Honeyd is a small daemon that creates virtual hosts on a network. The
hosts can be configured to run arbitrary services, and their TCP
personality can be adapted so that they appear to be running certain
versions of operating systems. Honeyd enables a single host to claim
multiple addresses - I have tested up to 65536 - on a LAN for network
simulation.
The Enhanced TightVNC Viewer package started as a project to add some patches
to the long neglected Unix TightVNC Viewer. However, now the front-end GUI and
wrapper scripts features dwarf the Unix TightVNC Viewer patches (see the lists
below).
It adds a GUI for Windows, Mac OS X, and Unix that automatically starts up
STUNNEL SSL tunnel for SSL or SSH connections to x11vnc, and then launches the
TightVNC Viewer to use the tunnel. It also enables SSL encrypted VNC
connections to any other VNC Server running an SSL tunnel, such as STUNNEL, at
their end. It can be used to perform SSH tunnelled connections to any VNC
Server as well. The tool has many additional features (see below for a list).
The short name for this project is "ssvnc" for SSL/SSH VNC Viewer.
Ncat concatenates data streams similar to "cat" except the streams can
be files or TCP connections. Ncat makes it easy to pipe data between
hosts.
MPICH2 is an implementation of the Message-Passing Interface (MPI).
The goals of MPICH2 are to provide an MPI implementation for important
platforms, including clusters, SMPs, and massively parallel processors.
It also provides a vehicle for MPI implementation research and for developing
new and better parallel programming environments
Belle-sip is a SIP (RFC3261) implementation written in C, with an object
oriented API.
* RFC3261 compliant implementation of SIP parser, writer, transactions and
dialog layers
* http client api
* support of client TLS certificate
* fully asynchronous transport layer (UDP, TCP, TLS)
* fully asynchronous DNS resolution with SRV
* full dual-stack IPv6 support
* SIP transaction state machines with lastest corrections (RFC6026)
* automatic management of request refreshes with network disconnection
resiliency thanks to the "refresher" object
* supported platforms: Linux, Mac OSX, Windows XP+, iOS, Android,
Blackberry 10
Citrix(R) Presentation Server(TM) runs on Microsoft(R) Windows Server(TM) and
UNIX(R) operating systems, and extends the base Windows Terminal Services
platform by enhancing the end-user experience as well as increasing
manageability, compatibility, security and scalability to address
business-critical environments.
This port includes the Citrix(R) Receiver(TM) software which allows connecting
to Citrix(R) Presentation Server(TM).
You will need to create the directory ${LINUXBASE}/dev or risk crashing your
system.
If your Citrix server does not have one of the supplied root-certificates, you
can copy the certificate to /usr/ports/distfiles and add the following line to
your /etc/make.conf:
ICA_CERTS=mycert.crt
It will then automatically be installed and removed with the normal FreeBSD
package tools.
The idea is that IPFilter in its current state can already do a simple L4
round-robin in its NAT rules. However, it does not detect or sense when a
service and/or host is down. It will continue to send requests to a downed
service/host.
However, IPFilter lets us add and remove rules on-the-fly so it should be
possible to build a daemon that lets you specify "clusters". In each cluster
you would specify its members/hosts and services. As well as a health-check
for the service to determine its current state.
Once a service was deemed "up" we would add a Round-Robin rule to the NAT
table, and naturally, the reverse once we detect a service as being "down".
In addition to this, this program can optionally add ipf rules to log for RST
(reset) packets coming from the members of your clusters. In the situations
where the software/port goes down, but the host itself is still working, we
would detect failure instantly. (Since the forwarded connections to the service
would trigger a RST packet back). If this option is enabled, l4ip spawns the
"ipmon" command to monitor for the "log" entries given when such a packet is
detected. l4ip will then mark the service down. This is an add-on feature and
is strictly not necessary for functional usage. It is currently only supported
for TCP.
Perl module to parse traceroute(8).
mod_ldap and mod_quotatab_ldap modules for ProFTPD
The SuSE Proxy-Suite, a set of programs to enhance firewall security.
The first (and currently only) component being released is the FTP-Proxy.
* Securely relays FTP connections between clients and servers
* Can switch connections from active to passive and vice versa
* Utilizes port ranges for both control and data connections
* Provides extensive auditing (via syslog or rotating log files)
* Can separate user related from system triggered audit events
* Provides command restriction based on logged in user name
* Allows command argument checking with regular expressions
* Is able to retrieve configuration data from an LDAP directory
* Has been thoroughly tested against buffer overflow attacks
* Fully conforms to RFC 959 and 1123 (the basic FTP RFCs)
* Planned to support RFC 1579 ("Firewall Friendly FTP")
* Planned to support RFC 2428 (IPv6 Extensions for FTP)
* Based on GNU AutoConf, supposed to run on many UNIX systems
Ported to FreeBSD using OpenBSD port by Camiel Dobbelaar <cd@sentia.nl>,
with updates contributed by Marius Tomaschewski <mat@mt-home.net>.