Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 26 May 2019 22:00:24 +0000
From:      bugzilla-noreply@freebsd.org
To:        ports-bugs@FreeBSD.org
Subject:   [Bug 231920] [NEW PORT] : security/ismtp: Test for SMTP user enumeration (RCPT TO and VRFY), internal spoofing, and relay
Message-ID:  <bug-231920-7788-5DzLId3tes@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-231920-7788@https.bugs.freebsd.org/bugzilla/>
References:  <bug-231920-7788@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D231920

--- Comment #8 from commit-hook@freebsd.org ---
A commit references this bug:

Author: swills
Date: Sun May 26 21:59:59 UTC 2019
New revision: 502752
URL: https://svnweb.freebsd.org/changeset/ports/502752

Log:
  security/ismtp: create port

  SMTP user enumeration (RCPT TO and VRFY), internal spoofing, and open rel=
ay.
A
  tool that tested for all three and with great flexibility. iSMTP does just
  that, making it much easier to knock that process out of the way.

  WWW: https://github.com/altjx/ipwn/tree/master/iSMTP

  PR:           231920
  Submitted by: Rihaz Jerrin <rihaz.jerrin@gmail.com>

Changes:
  head/security/Makefile
  head/security/ismtp/
  head/security/ismtp/Makefile
  head/security/ismtp/distinfo
  head/security/ismtp/files/
  head/security/ismtp/files/patch-iSMTP.py
  head/security/ismtp/pkg-descr

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-231920-7788-5DzLId3tes>