SoftHSM: base libtool problem

2013-06-06 Thread Patrik Lundin
=== Is there a proper way to fix this without resorting to GNU? Regards, Patrik Lundin

Re: SoftHSM: base libtool problem

2013-06-08 Thread Patrik Lundin
On Thu, Jun 06, 2013 at 10:07:56PM +0100, Stuart Henderson wrote: The attached port builds, but doesn't produce a shared library, which the produced binaries rely upon, so it doesn't actually work.. Ah, cool! It seems your configure patch fixes that specfic build problem I described. If

opendnssec and softhsm revisited

2014-05-07 Thread Patrik Lundin
LICENSE files can be summed up as BSD, an extra pair of eyes would be welcome though. I make sure they are installed under doc/name in both ports. Anyway, any feedback is much appreciated. Regards, Patrik Lundin opendnssec.tgz Description: application/tar-gz softhsm.tgz Description

Re: opendnssec and softhsm revisited

2014-05-08 Thread Patrik Lundin
? I have updated the PLISTs for now. Thanks a lot for taking a look! Regards, Patrik Lundin softhsm.tgz Description: application/tar-gz opendnssec.tgz Description: application/tar-gz

Re: opendnssec and softhsm revisited

2014-05-18 Thread Patrik Lundin
On Wed, May 07, 2014 at 10:57:50PM +0200, Patrik Lundin wrote: The opendnssec port is a work in progress. The most annoying thing while building currently is the warnings regarding comma at end of enumerator list which seems to be the result of inconsistent use of -std=c99 which i am

Re: opendnssec and softhsm revisited

2014-05-18 Thread Patrik Lundin
to look into how to disabled -pedantic in the build then. Regards, Patrik Lundin

Re: opendnssec and softhsm revisited

2014-05-18 Thread Patrik Lundin
On Sun, May 18, 2014 at 01:24:11PM +0200, Patrik Lundin wrote: I guess I will have to look into how to disabled -pedantic in the build then. Disabling -pedantic was easy to do at configure time, using --disable-pedantic. Now I have started looking at the remaining warnings. I am constantly

Re: opendnssec and softhsm revisited

2014-05-19 Thread Patrik Lundin
On Sun, May 18, 2014 at 07:24:00PM +0200, Patrik Lundin wrote: First up is this one: === pin.c: In function 'hsm_shm_open': pin.c:209: warning: comparison between signed and unsigned === Next we have this one: === hsmspeed.c:38:1: warning: PTHREAD_THREADS_MAX redefined In file

Re: opendnssec and softhsm revisited

2014-05-20 Thread Patrik Lundin
intend to ignore the strcat/strcpy stuff for now given the above status. The other stuff has been fixed. Thanks a lot for your input :). Regards, Patrik Lundin

Re: opendnssec and softhsm revisited

2014-05-27 Thread Patrik Lundin
upstream. The ports have recieved testing on amd64 and sparc64. If they are found to be good enough for import I want to make sure Stuart, Jérémie and Jerry Lundström jerry () opendnssec.org are credited for the help so far. Regards, Patrik Lundin opendnssec.tgz Description: application/tar-gz

Re: opendnssec and softhsm revisited

2014-06-02 Thread Patrik Lundin
On Tue, May 27, 2014 at 10:27:52PM +0200, Patrik Lundin wrote: The ports are now at a state where i feel they are suitable for import. Is no one interested in this? I think it is a nice complement to nsd in base for automated DNSSEC. Regards, Patrik Lundin

Re: opendnssec and softhsm revisited

2014-08-21 Thread Patrik Lundin
On Mon, Jun 02, 2014 at 09:48:41AM +0200, Patrik Lundin wrote: Is no one interested in this? I think it is a nice complement to nsd in base for automated DNSSEC. I have now been updating the ports for both opendnssec and softhsm to the latest versions (opendnssec 1.4.6 and softhsm 1.3.7

Re: rcctl ansible service support

2014-12-11 Thread Patrik Lundin
also be welcome of course ;). Regards, Patrik Lundin

