svn commit: r426820 - head/net-mgmt/p0f

Alexey Dokuchaev danfe at FreeBSD.org
Tue Nov 22 12:30:58 UTC 2016


Author: danfe
Date: Tue Nov 22 12:30:56 2016
New Revision: 426820
URL: https://svnweb.freebsd.org/changeset/ports/426820

Log:
  - Restore link to Lance Spitzner's article (2002 Honeynet Project version)
  - Remove nowadays defunct www.infoworld.com link (missed in r426160)
  
  Submitted by:	Royce Williams

Modified:
  head/net-mgmt/p0f/pkg-descr

Modified: head/net-mgmt/p0f/pkg-descr
==============================================================================
--- head/net-mgmt/p0f/pkg-descr	Tue Nov 22 12:23:04 2016	(r426819)
+++ head/net-mgmt/p0f/pkg-descr	Tue Nov 22 12:30:56 2016	(r426820)
@@ -4,12 +4,13 @@ enough information to identify the opera
 scanners such as nmap and QueSO, p0f does not send anything to the host
 being identified.
 
+For more information, refer to Lance Spitzner's old paper about passive OS
+fingerprinting: http://old.honeynet.org/papers/finger/.
+
 Use of this program requires read access to the packet filtering device,
 typically /dev/bpf0.  Granting such access allows the users who have it to
 put your Ethernet device into promiscuous mode and sniff your network.
-
-See http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
-if you do not understand how this can be harmful.  Running p0f with no
-options will cause it to analyze packets intended for other hosts.
+Running p0f with no options will cause it to analyze packets intended for
+other hosts.
 
 WWW: http://lcamtuf.coredump.cx/p0f3/


More information about the svn-ports-all mailing list