aboutsummaryrefslogtreecommitdiff
path: root/net-mgmt/p0f/pkg-descr
diff options
context:
space:
mode:
authorSteve Price <steve@FreeBSD.org>2000-07-10 03:51:01 +0000
committerSteve Price <steve@FreeBSD.org>2000-07-10 03:51:01 +0000
commit0a382d079da182d4a673590024ff181ba5ab7d5d (patch)
tree61c0da75a9a193c6b0ce857def183cf86fef8234 /net-mgmt/p0f/pkg-descr
parent0ca0371584df17725e255c1a21421319fef33dde (diff)
downloadports-0a382d079da182d4a673590024ff181ba5ab7d5d.tar.gz
ports-0a382d079da182d4a673590024ff181ba5ab7d5d.zip
Notes
Diffstat (limited to 'net-mgmt/p0f/pkg-descr')
-rw-r--r--net-mgmt/p0f/pkg-descr24
1 files changed, 24 insertions, 0 deletions
diff --git a/net-mgmt/p0f/pkg-descr b/net-mgmt/p0f/pkg-descr
new file mode 100644
index 000000000000..a48562804ca6
--- /dev/null
+++ b/net-mgmt/p0f/pkg-descr
@@ -0,0 +1,24 @@
+from the README:
+
+Passive OS fingerprinting is based on information coming from a remote host
+when it establishes a connection to our system. Captured packets contain
+enough information to identify the operating system. In contrast to active
+scanners such as nmap and QueSO, p0f does not send anything to the host being
+identified.
+
+For more information, read Spitzner's text at:
+http://www.enteract.com/~lspitz/finger.html .
+
+from the maintainer:
+
+Use of this program requires read access to the packet filtering
+device, typically /dev/bpf0. Granting such access allows the users
+who have it to put your Ethernet device into promiscuous mode and
+sniff your network. See
+http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
+if you do not understand how this can be harmful. Running p0f with
+no options will cause it to analyse packets intended for other
+hosts.
+
+Trevor Johnson
+trevor@jpj.net