Subject: CVS commit: pkgsrc/security/pflkm
To: None <pkgsrc-changes@NetBSD.org>
From: Peter Postma <peter@netbsd.org>
List: pkgsrc-changes
Date: 12/04/2004 15:01:55
Module Name:	pkgsrc
Committed By:	peter
Date:		Sat Dec  4 15:01:55 UTC 2004

Modified Files:
	pkgsrc/security/pflkm: Makefile distinfo

Log Message:
Changes up to 20041204:

* improved cleanup routines to make sure that no memory is leaking.
* applied patch to pf.c from OPENBSD_3_6 branch:
    fix a bug that leads to a crash when binat rules of the form
    'binat from ... to ... -> (if)' are used, where the interface is dynamic.
* added (unsigned char) casts to ctype functions.
* added experimental patch for ALTQ support.
* applied patch to pfctl_parser.c from OPENBSD_3_6 branch:
    do not assume entries in pf_timeouts[] are ordererd like PFTM_* in pfvar.h
* applied patch to pf.c from OPENBSD_3_6 branch:
    The flag to re-filter pf-generated packets was set wrong by synproxy
    for ACKs. It should filter the ACK replayed to the server, instead of
    of the one to the client.
* applied patch to pf.c from OPENBSD_3_6 branch:
    For RST generated due to state mismatch during handshake, don't set
    th_flags TH_ACK and leave th_ack 0, just like the RST generated by
    the stack in this case. Fixes the Raptor workaround.
* applied patch to pf_lkm.c from NetBSD HEAD:
    pfil4_wrapper, pfil6_wrapper:
    ensure that mbufs are writable beforehand as pf assumes it.
* applied patch to pf.c from OPENBSD_3_6 branch:
    reset anchor pointer to NULL when stepping back into the main ruleset,
    fixes pflog attributing states wrongly to anchors and pfctl -vvsn/sr
    showing wrong state counters for anchor rules.


To generate a diff of this commit:
cvs rdiff -r1.1.1.1 -r1.2 pkgsrc/security/pflkm/Makefile \
    pkgsrc/security/pflkm/distinfo

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.