *  David O'Brien &lt;obrien@FreeBSD.org&gt;
  *  David Thiel &lt;lx@redundancy.redundancy.org&gt;
  *  Dean Hollister &lt;dean@odyssey.apana.org.au&gt;
  *  Denis Shaposhnikov &lt;dsh@vlink.ru&gt;
  *  Dereckson &lt;dereckson@gmail.com&gt;
  *  Dirk Froemberg &lt;dirk@FreeBSD.org&gt;
  *  Ditesh Shashikant Gathani &lt;ditesh@gathani.org&gt;
  *  Dom Mitchell &lt;dom@happygiraffe.net&gt;
  *  Dominic Marks &lt;dominic.marks@btinternet.com&gt;
  *  Don Croyle &lt;croyle@gelemna.org&gt;
  *  Douglas Thrift &lt;douglas@douglasthrift.net&gt;
  *  Edson Brandi &lt;ebrandi@fugspbr.org&gt;
  *  Edwin Groothuis &lt;edwin@mavetju.org&gt;
  *  Ekkehard 'Ekki' Gehm &lt;gehm@physik.tu-berlin.de&gt;
  *  Emanuel Haupt &lt;ehaupt@FreeBSD.org&gt;
  *  Emanuel Haupt &lt;ehaupt@critical.ch&gt;
  *  Eric Crist &lt;ecrist@secure-computing.net&gt;
  *  Erwin Lansing &lt;erwin@FreeBSD.org&gt;
  *  Eugene Grosbein &lt;eugen@FreeBSD.org&gt;
  *  Fabian Keil &lt;fk@fabiankeil.de&gt;
  *  Felix Palmen &lt;felix@palmen-it.de&gt;
  *  Florent Thoumie &lt;flz@xbsd.org&gt;
  *  Foxfair Hu &lt;foxfair@FreeBSD.org&gt;
  *  Frank Laszlo &lt;laszlof@vonostingroup.com&gt;
  *  Frank Wall &lt;fw@moov.de&gt;
  *  Franz Bettag &lt;franz@bett.ag&gt;
  *  Gabor Kovesdan
  *  Gabor Kovesdan &lt;gabor@FreeBSD.org&gt;
  *  Gabriel M. Dutra &lt;0xdutra@gmail.com&gt;
  *  Gary Hayers &lt;Gary@Hayers.net&gt;
  *  Gasol Wu &lt;gasol.wu@gmail.com&gt;
  *  Gea-Suan Lin &lt;gslin@gslin.org&gt;
  *  George Reid &lt;greid@ukug.uk.freebsd.org&gt;
  *  George Reid &lt;services@nevernet.net&gt;
  *  Greg Larkin &lt;glarkin@FreeBSD.org&gt;
  *  Greg V &lt;greg@unrelenting.technology&gt;
  *  Gregory Neil Shapiro &lt;gshapiro@FreeBSD.org&gt;
  *  Grzegorz Blach &lt;gblach@FreeBSD.org&gt;
  *  Guangyuan Yang &lt;ygy@FreeBSD.org&gt;
  *  Hakisho Nukama &lt;nukama@gmail.com&gt;
  *  Hammurabi Mendes &lt;hmendes@brturbo.com&gt;
  *  Henk van Oers &lt;hvo.pm@xs4all.nl&gt;
  *  Horia Racoviceanu &lt;horia@racoviceanu.com&gt;
  *  Hung-Yi Chen &lt;gaod@hychen.org&gt;
  *  Jaap Akkerhuis &lt;jaap@NLnetLabs.nl&gt;
  *  Jaap Boender &lt;jaapb@kerguelen.org&gt;
  *  Jacek Serwatynski &lt;tutus@trynet.eu.org&gt;
  *  James FitzGibbon &lt;jfitz@FreeBSD.org&gt;
  *  James Thomason &lt;james@divide.org&gt;
  *  Jan-Peter Koopmann &lt;Jan-Peter.Koopmann@seceidos.de&gt;
  *  Janky Jay &lt;ek@purplehat.org&gt;
  *  Janos Mohacsi
  *  Janos Mohacsi &lt;janos.mohacsi@bsd.hu&gt;
  *  Jean-Yves Lefort &lt;jylefort@brutele.be&gt;
