Port details |
- arpCounterattack Detects and remedies ARP attacks
- 1.2.0_8 security =4 1.2.0_8Version of this port present on the latest quarterly branch.
- There is no maintainer for this port.
- Any concerns regarding this port should be directed to the FreeBSD Ports mailing list via ports@FreeBSD.org
- Port Added: 2011-04-27 17:42:12
- Last Update: 2023-10-30 22:37:03
- Commit Hash: d26fba5
- People watching this port, also watch:: portupdate-scan, dnswalk, monit, samhain-client, symon
- License: not specified in port
- WWW:
- https://web.archive.org/web/20161008074851/http://acm.poly.edu/wiki/ARP_Counterattack
- Description:
- arpCounterattack is a program for detecting and remedying "ARP attacks." It
monitors traffic on any number of Ethernet interfaces and examines ARP replies
and gratuitous ARP requests. If it notices an ARP reply or gratuitous ARP
request that is in conflict with its notion of "correct" Ethernet/IP address
pairs, it logs the attack if logging is enabled, and, if the Ethernet
interface that the attack was seen on is configured as being in aggressive
mode, it sends out a gratuitous ARP request and a gratuitous ARP reply with
the "correct" Ethernet/IP address pair in an attempt to reset the ARP tables
of hosts on the local network segment. The corrective gratuitous ARP request
and corrective gratuitous ARP reply can be sent from an Ethernet interface
other than the one that the attack was seen on.
- ¦ ¦ ¦ ¦
- Manual pages:
- FreshPorts has no man page information for this port.
- pkg-plist: as obtained via:
make generate-plist - Dependency lines:
-
- arpCounterattack>0:security/arpCounterattack
- To install the port:
- cd /usr/ports/security/arpCounterattack/ && make install clean
- To add the package, run one of these commands:
- pkg install security/arpCounterattack
- pkg install arpCounterattack
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.- PKGNAME: arpCounterattack
- Flavors: there is no flavor information for this port.
- distinfo:
- SHA256 (arpCounterattack-1.2.0.tbz) = 28cb61cb799871bbb10057fddbd7a445f10b27725eca088f370eeff157f88f3d
SIZE (arpCounterattack-1.2.0.tbz) = 507939
Packages (timestamps in pop-ups are UTC):
- Dependencies
- NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
- Library dependencies:
-
- libdnet.so : net/libdnet
- libpcap.so : net/libpcap
- There are no ports dependent upon this port
Configuration Options:
- No options to configure
- Options name:
- security_arpCounterattack
- USES:
- compiler:c++11-lib tar:tbz
- pkg-message:
- For install:
- Before starting arpCounterattack, you should edit its configuration file,
/usr/local/etc/arpCounterattack/arpCounterattack.conf. Then, add the following
line to /etc/rc.conf:
arpcounterattack_enable="YES"
Finally, to start it, run the following command:
/usr/local/etc/rc.d/arpCounterattack start
- Master Sites:
|
Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
1.2.0_8 30 Oct 2023 22:37:03 |
Rodrigo Osorio (rodrigo) |
security/arpCounterattack: Update WWW
Homepage link is dead, use webarchive latest version instead |
07 Sep 2022 21:58:51 |
Stefan Eßer (se) |
Remove WWW entries moved into port Makefiles
Commit b7f05445c00f has added WWW entries to port Makefiles based on
WWW: lines in pkg-descr files.
This commit removes the WWW: lines of moved-over URLs from these
pkg-descr files.
Approved by: portmgr (tcberner) |
1.2.0_8 07 Sep 2022 21:10:59 |
Stefan Eßer (se) |
Add WWW entries to port Makefiles
It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.
Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.
