summaryrefslogtreecommitdiff
path: root/security/ike-scan
AgeCommit message (Collapse)AuthorFilesLines
2005-04-11Remove USE_BUILDLINK3 and NO_BUILDLINK; these are no longer used.tv1-2/+1
2005-02-28Changes 1.7.1:adam2-10/+8
* Fixed bug which caused hostnames containing hyphens to fail with an error. * Improved mapping of ID numbers to names in decode. This allows sparse IDs ranges (e.g. 1,2,3,65000) to be supported, which means that we can now decode XAUTH authentication method amongst other things. * Added SO_BROADCAST option to UDP socket to allow sending to broadcast addresses. Previously this gave a permission denied error.
2005-02-24Add RMD160 digests.agc1-1/+2
2005-01-14- Update to 1.7adrianp3-7/+25
- Add bl3 and openssl support - Fix paths in man pages - Install extra documentation - Remove un-needed options from pkgsrc Makefile Lots of changes/bugfixes from 1.6 including: psk-crack.c: New program to crack Aggressive Mode Pre-Shared Keys using dictionary attack. This uses the output from "ike-scan -P" together with a dictionary.
2004-02-28MAINTAINER should be tech-pkg@NetBSD.org instead of packages@netbsd.org.taca1-2/+2
2004-02-27ike-scan, IKE fingerprinting toolitojun4-0/+47
--- ike-scan discovers IKE hosts and can also fingerprint them using the retransmission backoff pattern. ike-scan does two things: a) Discovery: Determine which hosts are running IKE. This is done by displaying those hosts which respond to the IKE requests sent by ike-scan. b) Fingerprinting: Determine which IKE implementation the hosts are using. This is done by recording the times of the IKE response packets from the target hosts and comparing the observed retransmission backoff pattern against known patterns. The retransmission backoff fingerprinting concept is discussed in more detail in the UDP backoff fingerprinting paper which should be included in the ike-scan kit as udp-backoff-fingerprinting-paper.txt. The program sends IKE main mode requests to the specified hosts and displays any responses that are received. It handles retry and retransmission with backoff to cope with packet loss. It also limits the amount of bandwidth used by the outbound IKE packets.