getaddrinfo(3) (7.1 and earlier, and -CURRENT before the end of March
2009).
PR: ports/133779
Submitted by: Daniel Roethlisberger <daniel@roe.ch> (maintainer)
- Remove USE_XLIB/USE_X_PREFIX/USE_XPM in favor of USE_XORG
- Remove X11BASE support in favor of LOCALBASE or PREFIX
- Use USE_LDCONFIG instead of INSTALLS_SHLIB
- Remove unneeded USE_GCC 3.4+
Thanks to all Helpers:
Dmitry Marakasov, Chess Griffin, beech@, dinoex, rafan, gahr,
ehaupt, nox, itetcu, flz, pav
PR: 116263
Tested on: pointyhat
Approved by: portmgr (pav)
---snip---
The security/nmap port (currently at 3.48, but previous versions also
had this problem) triggers a bug in GCC 3.3.1 on FreeBSD/sparc64 which
causes the compilation of the port to fail.
The GCC bug itself is know and AFAIK Thomas Moestl (tmm@freebsd.org)
tried to get a fix for it in upstream GCC. However, I didn't see an
entry in the release notes of GCC 3.3.2 that would suggest that it has
been fixed there.
Another port that has a workaround for this particular GCC bug is e.g.
x11/XFree86-4-libraries (files/patch-XRes.c).
---snip---
PR: 58698
Submitted by: Marius Strobl <marius@alchemy.franken.de>
Approved by: maintainer
- improved version detection
- integrates most FreeBSD fixes, thanks to
Marius Strobl <marius@alchemy.franken.de>
- install localized man pages
PR: ports/57646
Submitted by: Oliver Eikemeier <eikemeier@fillmore-labs.com>
Submitted by: maintainer
Reviewed by:
Approved by:
Obtained from:
MFC after:
1. Upgrade Nmap to 3.30, which released at Jun 29, 2003. Major enchancement is
OS fingerprints update. The fingerprint DB now contains almost 1000
fingerprints.
See ChangeLog at this link:
http://lists.insecure.org/lists/nmap-hackers/2003/Apr-Jun/0016.html
2. Renamed the patch files to be more descriptive.
The nmap port is not building correctly where libgnugetopt is
installed. This patch fixes the problem, please add it to the
files directory.
PR: ports/50894
Submitted by: marius@alchemy.franken.de
Approved by: Dominic Marks <dom@cus.org.uk>
a separate port for nmapfe. Even though the attempt in the nmap port
mostly fails since no nmapfe executable would have been built, files
not appearing in the pkg-plist were being added to the system.
PR: ports/35207
Approved by: obrien
* Added ACK scanning. This scan technique is great for testing firewall
rulesets. It can NOT find open ports, but it can distinguish between
filtered/unfilterd by sending an ACK packet to each port and waiting for
a RST to come back. Filtered ports will not send back a RST (or will
send ICMP unreachables). This scan type is activated with -sA .
* Documented the Window scan (-sW)
* "Protocol" field in output eliminated. It is now printed right
next to the number (/etc/services style). Like "22/tcp".
* Added --resume option to continue a large network scan where you left off.
It also allows you to start and stop for policy reasons