Port details |
- dns_mre DNS Cache Poisoner/Overwriter
- 1.0_1 dns
=2 1.0_1Version of this port present on the latest quarterly branch. DEPRECATED: No more public distfiles
This port expired on: 2014-03-10
- There is no maintainer for this port.
- Any concerns regarding this port should be directed to the FreeBSD Ports mailing list via ports@FreeBSD.org
 - Port Added: 2008-08-07 21:30:44
- Last Update: 2014-03-10 11:50:27
- SVN Revision: 347742
- People watching this port, also watch:: tcpdump, grepcidr, monit, magicrescue
- Also Listed In: security
- License: not specified in port
- WWW:
- http://www.securebits.org/dnsmre.html
- Description:
- DNS Multiple Race Exploiter is a tool that exploits an inherent flaw in the
DNS Server Cache. By sending many queries to a DNS server along with fake
replies, an attacker can successfuly writes a fake new entry in the DNS
cache.
WWW: http://www.securebits.org/dnsmre.html
cgit ¦ GitHub ¦ GitHub ¦ GitLab ¦ 
- Manual pages:
- FreshPorts has no man page information for this port.
- pkg-plist: as obtained via:
make generate-plist - There is no configure plist information for this port.
- Dependency lines:
-
- No installation instructions:
- This port has been deleted.
- PKGNAME: dns_mre
- Flavors: there is no flavor information for this port.
- distinfo:
- There is no distinfo for this port.
No package information for this port in our database- Sometimes this happens. Not all ports have packages. Perhaps there is a build error. Check the fallout link:

- This port has no dependencies.
- There are no ports dependent upon this port
Configuration Options:
- No options to configure
- Options name:
- N/A
- FreshPorts was unable to extract/find any pkg message
- Master Sites:
|
Number of commits found: 12
Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
1.0_1 10 Mar 2014 11:50:27
  |
rene  |
Remove expired ports:
2014-03-10 deskutils/libopensync-plugin-synce: No more public distfiles
2014-03-10 irc/irchat-pj-xemacs21-mule: No more public distfiles
2014-03-10 irc/pure-xemacs21-mule: No more public distfiles
2014-03-10 lang/dice: No more public distfiles
2014-03-10 irc/dcc: No more public distfiles
2014-03-10 sysutils/backupme: No more public distfiles
2014-03-10 net/freeswitch-curl-devel: No more public distfiles
2014-03-10 misc/freeswitch-pizzademo-devel: No more public distfiles
2014-03-10 emulators/cygne-sdl: No more public distfiles
2014-03-10 mail/newmail: No more public distfiles
2014-03-10 x11-toolkits/xscoop: No more public distfiles
2014-03-10 security/didentd: No more public distfiles
2014-03-10 sysutils/wait_on: No more public distfiles
2014-03-10 net/freeswitch-sbc-devel: No more public distfiles (Only the first 15 lines of the commit message are shown above ) |
1.0_1 10 Feb 2014 13:27:10
  |
bapt  |
Back to the futur |
1.0_1 10 Feb 2014 12:58:55
  |
bapt  |
Mark as deprecated unmaintained ports for which no public distfiles are
available for part or all the needed distfiles.
Reported by: distillator |
1.0_1 12 Jan 2014 16:40:59
  |
mat  |
Put back in the general pool, I don't think there's anything perlish in here. |
1.0_1 25 Nov 2013 18:17:16
  |
mat  |
Support staging. |
1.0_1 20 Sep 2013 16:31:58
  |
bapt  |
Add NO_STAGE all over the place in preparation for the staging support (cat:
dns) |
1.0_1 29 Aug 2013 04:08:54
  |
sunpoet  |
- Use single space after WWW: |
1.0_1 02 Aug 2013 18:52:11
  |
mat  |
- Convert to new perl framework
- Trim Makefile header
- Remove MAKE_JOBS_SAFE=yes, it's the default. |
1.0_1 20 Mar 2011 12:54:45
 |
miwi  |
- Get Rid MD5 support |
1.0_1 03 Nov 2009 02:54:10
 |
linimon  |
Reset cherry@trombik.org due to maintainer-timeouts and no response
to email.
Hat: portmgr |
1.0_1 29 Aug 2008 15:08:04
 |
miwi  |
- do not connect before sendto()
fixes "Socket is already connected" error
- Bump PORTREVISION
PR: 126886
Submitted by: maintainer |
1.0 07 Aug 2008 21:28:14
 |
miwi  |
DNS Multiple Race Exploiter is a tool that exploits an inherent flaw in the
DNS Server Cache. By sending many queries to a DNS server along with fake
replies, an attacker can successfuly writes a fake new entry in the DNS
cache.
WWW: http://www.securebits.org/dnsmre.html
PR: ports/126189
Submitted by: Tomoyuki Sakurai <cherry at trombik.org> |
Number of commits found: 12
|