Date: Sun, 14 Sep 2008 17:20:00 +0200 (CEST) From: Matthias Andree <matthias.andree@gmx.de> To: FreeBSD-gnats-submit@FreeBSD.org Subject: ports/127378: [MAINTAINER] security/openvpn-devel: update to rc10 (from rc9) Message-ID: <20080914152000.AC58AC7F5@merlin.emma.line.org> Resent-Message-ID: <200809141530.m8EFU1SC085104@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 127378 >Category: ports >Synopsis: [MAINTAINER] security/openvpn-devel: update to rc10 (from rc9) >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: maintainer-update >Submitter-Id: current-users >Arrival-Date: Sun Sep 14 15:30:01 UTC 2008 >Closed-Date: >Last-Modified: >Originator: Matthias Andree >Release: FreeBSD 6.3-STABLE i386 >Organization: >Environment: System: FreeBSD merlin.emma.line.org 6.3-STABLE FreeBSD 6.3-STABLE #36: Tue Jul 29 11:16:09 CEST 2008 >Description: update to rc10 (from rc9), upstream ChangeLog: | OpenVPN | Copyright (C) 2002-2008 Telethra, Inc. <sales@openvpn.net> | | $Id: ChangeLog 3323 2008-09-10 07:16:14Z james $ | | 2008.09.10 -- Version 2.1_rc10 | | * Added "--server-bridge" (without parameters) to enable | DHCP proxy mode: Configure server mode for ethernet | bridging using a DHCP-proxy, where clients talk to the | OpenVPN server-side DHCP server to receive their IP address | allocation and DNS server addresses. | | * Added "--route-gateway dhcp", to enable the extraction | of the gateway address from a DHCP negotiation with the | OpenVPN server-side LAN. | | * Fixed minor issue with --redirect-gateway bypass-dhcp or bypass-dns | on Windows. If the bypass IP address is 0.0.0.0 or 255.255.255.255, | ignore it. | | * Warn when ethernet bridging that the IP address of the bridge adapter | is probably not the same address that the LAN adapter was set to | previously. | | * When running as a server, warn if the LAN network address is | the all-popular 192.168.[0|1].x, since this condition commonly | leads to subnet conflicts down the road. | | * Primarily on the client, check for subnet conflicts between | the local LAN and the VPN subnet. | | * Added a 'netmask' parameter to get_default_gateway, to return | the netmask of the adapter containing the default gateway. | Only implemented on Windows so far. Other platforms will | return 255.255.255.0. Currently the netmask information is | only used to warn about subnet conflicts. | | * Minor fix to cryptoapi.c to not compile itself unless USE_CRYPTO | and USE_SSL flags are enabled (Alon Bar-Lev). | | * Updated openvpn/t_cltsrv.sh (used by "make check") to conform to new | --script-security rules. Also adds retrying if the addresses are in | use (Matthias Andree). | | * Fixed build issue with ./configure --disable-socks --disable-http. | | * Fixed separate compile errors in options.c and ntlm.c that occur | on strict C compilers (such as old versions of gcc) that require | that C variable declarations occur at the start of a {} block, | not in the middle. | | * Workaround bug in OpenSSL 0.9.6b ASN1_STRING_to_UTF8, which | the new implementation of extract_x509_field_ssl depends on. | | * LZO compression buffer overflow errors will now invalidate | the packet rather than trigger a fatal assertion. | | * Fixed minor compile issue in ntlm.c (mid-block declaration). | | * Added --allow-pull-fqdn option which allows client to pull DNS names | from server (rather than only IP address) for --ifconfig, --route, and | --route-gateway. OpenVPN versions 2.1_rc7 and earlier allowed DNS names | for these options to be pulled and translated to IP addresses by default. | Now --allow-pull-fqdn will be explicitly required on the client to enable | DNS-name-to-IP-address translation of pulled options. | | * 2.1_rc8 and earlier did implicit shell expansion on script | arguments since all scripts were called by system(). | The security hardening changes made to 2.1_rc9 no longer | use system(), but rather use the safer execve or CreateProcess | system calls. The security hardening also introduced a | backward incompatibility with 2.1_rc8 and earlier in that | script parameters were no longer shell-expanded, so | for example: | | client-connect "docc CLIENT-CONNECT" | | would fail to work because execve would try to execute | a script called "docc CLIENT-CONNECT" instead of "docc" | with "CLIENT-CONNECT" as the first argument. | | This