[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
MASTER_SITESがないportをpkgにする
いしはら です。
たびたびすみません。もうひとつ。
FreeBSDのportのsecurity/fragrouterをパッケージソースに
しようとしているのですが、このパッケージ、MASTER_SITESが
消えてなくなっています。
こういったソフトは、どこを指定すればいいのでしょうか?
教えていただけると幸いです。
よろしくお願いします。
あと、一応、FreeBSDの適当なミラーサイトをMASTER_SITES
にしてつくったパッケージソースをつけてみます。buildlink2
はみよう見まねで書いていますし、libnetのパッチなどは、ほ
とんどカンです。(Cはほとんどわかりません。)間違いなど
ご指摘、修正いただけると幸いです。_o_
--
いしはら
# This is a shell archive. Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file". Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
# .
# ./Makefile
# ./patches
# ./patches/patch-aa
# ./patches/patch-ab
# ./patches/patch-ac
# ./patches/patch-ad
# ./patches/patch-ae
# ./patches/patch-af
# ./PLIST
# ./distinfo
# ./DESCR
#
echo c - .
mkdir -p . > /dev/null 2>&1
echo x - ./Makefile
sed 's/^X//' >./Makefile << 'END-of-./Makefile'
X# $NetBSD$
X# FreeBSD Id: ports/security/fragrouter/Makefile,v 1.8 2003/12/21 00:22:25 sergei Exp
X
XDISTNAME= fragrouter-1.6
XCATEGORIES= security
X# mastersite disappeared in October 2002
X#MASTER_SITES= # http://www.anzen.com/research/nidsbench/
XMASTER_SITES= ftp://ftp.dti.ad.jp/pub/FreeBSD/ports/distfiles/
X
XMAINTAINER= packages@NetBSD.org
XHOMEPAGE= # http://www.anzen.com/research/nidsbench/
XCOMMENT= Tool for testing network IDS implementations
X
XUSE_BUILDLINK2= yes
XGNU_CONFIGURE= yes
XCONFIGURE_ARGS+= --with-libnet=${BUILDLINK_PREFIX.libnet}
XCONFIGURE_ARGS+= --with-libpcap=${BUILDLINK_PREFIX.libpcap}
X
X.include "../../net/libpcap/buildlink2.mk"
X.include "../../devel/libnet/buildlink2.mk"
X.include "../../mk/bsd.pkg.mk"
END-of-./Makefile
echo c - ./patches
mkdir -p ./patches > /dev/null 2>&1
echo x - ./patches/patch-aa
sed 's/^X//' >./patches/patch-aa << 'END-of-./patches/patch-aa'
X$NetBSD$
X
X--- Makefile.in.orig Tue Jul 27 00:08:50 1999
X+++ Makefile.in
X@@ -22,15 +22,15 @@ INSTALL = @INSTALL@
X INSTALL_PROGRAM = @INSTALL_PROGRAM@
X INSTALL_DATA = @INSTALL_DATA@
X
X-PCAPDIR = $(srcdir)/libpcap-0.4
X-PCAPINCS = -I$(PCAPDIR)
X-PCAPLIBS = -L$(PCAPDIR) -lpcap
X-PCAPDEP = $(PCAPDIR)/pcap.h $(PCAPDIR)/libpcap.a
X+PCAPDIR =
X+PCAPINCS = @PCAPINC@
X+PCAPLIBS = @PCAPLIB@
X+PCAPDEP =
X
X-LNETDIR = $(srcdir)/Libnet-0.99b
X-LNETINCS = -I$(LNETDIR)/include
X-LNETLIBS = -L$(LNETDIR)/lib -lnet
X-LNETDEP = $(LNETDIR)/include/libnet.h $(LNETDIR)/libnet.a
X+LNETDIR =
X+LNETINCS = @LNETINC@ `$(prefix)/bin/libnet-config --defines`
X+LNETLIBS = @LNETLIB@
X+LNETDEP =
X
X SRCS = attack.c fragrouter.c ip_frag.c list.c misc.c print.c \
X send.c sniff.c tcp_seg.c
END-of-./patches/patch-aa
echo x - ./patches/patch-ab
sed 's/^X//' >./patches/patch-ab << 'END-of-./patches/patch-ab'
X$NetBSD$
X
X--- configure.orig Tue Jul 27 00:08:51 1999
X+++ configure
X@@ -11,6 +11,10 @@
X ac_help=
X ac_default_prefix=/usr/local
X # Any additions from configure.in:
X+ac_help="$ac_help
X+ --with-libpcap=DIR use libpcap in DIR"
X+ac_help="$ac_help
X+ --with-libnet=DIR use libnet in DIR"
X
X # Initialize some variables set by options.
