Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 14 Oct 2009 01:24:45 +0200 (CEST)
From:      Matthias Andree <matthias.andree@gmx.de>
To:        FreeBSD-gnats-submit@FreeBSD.org
Subject:   ports/139584: [MAINTAINER] security/openvpn-devel: update to -rc20
Message-ID:  <20091013232445.D1F8D3F489@vmfreebsd6.emma.line.org>
Resent-Message-ID: <200910132340.n9DNe2jA074878@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         139584
>Category:       ports
>Synopsis:       [MAINTAINER] security/openvpn-devel: update to -rc20
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          maintainer-update
>Submitter-Id:   current-users
>Arrival-Date:   Tue Oct 13 23:40:02 UTC 2009
>Closed-Date:
>Last-Modified:
>Originator:     Matthias Andree
>Release:        FreeBSD 6.4-RELEASE-p5 i386
>Organization:
>Environment:
System: FreeBSD vmfreebsd6.emma.line.org 6.4-RELEASE-p5 FreeBSD 6.4-RELEASE-p5 #0: Wed Jun 10 06:39:45 UTC 2009
>Description:
update to -rc20, moving pre-fetch to pre-configure to reduce screen clutter and
user irritation.

FreeBSD-relevant excerpts of upstream maintainer's change log:

* Fixed a bug introduced in 2.1_rc17 (svn r4436) where using the
   redirect-gateway option by itself, without any extra parameters,
   would cause the option to be ignored.
 
* Fixed ifconfig command for "topology subnet" on FreeBSD (Stefan Bethke).
 
* Added --remote-random-hostname option.
 
* Added "load-stats" management interface command to get global server
   load statistics.
 
* Optimized PUSH_REQUEST handshake sequence to shave several seconds
   off of a typical client connection initiation.
 
* The maximum number of "route" directives (specified in the config
   file or pulled from a server) can now be configured via the new
   "max-routes" directive.
 
* Eliminated the limitation on the number of options that can be pushed
   to clients, including routes.  Previously, all pushed options needed
   to fit within a 1024 byte options string.
 
* Added --server-poll-timeout option : when polling possible remote
   servers to connect to in a round-robin fashion, spend no more than
   n seconds waiting for a response before trying the next server.
 
* Added the ability for the server to provide a custom reason string
   when an AUTH_FAILED message is returned to the client.  This
   string can be set by the server-side managment interface and read
   by the client-side management interface.
 
* client-kill management interface command, when issued on server, will
   now send a RESTART message to client.
   This feature is intended to make UDP clients respond the same as TCP
   clients in the case where the server issues a RESTART message in
   order to force the client to reconnect and pull a new options/route
   list.

Removed file(s):
- files/patch-tun.c (integrated in upstreami version)

Generated with FreeBSD Port Tools 0.99
>How-To-Repeat:
>Fix:

--- openvpn-devel-2.1.r20.patch begins here ---
diff -ruN --exclude=CVS /usr/ports/security/openvpn-devel/Makefile /usr/home/ma/ports/security/openvpn-devel/Makefile
--- /usr/ports/security/openvpn-devel/Makefile	2009-08-07 19:47:28.000000000 +0200
+++ /usr/home/ma/ports/security/openvpn-devel/Makefile	2009-10-14 00:46:16.000000000 +0200
@@ -6,7 +6,7 @@
 #
 
 PORTNAME=	openvpn
-DISTVERSION=	2.1_rc19
+DISTVERSION=	2.1_rc20
 CATEGORIES=	security net
 MASTER_SITES=	http://openvpn.net/release/
 PKGNAMESUFFIX=	-devel
@@ -41,7 +41,7 @@
 CFLAGS+=	-DLOG_OPENVPN=${LOG_OPENVPN}
 .endif
 
-pre-fetch:
+pre-configure:
 .ifdef (LOG_OPENVPN)
 	@${ECHO} "Building with LOG_OPENVPN=${LOG_OPENVPN}"
 .else
diff -ruN --exclude=CVS /usr/ports/security/openvpn-devel/distinfo /usr/home/ma/ports/security/openvpn-devel/distinfo
--- /usr/ports/security/openvpn-devel/distinfo	2009-08-07 19:47:28.000000000 +0200
+++ /usr/home/ma/ports/security/openvpn-devel/distinfo	2009-10-14 00:45:39.000000000 +0200
@@ -1,3 +1,3 @@
-MD5 (openvpn-2.1_rc19.tar.gz) = ba2ee667a8b7606b125b7d32f47ca578
-SHA256 (openvpn-2.1_rc19.tar.gz) = d7f52e2217ed1cf367ca93257b27c8acb29fcae4fcaa31b4a94146a3c7a7de33
-SIZE (openvpn-2.1_rc19.tar.gz) = 839955
+MD5 (openvpn-2.1_rc20.tar.gz) = 8187f8f21507faac5e320e32747203b8
+SHA256 (openvpn-2.1_rc20.tar.gz) = 4d423b48cb3ccc66b5669b9404dcb028cb62af410361c09e6056db0c5d2a1267
+SIZE (openvpn-2.1_rc20.tar.gz) = 844253
diff -ruN --exclude=CVS /usr/ports/security/openvpn-devel/files/patch-tun.c /usr/home/ma/ports/security/openvpn-devel/files/patch-tun.c
--- /usr/ports/security/openvpn-devel/files/patch-tun.c	2009-08-07 19:47:28.000000000 +0200
+++ /usr/home/ma/ports/security/openvpn-devel/files/patch-tun.c	1970-01-01 01:00:00.000000000 +0100
@@ -1,43 +0,0 @@
-# This patch by Stefan Bethke fixes FreeBSD 8 compatibility
-# in topology subnet mode, # and makes sure that the tun interface is
-# correctly configured. Contact: stb at lassitu dot de
-
---- /home/stb/tun.c.orig	2009-08-05 14:25:55.204943408 +0200
-+++ tun.c	2009-08-05 17:57:51.886753309 +0200
-@@ -863,11 +863,10 @@
-       else {
- 	if (tt->topology == TOP_SUBNET)
-             argv_printf (&argv,
--                              "%s %s %s %s netmask %s mtu %d up",
-+                              "%s %s %s netmask %s mtu %d up",
-                               IFCONFIG_PATH,
-                               actual,
-                               ifconfig_local,
--                              ifconfig_local,
-                               ifconfig_remote_netmask,
-                               tun_mtu
-                               );
-@@ -1745,14 +1744,19 @@
- {
-   open_tun_generic (dev, dev_type, dev_node, ipv6, true, true, tt);
- 
--  if (tt->fd >= 0)
-+  if (tt->fd >= 0 && tt->type == DEV_TYPE_TUN)
-     {
-       int i = 0;
- 
--      /* Disable extended modes */
--      ioctl (tt->fd, TUNSLMODE, &i);
-+      i = tt->topology == TOP_SUBNET ? IFF_BROADCAST : IFF_POINTOPOINT;
-+      i |= IFF_MULTICAST;
-+      if (ioctl (tt->fd, TUNSIFMODE, &i) < 0) {
-+	msg (M_WARN | M_ERRNO, "ioctl(TUNSIFMODE): %s", strerror(errno));
-+      }
-       i = 1;
--      ioctl (tt->fd, TUNSIFHEAD, &i);
-+      if (ioctl (tt->fd, TUNSIFHEAD, &i) < 0) {
-+	msg (M_WARN | M_ERRNO, "ioctl(TUNSIFHEAD): %s", strerror(errno));
-+      }
-     }
- }
- 
--- openvpn-devel-2.1.r20.patch ends here ---

>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20091013232445.D1F8D3F489>