Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 8 Oct 2012 08:13:05 +0000 (UTC)
From:      Sofian Brabez <sbz@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r305520 - head/security/dsniff
Message-ID:  <201210080813.q988D5pK060799@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: sbz
Date: Mon Oct  8 08:13:05 2012
New Revision: 305520
URL: http://svn.freebsd.org/changeset/ports/305520

Log:
  - Convert to new option framework
  - Add LICENSE
  - Update MASTER_SITES
  - Update pkg-descr

Modified:
  head/security/dsniff/Makefile   (contents, props changed)
  head/security/dsniff/pkg-descr   (contents, props changed)

Modified: head/security/dsniff/Makefile
==============================================================================
--- head/security/dsniff/Makefile	Mon Oct  8 07:47:13 2012	(r305519)
+++ head/security/dsniff/Makefile	Mon Oct  8 08:13:05 2012	(r305520)
@@ -1,28 +1,31 @@
-# New ports collection makefile for:	dsniff
-# Date created:		08 Jan 2000
-# Whom:			kris@FreeBSD.org
-#
+# Created by: kris@FreeBSD.org
 # $FreeBSD$
-#
 
 PORTNAME=	dsniff
 PORTVERSION=	2.3
 PORTREVISION=	4
 CATEGORIES=	security
-MASTER_SITES=	http://naughty.monkey.org/~dugsong/dsniff/
+MASTER_SITES=	http://www.monkey.org/~dugsong/${PORTNAME}/ \
+		LOCAL/sbz
 
 MAINTAINER=	sbz@FreeBSD.org
 COMMENT=	Various sniffing utilities for penetration testing
 
+LICENSE=	BSD
+
 BUILD_DEPENDS=	${LIBNET_CONFIG}:${PORTSDIR}/net/libnet10 \
 		${LOCALBASE}/lib/libnids.a:${PORTSDIR}/net/libnids
 
 GNU_CONFIGURE=	yes
 WANT_GNOME=	yes
 
-OPTIONS=	X11 "Enable X11 support" on
+OPTIONS_DEFINE=	X11
+
+OPTIONS_DEFAULT=	X11
+
+.include <bsd.port.options.mk>
 
-MAN8=		arpspoof.8 dsniff.8 macof.8 mailsnarf.8 tcpkill.8 \
+MAN8=		arpspoof.8 ${PORTNAME}.8 macof.8 mailsnarf.8 tcpkill.8 \
 		tcpnice.8 urlsnarf.8 filesnarf.8 dnsspoof.8 msgsnarf.8 \
 		sshmitm.8 webmitm.8
 
@@ -41,7 +44,7 @@ LIBNIDS_GLIB2!=	nm -u ${LOCALBASE}/lib/l
 USE_GNOME+=	glib20
 .endif
 
-.if !defined(WITHOUT_X11)
+.if empty(PORT_OPTIONS:MX11)
 USE_XORG=	x11 xmu
 PLIST_SUB+=	X11=''
 MAN8+=		webspy.8

Modified: head/security/dsniff/pkg-descr
==============================================================================
--- head/security/dsniff/pkg-descr	Mon Oct  8 07:47:13 2012	(r305519)
+++ head/security/dsniff/pkg-descr	Mon Oct  8 08:13:05 2012	(r305520)
@@ -1,26 +1,9 @@
-Various tools for network penetration testing. Please do not abuse them.
-
-arpspoof     redirect packets from a target host (or all hosts) on the LAN
-             intended for another host on the LAN by forging ARP replies.
-dnsspoof     forge replies to arbitrary DNS address / pointer queries on
-             the LAN.
-dsniff       simple password sniffer.
-filesnarf    saves selected files sniffed from NFS traffic in the current
-             working directory.
-macof        flood the local network with random MAC addresses.
-mailsnarf    a fast and easy way to violate the Electronic Communications
-             Privacy Act of 1986 (18 USC 2701-2711), be careful.
-msgsnarf     record selected messages from sniffed AOL Instant Messenger,
-             ICQ 2000, IRC, and Yahoo! Messenger chat sessions.
-sshmitm      SSH monkey-in-the-middle.
-tcpkill      kills specified in-progress TCP connections.
-tcpnice      slow down specified TCP connections via "active" traffic
-             shaping.
-urlsnarf     output all requested URLs sniffed from HTTP traffic in CLF
-             (Common Log Format, used by almost all web servers), suitable
-             for offline post-processing
-webmitm      HTTP / HTTPS monkey-in-the-middle.
-webspy       sends URLs sniffed from a client to your local Netscape
-             browser for display, a fun party trick
+dsniff is a collection of tools for network auditing and penetration testing.
+dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor
+a network for interesting data (passwords, e-mail, files, etc.). arpspoof,
+dnsspoof, and macof facilitate the interception of network traffic normally
+unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm
+implement active monkey-in-the-middle attacks against redirected SSH and HTTPS
+sessions by exploiting weak bindings in ad-hoc PKI.
 
 WWW: http://www.monkey.org/~dugsong/dsniff/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201210080813.q988D5pK060799>