Received: from mail.netbsd.org (mail.netbsd.org [199.233.217.200]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.netbsd.org", Issuer "Postmaster NetBSD.org" (verified OK)) by mollari.NetBSD.org (Postfix) with ESMTPS id 421AC7A276 for ; Fri, 7 Apr 2017 07:04:47 +0000 (UTC) Received: by mail.netbsd.org (Postfix, from userid 605) id E5C15856C4; Fri, 7 Apr 2017 07:04:46 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id AD5738559F for ; Fri, 7 Apr 2017 00:42:00 +0000 (UTC) X-Virus-Scanned: amavisd-new at netbsd.org Received: from mail.netbsd.org ([IPv6:::1]) by localhost (mail.netbsd.org [IPv6:::1]) (amavisd-new, port 10025) with ESMTP id DEs6PVBKAFoj for ; Fri, 7 Apr 2017 00:41:59 +0000 (UTC) Received: from cvs.NetBSD.org (ivanova.NetBSD.org [IPv6:2001:470:a085:999:28c:faff:fe03:5984]) by mail.netbsd.org (Postfix) with ESMTP id D764A85577 for ; Fri, 7 Apr 2017 00:41:59 +0000 (UTC) Received: by cvs.NetBSD.org (Postfix, from userid 500) id D27FAFBE4; Fri, 7 Apr 2017 00:41:59 +0000 (UTC) Content-Transfer-Encoding: 7bit Content-Type: multipart/mixed; boundary="_----------=_1491525719149120" MIME-Version: 1.0 Date: Fri, 7 Apr 2017 00:41:59 +0000 From: "Makoto Fujiwara" Subject: CVS commit: pkgsrc/security/p5-Net-SSH To: pkgsrc-changes@NetBSD.org Reply-To: mef@netbsd.org X-Mailer: log_accum Message-Id: <20170407004159.D27FAFBE4@cvs.NetBSD.org> Lines: 211 Sender: pkgsrc-changes-owner@NetBSD.org List-Id: pkgsrc-changes.NetBSD.org Precedence: bulk This is a multi-part message in MIME format. --_----------=_1491525719149120 Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" Module Name: pkgsrc Committed By: mef Date: Fri Apr 7 00:41:59 UTC 2017 Modified Files: pkgsrc/security/p5-Net-SSH: Makefile distinfo Log Message: Updated security/p5-Net-SSH to 2.09.01 -------------------------------------- 2.09 2016.10.26 - Fix creation of keys in ecdsa, ed25519 key classes - Update eg/pssh-keygen to create ecdsa, ed25519 keys - Handle hostkeys-00@openssh.com global requests - Add support for 'CheckHostIP' and 'UpdateHostKeys' config options - Refactor handling of '+' syntax in options - Key fingerprints now output sha256-base64 by default. (md5 can be specified with FingerprintHash config option) - Add id_ed25519, id_ecdsa to default identity files - Documentation updates in Perl.pm to reflect new functionality in 2.XX 2.08 2016.10.14 - Use sha512 instead of md5 in Net::SSH::Perl::Cipher->new_from_key_str() to provide ChachaPoly with enough key material Tests in t/05-cipher.t should now pass on all platforms [ CPAN bug #114077 ] - Add AES128_CBC to cipher tests - Info on using features not enabled by default added to README 2.07 2016.10.13 - Fix blowfish compilation on SunOS [CPAN bug #116323] - Fix bug in Packet [CPAN bug #118335] - Add support for '+' syntax in MACs option - Remove hmac-sha1 from default MACs. It can re-enabled by passing the option: 'MACs +hmac-sha1' 2.06 2016.10.04 - Add support for additional fixed Diffie-Hellman 2K, 4K and 8K groups from OpenSSH 7.3 (draft-ietf-curdle-ssh-kex-sha2-03) - Kex defaults now updated to