Age | Commit message (Collapse) | Author | Files | Lines |
|
|
|
documentation for this particular release of the program. This should
fix the doc md5 once and for all.
|
|
(briefly discussed at dnssec workshop after IETF49).
|
|
Install man pages
|
|
(adjust for our new PPP DLTs). Changes:
00/06/09 version-1.5
always use link level packet size to record traffic.
00/04/24 support tcl-8.2/tk-8.2.
change the compiler optimization flag from O6 to O2.
00/01/05 net_read.c: check the total length field in the ip header.
we found illegal values in our traffic traces which
causes assertion in b_addsize to fail.
|
|
|
|
|
|
|
|
|
|
not doing so results in application code needing change, e.g. pchar.
With this change, pchar now builds with ucd-snmp 4.0.1.12 and 4.1.2
without a change.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
RFC-1413 compliant, but returns no useful information.
|
|
Consistent 4 character indentation of SUBDIR entries.
|
|
- Fixed spec file to automatically add .gz extension to man files as required
- Tightened firewall rules.
- Better check for /var/run in adsl-status; minor shell script fixes and
cleanups for NetBSD and Solaris.
- Added FAQ to HOW-TO-CONNECT regarding running a script each time a
connection is made.
- Fixed the init script to create/remove /var/lock/subsys/adsl (patch
courtesy of Charley Carter.)
- Added support (under Linux) for N_HDLC line discipline which should
greatly reduce CPU usage. My tests show it cuts CPU usage in half.
My 486 DX2/66 gets 800 kb/s at 22% CPU usage.
- adsl-connect uses "setsid" (if available) so that adsl-stop doesn't kill
its caller. There is (IMO) a bug in pppd which kills all processes in
its process group if the "pty" option is used. The setsid program gets
around this bug, on Linux at least.
- Port to Solaris, courtesy of David Holland.
- Renamed spec file from "spec" to "rp-pppoe.spec" and made some cleanups.
NOTE: Red Hat, in their infinite wisdom, decided to make the new RPM
compress man pages automatically. You may have problems building RPM's
from source unless you get the latest rpm package and make sure it
compresses man pages.
|
|
* implemented [ipv6::address]:port as specified by rfc2732.
* fixed local tilde globbing.
* don't wait for file lock forever; print warning if locking fails.
* save cwd_history only if needed.
* `queue' command now sets last job number to itself.
* optimize number of poll calls during ftp transfer.
* fixed mput for directory case (continue loop instead of returning).
* don't queue up too much MDTM/SIZE commands in sync mode.
* fixed --with-modules compilation.
|
|
|
|
"echoping" is a small program to test (approximatively) performances of a
remote host by sending it TCP "echo" (or other protocol) packets.
Inspired by pkg/8652 by Greg A. Woods.
|
|
dependency on it so that SNMP support is always enabled.
|
|
|
|
a directory option to it.
|
|
the libpcap.a.
|
|
at least bonobo and ORBit, and need "@unexec rmdir ... || true", not
"@dirrm".
|
|
|
|
Changes since 1.4.0:
Bugfixes in list building/updating, and cancels on opennap servers.
|
|
|
|
Ip Stack Integrity Checker (IP, TCP, UDP, ICMP et. al.)
ISIC (and components) is intended to test the integrity of an IP
Stack and its component stacks (TCP, UDP, ICMP et. al.) It does
this by generating a controlled random packet (controlled randomness...
wacky huh?). The user can specify he/she/it [I'm tempted to put
'it' before 'she' :-)] wants a stream of TCP packets. He/she/it
suspects that the target has weak handling of IP Options (aka
Firewall-1). So he/she/it does a 'tcpsic -s rand -d firewall
-I100'. And observes the result.
A great use for ISIC would be to fire it through a firewall and
see if the firewall leaks packets. But of course that would be
illegal because Network Associates owns a bogus patent on that :-)
You could do that by setting the default route on the sending
computer to the firewall..... But that would be illegal. (But I
can't legally have a beer so do you think I care about laws?)
By far the most common use for these tools is testing IDS systems.
A day after I took the source offline and moved it to a cvs server,
a half dozen people working on seperate home-grown IDS systems
emailed requesting the source be put back up.
|
|
|
|
|
|
|
|
Correct PLIST for libtool changes.
|
|
|
|
|
|
previous revision.
|
|
An exploit for a buffer overrun in the AFS dissector was recently
released on BugTraq. Ethereal 0.8.14 fixes this and other
possibly-exploitable overruns. Also new in 0.8.14 are dissectors
for WAP, SIP, AIM/OSCAR, 802.11, GIOP v1.2, and MGCP (plugin).
Other dissectors were updated as well. Be sure to upgrade to
0.8.14 as soon as possible
|
|
|
|
|
|
|
|
|
|
|
|
Configuration program for Apple's Airport Base Station
|
|
|
|
|
|
|
|
|