aboutsummaryrefslogtreecommitdiff
path: root/net
Commit message (Collapse)AuthorAgeFilesLines
* Update KDE Frameworks to 5.71.0Tobias C. Berner2020-06-178-15/+18
| | | | | | | | | | | | | | | | | | | | | June 06, 2020. KDE today announces the release of KDE Frameworks 5.71.0. KDE Frameworks are over 70 addon libraries to Qt which provide a wide variety of commonly needed functionality in mature, peer reviewed and well tested libraries with friendly licensing terms. For an introduction see the KDE Frameworks web page. This release is part of a series of planned monthly releases making improvements available to developers in a quick and predictable manner. Announcement: https://kde.org/announcements/kde-frameworks-5.71.0 Exp-run by: antoine PR: 247240 Notes: svn path=/head/; revision=539415
* Update to 19.11.2Li-Wen Hsu2020-06-163-10/+16
| | | | | | | | PR: 246541 Submitted by: Bruce Richardson <bruce.richardson@intel.com> (maintainer) Notes: svn path=/head/; revision=539393
* net/ntpsec: Update 1.1.8 -> 1.1.9Yuri Victorovich2020-06-163-15/+4
| | | | Notes: svn path=/head/; revision=539390
* net/courier-sox: Add rc scriptLi-Wen Hsu2020-06-162-1/+60
| | | | | | | | PR: 240547 Submitted by: Radim Kolar <hsn@sendmail.cz> (maintainer) Notes: svn path=/head/; revision=539387
* Update asterisk16 to 16.11.1Guido Falsi2020-06-162-4/+4
| | | | Notes: svn path=/head/; revision=539384
* Fix script to use md5 and not md5sum.Guido Falsi2020-06-162-0/+19
| | | | | | | | PR: 243110 Submitted by: Tomoyuki Sakurai <trombik1973@gmail.com> Notes: svn path=/head/; revision=539383
* net/py-cloudscraper: update to 1.2.38Tobias C. Berner2020-06-162-4/+4
| | | | Notes: svn path=/head/; revision=539371
* net/dhcpcd-devel: disable udev support in CONFIGURE_ARGS, given thatBen Woods2020-06-161-1/+2
| | | | | | | | | | | | FreeBSD has the function udev_device_new_from_subsystem_sysname if the module libudev-devd is installed, but it is not implemented. PR: 247144 Reported by: Greg V <greg@unrelenting.technology> Reviewed by: Roy Marples <roy@marples.name> Notes: svn path=/head/; revision=539349
* net/dhcpcd: Update to 9.1.2Ben Woods2020-06-162-5/+6
| | | | | | | | | | | | | Also disable udev support in CONFIGURE_ARGS, given that FreeBSD has the function udev_device_new_from_subsystem_sysname if the module libudev-devd is installed, but it is not implemented. PR: 247144 Reported by: Greg V <greg@unrelenting.technology> Reviewed by: Roy Marples <roy@marples.name> Notes: svn path=/head/; revision=539348
* net/dhcpcd-devel: Update to 2020-06-16Ben Woods2020-06-162-5/+5
| | | | Notes: svn path=/head/; revision=539346
* httpstat: Undeprecate and mark py3-compatibleAdam Weinberger2020-06-161-4/+1
| | | | | | | httpstat is py3-compatible, see https://github.com/reorx/httpstat Notes: svn path=/head/; revision=539322
* New port: net/librespeed-cli: Command line client for LibreSeedKoichiro Iwao2020-06-164-0/+76
| | | | | | | | | | | | | | This is the CLI part of LibreSpeed which is a very lightweight speedtest. With the CLI it's possible to run a speedtest from the command line interface. The server part can be found in www/librespeed. WWW: https://github.com/librespeed/speedtest-cli PR: 246609 Submitted by: Dries Michiels <driesm.michiels@gmail.com> Notes: svn path=/head/; revision=539318
* New port: net/librespeed-go: Go backend for LibreSpeedKoichiro Iwao2020-06-168-0/+212
| | | | | | | | | | | | | | | LibreSpeed-go is a very lightweight speed test. Is is implemented in JavaScript, using XMLHttpRequest and Web Workers. This port uses GO as backend for hosting. And this in comparison to www/librespeed where PHP and a web server are required. WWW: https://github.com/librespeed/speedtest-go PR: 247202 Submitted by: Dries Michiels <driesm.michiels@gmail.com> Notes: svn path=/head/; revision=539316
