From owner-freebsd-ports-bugs@FreeBSD.ORG Fri May 29 16:13:31 2015 Return-Path: Delivered-To: freebsd-ports-bugs@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id A48237D8 for ; Fri, 29 May 2015 16:13:31 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 745211834 for ; Fri, 29 May 2015 16:13:31 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t4TGDVVI037034 for ; Fri, 29 May 2015 16:13:31 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 200519] net/spoofer: update to 0.8a Date: Fri, 29 May 2015 16:13:31 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: mjl@luckie.org.nz X-Bugzilla-Status: New X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: jadawin@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter flagtypes.name attachments.created Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 29 May 2015 16:13:31 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=200519 Bug ID: 200519 Summary: net/spoofer: update to 0.8a Product: Ports & Packages Version: Latest Hardware: i386 OS: Any Status: New Severity: Affects Some People Priority: --- Component: Individual Port(s) Assignee: jadawin@FreeBSD.org Reporter: mjl@luckie.org.nz Assignee: jadawin@FreeBSD.org Flags: maintainer-feedback?(jadawin@FreeBSD.org) Created attachment 157251 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=157251&action=edit update spoofer to 0.8a The Spoofer project has been taken over by CAIDA http://blog.caida.org/best_available_data/2015/05/28/caida-takes-over-stewardship-of-spoofer-project-infrastructure/ This port update shifts the master side to the CAIDA master site, and includes a new release of the source code (0.8a). The changes in the source code: spoofer-0.8a ----------- * Moved servers to CAIDA * Implemented raw ethernet spoofing on all platforms (with libpcap or winpcap) as a fallback when the OS blocks raw ip spoofing * Implemented IPv6 spoofing on all platforms (with libpcap or winpcap) * Removed dependence on crufty old libnet and libdnet In particular, because we are not using raw IP sockets anymore, we can now test spoofing on freebsd NAT routers because we will bypass the NAT layer as required. I am happy to take over maintainership. -- You are receiving this mail because: You are the assignee for the bug.