ports/51751: New port: security/ike-scan IKE scanner and identifier
Yonatan at xpert.com
Yonatan at xpert.com
Sun May 4 15:20:16 UTC 2003
>Number: 51751
>Category: ports
>Synopsis: New port: security/ike-scan IKE scanner and identifier
>Confidential: no
>Severity: non-critical
>Priority: low
>Responsible: freebsd-ports-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: change-request
>Submitter-Id: current-users
>Arrival-Date: Sun May 04 08:20:11 PDT 2003
>Closed-Date:
>Last-Modified:
>Originator: Yonatan at xpert.com
>Release: FreeBSD 4.8-RC i386
>Organization:
>Environment:
System: FreeBSD Temujin 4.8-RC FreeBSD 4.8-RC #1: Sat Apr 12 03:02:22 GMT 2003 root at Temujin:/usr/obj/usr/src/sys/TEMUJIN-G i386
>Description:
New security tool. portlint is happy. This is the first time I feed https to fetch. I haven't checked it with different PREFIXes, so I don't know if it's configure is doing it's magic.
>How-To-Repeat:
N/A
>Fix:
--- ike-scan.shar begins here ---
# This is a shell archive. Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file". Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
# .
# ./pkg-plist
# ./Makefile
# ./distinfo
# ./pkg-descr
#
echo c - .
mkdir -p . > /dev/null 2>&1
echo x - ./pkg-plist
sed 's/^X//' >./pkg-plist << 'END-of-./pkg-plist'
X at comment $FreeBSD$
Xbin/ike-scan
Xshare/ike-scan/ike-backoff-patterns
X%%PORTDOCS%%share/doc/ike-scan/AUTHORS
X%%PORTDOCS%%share/doc/ike-scan/COPYING
X%%PORTDOCS%%share/doc/ike-scan/NEWS
X%%PORTDOCS%%share/doc/ike-scan/README
X%%PORTDOCS%%share/doc/ike-scan/TODO
X%%PORTDOCS%%share/doc/ike-scan/udp-backoff-fingerprinting-paper.txt
X%%PORTDOCS%%@dirrm share/doc/ike-scan
X at dirrm share/ike-scan
END-of-./pkg-plist
echo x - ./Makefile
sed 's/^X//' >./Makefile << 'END-of-./Makefile'
X# Ports collection makefile for: ike-scan
X# Date created: 04 May 2003
X# Whom: Yonatan <Yonatan at xpert.com>
X#
X# $FreeBSD$
X#
X
XPORTNAME= ike-scan
XPORTVERSION= 1.0
XCATEGORIES= security
XMASTER_SITES= https://berlin.ccc.de/~cryx/
X
XMAINTAINER= Yonatan at xpert.com
XCOMMENT= VPN scanner and identifier
X
XHAS_CONFIGURE= yes
XCONFIGURE_ARGS+= "--datadir=${DATADIR}"
X
Xpost-install:
X. if !defined(NOPORTDOCS)
X ${MKDIR} ${DOCSDIR}
X. for i in AUTHORS COPYING NEWS README TODO udp-backoff-fingerprinting-paper.txt
X ${INSTALL_DATA} ${WRKSRC}/$i ${DOCSDIR}
X. endfor
X. endif
X
X.include <bsd.port.mk>
END-of-./Makefile
echo x - ./distinfo
sed 's/^X//' >./distinfo << 'END-of-./distinfo'
XMD5 (ike-scan-1.0.tar.gz) = 7299777c7d67d1cea82d9594867b4806
END-of-./distinfo
echo x - ./pkg-descr
sed 's/^X//' >./pkg-descr << 'END-of-./pkg-descr'
Xike-scan discovers IKE hosts and can also fingerprint them using the
Xretransmission backoff pattern.
Xike-scan does two things:
Xa) Discovery: Determine which hosts are running IKE.
X This is done by displaying those hosts which respond to the IKE requests
X sent by ike-scan.
Xb) Fingerprinting: Determine which IKE implementation the hosts are using.
X This is done by recording the times of the IKE response packets from the
X target hosts and comparing the observed retransmission backoff pattern
X against known patterns.
X
XWWW: http://www.nta-monitor.com/ike-scan
END-of-./pkg-descr
exit
--- ike-scan.shar ends here ---
>Release-Note:
>Audit-Trail:
>Unformatted:
More information about the freebsd-ports-bugs
mailing list