Date: Tue, 15 Nov 2016 10:56:47 +0000 (UTC) From: Alexey Dokuchaev <danfe@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r426160 - head/net-mgmt/p0f Message-ID: <201611151056.uAFAul9M014167@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: danfe Date: Tue Nov 15 10:56:46 2016 New Revision: 426160 URL: https://svnweb.freebsd.org/changeset/ports/426160 Log: - Reformat port description text for better readability and compactness - Remove reference to Spitzner's paper which is no longer available - Fix a typo (analyse -> analyze); update WWW entry to avoid redirect Modified: head/net-mgmt/p0f/pkg-descr Modified: head/net-mgmt/p0f/pkg-descr ============================================================================== --- head/net-mgmt/p0f/pkg-descr Tue Nov 15 10:49:43 2016 (r426159) +++ head/net-mgmt/p0f/pkg-descr Tue Nov 15 10:56:46 2016 (r426160) @@ -1,23 +1,15 @@ -from the README: - Passive OS fingerprinting is based on information coming from a remote host when it establishes a connection to our system. Captured packets contain enough information to identify the operating system. In contrast to active -scanners such as nmap and QueSO, p0f does not send anything to the host being -identified. - -For more information, read Spitzner's text at: -http://www.enteract.com/~lspitz/finger.html . +scanners such as nmap and QueSO, p0f does not send anything to the host +being identified. -from the maintainer: +Use of this program requires read access to the packet filtering device, +typically /dev/bpf0. Granting such access allows the users who have it to +put your Ethernet device into promiscuous mode and sniff your network. -Use of this program requires read access to the packet filtering -device, typically /dev/bpf0. Granting such access allows the users -who have it to put your Ethernet device into promiscuous mode and -sniff your network. See -http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml -if you do not understand how this can be harmful. Running p0f with -no options will cause it to analyse packets intended for other -hosts. +See http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml +if you do not understand how this can be harmful. Running p0f with no +options will cause it to analyze packets intended for other hosts. -WWW: http://lcamtuf.coredump.cx/p0f.shtml +WWW: http://lcamtuf.coredump.cx/p0f3/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201611151056.uAFAul9M014167>