Commit graph

705 commits

Author SHA1 Message Date
Erwin Lansing
656ce31219 Crypt::License decodes an encrypted file and attempts to decrypt it by first,
looking for a hash pointer in the caller program called $ptr2_License. The
hash contains the path to the License file and an optional 'private' key list
of modules which will decrypt only with the 'private' key. OR, a hash key of
'next' with no particular value that indicates to look to the next caller on
the stack for the License pointer. If the pointer is not present or the
License file is not found successfully, then no further action is taken. If the
License file is successfully opened, and the contents validated then the
attached encrypted module is loaded and the seconds remaining until License
expiration are returned or now() in the case of no expiration. Undef is
returned for an expired license (module fails to load).

WWW: http://search.cpan.org/dist/Crypt-License

PR:		ports/90693
Submitted by:	Gabor Kovesdan
2005-12-21 15:37:30 +00:00
Erwin Lansing
a814e62c20 Khazad is a 128-bit key, 64-bit block cipher. Designed by Vincent Rijmen and
Paulo S. L. M. Barreto, Khazad is a NESSIE finalist for legacy-level block
ciphers. Khazad has many similarities with Rijndael, and has an extremely
high rate of diffusion.

WWW: http://search.cpan.org/dist/Crypt-Khazad

PR:		ports/90692
Submitted by:	Gabor Kovesdan
2005-12-21 15:30:06 +00:00
Erwin Lansing
420de3189a This module is a complete working Perl implementation of the Enigma Machine
used during World War II. The cipher calculations are based on actual Enigma
values and the resulting ciphered values are as would be expected from an
Enigma Machine.
The implementation allows for all of the Rotors and Reflectors available to the
real world Enigma to be used. A Steckerboard has also been implemented,
allowing letter substitutions to be made.

WWW: http://search.cpan.org/dist/Crypt-Enigma

PR:		ports/90683
Submitted by:	Gabor Kovesdan
2005-12-21 08:35:13 +00:00
Edwin Groothuis
459b8d16e6 [new port] security/chroot_safe
chroot_safe, a tool to chroot any application in a sane
	manner without requring binaries, shared libraries etc
	within the chroot or any support from the application. Works
	with any dynamically linked application.

	WWW: http://sourceforge.net/projects/chrootsafe

PR:		ports/90341
Submitted by:	Gabor Kovesdan <gabor.kovesdan@t-hosting.hu>
2005-12-20 20:47:45 +00:00
Erwin Lansing
c458b72e33 This package is used to encrypt and decrypt passwords generated by IMail.
See: http://www.ipswitch.com/products/imail_server/

WWW: http://search.cpan.org/dist/Crypt-Imail

PR:		ports/90686
Submitted by:	Gabor Kovesdan
2005-12-20 15:51:51 +00:00
Erwin Lansing
6e9eb278e0 Crypt::GOST_PP is a pure perl implementation of GOST, a 64-bit
symmetrical block cipher with a 256-bit key from the former Soviet
Union. Please read the Pod documentation contained in the module
itself for additional information, including the rationale behind
the writing of this module.

WWW: http://search.cpan.org/dist/Crypt-GOST_PP

PR:		ports/90685
Submitted by:	Gabor Kovesdan
2005-12-20 15:51:00 +00:00
Erwin Lansing
7a9dfa805e GOST 28147-89 is a 64-bit symmetric block cipher with a 256-bit
key developed in the former Soviet Union. Some information on it
is available at http://vipul.net/gost/ .
This module implements GOST encryption. It supports the Crypt::CBC
interface, with the functions described below. It also provides
an interface that is backwards- compatible with Crypt::GOST 0.41,
but its use in new code is discouraged.

WWW: http://search.cpan.org/dist/Crypt-GOST

PR:		ports/90684
Submitted by:	Gabor Kovesdan
2005-12-20 15:50:08 +00:00
Erwin Lansing
90136fe774 The Data Encryption Standard (DES), also known as Data
Encryption Algorithm (DEA) is a semi-strong encryption and
decryption algorithm.
The module is 100 % compatible to Crypt::DES but is implemented
entirely in Perl. That means that you do not need a C compiler
to build and install this extension.

