mitm6 VS quicklisp-client

Compare mitm6 vs quicklisp-client and see what are their differences.

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
mitm6 quicklisp-client
4 6
1,609 286
1.1% -
0.0 0.0
2 months ago 11 days ago
Python Common Lisp
GNU General Public License v3.0 only MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

mitm6

Posts with mentions or reviews of mitm6. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-02-26.
  • quicklisp security (or total lack of it)
    6 projects | /r/lisp | 26 Feb 2023
    I've been learning some common lisp, reading through Practical Common Lisp, and it's really neat. People say the good ideas of lisp got adapted in other languages and sure that's true of garbage collection, lambda's and some others, but I'm seeing plenty incredible stuff I haven't seen elsewhere, the condition system that among other things lets you fix and resume your program on exception, real interactive development, flexible object system, macros way more understandable than in other languages with AST macros as in lisp the AST is simple, an expressive dynamic language at high level of ruby and python while being an order of magnitude faster performance. Quicklisp also is really neat, how many other package managers can load new dependencies without restarting your application? And I was learning it with idea that it's not just of historical or hobby interest but legitimately a good choice I can use for new programming projects today for many tasks, but I just learned something that makes it impossible for me to consider, which is complete lack of security of quicklisp. You go to the website and see sha256 hash and PGP signature for quicklisp download, awesome it seems at the security standard you expect for a package manager. But then the actual quicklisp client does all downloads over http with no verification. What this means in practical terms is basically if you use quicklisp, anyone on your local network can easily hack your computer, by MITM (man-in-the-middle) the traffic and serving you backdoored software when you install packages from quicklisp. mitm6 will MITM windows machines on normal networks, bettercap can MITM linux and os x on most networks. Aside from attackers on your local network there's plenty other scenarios, you can go near office of CL using company and set up a open WIFI access point with same name as company wifi and hack their developers, using quicklisp over something like Tor is extremely dangerous at present as it would let the exit node backdoor the packages you download, and then in less likely but still should be protected against scenarios is just if quicklisp.org or any router between you and it is compromised, you can be hacked.
  • Responder
    2 projects | /r/hacking | 19 Oct 2022
    I'm seeing Responder work less and less often as more time goes by. There was a windows patch in 2016 that should result in Windows systems no longer trying to authenticate to hostnames resolved over LLMNR or NBT-NS. If you don't get any hashes with Responder, next try using mitm6 (https://github.com/dirkjanm/mitm6) or Pretender (https://github.com/RedTeamPentesting/pretender). If fully patched and properly configured, Windows hosts will only send credentials to hosts discovered via DNS, and since DHCPv6 is usually left unconfigured, you can poison DHCPv6 broadcasts to announce yourself as the preferred DNS server and you can get hashes or relay.
  • fox-it/mitm6 - pwning IPv4 via IPv6
    1 project | /r/GithubSecurityTools | 11 Mar 2021
  • best practices to prevent another intrusion
    1 project | /r/sysadmin | 14 Jan 2021

quicklisp-client

Posts with mentions or reviews of quicklisp-client. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-06-30.
  • Steel Bank Common Lisp
    9 projects | news.ycombinator.com | 30 Jun 2023
    Yes, that's clear.

    I'm not very familiar with how quicklisp works. I thought that “updates once a month” implies a separate update channel (distribution, ...).

    Looking at the relevant issue, https://github.com/quicklisp/quicklisp-client/issues/167 , it's not clear that even hashes are in place.

    I recently found out that most Nix fetchers use https, but do not actually do verification (`curl --insecure` or equivalent libcurl settings). Channel updates do verify and include hashes, so the overall chain is authenticated.

  • quicklisp security (or total lack of it)
    6 projects | /r/lisp | 26 Feb 2023
    The latest comment I see about this here from Oct. 2022 says they're working on it. There's also comment by the developer in 2016 saying want to improve the security soon, so it doesn't really seem this will actually happen soon. I realise making signature verification work cross platform in pure lisp without external dependencies isn't easy but from latest comment it seems they have that working, in a branch written 4 years ago? The simplest no-code solution is just since quicklisp is published every month or so, on each new update publish a file with sha256 hash of every package contained in quicklisp signed with same developer's pgp key they are already using to sign download of the initial quicklisp.lisp, yes then users if they care about security would have to manually download the file and verify signature every month or so but it's at least some solution that can be done now.
  • Common Lisp Implementations in 2023
    10 projects | news.ycombinator.com | 23 Feb 2023
    > That's what regular devs do, they don't even bother writing articles or commenting on HN :-)

    I'll take the bait, and roll up several of my comments into one.

    First, the support contract costs from the commercial vendors can make sense. It's one of the most expensive parts of software. We joke about fixing relatives' printers, but its not false. Support costs introduce a counter-balance.

    Second, a message to everyone looking into or using QuickLisp, it uses http instead of https: https://github.com/quicklisp/quicklisp-client/issues/167

    You can patch your version to fix this. I'd also recommend adding firewall rules to deny in case your patches roll back. And any other mitigation. Or stricter policies, such as not using it, if it makes sense for your organization.

    And the AI bots? I hope there aren't people herding them who don't want to, that's how you get unloving brats and a crappy world.

  • Securing Quicklisp through mitmproxy
    2 projects | /r/Common_Lisp | 19 Mar 2022
    I found this github issue about it, open since 2018: https://github.com/quicklisp/quicklisp-client/issues/167
  • Why do people use Quicklisp although it is known to be vulnerable to man-in-the-middle attacks?
    5 projects | /r/lisp | 30 Jan 2021
    I agree 100% about needing to test and audit for security. But based on the information I've seen and public activity in repos, I assumed Xach was going for home-grown CL implementation. https://github.com/quicklisp/quicklisp-client/blob/pgp/quicklisp/openpgp.lisp

What are some alternatives?

When comparing mitm6 and quicklisp-client you can also consider the following projects:

ql-https - HTTPS support for Quicklisp via curl

CIEL - CIEL Is an Extended Lisp. Scripting with batteries included.

pretender - Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.

quicklisp-https

BDFProxy - Patch Binaries via MITM: BackdoorFactory + mitmProxy.

bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.

ocicl - An OCI-based ASDF system distribution and management tool for Common Lisp

cerberus - Common Lisp Kerberos v5 implementation

aserve - AllegroServe, a web server written in Common Lisp

defstar - Type declarations for defun et all. Just a mirror. Ask for push acess!

npt - ANSI Common Lisp implementation