pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/net/tinc Update net/tinc to version 1.0.9. Pick up mai...



details:   https://anonhg.NetBSD.org/pkgsrc/rev/502db0a70fa0
branches:  trunk
changeset: 391752:502db0a70fa0
user:      tonnerre <tonnerre%pkgsrc.org@localhost>
date:      Sat Apr 18 19:27:11 2009 +0000

description:
Update net/tinc to version 1.0.9. Pick up maintainership and set license.

Changes since version 1.0.7:

 - Apply patch from Max Rijevski fixing a memory leak when closing connections.
   It also cleans up more when stopping tinc, helping tools like valgrind.
 - Handle broadcast and multicast packets in router mode.
   Multicast packets are treated as broadcast packets.
 - Update the manpage as well, and some whitespace to make its source more legible.
 - Update documentation.
   - TCPOnly is not experimental.
   - Do not mention old Linux kernels and Ethertap anymore.
   - Document the DeviceType, PMTU and PMTUDiscovery options.
 - Enable PMTU discovery by default.
 - Update copyright information.
 - Update Dutch translation.
 - Make sure IPv6 sockets are IPv6 only.
 - This will get rid of the "Can't bind to 0.0.0.0 port 655/tcp: Address already
   in use" message on Linux.
 - Use TUNIFHEAD by default on FreeBSD to make sure IPv6 works.
 - Treat virtual network device as tap if Mode = switch or hub.
   On OpenBSD, the link0 flag should still be set in tinc-up or by other means.
 - Correct debug message.
 - Prevent freeing a NULL pointer when a hostname is unresolvable.
 - Do not try to send REQ_KEY or ANS_KEY requests to unreachable nodes.
 - Fix reading configuration files that do not end with a newline.
 - Make sure the prefixlength of subnets is sane.
 - Handle SERVICE_CONTROL_INTERROGATE requests. Thanks to Carsten Ralle for noticing this.
 - Don't free struct addrinfo too early. Spotted by Christian Cier-Zniewski.
 - Update dutch translation.
 - Make sure connection->name is never NULL.
 - Apply patch from "dnk" making sockets non-blocking under Windows.
 - Close the proper filedescriptor (if it exists).
 - Apply patch from Scott Lamb fixing some memory and resource leaks.
 - Apply patch from Scott Lamb preventing an infinite loop when sending SIGALRM.

diffstat:

 net/tinc/Makefile         |   8 ++++----
 net/tinc/distinfo         |  10 +++++-----
 net/tinc/patches/patch-aa |  28 ++++++++++------------------
 3 files changed, 19 insertions(+), 27 deletions(-)

diffs (129 lines):

diff -r b83011a395c2 -r 502db0a70fa0 net/tinc/Makefile
--- a/net/tinc/Makefile Sat Apr 18 18:15:05 2009 +0000
+++ b/net/tinc/Makefile Sat Apr 18 19:27:11 2009 +0000
@@ -1,13 +1,13 @@
-# $NetBSD: Makefile,v 1.11 2008/01/18 05:08:50 tnn Exp $
+# $NetBSD: Makefile,v 1.12 2009/04/18 19:27:11 tonnerre Exp $
 #
 
-DISTNAME=      tinc-1.0.7
-PKGREVISION=   2
+DISTNAME=      tinc-1.0.9
 CATEGORIES=    net
 MASTER_SITES=  http://www.tinc-vpn.org/packages/
 
-MAINTAINER=    pkgsrc-users%NetBSD.org@localhost
+MAINTAINER=    tonnerre%NetBSD.org@localhost
 HOMEPAGE=      http://www.tinc-vpn.org/
+LICENSE=       gnu-gpl-v2
 COMMENT=       Virtual Private Network (VPN) daemon
 
 PKG_DESTDIR_SUPPORT=   user-destdir
diff -r b83011a395c2 -r 502db0a70fa0 net/tinc/distinfo
--- a/net/tinc/distinfo Sat Apr 18 18:15:05 2009 +0000
+++ b/net/tinc/distinfo Sat Apr 18 19:27:11 2009 +0000
@@ -1,7 +1,7 @@
-$NetBSD: distinfo,v 1.6 2007/04/21 15:19:01 obache Exp $
+$NetBSD: distinfo,v 1.7 2009/04/18 19:27:11 tonnerre Exp $
 
