Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 03 Feb 2019 08:25:13 +0000
From:      bugzilla-noreply@freebsd.org
To:        ports-bugs@FreeBSD.org
Subject:   [Bug 235454] [NEW PORT] security/py-pass-audit: Extension to audit your password-store password repository
Message-ID:  <bug-235454-7788@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D235454

            Bug ID: 235454
           Summary: [NEW PORT] security/py-pass-audit: Extension to audit
                    your password-store password repository
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: ports-bugs@FreeBSD.org
          Reporter: tobias.rehbein@web.de

Created attachment 201670
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D201670&action=
=3Dedit
New port security/py-pass-audit

pass audit is a password-store extension for auditing your password reposit=
ory.
Passwords will be checked against the Python implementation of Dropbox' zxc=
vbn
algorithm and Troy Hunt's Have I Been Pwned Service. It supports safe breac=
hed
password detection from haveibeenpwned.com using a K-anonymity method. Using
this method, you do not need to (fully) trust the server that stores the
breached password. You should read the security consideration section for m=
ore
information.

Porter's Note:
- this port needs the overly specific version dependency on
sysutils/password-store, as only with this version "pass" starts to check t=
he
system extension directory this port installs into.
- portlint -CN and poudriere testport are okay with the new port.

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-235454-7788>