freebsd-ports/security/nmap/Makefile
David E. O'Brien ebaa0d86ff Update to version 2.3 beta 17.
* Added ACK scanning.  This scan technique is great for testing firewall
  rulesets.  It can NOT find open ports, but it can distinguish between
  filtered/unfilterd by sending an ACK packet to each port and waiting for
  a RST to come back.  Filtered ports will not send back a RST (or will
  send ICMP unreachables).  This scan type is activated with -sA .

* Documented the Window scan (-sW)

* "Protocol" field in output eliminated.  It is now printed right
   next to the number (/etc/services style).  Like "22/tcp".

* Added --resume option to continue a large network scan where you left off.
  It also allows you to start and stop for policy reasons
2000-03-27 01:23:45 +00:00

37 lines
782 B
Makefile

# ex:ts=8
# Ports collection makefile for: nmap
# Version required: 0.0
# Date created: Tue Aug 04, 1998
# Whom: David O'Brien (obrien@NUXI.com)
#
# $FreeBSD$
#
DISTNAME= nmap-2.30BETA17
PKGNAME= nmap-2.3b17
CATEGORIES= security net
MASTER_SITES= http://www.insecure.org/nmap/dist/ \
ftp://nuxi.ucdavis.edu/pub/misc/ \
http://www.mobis.com/ajax/projects/
EXTRACT_SUFX= .tgz
#PATCH_SITES= http://www.mobis.com/ajax/projects/
MAINTAINER= obrien@FreeBSD.org
.include <bsd.port.pre.mk>
GNU_CONFIGURE= yes
CONFIGURE_ARGS= --libdir=${PREFIX}/share/misc
.if ${OSVERSION} < 300004
CFLAGS+= -DDLT_RAW=12 # for obsoleted <net/bpf.h>
.endif
MAN1= nmap.1
post-extract:
@${RM} -rf ${WRKSRC}/libpcap*
post-install:
@strip ${PREFIX}/bin/nmap
.include <bsd.port.post.mk>