This is a library for making SSH2 connections (client or server).
Emphasis is on using SSH2 as an alternative to SSL for making secure
connections between python scripts. All major ciphers and hash methods
are supported. SFTP client and server mode are both supported too.
Macaroons, like cookies, are a form of bearer credential. Unlike opaque tokens,
macaroons embed caveats that define specific authorization requirements for the
target service, the service that issued the root macaroon and which is capable
of verifying the integrity of macaroons it receives.
service_identity aspires to give you all the tools you need
for verifying whether a certificate is valid for the intended
purposes.
In the simplest case, this means host name verification.
However, service_identity implements RFC 6125 fully and
plans to add other relevant RFCs too.
This is a library for making SSH2 connections (client or server). Emphasis is
on using SSH2 as an alternative to SSL for making secure connections between
python scripts. All major ciphers and hash methods are supported. SFTP client
and server mode are both supported too.
TLS Lite is a free python library that implements SSL 3.0, TLS 1.0, and TLS
1.1. TLS Lite supports non-traditional authentication methods such as SRP,
shared keys, and cryptoIDs in addition to X.509 certificates. TLS Lite is pure
Python, however it can access OpenSSL, cryptlib, pycrypto, and GMPY for faster
crypto operations. TLS Lite integrates with httplib, xmlrpclib, poplib,
imaplib, smtplib, SocketServer, asyncore, and Twisted.
"racoon2" is a system to exchange and to install security parameters
for the IPsec.
Currently the system supports the following specification:
Internet Key Exchange (IKEv2) Protocol
draft-ietf-ipsec-ikev2-17.txt
Kerberized Internet Negotiation of Keys (KINK)
draft-ietf-kink-kink-06.txt
PF_KEY Key Management API, Version 2
RFC2367
The Internet Key Exchange (IKE)
RFC2409
Ratproxy is a semi-automated, largely passive web application security audit
tool. It is meant to complement active crawlers and manual proxies more
commonly used for this task, and is optimized specifically for an accurate and
sensitive detection, and automatic annotation, of potential problems and
security-relevant design patterns based on the observation of existing,
user-initiated traffic in complex web 2.0 environments.
gpgr is a very light interface to the command-line GPG (GNU Privacy
Guard) tool which is soley concerned with making it as easy as
possible to encrypt files with one (or more) public keys. It does
not provide any major key management tools and does not support
decryption.
Shishi is a free implementation of the Kerberos 5 network security system.
The goals of this project are:
* Full standards compliance.
* Thread safe library.
* Internationalization, both for client messages but also for non-ASCII
username and passwords.
* Integrate with existing password management systems (/etc/passwd, PAM,
SASL).
* Clean room implementation with clear copyright and license.
This program is designed to log smurf attacks and the broadcasts used.
Essentially it is just an ICMP echo reply logger with the following twists:
- Logging only begins after passing a certain threshold rate of packets/sec
and kilobytes/sec. This prevents the logging of innocent ping replies.
- Only the /24 is logged, and it is only logged once per attack.