Re: rcctl ansible service support

2014-12-11 Thread Patrik Lundin
On Thu, Dec 11, 2014 at 09:11:27PM +0100, Patrik Lundin wrote: To my knowledge the support should be pretty solid by now. Ugh, I spoke too soon. I found a bug in the handling of special services like pf just now. A PR against armanis fork is available here (this will of course be added

Re: rcctl ansible service support

2014-12-31 Thread Patrik Lundin
On Thu, Dec 11, 2014 at 11:55:59PM +, Stuart Henderson wrote: On Thu, Dec 11, 2014 at 09:11:27PM +0100, Patrik Lundin wrote: Ugh, I spoke too soon. I found a bug in the handling of special services like pf just now. A PR against armanis fork is available here (this will of course

Re: rcctl ansible service support

2015-01-17 Thread Patrik Lundin
On Wed, Dec 31, 2014 at 03:17:23PM +0100, Patrik Lundin wrote: Just a small update, the PR above has now been merged into armanis branch. If anyone was waiting for this to have a nice baseline for testing you are good to go. As mentioned earlier the upstream PR is here: https://github.com

Re: rcctl ansible service support

2015-01-31 Thread Patrik Lundin
On Sat, Jan 17, 2015 at 12:22:09PM +0100, Patrik Lundin wrote: Also, pending input from armani@ the code could change drastically. So I would not invest too much time until it is merged. Better late than never: The updated rcctl support has been merged upstream (https://github.com/ansible

logstash-forwarder: certificate handling

2015-05-03 Thread Patrik Lundin
the key and crt on the logstash host, and then use that same crt file as the ssl ca on the logstash-forwarder host. -- Patrik Lundin

Re: opendnssec and softhsm revisited

2015-05-16 Thread Patrik Lundin
. You will find the latest ports attached. Except for marking opendnssec broken on i386 I have also updated the version from 1.4.6 to 1.4.7, and I have converted databases/mysql dependencies to databases/mariadb. -- Patrik Lundin opendnssec.tgz Description: application/tar-gz softhsm.tgz

Re: opendnssec and softhsm revisited

2015-06-22 Thread Patrik Lundin
happens there. After that I am out of platforms :). softhsm is probably easier to test so let's look at that first. I'm fairly busy at the moment but I'll put it on my list to look at... Sounds good to me, thanks! -- Patrik Lundin

Re: opendnssec and softhsm revisited

2015-06-22 Thread Patrik Lundin
- no need for libsofthsm.{a,la}, ltdl is not used I think it's ready to import. Thanks for the feedback! -- Patrik Lundin

Re: opendnssec and softhsm revisited

2015-06-22 Thread Patrik Lundin
it seems to be quite a funky problem to debug. The last guy from NLnet labs that looked at it seemed to believe it had something to do with threading, but was not able to make more sense of it than that. -- Patrik Lundin

Re: opendnssec and softhsm revisited

2015-06-23 Thread Patrik Lundin
On Mon, Jun 22, 2015 at 05:25:52PM +0200, Patrik Lundin wrote: I did not see the problem on amd64 or sparc64 at least. I am currently building stuff on a fresh macppc snapshot to see what happens there. After that I am out of platforms :). So this is interesting. It turns out ods has

Re: opendnssec and softhsm revisited

2015-06-20 Thread Patrik Lundin
On Wed, Jun 17, 2015 at 08:57:35AM +0200, Patrik Lundin wrote: On Thu, May 21, 2015 at 08:23:49PM +0200, Patrik Lundin wrote: On Sat, May 16, 2015 at 06:24:11PM +0200, Patrik Lundin wrote: You will find the latest ports attached. Except for marking opendnssec broken on i386 I have

