Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 29 May 2015 16:13:31 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 200519] net/spoofer: update to 0.8a
Message-ID:  <bug-200519-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=200519

            Bug ID: 200519
           Summary: net/spoofer: update to 0.8a
           Product: Ports & Packages
           Version: Latest
          Hardware: i386
                OS: Any
            Status: New
          Severity: Affects Some People
          Priority: ---
         Component: Individual Port(s)
          Assignee: jadawin@FreeBSD.org
          Reporter: mjl@luckie.org.nz
          Assignee: jadawin@FreeBSD.org
             Flags: maintainer-feedback?(jadawin@FreeBSD.org)

Created attachment 157251
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=157251&action=edit
update spoofer to 0.8a

The Spoofer project has been taken over by CAIDA

http://blog.caida.org/best_available_data/2015/05/28/caida-takes-over-stewardship-of-spoofer-project-infrastructure/

This port update shifts the master side to the CAIDA master site, and includes
a new release of the source code (0.8a).  The changes in the source code:

spoofer-0.8a
-----------
* Moved servers to CAIDA
* Implemented raw ethernet spoofing on all platforms (with libpcap or winpcap)
  as a fallback when the OS blocks raw ip spoofing
* Implemented IPv6 spoofing on all platforms (with libpcap or winpcap)
* Removed dependence on crufty old libnet and libdnet

In particular, because we are not using raw IP sockets anymore, we can now test
spoofing on freebsd NAT routers because we will bypass the NAT layer as
required.

I am happy to take over maintainership.

-- 
You are receiving this mail because:
You are the assignee for the bug.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-200519-13>