Age | Commit message (Collapse) | Author | Files | Lines |
|
|
|
|
|
1c1
< .\" $Id: dnstop.8,v 1.2 2002/12/24 19:20:28 wessels Exp $
---
> .\" $Id: dnstop.8,v 1.3 2003/01/24 17:44:23 wessels Exp $
53c53
< display the desitination address table
---
> display the destination address table
Noted by Jeremy C. Reed in PR 21286.
|
|
|
|
* Compile fixes for Solaris and systems with no IPv6 support
|
|
|
|
Based on a patch sent by Simon Hitzemann via PR pkg/21245.
Changes:
- fetch .tar.bz2 files
- UDP-based "ping" scanning (-PU) has been added. Works like -PS and -PA
- "Assertion `pt->down_this_block > 0' failed" seems to be fixed now.
- GCC dependency reported by Ayamura Kikuchi has been fixed.
- "assertion failure" after --max_rtt_timeout < 3000 has been fixed.
- Packet receive times are now taken from libpcap which improves performance
a bit.
- Fixed a bug that ignored RST responses while using -PS or -PA
- Ping scan performance improved when many instances of Nmap are executed
concurrently.
- Fixed a problem that caused BSD Make to bail out (never noticed that on
NetBSD).
- Fixed a divide by zero error when nonroot users requested ICMP pings. Now
it prints a warning and uses TCP connect() ping.
- Nmap is now a bit more tolerant of corrupt nmap-services and nmap-protocols.
- Some portnumbers have been added.
- --packet_trace support for Windows added.
- Removed superfluous "addport" line in XML output.
- wintcpip.cc and tcpip.cc have been merged into tcpip.cc
- Fixed assertion failure crashes related to combining port 0 scans and OS
scan.
- Compilation problems on systems without IPv6 support have been fixed.
- Applied patch from Jochen Erwied which fixes the format strings used for
printing certain timestamps.
- Upgraded to autoconf 2.57
- Renamed configure.ac to configure.in
- Changed the wording of NmapFE Gnome entries to better-comply with Gnome's
Human Interface Guidelines.
|
|
From Andrey Simonenko in PR#21224.
Changes since 1.3.2:
- Fixed two bugs in ipa(8), which caused core dumps: if there were one or
some `\t' characters after the "rule" or "limit" keyword in ipa.conf(5),
then ipa(8) wasn't able to parse such configuration file
- File /var/ipa/## lock ## was renamed to /var/ipa/lock db, because
BSD daily script deletes files with `#' characters. All should remove
the /var/ipa/## lock ## file
- Minor improvements and changes
|
|
|
|
and update MASTER_SITES.
|
|
|
|
|
|
|
|
before but apparently i did not :/)
|
|
Bump PKGREVISION to 1.
|
|
GNU sed)
|
|
IMPORTANT: This version fixes remotely exploitable heap overflow in the stream4
preprocessor module.
Advisory: http://www.coresecurity.com/common/showdoc.php?idx=313&idxseccion=10
Changes:
2.0.0:
======
- Enhanced high-performance detection engine
- Stateful Pattern Matching
- New detection keywords: byte_test & byte_jump
- The Snort code base has undergone an external third party professional
security audit funded by Sourcefire (http://www.sourcefire.com)
- Many new and updated rules
- snort.conf has been updated
- Enhancements to self preservation mechanisms in stream4 and frag2
- State tracking fixes in stream4
- New HTTP flow analyzer
- Enhanced protocol decoding (TCP options, 802.1q, etc)
- Enhanced protocol anomaly detection (IP, TCP, UDP, ICMP, RPC, HTTP, etc)
- Enhanced flexresp mode for real-time TCP session sniping
- Better chroot()'ing
- Tagging system updated
- Several million bugs addressed....
- Updated FAQ (thanks to Erek Adams and Dragos Ruiu) Snort 2.0 can be
downloaded at http://www.snort.org/dl/snort-2.0.0.tar.gz. Binary
versions of the codebase will be built over the next several days and
made available at here.
