* Changes in zebra-0.92a
* Changes in bgpd
** Fix "^$" community list bug.
** Below command's Address Family specific configurations are added
nexthop-self
route-reflector-client
route-server-client
soft-reconfiguration inbound
* Changes in zebra
** Treat kernel type routes as EGP routes.
is moved over.
New to 1.8.1
* SNMP Alerts
* IDMEF XML output
* Limited wildcard regex support
* New normalization mode for http_decode
* many bug fixes
OpenBSD port changes:
FLAVOR=snmp now works
vtysh now works
Also, OpenBD specific fixes not listed below include a patch to correctly
get all interfaces from the kernel.
Changelog from e-mail:
* Changes in zebra-0.92
** Overall security is improved. Default umask is 0077.
* Changes in ripd
** If output interface is in simple password authentication mode,
substruct one from rtemax.
* Changes in bgpd
** IPv4 multicast and IPv6 unicast configuration is changed to so
called new config. All of AFI and SAFI specific configuration is
moved to "address-family" node. When you have many IPv6 only
configuration, you will see many "no neighbor X:X::X:X activate" line
in your configuration to disable IPv4 unicast NLRI exchange. In that
case please use "no bgp default ipv4-unicast" command to suppress the
output. Until zebra-0.93, old config is still left for compatibility.
Old config
==========
router bgp 7675
bgp router-id 10.0.0.1
redistribute connected
network 192.168.0.0/24
neighbor 10.0.0.2 remote-as 7675
ipv6 bgp network 3ffe:506::/33
ipv6 bgp network 3ffe:1800:e800::/40
ipv6 bgp aggregate-address 3ffe:506::/32
ipv6 bgp redistribute connected
ipv6 bgp neighbor 3ffe:506:1000::2 remote-as 1
New config
==========
router bgp 7675
bgp router-id 10.0.0.1
network 192.168.0.0/24
redistribute connected
neighbor 10.0.0.2 remote-as 7675
neighbor 3ffe:506:1000::2 remote-as 1
no neighbor 3ffe:506:1000::2 activate
!
address-family ipv6
network 3ffe:506::/33
network 3ffe:1800:e800::/40
aggregate-address 3ffe:506::/32
redistribute connected
neighbor 3ffe:506:1000::2 activate
exit-address-family
* Changes in ospfd
** Internal interface treatment is changed. Now ospfd can handle
multiple IP address for an interface.
** Redistribution of loopback interface's address works fine.
--
State Threads is an application library which provides a foundation
for writing fast and highly scalable Internet Applications on
UNIX-like platforms. It combines the simplicity of the multithreaded
programming paradigm, in which one thread supports each simultaneous
connection, with the performance and scalability of an event-driven
state machine architecture.
WWW: http://oss.sgi.com/projects/state-threads/
Submitted by Patroklos Argyroudis <argp@bsd.gr>
Submitted by Patroklos Argyroudis <argp@bsd.gr>.
ctrace is an IPv4 traceroute tool that supports many features missing
in standard 4.3BSD traceroute(8). It is programmed entirely in perl.
The more traditional traceroute(8) sends out either UDP or ICMP ECHO
packets with a TTL of one, and increments the TTL until the destination
has been reached. By printing the gateways that generate ICMP time
exceeded messages along the way, it is able to determine the path
packets are taking to reach the destination.
The problem is that with the widespread use of firewalls on the modern
Internet, many of the packets that traceroute(8) sends out end up being
filtered, making it impossible to completely trace the path to the
destination. However, in many cases, these firewalls will permit inbound
TCP packets to specific ports that hosts sitting behind the firewall are
listening for connections on. By sending out TCP SYN packets instead of
UDP or ICMP ECHO packets, tcptraceroute is able to bypass the most common
firewall filters.
rain is powerful tool for testing stability of hardware and
software utilizing IP protocols. It offers its users the
capability of creating their own packets with a wide variety
of command line options.
WWW: http://www.tenebrous.com/rain/
MAINTAINER= Joshua Stein <jcs@rt.fm>
--
Cisco's TACACS+ Server
TACACS+ is used for authentication, authorization, and accounting
on Cisco routers. This daemon provides a server for TACACS+ routers.
