--
Net::Ping::External is a module which interfaces with the ping(1)
command on the system. It presently provides a single function,
ping(), that takes in a hostname and (optionally) a timeout and
returns true if the host is alive, and false otherwise. Unless
you have the ability (and willingness) to run your scripts as
the superuser on your system, this module will probably provide
more accurate results than Net::Ping (bundled with the perl
base installation) will.
Submitted and maintained by Maurice Nonnekes <maurice@amaze.nl>
---
libpcap is a packet capturing library. It is used by all sorts of
networking diagnostic programs (like tcpdump and nmap).
py-libpcap is an interface to this library for Python.
WWW: http://sourceforge.net/projects/pylibpcap/
* Take care to set a sane PATH.
* Add set -e
* Copy example files into ${PREFIX}/share/examples/PORTNAME.
* Replace PKGNAME with P_NAME in INSTALL/DEINSTALL scripts, unclear
since it already exists in the Makefile with a different value.
* Change output of INSTALL/DEINSTALL to be more like other scripts
found in the tree(suggested by heko@).
* Add missing gdbm dependency.
Submitted by maintainer Nils Nordman <nino@nforced.com>.
Added code in both the client and the server to detect whether the
peer is an old version with the S1G bug. The server will refuse
to serve such clients, and the client will refuse updates from
such a server. In each case, an error message is printed with a
URL that describes the bug and the upgrade procedure.
Resolv allows a user to resolve the names of a single IP address or
entire network of addresses to maintain a "map" of the names that
comprise a certain network.
The crawl utility starts a depth-first traversal of the web at the
specified URLs. It stores all JPEG images that match the configured
constraints. Crawl is fairly fast and allows for graceful termination.
After terminating crawl, it is possible to restart it at exactly the
same spot where it was terminated. Crawl keeps a persistent database
that allows multiple crawls without revisiting sites.
The main reason for writing crawl was the lack of simple open source
web crawlers. Crawl is only a few thousand lines of code and fairly
easy to debug and customize.
Features
+ Saves encountered JPEG images
+ Image selection based on regular expressions and size contraints
+ Resume previous crawl after graceful termination
+ Persistent database of visited URLs
+ Very small and efficient code
+ Supports robots.txt
--
TightVNC is an enhanced version of VNC, which is optimized to work over
slow network connections such as low-speed modem links. While original
VNC may be very slow when your connection is not fast enough, with
TightVNC you can work remotely almost in real time in most environments.
Besides bandwidth optimizations, TightVNC also includes many other
improvements, optimizations and bugfixes over VNC. Note that TightVNC is
free, cross-platform and compatible with the standard VNC.
WWW: http://www.tightvnc.org/
Submitted by Rob Casey <rob@minauros.com>
* Changes in zebra-0.92a
* Changes in bgpd
** Fix "^$" community list bug.
** Below command's Address Family specific configurations are added
nexthop-self
route-reflector-client
route-server-client
soft-reconfiguration inbound
* Changes in zebra
** Treat kernel type routes as EGP routes.
is moved over.
New to 1.8.1
* SNMP Alerts
* IDMEF XML output
* Limited wildcard regex support
* New normalization mode for http_decode
* many bug fixes
OpenBSD port changes:
FLAVOR=snmp now works
vtysh now works
Also, OpenBD specific fixes not listed below include a patch to correctly
get all interfaces from the kernel.
Changelog from e-mail:
* Changes in zebra-0.92
** Overall security is improved. Default umask is 0077.
* Changes in ripd
** If output interface is in simple password authentication mode,
substruct one from rtemax.
* Changes in bgpd
** IPv4 multicast and IPv6 unicast configuration is changed to so
called new config. All of AFI and SAFI specific configuration is
moved to "address-family" node. When you have many IPv6 only
configuration, you will see many "no neighbor X:X::X:X activate" line
in your configuration to disable IPv4 unicast NLRI exchange. In that
case please use "no bgp default ipv4-unicast" command to suppress the
output. Until zebra-0.93, old config is still left for compatibility.
