Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 15 Nov 2016 10:56:47 +0000 (UTC)
From:      Alexey Dokuchaev <danfe@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r426160 - head/net-mgmt/p0f
Message-ID:  <201611151056.uAFAul9M014167@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: danfe
Date: Tue Nov 15 10:56:46 2016
New Revision: 426160
URL: https://svnweb.freebsd.org/changeset/ports/426160

Log:
  - Reformat port description text for better readability and compactness
  - Remove reference to Spitzner's paper which is no longer available
  - Fix a typo (analyse -> analyze); update WWW entry to avoid redirect

Modified:
  head/net-mgmt/p0f/pkg-descr

Modified: head/net-mgmt/p0f/pkg-descr
==============================================================================
--- head/net-mgmt/p0f/pkg-descr	Tue Nov 15 10:49:43 2016	(r426159)
+++ head/net-mgmt/p0f/pkg-descr	Tue Nov 15 10:56:46 2016	(r426160)
@@ -1,23 +1,15 @@
-from the README:
-
 Passive OS fingerprinting is based on information coming from a remote host
 when it establishes a connection to our system.  Captured packets contain
 enough information to identify the operating system.  In contrast to active
-scanners such as nmap and QueSO, p0f does not send anything to the host being
-identified.
-
-For more information, read Spitzner's text at:
-http://www.enteract.com/~lspitz/finger.html .
+scanners such as nmap and QueSO, p0f does not send anything to the host
+being identified.
 
-from the maintainer:
+Use of this program requires read access to the packet filtering device,
+typically /dev/bpf0.  Granting such access allows the users who have it to
+put your Ethernet device into promiscuous mode and sniff your network.
 
-Use of this program requires read access to the packet filtering
-device, typically /dev/bpf0.  Granting such access allows the users
-who have it to put your Ethernet device into promiscuous mode and
-sniff your network.  See
-http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
-if you do not understand how this can be harmful.  Running p0f with
-no options will cause it to analyse packets intended for other
-hosts.
+See http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
+if you do not understand how this can be harmful.  Running p0f with no
+options will cause it to analyze packets intended for other hosts.
 
-WWW:  http://lcamtuf.coredump.cx/p0f.shtml
+WWW: http://lcamtuf.coredump.cx/p0f3/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201611151056.uAFAul9M014167>