LEP is my attempt to provide a simple yet effective crypto
system that focuses largely on streamlining tasks and less on
elaborate inclusion of algorithms (MD5 and Blowfish are the
only official algorithms used, both of which are linked in from
-lcrypto), and also has some simple implementations of classic
cipher design (transposition, byte swapping, caesar, XOR, hex
encoding, etc) which can fit into the same operation chain,
relieving the need for OS overhead with process spawning and
piping.
PR: ports/66659
Submitted by: Dmitri Nikulin <setagllib@optusnet.com.au>
various attacks an IDS developer has to deal with. Unlike some of the other
port scan detection tools out there, scanlogd is designed to be totally safe
to use.
PR: ports/66449
Submitted by: Roman Bogorodskiy <bogorodskiy@inbox.ru>
Retire libgcrypt-devel
Switch back to security/libgcrypt and bump PORTREVISION for
- gnutls
- gnutls-devel
- gsasl
- opencdk
- vpnc
libggz:
- Remove dependency on libgcrypt, because the port does not yet
work with the new libgcrypt
libksba:
- Update to 0.9.5
- Pass maintainership to lofi, who already maintains the other
aegypten ports.
Approved by: lofi
wmbiff:
Switch to security/libgcrypt but no PORTREVISION bump, because the
dependency is optional and the port does not work with the new
libgcrypt and needs to be updated.
No action, because ports don't work with the new libgcrypt and need
to be updated, maintainers informed:
security/newpg
security/pinentry
security/dirmngr
emulators/fuse
emulators/libspectrum
Lockdown is a hardening system written in C++ for FreeBSD
and released under the BSD license.
Lockdown was designed to harden FreeBSD's base system. It does so
by editing the systems configuration files and set permissions,
flags and ownership on SUID, GID and information files.
Lockdown was meant to be run only once, so you can quickly
and without forgetting something, get a secure system running.
WWW: http://lockdown.TruNet.dk/
PR: 62714
Submitted by: Daniel Blankensteiner <db@TruNet.dk>
While I am here,
- make portlint happy,
- use WRKSRC instead hardcode path.
- use SAMBASRC instead wrong path if WRKDIRPREFIX env set.
- remove PORTREVISION on new ports.
PR: ports/63464
Submitted by: Jean Milanez Melo <jmelo@freebsdbrasil.com.br>
signature definitions). This allows the definitions to be updated
seperately as and when required.
PR: ports/62917, 62918
Submitted by: Tim Bishop <tim@bishnet.net> (maintainer)
These protocols are all used to run a remote session on a computer,
over a network. PuTTY implements the client end of that session:
the end at which the session is displayed, rather than the end
at which it runs.
WWW: http://www.chiark.greenend.org.uk/~sgtatham/putty/
Version 1.1.91 is incompatible with 1.1.12.
The -devel is required by the upcoming GnuTLS version and the new vpnc version.
The Stable version is still required by the Aegypten plugins.
Approved by: portmgr(marcus)
Repocopied by: joe
This is a package to test FreeBSD port auditing systems, e.g. portaudit
and the upcoming VuXML based system. Even though it installs no files,
it is listed in the portaudit database as vulnerable.
Kind of a EICAR-STANDARD-ANTIVIRUS-TEST-FILE
- The reference source for the CVM interface
- Diagnostic and benchmark CVM clients
- A checkpassword interface CVM client
- A UNIX/POSIX system module (uses getpwnam)
- A flat-file module
- A library for client writers
- A set of libraries for module writers
Author: Bruce Guenter <bruceg@em.ca>
WWW: http://untroubled.org/cvm/
This port in needed to unbreak build of mail/mailfront and ftp/twoftpd.
VPNC - Client for Cisco 3000 VPN Concentrator
A VPN client compatible with Cisco's EasyVPN equipment.
Supports IPSec (ESP) with Mode Configuration and Xauth.
Supports only shared-secret IPSec authentication, 3DES, MD5,
and IP tunneling. It runs entirely in userspace
PR: 60283
Submitted by: Christian Lackas
Graphical certification authority is an interface for managing
RSA keys and certificates, and the creation and signing of PKCS#10 requests.
It uses the OpenSSL library and a Berkeley DB for key and certificate storage.
It supports importing and exporting keys and PEM DER PKCS8 certificates,
signing and revoking of PEM DER PKCS12, and selection of x509v3 extensions.
A tree view of certificates is presented.
Author: Christian Hohnstaedt <christian@hohnstaedt.de>
WWW: http://www.hohnstaedt.de/xca.html
PR: 58378
Submitted by: Valentin Zahariev <curly@e-card.bg>
While pam(8) refers Linux-PAM Guides at ``SEE ALSO'' section,
it seems no documentation is in ports/ tree.
I think reading those docs takes good understanding of PAM
in RELENG_4, and also OpenPAM in HEAD.
PR: ports/53490
Submitted by: Hideyuki KURASHINA <rushani@FreeBSD.org>
A small SSH Askpass replacement written with GTK2. Features
fullscreen dialog and translucent background.
PR: ports/56537
Submitted by: Manuel Rabade <mig@mig-29.net>
security/opensc port that works with Estonian Electronic ID card
This is modified version of the OpenSC port that works with
Estonian Electronic ID card (EstEID).
