Webmin 0.70 5 mars 1999
Webmin is a web-based interface for system administration for Un*x. Using any browser that supports tables and forms, you can setup user accounts, internet services, DNS, file sharing and so on.
Changes: Added Majordomo list manager module, added ISC DHCP server module, added network configuration module for Solaris and Redhat, added option in setup.sh to have Webmin start at boot time, improved file manager error handling, added FreeBSD 3.0 support, added limited support for IRIX 6.2 and OSF/1 4.0 as well as major ACL checking improvements for Webmin users.
SSH 2.0.12 et SSF 5 février 1999
SSH (Secure Shell) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. It is intended as a replacement for rlogin, rsh, rcp, and rdist.
Changes: Hit the changelog link for a detailed list of changes. Version 2.0.12 also includes a new FAQ.
Attention ! Les lois en vigueur en France (même les décrets de début 1998) interdisent l'utilisation de SSH. Sans commentaire.
SSF a été concu pour palier ce manque de sécurité par l'utilisation d'une clé de codage limité à 40 bits.
Depuis le 19 janvier 1999, le Premier Ministre Lionel Jospin autorise tous procédé de cryptage.
OpenSSH 2.5.1 19 février 2001
Créer les clés de l'hôte :
ssh-keygen -t rsa1 -f /etc/ssh/ssh_host_key -C "Commentaires" -N ""
ssh-keygen -t rsa -f /etc/ssh/ssh_host_rsa_key -C "Commentaires" -N ""
ssh-keygen -t dsa -f /etc/ssh/ssh_host_dsa_key -C "Commentaires" -N ""
Créer ses clés personnelles :
$ ssh-keygen -b 1024 -t rsa1 -C "Commentaires" -N "phrase_de_passe"
$ ssh-keygen -b 1024 -t dsa -C "Commentaires" -N "phrase_de_passe"
fsh 0.3 15 février 1999
fsh is a tool for establishing an ssh tunnel for remote execution of commands without requiring an ssh authentication on every connection. Once the tunnel is established, remote commands can be executed almost instantaneously. This makes systems such as remote cvs over ssh much faster.
Changes: fshd is now started automatically by fsh. fsh understands the "-l user" flag, so you no longer have to have the same username on the local and remote system.
MindTerm 0.98 3 février 1999
MindTerm is a complete ssh-client in pure java. It can be used either as a standalone java-application or as a java- applet. The source-code is freely available (GPL). Three packages of importance are provided, terminal, ssh, and security. The terminal package is a rather complete vt102/xterm-terminal. The ssh-package contains the ssh- protocol and also "drop-in" socket replacements to use ssh- tunnels transparently from a java application/applet. It also contains functionality to realize a ssh-server. Finally the security package contains RSA, DES, 3DES, RC4 and Blowfish ciphers.
Changes: Some bug-fixes and new features, see CHANGES for details.
nmap 2.06 9 février 1999
Nmap is a utility for exploration or security auditing of large networks, although it works fine for single hosts. It supports ping scanning, many port scanning techniques, and TCP/IP fingerprinting. Nmap also offers flexible target and port specification, decoy scanning, determination of TCP sequence predictability characteristics, reverse-identd scanning, and output to machine parseable or human readable log files.
Changes: Many many enhancements. See webpage for details.
Cheops 0.59 5 janvier 1999
Cheops is a network "swiss army knife". It's "network neighborhood" done right (or gone out of control, depending on your perspective). It's a combination of a variety of network tools to provide system adminstrators and users with a simple interface to managing and accessing their networks. Cheops aims to do for the network what the file manager did for the filesystem.
Changes: This version includes plugin monitor support, and monitors are included for FTP, SMTP, HTTP, PING, and DNS. A generalized event logger logs to a file, an event window, and optionally sends e-mail. Gnome support is enhanced, but Gnome is not required to run it.
Note: This version is not compatible with very recent gtk's (1.1.9 ) and I am actively seeking developers to help me resolve the issues that make it unstable. GTK 1.0.6 is recommended for this release.
KSniffer 0.1.4 6 février 1999
KSniffer is a network statistics collector. It supports most TCP/IP protocols, (TCP, IP, UDP, ICMP, ARP, RARP as well as minimal IPX). Ksniffer reports on traffic in bytes or packets, activity (kbits/sec, kbytes/sec, packets/sec), as well as by protocol (http, irc, etc). (Based on iptraf v1.4.2 by Gerard Paul Java)
Changes: Added port filtering feature to monitor ports above 1024, such as IRC (6667) and half-life (27015). Also added documentation for the Help menu. Fixed some bugs.
SATAN 1.1.1
Security Administrator's Tool for Analysing Networks est un outil de test de la sécurité de votre système.
TripWire de Visual Computing Corp
Logiciel de détection des intrusions pour UN*X et systèmes d'exploitations dérivés.
Tiger et COPS en sont d'autres. Ce site Web en donne une liste.
SAINT Released (ver 1.3.6) 1 février 1999
SAINT (Security Administrator's Integrated Network Tool) is a security assesment tool based on SATAN. Features include scanning through a firewall, updated security checks from CERT & CIAC bulletins, 4 levels of severity (red, yellow, brown, & green) and a feature rich HTML interface.
Changes: Fixed boot.c for Solaris 7, added SARA modules for IMAP performance and SSH vulnerability check. Fixed Microsoft false alrm on ftp dirs, improved tcp wrapper detection.
Algorythme de codage symétrique (la même clé est utilisé pour le codage et le décodage).
Utilise des clés de 56 bits.
Algorythme de codage symétrique (la même clé est utilisé pour le codage et le décodage).
Utilise des clés de 128 bits.
C'est une interface conviviale qui associe RSA, IDEA et MD5 pour le codage complet des messages.
Algorythme de codage asymétrique (une clé différente est utilisé pour le codage et le décodage).
Utilise des clés de taille variable à volonté allant jusqu'à 2048 bits.
Fonctionnalités
Algorythme de codage asymétrique (une clé différente est utilisé pour le codage et le décodage).
Utilise des clés de taille variable à volonté.
Demande un délai de codage ou de décodage 100 à 1000 fois plus long que DES ou IDEA.
Christophe Merlet redfox@redfoxcenter.org | ©Tous droits réservés
19 juillet 2001 |