information and simplifies the tasks of searching and entering password data.
KedPM is written as an extensible framework, which allows users to plug in
custom password database back-ends and custom user interface front-ends.
Currently, only the Figaro PM back-end supported. To control KedPM user can
choose between CLI and GTK2 based GUI front-ends.
WWW: http://kedpm.sourceforge.net
PR: ports/96321
Submitted by: Tim Welch <twelch@thepentagon.org>
fswatch is a utility to guard changes in a file system. fswatch is composed
of three simple programs: fswbuild, fswcmp, fswshow. fswbuild builds file
system information database. fswcmp compairs two database files and returns
what changes a in file system have been introduced. fswshow shows contents of
database file. a file information database is platform independend.
fswatch can collect the following information about files (and directories):
inode, links, uid, gid, mode, size, flags, ctime, checksum (sha1) ; and can
show which files were added, deleted or changed.
PR: ports/95973
Submitted by: dominik karczmarski <dominik@karczmarski.com> (maintainer)
Reworked by: jmelo
Approved by: mnag (mentor)
FreeBSD, it is now extremely obsolete. In any case it doesn't compile. Earlier
version of this port can still be used on older versions of FreeBSD of course.
prevent brute-force attacks on services like SSH or Telnet. It's highly
configurable and very fast.
WWW: http://mbsd.msk.ru/pam_af.html
PR: ports/94113
Submitted by: Stanislav Sedov <ssedov@mbsd.msk.ru>
It uses TCL/Tk and runs on most platforms supported by Tcl/Tk.
WWW: http://www.fpx.de/fp/Software/Gorilla
PR: ports/93179
Submitted by: Kay Lehmann <kay_lehmann@web.de>
SiLK, the System for Internet-Level Knowledge, is a collection of
netflow tools developed by the CERT/NetSA (Network Situational
Awareness) Team to facilitate security analysis in large networks.
SiLK consists of a suite of tools which collect and examine netflow
data, allowing analysts to rapidly query large sets of data.
WWW: http://silktools.sourceforge.net
PR: ports/94623
Submitted by: David Thiel <lx@redundancy.redundancy.org>
function from the popular TCP Wrappers security package. This
allows validation of network access from perl programs against
the system-wide hosts.allow file.
WWW: http://search.cpan.org/dist/Authen-Libwrap
PR: ports/92855
Submitted by: Zach Thompson <hideo@lastamericanempire.com>
offer really good functionality for doing this in a safe way.
The Input Filter extension is meant to address this issue by implementing
a set of filters and mechanisms that users can use to safely access their
input data.
WWW: http://pecl.php.net/package/filter
PR: ports/92198
Submitted by: Alexander Zhuravlev <zaa@zaa.pp.ru>
supports the following features:
- User authentication via explicit username/password, or using a
public-key/private-key pair.
- Port forwarding, both from the local host to a remote computer via
the remote host, and from the remote host to the local host.
- Execute processes on the remote machine, both interactively and
non-interactively ("batch").
PR: ports/91828
Submitted by: Roderick van Domburg <r.s.a.vandomburg@student.utwente.nl>
The ldap_integration Drupal module allows users to authenticate against
a LDAP directory. Additionally, users can read and modify their data in
the LDAP directory subject to administrative restrictions.
verification of BIR entries. It only implements a subset of the BioAPI
specification but should provide enough functionallity for basic account
management.
PR: ports/91749
Submitted by: Fredrik Lindberg <fli@shapeshifter.se>
Expiretable is a utility used to remove entries from the pf(4) table
based on their age.
The age in question being the amount of time that has passed since
the statistics for each entry in the target table was last cleared.
WWW: http://expiretable.fnord.se/
PR: ports/91481
Submitted by: cris <cris@gufi.org>
Updating the Samhain integrity checking system to 2.1.0, a
bugfix release.
