Date: Sun, 07 Aug 2005 01:26:50 +0600 From: SeaD <sead@mail.ru> To: FreeBSD-gnats-submit@FreeBSD.org Subject: ports/84627: new port: security/ipguard - Tool designed to protect LAN IP adress space by ARP spoofing Message-ID: <E1E1UJm-000Abu-00.sead-mail-ru@f13.mail.ru> Resent-Message-ID: <200508061930.j76JUA7n001510@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 84627 >Category: ports >Synopsis: new port: security/ipguard - Tool designed to protect LAN IP adress space by ARP spoofing >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Sat Aug 06 19:30:10 GMT 2005 >Closed-Date: >Last-Modified: >Originator: SeaD >Release: FreeBSD 4.10-RELEASE-p3 i386 >Organization: >Environment: System: FreeBSD deep.freeznet 4.10-RELEASE-p3 FreeBSD 4.10-RELEASE-p3 #0: Sun Oct 3 03:29:12 YEKST 2004 sead@deep.freeznet:/usr/local/src/obj/usr/local/src/system/sys/KDEEP i386 >Description: new port >How-To-Repeat: >Fix: # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # ipguard # ipguard/Makefile # ipguard/distinfo # ipguard/pkg-descr # ipguard/pkg-plist # ipguard/pkg-message # echo c - ipguard mkdir -p ipguard > /dev/null 2>&1 echo x - ipguard/Makefile sed 's/^X//' >ipguard/Makefile << 'END-of-ipguard/Makefile' X# New ports collection makefile for: ipguard X# Date created: 2 Aug 2005 X# Whom: SeaD X# X# $FreeBSD$ X# X# X# X XPORTNAME= ipguard XPORTVERSION= 0.04 XCATEGORIES= security net XMASTER_SITES= http://ipguard.deep.perm.ru/files/ X XMAINTAINER= sead@mail.ru XCOMMENT= Tool designed to protect LAN IP adress space by ARP spoofing X XBUILD_DEPENDS= ${LOCALBASE}/lib/libnet.a:${PORTSDIR}/net/libnet X XMAN8= ipguard.8 X Xdo-install: X ${INSTALL_PROGRAM} ${WRKSRC}/ipguard ${PREFIX}/sbin X ${INSTALL_MAN} ${WRKSRC}/doc/ipguard.8 ${MANPREFIX}/man/man8 X ${INSTALL_SCRIPT} ${WRKSRC}/doc/ipguard.sh.sample ${LOCALBASE}/etc/rc.d X Xpost-install: X @${CAT} ${PKGMESSAGE} X X X.include <bsd.port.mk> END-of-ipguard/Makefile echo x - ipguard/distinfo sed 's/^X//' >ipguard/distinfo << 'END-of-ipguard/distinfo' XMD5 (ipguard-0.04.tar.gz) = cba351c88ac281149dbfde5360d3c844 END-of-ipguard/distinfo echo x - ipguard/pkg-descr sed 's/^X//' >ipguard/pkg-descr << 'END-of-ipguard/pkg-descr' Xipguard listens network for ARP packets. All permitted MAC/IP pairs Xlisted in 'ethers' file. If it recieves one with MAC/IP pair, which is Xnot listed in 'ethers' file, it will send ARP reply with configured Xfake address. This will prevent not permitted host to work properly Xin this ethernet segment. Especially Windows(TM) hosts. X XAuthor SeaD <sead@mail.ru> XWWW: http://ipguard.deep.perm.ru/ END-of-ipguard/pkg-descr echo x - ipguard/pkg-plist sed 's/^X//' >ipguard/pkg-plist << 'END-of-ipguard/pkg-plist' Xsbin/ipguard Xetc/rc.d/ipguard.sh.sample END-of-ipguard/pkg-plist echo x - ipguard/pkg-message sed 's/^X//' >ipguard/pkg-message << 'END-of-ipguard/pkg-message' X X===> INSTALL NOTES: X Now create `ethers' file and put X where ipguard can find it. Default: /etc/ethers X X And then start ipguard: X (cd /usr/local/etc/rc.d X mv ipguard.sh.sample ipguard.sh X /usr/local/etc/rc.d/ipguard.sh start) END-of-ipguard/pkg-message exit >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E1E1UJm-000Abu-00.sead-mail-ru>