Re: opendnssec and softhsm revisited

2015-06-17 Thread Patrik Lundin
On Thu, May 21, 2015 at 08:23:49PM +0200, Patrik Lundin wrote: On Sat, May 16, 2015 at 06:24:11PM +0200, Patrik Lundin wrote: You will find the latest ports attached. Except for marking opendnssec broken on i386 I have also updated the version from 1.4.6 to 1.4.7, and I have converted

isc-dhcp-server: Make sure /var/db/dhcpd.leases exists

2015-05-28 Thread Patrik Lundin
thing in the port. Diff below. -- Patrik Lundin Index: isc_dhcpd.rc === RCS file: /cvs/ports/net/isc-dhcp/pkg/isc_dhcpd.rc,v retrieving revision 1.1 diff -u -p -u -r1.1 isc_dhcpd.rc --- isc_dhcpd.rc12 Oct 2014 20:10:16 -

Re: opendnssec and softhsm revisited

2015-05-21 Thread Patrik Lundin
On Sat, May 16, 2015 at 06:24:11PM +0200, Patrik Lundin wrote: You will find the latest ports attached. Except for marking opendnssec broken on i386 I have also updated the version from 1.4.6 to 1.4.7, and I have converted databases/mysql dependencies to databases/mariadb. Since

Re: opendnssec and softhsm revisited

2015-10-13 Thread Patrik Lundin
On Mon, Oct 12, 2015 at 11:34:46PM +0100, Stuart Henderson wrote: > On 2015/10/05 22:22, Patrik Lundin wrote: > > The 1.4.8.2 version of opendnssec was just released. This version > > incorporates the above mentioned fixes. You will find the port attached. > > Looks good to

Re: softhsm: add portroach limit

2015-08-27 Thread Patrik Lundin
On Thu, Aug 27, 2015 at 05:35:54PM +0100, Stuart Henderson wrote: On 2015/08/27 18:17, Antoine Jacoutot wrote: On Thu, Aug 27, 2015 at 06:06:44PM +0200, Patrik Lundin wrote: Hello, portroach currently thinks security/softhsm is outdated. The reason for this is that while

softhsm: add portroach limit

2015-08-27 Thread Patrik Lundin
Hello, portroach currently thinks security/softhsm is outdated. The reason for this is that while the version in ports is 1.3.7, there is a development release using a 2.0.0 version number. The diff below should limit the version check to the 1.x.x versions. -- Patrik Lundin Index: Makefile

Re: opendnssec and softhsm revisited

2015-08-30 Thread Patrik Lundin
On Wed, Jun 24, 2015 at 07:10:33AM +0200, Patrik Lundin wrote: The summary for now looks like this: Working: amd64, sparc64 Broken: i386, macppc Is there some relation between threading and 32/64 bit? It is the main thing that sticks out currently, since sparc64 rules out an endian issue

softhsm: Add PORTROACH_COMMENT

2015-10-04 Thread Patrik Lundin
Hello, After sitting in the audience at EuroBSDcon 2015 listening to the portroach talk by jasper@ I realized I had some homework to do :). A PORTROACH limit should be accompanied by a PORTROACH_COMMENT. Attached is a diff against my port. -- Patrik Lundin Index: Makefile

Re: opendnssec and softhsm revisited

2015-10-05 Thread Patrik Lundin
On Sat, Sep 19, 2015 at 11:24:12AM +0200, Patrik Lundin wrote: > > Just a quick update: both the segfault on i386 and the lockup on macppc > has been fixed on the development branch. > > I'll send an updated port as soon as the fixes are available in a > release which may be o

Re: softhsm: add portroach limit

2015-09-21 Thread Patrik Lundin
On Thu, Aug 27, 2015 at 06:06:44PM +0200, Patrik Lundin wrote: > Hello, > > portroach currently thinks security/softhsm is outdated. The reason for > this is that while the version in ports is 1.3.7, there is a development > release using a 2.0.0 version number. > > The di

softhsm: Apply SOFTHSM-101 security fixes

2015-09-21 Thread Patrik Lundin
e853dc5b34d00a09e3e114cb4914b06c01c72b1c.diff === I have verified that this makes the files created by softhsm --export as well has softhsm-keyconv have 0600 permissions. See below for diff against the port which also adds REVISION=0 to the Makefile. -- Patrik Lundin Index: Makefile

