- grammar improvement for BROKEN.
- make openvpn-admin search for its configuration files in
${PREFIX}/etc/openvpn, and pre-create that directory. It will contain user data
after use, so only @dirrmtry to remove it.
- install openvpn-admin into ${PREFIX}/sbin/, to stick to the original
installation logic, and in the same course also install openvpn-admin.pam
without extension.
PR: ports/95336
Submitted by: Andreas Kohn <andreas@syndrom23.de>
Approved by: maintainer (via private email)
It can be loaded using code, config file or command line and
will pass any function call by openssl to a PKCS#11 module.
Engine_pkcs11 is meant to be used with smart cards and software
for using smart cards in PKCS#11 format, such as OpenSC.
WWW: http://www.opensc-project.org/engine_pkcs11/
Note: the port requires the OpenSSL installed from ports,
since dynamic engine loading is disabled in base system.
See PR bin/79570 for details.
for using crpytographic tokens such as smart cards and
usb crypto tokens for authentication.
Pam_p11 uses libp11 to access any PKCS#11 module.
It should be compatible with any implementation, but it
is primarely developed using OpenSC.
Pam_p11 implements two authentication modules:
* pam_p11_openssh authenticates the user using his
openssh ~/.ssh/authorized_keys file.
* pam_p11_opensc authenticates the user using
certificates found in ~/.eid/authorized_certificates.
Pam_p11 is very simple, it has no config file, no options
other than the PKCS#11 module file, does not know about
certificate chains, certificate authorities, revocation
lists or OCSP. Perfect for the small installation with no
frills.
WWW: http://www.opensc-project.org/pam_p11/
and these ports build fine without it. My guess is that it was added
by someone as an opposite to USE_BZIP2 and other people copied it.
Remove it once and for all.
With hat: portmgr
not permitted to relay through this server. Perhaps you have not logged
into the pop/imap server in the last 30 minutes or do not have SMTP
Authentication turned on in your email client.
authentication algorithm used by Microsoft.
NTLM authentication scheme is used in DCOM and HTTP environment. It is
used to authenticate DCE RPC packets in DCOM. It is also used to
authenticate HTTP packets to MS Web Proxy or MS Web Server.
Currently, it is the authentication scheme Internet Explorer chooses to
authenticate itself to proxies/web servers that supports NTLM.
WWW: http://search.cpan.org/dist/Authen-NTLM/
PR: ports/98684
Submitted by: James Thomason <james@divide.org>