svn commit: r426820 - head/net-mgmt/p0f
Alexey Dokuchaev
danfe at FreeBSD.org
Tue Nov 22 12:30:58 UTC 2016
Author: danfe
Date: Tue Nov 22 12:30:56 2016
New Revision: 426820
URL: https://svnweb.freebsd.org/changeset/ports/426820
Log:
- Restore link to Lance Spitzner's article (2002 Honeynet Project version)
- Remove nowadays defunct www.infoworld.com link (missed in r426160)
Submitted by: Royce Williams
Modified:
head/net-mgmt/p0f/pkg-descr
Modified: head/net-mgmt/p0f/pkg-descr
==============================================================================
--- head/net-mgmt/p0f/pkg-descr Tue Nov 22 12:23:04 2016 (r426819)
+++ head/net-mgmt/p0f/pkg-descr Tue Nov 22 12:30:56 2016 (r426820)
@@ -4,12 +4,13 @@ enough information to identify the opera
scanners such as nmap and QueSO, p0f does not send anything to the host
being identified.
+For more information, refer to Lance Spitzner's old paper about passive OS
+fingerprinting: http://old.honeynet.org/papers/finger/.
+
Use of this program requires read access to the packet filtering device,
typically /dev/bpf0. Granting such access allows the users who have it to
put your Ethernet device into promiscuous mode and sniff your network.
-
-See http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
-if you do not understand how this can be harmful. Running p0f with no
-options will cause it to analyze packets intended for other hosts.
+Running p0f with no options will cause it to analyze packets intended for
+other hosts.
WWW: http://lcamtuf.coredump.cx/p0f3/
More information about the svn-ports-all
mailing list