Commit graph

18 commits

Author SHA1 Message Date
obache
7a5dfd6baa Update isic to 0.07.
pkgsrc changes:
* change HOMEPAGE and MASTER_SITES to new Sourceforge's one.
* set LICENSE=2-clause-bsd
* add user-destdir support

ISIC (v0.07)	12/22/2006, by Shu Xiao (sxiao@cisco.com)

	- New IPv6 utilities: isic6, tcpsic6, udpsic6, icmpsic6.

	- New tool multisic for sending random multicast UDP packets.

	- Fixed compilation errors with GCC v4.

	- Added -k skip option for esic per the request from some users.

	- Placed the flood control under low traffic limit case only.

		The original flood protection code calls gettimeofday(),
		and runs after sending each packet. This is time consumping
		and prevents the tool from reaching high traffic limit
		on high speed interface (eg. 1000Base-TX). Now the flood
		control will take effect only if the specified maximum rate
		is less than 10MB/s.

	- Corrected -t option bug with tcpsic:

		The old one was using it reversely, e.g. -t 30 would generate
		packet with 30% of them having correct TCP checksum. But -t
		is actually for the percentage of bad TCP checksum.

	- Changed to used 32-bit random numbers for some fields:

		For IPv4 *sic tools, the source/destination IP address and
		TCP sequence/acknowledge numbers are 32-bit width, and
		should be assigned with equal size random numbers. The old
		code did not do shifting correctly.

	- Changed the default value to 10 for all percentage options.

	- Cleaned the usage printout of icmpsic:

		There were ports used in the usage printout of icmpsic. This
		was misleading since no ports arguments needed for it.

	- New manual page, try to get more help with "man isic".
2009-12-09 12:32:22 +00:00
adrianp
2ae6078ec7 Give up MAINTAINER 2009-07-17 18:00:13 +00:00
wiz
601583c320 Whitespace cleanup, courtesy of pkglint.
Patch provided by Sergey Svishchev in private mail.
2007-02-22 19:26:05 +00:00
adrianp
50a0344171 buildlink updates and patches to handle the new libnet package structure
bump PKGREVISION
2007-02-18 18:49:03 +00:00
rillig
b71a1d488b Fixed pkglint warnings. The warnings are mostly quoting issues, for
example MAKE_ENV+=FOO=${BAR} is changed to MAKE_ENV+=FOO=${BAR:Q}. Some
other changes are outlined in

    http://mail-index.netbsd.org/tech-pkg/2005/12/02/0034.html
2005-12-05 20:49:47 +00:00
tv
f816d81489 Remove USE_BUILDLINK3 and NO_BUILDLINK; these are no longer used. 2005-04-11 21:44:48 +00:00
adrianp
f34fe0e70a - Grab maintership from hubertf@
- Remove DIST_SUBDIR
2005-01-20 23:38:02 +00:00
adrianp
b0cc8cf72a - Update to 0.06
- Change to link with Libnet 1.1.x:
- More accurate datapush rate calculation:
- Fixed esic MAC address printout bug:
2005-01-20 23:32:50 +00:00
tv
c487cb967a Libtool fix for PR pkg/26633, and other issues. Update libtool to 1.5.10
in the process.  (More information on tech-pkg.)

Bump PKGREVISION and BUILDLINK_DEPENDS of all packages using libtool and
installing .la files.

Bump PKGREVISION (only) of all packages depending directly on the above
via a buildlink3 include.
2004-10-03 00:12:51 +00:00
snj
ce76fbca08 Convert to buildlink3. 2004-04-25 04:18:15 +00:00
wiz
d71fc12f5f Update HOMEPAGE and MASTER_SITES.
Recreate distinfo since tarball on new site is repackaged (same contents
verified). Add DIST_SUBDIR since the name hasn't changed (can be removed
on next update).
2003-11-28 09:42:54 +00:00
grant
ca3be631f2 s/netbsd.org/NetBSD.org/ 2003-07-17 22:50:55 +00:00
wiz
92445eb1ed Remove superfluous whitespace. 2003-03-28 20:28:56 +00:00
dmcmahill
869fc30522 reduce optimization on alpha to avoid a compiler bug 2003-02-09 16:33:57 +00:00
jlam
1c57323789 Merge packages from the buildlink2 branch back into the main trunk that
have been converted to USE_BUILDLINK2.
2002-08-25 21:48:57 +00:00
zuntum
f09b567537 Strongly-buildlinkify 2001-11-02 09:49:59 +00:00
wiz
a13ea108bb Update to new COMMENT style: COMMENT var in Makefile instead of pkg/COMMENT. 2001-02-17 17:52:59 +00:00
hubertf
b38c8eb1be Import isic-0.05:
Ip Stack Integrity Checker (IP, TCP, UDP, ICMP et. al.)

ISIC (and components) is intended to test the integrity of an IP
Stack and its component stacks (TCP, UDP, ICMP et. al.)  It does
this by generating a controlled random packet (controlled randomness...
wacky huh?).  The user can specify he/she/it [I'm tempted to put
'it' before 'she' :-)] wants a stream of TCP packets.  He/she/it
suspects that the target has weak handling of IP Options (aka
Firewall-1).  So he/she/it does a 'tcpsic -s rand -d firewall
-I100'.  And observes the result.

A great use for ISIC would be to fire it through a firewall and
see if the firewall leaks packets.  But of course that would be
illegal because Network Associates owns a bogus patent on that :-)
You could do that by setting the default route on the sending
computer to the firewall.....  But that would be illegal.  (But I
can't legally have a beer so do you think I care about laws?)

By far the most common use for these tools is testing IDS systems.
A day after I took the source offline and moved it to a cvs server,
a half dozen people working on seperate home-grown IDS systems
emailed requesting the source be put back up.
2000-11-30 09:12:46 +00:00