bluhm
42429978df
update scapy to 2.4.3
2020-08-21 18:38:12 +00:00
sthen
48b0b9660c
replace simple PERMIT_PACKAGE_CDROM=Yes with PERMIT_PACKAGE=Yes
2019-07-12 20:48:23 +00:00
sthen
53defd7102
remove more PKG_ARCH=* with pyc in PLIST
2019-04-27 23:55:04 +00:00
bluhm
c2ae19d8b7
In Scapy 2.4.2 probing for OpenBSD tcpdump is broken, so filters
...
for sniff() did not work. Apply patch from upstream.
OK sthen@ danj@
2019-04-24 21:27:26 +00:00
bluhm
e91458b811
Scapy 2.4.2 sends ARP requests with wrong MAC address. Apply patch
...
from upstream.
OK sthen@
2019-04-24 20:33:52 +00:00
bluhm
97afbe1d83
Update scapy to 2.4.2. Tests were removed from upstream package.
...
OK sthen@ danj@
2019-04-23 01:14:02 +00:00
bluhm
2f7b467f53
To sniff on OpenBSD loopback interface there was a patch from 2012.
...
In the meantime upstream has implemented it differently. Adapt
their version for OpenBSD and use it instead.
OK sthen@ danj@
2019-04-20 00:17:50 +00:00
bluhm
60eb5e4f49
Pull my fix in scapy bpf layer from upstream as a patch. This will
...
avoid a race in the OpenBSD regress tests.
Take maintainer.
OK danj@
2019-02-20 13:58:24 +00:00
danj
e5402649c1
Drop maintainership
2019-02-12 17:53:39 +00:00
bluhm
a8cb47d7cf
BPF filter did not work on i386. Calculate the BIOCSETF ioctl
...
constant for 32 bit architectures. This fixes a bunch of
/usr/src/regress tests.
ok danj@
2018-07-30 14:27:37 +00:00
sthen
a7e2e3a1e2
update to scapy-2.4.0, ok dlg@ danj@
...
v2.4.0 has Python 3 support, however we will need additional work
(in libdnet as well as this port) before we can enable that.
2018-07-08 16:30:57 +00:00
jasper
da873a607c
remove patches which are no longer needed now that Cryptodome replaced Crypto
2018-06-02 12:01:58 +00:00
jasper
0cb7556019
switch to py-cryptodome
...
ok danj@ (MAINTAINER)
2018-05-14 06:54:47 +00:00
bluhm
0aa9dfaece
When there is a locked MTU in the routing table, scapy gets confused
...
by the additional L. So be aware of this additional column in
read_routes().
ok danj@
2018-03-07 16:43:43 +00:00
bluhm
38a3b12d7b
Allow to switch the interface to promiscuous mode during sndrcv().
...
Call the sr...() functions with parameter promisc=1 for that. This
is needed for the src/sys/netinet/arp regress test and was backported
from secdev/scapy master at github.
OK danj@ (maintainer)
2016-12-09 16:40:11 +00:00
bluhm
c30ccc71ac
Put back an OpenBSD special code path that was lost in the scapy
...
2.3.3 update. Sniff the packets in sndrcv() like it is done on
FreeBSD and Darwin. Without this patch, everything worked with
virtual qemu. But on real ethernet hardware sr() sends TCP packets
to the broadcast MAC address as scapy did not see the ARP reply to
figure out the correct MAC address.
OK danj@ (maintainer)
2016-11-24 12:40:49 +00:00
danj
8656916232
Update to scapy-2.3.3 and take maintainership (no objection from
...
previous maintainer armani@)
tested by bluhm@
previous diff ok sthen@
2016-11-14 20:04:56 +00:00
sthen
96a0927c11
update to scapy-2.3.2, from Daniel Jakots, earlier version ok armani@
2016-01-31 23:21:37 +00:00
naddy
6bb8d0674b
Drop USE_GROFF from ports where the formatting differences are acceptable
...
or mandoc provides the more useful output.
