[Bug 200519] net/spoofer: update to 0.8a
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Fri May 29 16:13:31 UTC 2015
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=200519
Bug ID: 200519
Summary: net/spoofer: update to 0.8a
Product: Ports & Packages
Version: Latest
Hardware: i386
OS: Any
Status: New
Severity: Affects Some People
Priority: ---
Component: Individual Port(s)
Assignee: jadawin at FreeBSD.org
Reporter: mjl at luckie.org.nz
Assignee: jadawin at FreeBSD.org
Flags: maintainer-feedback?(jadawin at FreeBSD.org)
Created attachment 157251
--> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=157251&action=edit
update spoofer to 0.8a
The Spoofer project has been taken over by CAIDA
http://blog.caida.org/best_available_data/2015/05/28/caida-takes-over-stewardship-of-spoofer-project-infrastructure/
This port update shifts the master side to the CAIDA master site, and includes
a new release of the source code (0.8a). The changes in the source code:
spoofer-0.8a
-----------
* Moved servers to CAIDA
* Implemented raw ethernet spoofing on all platforms (with libpcap or winpcap)
as a fallback when the OS blocks raw ip spoofing
* Implemented IPv6 spoofing on all platforms (with libpcap or winpcap)
* Removed dependence on crufty old libnet and libdnet
In particular, because we are not using raw IP sockets anymore, we can now test
spoofing on freebsd NAT routers because we will bypass the NAT layer as
required.
I am happy to take over maintainership.
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list