Date: Tue, 22 Nov 2016 12:30:57 +0000 (UTC) From: Alexey Dokuchaev <danfe@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r426820 - head/net-mgmt/p0f Message-ID: <201611221230.uAMCUv4t029480@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: danfe Date: Tue Nov 22 12:30:56 2016 New Revision: 426820 URL: https://svnweb.freebsd.org/changeset/ports/426820 Log: - Restore link to Lance Spitzner's article (2002 Honeynet Project version) - Remove nowadays defunct www.infoworld.com link (missed in r426160) Submitted by: Royce Williams Modified: head/net-mgmt/p0f/pkg-descr Modified: head/net-mgmt/p0f/pkg-descr ============================================================================== --- head/net-mgmt/p0f/pkg-descr Tue Nov 22 12:23:04 2016 (r426819) +++ head/net-mgmt/p0f/pkg-descr Tue Nov 22 12:30:56 2016 (r426820) @@ -4,12 +4,13 @@ enough information to identify the opera scanners such as nmap and QueSO, p0f does not send anything to the host being identified. +For more information, refer to Lance Spitzner's old paper about passive OS +fingerprinting: http://old.honeynet.org/papers/finger/. + Use of this program requires read access to the packet filtering device, typically /dev/bpf0. Granting such access allows the users who have it to put your Ethernet device into promiscuous mode and sniff your network. - -See http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml -if you do not understand how this can be harmful. Running p0f with no -options will cause it to analyze packets intended for other hosts. +Running p0f with no options will cause it to analyze packets intended for +other hosts. WWW: http://lcamtuf.coredump.cx/p0f3/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201611221230.uAMCUv4t029480>