ports/84627: new port: security/ipguard - Tool designed to protect LAN IP adress space by ARP spoofing

SeaD sead at mail.ru
Sat Aug 6 19:30:11 UTC 2005


>Number:         84627
>Category:       ports
>Synopsis:       new port: security/ipguard - Tool designed to protect LAN IP adress space by ARP spoofing
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Sat Aug 06 19:30:10 GMT 2005
>Closed-Date:
>Last-Modified:
>Originator:     SeaD
>Release:        FreeBSD 4.10-RELEASE-p3 i386
>Organization:
>Environment:
System: FreeBSD deep.freeznet 4.10-RELEASE-p3 FreeBSD 4.10-RELEASE-p3 #0: Sun Oct 3 03:29:12 YEKST 2004 sead at deep.freeznet:/usr/local/src/obj/usr/local/src/system/sys/KDEEP i386


>Description:
        new port
>How-To-Repeat:

>Fix:

# This is a shell archive.  Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file".  Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
#       ipguard
#       ipguard/Makefile
#       ipguard/distinfo
#       ipguard/pkg-descr
#       ipguard/pkg-plist
#       ipguard/pkg-message
#
echo c - ipguard
mkdir -p ipguard > /dev/null 2>&1
echo x - ipguard/Makefile
sed 's/^X//' >ipguard/Makefile << 'END-of-ipguard/Makefile'
X# New ports collection makefile for:    ipguard
X# Date created:                         2 Aug 2005
X# Whom:                                 SeaD
X#
X# $FreeBSD$
X#
X#
X#
X
XPORTNAME=      ipguard
XPORTVERSION=   0.04
XCATEGORIES=    security net
XMASTER_SITES=  http://ipguard.deep.perm.ru/files/
X
XMAINTAINER=    sead at mail.ru
XCOMMENT=       Tool designed to protect LAN IP adress space by ARP spoofing
X
XBUILD_DEPENDS= ${LOCALBASE}/lib/libnet.a:${PORTSDIR}/net/libnet
X
XMAN8=          ipguard.8
X
Xdo-install:
X       ${INSTALL_PROGRAM} ${WRKSRC}/ipguard ${PREFIX}/sbin
X       ${INSTALL_MAN} ${WRKSRC}/doc/ipguard.8 ${MANPREFIX}/man/man8
X       ${INSTALL_SCRIPT} ${WRKSRC}/doc/ipguard.sh.sample ${LOCALBASE}/etc/rc.d
X
Xpost-install:
X       @${CAT} ${PKGMESSAGE}
X
X
X.include <bsd.port.mk>
END-of-ipguard/Makefile
echo x - ipguard/distinfo
sed 's/^X//' >ipguard/distinfo << 'END-of-ipguard/distinfo'
XMD5 (ipguard-0.04.tar.gz) = cba351c88ac281149dbfde5360d3c844
END-of-ipguard/distinfo
echo x - ipguard/pkg-descr
sed 's/^X//' >ipguard/pkg-descr << 'END-of-ipguard/pkg-descr'
Xipguard listens network for ARP packets. All permitted MAC/IP pairs
Xlisted in 'ethers' file. If it recieves one with MAC/IP pair, which is
Xnot listed in 'ethers' file, it will send ARP reply with configured
Xfake address. This will prevent not permitted host to work properly
Xin this ethernet segment. Especially Windows(TM) hosts.
X
XAuthor SeaD <sead at mail.ru>
XWWW: http://ipguard.deep.perm.ru/
END-of-ipguard/pkg-descr
echo x - ipguard/pkg-plist
sed 's/^X//' >ipguard/pkg-plist << 'END-of-ipguard/pkg-plist'
Xsbin/ipguard
Xetc/rc.d/ipguard.sh.sample
END-of-ipguard/pkg-plist
echo x - ipguard/pkg-message
sed 's/^X//' >ipguard/pkg-message << 'END-of-ipguard/pkg-message'
X
X===>  INSTALL NOTES:
X      Now create `ethers' file and put
X      where ipguard can find it. Default: /etc/ethers
X
X      And then start ipguard:
X      (cd /usr/local/etc/rc.d
X      mv ipguard.sh.sample ipguard.sh
X      /usr/local/etc/rc.d/ipguard.sh start)
END-of-ipguard/pkg-message
exit


>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the freebsd-ports-bugs mailing list