WWW: http://www.gazi.edu.tr/tacacs/
MAINTAINER= Jeff Bachtel <jeff@cepheid.org>
+ lots of additional mods
+ pvalchev@ helped
+ lebel@ reviewed
From Changelog:
* added new IP defragmenter, spp_frag2
* added new stateful inspection/tcp stream reassembly plugin, spp_stream4
* Snort can now statefully detect ECN traffic (less false alarms)
* stream4 can now keep session statistics in a "session.log" file
* added new high-speed unified binary output system, spo_unified
* added new data structs/management for tag code
* added -k switch to tune checksum verification behavior
* added -z switch to provide stateful verification of alerts
* modified bahavior of http_decode, now only alerts once per packet
* added unique Snort ID's to every Snort rule, plus generator, revision
and event ID info to each alert
* detection engine only alerts once per packet now, tcp stream code doesn't
generate another alert packet if a previous one already alerted for that
stream
* fixed signal handling on svr4 systems
* added enhanced cross reference printout to full/fast/syslog alert modes
* added new high speed checksum verification (on x86) routines
* added new ARP spoof detection preprocessor from Jeff
Nathan <jeff@wwti.com>
* * *
Xprobe is a tool automating the X logic.
X is a logic developed from the various Active Operating System
Fingerprinting methods discovered during the "ICMP Usage In
Scanning" research project.
http://www.sys-security.com/
- Bump VERSION
- Fixes MASTER_SITES
- New ssl flavor
- New Maintainer
- Remove po patches
- Add patch for text-based xchat
Permission granted by original maintainer : Couderc Damien <couderc.damien@wanadoo.fr>
---
Net::IPv4Addr provides functions for parsing IPv4 addresses both
in traditional address/netmask format and in the new CIDR format.
There are also methods for calculating the network and broadcast
address and also to see check if a given address is in a specific
network.
+ now with OpenBSD "plug-in" support
eg.
banshee v 1.1 -- They kill without discretion...
dummy v 1.0 -- Dummy plugin. It does nothing !
leech v 1.6 -- Isolate a host from the LAN
lurker v 1.3 -- Try to search for other ettercap
ooze v 1.4 -- Ping a host.
shadow v 1.8 -- A very simple SYN/TCP port scanner
spectre v 1.1 -- Flood a switched LAN with random MAC addresses
triton v 1.3 -- Try to discover the LAN's gateway
Changes:
o fixed two file descriptor leaks in ftpcopy. (Spotted by Matthias
Andree)
o added --bps option to ftpcopy.
o ftpcopy and ftpls now work with the runsocks program from the
socks5 reference implementation. See the FAQ.
o ftpcopy and ftpls now have a --timeout option to set the timeout
used during the connection.
o ftpcopy now has a --tolower option, causing it to change all
local file and directory names to lowercase. Note: you'll
possibly want to read the manual page before you use this
option.
o ftpls can make recursive directory listings. Use the --recursive
option for this.
o don't allow the FTP server do redirect PASV to other hosts or
ports below 1024 (with the exception of port 20).
o temporary files are created in the target directory.
The purpose of OpRoute is to attempt to establish a
*generalized* measurement system which takes into
account all of the factors that are usually considered
to be important when it comes to performance.
Specifically:
- Packet loss
- Latency
- Layer 3 Hops
- AS Hops
- NAP Hops
- Throughput (To be done, not in there yet)
MAINTAINER= Jason Peel <jsyn@nthought.com>
--
dlint analyzes any DNS zone you specify, and reports any problems
it finds by displaying errors and warnings. Then it descends
recursively to examine all zones below the given one (this can be
disabled with a command-line option). Designed for Unix, dlint
is written in Bourne Shell and Perl.
WWW: http://www.domtools.com/dns/dlint.shtml
Submitted by Jason Peel <jsyn@nthought.com>
The author seems to have dropped gettext and any NLS support.
Changes:
* Fix a minor bug that caused problems when sending files,
* Shows a warning when you run more than one clients with the same UIN,
* Fix a big that caused some messages not to appear in history,
* Manual page included in the package - centericq(1),
* An ability to turn off local mailbox checking was added.