Re: softhsm: Apply SOFTHSM-101 security fixes

2015-09-21 Thread Patrik Lundin
On Mon, Sep 21, 2015 at 02:25:53PM +0100, Stuart Henderson wrote: > > Thanks, committed. I added comments to patches with the headers from > https://github.com/opendnssec/SoftHSMv1/commit/e853dc5b34d00a09e3e114cb4914b06c01c72b1c.patch > Looks good to me, thanks! -- Patrik Lundin

Re: opendnssec and softhsm revisited

2015-09-19 Thread Patrik Lundin
t; patch. > Just a quick update: both the segfault on i386 and the lockup on macppc has been fixed on the development branch. I'll send an updated port as soon as the fixes are available in a release which may be out in the upcoming week. -- Patrik Lundin

Re: softhsm: add portroach limit

2015-09-21 Thread Patrik Lundin
etBSD port: http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/security/softhsm/patches/patch-src_bin_softhsm-keyconv.cpp?annotate=1.1 I'll handle that in a separate thread once I have reproduced and fixed the problem. -- Patrik Lundin

Re: net/kea

2015-12-08 Thread Patrik Lundin
On Tue, Dec 08, 2015 at 07:39:24PM +0100, Patrik Lundin wrote: > > not a port problem, but "message" is a terrible name for sonething that > > upstream want to place in a system directory! > > I have mentioned this in my upstream kea-dev thread. > FYI: upstream

Re: net/kea

2015-12-08 Thread Patrik Lundin
quot; is a terrible name for sonething that > upstream want to place in a system directory! I have mentioned this in my upstream kea-dev thread. Attached is the updated port, which only uses LIBTOOL_FLAGS to disable the static libraries. Thanks a lot for your time! -- Patrik Lundin kea.tgz Description: application/tar-gz

net/kea

2015-12-06 Thread Patrik Lundin
December/000576.html -- Patrik Lundin kea.tgz Description: application/tar-gz

Re: net/kea

2015-12-08 Thread Patrik Lundin
-December/000588.html Let's see how that goes. -- Patrik Lundin

Re: net/kea

2015-12-08 Thread Patrik Lundin
On Tue, Dec 08, 2015 at 11:18:53PM +0100, Patrik Lundin wrote: > > What is picking up botan? I looked at every @bin and @lib with ldd and I > can't see anyone referring to that library. What am i missing? > >From http://kea.isc.org/docs/kea-guide.html#required-software: === K

Re: net/kea

2015-12-08 Thread Patrik Lundin
t every @bin and @lib with ldd and I can't see anyone referring to that library. What am i missing? -- Patrik Lundin

Re: net/kea

2015-12-09 Thread Patrik Lundin
On Tue, Dec 08, 2015 at 11:15:04PM +, Stuart Henderson wrote: > On 2015/12/08 23:59, Patrik Lundin wrote: > > I have posted a question to kea-dev regarding this: > > https://lists.isc.org/pipermail/kea-dev/2015-December/000588.html > > > > Let's see how that goes.

Re: net/kea

2015-12-09 Thread Patrik Lundin
On Wed, Dec 09, 2015 at 08:33:10PM +0100, Patrik Lundin wrote: > > Attached is a port with the explicit flag set and a shortened > LIB_DEPENDS/WANTLIB list. I have tested that it ignores the use of Botan > when it is installed. Let me know what you think. > Stuart: It would of

security/opendnssec: replace /etc with ${SYSCONFDIR}

2015-12-21 Thread Patrik Lundin
Hello, I noticed I was still using some '/etc' locations in PLIST and rc script, diff below. -- Patrik Lundin Index: pkg/PLIST === RCS file: /cvs/ports/security/opendnssec/pkg/PLIST,v retrieving revision 1.1.1.1 diff -u -p -u

Re: net/kea

2015-12-23 Thread Patrik Lundin
u notice it? > > I also added an XXX comment > to remind us to update the license marker for 1.0 because ISC are moving > to the Apache license :'( > I did have this upcoming change noted in the back of my head, but having an explicit note in the Makefile does makes sense. -- Patrik Lundin

