Re: Dehydrated

2016-09-25 Thread JosC
In een bericht van 19-9-2016 13:58: Btw, can someone tell me what the logic is between the new name dehydrated and its functionality (domain certification)? Don't see it yet :-) Thanks for explaining. ./Jos ___ freebsd-ports@freebsd.org mailing lis

Re: Dehydrated

2016-09-19 Thread JosC
In een bericht van 17-9-2016 1:38: After switching from letsencrypt to dehydrated, the upgrade to the latest port version keeps appearing when running Is solved - for some reason letsencrypts was still installed although it didn't show in my pkg list. After deinstalling it an re-installing d

Re: Perl upgrade - 5.20.x vulnerable

2016-08-16 Thread JosC
In een bericht van 16-8-2016 11:07: Try running pkg audit -F to force updating/refreshing the latest VuXML changes. In this case the lang/perl5.20 (port) version string that the fix was made in [1], was only added to an existing entry in security/vuxml as an 'update' yesterday [2] [1] http://s

Re: Perl upgrade - 5.20.x vulnerable

2016-08-16 Thread JosC
Still get this port upgrade error: --- cut text --- ===>>> All >> perl5-5.20.3_14 (1/1) ===> Cleaning for perl5-5.20.3_15 ===> perl5-5.20.3_15 has known vulnerabilities: perl5-5.20.3_15 is vulnerable: p5-XSLoader -- local arbitrary code execution CVE: CVE-2016-6185 WWW: https://vuxml.FreeBSD.

Re: Perl upgrade - 5.20.x vulnerable

2016-08-11 Thread JosC
In een bericht van 11-8-2016 20:51: The patch to update was committed only a few hours ago. The packages on the pkg reposities need a bit more time until they are available. Then perl (any version) will be secure. Thanks, will wait for that. Just a question: so there is a stable version (5.20

Perl upgrade - 5.20.x vulnerable

2016-08-11 Thread JosC
Can someone tell me how to best upgrade from Perl5.20.x to the latest stable version? Tried to upgrade to Perl5.22 but got (also) the same issue while doing so: ===> Cleaning for perl5-5.20.3_14 ===> perl5-5.20.3_14 has known vulnerabilities: perl5-5.20.3_14 is vulnerable: p5-XSLoader -- loc

! mDNSResponder Port update Error

2016-06-27 Thread JosC
[mDNSResponder-576.30.xx] Dear portmaintainer, Just got an error on installing latest version of DNSResponder: ../mDNSShared/dnsextd_lexer.l: In function 'yylex': ../mDNSShared/dnsextd_lexer.l:77: error: 'yylineno' undeclared (first use in this function) ../mDNSShared/dnsextd_lexer.l:77: error

Re: gnupg-1.4.20.tar.bz2.sig not available by FTP | SOLVED

2015-12-25 Thread JosC
Thanks guys, issue solved - port is now installable. Merry XMas, Jos Chrispijn In een bericht van 24-12-2015 0:00: Dear port maintainer, The port update of gnupg-1.4.20.tar.bz2.sig seems to bump. ___ freebsd-ports@freebsd.org mailing list https://l

Re: gnupg-1.4.20.tar.bz2.sig not available by FTP

2015-12-24 Thread JosC
On 24-12-2015 1:57, Dewayne Geraghty wrote: The distinfo needs to be SHA256 (gnupg-1.4.20.tar.bz2) = 04988b1030fa28ddf961ca8ff6f0f8984e0cddcb1eb02859d5d8fe0fe237edcc SIZE (gnupg-1.4.20.tar.bz2) = 3692881 SHA256 (gnupg-1.4.20.tar.bz2.sig) = 60699efc9c9546722c04aba69fff874aaf5dacd7d4637238cb8d66960

Re: gnupg-1.4.20.tar.bz2.sig not available by FTP

2015-12-23 Thread JosC
On 24-12-2015 0:00, JosC wrote: Dear port maintainer, The port update of gnupg-1.4.20.tar.bz2.sig seems to bump. => Attempting to fetch ftp://ftp.gnupg.org/gcrypt/gnupg/gnupg-1.4.20.tar.bz2.sig fetch: ftp://ftp.gnupg.org/gcrypt/gnupg/gnupg-1.4.20.tar.bz2.sig: size mismatch: expected

gnupg-1.4.20.tar.bz2.sig not available by FTP

2015-12-23 Thread JosC
Dear port maintainer, The port update of gnupg-1.4.20.tar.bz2.sig seems to bump. => Attempting to fetch ftp://ftp.gnupg.org/gcrypt/gnupg/gnupg-1.4.20.tar.bz2.sig fetch: ftp://ftp.gnupg.org/gcrypt/gnupg/gnupg-1.4.20.tar.bz2.sig: size mismatch: expected 287, actual 574 => Attempting to fetch

ClamAV | Port update 0.99

2015-12-10 Thread JosC
Dear port maintainer, Can you tell me when the ClamAV 0.99 version will be released? Recently got a message when updating, saying: Local version: 0.98.7 Recommended version: 0.99 thanks, Jos Chrispijn ___ freebsd-ports@freebsd.org mailing list https:

Port Vulnerabilities | php5-phar-5.4.45

2015-11-07 Thread JosC
Dear port maintainer, Can you check this port as it shows to have some vulnerabilities: Checking for packages with security vulnerabilities: Database fetched: Fri Nov 6 01:06:33 CET 2015 php5-phar-5.4.45 Thanks, Jos Chrispijn ___ freebsd-ports@freebs