www/hs-http-client-restricted - The NetBSD Packages Collection

Restricting the servers that http-client will use

Addition to the http-client and http-client-tls libraries, that restricts
the HTTP servers that can be used.

This is useful when a security policy needs to eg, prevent connections to
HTTP servers on localhost or a local network, or only allow connections to
a specific HTTP server.

It handles restricting redirects as well as the initial HTTP connection,
and it also guards against DNS poisoning attacks.

Build dependencies

pkgtools/mktools pkgtools/cwrappers

Runtime dependencies

lang/ghc98 net/hs-crypton-connection devel/hs-data-default www/hs-http-client www/hs-http-client-tls net/hs-network net/hs-network-bsd devel/hs-utf8-string lang/ghc98 net/hs-crypton-connection devel/hs-data-default www/hs-http-client www/hs-http-client-tls net/hs-network net/hs-network-bsd devel/hs-utf8-string

Binary packages

OSArchitectureVersion
NetBSD 10.0aarch64hs-http-client-restricted-0.1.0nb2.tgz
NetBSD 10.0aarch64hs-http-client-restricted-0.1.0nb2.tgz
NetBSD 10.0x86_64hs-http-client-restricted-0.1.0nb2.tgz
NetBSD 10.0x86_64hs-http-client-restricted-0.1.0nb2.tgz
NetBSD 10.0x86_64hs-http-client-restricted-0.1.0nb2.tgz
NetBSD 9.0aarch64hs-http-client-restricted-0.1.0nb2.tgz
NetBSD 9.0aarch64hs-http-client-restricted-0.1.0nb2.tgz
NetBSD 9.0x86_64hs-http-client-restricted-0.1.0nb2.tgz
NetBSD 9.0x86_64hs-http-client-restricted-0.1.0nb2.tgz
NetBSD 9.0x86_64hs-http-client-restricted-0.1.0nb2.tgz
NetBSD 9.3x86_64hs-http-client-restricted-0.1.0nb2.tgz
NetBSD 9.3x86_64hs-http-client-restricted-0.1.0nb2.tgz

Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.

Available build options

(none)

Known vulnerabilities

The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.

Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.


Problem reports, updates or suggestions for this package should be reported with send-pr.