pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/security/putty
Module Name: pkgsrc
Committed By: ryoon
Date: Tue Feb 14 03:28:07 UTC 2023
Modified Files:
pkgsrc/security/putty: Makefile PLIST distinfo
pkgsrc/security/putty/patches: patch-terminal.c
Removed Files:
pkgsrc/security/putty/patches: patch-unix_Makefile.gtk
patch-unix_uxnet.c patch-unix_uxpgnt.c
Log Message:
putty: Update to 0.78
Changelog:
These features are new in 0.78 (released 2022-10-29):
Support for OpenSSH certificates, for both user authentication keys and host keys.
New SSH proxy modes, for running a custom shell command or subsystem on the proxy server instead of forwarding a port through it.
New plugin system to allow a helper program to provide responses in keyboard-interactive authentication, intended to automate one-time password systems.
Support for NTRU Prime post-quantum key exchange,
Support for AES-GCM (in the OpenSSH style rather than RFC 5647).
Support for more forms of Diffie-Hellman key exchange: new larger integer groups (such as group16 and group18), and support for using those and ECDH with GSSAPI.
SSH configuration panels slightly reorganised. In particular, the configuration option 'Private key file for authentication' has moved to a new 'Credentials' panel alongside controls for some of
the above new features.
Bug fix: the 32-bit Windows build now runs on Windows XP again.
Bug fix: server-controlled window title setting now works again even if the character set is ISO 8859 (or a few other affected single-byte character sets).
Bug fix: certain forms of OSC escape sequences (sent by some real servers) could cause PuTTY to crash.
Bug fix: the -pwfile/-pw options no longer affect local key passphrase prompts, and no longer suppress Plink's anti-spoofing measures.
Note: installing the 0.78 or later Windows installer will not automatically uninstall 0.77 or earlier, due to a change we've made to work around a bug. We recommend uninstalling the old version
first, if possible. If both end up installed, uninstalling both and then re-installing the new version will fix things up.
These features were new in 0.77 (released 2022-05-27):
Major improvements to network proxy support:
Support for interactively prompting the user if the proxy server requires authentication.
Built-in support for proxying via another SSH server, so that PuTTY will SSH to the proxy and then automatically forward a port through it to the destination host. (Similar to running plink
-nc as a subprocess, but more convenient to set up, and allows you to answer interactive prompts presented by the proxy.)
Support for HTTP Digest authentication, when talking to HTTP proxies.
Introduced pterm.exe, a PuTTY-like wrapper program for Windows command prompts (or anything else running in a Windows console). Not yet included in the installer, but available as a .exe file
from the Download page.
Updated Unicode and bidi support to Unicode 14.0.0.
New command-line option -pwfile, like -pw except that it reads the password from a file so that it doesn't show up on the command line.
Windows Pageant: option --openssh-config to allow easy interoperation with Windows's ssh.exe.
-pw (and -pwfile) now do not fall back to interactively prompting for a password if the provided password fails. (That was the original intention.)
New configuration options for keyboard handling:
Option to control handling of Shift + arrow keys
Extra mode in the function-keys option, for modern xterm (v216 and above).
Bug workaround flag to wait for the server's SSH greeting before sending our own, for servers (or proxies) that lose outgoing data before seeing any incoming data.
Crypto update: added side-channel resistance in probabilistic RSA key generation.
Crypto update: retired the use of short Diffie-Hellman exponents (just in case).
Bug fix: reconfiguring remote port forwardings more than once no longer crashes.
Bug fix: terminal output processing is now paused while handling a remote-controlled terminal resize, so that the subsequent screen redraw is interpreted relative to the new terminal size instead
of the old.
Bug fix: Windows PuTTYgen's mouse-based entropy collection now handles high-frequency mice without getting confused.
Bug fix: Windows Pageant can now handle large numbers of concurrent connections without hanging or crashing.
Bug fix: if Windows Pageant is started multiple times simultaneously, the instances should reliably agree on one of them to be the persistent server.
Bug fix: remote-controlled changes of window title are now interpreted according to the configured character set.
