Date: Fri, 25 Feb 2000 09:08:39 +0200 From: bradh@uunet.co.za To: FreeBSD-gnats-submit@freebsd.org Subject: ports/16976: New port: isic Message-ID: <E12OErf-0009wx-00@cage.noc.uunet.co.za>
next in thread | raw e-mail | index | archive | help
>Number: 16976 >Category: ports >Synopsis: New port: isic >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Thu Feb 24 23:10:01 PST 2000 >Closed-Date: >Last-Modified: >Originator: Brad Hendrickse >Release: FreeBSD 3.4-STABLE i386 >Organization: UUNET SA (Pty) Ltd >Environment: FreeBSD cage.noc.uunet.co.za 3.4-STABLE FreeBSD 3.4-STABLE #25: Tue Feb 15 10:09:17 SAST 2000 bradh@cage.noc.uunet.co.za:/usr/src/sys/compile/kernel.CAGE i386 >Description: IP Stack Integrity Checker Its purpose is to test the stability of an IP Stack and its component stacks (TCP, UDP, ICMP et. al.) It does this be generating random packets of the desired protocol. The packets can have tendancies. ie by default all packets have a 50% chance of having IP Options. The packets are then sent against the target machine to either penetrate its firewall rules or find bugs in the IP stack. http://expert.cc.purdue.edu/~frantzen/ -- Brad Hendrickse bradh@uunet.co.za >How-To-Repeat: N/A >Fix: # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # isic # isic/Makefile # isic/pkg # isic/pkg/DESCR # isic/pkg/PLIST # isic/pkg/COMMENT # isic/files # isic/files/md5 # echo c - isic mkdir -p isic > /dev/null 2>&1 echo x - isic/Makefile sed 's/^X//' >isic/Makefile << 'END-of-isic/Makefile' X# New ports collection makefile for: isic X# Version required: 0.05 X# Date created: 25 February 2000 X# Whom: Brad Hendrickse <bradh@uunet.co.za> X# X# $FreeBSD$ X# X XDISTNAME= isic-0.05 XCATEGORIES= net XMASTER_SITES= http://expert.cc.purdue.edu/~frantzen/ XEXTRACT_SUFX= .tgz X XMAINTAINER= bradh@uunet.co.za X XBUILD_DEPENDS= ${LOCALBASE}/lib/libnet.a:${PORTSDIR}/net/libnet X XGNU_CONFIGURE= yes X X.include <bsd.port.mk> END-of-isic/Makefile echo c - isic/pkg mkdir -p isic/pkg > /dev/null 2>&1 echo x - isic/pkg/DESCR sed 's/^X//' >isic/pkg/DESCR << 'END-of-isic/pkg/DESCR' XIP Stack Integrity Checker X XIts purpose is to test the stability of an IP Stack and its component stacks X(TCP, UDP, ICMP et. al.) It does this be generating random packets of the Xdesired protocol. The packets can have tendancies. ie by default all packets Xhave a 50% chance of having IP Options. The packets are then sent against the Xtarget machine to either penetrate its firewall rules or find bugs in the IP Xstack. X Xhttp://expert.cc.purdue.edu/~frantzen/ X X-- XBrad Hendrickse Xbradh@uunet.co.za END-of-isic/pkg/DESCR echo x - isic/pkg/PLIST sed 's/^X//' >isic/pkg/PLIST << 'END-of-isic/pkg/PLIST' Xbin/isic Xbin/tcpsic Xbin/udpsic Xbin/icmpsic Xbin/esic END-of-isic/pkg/PLIST echo x - isic/pkg/COMMENT sed 's/^X//' >isic/pkg/COMMENT << 'END-of-isic/pkg/COMMENT' XIP Stack Integrity Checker END-of-isic/pkg/COMMENT echo c - isic/files mkdir -p isic/files > /dev/null 2>&1 echo x - isic/files/md5 sed 's/^X//' >isic/files/md5 << 'END-of-isic/files/md5' XMD5 (isic-0.05.tgz) = da75f4ff2b78477396b0ab30fbdbb616 END-of-isic/files/md5 exit >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E12OErf-0009wx-00>