X # The variables have the same names as the options, with
X@@ -21,7 +25,7 @@ exec_prefix=NONE
X host=NONE
X no_create=
X nonopt=NONE
X-no_recursion=
X+no_recursion=yes
X prefix=NONE
X program_prefix=NONE
X program_suffix=NONE
X@@ -1375,7 +1379,95 @@ fi
X done
X
X
X-subdirs="libpcap-0.4 Libnet-0.99b"
X+#subdirs="libpcap-0.4 Libnet-0.99b"
X+
X+
X+echo $ac_n "checking for libpcap""... $ac_c" 1>&6
X+echo "configure:1844: checking for libpcap" >&5
X+# Check whether --with-libpcap or --without-libpcap was given.
X+if test "${with_libpcap+set}" = set; then
X+ withval="$with_libpcap"
X+ case "$withval" in
X+ yes|no)
X+ echo "$ac_t""no" 1>&6
X+ ;;
X+ *)
X+ echo "$ac_t""$withval" 1>&6
X+ if test -f $withval/pcap.h -a -f $withval/libpcap.a; then
X+ owd=`pwd`
X+ if cd $withval; then withval=`pwd`; cd $owd; fi
X+ PCAPINC="-I$withval -I$withval/bpf"
X+ PCAPLIB="-L$withval -lpcap"
X+ elif test -f $withval/include/pcap.h -a \
X+ -f $withval/include/net/bpf.h; then
X+ owd=`pwd`
X+ if cd $withval; then withval=`pwd`; cd $owd; fi
X+ PCAPINC="-I$withval/include"
X+ if test -f $withval/lib/libwpcap.a; then
X+ PCAPLIB="-L$withval/lib -lwpcap"
X+ else
X+ PCAPLIB="-L$withval/lib -lpcap"
X+ fi
X+ else
X+ { echo "configure: error: pcap.h" 1>&2; exit 1; }
X+ fi
X+ ;;
X+ esac
X+else
X+ if test -f ${prefix}/include/pcap.h; then
X+ PCAPINC="-I${prefix}/include"
X+ if test -f ${prefix}/lib/libwpcap.a; then
X+ PCAPLIB="-L${prefix}/lib -lwpcap"
X+ else
X+ PCAPLIB="-L${prefix}/lib -lpcap"
X+ fi
X+ elif test -f /usr/include/pcap/pcap.h; then
X+ PCAPINC="-I/usr/include/pcap"
X+ PCAPLIB="-lpcap"
X+ elif test -f /usr/include/pcap.h; then
X+ PCAPLIB="-lpcap"
X+ else
X+ echo "$ac_t""no" 1>&6
X+ { echo "configure: error: libpcap not found" 1>&2; exit 1; }
X+ fi
X+ echo "$ac_t""yes" 1>&6
X+
X+fi
X+
X+
X+echo $ac_n "checking for libnet""... $ac_c" 1>&6
X+echo "configure:1897: checking for libnet" >&5
X+# Check whether --with-libnet or --without-libnet was given.
X+if test "${with_libnet+set}" = set; then
X+ withval="$with_libnet"
X+ case "$withval" in
X+ yes|no)
X+ echo "$ac_t""no" 1>&6
X+ ;;
X+ *)
X+ echo "$ac_t""$withval" 1>&6
X+ if test -f $withval/src/libnet.a; then
X+ LNETINC="-I$withval/include"
X+ LNETLIB="-L$withval/src -lnet `$withval/libnet-config --libs`"
X+ elif test -x $withval/bin/libnet-config; then
X+ LNETINC="`$withval/bin/libnet-config --cflags`"
X+ LNETLIB="`$withval/bin/libnet-config --libs`"
X+ else
X+ { echo "configure: error: libnet-config not found in $withval/bin" 1>&2; exit 1; }
X+ fi
X+ ;;
X+ esac
X+else
X+ if test -x ${prefix}/bin/libnet-config; then
X+ LNETINC="`${prefix}/bin/libnet-config --cflags`"
X+ LNETLIB="`${prefix}/bin/libnet-config --libs`"
X+ else
X+ echo "$ac_t""no" 1>&6
X+ { echo "configure: error: libnet not found" 1>&2; exit 1; }
X+ fi
X+ echo "$ac_t""yes" 1>&6
X+
X+fi
X
X
X trap '' 1 2 15
X@@ -1516,6 +1608,10 @@ s%@INSTALL_PROGRAM@%$INSTALL_PROGRAM%g
X s%@INSTALL_SCRIPT@%$INSTALL_SCRIPT%g