Bug fix: remote-controlled changes of window title no longer get confused by UTF-8 characters whose encoding includes the byte 0x9C (which terminates the control sequence in non-UTF-8 contexts).
Bug fix: popping up the window context menu in the middle of a drag-select now no longer leaves the drag in a stuck state.
Bug fix: extensive use of true colour in the terminal no longer slows down window redraws unnecessarily.
Bug fix: when PSCP reports the server sending a disallowed compound pathname, it correctly reports the replacement name it's using for the downloaded file.
Bug fix: enabling X11 forwarding in psusan failed to fall back through possible port numbers for the forwarded X display.
For developers: migrated the build system to CMake, removing the old idiosyncratic mkfiles.pl and the autotools system.
To generate a diff of this commit:
cvs rdiff -u -r1.73 -r1.74 pkgsrc/security/putty/Makefile
cvs rdiff -u -r1.2 -r1.3 pkgsrc/security/putty/PLIST
cvs rdiff -u -r1.34 -r1.35 pkgsrc/security/putty/distinfo
cvs rdiff -u -r1.5 -r1.6 pkgsrc/security/putty/patches/patch-terminal.c
cvs rdiff -u -r1.4 -r0 pkgsrc/security/putty/patches/patch-unix_Makefile.gtk
cvs rdiff -u -r1.2 -r0 pkgsrc/security/putty/patches/patch-unix_uxnet.c
cvs rdiff -u -r1.3 -r0 pkgsrc/security/putty/patches/patch-unix_uxpgnt.c
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: pkgsrc/security/putty/Makefile
diff -u pkgsrc/security/putty/Makefile:1.73 pkgsrc/security/putty/Makefile:1.74
--- pkgsrc/security/putty/Makefile:1.73 Sun Jan 29 21:17:41 2023
+++ pkgsrc/security/putty/Makefile Tue Feb 14 03:28:07 2023
@@ -1,8 +1,7 @@
-# $NetBSD: Makefile,v 1.73 2023/01/29 21:17:41 ryoon Exp $
+# $NetBSD: Makefile,v 1.74 2023/02/14 03:28:07 ryoon Exp $
#
-DISTNAME= putty-0.76
-PKGREVISION= 4
+DISTNAME= putty-0.78
CATEGORIES= security
MASTER_SITES= http://the.earth.li/~sgtatham/putty/${PKGVERSION_NOREV}/
@@ -11,13 +10,10 @@ HOMEPAGE= https://www.chiark.greenend.or
COMMENT= Free implementation of Telnet and SSH for Win32 and Unix platforms
LICENSE= mit
-USE_TOOLS+= gmake pkg-config
-BUILD_DIRS= unix
+USE_CMAKE= yes
+USE_TOOLS+= perl pkg-config
-MAKE_FILE= Makefile.gtk
-MAKE_FLAGS+= mandir=${PREFIX}/${PKGMANDIR}
-
-INSTALLATION_DIRS= bin ${PKGMANDIR}/man1
+#INSTALLATION_DIRS= bin ${PKGMANDIR}/man1
.include "options.mk"
Index: pkgsrc/security/putty/PLIST
diff -u pkgsrc/security/putty/PLIST:1.2 pkgsrc/security/putty/PLIST:1.3
--- pkgsrc/security/putty/PLIST:1.2 Thu May 4 12:52:35 2017
+++ pkgsrc/security/putty/PLIST Tue Feb 14 03:28:07 2023
@@ -1,17 +1,17 @@
-@comment $NetBSD: PLIST,v 1.2 2017/05/04 12:52:35 ryoon Exp $
+@comment $NetBSD: PLIST,v 1.3 2023/02/14 03:28:07 ryoon Exp $
bin/pageant
bin/plink
bin/pscp
bin/psftp
+bin/psusan
bin/pterm
bin/putty
bin/puttygen
-bin/puttytel
