[Bug 200519] net/spoofer: update to 0.8a

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Fri May 29 16:13:31 UTC 2015


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=200519

            Bug ID: 200519
           Summary: net/spoofer: update to 0.8a
           Product: Ports & Packages
           Version: Latest
          Hardware: i386
                OS: Any
            Status: New
          Severity: Affects Some People
          Priority: ---
         Component: Individual Port(s)
          Assignee: jadawin at FreeBSD.org
          Reporter: mjl at luckie.org.nz
          Assignee: jadawin at FreeBSD.org
             Flags: maintainer-feedback?(jadawin at FreeBSD.org)

Created attachment 157251
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=157251&action=edit
update spoofer to 0.8a

The Spoofer project has been taken over by CAIDA

http://blog.caida.org/best_available_data/2015/05/28/caida-takes-over-stewardship-of-spoofer-project-infrastructure/

This port update shifts the master side to the CAIDA master site, and includes
a new release of the source code (0.8a).  The changes in the source code:

spoofer-0.8a
-----------
* Moved servers to CAIDA
* Implemented raw ethernet spoofing on all platforms (with libpcap or winpcap)
  as a fallback when the OS blocks raw ip spoofing
* Implemented IPv6 spoofing on all platforms (with libpcap or winpcap)
* Removed dependence on crufty old libnet and libdnet

In particular, because we are not using raw IP sockets anymore, we can now test
spoofing on freebsd NAT routers because we will bypass the NAT layer as
required.

I am happy to take over maintainership.

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-ports-bugs mailing list