Re: net/kea

2015-12-26 Thread Patrik Lundin
s-sec anyway, > and since I maintain the BIND port I track a few places where ISC are > likely to announce things. > > http://www.openwall.com/lists/oss-security/2015/12/22/11 > https://www.isc.org/?feed=security-feed > Thanks for the info, I guess it is time to spin up newsbeuter again :). -- Patrik Lundin

Re: security/opendnssec: replace /etc with ${SYSCONFDIR}

2015-12-22 Thread Patrik Lundin
gt; Thanks. > Great, thanks! -- Patrik Lundin

net/kea: 1.0.0

2015-12-29 Thread Patrik Lundin
nclude/kea/asio/" stuff. * Promotes the BUILD_DEPEND of devel/boost to a LIB_DEPEND (which i guess is good since it appears to clean up the include stuff above). * Adds an additional SHARED_LIB (kea-eval). The diff to CVS below, let me know what you th

Re: security/opendnssec: 1.4.10

2016-06-14 Thread Patrik Lundin
On Mon, May 16, 2016 at 06:09:54PM +0200, Patrik Lundin wrote: > Hello, > > Attached is a patch for OpenDNSSEC 1.4.10: > https://www.opendnssec.org/2016/05/opendnssec-1-4-10/ > Ping. -- Patrik Lundin

Re: net/kea: Helpfully failing test in ./configure

2016-06-27 Thread Patrik Lundin
On Mon, Jun 27, 2016 at 07:51:33PM +, Christian Weisgerber wrote: > On 2016-06-27, Patrik Lundin <pat...@sigterm.se> wrote: > > > CXX_DUMP_VERSION=`$CXX -dumpversion | cut -f1-2 -d.` > > if test "$CXX_DUMP_VERSION" \< "4.5"; then > >

Re: net/kea: Helpfully failing test in ./configure

2016-06-27 Thread Patrik Lundin
On Mon, Jun 27, 2016 at 07:44:07PM +0200, Jeremie Courreges-Anglas wrote: > Patrik Lundin <pat...@sigterm.se> writes: > > > > > This means that the failing "test" can actually be thought of as a > > feature. It is of course brittle, and will modify the

net/kea: Helpfully failing test in ./configure

2016-06-27 Thread Patrik Lundin
g for pointers from other porters, anyone have an idea how I should deal with this? Should I bother at all? -- Patrik Lundin

net/kea: Ensure base awk is used

2016-06-27 Thread Patrik Lundin
wrap my head around the autoconf magic involved. -- Patrik Lundin Index: Makefile === RCS file: /cvs/ports/net/kea/Makefile,v retrieving revision 1.5 diff -u -p -u -r1.5 Makefile --- Makefile14 Mar 2016 06:46:24 - 1.5

security/opendnssec: 1.4.9

2016-01-24 Thread Patrik Lundin
ombination. === Diff below. -- Patrik Lundin Index: Makefile === RCS file: /cvs/ports/security/opendnssec/Makefile,v retrieving revision 1.2 diff -u -p -u -r1.2 Makefile --- Makefile22 Dec 2015 07:02:24 - 1.2 +++ Makefile

Re: NO_SHARED cleanup status

2016-03-11 Thread Patrik Lundin
) > Thanks for the information, it seems jca@ has come to the rescue already :). -- Patrik Lundin

Re: NO_SHARED cleanup status

2016-03-11 Thread Patrik Lundin
On Fri, Mar 11, 2016 at 09:25:46PM +0100, Jeremie Courreges-Anglas wrote: > Patrik Lundin <pat...@sigterm.se> writes: > > If this is what you had in mind, I can commit it. No REVISION bump > needed. > > Index: net/kea/Makefile > [...] > > In

Re: NO_SHARED cleanup status

2016-03-11 Thread Patrik Lundin
ly a call for people with commit bits? -- Patrik Lundin

