From owner-freebsd-ports-bugs@freebsd.org Wed May 3 21:19:50 2017 Return-Path: Delivered-To: freebsd-ports-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9DADAD5B06B for ; Wed, 3 May 2017 21:19:50 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 8D2C0C34 for ; Wed, 3 May 2017 21:19:50 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id v43LJo2A009187 for ; Wed, 3 May 2017 21:19:50 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 219053] update net/spoofer to 1.2.0 Date: Wed, 03 May 2017 21:19:50 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: mjl@luckie.org.nz X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-ports-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter attachments.created Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 03 May 2017 21:19:50 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D219053 Bug ID: 219053 Summary: update net/spoofer to 1.2.0 Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: freebsd-ports-bugs@FreeBSD.org Reporter: mjl@luckie.org.nz Created attachment 182289 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D182289&action= =3Dedit update spoofer to 1.2.0 Update the spoofer system from 1.0.5 to 1.2.0. Changelog from https://www.caida.org/projects/spoofer/downloads/changelog.txt spoofer-1.2.0 (2017-03-30) ------------- * Added ingress testing, i.e. testing whether spoofed packets from an outsi= de network can reach the Spoofer client. * Added IPv6 traceroute probing. * Some settings that were requested in the binary installer are now request= ed in the UI, but only if they're not already set from a previous installati= on. * Windows binary installer defaults to installing in the same directory as a previous installation, if there was one (affects only users who installed in a custom location). * If Windows or OSX binary installer fails, it will restore the previously installed version of spoofer if it is >=3D 1.2.0. * spoofer-scheduler: added options --save-settings, --restore-settings, --delete-settings, and --delete-data * Fixed crash when both traceroute and scamper are missing (affects only source builds, since binary releases include scamper) * Fixed: on some platforms, spoofer prober 1.1.0 would report "ERROR: pcap_sendpacket: send: Invalid argument" and then not run the tests. * The scheduler will automatically kill the prober in the unlikely event th= at the prober hangs. spoofer-1.1.0 (2016-12-16) ------------- * Prober works much faster by probing multiple targets in parallel. * Prober uses scamper instead of traceroute if possible; binary Spoofer releases include a bundled scamper binary. * Improved display: - displays total progress, not just progress within current stage - GUI progress area is fixed size, so other elements don't jump around - GUI result history is updated in real time while a test is running; new data is highlighted briefly when first displayed * Installer for Windows configures Windows Firewall. * Added --dump-settings option to scheduler. * Fixed a fatal problem in layer 2 probing on platforms with unusual interfaces (due to undocumented pcap behavior). * Better detection of an HTTP server or proxy intercepting connection to spoofer server. * Other minor fixes. spoofer-1.0.8 (2016-10-31) ------------- * Fixed a build error on some platforms when building from source. If you have a binary release of 1.0.7 or have successfully built 1.0.7 from sour= ce, there is no need to upgrade. spoofer-1.0.7 (2016-10-28) ------------- * Fixed probe payload formatting issue in version 1.0.6 that occasionally caused a test result to be "unknown" instead of "blocked". * Improved handling of socket errors on Windows. * Improved handling of installation errors on MacOS. spoofer-1.0.6 (2016-10-14) ------------- * Fixed problem with stale lock files on OSX that prevented the scheduler f= rom starting, which manifested in the UI as 'Critical: There is no scheduler running using settings in "..." ("schedulerSocketName" is not set).' * Fixed: prober could run earlier than expected if proberInterval ("Wait to run a test after a successful run on the same network") was set to 50 days or more. * Portability fixes for building from source: - Builds automatically on platforms that have qtchooser installed (previously required QT_SELECT or QMAKE to be set correctly). - Builds automatically on systems with libprotobuf but not libprotobuf-li= te (previously required --with-protobuf-heavy option). - Fixed build error on platforms without libpcap. * Fixed race condition in writing settings when multiple schedulers were started simultaneously. * Other minor fixes. --=20 You are receiving this mail because: You are the assignee for the bug.=