From owner-svn-ports-all@freebsd.org Tue Aug 16 20:03:21 2016 Return-Path: Delivered-To: svn-ports-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A76B1BBC6FF; Tue, 16 Aug 2016 20:03:21 +0000 (UTC) (envelope-from feld@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 73C05133A; Tue, 16 Aug 2016 20:03:21 +0000 (UTC) (envelope-from feld@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id u7GK3K1j049198; Tue, 16 Aug 2016 20:03:20 GMT (envelope-from feld@FreeBSD.org) Received: (from feld@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id u7GK3KQ6049197; Tue, 16 Aug 2016 20:03:20 GMT (envelope-from feld@FreeBSD.org) Message-Id: <201608162003.u7GK3KQ6049197@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: feld set sender to feld@FreeBSD.org using -f From: Mark Felder Date: Tue, 16 Aug 2016 20:03:20 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-branches@freebsd.org Subject: svn commit: r420301 - branches/2016Q3/net-mgmt/rancid3 X-SVN-Group: ports-branches MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 16 Aug 2016 20:03:21 -0000 Author: feld Date: Tue Aug 16 20:03:20 2016 New Revision: 420301 URL: https://svnweb.freebsd.org/changeset/ports/420301 Log: MFH: r420300 net-mgmt/rancid3: Fix SSH on FreeBSD 11.0 RANCID by default attempts to ssh to devices with 3des as the cipher. This no longer works with OpenSSH in FreeBSD 11 as you need to be more specific. Changing this to 3des-cbc works for now, but future versions of OpenSSH will break this as well. Unfortunately this will break RANCID as many network devices do not support modern ciphers, but we will have to deal with that when the time comes. Approved by: ports-secteam (with hat) Modified: branches/2016Q3/net-mgmt/rancid3/Makefile Directory Properties: branches/2016Q3/ (props changed) Modified: branches/2016Q3/net-mgmt/rancid3/Makefile ============================================================================== --- branches/2016Q3/net-mgmt/rancid3/Makefile Tue Aug 16 20:02:15 2016 (r420300) +++ branches/2016Q3/net-mgmt/rancid3/Makefile Tue Aug 16 20:03:20 2016 (r420301) @@ -3,7 +3,7 @@ PORTNAME= rancid PORTVERSION= 3.4.1 -PORTREVISION= 1 +PORTREVISION= 2 CATEGORIES= net-mgmt MASTER_SITES= ftp://ftp.shrubbery.net/pub/rancid/ PKGNAMESUFFIX= 3 @@ -59,6 +59,8 @@ pre-everything:: post-patch: ${REINPLACE_CMD} "s|par.1|rancid-par.1|" ${WRKSRC}/man/Makefile.in ${MV} ${WRKSRC}/man/par.1 ${WRKSRC}/man/rancid-par.1 + ${REINPLACE_CMD} "s|3des|3des-cbc|g" ${WRKSRC}/bin/*.in ${WRKSRC}/cloginrc.sample \ + ${WRKSRC}/man/cloginrc.5 ${WRKSRC}/man/clogin.1 post-install: ${LN} -s ${PREFIX}/libexec/${PORTNAME}/rancid-cvs ${STAGEDIR}${PREFIX}/bin