2.0.rc4:
========
- byte_jump/byte_test don't force relative content options
- byte_jump/byte_test absolute offsets work
- Better FIN handling in Stream4
2.0.rc3:
========
- A low memory usage detection method (enabled via "config detection:
search-method lowmem")
- Moved the default unix socket location to LOGDIR
2.0.rc2:
========
- syslog should work on win32 and unix
- major tagging updates
- new UDP decoding alerts
- snort.conf updates
2.0.rc1:
========
- Higher performance (due to a new pattern matcher and rebuilt detection
engine)
- Better decoders
- Enhanced stream reassembly and defragmentation
- Tons of bug fixes
- Updated rules
- Updated snort.conf
- New detection keywords (byte_test, byte_jump, distance, within) &
stateful pattern matching
- New HTTP flow analyzer
- Enhanced anomaly detection (HTTP, RPC, TCP, IP, etc)
- Better self preservation in stateful subsystems
- Xrefs fixed
- Flexresp works faster and more effectively
- Better chroot()'ing
- Fixed 802.1q decoding
- Better async state handling
- New alerting option: -A cmg!!
|
|
* DNS bug fixes
* FreeBSD compile fixes and UDP send bug fix
* New functions: gnet_{udp,mcast}_socket_get_local_inetaddr
* Build improvements: library is now named libgnet-MAJOR.MINOR,
favors GLib 2 over GLib 1.2
* New Base64 module (by Alfred Reibenschuh)
* Major documentation improvements
* Some minor API renaming in Inetaddr and TcpSocket
* IPv6 support
* Server, Conn, URI, and Unix modules are no longer "experimental"
* Header files are now in gnet-2.0
* gnet-config removed. Use pkg-config.
* Many API changes
* gnet_server_new() changed, but the prototype is the same. Make sure
you are using the new version correctly.
|
|
|
|
updated to gnet-2.0.0.
|
|
|
|
net/qadsl.
qADSL is an auto-login client and connection keeper for Telia AB ADSL
and Comhem broadband.
From pkgsrc-wip. Supplied by Ola Eriksson in PR#18480. Thanks!
|
|
This Perl module provides an extensible network server engine.
From PR#18830 from Ron Roskens. Thanks!
|
|
|
|
Changes since 0.10.0:
030407 Bugs uncovered by Charlie Reitsma <reitsmac@denison.edu>:
HOWTO incorrectly specified penctl in place of penlog
in Apache configuration example, and using penctl to
redirect log to penlogd didn't work.
Avoid bogus header rewriting in rewrite_request.
Released 0.10.1.
Also increase FN_SETSIZE for our package.
From PR#21075 (Andreas Wrede). Thanks!
|
|
|
|
|
|
|
|
as net/nettest.
The nettest and nettestd commands perform client and server
performance tests for various types of interprocess communication.
These tests time the data throughput of pipes and UNIX domain, TCP,
and UDP socket connections.
Supplied by Brian Ginsbach in PR#18985. Thanks!
|
|
Addresses PR pkg/18134.
Patch by itojun.
|
|
(suggested by lukem), group z, r and f flags.
some whitespace cleanup.
|
|
|
|
tcpflow is a program that captures data transmitted as part of TCP connections
(flows), and stores the data in a way that is convenient for protocol analysis
or debugging. A program like 'tcpdump' shows a summary of packets seen on the
wire, but usually doesn't store the data that's actually being transmitted.
In contrast, tcpflow reconstructs the actual data streams and stores each flow
in a separate file for later analysis.
tcpflow understands sequence numbers and will correctly reconstruct data
streams regardless of retransmissions or out-of-order delivery. However, it
currently does not understand IP fragments; flows containing IP fragments will
not be recorded properly.
tcpflow is based on the LBL Packet Capture Library (available from LBL) and
therefore supports the same rich filtering expressions that programs like
'tcpdump' support.
|
|
Addresses PR21086 by Rob Quinn <rquinn at sec dot sprint dot net>.
|
|
- group 'zrw' and 'p' args, -s last
- use the && operator consistently
- strip unneeded parens
- some whitespace cleanup
|
|
2003-02-20 0.42
- fixed a long-standing bug in dsbl handler - data received from
the remote was not collected correctly. Well, this one wasn't
happened too frequently - I only seen it once, when a proxy
delivered data from the target mailserver one byte at a time.
