Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 26 Apr 2009 13:37:43 -0400
From:      Matt Donovan <kitchetech@gmail.com>
To:        FreeBSD-gnats-submit@FreeBSD.org
Subject:   ports/134021: [NEW PORT] security/py25-sslstrip: Python program for ssl stripping
Message-ID:  <49f49bfd.0405be0a.1029.75c8@mx.google.com>
Resent-Message-ID: <200904261810.n3QIA1El088215@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         134021
>Category:       ports
>Synopsis:       [NEW PORT] security/py25-sslstrip: Python program for ssl stripping
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Sun Apr 26 18:10:01 UTC 2009
>Closed-Date:
>Last-Modified:
>Originator:     Matt Donovan
>Release:        FreeBSD 7.1-RELEASE-p4 i386
>Organization:
>Environment:
System: FreeBSD njord.localdomain 7.1-RELEASE-p4 FreeBSD 7.1-RELEASE-p4 #0: Sun Mar 22 12:35:36 UTC 2009
>Description:
It will transparently hijack HTTP traffic
on a network, watch for HTTPS links and redirects, then map those links
into either look-alike HTTP links or homograph-similar HTTPS links. It
also supports modes for supplying a favicon which looks like a lock icon,
selective logging, and session denial.


WWW:	http://www.thoughtcrime.org/software/sslstrip/

Generated with FreeBSD Port Tools 0.77
>How-To-Repeat:
>Fix:

