arpCounterattack is a program for detecting and remedying "ARP attacks." It
monitors traffic on any number of Ethernet interfaces and examines ARP replies
and gratuitous ARP requests. If it notices an ARP reply or gratuitous ARP
request that is in conflict with its notion of "correct" Ethernet/IP address
pairs, it logs the attack if logging is enabled, and, if the Ethernet
interface that the attack was seen on is configured as being in aggressive
mode, it sends out a gratuitous ARP request and a gratuitous ARP reply with
the "correct" Ethernet/IP address pair in an attempt to reset the ARP tables
of hosts on the local network segment. The corrective gratuitous ARP request
and corrective gratuitous ARP reply can be sent from an Ethernet interface
other than the one that the attack was seen on.
autossh is a program to start a copy of ssh and monitor it, restarting
it as necessary should it die or stop passing traffic.
The original idea and the mechanism were from rstunnel (Reliable SSH
Tunnel). With this version the method changes: autossh uses ssh to
construct a loop of ssh forwardings (one from local to remote, one
from remote to local), and then sends test data that it expects to
get back. (The idea is thanks to Terrence Martin.)
The single exported subroutine in this module is for generating a salt
suitable for being fed to crypt() and other similar functions.
The Crypt::SaltedHash module provides an object oriented interface to create
salted (or seeded) hashes of clear text data. The original formalization of
this concept comes from RFC-3112 and is extended by the use of different
digital agorithms.
Shark is 64-bit block cipher that accepts a 128-bit key. It was
designed by Vincent Rijmen, Joan Daemen, Bart Preneel, Antoon
Bosselaers, and Erik De Win.
The current MD5 module is just a wrapper around the Digest::MD5
module. It is provided so that legacy code that rely on the old
interface still work and get the speed benefit of the new module.
Perl implementation of lanman and nt md4 hash functions.
Solitaire is a top-notch pencil-and-paper encryption system developed
by Bruce Schneier. Here is the description in Schneier's own words:
"Solitaire gets its security from the inherent randomness in a
shuffled deck of cards. By manipulating this deck, a communicant
can create a string of "random" letters that he then combines with
his message. Of course Solitaire can be simulated on a computer,
but it is designed to be implemented by hand.
"Solitaire may be low-tech, but its security is intended to be
high-tech. I designed Solitaire to be secure even against the most
well-funded military adversaries with the biggest computers and the
smartest cryptanalysts. Of course, there is no guarantee that someone
won't find a clever attack against Solitaire, but the algorithm is
certainly better than any other pencil-and-paper cipher I've ever
seen."
Simple system, easy to use, and relatively fast.
Seamus Venasse <svenasse@polaris.ca>
This module implements Twofish encryption. It supports the Crypt::CBC
interface. It also provides an interface that is call- compatible
with Crypt::Twofish 1.0, but its use in new code is strongly
discouraged.
Checkpassword provides a simple, uniform password-checking interface
to all root applications. It is suitable for use by applications such as
login, ftpd, and pop3d.