WWW: http://search.cpan.org/dist/Crypt-DES_PP

PR:		ports/90682
Submitted by:	Gabor Kovesdan
2005-12-20 14:49:19 +00:00
Erwin Lansing
f394b93f7b The Chimera key exchange protocol generates a shared key between two parties.
The protocol was shown to be INSECURE. This module is therefore released for
purely academic curiosity.

WWW: http://search.cpan.org/dist/Crypt-Chimera

PR:		ports/90681
Submitted by:	Gabor Kovesdan
2005-12-20 14:42:58 +00:00
Andrey Slusar
ffea7eb5e0 Added p5-Crypto-MySQL, perl extension to compare MySQL passwords without libmysqlclient.
PR:		ports/90590
Submitted by:	Gabor Kovesdan <gkovesdan@t-hosting.hu>
Approved by:	sem(mentor)
2005-12-19 09:51:04 +00:00
Andrey Slusar
49f1cb6139 Added p5-Crypt-HCE_MD5, perl extension implementing one way hash chaining encryption using MD5.
PR:             ports/90589
Submitted by:   Gabor Kovesdan <gkovesdan@t-hosting.hu>
Approved by:    sem(mentor)
2005-12-19 09:35:13 +00:00
Andrey Slusar
ecdd1f15e2 Added p5-Crypt-HCE_MD5, perl extension implementing one way hash chaining encryption using MD5.
PR:		ports/90589
Submitted by:	Gabor Kovesdan <gkovesdan@t-hosting.hu>
Approved by:	sem(mentor)
2005-12-19 09:16:46 +00:00
Erwin Lansing
f17e6a49e1 Rabbit is a new stream cipher based on the properties of counter assisted
stream ciphers, invented by Martin Boesgaard, Mette Vesterager,
Thomas Pedersen, Jesper Christiansen, and Ove Scavenius of Cryptico A/S.

WWW: http://search.cpan.org/dist/Crypt-Rabbit

PR:		ports/90615
Submitted by:	Gabor Kovesdan
2005-12-18 22:13:44 +00:00
Erwin Lansing
4d58b3abc6 Sometimes it's necessary to protect some certain data against plain reading
or you intend to send information through the Internet. Another reason might
be to assure users cannot modify their previously entered data in a follow-up
step of a long Web transaction where you don't want to deal with server-side
session data. The goal of Crypt::Lite was to have a pretty simple way to
encrypt and decrypt data without the need to install and compile huge
packages with lots of dependencies.
Crypt::Lite generates every time a different encrypted hash when you
re-encrypt the same data with the same secret string. Nevertheless you
are able to make double or tripple-encryption with any data to increase
the security. Decryption works also on hashes that have been encrypted
on a foreign host (try this with an unpatched IDEA installation ;-).

WWW: http://search.cpan.org/dist/Crypt-Lite

PR:		ports/90614
Submitted by:	Gabor Kovesdan
2005-12-18 22:06:01 +00:00
Erwin Lansing
429feed8fc Generic Counter Mode implementation in pure Perl. The Counter Mode module
constructs a stream cipher from a block cipher or cryptographic hash funtion
and returns it as an object. Any block cipher in the Crypt:: class can be
used, as long as it supports the blocksize and keysize methods. Any hash
function in the Digest:: class can be used, as long as it supports
the add method.

WWW: http://search.cpan.org/dist/Crypt-Ctr

PR:		ports/90613
Submitted by:	Gabor Kovesdan
2005-12-18 21:59:47 +00:00
Erwin Lansing
23be9d08e9 Crypt::Caesar - Decrypt rot-N strings
WWW: http://search.cpan.org/dist/Caesar

PR:		ports/90612
Submitted by:	Gabor Kovesdan
2005-12-18 21:56:07 +00:00
Erwin Lansing
3a682b1c6d Generic CFB implementation in pure Perl. The Cipher Feedback Mode module
constructs a stream cipher from a block cipher or cryptographic hash funtion
and returns it as an object. Any block cipher in the Crypt:: class can be
used, as long as it supports the blocksize and keysize methods. Any hash
function in the Digest:: class can be used, as long as it supports the
add method.

