2008-01-14 x11-themes/gtk-smooth-engine: Redundant port (now included in gtk-engines), no release since 2005
2007-09-21 security/amavis-perl: depends on misc/compat3x, which has security problems
2007-12-31 sysutils/cdbakeoven: Abandonware
2008-01-04 net/gnu-finger: no active development and known security vulnerabilities.
2007-11-16 misc/seizedesktop: development stalled for years, outdated, unmaintained
parts: EasyPG Assistant and EasyPG Library.
EasyPG Assistant is a set of convenient tools to use GnuPG from
Emacs. EasyPG Library is a sort of an elisp port of GPGME, a wrapper
library which provides API to access some of the GnuPG functions.
WWW: http://sourceforge.jp/projects/epg/
PR: ports/119008
Submitted by: Shota Iwazaki <iwazaki8 at yahoo.co.jp>
also referred to as type 7 passwords. Further you can
encrypt any given string into a encrypted hash that will
be accepted by any Cisco device as an encrypted type 7 password.
WWW: http://search.cpan.org/dist/Cisco-Hash/
PR: ports/120498
Submitted by: Tsung-Han Yeh <snowfly at yuntech.edu.tw>
in PHP5. Enables two parties without any prior knowledge of each other
establish a secure shared secret key across an insecure channel
of communication.
WWW: http://pear.php.net/package/Crypt_DiffieHellman/
PR: ports/120010
Submitted by: Ditesh Shashikant Gathani <ditesh at gathani.org>
enforcement of Windows 95/98/NT/3.x and Unix server administration through the
use of comparative system snapshots. FCheck can provide notification of any
differences found through use of your event management system, printer, and/or
email when any monitored files or directories are altered, including any
additions and/or deletions.
WWW: http://www.geocities.com/fcheck2000/
a web application that uses Microsoft SQL Server as its back-end.
Its main goal is to provide a remote shell on the vulnerable DB server,
even in a very hostile environment. It should be used by penetration
testers to help and automate the process of taking over a DB Server when
a SQL Injection vulnerability has been discovered.
WWW: http://sqlninja.sourceforge.net/
PR: ports/117276
Submitted by: Valerio Daelli <valerio.daelli at gmail.com>
A module that facilitates the dynamic creation of rules for snort.
PR: ports/120193
Submitted by: Paul Schmehl <pauls@utdallas.edu>
Approved by: garga (mentor)
- Maia Mailguard is a web-based interface and management system based on
the popular amavisd-new e-mail scanner and SpamAssassin. Written in Perl
and PHP, Maia Mailguard gives end-users control over how their mail is
processed by virus scanners and spam filters, while giving mail administrators
the power to configure site-wide defaults and limits.
WWW: http://www.maiamailguard.com/
PR: ports/119325
Submitted by: Janky Jay <ek@purplehat.org> (maintainer)
Approved by: linimon (mentor)
Guard (GPG). It requires the GPG executable to be on the system.
Though GPG can support symmetric-key cryptography, this package is intended
only to facilitate public-key cryptography.
WWW: http://pear.php.net/package/Crypt_GPG/
XORSearch is a program to search for a given string in an XOR or
ROL encoded binary file. An XOR encoded binary file is a file where
some (or all) bytes have been XORed with a constant value (the key).
A ROL (or ROR) encoded file has it bytes rotated by a certain number
of bits (the key). XOR and ROL/ROR encoding is used by malware
programmers to obfuscate strings like URLs.
XORSearch will try all XOR keys (0 to 255) and ROL keys (1 to 7)
when searching. I programmed XORSearch to include key 0, because
this allows to search in an unencoded binary file (X XOR 0 equals
X).
If the search string is found, XORSearch will print it until the 0
(byte zero) is encountered or until 50 characters have been printed,
which ever comes first. 50 is the default value, it can be changed
with option -l. Unprintable characters are replaced by a dot.
WWW: http://blog.didierstevens.com/programs/xorsearch/
Author: Didier Stevens
compressed file's password. If you forget your encrypted file password,
this program is the solution. This program can crack zip,7z and rar file
passwords.
WWW: http://sourceforge.net/projects/rarcrack
PR: ports/117630
Submitted by: Philippe Audeoud <jadawin at tuxaco.net>
software supports ike v1 communications between two gateways or a
a client and a gateway.
For more information please visit ...
WWW: http://www.shrew.net/
PR: ports/116684
Submitted by: mgrooms at shrew.net
of TIS fwtk and maintains API backwards compatibility. The design goal
is to make it simple yet powerful; no performance hacks allowed in the
code and library dependencies are reduced to minimum.
WWW: http://sourceforge.net/projects/openfwtk
PR: ports/117194
Submitted by: Anton Karpov <toxa at toxahost.ru>
It performs "black-box" scans, i.e. it does not study the source code of
the application but will scans the webpages of the deployed webapp,
looking for scripts and forms where it can inject data.
Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to
see if a script is vulnerable.
WWW: http://wapiti.sourceforge.net/
PR: ports/116873
Submitted by: Philippe Audeoud <jadawin at tuxaco.net>
AfterGlow is a collection of scripts which facilitate the
process of generating event graphs and treemaps. AfterGlow
1.x is written in Perl and generates output that can be
read by GraphViz or LGL. All the scripts and other files
for afterglow are installed in ${DATADIR}
WWW: http://sourceforge.net/projects/afterglow
PR: ports/115186
Submitted by: Paul Schmehl <pauls@utdallas.edu>
ssss is an implementation of Shamir's secret sharing scheme
for UNIX/linux machines. It is free software, the code is
licensed under the GNU GPL. ssss does both: the generation
of shares for a known secret and the reconstruction of a
secret using user provided shares. The software was written
in 2006 by B. Poettering, it links against the GNU libgmp
multiprecision library (version 4.1.4 works well) and
requires the /dev/random entropy source.