2015-02-16 22:57:07 +00:00
naddy
570aa62a9c
Drop remaining MD5/RMD160/SHA1 checksums.
2015-01-18 03:12:39 +00:00
espie
eae66e4a7b
PERMIT_* / REGRESS->TEST sweep
2013-03-11 11:35:43 +00:00
bluhm
144304141e
Scapy did not handle the DLT_LOOP type that is used when sniffing
...
from OpenBSD loopback device. Add a new layer for that.
ok sthen@
2012-01-12 03:16:24 +00:00
espie
d0fa01c846
normalize pkgpath
2011-09-16 11:13:37 +00:00
jasper
88f8f0add6
bump after default python version switch
2011-06-08 18:00:49 +00:00
espie
0397d65db0
new depends
2010-11-19 22:31:32 +00:00
espie
47ff75aa46
USE_GROFF=Yes
2010-10-18 18:36:45 +00:00
armani
e0dc60b4c3
Update to 2.1.0, change my email address and integrate 2 patches from
...
Laurent Ghigonis, one to properly detect the mac address and the other to close
the bpf after use (You don't need to create 40 bpf anymore), thanks !
ok sthen@
2010-10-05 09:18:05 +00:00
sthen
14ac80a32b
bumps for new python
2010-08-30 21:21:53 +00:00
sthen
8c84c1b607
Add a comment about the regression tests.
2009-10-01 16:42:12 +00:00
sthen
f1f2f30877
Update scapy to 2.0.1 from new maintainer Jonathan Armani with a little
...
help from me. The IPv6 features provided by scapy6 are integrated (still
some problems with them, but working well enough) so pkgpath/conflict
markers are set to replace an existing scapy6 installation.
ok wcmaier@ "if it works go for it" claudio@
2009-10-01 16:28:49 +00:00
naddy
20fd4a43c5
bump for python dependency change
2009-03-28 16:18:04 +00:00
wcmaier
2ab389682e
Sync scapy with route(8) output now that we support priorities.
...
Initial report and testing from Tim Donahue <tdonahue at vonsystems
dot com> (and subsequent poke from sthen); thanks!
ok sthen@
2008-06-12 12:46:05 +00:00
steven
9bfed1ac43
bump PKGNAME after python version switch
2007-10-08 08:22:38 +00:00
merdely
241b722760
Remove surrounding quotes in COMMENT*/PERMIT_*/BROKEN/ERRORS
...
Add $OpenBSD$ to p5-SNMP-Info/Makefile (ok kili@, simon@)
2007-09-15 22:36:51 +00:00
martynas
f4d7093c3e
.tar.gz is the default so remove the line; ok steven@
2007-05-15 21:40:01 +00:00
aanriot
aa2d0da917
fix an example in the manpage.
...
from debian;
inputs jmc@, "looks good" claudio@
2007-05-08 12:47:06 +00:00
claudio
a071d37e46
Update scapy to 1.1.1 and add some patches needed to make it more reliable.
...
OK jasper@
2007-05-05 14:23:18 +00:00
espie
9eafbbfb35
base64 checksums.
2007-04-05 16:19:55 +00:00
alek
92e91b4ac4
Bump PKGNAMEs after recent python switch
2006-06-03 09:19:52 +00:00
alek
0630c21feb
Import scapy 1.0.4
...
Scapy is a powerful interactive packet manipulation program. It is
able to forge or decode packets of a wide number of protocols, send
them on the wire, capture them, match requests and replies, and much
more. It can easily handle most classical tasks like scanning,
tracerouting, probing, unit tests, attacks or network discovery (it
can replace hping, 85% of nmap, arpspoof, arp-sk, arping, tcpdump,
tethereal, p0f, etc.). It also performs very well at a lot of other
specific tasks that most other tools can't handle, like sending
invalid frames, injecting your own 802.11 frames, combining technics
(VLAN hopping+ARP cache poisoning, VOIP decoding on WEP encrypted
channel, ...), etc.
from uwe@
2006-04-19 17:36:58 +00:00