--
Balance is a simple but powerful generic tcp proxy with round robin
load balancing and failover mechanisms. Its behaviour can be
controlled at runtime using a simple command line syntax.
The latest release now supports the definition of channel groups
and connection counting and handling boosting the power and versatility
of balance one big step further.
WWW: http://balance.sourceforge.net/
Submitted by Jason Peel <jsyn@nthought.com>
I am no longer the developer of the Nemesis Project.
This project is now developed by Jeff Nathan <jeff@wwti.com>
I will still remain the active maintainer of the OpenBSD port.
For those curious, details of WHY I have given up Nemesis and
the future direction of this project can be found here:
http://www.packetninja.net/nemesis_announcement.html
--
What is Gtk-Gnutella ?
Gtk-Gnutella is a clone of Gnutella (see gnutella.wego.com). It's
a Unix clone, and it needs GTK+ (1.2 or above). Gnome is not needed.
It is currently developed and tested under Linux (Redhat 6). It
is known to run at least on Linux and FreeBSD (on 80x86 machines).
It is released under the GNU Public License (GPL).
Is it finished ?
No. Currently it lacks all sharing support, as well as many other
(minor) features. But you should already be able to search for any
files you want and to download them.
Submitted by Flinn Mueller <flinn@activeintra.net>
From CHANGELOG
-- Added a whole bunch of new OS fingerprints (and adjustments)
ranging from big important ones (Linux 2.4.X, OpenBSD 2.9, FreeBSD
4.3, Cisco 12.2.1, MacOS X, etc) to some that are more obscure (
such as Apple Color LaserWriter 12/660 PS and VirtualAccess
LinxpeedPro 120 )
-- Added "All zeros" IP.ID sequence classification to account for the
new Linux 2.4 scheme which seems to use 0 whenever the DF bit is
set (probably a good idea).
-- Tweaked TCP Timestamp and IP.ID sequence classification algorithms
- move examples configuration into $PREFIX/share/examples/arpwatch
- move database to /var/arpwatch, create if needed
- update manpages to reflect new paths
- take MAINTAINER
- Install locale files.
- Use the gettext port rather than building the included one.
help from naddy@
Brief ChangeLog:
o Now it's possible to open a received URL with a browser directly;
controlled in the ~/.centericq/actions file.
o Cancelled messages are now being postponed for later editing.
o Substring search in history is implemented.
o QuickFind feature works in multiple contact selection mode as well
as in the contact list and is case insensitive.
Changes:
Added a Protocol State Machine for dissectors, the ability to
specify the rule "Log" to the filtering form, a Packet Factory to create
and send packets on the fly, support for multiple config files, code
cleanups, added the ability to launch plugins from connection list, a new
plugin named banshee, and enhancements in the protocol dissector for
SOCKS 5, IMAP, VNC, SMB, and MySQL.
- Contact list is now sorted by "who-last-send-an-event" criteria.
- Quickfind mode is available.
- Unsent messages counter on the top of screen has been added.
Kill a dead MASTER_SITE (found by naddy@) and add a new one in the US.
reviewed by naddy@
--
This is a simple Python script to register your dynamic IP address
using the NIC V2.0 protocol. We aim to be fully compliant with the
dyndns client specification.
--
BIND 9.1.2 is now available. This is a maintenance release, containing
fixes for a number of bugs in 9.1.1 but no new features. We recommend
that all users of earlier versions of BIND 9 upgrade to 9.1.2.
DNSSEC users should note that DNSSEC validation involving algorithms other
than RSA will not interoperate between this version of BIND and version
9.1.1 or older, because the older versions use an incorrect formula for
calculating key tags of non-RSA keys.
more syslogging of login failures so we have have more info on why.
patch-etcafpd-volumec
Update to partially resolve the current problem with afpd not behaving
correctly with permisions on /etc/netatalk.
Log correctly to /var/log/daemon when we can't access configuration files.
Put in place proper error checking when reading them. Would be nice if the
origional programmers actually checked for failure for anything.
People can now see just why things are not working as they like.