  *  Jim Geovedi &lt;jim@corebsd.or.id&gt;
  *  Jim Ohlstein &lt;jim@ohlste.in&gt;
  *  Joe Clarke &lt;marcus@marcuscom.com&gt;
  *  Joe Marcus Clarke &lt;marcus@FreeBSD.org&gt;
  *  Johann Visagie &lt;johann@egenetics.com&gt;
  *  Johann Visagie &lt;wjv@FreeBSD.org&gt;
  *  John Ferrell &lt;jdferrell3@yahoo.com&gt;
  *  John Hixson &lt;jhixson@gmail.com&gt;
  *  John Polstra &lt;jdp@polstra.com&gt;
  *  John W. O'Brien &lt;john@saltant.com&gt;
  *  John-Mark Gurney &lt;jmg@FreeBSD.org&gt;
  *  Jose Alonso Cardenas Marquez &lt;acardenas@bsd.org.pe&gt;
  *  Joseph Benden &lt;joe@thrallingpenguin.com&gt;
  *  Joshua D. Abraham &lt;jabra@ccs.neu.edu&gt;
  *  Jov &lt;amutu@amutu.com&gt;
  *  Jui-Nan Lin &lt;jnlin@freebsd.cs.nctu.edu.tw&gt;
  *  Ka Ho Ng &lt;khng300@gmail.com&gt;
  *  Kay Lehmann &lt;kay_lehmann@web.de&gt;
  *  Keith J. Jones &lt;kjones@antihackertoolkit.com&gt;
  *  Kevin Zheng &lt;kevinz5000@gmail.com&gt;
  *  Kimura Fuyuki &lt;fuyuki@hadaly.org&gt;
  *  Kimura Fuyuki &lt;fuyuki@mj.0038.net&gt;
  *  Klayton Monroe &lt;klm@uidzero.org&gt;
  *  Konstantin Menshikov &lt;kostjnspb@yandex.ru&gt;
  *  Koop Mast &lt;kwm@FreeBSD.org&gt;
  *  Kris Kennaway &lt;kris@FreeBSD.org&gt;
  *  Kubilay Kocak &lt;koobs@FreeBSD.org&gt;
  *  Kurt Jaeger &lt;fbsd-ports@opsec.eu&gt;
  *  LEVAI Daniel &lt;leva@ecentrum.hu&gt;
  *  Lars Engels &lt;lme@FreeBSD.org&gt;
  *  Lars Thegler &lt;lth@FreeBSD.org&gt;
  *  Laurent LEVIER &lt;llevier@argosnet.com&gt;
  *  Luiz Eduardo R. Cordeiro
  *  Lukas Slebodnik &lt;lukas.slebodnik@intrak.sk&gt;
  *  Lukasz Komsta
  *  Mageirias Anastasios &lt;anastmag@gmail.com&gt;
  *  Marcel Prisi &lt;marcel.prisi@virtua.ch&gt;
  *  Marcello Coutinho
  *  Mario Sergio Fujikawa Ferreira &lt;lioux@FreeBSD.org&gt;
  *  Mark Felder &lt;feld@FreeBSD.org&gt;
  *  Mark Hannon &lt;markhannon@optusnet.com.au&gt;
  *  Mark Murray &lt;markm@FreeBSD.org&gt;
  *  Mark Pulford &lt;mark@kyne.com.au&gt;
  *  Marko Njezic &lt;sf@maxempire.com&gt;
  *  Martin Matuska &lt;martin@tradex.sk&gt;
  *  Martin Matuska &lt;mm@FreeBSD.org&gt;
  *  Martin Mersberger
  *  Martin Wilke &lt;miwi@FreeBSD.org&gt;
  *  Martti Kuparinen &lt;martti.kuparinen@ericsson.com&gt;
  *  Mateusz Piotrowski &lt;0mp@FreeBSD.org&gt;
  *  Matt &lt;matt@xtaz.net&gt;
  *  Matt Behrens &lt;matt@zigg.com&gt;
  *  Matthias Andree &lt;mandree@FreeBSD.org&gt;
  *  Matthias Fechner &lt;mfechner@FreeBSD.org&gt;
  *  Matthieu BOUTHORS &lt;matthieu@labs.fr&gt;
  *  Maxim Sobolev &lt;sobomax@FreeBSD.org&gt;
  *  Meno Abels &lt;meno.abels@adviser.com&gt;
