Date: Sun, 03 Feb 2019 08:25:13 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 235454] [NEW PORT] security/py-pass-audit: Extension to audit your password-store password repository Message-ID: <bug-235454-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D235454 Bug ID: 235454 Summary: [NEW PORT] security/py-pass-audit: Extension to audit your password-store password repository Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: ports-bugs@FreeBSD.org Reporter: tobias.rehbein@web.de Created attachment 201670 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D201670&action= =3Dedit New port security/py-pass-audit pass audit is a password-store extension for auditing your password reposit= ory. Passwords will be checked against the Python implementation of Dropbox' zxc= vbn algorithm and Troy Hunt's Have I Been Pwned Service. It supports safe breac= hed password detection from haveibeenpwned.com using a K-anonymity method. Using this method, you do not need to (fully) trust the server that stores the breached password. You should read the security consideration section for m= ore information. Porter's Note: - this port needs the overly specific version dependency on sysutils/password-store, as only with this version "pass" starts to check t= he system extension directory this port installs into. - portlint -CN and poudriere testport are okay with the new port. --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-235454-7788>