Mar 29 18:08:38 kashmir afpd[6210]: session from 39148.187:250 on
39148.169:129
Mar 29 18:08:38 kashmir afpd[6210]: login dingo (uid 1002, gid 10)
Mar 29 18:08:38 kashmir afpd[6210]: unable to access
/etc/netatalk/AppleVolumes.system: Permission denied
Mar 29 18:08:40 kashmir afpd[6210]: done
Mar 29 18:08:40 kashmir afpd[21593]: asp_chld 6210 done
Pass the CORRECT arguments to creatvol. from "Benninghoff, John"
<JABenninghoff@dainrauscher.com>
Return AFPERR_PARAM when we can't access configuration files to
the appleshare client requesting access. This stops possible DOS under
MacOS. In it's current form the Appleshare client has to be killed on the
MAC side by killing the "CHOOSER" Application. By returning proper errors
the appleshare client exits gracefully with error: "An Appleshare system
error occured."
patch-etcpapd-lpc
cosmetic change: remove an unused variable.
patch-version
changes made bump version.
--
From: maintainer
including AIM, ICQ, and Yahoo! Chat. It also has file transfers between
other Everybuddy users, and planned support for file transfers to other
users. From Josh Rivel <dorqus@bsdfreek.com>.
A curses-based textmode ICQ client implementation. It is a
fully featured client, can do things like file transfer. Has
the ability to associate sounds with different actions/evens
and play them through a sound card, as well as the standart
beeping.
Things like colors are not hard-coded in the program itself,
but can be set in the corresponding config files
--
New dissectors include SUA Light, HCLNFSD, Rquota. Many other dissectors were
updated and bug-fixed. The wiretap library can now read Etherpeek files,
and write NetMon 2.x files. Capture filters and display filters are kept in
separate dialogues/files to help minimize confusion. A new "Decode As"
feature allows some run-time configuration of which dissectors are called
for a particular packet. You can now click on a byte in the hex dump and the
appropriate field in the protocol tree will be selected. The display filter
code was re-written, and some syntax changed (esp. for boolean variables).
Submitted by Wangden Kelsang <wngdn@src.uchicago.edu>.
Nslint reads the (BIND) nameserver configuration files and performs
a number of consistency checks on the dns records. Nslint is known
to work with BIND versions 4, 8, and 9.
This port had no real name associated with the listed address. When
trying to reach this person, the mail bounces. It also appears from
the logs that this person hasn't been maintaining this.
Sirc is an Internet Relay Chat programmable client written in
perl and C. It has a main perl script that can be run in 'dumb'
mode, standalone, and a separate split-screen front end in C,
called ssfe.
Sing is a little tool that sends ICMP packets fully customized from
command line. The main purpose is to replace/complement the niceful
ping command with certain enhancements as:
o Send fragmented packets.
o Send monster packets > 65534.
o Send/read spoofed packets.
o Send many ICMP Information types in addition to the ECHO REQUEST
type sent by default as Address Mask Request, Timestamp, Information
Request, Router Solicitation and Router Advertisement.
o Send many ICMP error types: Redirect, Source Quench, Time Exceeded,
Destination Unreach and Parameter Problem.
o Send to host with Loose or Strict Source Routing.
o Use little fingerprinting techniques to discover Window$ or Solaris
boxes.
o Send ICMP packets emulating certain OS: Cisco, Solaris, Linux, Shiva,
Unix and Window$ at the moment.
Angst provides methods for aggressive sniffing on switched
local area network environments.
It dumps the payload of all the TCP packets received on the
specified ports. Moreover, it implements methods for active
sniffing. Angst currently provides two active sniffing methods.
The first monitors ARP requests, and after enabling IP
forwarding on the local host, sends ARP replies mapping all IPs
to the local MAC address. The second method floods the local
network with random MAC addresses (like macof v1.1 by Ian Vitek),
causing switches to send packets to all ports. Made just for
testing purposes and fun. If you compile it on any other
platform except the ones listed below, please contact me at the
above email address. As always, published under a BSD style
license, see the included LICENSE file.
Changes: This version responds differently to *-class queries, and
to AXFR requests, to placate a few broken clients. The servers now
log ``starting'' messages.
--
tcpstat reports certain network interface statistics much like
vmstat does for system statistics. tcpstat gets its information by
either monitoring a specific interface, or by reading previously
saved tcpdump data from a file.