WWW: http://search.cpan.org/dist/Crypt-CFB

PR:		ports/90611
Submitted by:	Gabor Kovesdan
2005-12-18 21:55:15 +00:00
Erwin Lansing
9c4705836e This code appears to have only cursory resemblance to Bruce Schneier's
blowfish and twofish algorithms in that it too has a table-based decoder.
Derivation from FairKeys code by Jon Lech Johanson at nanocrew.net.
If you don't know what that is, don't bother looking here further. This is
a Pure Perl implementation. I doubt there is any need for xs coding for
what would mainly be processing 16 bytes at a time. This code is part of an
ongoing effort to clone portions of the Apple iTMS in Perl for portability.
See www.hymn-project.org for prior efforts by others.

WWW: http://search.cpan.org/dist/Crypt-AppleTwoFish

PR:		ports/90610
Submitted by:	Gabor Kovesdan
2005-12-18 21:53:18 +00:00
Vanilla I. Shu
0a3fde80af Add sshit 0.5, checks for SSH/FTP bruteforce and blocks given IPs.
PR:		ports/90603
Submitted by:	Jui-Nan Lin <jnlin@csie.nctu.edu.tw>
2005-12-18 16:03:28 +00:00
Erwin Lansing
ca806cdbd7 Digest::Pearson is an implementation of Peter K. Pearson's hash algorithm
presented in "Fast Hashing of Variable Length Text Strings" - ACM 1990. This
hashing technique yields good distribution of hashed results for variable
length input strings on the range 0-255, and thus, it is well suited for
data load balancing.
The implementation is in C, so it is fast. If you prefer a pure Perl version
and can tolerate slower speed, you might want to consider
Digest::Pearson::PurePerl instead.

WWW: http://search.cpan.org/dist/Digest-MD5-Pearson

PR:		ports/90578
Submitted by:	Gabor Kovesdan
2005-12-17 21:50:56 +00:00
Erwin Lansing
7851a6d375 Digest::ManberHash - a Perl package to calculate Manber Hashes
WWW: http://search.cpan.org/dist/Digest-ManberHash

PR:		ports/90577
Submitted by:	Gabor Kovesdan
2005-12-17 21:46:44 +00:00
Erwin Lansing
0e5ac9c4a8 MD5 sums (see RFC 1321 - The MD5 Message-Digest Algorithm) are used as a
one-way hash of data. Due to the nature of the formula used, it is impossible
to reverse it.
This module provides functions to search several online MD5 hashes database and
return the results (or return undefined if no match found).

WWW: http://search.cpan.org/dist/Digest-MD5-Reverse

PR:		ports/90576
Submitted by:	Gabor Kovesdan
2005-12-17 21:45:20 +00:00
Erwin Lansing
b54f7fcc07 Get MD5 sums for files of a given path or content of a given url.
WWW: http://search.cpan.org/dist/Digest-MD5-File

PR:		ports/90567
Submitted by:	Gabor Kovesdan
2005-12-17 16:22:16 +00:00
Erwin Lansing
f42c6cee20 The Digest::JHash module allows you to use the fast JHash hashing algorithm
developed by Bob Jenkins from within Perl programs. The algorithm takes as
input a message of arbitrary length and produces as output a 32-bit
"message digest" of the input in the form of an unsigned long integer.
See http://burtleburtle.net/bob/hash/doobs.html for more information.

WWW: http://search.cpan.org/dist/Digest-JHash

PR:		ports/90564
Submitted by:	Gabor Kovesdan
2005-12-17 16:16:24 +00:00
Erwin Lansing
1c85e87a77 Digest::FNV is an implementation for the 32-bit version of Fowler/Noll/Vo
hashing algorithm which allows variable length input strings to be quickly
hashed into unsigned integer values. For more information about this hash,
please visit http://www.isthe.com/chongo/tech/comp/fnv/.

WWW: http://search.cpan.org/dist/Digest-FNV

PR:		ports/90563
Submitted by:	Gabor Kovesdan
2005-12-17 16:15:29 +00:00
Erwin Lansing
a1b6ae659b Digest::Elf provides an XS based implementation of the ElfHash algorithm.
ElfHash generates resonably 32 bit integer value from a string in a
reasonably short period of time.

