head	1.38;
access;
symbols
	RELEASE_8_1_0:1.37
	RELEASE_7_3_0:1.37
	RELEASE_8_0_0:1.37
	RELEASE_7_2_0:1.37
	RELEASE_7_1_0:1.37
	RELEASE_6_4_0:1.37
	RELEASE_5_EOL:1.37
	RELEASE_7_0_0:1.37
	RELEASE_6_3_0:1.37
	PRE_XORG_7:1.37
	RELEASE_4_EOL:1.37
	RELEASE_6_2_0:1.37
	RELEASE_6_1_0:1.37
	RELEASE_5_5_0:1.37
	RELEASE_6_0_0:1.36
	RELEASE_5_4_0:1.36
	RELEASE_4_11_0:1.36
	RELEASE_5_3_0:1.36
	RELEASE_4_10_0:1.36
	RELEASE_5_2_1:1.34
	RELEASE_5_2_0:1.34
	RELEASE_4_9_0:1.34
	RELEASE_5_1_0:1.33
	RELEASE_4_8_0:1.33
	RELEASE_5_0_0:1.31
	RELEASE_4_7_0:1.31
	RELEASE_4_6_2:1.29
	RELEASE_4_6_1:1.29
	RELEASE_4_6_0:1.29
	RELEASE_5_0_DP1:1.29
	RELEASE_4_5_0:1.28
	RELEASE_4_4_0:1.28
	RELEASE_4_3_0:1.28
	RELEASE_4_2_0:1.28
	RELEASE_4_1_1:1.28
	RELEASE_4_1_0:1.27
	RELEASE_3_5_0:1.27
	RELEASE_4_0_0:1.26
	RELEASE_3_4_0:1.26
	RELEASE_3_3_0:1.26
	RELEASE_3_2_0:1.24
	RELEASE_3_1_0:1.24
	ssh_2_0_11:1.23
	RELEASE_2_2_8:1.22
	RELEASE_3_0_0:1.21
	RELEASE_2_2_7:1.21
	RELEASE_2_2_6:1.18
	RELEASE_2_2_5:1.17
	RELEASE_2_2_1:1.13
	RELEASE_2_2_2:1.16
	ssh_1_2_10:1.1.1.1
	YLO:1.1.1;
locks; strict;
comment	@# @;


1.38
date	2010.10.15.17.40.30;	author garga;	state dead;
branches;
next	1.37;

1.37
date	2006.01.24.01.03.28;	author edwin;	state Exp;
branches;
next	1.36;

1.36
date	2004.03.27.13.27.56;	author netchild;	state Exp;
branches;
next	1.35;

1.35
date	2004.01.04.14.03.52;	author netchild;	state Exp;
branches;
next	1.34;

1.34
date	2003.07.07.14.19.06;	author netchild;	state Exp;
branches;
next	1.33;

1.33
date	2003.02.23.22.39.05;	author edwin;	state Exp;
branches;
next	1.32;

1.32
date	2003.01.02.18.30.21;	author ijliao;	state Exp;
branches;
next	1.31;

1.31
date	2002.06.18.23.45.19;	author pat;	state Exp;
branches;
next	1.30;

1.30
date	2002.05.28.21.28.12;	author petef;	state Exp;
branches;
next	1.29;

1.29
date	2002.02.22.02.52.25;	author knu;	state Exp;
branches;
next	1.28;

1.28
date	2000.09.02.03.56.56;	author kris;	state Exp;
branches;
next	1.27;

1.27
date	2000.05.29.03.16.41;	author steve;	state Exp;
branches;
next	1.26;

1.26
date	99.09.02.17.08.38;	author cpiazza;	state Exp;
branches;
next	1.25;

1.25
date	99.06.18.20.02.18;	author ache;	state Exp;
branches;
next	1.24;

1.24
date	99.02.05.06.11.36;	author ache;	state Exp;
branches;
next	1.23;

1.23
date	98.12.01.11.10.33;	author obrien;	state Exp;
branches;
next	1.22;