draft-ietf-curdle-ssh-kex-sha2-03 recommendations (diffie-hellman-group-exchange-sha1 removed) It can re-enabled by passing the option: 'KexAlgorithms +diffie-hellman-group-exchange-sha1' 2.05 2016.10.03 - Add support for '+' syntax in Ciphers, KexAlgorithms, HostKeyAlgorithms options as in OpenSSH 2.04 2016.05.11 - Add ECDSA key support - Improve extract_public() in Key.pm inspired by https://github.com/renormalist/Net-SSH-Perl/pull/12 but implement comment with backwards compat with RSA/DSA datafellows - Fix XS from being loaded more than once (warnings from Net::SFTP) 2.03 2016.05.06 - Fixes so that "make test" passes 2.02 2016.05.04 - Use CryptX to further reduce module depedencies This eliminates the need for: Math::Pari Crypt::DH Crypt::RSA Crypt::DSA Crypt::DES Crypt::Blowfish MIME::Base64 - Add support for rsa-sha2-512,rsa-sha2-256 signing with RSA keys - Implement HashKnownHosts, KexAlgorithms, MACs config directives - Add XS code for Chacha20, BSD Blowfish, Ed25519 routines - Properly handle and create known_hosts entries when port is specified - Remove obsolete ciphers, MACs, Kex from default list to duplicate upcoming OpenSSH behavior - Bug fixes 2.01 2016.02.19 - Use CryptX to reduce module depedencies This eliminates the need for: BSD::arc4random Digest::MD5 Digest::SHA Digest::HMAC_MD5 Crypt::OpenSSL::AES 2.00 2015.12.07 - Add Chacha20-Poly1305 cipher support for best security (Requires Crypt::OpenSSH::ChachaPoly, see README) - Add AES Cipher support in CTR mode (CBC mode supported in Ed25519 keys only) - Add Group Exchange (RFC4523) Diffie-Hellman Key Exchange - Add Curve25519 (curve25519-sha256@libssh.org) Key Exchange support (Requires Crypt::Curve25519) - Add hmac-sha2-256,hmac-sha2-512 MAC support - Add hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com Encrypt-then-MAC (ETM) MAC support - Use BSD::arc4random for encrypted packet padding - Add support for Ed25519 ssh/host keys (Requires Crypt::Ed25519) Encrypted Ed25519 key support requires Crypt::OpenBSD::Blowfish (See README for info) - Default ciphers order is now chacha,aes,3des,blowfish,arcfour - Default KEX order is now Curve25519, DHGEXSHA256, DHGEXSHA1, DH14, DH1 - Default MAC order is now hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, sha2-512, sha2-256, sha1, md5 - SSH Keys can now be in DOS format (no need to remove CR/LF) - SOCKS proxy support via sub class Net::SSH:Perl::Proxy - Now does not abort due to OpenSSH 6.8+ server SSH2_MSG_GLOBAL_REQUEST messages for host key rotation (pkgsrc changes) - Adjust DEPENDS base upon above note (p5-CryptX related) To generate a diff of this commit: cvs rdiff -u -r1.21 -r1.22 pkgsrc/security/p5-Net-SSH/Makefile cvs rdiff -u -r1.6 -r1.7 pkgsrc/security/p5-Net-SSH/distinfo Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files. --_----------=_1491525719149120 Content-Disposition: inline Content-Length: 3236 Content-Transfer-Encoding: binary Content-Type: text/x-diff; charset=us-ascii Modified files: Index: pkgsrc/security/p5-Net-SSH/Makefile diff -u pkgsrc/security/p5-Net-SSH/Makefile:1.21 