WWW: http://search.cpan.org/dist/Digest-Elf

PR:		ports/90561
Submitted by:	Gabor Kovesdan
2005-12-17 16:02:09 +00:00
Erwin Lansing
a9fd566668 This is Encrypted MAC (EMAC), formerly known as Double MAC (DMAC).
Unlike HMAC, which reuses an existing one-way hash function, such as
MD5, SHA-1 or RIPEMD-160, EMAC reuses an existing block cipher to
produce a secure message authentication code (MAC).

WWW: http://search.cpan.org/dist/Digest-EMAC

PR:		ports/90560
Submitted by:	Gabor Kovesdan
2005-12-17 16:00:52 +00:00
Erwin Lansing
a1072b7f96 This is Encrypted MAC (EMAC), formerly known as Double MAC (DMAC).
Unlike HMAC, which reuses an existing one-way hash function, such as
MD5, SHA-1 or RIPEMD-160, EMAC reuses an existing block cipher to
produce a secure message authentication code (MAC).

WWW: http://search.cpan.org/dist/Digest-DMAC

PR:		ports/90550
Submitted by:	Gabor Kovesdan
2005-12-17 15:22:03 +00:00
Erwin Lansing
8f158d4ab3 Digest::DJB is an implementation of D. J. Bernstein's hash which returns a
32-bit unsigned value for any variable-length input string. An equivalent pure
Perl version is also available: Digest::DJB::PurePerl.

WWW: http://search.cpan.org/dist/Digest-DJB

PR:		ports/90549
Submitted by:	Gabor Kovesdan
2005-12-17 14:50:31 +00:00
Erwin Lansing
949a62cf04 This module implements the hashcash hash (or digest, although it's not
clearly a digest). For all your information needs please
visit http://www.hashcash.org.

WWW: http://search.cpan.org/dist/Digest-Hashcash

PR:		ports/90548
Submitted by:	Gabor Kovesdan
2005-12-17 14:44:25 +00:00
Erwin Lansing
6900e1d6f7 This module provides a perl implementation to generate 32 bits CRC digests for
buffers and files.

WWW: http://search.cpan.org/dist/Digest-Crc32

PR:		ports/90547
Submitted by:	Gabor Kovesdan
2005-12-17 14:16:08 +00:00
Erwin Lansing
3790a4a1ac The Digest::CRC module calculates CRC sums of all sorts. It contains wrapper
functions with the correct parameters for CRC-CCITT, CRC-16 and CRC-32.

WWW: http://search.cpan.org/dist/Digest-CRC

PR:		ports/90546
Submitted by:	Gabor Kovesdan
2005-12-17 14:06:58 +00:00
Erwin Lansing
d58838243c The Digest::Adler32 module implements the Adler-32 checksum as specified
in RFC 1950. The interface provided by this module is specified in Digest,
but no functional interface is provided.

WWW: http://search.cpan.org/dist/Digest-Adler32

PR:		ports/90545
Submitted by:	Gabor Kovesdan
2005-12-17 13:53:18 +00:00
Erwin Lansing
918a2b3ca2 Digest::SV1 - Cryptosleazically strong message digest format
WWW: http://search.cpan.org/dist/Digest-SV1

PR:		ports/90539
Submitted by:	Gabor Kovesdan
2005-12-17 12:09:13 +00:00
Erwin Lansing
94f64aa37c A perl module that implements the tiger hash, which is believed to be secure
and runs quickly on 64-bit processors.

WWW: http://search.cpan.org/dist/Digest-Tiger

PR:		ports/90537
Submitted by:	Gabor Kovesdan
2005-12-17 11:54:10 +00:00
Erwin Lansing
bf5342d0cb Digest::Whirlpool - A 512-bit, collision-resistant, one-way hash function
developed by Paulo S. L. M. Barreto and Vincent Rijmen.

WWW: http://search.cpan.org/dist/Digest-Whirlpool

PR:		ports/90536
Submitted by:	Gabor Kovesdan
2005-12-17 11:21:52 +00:00
Erwin Lansing
532ec61cb2 Haval is a variable-length, variable-round one-way hash function designed by
Yuliang Zheng, Josef Pieprzyk, and Jennifer Seberry. The number of rounds can
be 3, 4, or 5, while the hash length can be 128, 160, 192, 224, or 256 bits.
Thus, there are a total of 15 different outputs. For better security, however,
this module implements the 5-round, 256-bit output.

