Date: Fri, 29 May 2015 16:13:31 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 200519] net/spoofer: update to 0.8a Message-ID: <bug-200519-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=200519 Bug ID: 200519 Summary: net/spoofer: update to 0.8a Product: Ports & Packages Version: Latest Hardware: i386 OS: Any Status: New Severity: Affects Some People Priority: --- Component: Individual Port(s) Assignee: jadawin@FreeBSD.org Reporter: mjl@luckie.org.nz Assignee: jadawin@FreeBSD.org Flags: maintainer-feedback?(jadawin@FreeBSD.org) Created attachment 157251 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=157251&action=edit update spoofer to 0.8a The Spoofer project has been taken over by CAIDA http://blog.caida.org/best_available_data/2015/05/28/caida-takes-over-stewardship-of-spoofer-project-infrastructure/ This port update shifts the master side to the CAIDA master site, and includes a new release of the source code (0.8a). The changes in the source code: spoofer-0.8a ----------- * Moved servers to CAIDA * Implemented raw ethernet spoofing on all platforms (with libpcap or winpcap) as a fallback when the OS blocks raw ip spoofing * Implemented IPv6 spoofing on all platforms (with libpcap or winpcap) * Removed dependence on crufty old libnet and libdnet In particular, because we are not using raw IP sockets anymore, we can now test spoofing on freebsd NAT routers because we will bypass the NAT layer as required. I am happy to take over maintainership. -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-200519-13>