--- py25-sslstrip-0.2.shar begins here ---
# This is a shell archive.  Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file".  Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
#	sslstrip
#	sslstrip/Makefile
#	sslstrip/distinfo
#	sslstrip/pkg-descr
#	sslstrip/pkg-plist
#	sslstrip/files
#	sslstrip/files/patch-setup.py
#
echo c - sslstrip
mkdir -p sslstrip > /dev/null 2>&1
echo x - sslstrip/Makefile
sed 's/^X//' >sslstrip/Makefile << 'f9149b09d4ea5851260faaa84cff5251'
X# New ports collection makefile for:	sslstrip
X# Date created:		2009-04-17
X# Whom:			User & <dragon@njord.localdomain>
X#
X# $FreeBSD$
X#
X
XPORTNAME=	sslstrip
XPORTVERSION=	0.2
XCATEGORIES=	security
XMASTER_SITES=	http://www.thoughtcrime.org/software/sslstrip/
XPKGNAMEPREFIX=	${PYTHON_PKGNAMEPREFIX}
XDISTNAME=	${PORTNAME}-${PORTVERSION}
X
XMAINTAINER=	kitchetech@gmail.com
XCOMMENT=	Python program for ssl stripping
X
XUSE_PYTHON=	yes
XUSE_PYDISTUTILS=	yes
XPYDISTUTILS_PKGNAME=	sslstrip
X
X.include <bsd.port.mk>
f9149b09d4ea5851260faaa84cff5251
echo x - sslstrip/distinfo
sed 's/^X//' >sslstrip/distinfo << 'd73df4de07798ffb52784fd27a9f5c89'
XMD5 (sslstrip-0.2.tar.gz) = 2dc5fc2d3c081c9065fca0cdd311576b
XSHA256 (sslstrip-0.2.tar.gz) = 18e319abfd26e12fbed8205947bcaa14e9adb886be2a4e1efb33577039875aac
XSIZE (sslstrip-0.2.tar.gz) = 22335
d73df4de07798ffb52784fd27a9f5c89
echo x - sslstrip/pkg-descr
sed 's/^X//' >sslstrip/pkg-descr << '0371f316f78a8992c7065a3882b1afa3'
XIt will transparently hijack HTTP traffic
Xon a network, watch for HTTPS links and redirects, then map those links
Xinto either look-alike HTTP links or homograph-similar HTTPS links. It
Xalso supports modes for supplying a favicon which looks like a lock icon,
Xselective logging, and session denial.
X
X
XWWW:	http://www.thoughtcrime.org/software/sslstrip/
0371f316f78a8992c7065a3882b1afa3
echo x - sslstrip/pkg-plist
sed 's/^X//' >sslstrip/pkg-plist << '6c519efc9509738b654e52ead59c222a'
Xbin/sslstrip
X%%PYTHON_SITELIBDIR%%/sslstrip/CookieCleaner.py
X%%PYTHON_SITELIBDIR%%/sslstrip/CookieCleaner.pyc
X%%PYTHON_SITELIBDIR%%/sslstrip/CookieCleaner.pyo
X%%PYTHON_SITELIBDIR%%/sslstrip/DataShuffler.py
X%%PYTHON_SITELIBDIR%%/sslstrip/DataShuffler.pyc
X%%PYTHON_SITELIBDIR%%/sslstrip/DataShuffler.pyo
X%%PYTHON_SITELIBDIR%%/sslstrip/RetrySecureException.py
X%%PYTHON_SITELIBDIR%%/sslstrip/RetrySecureException.pyc
X%%PYTHON_SITELIBDIR%%/sslstrip/RetrySecureException.pyo
X%%PYTHON_SITELIBDIR%%/sslstrip/SSLDataShuffler.py
X%%PYTHON_SITELIBDIR%%/sslstrip/SSLDataShuffler.pyc
X%%PYTHON_SITELIBDIR%%/sslstrip/SSLDataShuffler.pyo
X%%PYTHON_SITELIBDIR%%/sslstrip/SSLShuffleSocket.py
X%%PYTHON_SITELIBDIR%%/sslstrip/SSLShuffleSocket.pyc
X%%PYTHON_SITELIBDIR%%/sslstrip/SSLShuffleSocket.pyo
X%%PYTHON_SITELIBDIR%%/sslstrip/SecureLinkListener.py
X%%PYTHON_SITELIBDIR%%/sslstrip/SecureLinkListener.pyc
X%%PYTHON_SITELIBDIR%%/sslstrip/SecureLinkListener.pyo
X%%PYTHON_SITELIBDIR%%/sslstrip/ShuffleSocket.py
X%%PYTHON_SITELIBDIR%%/sslstrip/ShuffleSocket.pyc
X%%PYTHON_SITELIBDIR%%/sslstrip/ShuffleSocket.pyo
X%%PYTHON_SITELIBDIR%%/sslstrip/__init__.py
X%%PYTHON_SITELIBDIR%%/sslstrip/__init__.pyc
X%%PYTHON_SITELIBDIR%%/sslstrip/__init__.pyo
X%%DATADIR%%/COPYING
X%%DATADIR%%/README
X%%DATADIR%%/lock.ico
X@dirrm %%DATADIR%%
X@dirrm %%PYTHON_SITELIBDIR%%/sslstrip
6c519efc9509738b654e52ead59c222a
echo c - sslstrip/files
mkdir -p sslstrip/files > /dev/null 2>&1
echo x - sslstrip/files/patch-setup.py
sed 's/^X//' >sslstrip/files/patch-setup.py << '78825a01de4c600f80cd12edea8aad98'
X--- setup.py.orig	2009-04-24 10:19:32.000000000 -0400
X+++ setup.py	2009-04-24 10:19:45.000000000 -0400
X@@ -5,7 +5,7 @@
X shutil.copyfile("sslstrip.py", "sslstrip/sslstrip")
X 
X setup  (name        = 'sslstrip',
X-        version     = '0.1',
X+        version     = '0.2',
X         description = 'A MITM tool that implements Moxie Marlinspike\'s HTTPS stripping attacks.',
X         author = 'Moxie Marlinspike',
X         author_email = 'moxie@thoughtcrime.org',
78825a01de4c600f80cd12edea8aad98
exit
--- py25-sslstrip-0.2.shar ends here ---

>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?49f49bfd.0405be0a.1029.75c8>