X s%@INSTALL_DATA@%$INSTALL_DATA%g
X s%@SET_MAKE@%$SET_MAKE%g
X+s%@PCAPINC@%$PCAPINC%g
X+s%@PCAPLIB@%$PCAPLIB%g
X+s%@LNETINC@%$LNETINC%g
X+s%@LNETLIB@%$LNETLIB%g
X s%@CPP@%$CPP%g
X s%@subdirs@%$subdirs%g
X
END-of-./patches/patch-ab
echo x - ./patches/patch-ac
sed 's/^X//' >./patches/patch-ac << 'END-of-./patches/patch-ac'
X$NetBSD$
X
X--- ip_frag.c.orig Tue Jul 27 00:08:51 1999
X+++ ip_frag.c
X@@ -128,7 +128,7 @@ ELEM *
X ip_frag_add_overwrite(ELEM *list)
X {
X ELEM *f, *new;
X- u_char nulls[PACKET], *newdata;
X+ u_char nulls[LIBNET_PACKET], *newdata;
X int newoff, newlen;
X
X memset(nulls, 0, sizeof(nulls));
X@@ -152,7 +152,7 @@ ip_frag_add_overwrite(ELEM *list)
X ((struct ip *)newdata)->ip_off = htons(newoff);
X
X /* Add null fragment after current fragment. */
X- new = list_elem(newdata, IP_H + newlen);
X+ new = list_elem(newdata, LIBNET_IP_H + newlen);
X free(newdata);
X
X if (!list_add(f, new))
END-of-./patches/patch-ac
echo x - ./patches/patch-ad
sed 's/^X//' >./patches/patch-ad << 'END-of-./patches/patch-ad'
X$NetBSD$
X
X--- print.c.orig Tue Jul 27 00:08:51 1999
X+++ print.c
X@@ -93,7 +93,7 @@ print_ip(unsigned char *bp, int length)
X
X iph = (struct ip *)bp;
X
X- if (length < IP_H) {
X+ if (length < LIBNET_IP_H) {
X printf("truncated-ip %d", length);
X return;
X }
X@@ -190,7 +190,7 @@ print_tcp(unsigned char *bp, int length)
X tcph = (struct tcphdr *)(bp + (iph->ip_hl * 4));
X len = length - (iph->ip_hl * 4);
X
X- if (len < TCP_H) {
X+ if (len < LIBNET_TCP_H) {
X printf("truncated-tcp %d", len);
X return;
X }
X@@ -227,11 +227,11 @@ print_tcp(unsigned char *bp, int length)
X if (tcph->th_flags & TH_URG) printf(" urg %d", urp);
X
X /* Handle options. */
X- if ((tcp_hl -= TCP_H) > 0) {
X+ if ((tcp_hl -= LIBNET_TCP_H) > 0) {
X register const u_char *cp;
X register int i, opt, len, datalen;
X
X- cp = (const u_char *)tcph + TCP_H;
X+ cp = (const u_char *)tcph + LIBNET_TCP_H;
X putchar(' ');
X ch = '<';
X
END-of-./patches/patch-ad
echo x - ./patches/patch-ae
sed 's/^X//' >./patches/patch-ae << 'END-of-./patches/patch-ae'
X$NetBSD$
X
X--- sniff.c.orig Fri Jul 30 22:02:35 1999
X+++ sniff.c
X@@ -55,7 +55,7 @@ int
X sniff_init(char *intf, char *ebuf)
X {
X char *dev, filter[BUFSIZ];
X- struct link_int *llif;
X+ struct libnet_link_int *llif;
X struct ether_addr *llmac;
X u_long llip;
X u_int net, mask;
END-of-./patches/patch-ae
echo x - ./patches/patch-af
sed 's/^X//' >./patches/patch-af << 'END-of-./patches/patch-af'
X$NetBSD$
X
X--- tcp_seg.c.orig Tue Jul 27 00:08:51 1999
X+++ tcp_seg.c
X@@ -101,18 +101,18 @@ tcp_seg_null_payload(ELEM *seg)
X int newlen = ntohs(iph->ip_len) - (ip_hl + tcp_hl);
X u_char *newdata;
X
X- if (!(newdata = malloc(ip_hl + TCP_H + newlen)))
X+ if (!(newdata = malloc(ip_hl + LIBNET_TCP_H + newlen)))
X return NULL;
X
X /* Whack the payload (including TCP options to elude PAWS). */
X- memcpy(newdata, seg->data, ip_hl + TCP_H);
X- memset(newdata + ip_hl + TCP_H, 0, newlen);
X+ memcpy(newdata, seg->data, ip_hl + LIBNET_TCP_H);