patch fixes the issue, bringing the script argument | semantics back to pre 2.1_rc9 behavior in order to preserve | backward compatibility while still using execve or CreateProcess | to execute the script/executable. | | * Modified ip_or_dns_addr_safe, which validates pulled DNS names, | to more closely conform to RFC 3696: | | (1) DNS name length must not exceed 255 characters | | (2) DNS name characters must be limited to alphanumeric, | dash ('-'), and dot ('.') | | * Fixed bug in intra-session TLS key rollover that was introduced with | deferred authentication features in 2.1_rc8. Added file(s): - files/patch-t_cltsrv-down.sh Removed file(s): - files/patch-update-t_cltsrv Generated with FreeBSD Port Tools 0.77 >How-To-Repeat: >Fix: --- openvpn-devel-2.1.r10.patch begins here --- diff -ruN --exclude=CVS /usr/ports/security/openvpn-devel/Makefile /usr/home/emma/ports/security/openvpn-devel/Makefile --- /usr/ports/security/openvpn-devel/Makefile 2008-08-21 08:18:19.000000000 +0200 +++ /usr/home/emma/ports/security/openvpn-devel/Makefile 2008-09-14 17:06:01.000000000 +0200 @@ -6,7 +6,7 @@ # PORTNAME= openvpn -DISTVERSION= 2.1_rc9 +DISTVERSION= 2.1_rc10 CATEGORIES= security net MASTER_SITES= http://openvpn.net/release/ PKGNAMESUFFIX= -devel diff -ruN --exclude=CVS /usr/ports/security/openvpn-devel/distinfo /usr/home/emma/ports/security/openvpn-devel/distinfo --- /usr/ports/security/openvpn-devel/distinfo 2008-08-10 23:48:26.000000000 +0200 +++ /usr/home/emma/ports/security/openvpn-devel/distinfo 2008-09-14 17:07:11.000000000 +0200 @@ -1,3 +1,3 @@ -MD5 (openvpn-2.1_rc9.tar.gz) = f435e4ad43cf4323e942da570bae4951 -SHA256 (openvpn-2.1_rc9.tar.gz) = f73ec227a5fb7f4c73190e7ae52a59a4db149e8d628f22e8a0a762a58fbb424d -SIZE (openvpn-2.1_rc9.tar.gz) = 818716 +MD5 (openvpn-2.1_rc10.tar.gz) = b24904bd5f6e6fb4e863912743981b99 +SHA256 (openvpn-2.1_rc10.tar.gz) = f519db54cf7c7fe201eca7f8d405573acdde353e6f8c3aa39e34e2082edfb002 +SIZE (openvpn-2.1_rc10.tar.gz) = 824339 diff -ruN --exclude=CVS /usr/ports/security/openvpn-devel/files/patch-t_cltsrv-down.sh /usr/home/emma/ports/security/openvpn-devel/files/patch-t_cltsrv-down.sh --- /usr/ports/security/openvpn-devel/files/patch-t_cltsrv-down.sh 1970-01-01 01:00:00.000000000 +0100 +++ /usr/home/emma/ports/security/openvpn-devel/files/patch-t_cltsrv-down.sh 2008-09-14 17:10:11.000000000 +0200 @@ -0,0 +1,5 @@ +--- ./t_cltsrv-down.sh.orig 2008-08-07 23:24:40.000000000 +0200 ++++ ./t_cltsrv-down.sh 2008-08-07 23:28:40.000000000 +0200 +@@ -0,0 +1,2 @@ ++#! /bin/sh ++echo "${role}:${signal}" >&3 diff -ruN --exclude=CVS /usr/ports/security/openvpn-devel/files/patch-update-t_cltsrv /usr/home/emma/ports/security/openvpn-devel/files/patch-update-t_cltsrv --- /usr/ports/security/openvpn-devel/files/patch-update-t_cltsrv 2008-08-10 23:52:04.000000000 +0200 +++ /usr/home/emma/ports/security/openvpn-devel/files/patch-update-t_cltsrv 1970-01-01 01:00:00.000000000 +0100 @@ -1,23 +0,0 @@ ---- ./t_cltsrv.sh.orig 2008-08-07 23:14:55.000000000 +0200 -+++ ./t_cltsrv.sh 2008-08-07 23:53:27.000000000 +0200 -@@ -38,11 +38,13 @@ - fi - ;; - esac -+downscript="${srcdir}/t_cltsrv-down.sh" -+test -x $downscript || chmod +x $downscript || { echo >&2 "$downscript is not executable, failing." ; exit 1 ; } - echo "the following test will take about two minutes..." >&2 - set +e - ( --./openvpn --cd "${srcdir}" ${addopts} --down 'echo "srv:${signal}" >&3 ; : #' --tls-exit --ping-exit 180 --config sample-config-files/loopback-server & --./openvpn --cd "${srcdir}" ${addopts} --down 'echo "clt:${signal}" >&3 ; : #' --tls-exit --ping-exit 180 --config sample-config-files/loopback-client -+./openvpn --script-security 2 --cd "${srcdir}" ${addopts} --setenv role srv --down "$downscript" --tls-exit --ping-exit 180 --config sample-config-files/loopback-server & -+./openvpn --script-security 2 --cd "${srcdir}" ${addopts} --setenv role clt --down "$downscript" --tls-exit --ping-exit 180 --config sample-config-files/loopback-client - ) 3>log.$$.signal >log.$$ 2>&1 - e1=$? - wait $! ---- ./t_cltsrv-down.sh.orig 2008-08-07 23:24:40.000000000 +0200 -+++ ./t_cltsrv-down.sh 2008-08-07 23:28:40.000000000 +0200 -@@ -0,0 +1,2 @@ -+#! /bin/sh -+echo "${role}:${signal}" >&3 --- openvpn-devel-2.1.r10.patch ends here --- >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080914152000.AC58AC7F5>