Ports Search

Results 14,30114,310 of 17,660 for descr%3A%22spam filter%22.(0.014 seconds)
security/lsh-2.1 (Score: 9.841064E-5)
Secure (encrypted) remote shell compatible with ssh 2
lsh is a client that can connect to the corresponding lshd server. It uses the SECSH protocol, which means that it is compatible with SSH 2.0, except for file transfer, which is not part of SECSH. SECSH uses compression and encryption algorithms that are unencumbered, and lsh itself is GPL. lsh is not as feature-rich as OpenSSH, as it doesn't currently support password-protected keyrings, the SSH 1.X protocols, TCP wrappers, etc. On the other hand, it doesn't require OpenSSL, and doesn't take a lot of work to avoid patented algorithms. Port author's notes on usage and common problems can be found at
security/libgringotts-1.2.1 (Score: 9.841064E-5)
Library for encapsulating/safekeeping data in encrypted/compressed form
libGringotts is a small, easy-to-use, thread-safe C library originally developed for Gringotts; its purpose is to encapsulate data (generic: ASCII, but also binary data) in an encrypted and compressed structure, to be written in a file or used elseway. It makes use of strong encryption algorithms, to ensure the data are as safe as possible, and allow the user to have the complete control over all the algorithms used in the process. For encryptions, libGringotts makes use of the MCrypt and MHash libs by Nikos Mavroyanopoulos.
security/libsparkcrypto-0.1.1 (Score: 9.841064E-5)
Cryptographic library implemented in SPARK
libsparkcrypto is a formally verified implementation of several widely used symmetric cryptographic algorithms using the SPARK programming language and toolset. For the complete library proofs of the absence of run-time errors like type range violations, division by zero and numerical overflows are available. Some of its subprograms include proofs of partial correctness. The distribution contains test cases for all implemented algorithms and a benchmark to compare its performance with the OpenSSL library. The achieved speed has been found to be very close to the optimized C and Assembler implementations of OpenSSL.
security/oidentd-2.0.8 (Score: 9.841064E-5)
Ident server that supports user-defined ident strings
From the README: "oidentd is an ident (rfc1413 compliant) daemon that runs on Linux, FreeBSD, OpenBSD and Solaris. oidentd can handle IP masqueraded/NAT connections on Linux, FreeBSD (ipf only) and OpenBSD. oidentd has a flexible mechanism for specifying ident responses. Users can be granted permission to specify their own ident responses. Responses can be specified according to host and port pairs." FreeBSD's inetd has a built-in ident service which can also generate bogus responses. Please see the TODO file for more information on why only ipf is supported under FreeBSD. Mark Laws mdl@60hz.org
security/shibboleth-sp-2.6.0 (Score: 9.841064E-5)
C++ Shibboleth Service Provider (Internet2) for Apache
Shibboleth is standards-based, open source middleware software which provides Web Single SignOn (SSO) across or within organizational boundaries. It allows sites to make informed authorization decisions for individual access of protected online resources in a privacy-preserving manner. This software is a C++ implementation of the Service Provider version 2 component of the Shibboleth can be used in Apache Web servers. The service provider manages secured resources. User access to resources is based on assertions received by the service provider (SP) from an identity provider.
Extensible authentication framework for Dancer2 apps
A user authentication and authorisation framework plugin for Dancer2 apps. Makes it easy to require a user to be logged in to access certain routes, provides role-based access control, and supports various authentication methods/sources (config file, database, Unix system users, etc). Designed to support multiple authentication realms and to be as extensible as possible, and to make secure password handling easy (the base class for auth providers makes handling `RFC2307'-style hashed passwords really simple, so you have no excuse for storing plain-text passwords).
security/Crypt-Password-Util-0.17 (Score: 9.841064E-5)
Crypt password utilities
Crypt::Password::Util is a crypt password utilities. Its crypt($str) works like Perl's crypt(), but automatically choose the appropriate crypt type and random salt. Will first choose SSHA512 with 64-bit random salt. If not supported by system, fall back to MD5-CRYPT with 32-bit random salt. If that is not supported, fall back to CRYPT. Its crypt_type($str) returns crypt type, or undef if $str does not look like a crypted password. Currently known types: CRYPT (traditional DES crypt), MD5-CRYPT (including Apache variant), SSHA256 (salted SHA256), SSHA512 (salted SHA512), and PLAIN-MD5. See also Authen::Passphrase which recognizes more encodings (but currently not SSHA256 and SSHA512).
security/Crypt-SKey-0.10 (Score: 9.841064E-5)
Perl S/Key calculator
This module contains a simple S/Key calculator (as described in RFC 1760) implemented in Perl. It exports the function `key' by default, and may optionally export the function `compute'. `compute_md4', `compute_md5', `key_md4', and `key_md5' are provided as convenience functions for selecting either MD4 or MD5 hashes. The default is MD4; this may be changed with with the `$Crypt::SKey::HASH' variable, assigning it the value of `MD4' or `MD5'. You can access any of these functions by exporting them in the same manner as `compute' in the above example. Most S/Key systems use MD4 hashing, but a few (notably OPIE) use MD5.
security/Net-SinFP-2.09 (Score: 9.841064E-5)
Full operating system stack fingerprinting suite
SinFP is a new approach to OS fingerprinting, which bypasses limitations that nmap has. Nmap approaches to fingerprinting as shown to be efficient for years. Nowadays, with the omni-presence of stateful filtering devices, PAT/NAT configurations and emerging packet normalization technologies, its approach to OS fingerprinting is becoming to be obsolete. SinFP uses the aforementioned limitations as a basis for tests to be obsolutely avoided in used frames to identify accurately the remote operating system. That is, it only requires one open TCP port, sends only fully standard TCP packets, and limits the number of tests to 2 or 3 (with only 1 test giving the OS reliably in most cases).
security/gnupg-2.0.2 (Score: 9.841064E-5)
Python wrapper for GnuPG
This module allows easy access to GnuPG's key management, encryption and signature functionality from Python programs, by interacting with GnuPG through file descriptors. Input arguments are strictly checked and sanitised, and therefore this module should be safe to use in networked applications requiring direct user input. It is intended for use with Python 2.6 or greater. This is a fork of python-gnupg-0.3.2, patched to fix a potential vulnerability which could result in remote code execution, do to unsanitised inputs being passed to subprocess.Popen([...], shell=True).