Old config
==========
router bgp 7675
bgp router-id 10.0.0.1
redistribute connected
network 192.168.0.0/24
neighbor 10.0.0.2 remote-as 7675
ipv6 bgp network 3ffe:506::/33
ipv6 bgp network 3ffe:1800:e800::/40
ipv6 bgp aggregate-address 3ffe:506::/32
ipv6 bgp redistribute connected
ipv6 bgp neighbor 3ffe:506:1000::2 remote-as 1
New config
==========
router bgp 7675
bgp router-id 10.0.0.1
network 192.168.0.0/24
redistribute connected
neighbor 10.0.0.2 remote-as 7675
neighbor 3ffe:506:1000::2 remote-as 1
no neighbor 3ffe:506:1000::2 activate
!
address-family ipv6
network 3ffe:506::/33
network 3ffe:1800:e800::/40
aggregate-address 3ffe:506::/32
redistribute connected
neighbor 3ffe:506:1000::2 activate
exit-address-family
* Changes in ospfd
** Internal interface treatment is changed. Now ospfd can handle
multiple IP address for an interface.
** Redistribution of loopback interface's address works fine.
--
State Threads is an application library which provides a foundation
for writing fast and highly scalable Internet Applications on
UNIX-like platforms. It combines the simplicity of the multithreaded
programming paradigm, in which one thread supports each simultaneous
connection, with the performance and scalability of an event-driven
state machine architecture.
WWW: http://oss.sgi.com/projects/state-threads/
Submitted by Patroklos Argyroudis <argp@bsd.gr>
Submitted by Patroklos Argyroudis <argp@bsd.gr>.
ctrace is an IPv4 traceroute tool that supports many features missing
in standard 4.3BSD traceroute(8). It is programmed entirely in perl.
The more traditional traceroute(8) sends out either UDP or ICMP ECHO
packets with a TTL of one, and increments the TTL until the destination
has been reached. By printing the gateways that generate ICMP time
exceeded messages along the way, it is able to determine the path
packets are taking to reach the destination.
The problem is that with the widespread use of firewalls on the modern
Internet, many of the packets that traceroute(8) sends out end up being
filtered, making it impossible to completely trace the path to the
destination. However, in many cases, these firewalls will permit inbound
TCP packets to specific ports that hosts sitting behind the firewall are
listening for connections on. By sending out TCP SYN packets instead of
UDP or ICMP ECHO packets, tcptraceroute is able to bypass the most common
firewall filters.
rain is powerful tool for testing stability of hardware and
software utilizing IP protocols. It offers its users the
capability of creating their own packets with a wide variety
of command line options.
WWW: http://www.tenebrous.com/rain/
MAINTAINER= Joshua Stein <jcs@rt.fm>
--
Cisco's TACACS+ Server
TACACS+ is used for authentication, authorization, and accounting
on Cisco routers. This daemon provides a server for TACACS+ routers.
WWW: http://www.gazi.edu.tr/tacacs/
MAINTAINER= Jeff Bachtel <jeff@cepheid.org>
+ lots of additional mods
+ pvalchev@ helped
+ lebel@ reviewed
From Changelog:
* added new IP defragmenter, spp_frag2
* added new stateful inspection/tcp stream reassembly plugin, spp_stream4
* Snort can now statefully detect ECN traffic (less false alarms)
* stream4 can now keep session statistics in a "session.log" file
* added new high-speed unified binary output system, spo_unified
* added new data structs/management for tag code
* added -k switch to tune checksum verification behavior
* added -z switch to provide stateful verification of alerts
* modified bahavior of http_decode, now only alerts once per packet
* added unique Snort ID's to every Snort rule, plus generator, revision
and event ID info to each alert
* detection engine only alerts once per packet now, tcp stream code doesn't
generate another alert packet if a previous one already alerted for that
stream
* fixed signal handling on svr4 systems
* added enhanced cross reference printout to full/fast/syslog alert modes
* added new high speed checksum verification (on x86) routines
* added new ARP spoof detection preprocessor from Jeff
Nathan <jeff@wwti.com>
* * *
Xprobe is a tool automating the X logic.