  *  Michael Haro &lt;mharo@FreeBSD.org&gt;
  *  Michael Johnson &lt;ahze@FreeBSD.org&gt;
  *  Michael Nottebrock &lt;lofi@FreeBSD.org&gt;
  *  Michael Reifenberger &lt;mr@FreeBSD.org&gt;
  *  Michael Schout &lt;mschout@gkg.net&gt;
  *  Michal Bielicki &lt;m.bielicki@llizardfs.com&gt;
  *  Michiel van Baak &lt;michiel@vanbaak.eu
  *  Mij &lt;mij@bitchx.it&gt;
  *  Mike Heffner &lt;mheffner@vt.edu&gt;
  *  Mikhail T. &lt;m.tsatsenko@gmail.com&gt;
  *  Mikhail Teterin &lt;mi@aldan.algebra.com&gt;
  *  Milan Obuch
  *  Mosconi &lt;mosconi.rmg@gmail.com&gt;
  *  Muhammad Moinur Rahman &lt;5u623l20@gmail.com&gt;
  *  Mustafa Arif &lt;ma499@doc.ic.ac.uk&gt;
  *  Neil Booth
  *  Neil Booth &lt;kyuupichan@gmail.com&gt;
  *  Nick Barkas &lt;snb@threerings.net&gt;
  *  Nicola Vitale &lt;nivit@FreeBSD.org&gt;
  *  Niels Heinen
  *  Nikola Kolev &lt;koue@chaosophia.net&gt;
  *  Nobutaka Mantani &lt;nobutaka@FreeBSD.org&gt;
  *  Oliver Lehmann
  *  Oliver Lehmann &lt;oliver@FreeBSD.org&gt;
  *  Olivier Duchateau
  *  Olivier Duchateau &lt;duchateau.olivier@gmail.com&gt;
  *  Olli Hauer
  *  Patrick Li &lt;pat@databits.net&gt;
  *  Paul Chvostek &lt;paul@it.ca&gt;
  *  Paul Schmehl &lt;pauls@utdallas.edu&gt;
  *  Pavel I Volkov &lt;pavelivolkov@googlemail.com&gt;
  *  Pete Fritchman &lt;petef@databits.net&gt;
  *  Peter Ankerstal &lt;peter@pean.org&gt;
  *  Peter Haight &lt;peterh@sapros.com&gt;
  *  Peter Johnson &lt;johnson.peter@gmail.com&gt;
  *  Peter Pentchev &lt;roam@FreeBSD.org&gt;
  *  Petr Rehor &lt;rx@rx.cz&gt;
  *  Philippe Audeoud &lt;jadawin@tuxaco.net&gt;
  *  Philippe Rocques &lt;phil@teaser.fr&gt;
  *  Piotr Kubaj &lt;pkubaj@FreeBSD.org&gt;
  *  Piotr Kubaj &lt;pkubaj@anongoth.pl&gt;
  *  Po-Chuan Hsieh &lt;sunpoet@FreeBSD.org&gt;
  *  RaRa Rasputin &lt;rasputin@submonkey.net&gt;
  *  Radim Kolar
  *  Ralf Meister
  *  Remington Lang &lt;MrL0Lz@gmail.com&gt;
  *  Renaud Chaput &lt;renchap@cocoa-x.com&gt;
  *  Roderick van Domburg &lt;r.s.a.vandomburg@student.utwente.nl&gt;
  *  Roland van Laar &lt;roland@micite.net&gt;
  *  Romain Tartiere &lt;romain@blogreen.org&gt;
  *  Roman Bogorodskiy
  *  Roman Bogorodskiy &lt;novel@FreeBSD.org&gt;
  *  Roman Shterenzon &lt;roman@xpert.com&gt;
  *  Rong-En Fan &lt;rafan@FreeBSD.org&gt;
  *  Ryan Steinmetz &lt;zi@FreeBSD.org&gt;
  *  Sahil Tandon &lt;sahil@tandon.net&gt;
  *  Sascha Holzleiter &lt;sascha@root-login.org&gt;
  *  SeaD
  *  Seamus Venasse &lt;svenasse@polaris.ca&gt;
  *  Sean Greven &lt;sean.greven@gmail.com&gt;
