Date: Sun, 26 Apr 2009 13:37:43 -0400 From: Matt Donovan <kitchetech@gmail.com> To: FreeBSD-gnats-submit@FreeBSD.org Subject: ports/134021: [NEW PORT] security/py25-sslstrip: Python program for ssl stripping Message-ID: <49f49bfd.0405be0a.1029.75c8@mx.google.com> Resent-Message-ID: <200904261810.n3QIA1El088215@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 134021 >Category: ports >Synopsis: [NEW PORT] security/py25-sslstrip: Python program for ssl stripping >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Sun Apr 26 18:10:01 UTC 2009 >Closed-Date: >Last-Modified: >Originator: Matt Donovan >Release: FreeBSD 7.1-RELEASE-p4 i386 >Organization: >Environment: System: FreeBSD njord.localdomain 7.1-RELEASE-p4 FreeBSD 7.1-RELEASE-p4 #0: Sun Mar 22 12:35:36 UTC 2009 >Description: It will transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects, then map those links into either look-alike HTTP links or homograph-similar HTTPS links. It also supports modes for supplying a favicon which looks like a lock icon, selective logging, and session denial. WWW: http://www.thoughtcrime.org/software/sslstrip/ Generated with FreeBSD Port Tools 0.77 >How-To-Repeat: >Fix: --- py25-sslstrip-0.2.shar begins here --- # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # sslstrip # sslstrip/Makefile # sslstrip/distinfo # sslstrip/pkg-descr # sslstrip/pkg-plist # sslstrip/files # sslstrip/files/patch-setup.py # echo c - sslstrip mkdir -p sslstrip > /dev/null 2>&1 echo x - sslstrip/Makefile sed 's/^X//' >sslstrip/Makefile << 'f9149b09d4ea5851260faaa84cff5251' X# New ports collection makefile for: sslstrip X# Date created: 2009-04-17 X# Whom: User & <dragon@njord.localdomain> X# X# $FreeBSD$ X# X XPORTNAME= sslstrip XPORTVERSION= 0.2 XCATEGORIES= security XMASTER_SITES= http://www.thoughtcrime.org/software/sslstrip/ XPKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} XDISTNAME= ${PORTNAME}-${PORTVERSION} X XMAINTAINER= kitchetech@gmail.com XCOMMENT= Python program for ssl stripping X XUSE_PYTHON= yes XUSE_PYDISTUTILS= yes XPYDISTUTILS_PKGNAME= sslstrip X X.include <bsd.port.mk> f9149b09d4ea5851260faaa84cff5251 echo x - sslstrip/distinfo sed 's/^X//' >sslstrip/distinfo << 'd73df4de07798ffb52784fd27a9f5c89' XMD5 (sslstrip-0.2.tar.gz) = 2dc5fc2d3c081c9065fca0cdd311576b XSHA256 (sslstrip-0.2.tar.gz) = 18e319abfd26e12fbed8205947bcaa14e9adb886be2a4e1efb33577039875aac XSIZE (sslstrip-0.2.tar.gz) = 22335 d73df4de07798ffb52784fd27a9f5c89 echo x - sslstrip/pkg-descr sed 's/^X//' >sslstrip/pkg-descr << '0371f316f78a8992c7065a3882b1afa3' XIt will transparently hijack HTTP traffic Xon a network, watch for HTTPS links and redirects, then map those links Xinto either look-alike HTTP links or homograph-similar HTTPS links. It Xalso supports modes for supplying a favicon which looks like a lock icon, Xselective logging, and session denial. X X XWWW: http://www.thoughtcrime.org/software/sslstrip/ 0371f316f78a8992c7065a3882b1afa3 echo x - sslstrip/pkg-plist sed 's/^X//' >sslstrip/pkg-plist << '6c519efc9509738b654e52ead59c222a' Xbin/sslstrip X%%PYTHON_SITELIBDIR%%/sslstrip/CookieCleaner.py X%%PYTHON_SITELIBDIR%%/sslstrip/CookieCleaner.pyc X%%PYTHON_SITELIBDIR%%/sslstrip/CookieCleaner.pyo X%%PYTHON_SITELIBDIR%%/sslstrip/DataShuffler.py X%%PYTHON_SITELIBDIR%%/sslstrip/DataShuffler.pyc X%%PYTHON_SITELIBDIR%%/sslstrip/DataShuffler.pyo X%%PYTHON_SITELIBDIR%%/sslstrip/RetrySecureException.py X%%PYTHON_SITELIBDIR%%/sslstrip/RetrySecureException.pyc X%%PYTHON_SITELIBDIR%%/sslstrip/RetrySecureException.pyo X%%PYTHON_SITELIBDIR%%/sslstrip/SSLDataShuffler.py X%%PYTHON_SITELIBDIR%%/sslstrip/SSLDataShuffler.pyc X%%PYTHON_SITELIBDIR%%/sslstrip/SSLDataShuffler.pyo X%%PYTHON_SITELIBDIR%%/sslstrip/SSLShuffleSocket.py X%%PYTHON_SITELIBDIR%%/sslstrip/SSLShuffleSocket.pyc X%%PYTHON_SITELIBDIR%%/sslstrip/SSLShuffleSocket.pyo X%%PYTHON_SITELIBDIR%%/sslstrip/SecureLinkListener.py X%%PYTHON_SITELIBDIR%%/sslstrip/SecureLinkListener.pyc X%%PYTHON_SITELIBDIR%%/sslstrip/SecureLinkListener.pyo X%%PYTHON_SITELIBDIR%%/sslstrip/ShuffleSocket.py X%%PYTHON_SITELIBDIR%%/sslstrip/ShuffleSocket.pyc X%%PYTHON_SITELIBDIR%%/sslstrip/ShuffleSocket.pyo X%%PYTHON_SITELIBDIR%%/sslstrip/__init__.py X%%PYTHON_SITELIBDIR%%/sslstrip/__init__.pyc X%%PYTHON_SITELIBDIR%%/sslstrip/__init__.pyo X%%DATADIR%%/COPYING X%%DATADIR%%/README X%%DATADIR%%/lock.ico X@dirrm %%DATADIR%% X@dirrm %%PYTHON_SITELIBDIR%%/sslstrip 6c519efc9509738b654e52ead59c222a echo c - sslstrip/files mkdir -p sslstrip/files > /dev/null 2>&1 echo x - sslstrip/files/patch-setup.py sed 's/^X//' >sslstrip/files/patch-setup.py << '78825a01de4c600f80cd12edea8aad98' X--- setup.py.orig 2009-04-24 10:19:32.000000000 -0400 X+++ setup.py 2009-04-24 10:19:45.000000000 -0400 X@@ -5,7 +5,7 @@ X shutil.copyfile("sslstrip.py", "sslstrip/sslstrip") X X setup (name = 'sslstrip', X- version = '0.1', X+ version = '0.2', X description = 'A MITM tool that implements Moxie Marlinspike\'s HTTPS stripping attacks.', X author = 'Moxie Marlinspike', X author_email = 'moxie@thoughtcrime.org', 78825a01de4c600f80cd12edea8aad98 exit --- py25-sslstrip-0.2.shar ends here --- >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?49f49bfd.0405be0a.1029.75c8>