26 Commits

Author SHA1 Message Date
bluhm
38a3b12d7b Allow to switch the interface to promiscuous mode during sndrcv().
Call the sr...() functions with parameter promisc=1 for that.  This
is needed for the src/sys/netinet/arp regress test and was backported
from secdev/scapy master at github.
OK danj@ (maintainer)
2016-12-09 16:40:11 +00:00
bluhm
c30ccc71ac Put back an OpenBSD special code path that was lost in the scapy
2.3.3 update.  Sniff the packets in sndrcv() like it is done on
FreeBSD and Darwin.  Without this patch, everything worked with
virtual qemu.  But on real ethernet hardware sr() sends TCP packets
to the broadcast MAC address as scapy did not see the ARP reply to
figure out the correct MAC address.
OK danj@ (maintainer)
2016-11-24 12:40:49 +00:00
danj
8656916232 Update to scapy-2.3.3 and take maintainership (no objection from
previous maintainer armani@)

tested by bluhm@
previous diff ok sthen@
2016-11-14 20:04:56 +00:00
sthen
96a0927c11 update to scapy-2.3.2, from Daniel Jakots, earlier version ok armani@ 2016-01-31 23:21:37 +00:00
naddy
6bb8d0674b Drop USE_GROFF from ports where the formatting differences are acceptable
or mandoc provides the more useful output.
2015-02-16 22:57:07 +00:00
naddy
570aa62a9c Drop remaining MD5/RMD160/SHA1 checksums. 2015-01-18 03:12:39 +00:00
espie
eae66e4a7b PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:35:43 +00:00
bluhm
144304141e Scapy did not handle the DLT_LOOP type that is used when sniffing
from OpenBSD loopback device.  Add a new layer for that.
ok sthen@
2012-01-12 03:16:24 +00:00
espie
d0fa01c846 normalize pkgpath 2011-09-16 11:13:37 +00:00
jasper
88f8f0add6 bump after default python version switch 2011-06-08 18:00:49 +00:00
espie
0397d65db0 new depends 2010-11-19 22:31:32 +00:00
espie
47ff75aa46 USE_GROFF=Yes 2010-10-18 18:36:45 +00:00
armani
e0dc60b4c3 Update to 2.1.0, change my email address and integrate 2 patches from
Laurent Ghigonis, one to properly detect the mac address and the other to close
the bpf after use (You don't need to create 40 bpf anymore), thanks !

ok sthen@
2010-10-05 09:18:05 +00:00
sthen
14ac80a32b bumps for new python 2010-08-30 21:21:53 +00:00
sthen
8c84c1b607 Add a comment about the regression tests. 2009-10-01 16:42:12 +00:00
sthen
f1f2f30877 Update scapy to 2.0.1 from new maintainer Jonathan Armani with a little
help from me. The IPv6 features provided by scapy6 are integrated (still
some problems with them, but working well enough) so pkgpath/conflict
markers are set to replace an existing scapy6 installation.

ok wcmaier@ "if it works go for it" claudio@
2009-10-01 16:28:49 +00:00
naddy
20fd4a43c5 bump for python dependency change 2009-03-28 16:18:04 +00:00
wcmaier
2ab389682e Sync scapy with route(8) output now that we support priorities.
Initial report and testing from Tim Donahue <tdonahue at vonsystems
dot com> (and subsequent poke from sthen); thanks!

ok sthen@
2008-06-12 12:46:05 +00:00
steven
9bfed1ac43 bump PKGNAME after python version switch 2007-10-08 08:22:38 +00:00
merdely
241b722760 Remove surrounding quotes in COMMENT*/PERMIT_*/BROKEN/ERRORS
Add $OpenBSD$ to p5-SNMP-Info/Makefile (ok kili@, simon@)
2007-09-15 22:36:51 +00:00
martynas
f4d7093c3e .tar.gz is the default so remove the line; ok steven@ 2007-05-15 21:40:01 +00:00
aanriot
aa2d0da917 fix an example in the manpage.
from debian;
inputs jmc@, "looks good" claudio@
2007-05-08 12:47:06 +00:00
claudio
a071d37e46 Update scapy to 1.1.1 and add some patches needed to make it more reliable.
OK jasper@
2007-05-05 14:23:18 +00:00
espie
9eafbbfb35 base64 checksums. 2007-04-05 16:19:55 +00:00
alek
92e91b4ac4 Bump PKGNAMEs after recent python switch 2006-06-03 09:19:52 +00:00
alek
0630c21feb Import scapy 1.0.4
Scapy is a powerful interactive packet manipulation program. It is
able to forge or decode packets of a wide number of protocols, send
them on the wire, capture them, match requests and replies, and much
more. It can easily handle most classical tasks like scanning,
tracerouting, probing, unit tests, attacks or network discovery (it
can replace hping, 85% of nmap, arpspoof, arp-sk, arping, tcpdump,
tethereal, p0f, etc.). It also performs very well at a lot of other
specific tasks that most other tools can't handle, like sending
invalid frames, injecting your own 802.11 frames, combining technics
(VLAN hopping+ARP cache poisoning, VOIP decoding on WEP encrypted
channel, ...), etc.

from uwe@
2006-04-19 17:36:58 +00:00