Commit Graph

20 Commits

Author SHA1 Message Date
sthen
38b4db7bbe update to sslsplit-0.5.5 2019-08-31 14:01:19 +00:00
sthen
9c6e9626b9 s/PERMIT_PACKAGE_CDROM/PERMIT_PACKAGE/ and some light whitespace tidying
in ports which I maintain
2019-06-03 16:06:50 +00:00
sthen
b99297103f update to sslsplit-0.5.4 2019-01-29 23:05:21 +00:00
sthen
7fe229f663 update to sslsplit-0.5.3
remove libressl patch no longer needed
2018-08-28 21:44:48 +00:00
sthen
8df5d2bc9b update to sslsplit-0.5.2, partly from bket@ 2018-02-14 18:06:29 +00:00
sthen
7bf6d24496 Unbreak sslsplit build following libressl api change by not including
"connect socket" or "accept socket" in the string produced by
ssl_ssl_state_to_str; this is currently only used in a debug printf
anyway.
2017-02-05 14:22:06 +00:00
sthen
cec1eae965 use the accessor instead of ssl->state
still broken, it also wants ssl->type
2017-01-27 11:10:38 +00:00
sthen
71e1612da6 update to sslsplit-0.5.0 2016-03-28 21:37:25 +00:00
jca
d0d78cd0b5 Additional fixes for SSLv3 removal. ok sthen@ (maintainer) 2015-08-28 11:05:22 +00:00
jca
357919b9e5 Committed upstream. 2015-08-25 17:30:56 +00:00
sthen
0250c2981f guard SSLv3_method 2015-07-18 15:53:08 +00:00
sthen
fbd92509fc bump REVISIONs following DIOCGETSTATUS ABI change 2015-06-10 10:43:29 +00:00
sthen
4c2f1cc581 update to sslsplit-0.4.11
note, needed patching for libressl:
-#if (OPENSSL_VERSION_NUMBER < 0x1000200fL)
+#if defined(LIBRESSL_VERSION_NUMBER) || (OPENSSL_VERSION_NUMBER < 0x1000200fL)
2015-03-16 08:50:08 +00:00
sthen
44779848c6 update to sslsplit 0.4.10 2014-12-12 21:51:59 +00:00
sthen
2dd4eb15ae update to sslsplit-0.4.9 2014-11-13 22:39:58 +00:00
sthen
b8d82fe4c7 update to sslsplit 0.4.8 2014-09-02 19:45:53 +00:00
sthen
a7bde2ca8d don't rely on openssl to pull in string.h 2014-05-23 12:37:17 +00:00
sthen
83283f6689 missing @newgroup 2014-01-08 22:01:36 +00:00
sthen
7f88db390f fix homepage, reported by Ross L Richardson 2013-11-29 11:47:09 +00:00
sthen
5ef763bbca import ports/security/sslsplit, ok zhuk@
SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS
encrypted network connections. Connections are transparently intercepted
through a firewall/network address translation engine and redirected to
SSLsplit.

SSLsplit terminates SSL/TLS and initiates a new SSL/TLS connection to
the original destination address, while logging all data transmitted.
SSLsplit is intended to be useful for network forensics and penetration
testing.

SSLsplit supports plain TCP, plain SSL, HTTP and HTTPS connections over
both IPv4 and IPv6. For SSL and HTTPS connections, SSLsplit generates
and signs forged X509v3 certificates on-the-fly, based on the original
server certificate subject DN and subjectAltName extension. SSLsplit
fully supports Server Name Indication (SNI) and is able to work with
RSA, DSA and ECDSA keys and DHE and ECDHE cipher suites. SSLsplit can
also use existing certificates of which the private key is available,
instead of generating forged ones. SSLsplit supports NULL-prefix CN
certificates and can deny OCSP requests in a generic way. SSLsplit
removes HPKP response headers in order to prevent public key pinning.
2013-11-28 16:49:10 +00:00