There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above ) |
1.2.0_8 20 Jul 2022 14:22:56 |
Tobias C. Berner (tcberner) |
security: remove 'Created by' lines
A big Thank You to the original contributors of these ports:
* <ports@c0decafe.net>
* Aaron Dalton <aaron@FreeBSD.org>
* Adam Weinberger <adamw@FreeBSD.org>
* Ade Lovett <ade@FreeBSD.org>
* Aldis Berjoza <aldis@bsdroot.lv>
* Alex Dupre <ale@FreeBSD.org>
* Alex Kapranoff <kappa@rambler-co.ru>
* Alex Samorukov <samm@freebsd.org>
* Alexander Botero-Lowry <alex@foxybanana.com>
* Alexander Kriventsov <avk@vl.ru>
* Alexander Leidinger <netchild@FreeBSD.org> (Only the first 15 lines of the commit message are shown above ) |
1.2.0_8 06 Apr 2021 14:31:13 |
Mathieu Arnold (mat) |
all: Remove all other $FreeBSD keywords. |
1.2.0_8 06 Apr 2021 14:31:07 |
Mathieu Arnold (mat) |
Remove # $FreeBSD$ from Makefiles. |
1.2.0_8 14 Aug 2019 12:16:13 |
mat |
Convert to UCL & cleanup pkg-message (categories s) |
1.2.0_8 30 Jul 2019 12:45:05 |
pkubaj |
security/arpCounterattack: fix build with GCC architectures
When building with GCC, sys/types.h needs to be included:
In file included from arpCounterattack.cpp:35:
/usr/include/net/bpf.h:49:9: error: 'u_int32_t' does not name a type; did you
mean 'uint32_t'?
typedef u_int32_t bpf_u_int32;
^~~~~~~~~
uint32_t
Approved by: linimon (mentor)
Differential Revision: https://reviews.freebsd.org/D21091 |
1.2.0_8 26 Jul 2019 20:46:57 |
gerald |
Bump PORTREVISION for ports depending on the canonical version of GCC
as defined in Mk/bsd.default-versions.mk which has moved from GCC 8.3
to GCC 9.1 under most circumstances now after revision 507371.
This includes ports
- with USE_GCC=yes or USE_GCC=any,
- with USES=fortran,
- using Mk/bsd.octave.mk which in turn features USES=fortran, and
- with USES=compiler specifying openmp, nestedfct, c11, c++0x, c++11-lang,
c++11-lib, c++14-lang, c++17-lang, or gcc-c++11-lib
plus, everything INDEX-11 shows with a dependency on lang/gcc9 now.
PR: 238330 |
1.2.0_7 24 May 2019 16:06:32 |
swills |
security/arpCounterattack: fix build failure
PR: 236440
Submitted by: w.schwarzenfeld@utanet.at
Reported by: my-roaming-data@outlook.com |
1.2.0_6 12 Dec 2018 01:35:36 |
gerald |
Bump PORTREVISION for ports depending on the canonical version of GCC
defined via Mk/bsd.default-versions.mk which has moved from GCC 7.4 t
GCC 8.2 under most circumstances.
This includes ports
- with USE_GCC=yes or USE_GCC=any,
- with USES=fortran,
- using Mk/bsd.octave.mk which in turn features USES=fortran, and
- with USES=compiler specifying openmp, nestedfct, c11, c++0x, c++11-lang,
c++11-lib, c++14-lang, c++17-lang, or gcc-c++11-lib
plus, as a double check, everything INDEX-11 showed depending on lang/gcc7.
PR: 231590 |
1.2.0_5 29 Jul 2018 22:18:46 |
gerald |
Bump PORTREVISION for ports depending on the canonical version of GCC
in the ports tree (via Mk/bsd.default-versions.mk and lang/gcc) which
has now moved from GCC 6 to GCC 7 by default.
This includes ports
- featuring USE_GCC=yes or USE_GCC=any,
- featuring USES=fortran,
- using Mk/bsd.octave.mk which in turn features USES=fortran, and those
- with USES=compiler specifying one of openmp, nestedfct, c11, c++0x,
c++11-lib, c++11-lang, c++14-lang, c++17-lang, or gcc-c++11-lib.
PR: 222542 |
1.2.0_4 10 Sep 2017 20:55:39 |
gerald |
Bump PORTREVISION for ports depending on the canonical version of GCC
(via Mk/bsd.default-versions.mk and lang/gcc) which has moved from
GCC 5.4 to GCC 6.4 under most circumstances.
