From owner-svn-ports-all@freebsd.org Tue Aug 16 20:02:16 2016 Return-Path: Delivered-To: svn-ports-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C5FB3BBC696; Tue, 16 Aug 2016 20:02:16 +0000 (UTC) (envelope-from feld@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 91FEC11F4; Tue, 16 Aug 2016 20:02:16 +0000 (UTC) (envelope-from feld@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id u7GK2FpH049012; Tue, 16 Aug 2016 20:02:15 GMT (envelope-from feld@FreeBSD.org) Received: (from feld@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id u7GK2FFP049011; Tue, 16 Aug 2016 20:02:15 GMT (envelope-from feld@FreeBSD.org) Message-Id: <201608162002.u7GK2FFP049011@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: feld set sender to feld@FreeBSD.org using -f From: Mark Felder Date: Tue, 16 Aug 2016 20:02:15 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r420300 - head/net-mgmt/rancid3 X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 16 Aug 2016 20:02:16 -0000 Author: feld Date: Tue Aug 16 20:02:15 2016 New Revision: 420300 URL: https://svnweb.freebsd.org/changeset/ports/420300 Log: net-mgmt/rancid3: Fix SSH on FreeBSD 11.0 RANCID by default attempts to ssh to devices with 3des as the cipher. This no longer works with OpenSSH in FreeBSD 11 as you need to be more specific. Changing this to 3des-cbc works for now, but future versions of OpenSSH will break this as well. Unfortunately this will break RANCID as many network devices do not support modern ciphers, but we will have to deal with that when the time comes. MFH: 2016Q3 Modified: head/net-mgmt/rancid3/Makefile Modified: head/net-mgmt/rancid3/Makefile ============================================================================== --- head/net-mgmt/rancid3/Makefile Tue Aug 16 19:32:57 2016 (r420299) +++ head/net-mgmt/rancid3/Makefile Tue Aug 16 20:02:15 2016 (r420300) @@ -3,7 +3,7 @@ PORTNAME= rancid PORTVERSION= 3.4.1 -PORTREVISION= 1 +PORTREVISION= 2 CATEGORIES= net-mgmt MASTER_SITES= ftp://ftp.shrubbery.net/pub/rancid/ PKGNAMESUFFIX= 3 @@ -59,6 +59,8 @@ pre-everything:: post-patch: ${REINPLACE_CMD} "s|par.1|rancid-par.1|" ${WRKSRC}/man/Makefile.in ${MV} ${WRKSRC}/man/par.1 ${WRKSRC}/man/rancid-par.1 + ${REINPLACE_CMD} "s|3des|3des-cbc|g" ${WRKSRC}/bin/*.in ${WRKSRC}/cloginrc.sample \ + ${WRKSRC}/man/cloginrc.5 ${WRKSRC}/man/clogin.1 post-install: ${LN} -s ${PREFIX}/libexec/${PORTNAME}/rancid-cvs ${STAGEDIR}${PREFIX}/bin