fragroute: remove

Doesn't build with current libpcap, last release from 2002.
This commit is contained in:
wiz 2022-05-15 04:49:15 +00:00
parent aaa04c1045
commit f021500318
11 changed files with 3 additions and 235 deletions

View file

@ -1,4 +1,4 @@
$NetBSD: CHANGES-2022,v 1.2558 2022/05/15 04:48:20 markd Exp $
$NetBSD: CHANGES-2022,v 1.2559 2022/05/15 04:49:15 wiz Exp $
Changes to the packages collection and infrastructure in 2022:
@ -3963,3 +3963,4 @@ Changes to the packages collection and infrastructure in 2022:
Updated fonts/tex-roboto-doc to 2022 [markd 2022-05-15]
Updated print/tex-siunitx to 3.1.1 [markd 2022-05-15]
Updated print/tex-siunitx-doc to 3.1.1 [markd 2022-05-15]
Removed security/fragroute [wiz 2022-05-15]

View file

@ -1,4 +1,4 @@
# $NetBSD: Makefile,v 1.860 2022/05/09 00:38:43 khorben Exp $
# $NetBSD: Makefile,v 1.861 2022/05/15 04:49:15 wiz Exp $
#
COMMENT= Security and cryptography tools and libraries
@ -96,7 +96,6 @@ SUBDIR+= erlang-pkix
SUBDIR+= fail2ban
SUBDIR+= flawfinder
SUBDIR+= fprint-demo
SUBDIR+= fragroute
SUBDIR+= fsh
SUBDIR+= fwbuilder
SUBDIR+= gcr

View file

@ -1,15 +0,0 @@
"Fragroute intercepts, modifies, and rewrites egress traffic destined
for a specified host, implementing most of the attacks described in the
Secure Networks "Insertion, Evasion, and Denial of Service: Eluding
Network Intrusion Detection" paper of January 1998.
It features a simple ruleset language to delay, duplicate, drop,
fragment, overlap, print, reorder, segment, source-route, or otherwise
monkey with all outbound packets destined for a target host, with
minimal support for randomized or probabilistic behaviour.
This tool was written in good faith to aid in the testing of network
intrusion detection systems, firewalls, and basic TCP/IP stack
behaviour. Please do not abuse this software."
- Dominic <dominic_marks@btinternet.com>

View file

@ -1,31 +0,0 @@
# $NetBSD: Makefile,v 1.29 2020/01/18 21:50:36 jperkin Exp $
DISTNAME= fragroute-1.2
PKGREVISION= 18
CATEGORIES= security net
MASTER_SITES= http://monkey.org/~dugsong/fragroute/
MAINTAINER= pkgsrc-users@NetBSD.org
HOMEPAGE= https://www.monkey.org/~dugsong/fragroute/
COMMENT= Tool for intercepting, modifying and rewriting egress traffic
GNU_CONFIGURE= YES
CONFIGURE_ARGS+= --with-libdnet=${BUILDLINK_PREFIX.libdnet}
CONFIGURE_ARGS+= --with-libevent=${BUILDLINK_PREFIX.libevent}
CONFIGURE_ARGS+= --with-pcap=${BUILDLINK_PREFIX.libpcap}
SCRIPTS= README.snort base-1 frag-1 frag-2 frag-3 frag-4 frag-5 \
frag-6 frag-7-unix frag-7-win32 ins-2 ins-3 tcbc-2 tcp-3 tcp-5 \
tcp-7 tcp-9
INSTALLATION_DIRS+= share/fragroute
pre-install:
.for file in ${SCRIPTS}
${INSTALL_DATA} ${WRKSRC}/scripts/${file} ${DESTDIR}${PREFIX}/share/fragroute
.endfor
.include "../../net/libpcap/buildlink3.mk"
.include "../../net/libdnet/buildlink3.mk"
.include "../../devel/libevent/buildlink3.mk"
.include "../../mk/bsd.pkg.mk"

View file

@ -1,23 +0,0 @@
@comment $NetBSD: PLIST,v 1.2 2009/06/14 18:13:28 joerg Exp $
etc/fragroute.conf
man/man8/fragroute.8
man/man8/fragtest.8
sbin/fragroute
sbin/fragtest
share/fragroute/README.snort
share/fragroute/base-1
share/fragroute/frag-1
share/fragroute/frag-2
share/fragroute/frag-3
share/fragroute/frag-4
share/fragroute/frag-5
share/fragroute/frag-6
share/fragroute/frag-7-unix
share/fragroute/frag-7-win32
share/fragroute/ins-2
share/fragroute/ins-3
share/fragroute/tcbc-2
share/fragroute/tcp-3
share/fragroute/tcp-5
share/fragroute/tcp-7
share/fragroute/tcp-9

View file

@ -1,10 +0,0 @@
$NetBSD: distinfo,v 1.9 2021/10/26 11:17:05 nia Exp $
BLAKE2s (fragroute-1.2.tar.gz) = 9028ea185e02163f5dbbccf8caf1fa8ee479650f231970b1aaa33599f3c2a409
SHA512 (fragroute-1.2.tar.gz) = 00f32a4660db8a58e0e86c525065f8a33ed8b9aec2933938dc2543ad533b0035c636c7b5e5833ff79cecaa7361dbfec4b7c88b5589de166e54dc76ae35a53351
Size (fragroute-1.2.tar.gz) = 85247 bytes
SHA1 (patch-aa) = f763eb5f9feeff570b2394ed4091b80c6195e173
SHA1 (patch-ab) = 626aa844a267e6dff0e1d9aaa3e55cd1f2cb0443
SHA1 (patch-ac) = 644ed8d4652b9e959e96fce47c90c96d77a43134
SHA1 (patch-ad) = d25c231e4d458ade560ab8df618de340d10b42e9
SHA1 (patch-fragroute.c) = b5d1fb8cb3a067fa10d1b194364e0f2827fd331e