* Update to 0.5.2Baptiste Daroussin2020-06-153-11/+8
| | | | Notes: svn path=/head/; revision=539294
* Update to 1.7.0Carlo Strub2020-06-153-74/+136
| | | | | | | | PR: 247269 Submitted by: maintainer Notes: svn path=/head/; revision=539288
* net/rsocket-cpp: Update 2020.06.08.00 -> 2020.06.15.00Yuri Victorovich2020-06-152-4/+4
| | | | Notes: svn path=/head/; revision=539282
* Update to 0.3.0Carlo Strub2020-06-152-5/+5
| | | | Notes: svn path=/head/; revision=539273
* net/corosync2: limit PORTSCOUT, based on dns/dnsdbq's PORTSCOUT regexVinícius Zavam2020-06-151-1/+1
| | | | Notes: svn path=/head/; revision=539269
* Update to 1.10.8Sunpoet Po-Chuan Hsieh2020-06-152-4/+4
| | | | | | | | Changes: https://github.com/googleapis/google-cloud-ruby/releases https://github.com/googleapis/google-cloud-ruby/blob/master/google-cloud-logging/CHANGELOG.md Notes: svn path=/head/; revision=539264
* Update to 2.12.0Sunpoet Po-Chuan Hsieh2020-06-152-4/+4
| | | | | | | Changes: https://github.com/AssetSync/asset_sync/blob/master/CHANGELOG.md Notes: svn path=/head/; revision=539263
* Update dependenciesSunpoet Po-Chuan Hsieh2020-06-152-26/+29
| | | | | | | - Bump PORTREVISION for package change Notes: svn path=/head/; revision=538939
* - Update ntopng to latest upstream commitGuido Falsi2020-06-152-5/+5
| | | | | | | | | | This includes a fix for high CPU usage PR: 246929 Submitted by: Michael Muenz <m.muenz@gmail.com> Notes: svn path=/head/; revision=538924
* net/opensips: update 2.2.6 -> 3.0.2Kurt Jaeger2020-06-1411-885/+575
| | | | | | | | | | | | | | | | - a progress of almost 2.5 years of opensips development PR: 244594 Submitted by: Talal Al Dik <tad@vif.com> Approved by: euan@potensol.com (maintainer timeout) Relnotes: https://opensips.org/pub/opensips/3.0.1/ChangeLog https://www.opensips.org/About/Version-3-0-0 https://www.opensips.org/About/Version-2-4-x https://www.opensips.org/About/Version-2-3-x https://opensips.org/pub/opensips/2.2.7/ChangeLog Notes: svn path=/head/; revision=538829
* [NEW] net/ooni-mini: Small command line client that tests OONI's functionalityVinícius Zavam2020-06-144-0/+256
| | | | | | | | | | | | | | | | | | | The Open Observatory of Network Interference (OONI) is a free software project and a Global community measuring Internet censorship since 2012. OONI's miniooni is a small command line client useful to test the functionality without integrating with full features of OONI Probe CLI. miniooni can use tunnels provided by Tor, if you like to. The use of regular HTTP proxies is also possible. WWW: https://ooni.org/about/ Sponsored by: The Tor Project Sponsored by: TorBSD Diversity Project (TDP) Notes: svn path=/head/; revision=538823
* [NEW] net/ooni-probe-cli: Next generation OONI Probe CLIVinícius Zavam2020-06-144-0/+304
| | | | | | | | | | | | | The Open Observatory of Network Interference (OONI) is a free software project and a Global community measuring Internet censorship since 2012. This port provides the next generation OONI Probe, a tool used for the measurement of Internet censorship around the world. WWW: https://ooni.org/about/ Notes: svn path=/head/; revision=538821
* net/ipxe: Update to latest commitTobias Kortkamp2020-06-133-11/+26
| | | | | | | | | | | - Build more EFI images [1] Changes: https://github.com/ipxe/ipxe/compare/bdf0e029ae8c9a0e173d5988ee64ff910538af53...9ee70fb95bc266885ff88be228b044a2bb226eeb Submitted by: skozlov (based on) [1] Differential Revision: https://reviews.freebsd.org/D25213 Notes: svn path=/head/; revision=538683
* net/py-libcloud: update to 3.1.0Roman Bogorodskiy2020-06-132-4/+4
| | | | Notes: svn path=/head/; revision=538668
