summaryrefslogtreecommitdiff
path: root/net/isic
AgeCommit message (Collapse)AuthorFilesLines
2016-02-25Use OPSYSVARS.jperkin1-13/+6
2015-11-04Add SHA512 digests for distfiles for net categoryagc1-1/+2
Problems found with existing digests: Package haproxy distfile haproxy-1.5.14.tar.gz 159f5beb8fdc6b8059ae51b53dc935d91c0fb51f [recorded] da39a3ee5e6b4b0d3255bfef95601890afd80709 [calculated] Problems found locating distfiles: Package bsddip: missing distfile bsddip-1.02.tar.Z Package citrix_ica: missing distfile citrix_ica-10.6.115659/en.linuxx86.tar.gz Package djbdns: missing distfile djbdns-1.05-test25.diff.bz2 Package djbdns: missing distfile djbdns-cachestats.patch Package djbdns: missing distfile 0002-dnscache-cache-soa-records.patch Package gated: missing distfile gated-3-5-11.tar.gz Package owncloudclient: missing distfile owncloudclient-2.0.2.tar.xz Package poink: missing distfile poink-1.6.tar.gz Package ra-rtsp-proxy: missing distfile rtspd-src-1.0.0.0.tar.gz Package ucspi-ssl: missing distfile ucspi-ssl-0.70-ucspitls-0.1.patch Package waste: missing distfile waste-source.tar.gz Otherwise, existing SHA1 digests verified and found to be the same on the machine holding the existing distfiles (morden). All existing SHA1 digests retained for now as an audit trail.
2012-10-23Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days.asau1-3/+1
2009-12-09Update isic to 0.07.obache4-30/+47
pkgsrc changes: * change HOMEPAGE and MASTER_SITES to new Sourceforge's one. * set LICENSE=2-clause-bsd * add user-destdir support ISIC (v0.07) 12/22/2006, by Shu Xiao (sxiao@cisco.com) - New IPv6 utilities: isic6, tcpsic6, udpsic6, icmpsic6. - New tool multisic for sending random multicast UDP packets. - Fixed compilation errors with GCC v4. - Added -k skip option for esic per the request from some users. - Placed the flood control under low traffic limit case only. The original flood protection code calls gettimeofday(), and runs after sending each packet. This is time consumping and prevents the tool from reaching high traffic limit on high speed interface (eg. 1000Base-TX). Now the flood control will take effect only if the specified maximum rate is less than 10MB/s. - Corrected -t option bug with tcpsic: The old one was using it reversely, e.g. -t 30 would generate packet with 30% of them having correct TCP checksum. But -t is actually for the percentage of bad TCP checksum. - Changed to used 32-bit random numbers for some fields: For IPv4 *sic tools, the source/destination IP address and TCP sequence/acknowledge numbers are 32-bit width, and should be assigned with equal size random numbers. The old code did not do shifting correctly. - Changed the default value to 10 for all percentage options. - Cleaned the usage printout of icmpsic: There were ports used in the usage printout of icmpsic. This was misleading since no ports arguments needed for it. - New manual page, try to get more help with "man isic".
2009-12-09sort.obache1-3/+3
2009-07-17Give up MAINTAINERadrianp1-2/+2
2007-02-22Whitespace cleanup, courtesy of pkglint.wiz1-3/+3
Patch provided by Sergey Svishchev in private mail.
2007-02-18buildlink updates and patches to handle the new libnet package structureadrianp3-2/+21
bump PKGREVISION
2005-12-05Fixed pkglint warnings. The warnings are mostly quoting issues, forrillig1-3/+3
example MAKE_ENV+=FOO=${BAR} is changed to MAKE_ENV+=FOO=${BAR:Q}. Some other changes are outlined in http://mail-index.netbsd.org/tech-pkg/2005/12/02/0034.html
2005-04-11Remove USE_BUILDLINK3 and NO_BUILDLINK; these are no longer used.tv1-2/+1
2005-02-24Add RMD160 digests.agc1-1/+2
2005-01-23Remove DIST_SUBDIR from distinfo too (hi adrian!). PR 29053 by diro at ↵wiz1-3/+3
nixsys bz.
2005-01-20- Grab maintership from hubertf@adrianp1-3/+2
- Remove DIST_SUBDIR
2005-01-20- Update to 0.06adrianp2-7/+6
- Change to link with Libnet 1.1.x: - More accurate datapush rate calculation: - Fixed esic MAC address printout bug:
2004-10-03Libtool fix for PR pkg/26633, and other issues. Update libtool to 1.5.10tv1-1/+2
in the process. (More information on tech-pkg.) Bump PKGREVISION and BUILDLINK_DEPENDS of all packages using libtool and installing .la files. Bump PKGREVISION (only) of all packages depending directly on the above via a buildlink3 include.
2004-04-25Convert to buildlink3.snj1-3/+3
2004-01-31s/seperate/separate/snj1-1/+1
2003-11-28Update HOMEPAGE and MASTER_SITES.wiz2-6/+7
Recreate distinfo since tarball on new site is repackaged (same contents verified). Add DIST_SUBDIR since the name hasn't changed (can be removed on next update).
2003-07-17s/netbsd.org/NetBSD.org/grant1-2/+2
2003-03-28Remove superfluous whitespace.wiz1-3/+3
2003-02-09reduce optimization on alpha to avoid a compiler bugdmcmahill1-1/+16
2002-08-25Merge packages from the buildlink2 branch back into the main trunk thatjlam1-3/+3
have been converted to USE_BUILDLINK2.
2001-11-02Strongly-buildlinkifyzuntum1-4/+3
2001-10-31Move pkg/ files into package's toplevel directoryzuntum2-1/+1
2001-04-21Move to sha1 checksum, and/or add distfile sizes.wiz1-2/+3
2001-04-17+ move the distfile digest/checksum value from files/md5 to distinfoagc2-3/+3
+ move the patch digest/checksum values from files/patch-sum to distinfo
2001-02-17Update to new COMMENT style: COMMENT var in Makefile instead of pkg/COMMENT.wiz2-2/+2
2000-11-30Import isic-0.05:hubertf5-0/+51
Ip Stack Integrity Checker (IP, TCP, UDP, ICMP et. al.) ISIC (and components) is intended to test the integrity of an IP Stack and its component stacks (TCP, UDP, ICMP et. al.) It does this by generating a controlled random packet (controlled randomness... wacky huh?). The user can specify he/she/it [I'm tempted to put 'it' before 'she' :-)] wants a stream of TCP packets. He/she/it suspects that the target has weak handling of IP Options (aka Firewall-1). So he/she/it does a 'tcpsic -s rand -d firewall -I100'. And observes the result. A great use for ISIC would be to fire it through a firewall and see if the firewall leaks packets. But of course that would be illegal because Network Associates owns a bogus patent on that :-) You could do that by setting the default route on the sending computer to the firewall..... But that would be illegal. (But I can't legally have a beer so do you think I care about laws?) By far the most common use for these tools is testing IDS systems. A day after I took the source offline and moved it to a cvs server, a half dozen people working on seperate home-grown IDS systems emailed requesting the source be put back up.