View file

@ -1,24 +0,0 @@
$NetBSD: patch-aa,v 1.2 2004/01/15 14:10:51 cube Exp $
--- mod.c.orig 2002-04-08 00:55:20.000000000 +0200
+++ mod.c
@@ -151,10 +151,19 @@ mod_close(void)
{
struct rule *rule;
+#if defined(FRAGROUTE_SYSTEM_SYS_QUEUE) && defined(__NetBSD__)
+ TAILQ_FOREACH_REVERSE(rule, &rules, head, next) {
+ if (rule->mod->close != NULL)
+ rule->data = rule->mod->close(rule->data);
+ TAILQ_REMOVE(&rules, rule, next);
+ free(rule);
+ }
+#else
TAILQ_FOREACH_REVERSE(rule, &rules, next, head) {
if (rule->mod->close != NULL)
rule->data = rule->mod->close(rule->data);
TAILQ_REMOVE(&rules, rule, next);
free(rule);
}
+#endif
}

View file

@ -1,21 +0,0 @@
$NetBSD: patch-ab,v 1.3 2005/03/20 16:38:10 jmmv Exp $
--- tun.h.orig 2002-01-22 21:59:02.000000000 +0100
+++ tun.h
@@ -9,10 +9,16 @@
#ifndef TUN_H
#define TUN_H
+#define tun fragroute_tun
+#define tun_t fragroute_tun_t
typedef struct tun tun_t;
+#define tun_handler fragroute_tun_handler
typedef void (*tun_handler)(void *buf, size_t len, void *arg);
+#define tun_open fragroute_tun_open
+#define tun_register fragroute_tun_register
+#define tun_close fragroute_tun_close
tun_t *tun_open(struct addr *src, struct addr *dst, int mtu);
int tun_register(tun_t *tun, tun_handler callback, void *arg);
tun_t *tun_close(tun_t *tun);

View file

@ -1,17 +0,0 @@
$NetBSD: patch-ac,v 1.1 2004/01/15 14:10:51 cube Exp $
--- queue.h.orig 2002-04-07 23:12:52.000000000 +0200
+++ queue.h
@@ -500,4 +500,12 @@ struct { \
(elm2)->field.cqe_prev->field.cqe_next = (elm2); \
} while (0)
+#else
+
+#define FRAGROUTE_SYSTEM_SYS_QUEUE
+
+#ifndef TAILQ_END
+#define TAILQ_END(head) NULL
+#endif
+
#endif /* !_SYS_QUEUE_H_ */

View file

@ -1,13 +0,0 @@
$NetBSD: patch-ad,v 1.1 2006/06/07 12:24:45 joerg Exp $
--- pcaputil.c.orig 2006-06-07 12:21:17.000000000 +0000
+++ pcaputil.c
@@ -39,7 +39,7 @@ pcap_open(char *device)
if ((pcap = pcap_open_live(device, 31337, 0, 10, ebuf)) == NULL)
return (NULL);
-#ifdef BSD
+#if defined(BSD) && defined(BIOCIMMEDIATE)
{
int n = 1;

View file

@ -1,78 +0,0 @@
$NetBSD: patch-fragroute.c,v 1.1 2013/05/23 16:02:13 christos Exp $
In the unix case, don't use the obsolete libevent signal interface
--- fragroute.c.orig 2002-04-07 18:55:20.000000000 -0400
+++ fragroute.c 2013-05-23 11:59:52.000000000 -0400
@@ -36,10 +36,6 @@
static struct fr_ctx ctx;
-/* XXX - these should be in event.h */
-extern int (*event_sigcb)(void);
-extern int event_gotsig;
-
static void
usage(void)
{
@@ -136,6 +132,10 @@
}
#ifdef WIN32
+/* XXX - these should be in event.h */
+extern int (*event_sigcb)(void);
+extern int event_gotsig;
+
static BOOL CALLBACK
fragroute_signal(DWORD sig)
{
@@ -144,12 +144,25 @@
return (TRUE);
}
#else
+
static void
-fragroute_signal(int sig)
+fragroute_signal(evutil_socket_t fd, short what, void *arg)
{
+ int sig;
+ recv(fd, &sig, sizeof(sig), 0);
warnx("exiting on signal %d", sig);
- event_gotsig++;
+ exit(sig);
}
+
+static void
+addsignal(int sig) {
+ struct event sig_ev;
+ int got;
+
+ evsignal_set(&sig_ev, sig, fragroute_signal, &got);
+ evsignal_add(&sig_ev, NULL);
+}
+
#endif
static void
@@ -165,9 +178,6 @@
err(1, "couldn't initialize Winsock");
SetConsoleCtrlHandler(fragroute_signal, TRUE);
-#else
- signal(SIGINT, fragroute_signal);
- signal(SIGTERM, fragroute_signal);
#endif
if (addr_aton(dst, &ctx.dst) < 0)
err(1, "destination address invalid");
@@ -178,7 +188,12 @@
pkt_init(128);
event_init();
+#ifdef WIN32
event_sigcb = fragroute_close;
+#else
+ addsignal(SIGINT);
+ addsignal(SIGTERM);
+#endif
if ((ctx.arp = arp_open()) == NULL ||
(ctx.intf = intf_open()) == NULL ||