Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 9 Apr 2002 20:11:57 -0700 (PDT)
From:      Joseph King <king@v2project.com>
To:        freebsd-gnats-submit@FreeBSD.org
Subject:   ports/36948: New Port: lcrzoex, network testing toolbox 
Message-ID:  <200204100311.g3A3BvN32846@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         36948
>Category:       ports
>Synopsis:       New Port: lcrzoex, network testing toolbox
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Tue Apr 09 20:20:00 PDT 2002
>Closed-Date:
>Last-Modified:
>Originator:     Joseph King
>Release:        
>Organization:
>Environment:
>Description:
Lcrzoex can be used in the following contexts :
  - discover the Ethernet address of a computer (number 2, 3, 134, etc.)
  - sniff your LAN to detect what's going on (number 7, 8, 9, etc.)
  - check the checksums created by a network program which isn't working (number 16, 17, 18, etc.)
  - intercept a session and replay it as many times you want to strictly test your application (number 10, 11, 12, 22, etc.)
  - verify if a router is well configured even if the needed computers are down (number 48, ..., 53, etc.)
  - check if your router/firewall/computer blocks 
    - IP protocols (number 29, ..., 34, etc.)
    - IP options (number 29, ..., 34, 73, ..., 79, etc.), source routing (number 45, 56, 59, 62, etc.)
    - IP fragments (number 44, 55, 58, 61, 72, etc.)
    - TCP options (number 48, ..., 53, etc.)
    - ICMP types (number 65, ..., 70, etc.)
    - ARP poisoning (number 80, 81, 82, 83, etc.)
  - create a tcp/udp client with a special local port (number 85, 89, 86, 93, 97, etc.)
  - convert between numbers (number 139, ..., 148, etc.)
  - etc.

>How-To-Repeat:
      
>Fix:
# This is a shell archive.  Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file".  Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
#	lcrzoex
#	lcrzoex/files
#	lcrzoex/Makefile
#	lcrzoex/distinfo
#	lcrzoex/pkg-comment
#	lcrzoex/pkg-descr
#	lcrzoex/pkg-plist
#	lcrzoex/pkg-message
#
echo c - lcrzoex
mkdir -p lcrzoex > /dev/null 2>&1
echo c - lcrzoex/files
mkdir -p lcrzoex/files > /dev/null 2>&1
echo x - lcrzoex/Makefile
sed 's/^X//' >lcrzoex/Makefile << 'END-of-lcrzoex/Makefile'
X# New ports collection makefile for:	lcrzoex
X# Date created:		Wed Apr 10 02:42:20 CEST 2002
X# Whom:			king@v2project.com
X#
X# $FreeBSD: ports/security/lcrzoex/Makefile,v 1.13 2002/03/15 19:44:18 ade Exp $
X#
X
XPORTNAME=	lcrzoex
XPORTVERSION=	4.08
XCATEGORIES=	security
XMASTER_SITES=	http://www.laurentconstantin.com/common/lcrzoex/download/v4/ \
X		http://www.mirrors.wiretapped.net/security/packet-construction/lcrzoex/ \
X		ftp://ftp.mirrors.wiretapped.net/sd3a/security/packet-construction/lcrzoex/
XEXTRACT_SUFX=   -src.tgz
X
XMAINTAINER=	king@v2project.com
X
XBUILD_DEPENDS=    ${LOCALBASE}/lib/liblcrzo.a:${PORTSDIR}/security/lcrzo
X
XWRKSRC=         ${WRKDIR}/${PKGNAME}-src/src
X
Xpost-patch:
X	cd ${WRKSRC} && ${SH} ${WRKSRC}/genemake
X
Xpost-install:
X	@${CAT}	${PKGMESSAGE}
X
X.include <bsd.port.mk>
END-of-lcrzoex/Makefile
echo x - lcrzoex/distinfo
sed 's/^X//' >lcrzoex/distinfo << 'END-of-lcrzoex/distinfo'
XMD5 (lcrzoex-4.08-src.tgz) = 6f3d04518e951d8091118971eda3428d
END-of-lcrzoex/distinfo
echo x - lcrzoex/pkg-comment
sed 's/^X//' >lcrzoex/pkg-comment << 'END-of-lcrzoex/pkg-comment'
XLcrzoex contains over 300 functionnalities using network library lcrzo
END-of-lcrzoex/pkg-comment
echo x - lcrzoex/pkg-descr
sed 's/^X//' >lcrzoex/pkg-descr << 'END-of-lcrzoex/pkg-descr'
XLcrzoex contains over 300 functionnalities using network library lcrzo.
XLcrzoex can be used in the following contexts :
X  - discover the Ethernet address of a computer (number 2, 3, 134, etc.)
X  - sniff your LAN to detect what's going on (number 7, 8, 9, etc.)
X  - check the checksums created by a network program which isn't working 
X	(number 16, 17, 18, etc.)
X  - intercept a session and replay it as many times you want to strictly 
X	test your application (number 10, 11, 12, 22, etc.)
X  - verify if a router is well configured even if the needed computers are 
X	down (number 48, ..., 53, etc.)
X  - check if your router/firewall/computer blocks 
X    - IP protocols (number 29, ..., 34, etc.)
X    - IP options (number 29, ..., 34, 73, ..., 79, etc.), source routing 
X	(number 45, 56, 59, 62, etc.)
X    - IP fragments (number 44, 55, 58, 61, 72, etc.)
X    - TCP options (number 48, ..., 53, etc.)
X    - ICMP types (number 65, ..., 70, etc.)
X    - ARP poisoning (number 80, 81, 82, 83, etc.)
X  - create a tcp/udp client with a special local port (number 85, 89, 86, 93, 
X	97, etc.)
X  - convert between numbers (number 139, ..., 148, etc.)
X  - etc.
X
XWWW: http://www.laurentconstantin.com/en/lcrzoex/
END-of-lcrzoex/pkg-descr
echo x - lcrzoex/pkg-plist
sed 's/^X//' >lcrzoex/pkg-plist << 'END-of-lcrzoex/pkg-plist'
Xbin/lcrzoex
Xman/man1/lcrzoex.1
END-of-lcrzoex/pkg-plist
echo x - lcrzoex/pkg-message
sed 's/^X//' >lcrzoex/pkg-message << 'END-of-lcrzoex/pkg-message'
X--------
XCheck the online documentation in :
Xhttp://www.laurentconstantin.com/common/lcrzoex/doc/en/index.html
X--------
END-of-lcrzoex/pkg-message
exit


>Release-Note:
>Audit-Trail:
>Unformatted:

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-ports" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200204100311.g3A3BvN32846>