Prevention Engine developed by the Open Information Security Foundation (OISF).
This engine is not intended to just replace or emulate the existing tools in
the industry, but will bring new ideas and technologies to the field.
OISF is part of and funded by the Department of Homeland Security's Directorate
for Science and Technology HOST program (Homeland Open Security Technology),
by the the Navy's Space and Naval Warfare Systems Command (SPAWAR), as well as
through the very generous support of the members of the OISF Consortium.
More information about the Consortium is available, as well as a list of our
current Consortium Members.
The Suricata Engine and the HTP Library are available to use under the GPLv2.
The HTP Library is an HTTP normalizer and parser written by Ivan Ristic of
Mod Security fame for the OISF. This integrates and provides very advanced
processing of HTTP streams for Suricata. The HTP library is required by the
engine but may also be used independently in a range of applications and tools.
WWW: http://openinfosecfoundation.org
PR: ports/150191
Submitted by: Patrick Tracanelli <eksffa@freebsdbrasil.com.br>
The hardware can be found at
http://www.yubico.com/home/index/
The decryption module does only one thing - decrypt the AES encrypted
OTP from the Yubikey. To this, it requires the OTP, and the AES
key.
Please note - this module does not perform authentication - it is
a required component to decrypt the token first before authentication
can be performed.
WWW: http://search.cpan.org/~massyn/Auth-Yubikey_Decrypter-0.07/
PR: ports/149802
Submitted by: Kurt Jaeger <fbsd-ports@opsec.eu>
to discover the version of a (known) web application by comparing
static files at known locations against precomputed hashes for
versions of those files in all available releases. The technique
is fast, low-bandwidth, non-invasive, generic, and highly automatable.
WWW: http://blindelephant.sourceforge.net/
Approved by: itetcu (mentor)
Submitted by: Dax Labrador <semprix _at_ bsdmail.org>
Approved by: glarkin (mentor)
dradis is an open source framework to enable effective information sharing.
dradis is a self-contained web application that provides a centralised
repository of information to keep track of what has been done so far,
and what is still ahead.
Features include:
* Easy report generation.
* Support for attachments.
* Integration with existing systems and
tools through server plugins.
* Platform independent.
WWW: http://dradisframework.org/
Unfortunately version 2.0.0 is largely incompatible with version 1.x, so it
is necessary to have a stopgap measure while ports that depend on libassuan
can be updated. In conversation with the maintainers of the dependent ports
it was originally considered ideal to prepare updates for the ports first,
then upgrade everything to libassuan 2.x en masse. Since no action has
arisen on that front, go with plan B:
Copy security/libassuan to security/libassuan-1, and update the dependent
ports accordingly. Because this is (intended to be) a _temporary_ measure,
and because no updates for libassuan 1.x are anticipated, and because the
hope is that it can be removed sooner rather than later, it's a copy instead
of a repocopy.
"key strengthening" to make the complexity of a brute-force attack arbitrarily
high. PBKDF2 uses any other cryptographic hash or cipher (by convention,
usually HMAC-SHA1, but Crypt::PBKDF2 is fully pluggable), and allows for an
arbitrary number of iterations of the hashing function, and a nearly unlimited
output hash size (up to 2**32 - 1 times the size of the output of the backend
hash). The hash is salted, as any password hash should be, and the salt may
also be of arbitrary size.
See also: RFC2898, PKCS#5 version 2.0: http://tools.ietf.org/html/rfc2898
WWW: http://search.cpan.org/dist/Crypt-PBKDF2/
PR: ports/146847
Submitted by: Victor Popov <v.a.popov at gmail.com>
of the Kaspersky Lab's applications into a separate folder.
With the help of the utility you can download updates for selected
Kaspersky Lab's applications installed either in your network or at
a home PC. The utility has a function for saving downloaded updates
and autopatches in a local folder, a network folder connected as a
disc to the computer file system, or onto a flash-carrier.
WWW: http://support.kaspersky.com/updater?level=2
PR: ports/147116
Submitted by: Gvozdikov Veniamin <g.veniamin at googlemail.com>
an elementary quantum optics process.
This port contains the user library and a CLI/GUI application
to access such devices.
WWW: http://www.idquantique.com/
release can be found at http://library.gnome.org/misc/release-notes/2.30/ .
This release brings initial PackageKit support, Upower (replaces power
management part of hal), cuse4bsd integration with HAL and cheese, and a
faster Evolution.
Sadly GNOME 2.30.x will be the last release with FreeBSD 6.X support. This
will also be the last of the 2.x releases. The next release will be the
highly-anticipated GNOME 3.0 which will bring with it a new UI experience.
Currently, there are a few bugs with GNOME 2.30 that may be of note for our
users. Be sure to consult the UPGRADING note or the 2.30 upgrade FAQ at
http://www.freebsd.org/gnome/docs/faq230.html for specific upgrading
instructions, and the up-to-date list of known issues.
This release features commits by avl, ahze, bland, marcus, mezz, and myself.
The FreeBSD GNOME Team would like to thank Anders F Bjorklund for doing the
initual packagekit porting.
