summaryrefslogtreecommitdiff
path: root/security/fiked (follow)
Commit message (Collapse)AuthorAgeFilesLines
* - Patch net/libnet* to versioned libraries and header files, so they canPav Lucistnik2007-01-311-2/+9
| | | | | | | | | | | | coexist PR: ports/103861 Submitted by: alepulver Tested by: pointyhat With hat: portmgr Notes: svn path=/head/; revision=183770
* Remove USE_REINPLACE from all categories starting with SEdwin Groothuis2006-05-131-1/+0
| | | | Notes: svn path=/head/; revision=162215
* [maintainer] Update security/fiked to 0.0.4, really fix build on 4.xEdwin Groothuis2005-12-212-16/+11
| | | | | | | | | | | | | | | | | | | Port changes: * Set USE_GCC to allow build on FreeBSD 4.x * Add WITHOUT_LIBNET knob * Remove CC fixes, upstream makefile honours CC now * Upgrade to 0.0.4 Upstream changes: * Support for dropping privileges to unprivileged user * Portability fixes * Bug fixes RP: ports/90722 Submitted by: Daniel Roethlisberger <daniel@roe.ch> Notes: svn path=/head/; revision=151710
* Add, security/fiked, a fake IKE PSK+XAUTH daemon based on VPNC.Emanuel Haupt2005-12-163-0/+61
This is a fake IKE daemon supporting just enough of the standards and Cisco extensions to attack commonly found insecure Cisco PSK+XAUTH VPN setups. If you know the pre-shared key, also known as shared secret or group password, you can impersonate the VPN gateway in IKE phase 1, and learn XAUTH user credentials in phase 2. PR: 90372 Submitted by: Daniel Roethlisberger <daniel@roe.ch> Notes: svn path=/head/; revision=151343