From e96448084705eb72316d8aae2453d5b88da53d40 Mon Sep 17 00:00:00 2001 From: Martin Wilke Date: Mon, 15 Sep 2008 23:13:22 +0000 Subject: - Update to 2.1_rc11 Changelog: This release fixes a serious (though not security-related) bug in the SSL/TLS negotiation over UDP that can cause SSL/TLS handshake failures. PR: 127392 Submitted by: Matthias Andree (maintainer) Approved by: portmgr (pav) --- security/openvpn-devel/Makefile | 2 +- security/openvpn-devel/distinfo | 6 +++--- .../openvpn-devel/files/patch-t_cltsrv-down.sh | 5 +++++ security/openvpn-devel/files/patch-update-t_cltsrv | 23 ---------------------- 4 files changed, 9 insertions(+), 27 deletions(-) create mode 100644 security/openvpn-devel/files/patch-t_cltsrv-down.sh delete mode 100644 security/openvpn-devel/files/patch-update-t_cltsrv (limited to 'security/openvpn-devel') diff --git a/security/openvpn-devel/Makefile b/security/openvpn-devel/Makefile index 0d2d6fe61f78..19ad03d49141 100644 --- a/security/openvpn-devel/Makefile +++ b/security/openvpn-devel/Makefile @@ -6,7 +6,7 @@ # PORTNAME= openvpn -DISTVERSION= 2.1_rc9 +DISTVERSION= 2.1_rc11 CATEGORIES= security net MASTER_SITES= http://openvpn.net/release/ PKGNAMESUFFIX= -devel diff --git a/security/openvpn-devel/distinfo b/security/openvpn-devel/distinfo index 6b6689a6368c..d3676551ad20 100644 --- a/security/openvpn-devel/distinfo +++ b/security/openvpn-devel/distinfo @@ -1,3 +1,3 @@ -MD5 (openvpn-2.1_rc9.tar.gz) = f435e4ad43cf4323e942da570bae4951 -SHA256 (openvpn-2.1_rc9.tar.gz) = f73ec227a5fb7f4c73190e7ae52a59a4db149e8d628f22e8a0a762a58fbb424d -SIZE (openvpn-2.1_rc9.tar.gz) = 818716 +MD5 (openvpn-2.1_rc11.tar.gz) = 424d9305b478ae112a7d2d8bfdd4b7f5 +SHA256 (openvpn-2.1_rc11.tar.gz) = 4d0b4a07f5e7da5d2c707f5c73e8dfde5244baae972d525d0ceb8f0ffa6b56d4 +SIZE (openvpn-2.1_rc11.tar.gz) = 824442 diff --git a/security/openvpn-devel/files/patch-t_cltsrv-down.sh b/security/openvpn-devel/files/patch-t_cltsrv-down.sh new file mode 100644 index 000000000000..b7c136fa4d66 --- /dev/null +++ b/security/openvpn-devel/files/patch-t_cltsrv-down.sh @@ -0,0 +1,5 @@ +--- ./t_cltsrv-down.sh.orig 2008-08-07 23:24:40.000000000 +0200 ++++ ./t_cltsrv-down.sh 2008-08-07 23:28:40.000000000 +0200 +@@ -0,0 +1,2 @@ ++#! /bin/sh ++echo "${role}:${signal}" >&3 diff --git a/security/openvpn-devel/files/patch-update-t_cltsrv b/security/openvpn-devel/files/patch-update-t_cltsrv deleted file mode 100644 index d3828fd74882..000000000000 --- a/security/openvpn-devel/files/patch-update-t_cltsrv +++ /dev/null @@ -1,23 +0,0 @@ ---- ./t_cltsrv.sh.orig 2008-08-07 23:14:55.000000000 +0200 -+++ ./t_cltsrv.sh 2008-08-07 23:53:27.000000000 +0200 -@@ -38,11 +38,13 @@ - fi - ;; - esac -+downscript="${srcdir}/t_cltsrv-down.sh" -+test -x $downscript || chmod +x $downscript || { echo >&2 "$downscript is not executable, failing." ; exit 1 ; } - echo "the following test will take about two minutes..." >&2 - set +e - ( --./openvpn --cd "${srcdir}" ${addopts} --down 'echo "srv:${signal}" >&3 ; : #' --tls-exit --ping-exit 180 --config sample-config-files/loopback-server & --./openvpn --cd "${srcdir}" ${addopts} --down 'echo "clt:${signal}" >&3 ; : #' --tls-exit --ping-exit 180 --config sample-config-files/loopback-client -+./openvpn --script-security 2 --cd "${srcdir}" ${addopts} --setenv role srv --down "$downscript" --tls-exit --ping-exit 180 --config sample-config-files/loopback-server & -+./openvpn --script-security 2 --cd "${srcdir}" ${addopts} --setenv role clt --down "$downscript" --tls-exit --ping-exit 180 --config sample-config-files/loopback-client - ) 3>log.$$.signal >log.$$ 2>&1 - e1=$? - wait $! ---- ./t_cltsrv-down.sh.orig 2008-08-07 23:24:40.000000000 +0200 -+++ ./t_cltsrv-down.sh 2008-08-07 23:28:40.000000000 +0200 -@@ -0,0 +1,2 @@ -+#! /bin/sh -+echo "${role}:${signal}" >&3 -- cgit v1.2.3