X is a logic developed from the various Active Operating System
Fingerprinting methods discovered during the "ICMP Usage In
Scanning" research project.
http://www.sys-security.com/
- Bump VERSION
- Fixes MASTER_SITES
- New ssl flavor
- New Maintainer
- Remove po patches
- Add patch for text-based xchat
Permission granted by original maintainer : Couderc Damien <couderc.damien@wanadoo.fr>
---
Net::IPv4Addr provides functions for parsing IPv4 addresses both
in traditional address/netmask format and in the new CIDR format.
There are also methods for calculating the network and broadcast
address and also to see check if a given address is in a specific
network.
+ now with OpenBSD "plug-in" support
eg.
banshee v 1.1 -- They kill without discretion...
dummy v 1.0 -- Dummy plugin. It does nothing !
leech v 1.6 -- Isolate a host from the LAN
lurker v 1.3 -- Try to search for other ettercap
ooze v 1.4 -- Ping a host.
shadow v 1.8 -- A very simple SYN/TCP port scanner
spectre v 1.1 -- Flood a switched LAN with random MAC addresses
triton v 1.3 -- Try to discover the LAN's gateway
Changes:
o fixed two file descriptor leaks in ftpcopy. (Spotted by Matthias
Andree)
o added --bps option to ftpcopy.
o ftpcopy and ftpls now work with the runsocks program from the
socks5 reference implementation. See the FAQ.
o ftpcopy and ftpls now have a --timeout option to set the timeout
used during the connection.
o ftpcopy now has a --tolower option, causing it to change all
local file and directory names to lowercase. Note: you'll
possibly want to read the manual page before you use this
option.
o ftpls can make recursive directory listings. Use the --recursive
option for this.
o don't allow the FTP server do redirect PASV to other hosts or
ports below 1024 (with the exception of port 20).
o temporary files are created in the target directory.
The purpose of OpRoute is to attempt to establish a
*generalized* measurement system which takes into
account all of the factors that are usually considered
to be important when it comes to performance.
Specifically:
- Packet loss
- Latency
- Layer 3 Hops
- AS Hops
- NAP Hops
- Throughput (To be done, not in there yet)
MAINTAINER= Jason Peel <jsyn@nthought.com>
--
dlint analyzes any DNS zone you specify, and reports any problems
it finds by displaying errors and warnings. Then it descends
recursively to examine all zones below the given one (this can be
disabled with a command-line option). Designed for Unix, dlint
is written in Bourne Shell and Perl.
WWW: http://www.domtools.com/dns/dlint.shtml
Submitted by Jason Peel <jsyn@nthought.com>
The author seems to have dropped gettext and any NLS support.
Changes:
* Fix a minor bug that caused problems when sending files,
* Shows a warning when you run more than one clients with the same UIN,
* Fix a big that caused some messages not to appear in history,
* Manual page included in the package - centericq(1),
* An ability to turn off local mailbox checking was added.
--
Balance is a simple but powerful generic tcp proxy with round robin
load balancing and failover mechanisms. Its behaviour can be
controlled at runtime using a simple command line syntax.
The latest release now supports the definition of channel groups
and connection counting and handling boosting the power and versatility
of balance one big step further.
WWW: http://balance.sourceforge.net/
Submitted by Jason Peel <jsyn@nthought.com>
I am no longer the developer of the Nemesis Project.
This project is now developed by Jeff Nathan <jeff@wwti.com>
I will still remain the active maintainer of the OpenBSD port.
For those curious, details of WHY I have given up Nemesis and
the future direction of this project can be found here:
http://www.packetninja.net/nemesis_announcement.html