X+ memset(newdata + ip_hl + LIBNET_TCP_H, 0, newlen);
X
X /* Correct IP length, TCP header length, TCP checksum, segment length. */
X- ((struct ip *)newdata)->ip_len = htons(ip_hl + TCP_H + newlen);
X- ((struct tcphdr *)(newdata + ip_hl))->th_off = TCP_H / 4;
X- libnet_do_checksum(newdata, IPPROTO_TCP, TCP_H + newlen);
X- seg->len = ip_hl + TCP_H + newlen;
X+ ((struct ip *)newdata)->ip_len = htons(ip_hl + LIBNET_TCP_H + newlen);
X+ ((struct tcphdr *)(newdata + ip_hl))->th_off = LIBNET_TCP_H / 4;
X+ libnet_do_checksum(newdata, IPPROTO_TCP, LIBNET_TCP_H + newlen);
X+ seg->len = ip_hl + LIBNET_TCP_H + newlen;
X
X free(seg->data);
X seg->data = newdata;
X@@ -188,23 +188,23 @@ tcp_seg_interleave_syns(ELEM *seg)
X int ip_hl = iph->ip_hl * 4;
X struct tcphdr *tcph = (struct tcphdr *)(s->data + ip_hl);
X
X- if (!(data = malloc(ip_hl + TCP_H)))
X+ if (!(data = malloc(ip_hl + LIBNET_TCP_H)))
X return NULL;
X
X /* Copy in IP header. */
X memcpy(data, s->data, ip_hl);
X
X /* Correct IP length, trash IP ID, TCP sequence number. */
X- ((struct ip *)data)->ip_len = htons(ip_hl + TCP_H);
X+ ((struct ip *)data)->ip_len = htons(ip_hl + LIBNET_TCP_H);
X ((struct ip *)data)->ip_id = htons(iph->ip_id) * 2; /* intentional! */
X libnet_build_tcp(ntohs(tcph->th_sport), ntohs(tcph->th_dport),
X htonl(tcph->th_seq * 2), 0, TH_SYN, ntohs(tcph->th_win),
X ntohs(tcph->th_urp), NULL, 0, data + ip_hl);
X
X- libnet_do_checksum(data, IPPROTO_TCP, TCP_H);
X+ libnet_do_checksum(data, IPPROTO_TCP, LIBNET_TCP_H);
X
X /* Add it to our list of TCP packets. */
X- new = list_elem(data, ip_hl + TCP_H);
X+ new = list_elem(data, ip_hl + LIBNET_TCP_H);
X free(data);
X
X if (!(s = list_add(s, new)))
X@@ -231,34 +231,34 @@ tcp_seg_prepend_fakeclose(u_char *pkt, i
X return NULL;
X
X /* Add our fake FIN packet. */
X- if (!(data = malloc(ip_hl + TCP_H)))
X+ if (!(data = malloc(ip_hl + LIBNET_TCP_H)))
X return NULL;
X
X memcpy(data, pkt, ip_hl);
X- ((struct ip *)data)->ip_len = htons(ip_hl + TCP_H);
X+ ((struct ip *)data)->ip_len = htons(ip_hl + LIBNET_TCP_H);
X ((struct ip *)data)->ip_id = htons(iph->ip_id) * 2; /* intentional! */
X libnet_build_tcp(ntohs(tcph->th_sport), ntohs(tcph->th_dport),
X ntohl(tcph->th_seq) + 1, ntohl(tcph->th_ack),
X TH_FIN, 0, ntohs(tcph->th_urp), NULL, 0, data + ip_hl);
X
X- new = list_elem(data, ip_hl + TCP_H);
X+ new = list_elem(data, ip_hl + LIBNET_TCP_H);
X free(data);
X
X if (!(list = list_add(list, new)))
X return NULL;
X
X /* Add our fake RST packet. */
X- if (!(data = malloc(ip_hl + TCP_H)))
X+ if (!(data = malloc(ip_hl + LIBNET_TCP_H)))
X return NULL;
X
X memcpy(data, pkt, ip_hl);
X- ((struct ip *)data)->ip_len = htons(ip_hl + TCP_H);
X+ ((struct ip *)data)->ip_len = htons(ip_hl + LIBNET_TCP_H);
X ((struct ip *)data)->ip_id = htons(iph->ip_id) * 2 + 1; /* intentional! */
X libnet_build_tcp(ntohs(tcph->th_sport), ntohs(tcph->th_dport),
X ntohl(tcph->th_seq) + 2, ntohl(tcph->th_ack),
