summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--net-mgmt/p0f/Makefile33
-rw-r--r--net-mgmt/p0f/distinfo1
-rw-r--r--net-mgmt/p0f/files/patch-README78
-rw-r--r--net-mgmt/p0f/pkg-comment1
-rw-r--r--net-mgmt/p0f/pkg-descr24
-rw-r--r--net-mgmt/p0f/pkg-plist4
-rw-r--r--net/p0f/Makefile33
-rw-r--r--net/p0f/distinfo1
-rw-r--r--net/p0f/files/patch-README78
-rw-r--r--net/p0f/pkg-comment1
-rw-r--r--net/p0f/pkg-descr24
-rw-r--r--net/p0f/pkg-plist4
12 files changed, 282 insertions, 0 deletions
diff --git a/net-mgmt/p0f/Makefile b/net-mgmt/p0f/Makefile
new file mode 100644
index 0000000..797f990
--- /dev/null
+++ b/net-mgmt/p0f/Makefile
@@ -0,0 +1,33 @@
+# New ports collection makefile for: p0f
+# Date created: 2000-06-12
+# Whom: Trevor Johnson
+#
+# $FreeBSD$
+#
+
+PORTNAME= p0f
+PORTVERSION= 1.7
+CATEGORIES= net
+MASTER_SITES= http://lcamtuf.hack.pl/
+DISTNAME= ${PORTNAME}
+EXTRACT_SUFX= .tgz
+
+MAINTAINER= trevor@jpj.net
+
+WRKSRC= ${WRKDIR}/${PORTNAME}-${PORTVERSION}
+
+post-patch:
+ @${PERL} -pi -e "s=/etc=${PREFIX}/etc=g" ${WRKSRC}/p0f.c
+ @${PERL} -pi -e "s=/etc=${PREFIX}/etc=g" ${WRKSRC}/README
+
+do-install:
+ @${INSTALL_PROGRAM} ${WRKSRC}/p0f ${PREFIX}/bin
+ @${INSTALL_DATA} ${WRKSRC}/p0f.fp ${PREFIX}/etc
+
+post-install:
+.if !defined(NOPORTDOCS)
+ @${MKDIR} ${PREFIX}/share/doc/p0f
+ @${INSTALL_DATA} ${WRKSRC}/README ${PREFIX}/share/doc/p0f
+.endif
+
+.include <bsd.port.mk>
diff --git a/net-mgmt/p0f/distinfo b/net-mgmt/p0f/distinfo
new file mode 100644
index 0000000..198e932
--- /dev/null
+++ b/net-mgmt/p0f/distinfo
@@ -0,0 +1 @@
+MD5 (p0f.tgz) = 5d4242df39c6325683ee02f9e95f2801
diff --git a/net-mgmt/p0f/files/patch-README b/net-mgmt/p0f/files/patch-README
new file mode 100644
index 0000000..270fb4e
--- /dev/null
+++ b/net-mgmt/p0f/files/patch-README
@@ -0,0 +1,78 @@
+--- README.orig Mon Jun 12 15:28:41 2000
++++ README Mon Jun 12 21:15:54 2000
+@@ -27,30 +27,31 @@
+
+ Background:
+
+- * What is passive OS fingerprinting?
++ * What is passive OS fingerprinting?
+
+- Passive OS fingerprinting technique bases on information coming
+- from remote host when it establishes connection to our system. Captured
+- packets contains enough information to determine OS - and, unlike
+- active scanners (nmap, queSO) - without sending anything to this host.
++ Passive OS fingerprinting is based on information coming from a remote host
++ when it establishes a connection to our system. Captured packets contain
++ enough information to identify the operating system. In contrast to active
++ scanners such as nmap and QueSO, p0f does not send anything to the host being
++ identified.
+
+ If you're looking for more information, read Spitzner's text at:
+ http://www.enteract.com/~lspitz/finger.html
+
+- * How it works?
++ * How does it work?
+
+ Well, there are some TCP/IP flag settings specific for given systems.
+ Usually initial TTL (8 bits), window size (16 bits), maximum segment size
+ (16 bits), don't fragment flag (1 bit), sackOK option (1 bit), nop option
+- (1 bit) and window scaling option (8 bits) combined together gives unique,
++ (1 bit) and window scaling option (8 bits) combined together give a unique,
+ 51-bit signature for every system.
+
+- * What are main advantages?
++ * What are the main advantages?
+
+- Passive OS fingerprinting can be done on huge portions of input data - eg.
+- information gathered on firewall, proxy, routing device or Internet server,
+- without causing any network activity. You can launch passive OS detection
+- software on such machine and leave it for days, weeks or months, collecting
++ Passive OS fingerprinting can be done on huge amounts of input data -
++ gathered on a firewall, proxy, routing device or Internet server - without
++ causing any network activity. You can launch passive OS detection
++ software on such a machine and leave it for days or months, collecting
+ really interesting statistical and - *erm* - just interesting information.
