FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

Port details
arpCounterattack Detects and remedies ARP attacks
1.2.0_4 security on this many watch lists=2 search for ports that depend on this port Find issues related to this port Report an issue related to this port

There is no maintainer for this port.
Any concerns regarding this port should be directed to the FreeBSD Ports mailing list via ports@FreeBSD.org search for ports maintained by this maintainer
Port Added: 27 Apr 2011 17:42:12
License: not specified in port
arpCounterattack is a program for detecting and remedying "ARP attacks." It
monitors traffic on any number of Ethernet interfaces and examines ARP replies
and gratuitous ARP requests. If it notices an ARP reply or gratuitous ARP
request that is in conflict with its notion of "correct" Ethernet/IP address
pairs, it logs the attack if logging is enabled, and, if the Ethernet
interface that the attack was seen on is configured as being in aggressive
mode, it sends out a gratuitous ARP request and a gratuitous ARP reply with
the "correct" Ethernet/IP address pair in an attempt to reset the ARP tables
of hosts on the local network segment. The corrective gratuitous ARP request
and corrective gratuitous ARP reply can be sent from an Ethernet interface
other than the one that the attack was seen on.

WWW: http://acm.poly.edu/wiki/ARP_Counterattack
SVNWeb : Homepage : PortsMon : pkg-plist

To install the port: cd /usr/ports/security/arpCounterattack/ && make install clean
To add the package: pkg install arpCounterattack

PKGNAME: arpCounterattack

distinfo:

SHA256 (arpCounterattack-1.2.0.tbz) = 28cb61cb799871bbb10057fddbd7a445f10b27725eca088f370eeff157f88f3d
SIZE (arpCounterattack-1.2.0.tbz) = 507939


NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Library dependencies:
  1. libdnet.so : net/libdnet
There are no ports dependent upon this port

Configuration Options
     No options to configure

USES:
compiler:c++11-lib tar:tbz

Master Sites:
  1. http://bk.macroblock.net/arpCounterattack/
  2. http://isis.poly.edu/~bk/arpCounterattack/

Number of commits found: 11

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
10 Sep 2017 20:55:39
Original commit files touched by this commit  1.2.0_4
Revision:449591
gerald search for other commits by this committer
Bump PORTREVISION for ports depending on the canonical version of GCC
(via Mk/bsd.default-versions.mk and lang/gcc) which has moved from
GCC 5.4 to GCC 6.4 under most circumstances.

This includes ports
 - with USE_GCC=yes or USE_GCC=any,
 - with USES=fortran,
 - using Mk/bsd.octave.mk which in turn features USES=fortran, and
 - with USES=compiler specifying openmp, nestedfct, c++11-lib, c++11-lang,
   c++14-lang, c++0x, c11, or gcc-c++11-lib.

PR:		219275
01 Apr 2017 15:23:32
Original commit files touched by this commit  1.2.0_3
Revision:437439
gerald search for other commits by this committer
Bump PORTREVISIONs for ports depending on the canonical version of GCC and
lang/gcc which have moved from GCC 4.9.4 to GCC 5.4 (at least under some
circumstances such as versions of FreeBSD or platforms).

This includes ports
 - with USE_GCC=yes or USE_GCC=any,
 - with USES=fortran,
 - using using Mk/bsd.octave.mk which in turn has USES=fortran, and
 - with USES=compiler specifying openmp, nestedfct, c++11-lib, c++14-lang,
   c++11-lang, c++0x, c11, or gcc-c++11-lib.

PR:		216707
01 Apr 2016 14:25:18
Original commit files touched by this commit  1.2.0_2
Revision:412349
mat search for other commits by this committer
Remove ${PORTSDIR}/ from dependencies, categories r, s, t, and u.

With hat:	portmgr
Sponsored by:	Absolight
13 Nov 2014 09:02:57
Original commit files touched by this commit  1.2.0_2
Revision:372514
antoine search for other commits by this committer
Cleanup plist
10 Sep 2014 20:50:37
Original commit files touched by this commit  1.2.0_2
Revision:367888
gerald search for other commits by this committer
Update the default version of GCC in the Ports Collection from GCC 4.7.4
to GCC 4.8.3.

Part II, Bump PORTREVISIONs.

PR:		192025
Tested by:	antoine (-exp runs)
Approved by:	portmgr (implicit)
07 Jul 2014 15:16:06
Original commit files touched by this commit  1.2.0_1
Revision:361098
marino search for other commits by this committer
security/arpCounterattack: stage, fix on F10+, fix on DragonFly

Also:
 * convert to c++11 for clang builds
 * convert to new LIB_DEPENDS format
 * use @sample keyword
 * pet portlint
 * USE=tar
04 Jul 2014 12:46:11
Original commit files touched by this commit  1.2.0
Revision:360609
bapt search for other commits by this committer
Resetting maintainership on ports that have not been staged and without any
pending PR (related to stage)

With hat:	portmgr
20 Sep 2013 22:55:26
Original commit files touched by this commit  1.2.0
Revision:327769
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
security)
14 Jan 2012 08:57:23
Original commit files touched by this commit  1.2.0
dougb search for other commits by this committer
In the rc.d scripts, change assignments to rcvar to use the
literal name_enable wherever possible, and ${name}_enable
when it's not, to prepare for the demise of set_rcvar().

In cases where I had to hand-edit unusual instances also
modify formatting slightly to be more uniform (and in
some cases, correct). This includes adding some $FreeBSD$
tags, and most importantly moving rcvar= to right after
name= so it's clear that one is derived from the other.
08 Jan 2012 07:01:25
Original commit files touched by this commit  1.2.0
eadler search for other commits by this committer
Repeated words are are hard to to find sometimes.

Approved by:    portmgr (itetcu)
27 Apr 2011 17:42:00
Original commit files touched by this commit  1.2.0
skreuzer search for other commits by this committer
arpCounterattack is a program for detecting and remedying "ARP attacks." It
monitors traffic on any number of Ethernet interfaces and examines ARP replies
and gratuitous ARP requests. If it notices an ARP reply or gratuitous ARP
request that is in conflict with its notion of "correct" Ethernet/IP address
pairs, it logs the attack if logging is enabled, and, if the Ethernet
interface that the attack was seen on is is configured as being in aggressive
mode, it sends out a gratuitous ARP request and a gratuitous ARP reply with
the "correct" Ethernet/IP address pair in an attempt to reset the ARP tables
of hosts on the local network segment. The corrective gratuitous ARP request
and corrective gratuitous ARP reply can be sent from an Ethernet interface
other than the one that the attack was seen on.

WWW: http://acm.poly.edu/wiki/ARP_Counterattack

PR:             ports/151973
Submitted by:   Boris Kochergin <spawk@acm.poly.edu>

Number of commits found: 11

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
apache22Sep 19
apache24Sep 19
asterisk11Sep 19
asterisk13Sep 19
firefox*Sep 19
firefox*Sep 19
firefox-esr*Sep 19
firefox-esr*Sep 19
libxul*Sep 19
libxul*Sep 19
linux-firefox*Sep 19
linux-firefox*Sep 19
linux-seamonkey*Sep 19
linux-seamonkey*Sep 19
linux-thunderbird*Sep 19

12 vulnerabilities affecting 85 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 31457
Broken 114
Deprecated 74
Ignore 382
Forbidden 0
Restricted 174
No CDROM 78
Vulnerable 48
Expired 18
Set to expire 70
Interactive 0
new 24 hours 3
new 48 hours5
new 7 days135
new fortnight2845
new month4415

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2017 Dan Langille. All rights reserved.