WWW: http://marie.vtl.ee/esteid/
PR: ports/56612
Submitted by: Sven Petai <hadara@bsd.ee>
autossh is a program to start a copy of ssh and monitor it, restarting
it as necessary should it die or stop passing traffic.
The original idea and the mechanism were from rstunnel (Reliable SSH
Tunnel). With this version the method changes: autossh uses ssh to
construct a loop of ssh forwardings (one from local to remote, one
from remote to local), and then sends test data that it expects to
get back. (The idea is thanks to Terrence Martin.)
WWW: http://www.harding.motd.ca/autossh/
Destroy, A program that destroys files on the hard disk by
writing null and random bytes to the file, then unlinking
it.
PR: ports/50291
Submitted by: Shane Kinney <shane@freebsdhackers.net>
This is a commercial stand-alone solution written in C not a PERL script +
myriads of dependencies + some AV...
Licenses for private (individual, non-commercial) use, e.g. for protecting
your family's home network, can be applied for free of charge.
Submitted by: Marius Strobl <marius@alchemy.franken.de>
Dropbear is an SSH 2 server, designed to be usable in small
memory environments.
It supports:
* Main features of SSH 2 protocol
* Implements X11 forwarding, and authentication-agent forwarding
for OpenSSH clients
* Compatible with OpenSSH ~/.ssh/authorized_keys public key
authentication
WWW: http://matt.ucc.asn.au/dropbear/dropbear.html
PR: ports/55795
Submitted by: Clement Laforet <sheepkiller@cultdeadsheep.org>
One-file-port, from @stake. This dumps information from
remote RPC. Much like "rpcinfo -p host" on unix hosts.
Please check my patches: I removed an unused function so
this wouldn't be marked as a security sensitive port, and
I'm not sure my Makefile change respects CFLAGS.
PR: ports/46991
Submitted by: Yonatan@xpert.com <Yonatan@xpert.com>
Web server fingerprinting tool, used to identify web servers
that changed thier banners.
PR: ports/50754
Submitted by: Yonatan@xpert.com <Yonatan@xpert.com>
multiprecision integer arithmetic libraries. Presently,
many though not all of the arithmetic operations that
OpenSSL provides are exposed to perl. In addition,
this module can be used to provide access to bignum
values produced by other OpenSSL modules, such as key
parameters from Crypt::OpenSSL::RSA.
TinyCA is a simple graphical userinterface written in Perl/Tk
to manage a small CA (Certification Authority).
PR: 54571
Submitted by: Janos Mohacsi <janos.mohacsi@bsd.hu>
mail admins
Scan Apache log files for CodeRed, Nimda, FormMail, proxy
scanners and other malicious probes. For each one found,
track down the contact email from WHOIS data and send a
notice. Built-in rate controls prevent flooding an admin
even when his machines are scanning at high rates. Runs as
a non-privileged cron job to not interfere with the HTTP
daemon's operation.
Notes to committer:
1. This port installs a user and a group "hunch". It doesn't
meet the conditions listed in the handbook for a "reserved"
uid/gid.
2. portlint will complain about the port. A lot. To the
best of my judgment all of the warnings can be ignored
with the exception of the one about BATCH which I could
find no documentation for. Therefore it is setting
IS_INTERACTIVE.
PR: ports/44836
Submitted by: Dan Pelleg <daniel+hunch@pelleg.org>
Module::Signature adds cryptographic authentications to CPAN
distributions, via the special SIGNATURE file.
If you are a module user, all you have to do is to remember
running "cpansign -v" (or just "cpansign") before issuing
"perl Makefile.PL" or "perl Build.PL"; that will ensure the
distribution has not been tampered with.
For module authors, you'd want to add the SIGNATURE file to
your MANIFEST, then type "cpansign -s" before making a distribution.
Submitted by: autrijus@autrijus.org
ADM smb is a security scanner for Samba
/* based on the src of the smbclient from the samba team */
ADMsmb will perform a complete audit of samba for you on a host you
provide.
PR: ports/53696
Submitted by: Jacek Serwatynski <tutus@trynet.eu.org>
This module lets you generate secure random passwords
with a reasonable amount of pronounceability. It avoids
the problems associated with the FIPS-181 NIST standard
as used by Crypt::RandPasswd. See perldoc for more
details.
PR: 55575
Submitted by: andrew@scoop.co.nz
Approved by:
Obtained from:
MFC after:
Import hydra-2.2, base on PR/43942. This port is provided as a standalone
program to avoid installing a full Nessus scanner system.
Submitted by: Laurent LEVIER <llevier@argosnet.com>
Submitted by: Clement Laforet <sheepkiller@cultdeadsheep.org>
Add prelude-manager 0.8.7, System central logging point of prelude Network
Intrusion Detection.
prelude-manager : the manager is the central logging point. It receives
alerts from sensors and logs them using one or several plugins (the default
logging being to a text file, but logging to a database is also possible -
and recommended).
Submitted by: Clement Laforet <sheepkiller@cultdeadsheep.org>
Add prelude-nids 0.8.1,
Sensor program of prelude Network Intrusion Detection System
prelude-nids : the Prelude Network Intrusion Detection System is a sensor,
that may be installed on the same machine as the manager or not, which watches
network traffic and looks for familiar patterns. This is functionally
equivalent to Snort (http://www.snort.org).