  *  Sebastian Schuetz &lt;sschuetz@fhm.edu&gt;
  *  Sergei Kolobov &lt;sergei@FreeBSD.org&gt;
  *  Sergei Kolobov &lt;sergei@kolobov.com&gt;
  *  Sergei Vyshenski
  *  Sergei Vyshenski &lt;svysh.fbsd@gmail.com&gt;
  *  Sergey Skvortsov &lt;skv@protey.ru&gt;
  *  Seth Kingsley &lt;sethk@meowfishies.com&gt;
  *  Shaun Amott &lt;shaun@inerd.com&gt;
  *  Simeon Simeonov &lt;sgs@pichove.org&gt;
  *  Simon Dick &lt;simond@irrelevant.org&gt;
  *  Sofian Brabez &lt;sbrabez@gmail.com&gt;
  *  Stanislav Sedov &lt;ssedov@mbsd.msk.ru&gt;
  *  Stefan Esser &lt;se@FreeBSD.org&gt;
  *  Stefan Grundmann
  *  Stefan Walter &lt;sw@gegenunendlich.de&gt;
  *  Stephon Chen &lt;stephon@gmail.com&gt;
  *  Steve Wills &lt;steve@mouf.net&gt;
  *  Steve Wills &lt;swills@FreeBSD.org&gt;
  *  Steven Kreuzer
  *  Steven Kreuzer &lt;skreuzer@exit2shell.com&gt;
  *  Sunpoet Po-Chuan Hsieh &lt;sunpoet@FreeBSD.org&gt;
  *  TAKAHASHI Kaoru &lt;kaoru@kaisei.org&gt;
  *  TAKATSU Tomonari &lt;tota@FreeBSD.org&gt;
  *  Tatsuki Makino &lt;tatsuki_makino@hotmail.com&gt;
  *  Thibault Payet &lt;monwarez@mailoo.org&gt;
  *  Thierry Thomas (&lt;thierry@pompo.net&gt;)
  *  Thierry Thomas &lt;thierry@pompo.net&gt;
  *  Thomas Hurst &lt;tom@hur.st&gt;
  *  Thomas Quinot &lt;thomas@cuivre.fr.eu.org&gt;
  *  Thomas Zander &lt;riggs@FreeBSD.org&gt;
  *  Thomas von Dein &lt;freebsd@daemon.de&gt;
  *  Tilman Linneweh &lt;arved@FreeBSD.org&gt;
  *  Tim Bishop &lt;tim@bishnet.net&gt;
  *  Tom Judge &lt;tom@tomjudge.com&gt;
  *  Tomoyuki Sakurai &lt;cherry@trombik.org&gt;
  *  Toni Viemerö &lt;toni.viemero@iki.fi&gt;
  *  Tony Maher
  *  Torsten Zuhlsdorff &lt;ports@toco-domains.de&gt;
  *  Travis Campbell &lt;hcoyote@ghostar.org&gt;
  *  Tsung-Han Yeh &lt;snowfly@yuntech.edu.tw&gt;
  *  Ulf Lilleengen
  *  Vaida Bogdan &lt;vaida.bogdan@gmail.com&gt;
  *  Valentin Zahariev &lt;curly@e-card.bg&gt;
  *  Valerio Daelli &lt;valerio.daelli@gmail.com&gt;
  *  Veniamin Gvozdikov &lt;vg@FreeBSD.org&gt;
  *  Victor Popov
  *  Victor Popov &lt;v.a.popov@gmail.com&gt;
  *  Vsevolod Stakhov
  *  Vsevolod Stakhov &lt;vsevolod@FreeBSD.org&gt;
  *  Wen Heping &lt;wen@FreeBSD.org&gt;
  *  Wen Heping &lt;wenheping@gmail.com&gt;
  *  Yarodin &lt;yarodin@gmail.com&gt;
  *  Yen-Ming Lee &lt;leeym@FreeBSD.org&gt;
  *  Yen-Ming Lee &lt;leeym@cae.ce.ntu.edu.tw&gt;
  *  Yen-Ming Lee &lt;leeym@leeym.com&gt;
  *  Ying-Chieh Liao &lt;ijliao@FreeBSD.org&gt;
  *  Yonatan &lt;Yonatan@Xpert.com&gt;
  *  Yonatan &lt;onatan@gmail.com&gt;
