ports/90393: new port: net/scapy an interactive packet manipulation program in Python

VANHULLEBUS Yvan vanhu at netasq.com
Wed Dec 14 17:00:22 UTC 2005


>Number:         90393
>Category:       ports
>Synopsis:       new port: net/scapy an interactive packet manipulation program in Python
>Confidential:   no
>Severity:       non-critical
>Priority:       medium
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          update
>Submitter-Id:   current-users
>Arrival-Date:   Wed Dec 14 17:00:15 GMT 2005
>Closed-Date:
>Last-Modified:
>Originator:     VANHULLEBUS Yvan
>Release:        FreeBSD 6.0 i386
>Organization:
NETASQ
>Environment:
System: FreeBSD sangoku.zen.inc 6.0-RC1 FreeBSD 6.0-RC1 #1: Wed Oct 12 12:00:30 CEST 2005 root at sangoku.zen.inc:/usr/src/sys/i386/compile/sangoku i386


	
>Description:

Scapy is a powerful interactive packet manipulation program written in
Python.

This is a FreeBSD port for the latest stable release of scapy.

Note: as scapy's tarball does not contain a Makefile, I had to do some
hacks on the port's Makefile.

I also had some problems when trying to install scapy's man page, and
finally disabled it for now (if someone can find a solution for that
problem....).


>How-To-Repeat:
	
>Fix:
# This is a shell archive.  Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file".  Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
#	scapy
#	scapy/Makefile
#	scapy/distinfo
#	scapy/pkg-descr
#	scapy/pkg-plist
#
echo c - scapy
mkdir -p scapy > /dev/null 2>&1
echo x - scapy/Makefile
sed 's/^X//' >scapy/Makefile << 'END-of-scapy/Makefile'
X# New ports collection makefile for:	scapy
X# Date created:		08 dec 2005
X# Whom:			vanhu
X#
X# $FreeBSD: 
X
X# TODO: - configurable --enable-xxx for various additional dependancies
X
XPORTNAME=	scapy
XPORTVERSION=	1.0.2
XCATEGORIES=	net
XMASTER_SITES=	http://secdev.org/projects/scapy/files/
X
XMAINTAINER=	vanhu at netasq.com
XCOMMENT=	powerful interactive packet manipulation program in python
X
XWRKSRC=		${WRKDIR}/${DISTNAME}
X
X#MANCOMPRESSED=yes
X#MAN1=scapy.1.gz
XNO_MAN=1
X
XUSE_PYTHON=yes
X
XRUN_DEPENDS=	py-libdnet:${PORTSDIR}/net/py-libdnet py-pcap:${PORTSDIR}/net/py-pcap
X
X# Scapy package has no Makefile, so we have to do the install manyally
X# XXX man page install doesn't seems to work....
X
XNO_BUILD=1
Xdo-install:
X	@${INSTALL_SCRIPT} ${WRKSRC}/scapy.py ${PREFIX}/bin/scapy
X#	@${INSTALL_MAN} ${WRKSRC}/scapy.1.gz ${MAN1PREFIX}/scapy.1.gz
X
X
X.include <bsd.port.mk>
END-of-scapy/Makefile
echo x - scapy/distinfo
sed 's/^X//' >scapy/distinfo << 'END-of-scapy/distinfo'
XMD5 (scapy-1.0.2.tar.gz) = c4cac0a657079492710b31a6aed0672a
XSHA256 (scapy-1.0.2.tar.gz) = e71c6917f00ed0269144680029ea3270650ee1a6200f32e1ffe1c8b958da0293
XSIZE (scapy-1.0.2.tar.gz) = 104563
END-of-scapy/distinfo
echo x - scapy/pkg-descr
sed 's/^X//' >scapy/pkg-descr << 'END-of-scapy/pkg-descr'
XScapy is a powerful interactive packet manipulation program. It is
Xable to forge or decode packets of a wide number of protocols, send
Xthem on the wire, capture them, match requests and replies, and much
Xmore. It can easily handle most classical tasks like scanning,
Xtracerouting, probing, unit tests, attacks or network discovery (it
Xcan replace hping, 85% of nmap, arpspoof, arp-sk, arping, tcpdump,
Xtethereal, p0f, etc.). It also performs very well at a lot of other
Xspecific tasks that most other tools can't handle, like sending
Xinvalid frames, injecting your own 802.11 frames, combining technics
X(VLAN hopping+ARP cache poisoning, VOIP decoding on WEP encrypted
Xchannel, ...), etc.
X
X
X
XWWW: http://secdev.org/projects/scapy
END-of-scapy/pkg-descr
echo x - scapy/pkg-plist
sed 's/^X//' >scapy/pkg-plist << 'END-of-scapy/pkg-plist'
Xbin/scapy
END-of-scapy/pkg-plist
exit


>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the freebsd-ports-bugs mailing list