Path to this page:
./
security/spiped,
Tool for creating symmetrically encrypted and authenticated pipes
Branch: CURRENT,
Version: 1.6.1nb1,
Package name: spiped-1.6.1nb1,
Maintainer: pkgsrc-usersspiped (pronounced "ess-pipe-dee") is a utility for creating symmetrically
encrypted and authenticated pipes between socket addresses, so that one may
connect to one address (e.g., a UNIX socket on localhost) and transparently
have a connection established to another address (e.g., a UNIX socket on a
different system). This is similar to 'ssh -L' functionality, but does not
use SSH and requires a pre-shared symmetric key.
Note that spiped:
1. Requires a strong key file: The file specified via the -k option should
have at least 256 bits of entropy. ('dd if=/dev/urandom bs=32 count=1' is
your friend.)
2. Does not provide any protection against information leakage via packet
timing: Running telnet over spiped will protect a password from being directly
read from the network, but will not obscure the typing rhythm.
3. Can significantly increase bandwidth usage for interactive sessions: It
sends data in packets of 1024 bytes, and pads smaller messages up to this
length, so a 1 byte write could be expanded to 1024 bytes if it cannot be
coalesced with adjacent bytes.
4. Uses a symmetric key -- so anyone who can connect to an spiped "server" is
also able to impersonate it.
MESSAGE.smf [+/-]===========================================================================
$NetBSD: MESSAGE.smf,v 1.2 2014/05/14 14:00:42 jperkin Exp $
This package supports multiple SMF instances.
Configure using the SMF properties: mode, source, target and key.
Mode can have the value "encrypt" or "decrypt". Source and target are
formatted as described in spiped(1). The key is a path to the keyfile.
To generate a new keyfile:
dd if=/dev/urandom bs=32 count=1 > ${PKG_SYSCONFDIR}/spiped_example.key
Add a example service instance:
svccfg -s spiped add example
svccfg -s spiped:example addpg spiped application
svccfg -s spiped:example setprop spiped/mode = astring: decrypt
svccfg -s spiped:example setprop spiped/source = astring: [0.0.0.0]:2323
svccfg -s spiped:example setprop spiped/target = astring: [127.0.0.1]:23
svccfg -s spiped:example setprop \
spiped/key = astring: "${PKG_SYSCONFDIR}/spiped_example.key"
===========================================================================
Required to run:[
security/openssl]
Required to build:[
pkgtools/cwrappers]
Master sites:
Filesize: 112.358 KB
Version history: (Expand)
- (2023-10-25) Updated to version: spiped-1.6.1nb1
- (2020-04-06) Updated to version: spiped-1.6.1
- (2020-01-19) Updated to version: spiped-1.5.0nb2
- (2016-03-05) Updated to version: spiped-1.5.0nb1
- (2015-02-22) Updated to version: spiped-1.5.0
- (2014-10-22) Updated to version: spiped-1.4.2
CVS history: (Expand)
2023-10-25 00:11:51 by Thomas Klausner | Files touched by this commit (2298) |
Log message:
*: bump for openssl 3
|
2021-10-26 13:18:07 by Nia Alarie | Files touched by this commit (605) |
Log message:
security: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes
Unfetchable distfiles (fetched conditionally?):
./security/cyrus-sasl/distinfo \
cyrus-sasl-dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d.patch.v2
|
2021-10-07 16:54:50 by Nia Alarie | Files touched by this commit (606) |
Log message:
security: Remove SHA1 hashes for distfiles
|
2020-04-06 11:27:13 by Thomas Klausner | Files touched by this commit (3) | |
Log message:
spiped: update to 1.6.1.
spiped-1.6.1
* New option -u username:groupname (spiped): change the user and/or group
ownership of the process.
* Use RDRAND as an additional source of entropy on CPUs which support it.
* Use SHANI instructions on CPUs which support them.
* Warn about failed connections and exit with non-zero status (spipe).
spiped-1.6.0
* The -n option (spiped) is no longer limited to a maximum limit of
500 simultaneous connections.
* The -k option now accepts "-" as a synonym for standard input.
* New option -v (spipe/spiped): Print version number.
* Add workaround for docker signal-handling bug in spiped.
* Perform a graceful shutdown on SIGTERM.
|
2020-01-26 18:32:28 by Roland Illig | Files touched by this commit (981) |
Log message:
all: migrate homepages from http to https
pkglint -r --network --only "migrate"
As a side-effect of migrating the homepages, pkglint also fixed a few
indentations in unrelated lines. These and the new homepages have been
checked manually.
|
2020-01-18 22:51:16 by Jonathan Perkin | Files touched by this commit (1836) |
Log message:
*: Recursive revision bump for openssl 1.1.1.
|
2019-05-28 15:35:54 by Jonathan Perkin | Files touched by this commit (3) |
Log message:
*: Remove per-package MESSAGE.{rcd,smf} handling.
This is now centralised in mk/pkgformat so no need to do it manually.
|
2016-06-08 12:16:57 by Jonathan Perkin | Files touched by this commit (89) |
Log message:
Remove the stability entity, it has no meaning outside of an official context.
|