+ What's really funny - packet filtering firewalls, network address
+ translation and so on are transparent to p0f-alike software, so you're able
+@@ -62,7 +63,7 @@
+ Limitations
+
+ Proxy firewalls and other high-level proxy devices are not transparent to
+- any tcp fingerprinting software. It applies to p0f, as well.
++ any TCP fingerprinting software. It applies to p0f, as well.
+
+ In order to obtain information required for fingerprinting, you have to
+ receive at least one SYN packet initializing TCP connection to your
+@@ -78,9 +79,9 @@
+ window size are constant for initial TCP/IP packet, but changing rapidly
+ later).
+
+-Why our bubble gum is better?
++Why is our bubble gum better?
+
+- There is another passive OS detection utility, called 'siphon'. It's
++ There is another passive OS detection utility, called 'siphon'. It's a
+ pretty good piece of proof-of-concept software, but it isn't perfect. Well,
+ p0f isn't perfect for sure, but has several improvements:
+
+@@ -128,8 +129,8 @@
+
+ Files:
+
+- /etc/p0f.fp or ./p0f.fp - OS fingerprints database. Format is described
+- inside:
++ /etc/p0f.fp or ./p0f.fp - OS fingerprints database.
++ The format is described inside:
+
+ # Valid entry describes the way server starts TCP handshake (first SYN).
+ # Important options are: window size (wss), maximum segment size (mss),
diff --git a/net-mgmt/p0f/pkg-comment b/net-mgmt/p0f/pkg-comment
new file mode 100644
index 0000000..acf5b5a
--- /dev/null
+++ b/net-mgmt/p0f/pkg-comment
@@ -0,0 +1 @@
+Passive OS fingerprinting tool
diff --git a/net-mgmt/p0f/pkg-descr b/net-mgmt/p0f/pkg-descr
new file mode 100644
index 0000000..a485628
--- /dev/null
+++ b/net-mgmt/p0f/pkg-descr
@@ -0,0 +1,24 @@
+from the README:
+
+Passive OS fingerprinting is based on information coming from a remote host
+when it establishes a connection to our system. Captured packets contain
+enough information to identify the operating system. In contrast to active
+scanners such as nmap and QueSO, p0f does not send anything to the host being
+identified.
+
+For more information, read Spitzner's text at:
+http://www.enteract.com/~lspitz/finger.html .
+
+from the maintainer:
+
+Use of this program requires read access to the packet filtering
+device, typically /dev/bpf0. Granting such access allows the users
+who have it to put your Ethernet device into promiscuous mode and
+sniff your network. See
+http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
+if you do not understand how this can be harmful. Running p0f with
+no options will cause it to analyse packets intended for other
+hosts.
+
+Trevor Johnson
+trevor@jpj.net
diff --git a/net-mgmt/p0f/pkg-plist b/net-mgmt/p0f/pkg-plist
new file mode 100644
index 0000000..ac2c86b
--- /dev/null
+++ b/net-mgmt/p0f/pkg-plist
@@ -0,0 +1,4 @@
+bin/p0f
+etc/p0f.fp
+share/doc/p0f/README
+@dirrm share/doc/p0f
diff --git a/net/p0f/Makefile b/net/p0f/Makefile
new file mode 100644
index 0000000..797f990
--- /dev/null
+++ b/net/p0f/Makefile
@@ -0,0 +1,33 @@
+# New ports collection makefile for: p0f
+# Date created: 2000-06-12
+# Whom: Trevor Johnson
+#
+# $FreeBSD$
+#
+
+PORTNAME= p0f
+PORTVERSION= 1.7
+CATEGORIES= net
+MASTER_SITES= http://lcamtuf.hack.pl/
+DISTNAME= ${PORTNAME}
+EXTRACT_SUFX= .tgz
+
+MAINTAINER= trevor@jpj.net
+
+WRKSRC= ${WRKDIR}/${PORTNAME}-${PORTVERSION}
+
+post-patch:
+ @${PERL} -pi -e "s=/etc=${PREFIX}/etc=g" ${WRKSRC}/p0f.c
+ @${PERL} -pi -e "s=/etc=${PREFIX}/etc=g" ${WRKSRC}/README
+
+do-install:
+ @${INSTALL_PROGRAM} ${WRKSRC}/p0f ${PREFIX}/bin
+ @${INSTALL_DATA} ${WRKSRC}/p0f.fp ${PREFIX}/etc
+
+post-install:
+.if !defined(NOPORTDOCS)
+ @${MKDIR} ${PREFIX}/share/doc/p0f
+ @${INSTALL_DATA} ${WRKSRC}/README ${PREFIX}/share/doc/p0f
+.endif
+
+.include <bsd.port.mk>
diff --git a/net/p0f/distinfo b/net/p0f/distinfo
new file mode 100644
index 0000000..198e932
--- /dev/null
+++ b/net/p0f/distinfo
@@ -0,0 +1 @@
+MD5 (p0f.tgz) = 5d4242df39c6325683ee02f9e95f2801
diff --git a/net/p0f/files/patch-README b/net/p0f/files/patch-README
new file mode 100644
index 0000000..270fb4e
--- /dev/null
+++ b/net/p0f/files/patch-README
@@ -0,0 +1,78 @@
+--- README.orig Mon Jun 12 15:28:41 2000
++++ README Mon Jun 12 21:15:54 2000
+@@ -27,30 +27,31 @@
+
+ Background:
+
+- * What is passive OS fingerprinting?