- added yet another port, 1813 (socks5), as advanced (level2) port.
SKK proxy listens here, but it is seen unfrequently.
2003-02-14 0.42b2
- added proxylogger - receiving part of proxycheck, to be used
from inetd and with -c chat.
2003-02-12 0.42b1
- fixed a small bug in last wingate/telnet code changes (mostly
cosmetic: "Resource temporarily unavailable" vs "Connection timed out").
- added another telnet/wingate proxy variant, with a prompt
"SpoonProxy>", which expects a command in form "host port"
(instead of tn-wg/wingate which is of the form "host:port").
2003-02-04 0.42b
- some code cleanups/changes: may break things, testing...
- FTP proxy detection added, port 1183 only for now. Interesting
to experiment with M$ ftp servers ;)
- fixed not finding advanced protocol if no ports are specified
(e.g. -pwg: tried default protos:ports instead of wg:25,1181)
- modified telnet/wingate proxy code to be a bit faster and to
know which command to sent to a particular proxy.
|
|
Changelog of Samba2.2 Japanese Edition
Samba Users Group Japan
Here is the fix list of Samba2.2 Japanese Edition.
The sign of each line means:
*: Fix of Samba Japanese Edition only
x: Fix of sending a patch to Samba Team
c: Fix of being commited a patch by Samba Team
samba-2.2.7b-ja-1.0
~~~~~~~~~~~~~~~~~~~
Changes to the original version
c Fixed a security problem which is fixed at samba 2.2.8a
[sugj-tech:5233]
c Fixed using CIDR of 'hosts allow/deny' parameters [samba-jp:14286]
|
|
* bug fixes
|
|
|
|
|
|
I forgot to add one more patch file.
|
|
Manually merge changes between samba 2.2.7a and samba 2.2.7b,
addressing both CAN-2003-0201 and CAN-2003-0085 by The Common
Vulnerabilities and Exposures (CVE) project.
|
|
Changes since 2.2.8:
Digital Defense, Inc. has alerted the Samba Team to a serious
vulnerability in all stable versions of Samba currently shipping.
The Common Vulnerabilities and Exposures (CVE) project has assigned
the ID CAN-2003-0201 to this defect.
This vulnerability, if exploited correctly, leads to an anonymous
user gaining root access on a Samba serving system. All versions
of Samba up to and including Samba 2.2.8 are vulnerable. An active
exploit of the bug has been reported in the wild.
|
|
- rewrite of large parts of code. Now use net-snmp libraries instead of
calling an external program
- There are now a sdig(8) and sdig.conf(5) man pages
- the debug code now has multiple levels so using -d once
doesn't give you all the really messy unimportant stuff. To see
that, use several - the really ugly ones are hiding down at 5 and 6.
With some snmp fixes by myself, I can now successfully querry my 3com and
alliedtelesyn switches.
|
|
hopefully for others too. Addresses PR#21045.
|
|
|
|
iplog is a TCP/IP traffic logger. Currently, it is capable of logging
TCP, UDP and ICMP traffic. Adding support for other protocols
should be relatively easy.
iplog's capabilities include the ability to detect TCP port
scans, TCP null scans, FIN scans, UDP and ICMP "smurf" attacks,
bogus TCP flags (used by scanners to detect the operating system in use),
TCP SYN scans, TCP "Xmas" scans, ICMP ping floods, UDP scans, and IP
fragment attacks.
iplog is able to run in promiscuous mode and monitor traffic to all hosts
on a network.
iplog uses libpcap to read data from the network and can be ported
to any system that supports pthreads and on which libpcap will function.
Submitted by Martin Mersberger <gremlin@portal-to-web.de> in PR 20887
|
|
|
|
streaming.
|
|
|