* Update KDE's Application (release-service) to 20.04.2Tobias C. Berner2020-06-1336-106/+108
| | | | Notes: svn path=/head/; revision=538649
* Remove the Python 2.7 modules, so that we can keep this port untill allThierry Thomas2020-06-122-46/+4
| | | | | | | consumers have switched to a newer MPI provider. Notes: svn path=/head/; revision=538630
* Update to 0.2.0Carlo Strub2020-06-122-6/+5
| | | | Notes: svn path=/head/; revision=538629
* Update to 1.24.0Baptiste Daroussin2020-06-122-4/+4
| | | | Notes: svn path=/head/; revision=538615
* net/corosync2: pet portscoutVinícius Zavam2020-06-121-0/+2
| | | | | | | | ignoring 2.99 release, as it should get its proper dedicated port soon; corosync3 will make it to 3.x just like that. Notes: svn path=/head/; revision=538604
* net/cloudflared: update 2020.5.1 to 2020.6.1Vinícius Zavam2020-06-122-4/+4
| | | | Notes: svn path=/head/; revision=538599
* Change approach to missing manpage in net/intel-ix-kmodSerhii (Sergey) Kozlov2020-06-123-17/+26
| | | | | | | | | | | | | | | Instead of not installing the missing man page - use the one from the previous version. Changes include: - Revert all the MANPAGEEXISTS-related changes from net/intel-{ixl,ix}-kmod - Allow slave ports of net/intel-ixl-kmod to set their own MASTER_SITES - Add previous version of intel-ix-kmod to it's DISTFILES - Add pre-install target to intel-ixl-kmod to place the man page where do-install expects to find it Notes: svn path=/head/; revision=538566
* - Update asterisk16 to 16.11.0Guido Falsi2020-06-114-98/+5
| | | | | | | | | - Enable OPUS option by default [1] Suggested by: mr44er <mr44er@gmail.com> Notes: svn path=/head/; revision=538551
* - Update asterisk13 to 13.34.0Guido Falsi2020-06-114-98/+5
| | | | | | | | | - Enable OPUS option by default [1] Suggested by: mr44er <mr44er@gmail.com> Notes: svn path=/head/; revision=538550
* net/zerotier: enable DflyBSD supportDave Cottlehuber2020-06-112-1/+6
| | | | | | | | | | upstream PR has languished long enough Submitted by: Weitian Li <liweitianux@live.com> Sponsored by: SkunkWerks, GmbH Notes: svn path=/head/; revision=538540
* net/termshark: fix build on aarch64Mikael Urankar2020-06-101-0/+24
| | | | | | | Approved by: portmgr (tier-2 blanket) Notes: svn path=/head/; revision=538426
* net/traefik: fix build on aarch64Mikael Urankar2020-06-109-0/+5112
| | | | | | | Approved by: portmgr (tier-2 blanket) Notes: svn path=/head/; revision=538420
* Update net/intel-ix-kmod to 3.3.14Serhii (Sergey) Kozlov2020-06-102-7/+6
| | | | | | | | | | - New version doesn't have a man page - Builds fine with netmap on all the currently supported FreeBSD versions Sponsored by: Intel Notes: svn path=/head/; revision=538399
* Modernize net/intel-ixl-kmodSerhii (Sergey) Kozlov2020-06-101-12/+15
| | | | | | | | | | | - Unbreak on 12.1 (no netmap headers, netmap should be off) - Remove obsolete mentions of pre-11 FreeBSD versions - Allow for a slave port to not have a man page Sponsored by: Intel Notes: svn path=/head/; revision=538398
* net/dhcpcd-devel: Update to 2020-06-10Ben Woods2020-06-102-5/+5
| | | | Notes: svn path=/head/; revision=538388
* net/dhcpcd: Update to 9.1.1Ben Woods2020-06-102-4/+4
| | | | | | | | Changes this release: https://roy.marples.name/archives/dhcpcd-discuss/0003035.html Notes: svn path=/head/; revision=538387
* net/freerdp: fix build on FreeBSD 11.xKyle Evans2020-06-093-0/+185
| | | | | | | | | | | | | | Apparently this hadn't been caught in my test matrix -- it seems that later versions of FreeBSD have a getmntent() definition that masked this error. mntent_compat.c has been adopted from devel/fam, though a better solution should be sought out going into the future. Approved by: koobs (mentor, implicit, just-fix-it) MFH: 2020Q2 (blanket: build fix) Notes: svn path=/head/; revision=538329