++ * What is passive OS fingerprinting?
+
+- Passive OS fingerprinting technique bases on information coming
+- from remote host when it establishes connection to our system. Captured
+- packets contains enough information to determine OS - and, unlike
+- active scanners (nmap, queSO) - without sending anything to this host.
++ Passive OS fingerprinting is based on information coming from a remote host
++ when it establishes a connection to our system. Captured packets contain
++ enough information to identify the operating system. In contrast to active
++ scanners such as nmap and QueSO, p0f does not send anything to the host being
++ identified.
+
+ If you're looking for more information, read Spitzner's text at:
+ http://www.enteract.com/~lspitz/finger.html
+
+- * How it works?
++ * How does it work?
+
+ Well, there are some TCP/IP flag settings specific for given systems.
+ Usually initial TTL (8 bits), window size (16 bits), maximum segment size
+ (16 bits), don't fragment flag (1 bit), sackOK option (1 bit), nop option
+- (1 bit) and window scaling option (8 bits) combined together gives unique,
++ (1 bit) and window scaling option (8 bits) combined together give a unique,
+ 51-bit signature for every system.
+
+- * What are main advantages?
++ * What are the main advantages?
+
+- Passive OS fingerprinting can be done on huge portions of input data - eg.
+- information gathered on firewall, proxy, routing device or Internet server,
+- without causing any network activity. You can launch passive OS detection
+- software on such machine and leave it for days, weeks or months, collecting
++ Passive OS fingerprinting can be done on huge amounts of input data -
++ gathered on a firewall, proxy, routing device or Internet server - without
++ causing any network activity. You can launch passive OS detection
++ software on such a machine and leave it for days or months, collecting
+ really interesting statistical and - *erm* - just interesting information.
+ What's really funny - packet filtering firewalls, network address
+ translation and so on are transparent to p0f-alike software, so you're able
+@@ -62,7 +63,7 @@
+ Limitations
+
+ Proxy firewalls and other high-level proxy devices are not transparent to
+- any tcp fingerprinting software. It applies to p0f, as well.
++ any TCP fingerprinting software. It applies to p0f, as well.
+
+ In order to obtain information required for fingerprinting, you have to
+ receive at least one SYN packet initializing TCP connection to your
+@@ -78,9 +79,9 @@
+ window size are constant for initial TCP/IP packet, but changing rapidly
+ later).
+
+-Why our bubble gum is better?
++Why is our bubble gum better?
+
+- There is another passive OS detection utility, called 'siphon'. It's
++ There is another passive OS detection utility, called 'siphon'. It's a
+ pretty good piece of proof-of-concept software, but it isn't perfect. Well,
+ p0f isn't perfect for sure, but has several improvements:
+
+@@ -128,8 +129,8 @@
+
+ Files:
+
+- /etc/p0f.fp or ./p0f.fp - OS fingerprints database. Format is described
+- inside:
++ /etc/p0f.fp or ./p0f.fp - OS fingerprints database.
++ The format is described inside:
+
+ # Valid entry describes the way server starts TCP handshake (first SYN).
+ # Important options are: window size (wss), maximum segment size (mss),
diff --git a/net/p0f/pkg-comment b/net/p0f/pkg-comment
new file mode 100644
index 0000000..acf5b5a
--- /dev/null
+++ b/net/p0f/pkg-comment
@@ -0,0 +1 @@
+Passive OS fingerprinting tool
diff --git a/net/p0f/pkg-descr b/net/p0f/pkg-descr
new file mode 100644
index 0000000..a485628
--- /dev/null
+++ b/net/p0f/pkg-descr
@@ -0,0 +1,24 @@
+from the README:
+
+Passive OS fingerprinting is based on information coming from a remote host
+when it establishes a connection to our system. Captured packets contain
+enough information to identify the operating system. In contrast to active
+scanners such as nmap and QueSO, p0f does not send anything to the host being
+identified.
+
+For more information, read Spitzner's text at:
+http://www.enteract.com/~lspitz/finger.html .
+
+from the maintainer:
+
+Use of this program requires read access to the packet filtering
+device, typically /dev/bpf0. Granting such access allows the users
+who have it to put your Ethernet device into promiscuous mode and
+sniff your network. See
+http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
+if you do not understand how this can be harmful. Running p0f with
+no options will cause it to analyse packets intended for other
+hosts.
+
+Trevor Johnson
+trevor@jpj.net
diff --git a/net/p0f/pkg-plist b/net/p0f/pkg-plist
new file mode 100644
index 0000000..ac2c86b
--- /dev/null
+++ b/net/p0f/pkg-plist
@@ -0,0 +1,4 @@
+bin/p0f
+etc/p0f.fp
+share/doc/p0f/README
+@dirrm share/doc/p0f
OpenPOWER on IntegriCloud