-SHA1 (tinc-1.0.7.tar.gz) = 79b18aa72d5c694c2a9ee7f59c8cf274407ed908
-RMD160 (tinc-1.0.7.tar.gz) = 74ce43f65700b182dff879ac08c41859faee27c2
-Size (tinc-1.0.7.tar.gz) = 499135 bytes
-SHA1 (patch-aa) = 2bc5c4acf339a29a10c6f8b03ab74d5341f036b4
+SHA1 (tinc-1.0.9.tar.gz) = 55de1bc3b47a48fb162b00ffbb3bac1e2058a7ed
+RMD160 (tinc-1.0.9.tar.gz) = 43ad67040ed7aaad710c5137659f8f0f1d908101
+Size (tinc-1.0.9.tar.gz) = 519048 bytes
+SHA1 (patch-aa) = 21bb1d30038faddedd9dea93e968d8a071b227a7
 SHA1 (patch-ab) = 482217af3b35ec7d3f9959857684ef38df1d72ce
diff -r b83011a395c2 -r 502db0a70fa0 net/tinc/patches/patch-aa
--- a/net/tinc/patches/patch-aa Sat Apr 18 18:15:05 2009 +0000
+++ b/net/tinc/patches/patch-aa Sat Apr 18 19:27:11 2009 +0000
@@ -1,6 +1,6 @@
-$NetBSD: patch-aa,v 1.3 2007/04/21 15:19:01 obache Exp $
+$NetBSD: patch-aa,v 1.4 2009/04/18 19:27:11 tonnerre Exp $
 
---- src/protocol_auth.c.orig   2006-04-26 13:53:05.000000000 +0000
+--- src/protocol_auth.c.orig   2008-12-22 21:35:45.000000000 +0100
 +++ src/protocol_auth.c
 @@ -128,10 +128,10 @@ bool send_metakey(connection_t *c)
  
@@ -72,15 +72,7 @@
                return false;
        }
  
-@@ -242,6 +253,7 @@ bool metakey_h(connection_t *c)
-       if(RSA_private_decrypt(len, (unsigned char *)buffer, (unsigned char *)c->inkey, myself->connection->rsa_key, RSA_NO_PADDING) != len) {  /* See challenge() */
-               logger(LOG_ERR, _("Error during encryption of meta key for %s (%s)"),
-                          c->name, c->hostname);
-+              free(buffer);
-               return false;
-       }
- 
-@@ -260,6 +272,7 @@ bool metakey_h(connection_t *c)
+@@ -260,6 +271,7 @@ bool metakey_h(connection_t *c)
                
                if(!c->incipher) {
                        logger(LOG_ERR, _("%s (%s) uses unknown cipher!"), c->name, c->hostname);
@@ -88,7 +80,7 @@
                        return false;
                }
  
-@@ -269,6 +282,7 @@ bool metakey_h(connection_t *c)
+@@ -269,6 +281,7 @@ bool metakey_h(connection_t *c)
                                        c->incipher->iv_len)) {
                        logger(LOG_ERR, _("Error during initialisation of cipher from %s (%s): %s"),
                                        c->name, c->hostname, ERR_error_string(ERR_get_error(), NULL));
@@ -96,7 +88,7 @@
                        return false;
                }
  
-@@ -284,11 +298,13 @@ bool metakey_h(connection_t *c)
+@@ -284,11 +297,13 @@ bool metakey_h(connection_t *c)
  
                if(!c->indigest) {
                        logger(LOG_ERR, _("Node %s (%s) uses unknown digest!"), c->name, c->hostname);
@@ -110,7 +102,7 @@
                        return false;
                }
        } else {
-@@ -299,6 +315,7 @@ bool metakey_h(connection_t *c)
+@@ -299,6 +314,7 @@ bool metakey_h(connection_t *c)
  
        c->allow_request = CHALLENGE;
  
@@ -118,7 +110,7 @@
        return send_challenge(c);
  }
  
-@@ -306,6 +323,7 @@ bool send_challenge(connection_t *c)
+@@ -306,6 +322,7 @@ bool send_challenge(connection_t *c)
  {
        char *buffer;
        int len;
@@ -126,7 +118,7 @@
  
        cp();
  
-@@ -315,7 +333,7 @@ bool send_challenge(connection_t *c)
+@@ -315,7 +332,7 @@ bool send_challenge(connection_t *c)
  
        /* Allocate buffers for the challenge */
  
@@ -135,7 +127,7 @@
  
        if(!c->hischallenge)
                c->hischallenge = xmalloc(len);
-@@ -331,29 +349,37 @@ bool send_challenge(connection_t *c)
+@@ -331,29 +348,37 @@ bool send_challenge(connection_t *c)
  
        /* Send the challenge */
  
@@ -179,7 +171,7 @@
                return false;
        }
  
-@@ -370,6 +396,7 @@ bool challenge_h(connection_t *c)
+@@ -370,6 +395,7 @@ bool challenge_h(connection_t *c)
  
        /* Rest is done by send_chal_reply() */
  



Home | Main Index | Thread Index | Old Index