KVpnc is a KDE frontend for various VPN clients. It supports Cisco VPN (vpnc, vpnclient (a proprietary client from Cisco)), IPSec (FreeS/WAN, Openswan, strongSwan, racoon), PPTP (pptpclient), OpenVPN, L2TP over IPSec (l2tpd, xl2ltpd, openl2tp) (usable with FreeS/WAN, Openswan, strongSwan, and racoon), Vtun, and OpenSSH. Smartcards will be supported within OpenVPN and strongSwan. vpnc is a replacement for the Cisco VPN client, and is used as a client for the Cisco3000 VPN Concentrator. FreeS/WAN, Openswan, and strongSwan are IPSec clients for Linux 2.4.x/2.6.x, and racoon is an IPSec client for Linux 2.6.x and *BSD. l2tpd, xl2tpd, and openl2tp are Linux L2TP VPN clients/servers.
lpkfuse is a FUSE filesystem that lets you place all the SSH public keys of your users into LDAP. Without this tool, you would have to patch your SSH server (for example using openssh-lpk) to support this. But with lpkfuse, you just need to amend AuthorizedKeysFile in your sshd_config file. Other benefits include LDAP resilence and caching/local-fallback in case no LDAP servers are accessible.
Simple Continuous Integration Tools (scit) is an automated build and or test system consisting of a set of Perl and expect scripts utilizing common tools that are available for most Unix-like operating systems. The intention is to keep it lightweight while still providing a full set of features. The current version has a command-line and an HTML user interface. It should be possible to make it run on very modest hardware; part of the development and testing has been done on a Nokia N900 phone with both master and slave roles running on the same unit.
ssh-ident allows you to have a single line in your .bashrc, then let it take care of loading ssh-agents when first needed, load all the necessary keys, and share ssh-agents across login consoles. If you have multiple identities for the same account, it is able to load different keys depending on the host you connect to or the path you are working from. At the same time, it keeps the ssh-agents separated and forwards only the keys which are needed for the specific host. It also allows you to specify ssh-add options, so you can automatically lock keys which are unused for a certain time, or have a confirmation request every time a specific key is used.