  *  Yoshisato YANAGISAWA
  *  Yuri Victorovich
  *  Yuri Victorovich &lt;yuri@rawbw.com&gt;
  *  Zach Thompson &lt;hideo@lastamericanempire.com&gt;
  *  Zane C. Bowers &lt;vvelox@vvelox.net&gt;
  *  Zeus Panchenko &lt;zeus@gnu.org.ua&gt;
  *  ache
  *  adamw
  *  ajk@iu.edu
  *  alex@FreeBSD.org
  *  allan@saddi.com
  *  alm
  *  andrej@ebert.su
  *  andrew@scoop.co.nz
  *  andy@fud.org.nz
  *  antoine@FreeBSD.org
  *  arved
  *  barner
  *  brix@FreeBSD.org
  *  buganini@gmail.com
  *  chinsan
  *  chris@still.whet.org
  *  clement
  *  clsung
  *  crow
  *  cy@FreeBSD.org
  *  dominik karczmarski &lt;dominik@karczmarski.com&gt;
  *  dwcjr@inethouston.net
  *  eivind
  *  erich@rrnet.com
  *  erwin@FreeBSD.org
  *  girgen@FreeBSD.org
  *  glen.j.barber@gmail.com
  *  hbo@egbok.com
  *  ijliao
  *  jesper
  *  jfitz
  *  johans
  *  joris
  *  kftseng@iyard.org
  *  kris@FreeBSD.org
  *  lx
  *  markm
  *  mharo@FreeBSD.org
  *  michaelnottebrock@gmx.net
  *  mnag@FreeBSD.org
  *  mp39590@gmail.com
  *  nbm
  *  nectar@FreeBSD.org
  *  nork@FreeBSD.org
  *  nork@cityfujisawa.ne.jp
  *  nsayer@FreeBSD.org
  *  nsayer@quack.kfu.com
  *  ntarmos@cs.uoi.gr
  *  oly
  *  onatan@gmail.com
  *  pandzilla
  *  patrick@mindstep.com
  *  pauls
  *  perl@FreeBSD.org
  *  petef@FreeBSD.org
  *  peter.thoenen@yahoo.com
  *  ports@c0decafe.net
  *  ports@rbt.ca
  *  roam@FreeBSD.org
  *  rokaz
  *  sada@FreeBSD.org
  *  scrappy
  *  se
  *  shane@freebsdhackers.net aka modsix@gmail.com
  *  snb@threerings.net
  *  sumikawa
  *  sviat
  *  teramoto@comm.eng.osaka-u.ac.jp
  *  thierry@pompo.net
  *  tobez@FreeBSD.org
  *  torstenb@FreeBSD.org
  *  trasz &lt;trasz@pin.if.uz.zgora.pl&gt;
  *  trevor
  *  truckman
  *  vanhu
  *  vanilla@
  *  wen@FreeBSD.org
  *  will

With hat:	portmgr
</pre>
</div>
</content>
</entry>
<entry>
<title>security/dropbear: update to 2022.82</title>
<updated>2022-04-06T21:22:23+00:00</updated>
<author>
<name>Piotr Kubaj</name>
<email>pkubaj@FreeBSD.org</email>
</author>
<published>2022-04-06T21:22:23+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/ports/commit/?id=01fecbcf810d82cc82064bf5440238a4b621f2df'/>
<id>01fecbcf810d82cc82064bf5440238a4b621f2df</id>
<content type='text'>
Remove the not supported TWOFISH options.

Changelog:	https://matt.ucc.asn.au/dropbear/CHANGES
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Remove the not supported TWOFISH options.

Changelog:	https://matt.ucc.asn.au/dropbear/CHANGES
</pre>
</div>
</content>
</entry>
</feed>