1.22
date	98.11.23.05.15.17;	author kuriyama;	state Exp;
branches;
next	1.21;

1.21
date	98.07.11.23.10.54;	author imp;	state Exp;
branches;
next	1.20;

1.20
date	98.06.12.07.55.12;	author dima;	state Exp;
branches;
next	1.19;

1.19
date	98.05.22.06.05.44;	author mph;	state Exp;
branches;
next	1.18;

1.18
date	98.01.20.23.50.11;	author imp;	state Exp;
branches;
next	1.17;

1.17
date	97.09.16.00.13.24;	author torstenb;	state Exp;
branches;
next	1.16;

1.16
date	97.04.25.05.01.03;	author peter;	state Exp;
branches;
next	1.15;

1.15
date	97.04.16.19.48.17;	author ache;	state Exp;
branches;
next	1.14;

1.14
date	97.03.28.23.30.23;	author ache;	state Exp;
branches;
next	1.13;

1.13
date	96.11.20.12.45.53;	author adam;	state Exp;
branches;
next	1.12;

1.12
date	96.10.16.04.56.04;	author ache;	state Exp;
branches;
next	1.11;

1.11
date	96.07.29.02.33.33;	author jkh;	state Exp;
branches;
next	1.10;

1.10
date	96.07.18.11.33.44;	author torstenb;	state Exp;
branches;
next	1.9;

1.9
date	96.07.16.00.33.15;	author ache;	state Exp;
branches;
next	1.8;

1.8
date	96.07.05.10.50.31;	author asami;	state Exp;
branches;
next	1.7;

1.7
date	96.06.07.04.33.22;	author peter;	state Exp;
branches;
next	1.6;

1.6
date	96.02.19.09.47.03;	author asami;	state Exp;
branches;
next	1.5;

1.5
date	96.02.17.15.13.44;	author ache;	state Exp;
branches;
next	1.4;

1.4
date	96.02.06.02.57.04;	author pst;	state Exp;
branches;
next	1.3;

1.3
date	96.01.21.00.32.40;	author ache;	state Exp;
branches;
next	1.2;

1.2
date	95.11.23.17.19.06;	author peter;	state Exp;
branches;
next	1.1;

1.1
date	95.10.07.01.19.27;	author torstenb;	state Exp;
branches
	1.1.1.1;
next	;

1.1.1.1
date	95.10.07.01.19.27;	author torstenb;	state Exp;
branches;
next	;


desc
@@


1.38
log
@Remove expired ports

2010-10-15 security/ssh2: abandoned upstream
2010-10-15 security/ssh2-nox11: abandoned upstream
@
text
@MD5 (ssh-3.2.9.1.tar.gz) = f3ed49f13419d97dc1d0d3bfb4bb99bf
SHA256 (ssh-3.2.9.1.tar.gz) = 9d989fa1d99e2c95bd8a9dbf73b9495fc831061b8b6a951effd4c1bb1902a373
SIZE (ssh-3.2.9.1.tar.gz) = 2269281
@


1.37
log
@SHA256ify

Approved by: krion@@
@
text
@@


1.36
log
@Add SIZE info.

Submitted by:	trevor via maintainer
@
text
@d2 1
@


1.35
log
@HEADS-UP: Traditionally this port automatically installs a start-up script for
	  sshd2 unless it detects an entry for ssh in /etc/inetd.conf. As there
	  are three ways to automatically start sshd2 and /etc/rc.conf is the
	  simplest one (at least on FreeBSD 4, with rcNG once /etc/rc.d/sshd is
	  fixed to not be tailored to the base sshd) this version of the port
	  is the last one to do so. Beginning with next version it will only
	  install a sample start-up script. To prevent foot shooting when
	  updating to the next version this port won't remove an existing
	  start-up scripting on deinstall. Please see also the pkg-message that
	  gets displayed on installation.