PR: ports/115949
Submitted by: Lukasz Komsta <luke@novum.am.lublin.pl>
The seccure toolset implements a selection of asymmetric
algorithms based on elliptic curve cryptography (ECC). In
particular it offers public key encryption / decryption,
signature generation / verification and key establishment.
ECC schemes offer a much better key size to security ratio
than classical systems (RSA, DSA). Keys are short enough
to make direct specification of keys on the command line
possible (sometimes this is more convenient than the
management of PGP-like key rings). seccure builds on this
feature and therefore is the tool of choice whenever
lightweight asymmetric cryptography -- independent of key
servers, revocation certificates, the Web of Trust or even
configuration files -- is required.
PR: ports/115943
Submitted by: Lukasz Komsta <luke@novum.am.lublin.pl>
New port of Hamachi VPN, using Linux official binary and a
patch on tuncfg.c based on the official OSX release.
Hamachi is a software that eases the creation of secure
VPNs even between nodes that would not be able to connect
to each other (server-assisted connection can be established
from two NATted client, if at least one of the two NAT
associates the port to the client not checking remote host).
UPX port is required in order to decompress the linux binary
and avoid run-time dependency on /proc.
PR: ports/112982
Submitted by: Lapo Luchini <lapo@lapo.it>
The OpenVPN Auth-LDAP Plugin implements username/password
authentication via LDAP for OpenVPN 2.x. It also includes
some integration with the OpenBSD packet filter, supporting
adding and removing VPN clients from PF tables.
WWW: http://dpw.threerings.net/projects/openvpn-auth-ldap/
PR: ports/113925
Submitted by: Nick Barkas <snb@threerings.net>
This is a Python based package of tools that can be used to assess
the security of a web server (including automated advanced tests,
e.g. for XSS or SQL injection vulnerabilities).
I did not get this port to work with the py-google port, there for
a local copy of pygoogle is included and packaged with this port.
and extracts sessions for a number of different appplications:
ssh, telnet, smtp, irc, ftp, etc. The data are formatted into
an html file and can be used to replay some sessions.
Sshkeydata is a perl script that attempts to recreate ssh
sessions extracted by chaosreader by estimating what commands
may have been typed.
Both scripts are installed in ${PREFIX}/bin
WWW: http://sourceforge.net/projects/chaosreader
PR: ports/115125
Submitted by: pauls
Net::Server::Mail::ESMTP::AUTH is an extension to provide
support for SMTP authentication with Net::Server::Mail::ESMTP
module.
Currently only LOGIN and PLAIN methods are supported.
WWW: http://search.cpan.org/dist/Net-Server-Mail-ESMTP-AUTH/
Author: Sylvain Cresto <scresto [_at_] gmail.com>
PR: ports/114785 (with corrections)
Submitted by: Zane C. Bowers <vvelox@vvelox.net>
ClamTk is a GUI front-end for ClamAV using gtk2-perl. It is designed to
be an easy-to-use frontend for Unix systems.
WWW: http://clamtk.sourceforge.net/
Author: Dave M <dave.nerd@gmail.com>
provides Web Single SignOn (SSO) across or within organizational
boundaries. It allows sites to make informed authorization decisions
for individual access of protected online resources in a
privacy-preserving manner.
This software is a C++ implementation of the Service Provider
component of the Shibboleth can be used in Apache Web servers. The
service provider manages secured resources. User access to resources
is based on assertions received by the service provider (SP) from
an identity provider.
WWW: http://shibboleth.internet2.edu/
PR: ports/114663
Submitted by: Janos Mohacsi <janos.mohacsi@bsd.hu>
Alliance standards; it defines processes for federated identities,
single sign-on and related protocols. Lasso is built on top of
libxml2, XMLSec and OpenSSL and is licensed under the GNU General
Public License (with an OpenSSL exception).
WWW: http://lasso.entrouvert.org/
PR: ports/114639
Submitted by: Gea-Suan Lin <gslin at gslin.org>
management and identity web services protocols. Initial goal is
supporting SP role, followed by ID-WSF WSC and IdP roles.
ZXID is light weight, has a small foot print, and is implemented in C.
It is suitable for both high performance and embedded applications.
Scripting languages are supported using SWIG, including Perl, PHP and
Java. The "full stack" nature of ZXID means it's self contained and
has minimal external library dependencies (see downloads).
WWW: http://zxid.org/
PR: ports/114346
Submitted by: Gea-Suan Lin <gslin at gslin.org>
This package provides parallel versions of the openssh tools. Included
in the distribution:
- Parallel ssh (pssh)
- Parallel scp (pscp)
- Parallel rsync (prsync)
- Parallel nuke (pnuke)
- Parallel slurp (pslurp)
What are these tools good for? Mainly for controlling large collections
of nodes in the wide-area.
WWW: http://www.theether.org/pssh/
intercept Instant Text Messaging. Optionally, intercepted text messages can be
stored onto an RDMBS (Only mySQL is supported for now). Given that mySQL is
used, stored instant messages can be read through a browser interface that is
written in PHP language. Please see the INSTALL.txt file for instructions on
how to install, configure and run EnderUNIX scanhill.
WWW: http://www.enderunix.org/scanhill/
ExecWrap is a super-user exec wrapper for the lighttpd web-server, but
it can be used in any environment as long as arguments can be passed
from the server to its children via the environment.
WWW: http://cyanite.org/execwrap/
Author: Sune Foldager <cryo@cyanite.org>