This includes ports
- with USE_GCC=yes or USE_GCC=any,
- with USES=fortran,
- using Mk/bsd.octave.mk which in turn features USES=fortran, and
- with USES=compiler specifying openmp, nestedfct, c++11-lib, c++11-lang,
c++14-lang, c++0x, c11, or gcc-c++11-lib.
PR: 219275 |
1.2.0_3 01 Apr 2017 15:23:32 |
gerald |
Bump PORTREVISIONs for ports depending on the canonical version of GCC and
lang/gcc which have moved from GCC 4.9.4 to GCC 5.4 (at least under some
circumstances such as versions of FreeBSD or platforms).
This includes ports
- with USE_GCC=yes or USE_GCC=any,
- with USES=fortran,
- using using Mk/bsd.octave.mk which in turn has USES=fortran, and
- with USES=compiler specifying openmp, nestedfct, c++11-lib, c++14-lang,
c++11-lang, c++0x, c11, or gcc-c++11-lib.
PR: 216707 |
1.2.0_2 01 Apr 2016 14:25:18 |
mat |
Remove ${PORTSDIR}/ from dependencies, categories r, s, t, and u.
With hat: portmgr
Sponsored by: Absolight |
1.2.0_2 13 Nov 2014 09:02:57 |
antoine |
Cleanup plist |
1.2.0_2 10 Sep 2014 20:50:37 |
gerald |
Update the default version of GCC in the Ports Collection from GCC 4.7.4
to GCC 4.8.3.
Part II, Bump PORTREVISIONs.
PR: 192025
Tested by: antoine (-exp runs)
Approved by: portmgr (implicit) |
1.2.0_1 07 Jul 2014 15:16:06 |
marino |
security/arpCounterattack: stage, fix on F10+, fix on DragonFly
Also:
* convert to c++11 for clang builds
* convert to new LIB_DEPENDS format
* use @sample keyword
* pet portlint
* USE=tar |
1.2.0 04 Jul 2014 12:46:11 |
bapt |
Resetting maintainership on ports that have not been staged and without any
pending PR (related to stage)
With hat: portmgr |
1.2.0 20 Sep 2013 22:55:26 |
bapt |
Add NO_STAGE all over the place in preparation for the staging support (cat:
security) |
1.2.0 14 Jan 2012 08:57:23 |
dougb |
In the rc.d scripts, change assignments to rcvar to use the
literal name_enable wherever possible, and ${name}_enable
when it's not, to prepare for the demise of set_rcvar().
In cases where I had to hand-edit unusual instances also
modify formatting slightly to be more uniform (and in
some cases, correct). This includes adding some $FreeBSD$
tags, and most importantly moving rcvar= to right after
name= so it's clear that one is derived from the other. |
1.2.0 08 Jan 2012 07:01:25 |
eadler |
Repeated words are are hard to to find sometimes.
Approved by: portmgr (itetcu) |
1.2.0 27 Apr 2011 17:42:00 |
skreuzer |
arpCounterattack is a program for detecting and remedying "ARP attacks." It
monitors traffic on any number of Ethernet interfaces and examines ARP replies
and gratuitous ARP requests. If it notices an ARP reply or gratuitous ARP
request that is in conflict with its notion of "correct" Ethernet/IP address
pairs, it logs the attack if logging is enabled, and, if the Ethernet
interface that the attack was seen on is is configured as being in aggressive
mode, it sends out a gratuitous ARP request and a gratuitous ARP reply with
the "correct" Ethernet/IP address pair in an attempt to reset the ARP tables
of hosts on the local network segment. The corrective gratuitous ARP request
and corrective gratuitous ARP reply can be sent from an Ethernet interface
other than the one that the attack was seen on.
WWW: http://acm.poly.edu/wiki/ARP_Counterattack
PR: ports/151973
Submitted by: Boris Kochergin <spawk@acm.poly.edu> |