notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
non port: security/arpCounterattack/Makefile
SVNWeb

Number of commits found: 13

Tue, 6 Apr 2021
[ 14:31 mat (Mathieu Arnold) ]    commit hash:305f148f482daf30dcf728039d03d019f88344eb  305f148 (Only the first 10 of 29333 ports in this commit are shown above. View all ports for this commit)
Remove # $FreeBSD$ from Makefiles.
Fri, 26 Jul 2019
[ 20:46 gerald ] Original commit   Revision:507372(Only the first 10 of 3853 ports in this commit are shown above. View all ports for this commit)
Bump PORTREVISION for ports depending on the canonical version of GCC
as defined in Mk/bsd.default-versions.mk which has moved from GCC 8.3
to GCC 9.1 under most circumstances now after revision 507371.

This includes ports
 - with USE_GCC=yes or USE_GCC=any,
 - with USES=fortran,
 - using Mk/bsd.octave.mk which in turn features USES=fortran, and
 - with USES=compiler specifying openmp, nestedfct, c11, c++0x, c++11-lang,
   c++11-lib, c++14-lang, c++17-lang, or gcc-c++11-lib
plus, everything INDEX-11 shows with a dependency on lang/gcc9 now.

PR:		238330
Fri, 24 May 2019
[ 16:06 swills ] Original commit   Revision:502484
security/arpCounterattack: fix build failure

PR:		236440
Submitted by:	w.schwarzenfeld@utanet.at
Reported by:	my-roaming-data@outlook.com
Wed, 12 Dec 2018
[ 01:35 gerald ] Original commit   Revision:487272(Only the first 10 of 3168 ports in this commit are shown above. View all ports for this commit)
Bump PORTREVISION for ports depending on the canonical version of GCC
defined via Mk/bsd.default-versions.mk which has moved from GCC 7.4 t
GCC 8.2 under most circumstances.

This includes ports
 - with USE_GCC=yes or USE_GCC=any,
 - with USES=fortran,
 - using Mk/bsd.octave.mk which in turn features USES=fortran, and
 - with USES=compiler specifying openmp, nestedfct, c11, c++0x, c++11-lang,
   c++11-lib, c++14-lang, c++17-lang, or gcc-c++11-lib
plus, as a double check, everything INDEX-11 showed depending on lang/gcc7.

PR:		231590
Sun, 29 Jul 2018
[ 22:18 gerald ] Original commit   Revision:475857(Only the first 10 of 1480 ports in this commit are shown above. View all ports for this commit)
Bump PORTREVISION for ports depending on the canonical version of GCC
in the ports tree (via Mk/bsd.default-versions.mk and lang/gcc) which
has now moved from GCC 6 to GCC 7 by default.

This includes ports
 - featuring USE_GCC=yes or USE_GCC=any,
 - featuring USES=fortran,
 - using Mk/bsd.octave.mk which in turn features USES=fortran, and those
 - with USES=compiler specifying one of openmp, nestedfct, c11, c++0x,
   c++11-lib, c++11-lang, c++14-lang, c++17-lang, or gcc-c++11-lib.

PR:		222542
Sun, 10 Sep 2017
[ 20:55 gerald ] Original commit   Revision:449591(Only the first 10 of 1201 ports in this commit are shown above. View all ports for this commit)
Bump PORTREVISION for ports depending on the canonical version of GCC
(via Mk/bsd.default-versions.mk and lang/gcc) which has moved from
GCC 5.4 to GCC 6.4 under most circumstances.

This includes ports
 - with USE_GCC=yes or USE_GCC=any,
 - with USES=fortran,
 - using Mk/bsd.octave.mk which in turn features USES=fortran, and
 - with USES=compiler specifying openmp, nestedfct, c++11-lib, c++11-lang,
   c++14-lang, c++0x, c11, or gcc-c++11-lib.

PR:		219275
Sat, 1 Apr 2017
[ 15:23 gerald ] Original commit   Revision:437439(Only the first 10 of 1118 ports in this commit are shown above. View all ports for this commit)
Bump PORTREVISIONs for ports depending on the canonical version of GCC and
lang/gcc which have moved from GCC 4.9.4 to GCC 5.4 (at least under some
circumstances such as versions of FreeBSD or platforms).

This includes ports
 - with USE_GCC=yes or USE_GCC=any,
 - with USES=fortran,
 - using using Mk/bsd.octave.mk which in turn has USES=fortran, and
 - with USES=compiler specifying openmp, nestedfct, c++11-lib, c++14-lang,
   c++11-lang, c++0x, c11, or gcc-c++11-lib.

PR:		216707
Fri, 1 Apr 2016
[ 14:25 mat ] Original commit   Revision:412349(Only the first 10 of 2099 ports in this commit are shown above. View all ports for this commit)
Remove ${PORTSDIR}/ from dependencies, categories r, s, t, and u.

With hat:	portmgr
Sponsored by:	Absolight
Wed, 10 Sep 2014
[ 20:50 gerald ] Original commit   Revision:367888(Only the first 10 of 3171 ports in this commit are shown above. View all ports for this commit)
Update the default version of GCC in the Ports Collection from GCC 4.7.4
to GCC 4.8.3.

Part II, Bump PORTREVISIONs.

PR:		192025
Tested by:	antoine (-exp runs)
Approved by:	portmgr (implicit)
Mon, 7 Jul 2014
[ 15:16 marino ] Original commit   Revision:361098
security/arpCounterattack: stage, fix on F10+, fix on DragonFly

Also:
 * convert to c++11 for clang builds
 * convert to new LIB_DEPENDS format
 * use @sample keyword
 * pet portlint
 * USE=tar
Fri, 4 Jul 2014
[ 12:46 bapt ] Original commit   Revision:360609(Only the first 10 of 67 ports in this commit are shown above. View all ports for this commit)
Resetting maintainership on ports that have not been staged and without any
pending PR (related to stage)

With hat:	portmgr
Fri, 20 Sep 2013
[ 22:55 bapt ] Original commit   Revision:327769(Only the first 10 of 1016 ports in this commit are shown above. View all ports for this commit)
Add NO_STAGE all over the place in preparation for the staging support (cat:
security)
Wed, 27 Apr 2011
[ 17:42 skreuzer ] Original commit 
arpCounterattack is a program for detecting and remedying "ARP attacks." It
monitors traffic on any number of Ethernet interfaces and examines ARP replies
and gratuitous ARP requests. If it notices an ARP reply or gratuitous ARP
request that is in conflict with its notion of "correct" Ethernet/IP address
pairs, it logs the attack if logging is enabled, and, if the Ethernet
interface that the attack was seen on is is configured as being in aggressive
mode, it sends out a gratuitous ARP request and a gratuitous ARP reply with
the "correct" Ethernet/IP address pair in an attempt to reset the ARP tables
of hosts on the local network segment. The corrective gratuitous ARP request
and corrective gratuitous ARP reply can be sent from an Ethernet interface
other than the one that the attack was seen on.

WWW: http://acm.poly.edu/wiki/ARP_Counterattack

PR:             ports/151973
Submitted by:   Boris Kochergin <spawk@acm.poly.edu>

Number of commits found: 13