svn commit: r426160 - head/net-mgmt/p0f

Alexey Dokuchaev danfe at FreeBSD.org
Tue Nov 15 10:56:48 UTC 2016


Author: danfe
Date: Tue Nov 15 10:56:46 2016
New Revision: 426160
URL: https://svnweb.freebsd.org/changeset/ports/426160

Log:
  - Reformat port description text for better readability and compactness
  - Remove reference to Spitzner's paper which is no longer available
  - Fix a typo (analyse -> analyze); update WWW entry to avoid redirect

Modified:
  head/net-mgmt/p0f/pkg-descr

Modified: head/net-mgmt/p0f/pkg-descr
==============================================================================
--- head/net-mgmt/p0f/pkg-descr	Tue Nov 15 10:49:43 2016	(r426159)
+++ head/net-mgmt/p0f/pkg-descr	Tue Nov 15 10:56:46 2016	(r426160)
@@ -1,23 +1,15 @@
-from the README:
-
 Passive OS fingerprinting is based on information coming from a remote host
 when it establishes a connection to our system.  Captured packets contain
 enough information to identify the operating system.  In contrast to active
-scanners such as nmap and QueSO, p0f does not send anything to the host being
-identified.
-
-For more information, read Spitzner's text at:
-http://www.enteract.com/~lspitz/finger.html .
+scanners such as nmap and QueSO, p0f does not send anything to the host
+being identified.
 
-from the maintainer:
+Use of this program requires read access to the packet filtering device,
+typically /dev/bpf0.  Granting such access allows the users who have it to
+put your Ethernet device into promiscuous mode and sniff your network.
 
-Use of this program requires read access to the packet filtering
-device, typically /dev/bpf0.  Granting such access allows the users
-who have it to put your Ethernet device into promiscuous mode and
-sniff your network.  See
-http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
-if you do not understand how this can be harmful.  Running p0f with
-no options will cause it to analyse packets intended for other
-hosts.
+See http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
+if you do not understand how this can be harmful.  Running p0f with no
+options will cause it to analyze packets intended for other hosts.
 
-WWW:  http://lcamtuf.coredump.cx/p0f.shtml
+WWW: http://lcamtuf.coredump.cx/p0f3/


More information about the svn-ports-head mailing list