summaryrefslogtreecommitdiff
path: root/security/arpCounterattack/files (follow)
Commit message (Collapse)AuthorAgeFilesLines
* all: Remove all other $FreeBSD keywords.Mathieu Arnold2021-04-061-1/+0
|
* Convert to UCL & cleanup pkg-message (categories s)Mathieu Arnold2019-08-141-2/+6
| | | | Notes: svn path=/head/; revision=508909
* security/arpCounterattack: fix build with GCC architecturesPiotr Kubaj2019-07-301-1/+2
| | | | | | | | | | | | | | | | When building with GCC, sys/types.h needs to be included: In file included from arpCounterattack.cpp:35: /usr/include/net/bpf.h:49:9: error: 'u_int32_t' does not name a type; did you mean 'uint32_t'? typedef u_int32_t bpf_u_int32; ^~~~~~~~~ uint32_t Approved by: linimon (mentor) Differential Revision: https://reviews.freebsd.org/D21091 Notes: svn path=/head/; revision=507640
* security/arpCounterattack: fix build failureSteve Wills2019-05-242-5/+12
| | | | | | | | | PR: 236440 Submitted by: w.schwarzenfeld@utanet.at Reported by: my-roaming-data@outlook.com Notes: svn path=/head/; revision=502484
* security/arpCounterattack: stage, fix on F10+, fix on DragonFlyJohn Marino2014-07-075-0/+100
| | | | | | | | | | | | Also: * convert to c++11 for clang builds * convert to new LIB_DEPENDS format * use @sample keyword * pet portlint * USE=tar Notes: svn path=/head/; revision=361098
* In the rc.d scripts, change assignments to rcvar to use theDoug Barton2012-01-141-1/+1
| | | | | | | | | | | | | | literal name_enable wherever possible, and ${name}_enable when it's not, to prepare for the demise of set_rcvar(). In cases where I had to hand-edit unusual instances also modify formatting slightly to be more uniform (and in some cases, correct). This includes adding some $FreeBSD$ tags, and most importantly moving rcvar= to right after name= so it's clear that one is derived from the other. Notes: svn path=/head/; revision=289156
* arpCounterattack is a program for detecting and remedying "ARP attacks." ItSteven Kreuzer2011-04-272-0/+55
monitors traffic on any number of Ethernet interfaces and examines ARP replies and gratuitous ARP requests. If it notices an ARP reply or gratuitous ARP request that is in conflict with its notion of "correct" Ethernet/IP address pairs, it logs the attack if logging is enabled, and, if the Ethernet interface that the attack was seen on is is configured as being in aggressive mode, it sends out a gratuitous ARP request and a gratuitous ARP reply with the "correct" Ethernet/IP address pair in an attempt to reset the ARP tables of hosts on the local network segment. The corrective gratuitous ARP request and corrective gratuitous ARP reply can be sent from an Ethernet interface other than the one that the attack was seen on. WWW: http://acm.poly.edu/wiki/ARP_Counterattack PR: ports/151973 Submitted by: Boris Kochergin <spawk@acm.poly.edu> Notes: svn path=/head/; revision=273263