Re: NO_SHARED cleanup status

2016-03-14 Thread Patrik Lundin
On Mon, Mar 14, 2016 at 09:25:48AM +, Stuart Henderson wrote: > On 2016/03/14 07:49, Jeremie Courreges-Anglas wrote: > > Patrik Lundin <pat...@sigterm.se> writes: > > > > [...] > > > > > The only thing I felt a bit unsure about is net/kea which disab

security/opendnssec: 1.4.10

2016-05-16 Thread Patrik Lundin
Hello, Attached is a patch for OpenDNSSEC 1.4.10: https://www.opendnssec.org/2016/05/opendnssec-1-4-10/ The additional patch files were added to silence some minor build warnings that I noticed. They have been accepted upstream: https://github.com/opendnssec/opendnssec/pull/418 -- Patrik

Re: security/softhsm2

2016-07-18 Thread Patrik Lundin
https://pthree.org/2013/05/27/strengthen-your-private-encrypted-ssh-keys/ generated a private key file which i manged to import with softhsm. Does this fix your problem? -- Patrik Lundin

Re: security/opendnssec: 1.4.13

2017-02-07 Thread Patrik Lundin
On Sun, Jan 22, 2017 at 09:08:09PM +0100, Patrik Lundin wrote: > Hello, > > Here is an update to the newly released OpenDNSSEC 1.4.13. It removes a patch > that has been merged upstream. > Ping. -- Patrik Lundin

security/opendnssec: 1.4.13

2017-01-22 Thread Patrik Lundin
in state file. Wrong error was sometimes being print on failing TCP connect. Add support for OpenSSL 1.1.0. OPENDNSSEC-866: Script for migration between MySQL and SQLite was outdated. === -- Patrik Lundin Index: Makefile

Re: net/kea: 1.1.0

2016-11-09 Thread Patrik Lundin
On Mon, Oct 10, 2016 at 12:28:58AM +0200, Patrik Lundin wrote: > Hello, > > See below for an update to net/kea from 1.0.0 to 1.1.0. > Ping. -- Patrik Lundin

Re: ansible: openbsd_pkg fails to run when just specifying the package name

2016-10-18 Thread Patrik Lundin
ng file: 404 Not Found > $pkg_info -Iq ansible-2.1.1.0p2 > ansible-2.1.1.0p2 > > The only 'advantage' of -e here is that it finds it if you pass the full > version without the patchlevel. > Right, the reason for the switch was the requirement to find the real package on disk when a user supplies a name using the branch syntax. -- Patrik Lundin

Re: ansible: openbsd_pkg fails to run when just specifying the package name

2016-10-17 Thread Patrik Lundin
true for "-Iq inst:". This could mean that the module will always think that the package needs to be installed because it can't tell there is a package with the supplied name (plus patchlevel) already installed. === -- Patrik Lundin

security/opendnssec: 1.4.12

2016-11-19 Thread Patrik Lundin
. === It removes two already applied patches, and adds a new one which has also been accepted upstream: https://github.com/opendnssec/opendnssec/pull/603 Finally it updates LIB_DEPENDS so that databases/sqlite3 is only part of the sqlite3 flavor to make portcheck happy. -- Patrik Lundin Index: Makefile

security/softhsm: 1.3.8

2016-11-19 Thread Patrik Lundin
: Inconsistencies between v1 and v2. Issue #17: Use the MutexFactory wrapper functions correctly. === Note that SOFTHSM-101 was already backported to the version currently in ports. This update removes those local patches. It also regens the patch to the configure script. -- Patrik Lundin Index

Re: security/softhsm: 1.3.8

2016-11-19 Thread Patrik Lundin
On Sat, Nov 19, 2016 at 02:02:06PM +, Stuart Henderson wrote: > > It seems the first hunk of the configure script patch is unnecessary, > probably since changes to pthread so that pulled in as a normal dependency. > Can you confirm that please? > Good catch, new diff bel

net/kea: 1.1.0

2016-10-09 Thread Patrik Lundin
0.html Other then that the library versions of the port have been bumped based on shared_libs.log in WRKSRC. -- Patrik Lundin Index: Makefile === RCS file: /cvs/ports/net/kea/Makefile,v retrieving revision 1.5 diff -u -p -u -r1.5 Makefile

