Index: head/net-mgmt/p0f/Makefile =================================================================== --- head/net-mgmt/p0f/Makefile (revision 296955) +++ head/net-mgmt/p0f/Makefile (revision 296956) @@ -1,38 +1,46 @@ # New ports collection makefile for: p0f # Date created: 2000-06-12 # Whom: Trevor Johnson # # $FreeBSD$ # PORTNAME= p0f PORTVERSION= 3.05b CATEGORIES= net-mgmt security -MASTER_SITES= http://lcamtuf.coredump.cx/p0f3/releases/ +MASTER_SITES= http://lcamtuf.coredump.cx/p0f3/releases/ \ + http://fossies.org/unix/privat/ EXTRACT_SUFX= .tgz MAINTAINER= fbsd-ports@opsec.eu COMMENT= Passive OS fingerprinting tool +LICENSE= LGPL21 +LICENSE_FILE= ${WRKSRC}/docs/COPYING + PLIST_FILES= bin/p0f bin/p0f-client bin/p0f-sendsyn \ bin/p0f-sendsyn6 etc/p0f.fp -PORTDOCS= COPYING ChangeLog README TODO existential-notes.txt extra-sigs.txt +PORTDOCS= COPYING ChangeLog README TODO existential-notes.txt \ + extra-sigs.txt + +MAKE_JOBS_SAFE= yes +MAKE_ARGS+= CC="${CC}" CFLAGS="${CFLAGS}" post-patch: @${REINPLACE_CMD} -e 's|/etc|${PREFIX}/etc|g' ${WRKSRC}/README @${REINPLACE_CMD} -e 's|p0f.fp|${PREFIX}/etc/p0f.fp|g' ${WRKSRC}/config.h do-install: .for ii in p0f tools/p0f-client tools/p0f-sendsyn tools/p0f-sendsyn6 ${INSTALL_PROGRAM} ${WRKSRC}/${ii} ${PREFIX}/bin .endfor ${INSTALL_DATA} ${WRKSRC}/p0f.fp ${PREFIX}/etc/ .if !defined(NOPORTDOCS) ${MKDIR} ${DOCSDIR} .for ii in ${PORTDOCS} ${INSTALL_DATA} ${WRKSRC}/docs/${ii} ${DOCSDIR} .endfor .endif .include Property changes on: head/net-mgmt/p0f/Makefile ___________________________________________________________________ Modified: cvs2svn:cvs-rev ## -1 +1 ## -1.30 \ No newline at end of property +1.31 \ No newline at end of property Index: head/net-mgmt/p0f/pkg-descr =================================================================== --- head/net-mgmt/p0f/pkg-descr (revision 296955) +++ head/net-mgmt/p0f/pkg-descr (revision 296956) @@ -1,23 +1,23 @@ from the README: Passive OS fingerprinting is based on information coming from a remote host when it establishes a connection to our system. Captured packets contain enough information to identify the operating system. In contrast to active scanners such as nmap and QueSO, p0f does not send anything to the host being identified. - + For more information, read Spitzner's text at: http://www.enteract.com/~lspitz/finger.html . from the maintainer: Use of this program requires read access to the packet filtering device, typically /dev/bpf0. Granting such access allows the users who have it to put your Ethernet device into promiscuous mode and sniff your network. See http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml if you do not understand how this can be harmful. Running p0f with no options will cause it to analyse packets intended for other hosts. WWW: http://lcamtuf.coredump.cx/p0f.shtml Property changes on: head/net-mgmt/p0f/pkg-descr ___________________________________________________________________ Modified: cvs2svn:cvs-rev ## -1 +1 ## -1.4 \ No newline at end of property +1.5 \ No newline at end of property