WWW: http://search.cpan.org/dist/Digest-Haval256

PR:		ports/90534
Submitted by:	Gabor Kovesdan
2005-12-17 10:30:12 +00:00
Emanuel Haupt
62ebcfd1d4 Add, security/fiked, a fake IKE PSK+XAUTH daemon based on VPNC.
This is a fake IKE daemon supporting just enough of the standards and Cisco
extensions to attack commonly found insecure Cisco PSK+XAUTH VPN setups.

If you know the pre-shared key, also known as shared secret or group password,
you can impersonate the VPN gateway in IKE phase 1, and learn XAUTH user
credentials in phase 2.

PR:		90372
Submitted by:	Daniel Roethlisberger <daniel@roe.ch>
2005-12-16 20:15:06 +00:00
Simon Barner
fd7e0f8f8e Add symbion-sslproxy 1.0.5, an SSL proxy for securing unsecure
connections.

PR:		ports/90216
Submitted by:	Gabor Kovesdan
2005-12-12 09:50:37 +00:00
Roman Bogorodskiy
4de7513dc0 Add gnutls-devel - development version of gnutls. 2005-11-28 10:07:51 +00:00
Edwin Groothuis
2d638f24b1 Add security/tor-devel 2005-11-26 01:04:38 +00:00
Edwin Groothuis
172444444e [NEW PORT] security/jailaudit: Generate portaudit reports for jails from the hostsystem
This port contains a script for generating portaudit reports
	for jails running on a FreeBSD system.

	Jailaudit runs in the Host-system and uses portaudit to
	create reports for every jail currently running.

	It can also be used to send specific report-mails to the
	owner of a jail by running it as a cronjob.

	/etc/crontab example:
	0   4   *   *   *   *   root   /usr/local/bin/jailaudit mail admin@foo.bar "foo.example.com bar.example.com"

	Sends reports-mails of the jails with the hostnames
	foo.example.com and bar.example.com to the mailaddr.
	admin@example.com.

	WWW: http://outpost.h3q.org/software/jailaudit/

PR:		ports/87581
Submitted by:	Philipp Wuensche <cryx-ports@h3q.com>
2005-11-25 02:31:06 +00:00
Edwin Groothuis
b164841180 New port: security/klamav
KlamAV - Clam Anti-Virus on the KDE Desktop

	KlamAV is a KDE 3 front-end to Clam Anti-Virus.  It includes
	the following features:

	- 'On Access' Scanning
	- Manual Scanning
	- Quarantine Management
	- Downloading Updates
	- Mail Scanning (KMail/Evolution)

PR:		ports/84342
Submitted by:	Anderson S. Ferreira <anderson@cnpm.embrapa.br>
2005-11-24 21:03:40 +00:00
Mario Sergio Fujikawa Ferreira
fe645fdf8c New port md4coll version 0.1: Fast MD4 collision generator 2005-11-23 05:16:42 +00:00
Mario Sergio Fujikawa Ferreira
e80ae8339a New port md5coll version 0.1: Fast MD5 collision generator 2005-11-23 05:15:03 +00:00
Sergei Kolobov
b612847503 - Disconnect security/prelude-nids from the parent Makefile
prior to deletion
2005-11-21 13:25:22 +00:00
Munechika SUMIKAWA
eca4a66c78 Racoon is now maintained in security/ipsec-tools. 2005-11-18 14:22:26 +00:00
Andrej Zverev
104ed9ad1c - Move securiy/hping -> net/hping 2005-11-15 08:35:35 +00:00
Sam Lawrance
c22dc04501 Add amavisd-milter 1.0.2, milter for amavisd-new.
PR:		ports/82427
Submitted by:	Petr Rehor <prehor@gmail.com>
2005-11-13 16:28:47 +00:00
Pav Lucistnik
433ac546cb Sud is a daemon to execute interactive and non-interactive processes with
special (and customizable) privileges in a nosuid environment. It is based on a
client/server model and on the ability to pass file descriptors between
processes.

PR:		ports/88354
Submitted by:	Vaida Bogdan <vaidab@phenix.rootshell.be>
2005-11-12 11:50:40 +00:00