1
0
Fork 0
mirror of https://git.freebsd.org/ports.git synced 2025-07-04 19:09:16 -04:00
Commit graph

5 commits

Author SHA1 Message Date
Piotr Kubaj
4321a218a2 security/arpCounterattack: fix build with GCC architectures
When building with GCC, sys/types.h needs to be included:
In file included from arpCounterattack.cpp:35:
/usr/include/net/bpf.h:49:9: error: 'u_int32_t' does not name a type; did you mean 'uint32_t'?
typedef u_int32_t bpf_u_int32;

^~~~~~~~~
uint32_t

Approved by:	linimon (mentor)
Differential Revision:	https://reviews.freebsd.org/D21091
2019-07-30 12:45:04 +00:00
Steve Wills
202da1d546 security/arpCounterattack: fix build failure
PR:		236440
Submitted by:	w.schwarzenfeld@utanet.at
Reported by:	my-roaming-data@outlook.com
2019-05-24 16:06:31 +00:00
John Marino
b6c08b0df5 security/arpCounterattack: stage, fix on F10+, fix on DragonFly
Also:
 * convert to c++11 for clang builds
 * convert to new LIB_DEPENDS format
 * use @sample keyword
 * pet portlint
 * USE=tar
2014-07-07 15:16:05 +00:00
Doug Barton
83eb2c3700 In the rc.d scripts, change assignments to rcvar to use the
literal name_enable wherever possible, and ${name}_enable
when it's not, to prepare for the demise of set_rcvar().

In cases where I had to hand-edit unusual instances also
modify formatting slightly to be more uniform (and in
some cases, correct). This includes adding some $FreeBSD$
tags, and most importantly moving rcvar= to right after
name= so it's clear that one is derived from the other.
2012-01-14 08:57:23 +00:00
Steven Kreuzer
c1c42fcce0 arpCounterattack is a program for detecting and remedying "ARP attacks." It
monitors traffic on any number of Ethernet interfaces and examines ARP replies
and gratuitous ARP requests. If it notices an ARP reply or gratuitous ARP
request that is in conflict with its notion of "correct" Ethernet/IP address
pairs, it logs the attack if logging is enabled, and, if the Ethernet
interface that the attack was seen on is is configured as being in aggressive
mode, it sends out a gratuitous ARP request and a gratuitous ARP reply with
the "correct" Ethernet/IP address pair in an attempt to reset the ARP tables
of hosts on the local network segment. The corrective gratuitous ARP request
and corrective gratuitous ARP reply can be sent from an Ethernet interface
other than the one that the attack was seen on.

WWW: http://acm.poly.edu/wiki/ARP_Counterattack

PR:		ports/151973
Submitted by:	Boris Kochergin <spawk@acm.poly.edu>
2011-04-27 17:42:00 +00:00