- Update to 3.2.9.1. This is _not_ a security update. For the non-commercial
  version the only change worth mentioning since 3.2.5 is the addition of the
  config option "DisableVersionFallback", see sshd2_config(5) for further
  details.
- Use sites from the official list of mirrors for MASTER_SITES.
- Adjust COMMENT to justify why this port is security/ssh2, not security/ssh3.
- Revise list of installed documentation. No longer install MANIFEST (list of
  source files) and INSTALL, install RFCs referenced in sshd2_config(5) and
  HOWTO.anonymous.sftp (patched to better fit FreeBSD).
- Remove WITH_STATIC_SFTP knob. Using the internal sftp-server instead of the
  external (static) one is much simpler to set up and maintain (using the
  external one requires to install a copy of it in the home directory of the
  anonymous sftp user which has to be manually updated when installing a newer
  version of the port).
- Remove WITHOUT_TCPWRAP knob, libwarp is part of FreeBSD since 3.2.
- Install examples scripts for the ExternalAuthorizationProgram and
  AuthKbdInt.Plugin config options in EXAMPLESDIR. See sshd2_config(5) for
  further information.
- Replace references to /etc/ssh2/* in config files with PREFIX/etc/ssh2/*.
- Add a pkg-message displaying the different methods to automatically start
  sshd2.
- Switch to the start-up script for Solaris which is part of the tarball, it
  handles the name of the pidfile better.
- Fix detection of X11 headers, this enables compilation with support for X11
  SECURITY extension. See TrustX11Applications in ssh2_config(5) for further
  information.
- Add a test target to the Makefile of the port, the tests seem a bit outdated
  and buggy but it's enough to e.g. do a bit of speed comparison when building
  with different compilers.
- Minor changes and clean-up (sort pkg-plist, don't add /usr/local/lib to
  the library search path when compiling, etc.).

Revive some local modifications lost with the update to 3.1.0:
- Use login_cap(3)/login_class(3) facilities to set environment variables,
  prority and shell, get motd, copyright, hushlogin and nologin, respect
  ignorenologin and requirehome. This changes are roughly based on former
  patch-ah and patch-ai and patches of security/openssh.
- Don't print "No mail.", it's not FreeBSD login style.

Submitted by:	maintainer
@
text
@d2 1
@


1.34
log
@Update to 3.2.5:

        * Fixed a critical security bug with RSA signature
          verification. Mitigating factors: DSA is used by default (not
          vulnerable). Also, the attack requires that attacker has the
          public key and the attacker needs to precompute the signature
          data so, that it looks like a valid PKCS#1 signature. This is a
          non-trivial task to perform without the private
          key. Nonetheless, all users should update their servers and
          clients as soon as convenient. Workarounds are to not use RSA
          keys as host keys (though connecting to existing hosts with RSA
          hostkeys poses a serious risk with a vulnerable client), and
          disabling publickey authentication. Update your clients and
          servers.

 Update MASTER_SITES, remove sites that are down or no langer carry ssh2
  and add some new.
- Turn Kerberos and group writeability support into knobs so one hasn't to
  edit the Makefile.
- Remove dependency on security/tcp_wrapper for tcp-wrapper support on
  systems < FreeBSD 4.0, that port is no longer persistent.
- Fix pkg-plist for WITH_STATIC_SFTP case.
- Replace referneces to /etc/ssh2/* in man pages with references to
  PREFIX/etc/ssh2/* in order to better fit for FreeBSD.
- Replace "$(ETCDIR)" in ssh_dummy_shell.out with PREFIX/etc.
- Remove duplicated mechanism for generating the host key if an old one isn't
  found in the post-install target in the Makefile of the port, this is
  already done by the generate-host-key target in WRKSRC/apps/ssh/Makefile.
- Fix differences between the install action done when installing the
  package versus installing the port. I.e. make the package create the host
  key with what ever bits ssh-keygen2 defaults to (currently 2048) instead
  of 1024 bits, copy over the configuration files for ssh2 and sshd2 from
  the examples if not already existent and create the directories for the
  global host keys and known hosts files.
- Add some foo to pkg-plist to remove as much as possible from PREFIX/etc/ssh2,
  i.e. configuration files that don't differ from the corresponding examples
  and empty directories. Inform the user to remove what's left over if any.
- Use _PATH_STDPATH instead of _PATH_DEFPATH so that the default PATH gets
  set to "/usr/bin:/bin:/usr/sbin:/sbin:PREFIX/bin" instead of
  "/usr/bin:/bin:PREFIX/bin". Using _PATH_STDPATH is consistent with OpenSSH
  and seems more usefull. One might want to patch ssh2 to also use login_cap(3)
  so that e.g. PATH gets picked up from whatever is defined in /etc/login.conf.
- Change MAINTAINER.
- Replace "share/doc/ssh2" with %%DATADIR%% in pkg-plist.