And the following contributors & testers for there help with this release:
Eric L. Chen
Vladimir Grebenschikov
Sergio de Almeida Lenzi
DomiX
walder
crsd
Kevin Oberman
Michal Varga
Pavel Plesov
Bapt
kevin
and ITetcu for two exp-run
PR: ports/143852
ports/145347
ports/144980
ports/145830
ports/145511
The sample config file comes predefined with the new settings for
snort.org downloads, which will change in June 2010.
BE SURE to read through the master pulledpork.conf file thoroughly,
as there are many changes as of snort 2.8.6.0 that WILL affect you,
even if you are NOT yet running 2.8.6.0!
Features:
* Flowbit tracking!
* capability to specify base ruleset (see README.RULESETS) in master
pulledpork.conf file.
* Handle preprocessor and sensitive-information rulesets
* Ability to define sid ranges in any of the sid modification .conf files
* Ability to specify references in any of the sid modification .conf files
* Ability to ignore entire rule categories (i.e. not include them)
* Specify locally stored rules files that need their meta data included
in sid-msg.map
* Ability to specify your arch for so_rules
* Rules are written to only two distinct files
* Support metadata based VRT recommended rulesets
* Maintain an optional rule changelog
* Support for setting rules to Drop
* Support for multi-line rules
* Rule modification, i.e. disabling of specific rules within rule sets
* Outputs changes in rules files if any rules have been added / modified
* Compares new rules files with current rule sets
* Automated retrieval of certain variables (Distro, Snort Version.. etc)
* Downloads latest rules file
* Verifies MD5 of local rules file
* If MD5 has not changed from snort.org.. doesn't fetch files again
* handle both rules and so_rules
* Capability to generate stub files
WWW: http://code.google.com/p/pulledpork/
PR: ports/146239
Submitted by: Olli Hauer
2010-02-20 databases/mysql-connector-java50: Old version: please use databases/mysql-connector-java instead
2010-04-15 databases/p5-DBIx-Class-HTML-FormFu: This module is obsoleted by www/p5-HTML-FormFu-Model-DBIC
2010-04-29 devel/py-rbtree: "does not build with new pyrex and it's not active maintained"
2010-04-08 devel/tavrasm: No longer maintained, use devel/avra instead
2010-04-27 mail/postfix23: it's no longer maintened by upstream developer
2010-04-30 math/libgmp4: Use math/gmp instead.
2010-04-04 misc/ezload: does not build with new USB stack in 8-STABLE
2010-01-31 misc/gkrellmbgchg: use misc/gkrellmbgchg2
2010-03-04 multimedia/kbtv: no longer under development by author
2010-02-16 net/plb: broken; abandoned by author; use net/relayd or www/nginx instead
2010-04-30 security/vpnd: This software is no longer developed
2010-03-15 textproc/isearch: abandoned upstream, uses an obsolete version of GCC, not used by any other port
2010-04-02 www/caudium12: No longer maintained upstream, please switch to www/caudium14
2010-03-08 www/p5-Catalyst-Plugin-Cache-FileCache: Deprecated by module author in favor of www/p5-Catalyst-Plugin-Cache
are used for a website. It can detect content management systems
(CMS), blogging platforms, stats/analytics packages, javascript
libraries, servers, etc..
WWW: http://www.morningstarsecurity.com/research/whatweb
Approved by: itetcu (mentor)
developers the flexibility to implement OTR encryption for
their python-based Instant Messaging clients.
WWW: http://python-otr.pentabarf.de/
Submitted by: Frank Steinborn <steinex at nognu.de>
security testing tool. It features a single-threaded multiplexing
HTTP stack, heuristic detection of obscure Web frameworks, and
advanced, differential security checks capable of detecting blind
injection vulnerabilities, stored XSS, and so forth.
PR: ports/144942
Submitted by: Ryan Steinmetz <rpsfa@rit.edu>
Approved by: itetcu (mentor)
WWW: http://code.google.com/p/skipfish/
and update the third-party ClamAV signature databases provided by
Sanesecurity, SecuriteInfo, MalwarePatrol, OITC, INetMsg and ScamNailer.
PR: ports/144509
Submitted by: Marko Njezic <sf at maxempire.com>
NOTE that the port is more of a development snapshot than it used to be,
so it should be used SOLELY for testing and development, NOT IN PRODUCTION.
PR: ports/144115
Approved by: mandree@ (previous maintainer)
Approved by: garga@ (mentor)
Feature safe: yes
nmap interface for Users, in order to management all options of this powerful
security net scanner!
WWW: http://www.nmapsi4.org
PR: ports/142118
Submitted by: Gvozdikov Veniamin <g.veniamin at googlemail.com>
2010-01-08 x11-fm/velocity: has been broken for 7 months
2010-01-08 x11-drivers/xf86-video-nsc: has been broken for 5 months
2010-01-08 www/rubygem-merb: has been broken for 5 months
2010-01-08 security/shibboleth-sp: has been broken for 3 months
limits, as a random UID, and with limited access to the X server
WWW: http://code.google.com/p/isolate/
PR: ports/142350
Submitted by: Steve Wills <steve@mouf.net>
file. This is a simple automation of the things normally done by
the user when having an "offending key" in his/her known_hosts file
caused by a changing host key of the destination.
WWW: http://unssh.sourceforge.net/
PR: ports/137254
Submitted by: Dax Labrador <semprix at bsdmail.org>