man/man1/pageant.1
man/man1/plink.1
man/man1/pscp.1
man/man1/psftp.1
+man/man1/psusan.1
man/man1/pterm.1
man/man1/putty.1
man/man1/puttygen.1
-man/man1/puttytel.1
Index: pkgsrc/security/putty/distinfo
diff -u pkgsrc/security/putty/distinfo:1.34 pkgsrc/security/putty/distinfo:1.35
--- pkgsrc/security/putty/distinfo:1.34 Tue Oct 26 11:17:40 2021
+++ pkgsrc/security/putty/distinfo Tue Feb 14 03:28:07 2023
@@ -1,11 +1,8 @@
-$NetBSD: distinfo,v 1.34 2021/10/26 11:17:40 nia Exp $
+$NetBSD: distinfo,v 1.35 2023/02/14 03:28:07 ryoon Exp $
-BLAKE2s (putty-0.76.tar.gz) = bb6ba61b99336a5f86b32a82050b50e2b8fee36ae70e9a9f41d823a609b624a2
-SHA512 (putty-0.76.tar.gz) = 4576b359593928c6eba923f2d7b66ac0f2cf00e0c217cdbbb124471c3b35feb090e623847bfc507a4ef106cb3067aac47419e241b11dd8bf4ae554061fa93c25
-Size (putty-0.76.tar.gz) = 2735687 bytes
+BLAKE2s (putty-0.78.tar.gz) = 0cd36ac355085e34c7e03afb93add0d00d55bfe055d5aec565d04eb3b9d3a8f6
+SHA512 (putty-0.78.tar.gz) = d7a3e2eabd5f1f65fc0f3f1ee0789c30fbe891b57f63ddeac0b92befcb6aecd4a748f04a21c76ee42d992deb77c2e1a0454a71cc620ef26fbf23af660bd84bb5
+Size (putty-0.78.tar.gz) = 2811628 bytes
SHA1 (patch-ldisc.c) = cf31a65f920a3ea9b4a70602e4b2fd4d5df8d3e8
-SHA1 (patch-terminal.c) = 30d6196e371b5369f9ea69e193662a47dbefaa10
+SHA1 (patch-terminal.c) = 690d9021b14947ae24c68ecff6781ad255ab7a70
SHA1 (patch-timing.c) = a6a492fc8b22c58e2973c854bffa4c8bf71eb6a7
-SHA1 (patch-unix_Makefile.gtk) = 47cde3590b7e5ebe30a1ad5fcb6c9e4ce6c25eed
-SHA1 (patch-unix_uxnet.c) = 2d1c2939721993fe5616c2fe3f1935c03a31bb35
-SHA1 (patch-unix_uxpgnt.c) = 64da7ac0b5f02de7d5e03858b0ea69c8662cc07a
Index: pkgsrc/security/putty/patches/patch-terminal.c
diff -u pkgsrc/security/putty/patches/patch-terminal.c:1.5 pkgsrc/security/putty/patches/patch-terminal.c:1.6
--- pkgsrc/security/putty/patches/patch-terminal.c:1.5 Thu Dec 19 22:22:33 2019
+++ pkgsrc/security/putty/patches/patch-terminal.c Tue Feb 14 03:28:07 2023
@@ -1,10 +1,10 @@
-$NetBSD: patch-terminal.c,v 1.5 2019/12/19 22:22:33 joerg Exp $
+$NetBSD: patch-terminal.c,v 1.6 2023/02/14 03:28:07 ryoon Exp $
Make the home/end keys work on BSD servers as well as Linux ones
---- terminal.c.orig 2019-09-22 09:14:51.000000000 +0000
-+++ terminal.c
-@@ -6892,8 +6892,17 @@ int format_small_keypad_key(char *buf, T
+--- terminal/terminal.c.orig 2022-10-28 17:19:48.000000000 +0000
++++ terminal/terminal.c
+@@ -7508,8 +7508,17 @@ int format_small_keypad_key(char *buf, T
} else {
p += sprintf(p, "\x1B[%c", codes[code-1]);
}
@@ -22,5 +22,5 @@ Make the home/end keys work on BSD serve
+ he = code == 1 ? "\x1BOH" : "\x1BOF";
+ p += sprintf((char *) p, "%s", he);
} else {
- p += sprintf(p, "\x1B[%d~", code);
- }
+ if (term->vt52_mode) {
+ p += sprintf(p, "\x1B[%d~", code);
Home |
Main Index |
Thread Index |
Old Index