It's been requested by several people to break Samhain out
into separate client and server ports. This PR does that,
with a samhain-client and samhain-server port, as slave
ports off of samhain. I'm not sure the best way to submit
a PR to do this kind of action, but here is a shar of all
three ports. If another format is desired, please let me
know. I'm also interested in feedback on the approach used
for splitting these out.
PR: ports/90305
Submitted by: David Thiel <lx@redundancy.redundancy.org>
Updating the Samhain integrity checking system to 2.1.0, a
bugfix release.
It's been requested by several people to break Samhain out
into separate client and server ports. This PR does that,
with a samhain-client and samhain-server port, as slave
ports off of samhain. I'm not sure the best way to submit
a PR to do this kind of action, but here is a shar of all
three ports. If another format is desired, please let me
know. I'm also interested in feedback on the approach used
for splitting these out.
PR: ports/90305
Submitted by: David Thiel <lx@redundancy.redundancy.org>
The attached shar is for security/cutlass - an encrypted
peer-to-peer voice, text, and file transmission protocol
entended to bring encrypted Internet use to the masses.
Also included is a sample application using the protocol.
Please note that the patch ommited from the PR will have to be added
when ports/91035 : [UPDATE]: security/botan is commited.
PR: ports/91072
Submitted by: Wesley Shields <wxs@csh.rit.edu>
implementation of MD4 (like `Digest::Perl::MD5'). Because of this, it is
slow but avoids platform specific complications. For efficiency you
should use `Digest::MD4' instead of this module if it is available.
WWW: http://search.cpan.org/dist/Digest-Perl-MD4
PR: ports/90771
Submitted by: Gabor Kovesdan
Secure Hash Standard. It gives Perl programmers a convenient way
to calculate SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512 message
digests. The module can handle all types of input, including
partial-byte data.
Digest::SHA::PurePerl is written entirely in Perl. If your platform
has a C compiler, you should install the functionally-equivalent
(but much faster) Digest::SHA module.
WWW: http://search.cpan.org/dist/Digest-SHA-PurePerl
PR: ports/90773
Submitted by: Gabor Kovesdan
of MD5. It is written in perl only and because of this it is slow but it
works without C-Code. You should use "Digest::MD5" instead of this
module if it is available. This module is only usefull for
computers where you cannot install "Digest::MD5" (e.g. lack of a
C-Compiler).
WWW: http://search.cpan.org/dist/Digest-Perl-MD5
PR: ports/90772
Submitted by: Gabor Kovesdan
algorithm presented in "Fast Hashing of Variable Length Text Strings"
- ACM 1990. This hashing technique yields good distribution of hashed results
for variable length input strings on the range 0-255, and thus, it is well
suited for data load balancing.
If you prefer a fast implementation, you might want to
consider Digest::Pearson instead.
WWW: http://search.cpan.org/dist/Digest-Pearson-PurePerl
PR: ports/90770
Submitted by: Gabor Kovesdan
certificate elements. It is based on the generic ASN.1 module by Graham Barr,
on the x509decode example by Norbert Klasen and contributions on the
perl-ldap-dev-Mailinglist by Chriss Ridd.
WWW: http://search.cpan.org/dist/Crypt-X509
PR: ports/90716
Submitted by: Gabor Kovesdan
salted (or seeded) hashes of clear text data. The original formalization of
this concept comes from RFC-3112 and is extended by the use of different
digital agorithms.
WWW: http://search.cpan.org/dist/Crypt-SaltedHash
PR: ports/90698
Submitted by: Gabor Kovesdan
designed by Vincent Rijmen, Joan Daemen, Bart Preneel, Antoon
Bosselaers, and Erik De Win.
WWW: http://search.cpan.org/dist/Crypt-Shark
PR: ports/90699
Submitted by: Gabor Kovesdan
1760) implemented in Perl. It exports the function `key' by default, and
may optionally export the function `compute'.
