Date: Sun, 4 May 2003 18:19:09 GMT From: Yonatan@xpert.com To: FreeBSD-gnats-submit@FreeBSD.org Subject: ports/51751: New port: security/ike-scan IKE scanner and identifier Message-ID: <200305041819.h44IJ9l99856@node-110.xpert.com> Resent-Message-ID: <200305041520.h44FKEGk069163@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 51751 >Category: ports >Synopsis: New port: security/ike-scan IKE scanner and identifier >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Sun May 04 08:20:11 PDT 2003 >Closed-Date: >Last-Modified: >Originator: Yonatan@xpert.com >Release: FreeBSD 4.8-RC i386 >Organization: >Environment: System: FreeBSD Temujin 4.8-RC FreeBSD 4.8-RC #1: Sat Apr 12 03:02:22 GMT 2003 root@Temujin:/usr/obj/usr/src/sys/TEMUJIN-G i386 >Description: New security tool. portlint is happy. This is the first time I feed https to fetch. I haven't checked it with different PREFIXes, so I don't know if it's configure is doing it's magic. >How-To-Repeat: N/A >Fix: --- ike-scan.shar begins here --- # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # . # ./pkg-plist # ./Makefile # ./distinfo # ./pkg-descr # echo c - . mkdir -p . > /dev/null 2>&1 echo x - ./pkg-plist sed 's/^X//' >./pkg-plist << 'END-of-./pkg-plist' X@comment $FreeBSD$ Xbin/ike-scan Xshare/ike-scan/ike-backoff-patterns X%%PORTDOCS%%share/doc/ike-scan/AUTHORS X%%PORTDOCS%%share/doc/ike-scan/COPYING X%%PORTDOCS%%share/doc/ike-scan/NEWS X%%PORTDOCS%%share/doc/ike-scan/README X%%PORTDOCS%%share/doc/ike-scan/TODO X%%PORTDOCS%%share/doc/ike-scan/udp-backoff-fingerprinting-paper.txt X%%PORTDOCS%%@dirrm share/doc/ike-scan X@dirrm share/ike-scan END-of-./pkg-plist echo x - ./Makefile sed 's/^X//' >./Makefile << 'END-of-./Makefile' X# Ports collection makefile for: ike-scan X# Date created: 04 May 2003 X# Whom: Yonatan <Yonatan@xpert.com> X# X# $FreeBSD$ X# X XPORTNAME= ike-scan XPORTVERSION= 1.0 XCATEGORIES= security XMASTER_SITES= https://berlin.ccc.de/~cryx/ X XMAINTAINER= Yonatan@xpert.com XCOMMENT= VPN scanner and identifier X XHAS_CONFIGURE= yes XCONFIGURE_ARGS+= "--datadir=${DATADIR}" X Xpost-install: X. if !defined(NOPORTDOCS) X ${MKDIR} ${DOCSDIR} X. for i in AUTHORS COPYING NEWS README TODO udp-backoff-fingerprinting-paper.txt X ${INSTALL_DATA} ${WRKSRC}/$i ${DOCSDIR} X. endfor X. endif X X.include <bsd.port.mk> END-of-./Makefile echo x - ./distinfo sed 's/^X//' >./distinfo << 'END-of-./distinfo' XMD5 (ike-scan-1.0.tar.gz) = 7299777c7d67d1cea82d9594867b4806 END-of-./distinfo echo x - ./pkg-descr sed 's/^X//' >./pkg-descr << 'END-of-./pkg-descr' Xike-scan discovers IKE hosts and can also fingerprint them using the Xretransmission backoff pattern. Xike-scan does two things: Xa) Discovery: Determine which hosts are running IKE. X This is done by displaying those hosts which respond to the IKE requests X sent by ike-scan. Xb) Fingerprinting: Determine which IKE implementation the hosts are using. X This is done by recording the times of the IKE response packets from the X target hosts and comparing the observed retransmission backoff pattern X against known patterns. X XWWW: http://www.nta-monitor.com/ike-scan END-of-./pkg-descr exit --- ike-scan.shar ends here --- >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200305041819.h44IJ9l99856>