* Update to version 2.1.7.Dmitry Sivachenko2020-06-092-4/+4
| | | | Notes: svn path=/head/; revision=538308
* net/rsocket-cpp: Update 2020.06.01.00 -> 2020.06.08.00Yuri Victorovich2020-06-092-4/+4
| | | | | | | Reported by: portscout Notes: svn path=/head/; revision=538284
* UPnP SUBSCRIBE misbehavior in hostapd WPS APCy Schubert2020-06-092-3/+12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | As published by our hostapd upstream Vulnerability General security vulnerability in the way the callback URLs in the UPnP SUBSCRIBE command are used were reported (VU#339275, CVE-2020-12695). Some of the described issues may be applicable to the use of UPnP in WPS AP mode functionality for supporting external registrars. Such issues could allow a device connected to the local network (i.e., a device that has been authorized to transmit packets in the network in which the AP is located) could trigger the AP to initiate a HTTP (TCP/IP) connection to an arbitrary URL, including connections to servers in external networks. This could have a security implication if traffic from the local network to external destinations have different rules (e.g., firewall and packet inspection) for different local hosts and the AP having access to external hosts while the attacker controlled local device not having such access. Such deployment cases may not be common for networks where WPS would be enabled, but it is not possible to completely rule out the applicability to cases where hostapd is used to control a WPS enabled AP. In addition to the more generic issues with the UPnP protocol, couple of implementation specific issues in hostapd were discovered while reviewing this area of the WPS implementation. These issues could allow local devices (i.e., devices that have been authorized to transmit packets in the network in which the AP is located) to trigger misbehavior in hostapd and cause the process to either get terminated or to start using more CPU resources by using a specially constructed SUBSCRIBE command. All these issues require the attacker to be able to discover the UPnP service provided by hostapd and to open a TCP connection toward the IP address of the AP. The former requires access to the local network to be able to receive broadcast packets and the latter requires access to initiate TCP/IP connection to the IP address used by the AP. In most common AP deployment cases, both of these operations are available only from the local network. Vulnerable versions/configurations All hostapd versions with WPS AP support with UPnP enabled in the build parameters (CONFIG_WPS_UPNP=y) and in the runtime configuration (upnp_iface). Possible mitigation steps - Disable WPS UPnP support in the hostapd runtime configuration by removing the upnp_iface parameter. - Merge the following commits to hostapd and rebuild: For CVE-2020-12695: WPS UPnP: Do not allow event subscriptions with URLs to other networks For the other issues: WPS UPnP: Fix event message generation using a long URL path WPS UPnP: Handle HTTP initiation failures for events more properly These patches are available from https://w1.fi/security/2020-1/ - Update to hostapd v2.10 or newer, once available Obtained from: https://w1.fi/security/2020-1/ MFH: 2020Q2 Security: VU#339275 and CVE-2020-12695 Notes: svn path=/head/; revision=538281
* net/py-wsdd: Update to 0.6Fernando Apesteguía2020-06-093-25/+5
| | | | | | | | PR: 247076 Submitted by: hiroo.ono+freebsd@gmail.com (maintainer) Notes: svn path=/head/; revision=538280
* net/py-ifaddr: update to 0.1.7John Hixson2020-06-082-4/+4
| | | | Notes: svn path=/head/; revision=538252
* net/py-zeroconf: update to 0.27.1John Hixson2020-06-082-4/+4
| | | | Notes: svn path=/head/; revision=538251