[Bug 265926] net/scamper: update to 20211212b

From: <bugzilla-noreply_at_freebsd.org>
Date: Thu, 18 Aug 2022 10:04:14 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=265926

            Bug ID: 265926
           Summary: net/scamper: update to 20211212b
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: ports-bugs@FreeBSD.org
          Reporter: mjl@luckie.org.nz

Created attachment 235986
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=235986&action=edit
update scamper to 20211212b

Changes from 20211212:

scamper:
* in hostname code, handle nameserver lines with comments in them (20211212)
* add an option (-O cafile=/path/to/file) to load CA certificates
 from a specific file when starting scamper for validating a
 remote controller's certificate (this was released in 20211212a)
* add options
 -O client-certfile=/path/to/certfile and
 -O client-privfile=/path/to/privfile
 to have scamper present a client certificate during a TLS handshake
 with a remote controller
* fix bugs that prevent scamper from reconnecting to a remote
 controller
* fix -d debugfile when scamper is built with privilege separation
* fix bug when writing neighbordisc measurements to warts file that
 prevents a neighbordisc measurement from being read
* fix bug when reading some tracelb measurements with unresponsive hops
 from a warts file
* allow user to specify fractions of a second to ping timeout (-W)
* use a random source port / ICMP ID in ping if -F 0

sc_remoted:
* fix logic to handle TLSv1.3 handshakes (20211212)
* add -C option to specify a CA PEM file to verify client certificates
 presented by scamper instances.
* add -O skipnameverification option to tell sc_remoted to verify
 scamper presents a certificate signed by the CA, but do not do
 name verification

sc_hoiho:
* add the ability to learn regular expressions that extract
  network names from router hostnames, documented in the
  sc_hoiho man page

-- 
You are receiving this mail because:
You are the assignee for the bug.