Port details |
- pwned-check Check whether password is known to have been exposed in a data breach
- 2.2_2,1 security =4 2.2_2,1Version of this port present on the latest quarterly branch.
- Maintainer: se@FreeBSD.org
- Port Added: 2017-10-23 20:46:15
- Last Update: 2024-01-10 15:29:49
- Commit Hash: e4610fc
- People watching this port, also watch:: tree, cups, courier-authlib-userdb, nagios-check_hdd_health, rubygem-fluent-plugin-file-alternative
- License: BSD2CLAUSE
- WWW:
- https://haveibeenpwned.com/
- Description:
- Pwned Passwords are hundreds of millions of real world passwords exposed in
data breaches. This exposure makes them unsuitable for ongoing use as they
are at much greater risk of being used to take over other accounts.
This script offers 2 methods to check whether a password has been exposed
in an uncovered breach:
1) Online check implemented in such a way that the password to be checked
does not need to be sent to the remote database server.
2) Local check against a copy of the pawned passwords database.
Since the local copy of the database requires nearly 20 GB of disk space
(and a download of more than 10 GB of compressed data) the access via the
online check should be preferred, if the compatible with operational and
security requirements.
- ¦ ¦ ¦ ¦
- Manual pages:
- FreshPorts has no man page information for this port.
- pkg-plist: as obtained via:
make generate-plist - Dependency lines:
-
- pwned-check>0:security/pwned-check
- To install the port:
- cd /usr/ports/security/pwned-check/ && make install clean
- To add the package, run one of these commands:
- pkg install security/pwned-check
- pkg install pwned-check
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.- PKGNAME: pwned-check
- Flavors: there is no flavor information for this port.
- distinfo:
- There is no distinfo for this port.
Packages (timestamps in pop-ups are UTC):
- This port has no dependencies.
- There are no ports dependent upon this port
Configuration Options:
- No options to configure
- Options name:
- security_pwned-check
- FreshPorts was unable to extract/find any pkg message
- Master Sites:
- There is no master site for this port.
|
Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
2.2_2,1 10 Jan 2024 15:29:49 |
Baptiste Daroussin (bapt) |
MAN?PREFIX: eleminate its usage and move man to share/man |
07 Sep 2022 21:58:51 |
Stefan Eßer (se) |
Remove WWW entries moved into port Makefiles
Commit b7f05445c00f has added WWW entries to port Makefiles based on
WWW: lines in pkg-descr files.
This commit removes the WWW: lines of moved-over URLs from these
pkg-descr files.
Approved by: portmgr (tcberner) |
2.2_1,1 07 Sep 2022 21:10:59 |
Stefan Eßer (se) |
Add WWW entries to port Makefiles
It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.
Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.
There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above ) |
2.2_1,1 27 Jul 2022 12:50:33 |
Baptiste Daroussin (bapt) |
security/pwned-check: use pkg-message to show message on remove |
2.2_1,1 20 Jul 2022 14:22:56 |
Tobias C. Berner (tcberner) |
security: remove 'Created by' lines
A big Thank You to the original contributors of these ports:
* <ports@c0decafe.net>
* Aaron Dalton <aaron@FreeBSD.org>
* Adam Weinberger <adamw@FreeBSD.org>
* Ade Lovett <ade@FreeBSD.org>
* Aldis Berjoza <aldis@bsdroot.lv>
* Alex Dupre <ale@FreeBSD.org>
* Alex Kapranoff <kappa@rambler-co.ru>
* Alex Samorukov <samm@freebsd.org>
* Alexander Botero-Lowry <alex@foxybanana.com>
* Alexander Kriventsov <avk@vl.ru>
* Alexander Leidinger <netchild@FreeBSD.org> (Only the first 15 lines of the commit message are shown above ) |
2.2_1,1 01 Apr 2022 15:09:49 |
Dmitry Marakasov (amdmi3) |
*/*: fix trailing whitespace in pkg-descr's
Approved by: portmgr blanket |
2.2_1,1 06 Apr 2021 14:31:07 |
Mathieu Arnold (mat) |
Remove # $FreeBSD$ from Makefiles. |
2.2_1,1 14 Aug 2019 12:16:13 |
mat |
Convert to UCL & cleanup pkg-message (categories s) |
2.2_1,1 27 Dec 2018 09:50:56 |
tobik |
security/pwned-check: Remove spaces from sample config file
It contains unnecessary spaces, which results in the following error
messages on command execution.
$ pwned-check
/usr/local/etc/pwned-check.conf: /var/db/pwned-check: Permission denied
/usr/local/etc/pwned-check.conf: https://downloads.pwnedpasswords.com/passwords:
not found
PR: 228635
Submitted by: Hiroki Tagato <tagattie@yandex.com>
Approved by: se (maintainer timeout, ~7 months) |
2.2,1 29 Jul 2018 11:52:42 |
se |
Add information about support of the online check to the package description.
Approved by: antoine (implicit) |
2.0,1 29 Jul 2018 06:53:06 |
se |
Add support for the remote query API. This obviates the need to download
the > 10 GB pawned password hash list, which requires nearly 20 GB after
decompression.
The API does not transfer the queried password or its full SHA1 hash to
the server, but only the first 5 characters of the hash. This allows to
retrieve the full password hashes that match that prefix (typically in the
order of 500) and then to check whether the password to test matches any
of the hashes returned.
Approved by: antoine (implicit) |
2.0,1 09 Mar 2018 13:56:32 |
se |
Update to new datafile version with significantly more password hashes.
Approved by: antoine (implicit) |
1.0,1 01 Mar 2018 14:42:56 |
se |
Bump port-epoch after an attempted update to support the new revision of
the data files had to be reverted. The new file format is incompatible
and no longer suitable for quick lookup of the password hashes. Sorting
the 30 GB file into a usable form took more than 4 hours on my system,
which seems impractical. The port will therefore stay on the level of the
"old" data files.
Approved by: antoine (implicit) |
1.0 23 Feb 2018 22:50:47 |
se |
Fix typo in sample config file.
Approved by: antoine (implicit) |
1.0 23 Feb 2018 22:50:01 |
se |
Revert previous commit. The format of the passwort hash database files
has been changed and entries are no longer sorted.
PORTEPOCH is not incremented, since only a few minutes passed after the
commit of the revoked upate.
Approved by: antoine (implicit) |
2.0 23 Feb 2018 22:10:34 |
se |
Update to use newly released database of pawned passwords (2.5 times the
number of passwords covered, compared to the previous version).
Approved by: antoine (implicit) |
1.0 23 Oct 2017 20:46:08 |
se |
This script uses a downloaded copy of the pwned passwort hashes available
from https://haveibeenpwned.com/Passwords/ to allow passwords to be locally
checked, whether they are known to have been obtained in a data breach and
therefore should not be used.
Approved by: Antoine (mentor) |