svn commit: r426160 - head/net-mgmt/p0f
Alexey Dokuchaev
danfe at FreeBSD.org
Tue Nov 15 10:56:48 UTC 2016
Author: danfe
Date: Tue Nov 15 10:56:46 2016
New Revision: 426160
URL: https://svnweb.freebsd.org/changeset/ports/426160
Log:
- Reformat port description text for better readability and compactness
- Remove reference to Spitzner's paper which is no longer available
- Fix a typo (analyse -> analyze); update WWW entry to avoid redirect
Modified:
head/net-mgmt/p0f/pkg-descr
Modified: head/net-mgmt/p0f/pkg-descr
==============================================================================
--- head/net-mgmt/p0f/pkg-descr Tue Nov 15 10:49:43 2016 (r426159)
+++ head/net-mgmt/p0f/pkg-descr Tue Nov 15 10:56:46 2016 (r426160)
@@ -1,23 +1,15 @@
-from the README:
-
Passive OS fingerprinting is based on information coming from a remote host
when it establishes a connection to our system. Captured packets contain
enough information to identify the operating system. In contrast to active
-scanners such as nmap and QueSO, p0f does not send anything to the host being
-identified.
-
-For more information, read Spitzner's text at:
-http://www.enteract.com/~lspitz/finger.html .
+scanners such as nmap and QueSO, p0f does not send anything to the host
+being identified.
-from the maintainer:
+Use of this program requires read access to the packet filtering device,
+typically /dev/bpf0. Granting such access allows the users who have it to
+put your Ethernet device into promiscuous mode and sniff your network.
-Use of this program requires read access to the packet filtering
-device, typically /dev/bpf0. Granting such access allows the users
-who have it to put your Ethernet device into promiscuous mode and
-sniff your network. See
-http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
-if you do not understand how this can be harmful. Running p0f with
-no options will cause it to analyse packets intended for other
-hosts.
+See http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
+if you do not understand how this can be harmful. Running p0f with no
+options will cause it to analyze packets intended for other hosts.
-WWW: http://lcamtuf.coredump.cx/p0f.shtml
+WWW: http://lcamtuf.coredump.cx/p0f3/
More information about the svn-ports-head
mailing list