pkgsrc/security/p5-Net-SSH/Makefile:1.22 --- pkgsrc/security/p5-Net-SSH/Makefile:1.21 Wed Jun 8 19:24:24 2016 +++ pkgsrc/security/p5-Net-SSH/Makefile Fri Apr 7 00:41:59 2017 @@ -1,9 +1,8 @@ -# $NetBSD: Makefile,v 1.21 2016/06/08 19:24:24 wiz Exp $ +# $NetBSD: Makefile,v 1.22 2017/04/07 00:41:59 mef Exp $ # -DISTNAME= Net-SSH-Perl-1.42 -PKGNAME= p5-Net-SSH-1.42 -PKGREVISION= 1 +DISTNAME= Net-SSH-Perl-2.09.01 +PKGNAME= p5-${DISTNAME:C/-Perl//} CATEGORIES= security net perl5 MASTER_SITES= ${MASTER_SITE_PERL_CPAN:=Net/} @@ -13,23 +12,17 @@ COMMENT= Perl implementations of SSH1 a LICENSE= ${PERL5_LICENSE} DEPENDS+= p5-Convert-PEM>=0.05:../../textproc/p5-Convert-PEM -DEPENDS+= p5-Crypt-Blowfish-[0-9]*:../../security/p5-Crypt-Blowfish -DEPENDS+= p5-Crypt-DES-[0-9]*:../../security/p5-Crypt-DES -DEPENDS+= p5-Crypt-DH>=0.01:../../security/p5-Crypt-DH -DEPENDS+= p5-Crypt-DSA>=0.11:../../security/p5-Crypt-DSA -DEPENDS+= p5-Crypt-RSA>=1.37:../../security/p5-Crypt-RSA -DEPENDS+= p5-Crypt-IDEA-[0-9]*:../../security/p5-Crypt-IDEA +DEPENDS+= p5-CryptX-[0-9]*:../../security/p5-CryptX DEPENDS+= p5-Digest-BubbleBabble>=0.01:../../security/p5-Digest-BubbleBabble -DEPENDS+= p5-Digest-HMAC-[0-9]*:../../security/p5-Digest-HMAC -#DEPENDS+= {perl>=5.7.3,p5-Digest-MD5-[0-9]*}:../../security/p5-Digest-MD5 -DEPENDS+= p5-Digest-SHA1>=2.10:../../security/p5-Digest-SHA1 -#DEPENDS+= {perl>=5.7.3,p5-MIME-Base64-[0-9]*}:../../converters/p5-MIME-Base64 DEPENDS+= p5-Math-GMP>=1.04:../../math/p5-Math-GMP -DEPENDS+= p5-Math-Pari>=2.001804:../../math/p5-Math-Pari DEPENDS+= p5-String-CRC32>=1.2:../../textproc/p5-String-CRC32 PKG_OPTIONS_VAR= PKG_OPTIONS.p5-Net-SSH PKG_SUPPORTED_OPTIONS= idea +#KG_SUGGESTED_OPTIONS= idea + +# Omit the last micro version, for example 2.09.01 -> 2.09 +WRKSRC= ${WRKDIR}/${DISTNAME:C/([0-9]+)\.([0-9]+)[0-9.]+/\1.\2/} .include "../../mk/bsd.options.mk" Index: pkgsrc/security/p5-Net-SSH/distinfo diff -u pkgsrc/security/p5-Net-SSH/distinfo:1.6 pkgsrc/security/p5-Net-SSH/distinfo:1.7 --- pkgsrc/security/p5-Net-SSH/distinfo:1.6 Sun Jan 31 05:49:47 2016 +++ pkgsrc/security/p5-Net-SSH/distinfo Fri Apr 7 00:41:59 2017 @@ -1,7 +1,7 @@ -$NetBSD: distinfo,v 1.6 2016/01/31 05:49:47 mef Exp $ +$NetBSD: distinfo,v 1.7 2017/04/07 00:41:59 mef Exp $ -SHA1 (Net-SSH-Perl-1.42.tar.gz) = 3aa6c110e06be7c2b6da3881fe8ad7b60459c9e2 -RMD160 (Net-SSH-Perl-1.42.tar.gz) = 4d778b2047640b286143e99e37259508e0996554 -SHA512 (Net-SSH-Perl-1.42.tar.gz) = 67275e99890948376c7f6feb5be1979f45b5fda2afe440108b3819db192fd41b43e9ee94e7e643671384b37972842f40ce3519cbeef98b6ee796a68e4bfe20dd -Size (Net-SSH-Perl-1.42.tar.gz) = 120783 bytes +SHA1 (Net-SSH-Perl-2.09.01.tar.gz) = 926cbdbb30aa85b7503698763455ad6926c471ee +RMD160 (Net-SSH-Perl-2.09.01.tar.gz) = 235dab415b1e094f4b13313d5fe0e6ed359c8c39 +SHA512 (Net-SSH-Perl-2.09.01.tar.gz) = e7d7194e175490ba0849357ebbb504932d97b358722f2045e0acbaba9c14dc945629bd5653b36934317632e0d3894525e4f34ea48b494f2cc815959106138b44 +Size (Net-SSH-Perl-2.09.01.tar.gz) = 255286 bytes SHA1 (patch-aa) = d85b70f5f4d4ccb55aabef6671171bf64c6fcdb9 --_----------=_1491525719149120--