Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 22 Nov 2016 12:30:57 +0000 (UTC)
From:      Alexey Dokuchaev <danfe@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r426820 - head/net-mgmt/p0f
Message-ID:  <201611221230.uAMCUv4t029480@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: danfe
Date: Tue Nov 22 12:30:56 2016
New Revision: 426820
URL: https://svnweb.freebsd.org/changeset/ports/426820

Log:
  - Restore link to Lance Spitzner's article (2002 Honeynet Project version)
  - Remove nowadays defunct www.infoworld.com link (missed in r426160)
  
  Submitted by:	Royce Williams

Modified:
  head/net-mgmt/p0f/pkg-descr

Modified: head/net-mgmt/p0f/pkg-descr
==============================================================================
--- head/net-mgmt/p0f/pkg-descr	Tue Nov 22 12:23:04 2016	(r426819)
+++ head/net-mgmt/p0f/pkg-descr	Tue Nov 22 12:30:56 2016	(r426820)
@@ -4,12 +4,13 @@ enough information to identify the opera
 scanners such as nmap and QueSO, p0f does not send anything to the host
 being identified.
 
+For more information, refer to Lance Spitzner's old paper about passive OS
+fingerprinting: http://old.honeynet.org/papers/finger/.
+
 Use of this program requires read access to the packet filtering device,
 typically /dev/bpf0.  Granting such access allows the users who have it to
 put your Ethernet device into promiscuous mode and sniff your network.
-
-See http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
-if you do not understand how this can be harmful.  Running p0f with no
-options will cause it to analyze packets intended for other hosts.
+Running p0f with no options will cause it to analyze packets intended for
+other hosts.
 
 WWW: http://lcamtuf.coredump.cx/p0f3/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201611221230.uAMCUv4t029480>