Re: ansible: openbsd_pkg fails to run when just specifying the package name

2016-10-17 Thread Patrik Lundin
h related changes from upstream. This particular problem is a result of adding the last iteration of branch-syntax fixes without the previous plumbing. Doing a diff -u between a "make extract" version of openbsd_pkg.py and an upstream version from git shows quite a bit of changes that are missing. -- Patrik Lundin

Re: security/opendnssec: 1.4.13

2017-03-14 Thread Patrik Lundin
On Tue, Feb 07, 2017 at 07:12:57PM +0100, Patrik Lundin wrote: > On Sun, Jan 22, 2017 at 09:08:09PM +0100, Patrik Lundin wrote: > > Hello, > > > > Here is an update to the newly released OpenDNSSEC 1.4.13. It removes a > > patch > > that has been merged u

net/kea: 1.2.0

2017-08-03 Thread Patrik Lundin
unsure what the correct solution is. Here is the output of the requested port-lib-depends-check: === # make port-lib-depends-check kea-1.2.0(net/kea): Extra: stdc++.57 === Any input on this? -- Patrik Lundin Index: Makefile === RCS f

Re: net/kea: 1.2.0

2017-08-03 Thread Patrik Lundin
kea/pull/53 I dont feel that warrants a port patch though as I don't think the outcome matters on OpenBSD. -- Patrik Lundin Index: Makefile === RCS file: /cvs/ports/net/kea/Makefile,v retrieving revision 1.9 diff -u -p -u -r

Re: net/kea: 1.2.0

2017-08-12 Thread Patrik Lundin
On Thu, Aug 03, 2017 at 10:24:00PM +0200, Patrik Lundin wrote: > > Thanks for spotting that. New diff against fresh ports tree below (and > now portcheck is happy as well). > Since there have been no further feedback, is there a chance the latest diff can get commited? -- Patrik Lundin

Re: security/opendnssec: 1.4.14

2017-07-10 Thread Patrik Lundin
On Sun, Jul 02, 2017 at 12:00:08PM +0200, Patrik Lundin wrote: > Hello, > > Below is an update of security/opendnssec to 1.4.14. > From https://www.opendnssec.org/: > === > Bugs Fixed > * OPENDNSSEC-888: Fix up MySQL<->SQLite3 database conversion script. >

security/opendnssec: 1.4.14

2017-07-02 Thread Patrik Lundin
the same parameters. This would prevent KSK rollovers. * OPENDNSSEC-890: Bogus signatures on mismatching TTLs within the same RRset. === -- Patrik Lundin Index: Makefile === RCS file: /cvs/ports/security/opendnssec/Makefile,v r

Re: net/kea: 1.2.0

2017-08-27 Thread Patrik Lundin
On Sat, Aug 12, 2017 at 11:39:14PM +0200, Patrik Lundin wrote: > > Since there have been no further feedback, is there a chance the latest > diff can get commited? > Ping. -- Patrik Lundin

Re: net/kea: 1.2.0

2017-08-27 Thread Patrik Lundin
On Sun, Aug 27, 2017 at 11:19:44AM +0100, Stuart Henderson wrote: > On 2017/08/27 12:07, Patrik Lundin wrote: > > On Sat, Aug 12, 2017 at 11:39:14PM +0200, Patrik Lundin wrote: > > > > > > Since there have been no further feedback, is there a chance the latest

Re: UPDATE: security/opendnssec

2019-01-12 Thread Patrik Lundin
org/pages/viewpage.action?pageId=10125376#HowdoI...?-UpgradeOpenDNSSEC1.4.9toOpenDNSSEC2.0 -- Patrik Lundin [1]: https://blog.sigterm.se/posts/to-the-cloud-dns-edition/

Re: UPDATE: security/opendnssec

2019-03-14 Thread Patrik Lundin
lt one. I did so here for the learning experience. The responses from that service are not signed at this point, so there is no correlation with OpenDNSSEC. -- Patrik Lundin