From owner-cvs-ports@FreeBSD.ORG Wed Apr 27 17:42:00 2011 Return-Path: Delivered-To: cvs-ports@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 58A70106566C; Wed, 27 Apr 2011 17:42:00 +0000 (UTC) (envelope-from skreuzer@FreeBSD.org) Received: from repoman.freebsd.org (repoman.freebsd.org [IPv6:2001:4f8:fff6::29]) by mx1.freebsd.org (Postfix) with ESMTP id 49C378FC08; Wed, 27 Apr 2011 17:42:00 +0000 (UTC) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.14.4/8.14.4) with ESMTP id p3RHg0gn084482; Wed, 27 Apr 2011 17:42:00 GMT (envelope-from skreuzer@repoman.freebsd.org) Received: (from skreuzer@localhost) by repoman.freebsd.org (8.14.4/8.14.4/Submit) id p3RHg03x084481; Wed, 27 Apr 2011 17:42:00 GMT (envelope-from skreuzer) Message-Id: <201104271742.p3RHg03x084481@repoman.freebsd.org> From: Steven Kreuzer Date: Wed, 27 Apr 2011 17:42:00 +0000 (UTC) To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org X-FreeBSD-CVS-Branch: HEAD Cc: Subject: cvs commit: ports/security Makefile ports/security/arpCounterattack Makefile distinfo pkg-descr pkg-plist ports/security/arpCounterattack/files arpCounterattack.in pkg-message.in X-BeenThere: cvs-ports@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: CVS commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 27 Apr 2011 17:42:00 -0000 skreuzer 2011-04-27 17:42:00 UTC FreeBSD ports repository Modified files: security Makefile Added files: security/arpCounterattack Makefile distinfo pkg-descr pkg-plist security/arpCounterattack/files arpCounterattack.in pkg-message.in Log: arpCounterattack is a program for detecting and remedying "ARP attacks." It monitors traffic on any number of Ethernet interfaces and examines ARP replies and gratuitous ARP requests. If it notices an ARP reply or gratuitous ARP request that is in conflict with its notion of "correct" Ethernet/IP address pairs, it logs the attack if logging is enabled, and, if the Ethernet interface that the attack was seen on is is configured as being in aggressive mode, it sends out a gratuitous ARP request and a gratuitous ARP reply with the "correct" Ethernet/IP address pair in an attempt to reset the ARP tables of hosts on the local network segment. The corrective gratuitous ARP request and corrective gratuitous ARP reply can be sent from an Ethernet interface other than the one that the attack was seen on. WWW: http://acm.poly.edu/wiki/ARP_Counterattack PR: ports/151973 Submitted by: Boris Kochergin Revision Changes Path 1.1166 +1 -0 ports/security/Makefile 1.1 +32 -0 ports/security/arpCounterattack/Makefile (new) 1.1 +2 -0 ports/security/arpCounterattack/distinfo (new) 1.1 +44 -0 ports/security/arpCounterattack/files/arpCounterattack.in (new) 1.1 +11 -0 ports/security/arpCounterattack/files/pkg-message.in (new) 1.1 +15 -0 ports/security/arpCounterattack/pkg-descr (new) 1.1 +6 -0 ports/security/arpCounterattack/pkg-plist (new)