From owner-freebsd-ports-bugs@FreeBSD.ORG Sat Aug 6 19:30:11 2005 Return-Path: X-Original-To: freebsd-ports-bugs@hub.freebsd.org Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 62E1416A41F for ; Sat, 6 Aug 2005 19:30:11 +0000 (GMT) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id E4B0B43D55 for ; Sat, 6 Aug 2005 19:30:10 +0000 (GMT) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.13.3/8.13.3) with ESMTP id j76JUAAU001512 for ; Sat, 6 Aug 2005 19:30:10 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.13.3/8.13.1/Submit) id j76JUA7n001510; Sat, 6 Aug 2005 19:30:10 GMT (envelope-from gnats) Resent-Date: Sat, 6 Aug 2005 19:30:10 GMT Resent-Message-Id: <200508061930.j76JUA7n001510@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, SeaD Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 2F43216A41F for ; Sat, 6 Aug 2005 19:26:52 +0000 (GMT) (envelope-from sead@mail.ru) Received: from f13.mail.ru (f13.mail.ru [194.67.57.43]) by mx1.FreeBSD.org (Postfix) with ESMTP id C12F943D48 for ; Sat, 6 Aug 2005 19:26:51 +0000 (GMT) (envelope-from sead@mail.ru) Received: from mail by f13.mail.ru with local id 1E1UJm-000Abu-00 for FreeBSD-gnats-submit@freebsd.org; Sat, 06 Aug 2005 23:26:50 +0400 Received: from [86.109.193.225] by win.mail.ru with HTTP; Sun, 07 Aug 2005 01:26:50 +0600 Message-Id: Date: Sun, 07 Aug 2005 01:26:50 +0600 From: SeaD To: FreeBSD-gnats-submit@FreeBSD.org Cc: Subject: ports/84627: new port: security/ipguard - Tool designed to protect LAN IP adress space by ARP spoofing X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: SeaD List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 06 Aug 2005 19:30:11 -0000 >Number: 84627 >Category: ports >Synopsis: new port: security/ipguard - Tool designed to protect LAN IP adress space by ARP spoofing >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Sat Aug 06 19:30:10 GMT 2005 >Closed-Date: >Last-Modified: >Originator: SeaD >Release: FreeBSD 4.10-RELEASE-p3 i386 >Organization: >Environment: System: FreeBSD deep.freeznet 4.10-RELEASE-p3 FreeBSD 4.10-RELEASE-p3 #0: Sun Oct 3 03:29:12 YEKST 2004 sead@deep.freeznet:/usr/local/src/obj/usr/local/src/system/sys/KDEEP i386 >Description: new port >How-To-Repeat: >Fix: # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # ipguard # ipguard/Makefile # ipguard/distinfo # ipguard/pkg-descr # ipguard/pkg-plist # ipguard/pkg-message # echo c - ipguard mkdir -p ipguard > /dev/null 2>&1 echo x - ipguard/Makefile sed 's/^X//' >ipguard/Makefile << 'END-of-ipguard/Makefile' X# New ports collection makefile for: ipguard X# Date created: 2 Aug 2005 X# Whom: SeaD X# X# $FreeBSD$ X# X# X# X XPORTNAME= ipguard XPORTVERSION= 0.04 XCATEGORIES= security net XMASTER_SITES= http://ipguard.deep.perm.ru/files/ X XMAINTAINER= sead@mail.ru XCOMMENT= Tool designed to protect LAN IP adress space by ARP spoofing X XBUILD_DEPENDS= ${LOCALBASE}/lib/libnet.a:${PORTSDIR}/net/libnet X XMAN8= ipguard.8 X Xdo-install: X ${INSTALL_PROGRAM} ${WRKSRC}/ipguard ${PREFIX}/sbin X ${INSTALL_MAN} ${WRKSRC}/doc/ipguard.8 ${MANPREFIX}/man/man8 X ${INSTALL_SCRIPT} ${WRKSRC}/doc/ipguard.sh.sample ${LOCALBASE}/etc/rc.d X Xpost-install: X @${CAT} ${PKGMESSAGE} X X X.include END-of-ipguard/Makefile echo x - ipguard/distinfo sed 's/^X//' >ipguard/distinfo << 'END-of-ipguard/distinfo' XMD5 (ipguard-0.04.tar.gz) = cba351c88ac281149dbfde5360d3c844 END-of-ipguard/distinfo echo x - ipguard/pkg-descr sed 's/^X//' >ipguard/pkg-descr << 'END-of-ipguard/pkg-descr' Xipguard listens network for ARP packets. All permitted MAC/IP pairs Xlisted in 'ethers' file. If it recieves one with MAC/IP pair, which is Xnot listed in 'ethers' file, it will send ARP reply with configured Xfake address. This will prevent not permitted host to work properly Xin this ethernet segment. Especially Windows(TM) hosts. X XAuthor SeaD XWWW: http://ipguard.deep.perm.ru/ END-of-ipguard/pkg-descr echo x - ipguard/pkg-plist sed 's/^X//' >ipguard/pkg-plist << 'END-of-ipguard/pkg-plist' Xsbin/ipguard Xetc/rc.d/ipguard.sh.sample END-of-ipguard/pkg-plist echo x - ipguard/pkg-message sed 's/^X//' >ipguard/pkg-message << 'END-of-ipguard/pkg-message' X X===> INSTALL NOTES: X Now create `ethers' file and put X where ipguard can find it. Default: /etc/ethers X X And then start ipguard: X (cd /usr/local/etc/rc.d X mv ipguard.sh.sample ipguard.sh X /usr/local/etc/rc.d/ipguard.sh start) END-of-ipguard/pkg-message exit >Release-Note: >Audit-Trail: >Unformatted: