if a port needs 2.x then set MODPY_VERSION=${MODPY_DEFAULT_VERSION_2}.
This commit doesn't change any versions currently used; it may be that
some ports have MODPY_DEFAULT_VERSION_2 but don't require it, those
should be cleaned up in the course of updating ports where possible.
Python module ports providing py3-* packages should still use
FLAVOR=python3 so that we don't have a mixture of dependencies some
using ${MODPY_FLAVOR} and others not.
written to use Python 2, both versions are supported in parallel for now
(with a -3 suffix on the command-line tools and some other files to avoid a
conflict).
Clean up dependencies which have not been used for some time while there;
PyCrypto and py-ecdsa changed to py-cryptography in 2017 and use of libdnet
was removed in 2.4.4.
ok bluhm@ (maintainer).
Call the sr...() functions with parameter promisc=1 for that. This
is needed for the src/sys/netinet/arp regress test and was backported
from secdev/scapy master at github.
OK danj@ (maintainer)
2.3.3 update. Sniff the packets in sndrcv() like it is done on
FreeBSD and Darwin. Without this patch, everything worked with
virtual qemu. But on real ethernet hardware sr() sends TCP packets
to the broadcast MAC address as scapy did not see the ARP reply to
figure out the correct MAC address.
OK danj@ (maintainer)
Laurent Ghigonis, one to properly detect the mac address and the other to close
the bpf after use (You don't need to create 40 bpf anymore), thanks !
ok sthen@
help from me. The IPv6 features provided by scapy6 are integrated (still
some problems with them, but working well enough) so pkgpath/conflict
markers are set to replace an existing scapy6 installation.
ok wcmaier@ "if it works go for it" claudio@
Scapy is a powerful interactive packet manipulation program. It is
able to forge or decode packets of a wide number of protocols, send
them on the wire, capture them, match requests and replies, and much
more. It can easily handle most classical tasks like scanning,
tracerouting, probing, unit tests, attacks or network discovery (it
can replace hping, 85% of nmap, arpspoof, arp-sk, arping, tcpdump,
tethereal, p0f, etc.). It also performs very well at a lot of other
specific tasks that most other tools can't handle, like sending
invalid frames, injecting your own 802.11 frames, combining technics
(VLAN hopping+ARP cache poisoning, VOIP decoding on WEP encrypted
channel, ...), etc.
from uwe@