Submitted by:	Marius Strobl <marius@@alchemy.franken.de>
Approved by:	maintainer
@
text
@d1 1
a1 1
MD5 (ssh-3.2.5.tar.gz) = 0d9da1d79e4ce9cff44daf93e5b66a11
@


1.33
log
@Update port: security/ssh2 3.2.2 -> 3.2.3

PR:		ports/48542
Submitted by:	Lars Eggert <larse@@isi.edu>
@
text
@d1 1
a1 1
MD5 (ssh-3.2.3.tar.gz) = d74afd27a5df00ae8fbbe066ec82c88a
@


1.32
log
@upgrade to 3.2.2

PR:		45876
Submitted by:	maintainer
@
text
@d1 1
a1 1
MD5 (ssh-3.2.2.tar.gz) = 5ba56fa6f0d533acf0a83f5d2f0fed43
@


1.31
log
@Update to 3.2.0

PR:		39491
Submitted by:	maintainer
@
text
@d1 1
a1 1
MD5 (ssh-3.2.0.tar.gz) = bbc63ab4a7f56cd63a7fb68d44ad739c
@


1.30
log
@Update to 3.1.2 which fixes a recent security problem described at:
http://www.ssh.com/products/ssh/advisories/authentication.cfm

PR:		38592
Submitted by:	maintainer
@
text
@d1 1
a1 1
MD5 (ssh-3.1.2.tar.gz) = 3da96ec4886063369eb29674b491b2c0
@


1.29
log
@- Update to 3.1.0.

  PR:		ports/34740
  Submitted by:	larse@@ISI.EDU

- Add %%PORTDOCS%% to pkg-plist.

- Assign MAINTAINER to the submitter.

  Requested by:	issei (previous MAINTAINER)
@
text
@d1 1
a1 1
MD5 (ssh-3.1.0.tar.gz) = 0a692bff9c0b2cdb1333c4b5bb8d4a1c
@


1.28
log
@Upgrade to ssh-2.3.0.

PR:	ports/20869
Submitted by:	Issei Suzuki <issei@@issei.org> (Maintainer)
@
text
@d1 1
a1 1
MD5 (ssh-2.3.0.tar.gz) = 2296fa2ad3474f117759f65678ce0e7a
@


1.27
log
@Update to version 2.1.0pl2.

PR:		18620
Submitted by:	maintainer
@
text
@d1 1
a1 2
MD5 (ssh-secure-shell-2.1.0-noncommercial.tar.gz) = adb4e460471a40cb3952a34864300ffc
MD5 (ssh-2.1.0-patch1) = 5173fde1245c6d1a02d2e63c2250d5e6
@


1.26
log
@Path for problem with tty ownership with chflags and chown in BSD 4.4
variants.  Fixes a security bug in tty allocation.

PR:		13515
PR:		13536
Submitted by: 	Issei Suzuki <issei@@jp.FreeBSD.org> (ssh2 maintainer)
@
text
@d1 2
a2 2
MD5 (ssh-2.0.13.tar.gz) = 1853aba4c7c9c501545c9e56a71fa9c3
MD5 (patch-ssh-2.0.13-bsd.tty.chown) = 544cff13eff9d3fc54a5c65754726ee9
@


1.25
log
@upgrade to 2.0.13
XXXtgetent from original PR fixed

PR: 12279
Submitted by: Issei Suzuki <issei@@issei.org>
@
text
@d2 1
@


1.24
log
@upgrade to 2.0.12
@
text
@d1 1
a1 1
MD5 (ssh-2.0.12.tar.gz) = 506632f8a9c2f5201587e2130a4d5408
@


1.23
log
@1. Update base ssh2 version from 2.0.9 to 2.0.11
   Ssh 2.0.9 has bugs abount updating utmp/wtmp file.

