This port provides a minimal client implementation for the TAXII 2.0 server.
It supports the following TAXII 2.0 API services:
- Server Discovery
- Get API Root Information
- Get Status
- Get Collections
- Get a Collection
- Get Objects
- Add Objects
- Get an Object
- Get Object Manifests
WWW: https://github.com/oasis-open/cti-taxii-client
2019-02-15 dns/p5-pgeodns: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 ftp/proftpd-mod_geoip: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 net/go-geoip: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 net/py-GeoIP: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 net/pecl-geoip: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 net/pen: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 net/subnetcalc: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 net/p5-Geo-IP: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 net/rubygem-geoip: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 security/sguil: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 devel/go-sql-driver: Go source should not be packaged
2019-02-15 devel/geoip-java: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 dns/go-geodns: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
Simply add kdc_enable="YES" and kdc_program="/usr/local/sbin/kdc"
to /etc/rc.d. The script removes the Heimdal kdc --detach argument
prior to invoking krb5kdc.
The other approach that was considered was to replace getopt() in
kdc/main.c with getopt_long() however this approach was considered too
intrusive.
(security/barnyard and security/bro) have been undeprecated.
PR: 235725
Reviewed by: matthew (mentor)
Approved by: Zane C. Bowers-Hadley (maintainer), matthew (mentor)
Differential Revision: https://reviews.freebsd.org/D19198
* gpg: Implement key lookup via keygrip (using the & prefix).
* gpg: Allow generating Ed25519 key from existing key.
* gpg: Emit an ERROR status line if no key was found with -k.
* gpg: Stop early when trying to create a primary Elgamal key. [#4329]
* gpgsm: Print the card's key algorithms along with their keygrips
in interactive key generation.
* agent: Clear bogus pinentry cache in the error case. [#4348]
* scd: Support "acknowledge button" feature.
* scd: Fix for USB INTERRUPT transfer. [#4308]
* wks: Do no use compression for the the encrypted challenge and
response.
Release-info: https://dev.gnupg.org/T4290
- Update patterns to make them match with log messages from recent
version of OpenSSH
- Remove LICENSE=NONE
PR: 234137
Submitted by: Yasuhiro KIMURA <yasu@utahime.org>
Approved by: danger (maintainer timeout)
Adding extra PORTREVISION=0 is useful to keep slave ports from unintended or
unnecessary PORTREVISION bump when the master port is changed. But it is not for
this case.
PR: 235637
Submitted by: Yasuhiro KIMURA <yasu@utahime.org>
There were 5 vulnerabilities in openjpeg and 4 of them are fixed.
The current status is described in [1] as follows:
- CVE-2017-17479 and CVE-2017-17480 were fixed in r477112.
- CVE-2018-5785 was fixed in r480624.
- CVE-2018-6616 was fixed in r489415.
- CVE-2018-5727 is not fixed yet.
Though I keep committing fixes and updating the status, it does not show in the
"pkg audit" result. Users have to follow the link but apparently few people
would do that. Therefore, I got mails asking if the CVEs are fixed, etc.
I don't know if there's a better way to handle this condition (partly fixed over
several months). Instead of removing fixed CVEs from vuln.xml, I decided to add
a new entry (5efd7a93-2dfb-11e9-9549-e980e869c2e9) which is split from the old
entry (11dc3890-0e64-11e8-99b0-d017c2987f9a). It should be clearer for users if
they only read the "pkg audit" result.
[1] https://www.vuxml.org/freebsd/11dc3890-0e64-11e8-99b0-d017c2987f9a.html