`compute_md4', `compute_md5', `key_md4', and `key_md5' are provided as
convenience functions for selecting either MD4 or MD5 hashes. The
default is MD4; this may be changed with with the `$Crypt::SKey::HASH'
variable, assigning it the value of `MD4' or `MD5'. You can access any
of these functions by exporting them in the same manner as `compute' in
the above example.
Most S/Key systems use MD4 hashing, but a few (notably OPIE) use MD5.
WWW: http://search.cpan.org/dist/Crypt-SKey
PR: ports/90695
Submitted by: Gabor Kovesdan
designed by Lawrie Brown, Josef Pieprzyk, and Jennifer Seberry. The default
key length in this implementation is 128 bits. Loki97 was one of the 15
candidates for the AES.
WWW: http://search.cpan.org/dist/Crypt-Loki97
PR: ports/90694
Submitted by: Gabor Kovesdan
looking for a hash pointer in the caller program called $ptr2_License. The
hash contains the path to the License file and an optional 'private' key list
of modules which will decrypt only with the 'private' key. OR, a hash key of
'next' with no particular value that indicates to look to the next caller on
the stack for the License pointer. If the pointer is not present or the
License file is not found successfully, then no further action is taken. If the
License file is successfully opened, and the contents validated then the
attached encrypted module is loaded and the seconds remaining until License
expiration are returned or now() in the case of no expiration. Undef is
returned for an expired license (module fails to load).
WWW: http://search.cpan.org/dist/Crypt-License
PR: ports/90693
Submitted by: Gabor Kovesdan
Paulo S. L. M. Barreto, Khazad is a NESSIE finalist for legacy-level block
ciphers. Khazad has many similarities with Rijndael, and has an extremely
high rate of diffusion.
WWW: http://search.cpan.org/dist/Crypt-Khazad
PR: ports/90692
Submitted by: Gabor Kovesdan
used during World War II. The cipher calculations are based on actual Enigma
values and the resulting ciphered values are as would be expected from an
Enigma Machine.
The implementation allows for all of the Rotors and Reflectors available to the
real world Enigma to be used. A Steckerboard has also been implemented,
allowing letter substitutions to be made.
WWW: http://search.cpan.org/dist/Crypt-Enigma
PR: ports/90683
Submitted by: Gabor Kovesdan
chroot_safe, a tool to chroot any application in a sane
manner without requring binaries, shared libraries etc
within the chroot or any support from the application. Works
with any dynamically linked application.
WWW: http://sourceforge.net/projects/chrootsafe
PR: ports/90341
Submitted by: Gabor Kovesdan <gabor.kovesdan@t-hosting.hu>
symmetrical block cipher with a 256-bit key from the former Soviet
Union. Please read the Pod documentation contained in the module
itself for additional information, including the rationale behind
the writing of this module.
WWW: http://search.cpan.org/dist/Crypt-GOST_PP
PR: ports/90685
Submitted by: Gabor Kovesdan
key developed in the former Soviet Union. Some information on it
is available at http://vipul.net/gost/ .
This module implements GOST encryption. It supports the Crypt::CBC
interface, with the functions described below. It also provides
an interface that is backwards- compatible with Crypt::GOST 0.41,
but its use in new code is discouraged.
WWW: http://search.cpan.org/dist/Crypt-GOST
PR: ports/90684
Submitted by: Gabor Kovesdan
Encryption Algorithm (DEA) is a semi-strong encryption and
decryption algorithm.
The module is 100 % compatible to Crypt::DES but is implemented
entirely in Perl. That means that you do not need a C compiler
to build and install this extension.
WWW: http://search.cpan.org/dist/Crypt-DES_PP
PR: ports/90682
Submitted by: Gabor Kovesdan
The protocol was shown to be INSECURE. This module is therefore released for
purely academic curiosity.
WWW: http://search.cpan.org/dist/Crypt-Chimera
PR: ports/90681
Submitted by: Gabor Kovesdan