2. Now you can compile ssh2 to support TCP_Wrapper
   (security/tcp_wrapper) when you define USE_TCPWRAP=YES

3. Fix typo in MASTER_SITES
   (Thanks to Chris Piazza <norn@@home.net>)

4. Use /usr/lib/libz.so.* instead of libz in ssh2 source file.

5. Delete some obsolute pathes.

PR:		ports/8916
Submitted by:	issei@@jp.FreeBSD.ORG
@
text
@d1 1
a1 1
MD5 (ssh-2.0.11.tar.gz) = 2c93c5fa0cb530178bee8675e92be785
@


1.22
log
@Secure shell client and server (remote login program).

PR:		ports/8204
Submitted by:	Issei Suzuki <issei@@jp.FreeBSD.ORG>
@
text
@d1 1
a1 2
MD5 (ssh-2.0.9.tar.gz) = 745a65d3a7516979b003fe15d78d93d4
MD5 (ssh-2.0.9-configure-patch) = b8a422c201500ff816483825c1152788
@


1.21
log
@upgrade to 1.2.26 for security improvements
@
text
@d1 2
a2 3
MD5 (ssh-1.2.26.tar.gz) = 2ee46d454015dd01c5e8f074eabf0245
MD5 (rsaref2.tar.gz) = 0b474c97bf1f1c0d27e5a95f1239c08d
MD5 (ssh-1.2.22-patchkit) = 5228897d59be91ad3ae88e992d61cd50
@


1.20
log
@1.2.22 -> 1.2.25

Somebody needs to go through patch-af to check it, since I'm not sure
about some of the stuff.

This version fixes a security flaw in previous version.
@
text
@d1 1
a1 1
MD5 (ssh-1.2.25.tar.gz) = f16c579f8d60d2f0eaabd3c30e46ca2c
@


1.19
log
@Allow use of Phil Karn's patchkit that implements DES/DES3 in
fast assembly code.  Patchfile must be manually placed in DISTDIR,
as described in the Makefile.

PR:		6446
Submitted by:	Jonathan Hanna <pangolin@@rogers.wave.ca>
@
text
@d1 1
a1 1
MD5 (ssh-1.2.22.tar.gz) = 011f2b6d1935c59be0dae299db4ed7fa
@


1.18
log
@Upgrade to ssh 1.2.22.  Please send problems with the upgrade to me.
1.2.22 fixes a security hole with ssh-agent, so users are encouraged
to upgrade.

OK'd by: Torsten Blum (torstenb@@freebsd.org)
@
text
@d3 1
@


1.17
log
@Upgrade to 1.2.21
@
text
@d1 1
a1 1
MD5 (ssh-1.2.21.tar.gz) = 881f612cd3598b5370545ab2ad808795
@


1.16
log
@Update from ssh-1.2.19 to ssh-1.2.20.  All patches applied still, I just
regenerated them to fix the line numbers.  Also, I added two commented out
options in Makefile, one to tell sshd that a group writeable homedir
is OK because all users are in their own group, and the other is to allow
an unencrypted connection (which is dangerous since it can lead to
compromise of keys), but on a secure network it's damn useful for backups
etc.
@
text
@d1 1
a1 1
MD5 (ssh-1.2.20.tar.gz) = 11d88175e5d6d9d59bea0a70330bcab4
@


1.15
log
@Upgrade to 1.2.19
@
text
@d1 1
a1 1
MD5 (ssh-1.2.19.tar.gz) = a7a1b400788173b548f1c04642a52396
@


1.14
log
@Upgrade to 1.2.18
@
text
@d1 1
a1 1
MD5 (ssh-1.2.18.tar.gz) = 3ed9c159f1ab843966fb705168a69a8f
@


