Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 23 Jul 2017 09:01:04 +0000 (UTC)
From:      Dmitry Marakasov <amdmi3@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r446460 - head/security/dsniff
Message-ID:  <201707230901.v6N914N8006925@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: amdmi3
Date: Sun Jul 23 09:01:03 2017
New Revision: 446460
URL: https://svnweb.freebsd.org/changeset/ports/446460

Log:
  - Add LICENSE_FILE
  - Update WWW
  
  Approved by:	portmgr blanket

Modified:
  head/security/dsniff/Makefile
  head/security/dsniff/pkg-descr

Modified: head/security/dsniff/Makefile
==============================================================================
--- head/security/dsniff/Makefile	Sun Jul 23 09:01:03 2017	(r446459)
+++ head/security/dsniff/Makefile	Sun Jul 23 09:01:03 2017	(r446460)
@@ -12,6 +12,7 @@ MAINTAINER=	sbz@FreeBSD.org
 COMMENT=	Various sniffing utilities for penetration testing
 
 LICENSE=	BSD3CLAUSE
+LICENSE_FILE=	${WRKSRC}/LICENSE
 
 LIB_DEPENDS=	libnet.so:net/libnet
 BUILD_DEPENDS=	${LOCALBASE}/lib/libnids.a:net/libnids

Modified: head/security/dsniff/pkg-descr
==============================================================================
--- head/security/dsniff/pkg-descr	Sun Jul 23 09:01:03 2017	(r446459)
+++ head/security/dsniff/pkg-descr	Sun Jul 23 09:01:03 2017	(r446460)
@@ -6,4 +6,4 @@ unavailable to an attacker (e.g, due to layer-2 switch
 implement active monkey-in-the-middle attacks against redirected SSH and HTTPS
 sessions by exploiting weak bindings in ad-hoc PKI.
 
-WWW: http://www.monkey.org/~dugsong/dsniff/
+WWW: https://www.monkey.org/~dugsong/dsniff/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201707230901.v6N914N8006925>