1.13
log
@1.2.16 --> 1.2.17
(new agent forwarding protocol that is said to work this time)
@
text
@d1 1
a1 1
MD5 (ssh-1.2.17.tar.gz) = f38c5bdce93e81c33176f95c6e635dc7
@


1.12
log
@Upgrade to official 1.2.16
Fix PLIST
@
text
@d1 1
a1 1
MD5 (ssh-1.2.16.tar.gz) = 4b36e9d1d651e5230c6717834d739ed4
@


1.11
log
@The checksum for the ssh tarball was out of date - fix it.
@
text
@d1 1
a1 1
MD5 (ssh-1.2.14.tar.gz) = c95349f27d32ad270dda4b87051f2a5f
@


1.10
log
@Back out andrews change - 1.2.14.1 is not an official ssh release.
@
text
@d1 1
a1 1
MD5 (ssh-1.2.14.tar.gz) = 4c23661228a7946f9fb7aa40d6c7dad4
@


1.9
log
@Upgrade to 1.2.14.1
Misc bugfixes
@
text
@d1 1
a1 1
MD5 (ssh-1.2.14.1.tar.gz) = 8f9576aecd09cc7448a3f87cdb5b54ad
@


1.8
log
@Add back checksum for rsaref2, used only while building in the US.

People, if you do a "make makesum" on a non-US machine, don't forget
to add this line back before commiting it:

MD5 (rsaref2.tar.gz) = 0b474c97bf1f1c0d27e5a95f1239c08d
@
text
@d1 1
a1 1
MD5 (ssh-1.2.14.tar.gz) = 4c23661228a7946f9fb7aa40d6c7dad4
@


1.7
log
@Update ssh-1.2.13 -> ssh-1.2.14
ssh-askpass no longer uses wish, so chop the make rules that attempt to
locate it.
Go further to try and protect the ssh_host_key, since it's critical to
the operation and security of the machine.
@
text
@d2 1
@


1.6
log
@Checksum for rsaref2.tar.gz.  Only used if you are compiling this in USA.
@
text
@d1 1
a1 2
MD5 (ssh-1.2.13.tar.gz) = 78d25c42ce4a6acd07b401c301f61697
MD5 (rsaref2.tar.gz) = 0b474c97bf1f1c0d27e5a95f1239c08d
@


1.5
log
@Upgrade to 1.2.13
@
text
@d2 1
@


1.4
log
@Upgrade to snapshot of ssh.  1.1.12a was recalled due to even worse
security problems.

Also re-do the method we use for disconnecting ourselves from the supplied
gmp and z libraries so that this can be maintained in the future (sigh!).
@
text
@d1 1
a1 1
MD5 (ssh-1.2.12.92.tar.gz) = 9643fd6bb4687553d514bb68fc88c48a
@


1.3
log
@Upgrade to 1.2.12a (security bugfix)
Fix installation bug too (scripts not installed)
Fix PLIST (missing files)
@
text
@d1 1
a1 1
MD5 (ssh-1.2.12a.tar.gz) = 51be51d40ad6abb08862520b9cf04cf3
@


1.2
log
@Update ssh from 1.2.10 to 1.2.12..  This is for two reasons:
1) It eliminated the need for my horrible kludge patch-ad
2) 1.2.12 has data stream compression (like gzip).
(I'm talking with the author about the remining three patches)
@
text
@d1 1
a1 2
MD5 (ssh-1.2.12.tar.gz) = ac017e627b0b6ee3f5de5b0a5a06720f
MD5 (rsaref2.tar.gz) = 0b474c97bf1f1c0d27e5a95f1239c08d
@


1.1
log
@Initial revision
@
text
@d1 1
a1 1
MD5 (ssh-1.2.10.tar.gz) = 85b1938f462d13ccebe9d341c63bddbe
@


1.1.1.1
log
@Ssh is a secure rlogin/rsh/rcp replacement with strong authentication
(.rhosts together with RSA based host authentication, and pure RSA
authentication) and improved privacy (all communications are automatically
and transparently encrypted).
@
text
@@