X TH_RST, 0, ntohs(tcph->th_urp), NULL, 0, data + ip_hl);
X
X- new = list_elem(data, ip_hl + TCP_H);
X+ new = list_elem(data, ip_hl + LIBNET_TCP_H);
X free(data);
X
X if (!(list = list_add(list, new)))
X@@ -280,34 +280,34 @@ tcp_seg_prepend_connection(u_char *pkt,
X return NULL;
X
X /* Add our decoy SYN packet. */
X- if (!(data = malloc(ip_hl + TCP_H)))
X+ if (!(data = malloc(ip_hl + LIBNET_TCP_H)))
X return NULL;
X
X memcpy(data, pkt, ip_hl);
X- ((struct ip *)data)->ip_len = htons(ip_hl + TCP_H);
X+ ((struct ip *)data)->ip_len = htons(ip_hl + LIBNET_TCP_H);
X ((struct ip *)data)->ip_id = htons(iph->ip_id) * 2; /* intentional! */
X libnet_build_tcp(ntohs(tcph->th_sport), ntohs(tcph->th_dport),
X ntohl(tcph->th_seq) * 2, 0, TH_SYN, ntohs(tcph->th_win),
X 0, NULL, 0, data + ip_hl);
X- libnet_do_checksum(data, IPPROTO_TCP, TCP_H);
X- new = list_elem(data, ip_hl + TCP_H);
X+ libnet_do_checksum(data, IPPROTO_TCP, LIBNET_TCP_H);
X+ new = list_elem(data, ip_hl + LIBNET_TCP_H);
X free(data);
X
X if (!(list = list_add(list, new)))
X return NULL;
X
X /* Add our decoy RST packet, in case the attacker is filtering hers. */
X- if (!(data = malloc(ip_hl + TCP_H)))
X+ if (!(data = malloc(ip_hl + LIBNET_TCP_H)))
X return NULL;
X
X memcpy(data, pkt, ip_hl);
X- ((struct ip *)data)->ip_len = htons(ip_hl + TCP_H);
X+ ((struct ip *)data)->ip_len = htons(ip_hl + LIBNET_TCP_H);
X ((struct ip *)data)->ip_id = htons(iph->ip_id) * 2 + 1; /* intentional! */
X libnet_build_tcp(ntohs(tcph->th_sport), ntohs(tcph->th_dport),
X ntohl(tcph->th_seq) * 2 + 1, 0, TH_RST, ntohs(tcph->th_win),
X 0, NULL, 0, data + ip_hl);
X- libnet_do_checksum(data, IPPROTO_TCP, TCP_H);
X- new = list_elem(data, ip_hl + TCP_H);
X+ libnet_do_checksum(data, IPPROTO_TCP, LIBNET_TCP_H);
X+ new = list_elem(data, ip_hl + LIBNET_TCP_H);
X free(data);
X
X if (!(list = list_add(list, new)))
X@@ -335,24 +335,24 @@ tcp_seg_prepend_junk(u_char *pkt, int pk
X return NULL;
X
X for (i = 0; i < 500 ; i++) {
X- if (!(data = malloc(ip_hl + TCP_H + PACKET)))
X+ if (!(data = malloc(ip_hl + LIBNET_TCP_H + LIBNET_PACKET)))
X return NULL;
X
X /* Copy over IP header. */
X memcpy(data, pkt, ip_hl);
X
X /* Correct IP length, IP ID. */
X- ((struct ip *)data)->ip_len = htons(ip_hl + TCP_H + PACKET);
X+ ((struct ip *)data)->ip_len = htons(ip_hl + LIBNET_TCP_H + LIBNET_PACKET);
X ((struct ip *)data)->ip_id = htons(iph->ip_id + i); /* intentional! */
X
X /* Add TCP header, null payload, and fix checksum. */
X libnet_build_tcp(ntohs(tcph->th_sport), ntohs(tcph->th_dport),
X i, 666, TH_ACK, ntohs(tcph->th_win),
X ntohs(tcph->th_urp), NULL, 0, data + ip_hl);
X- memset(data + ip_hl + TCP_H, 0, PACKET);
X- libnet_do_checksum(data, IPPROTO_TCP, TCP_H);
X+ memset(data + ip_hl + LIBNET_TCP_H, 0, LIBNET_PACKET);
X+ libnet_do_checksum(data, IPPROTO_TCP, LIBNET_TCP_H);
X
X- new = list_elem(data, ip_hl + TCP_H + PACKET);
X+ new = list_elem(data, ip_hl + LIBNET_TCP_H + LIBNET_PACKET);
X free(data);
X
X if (!(list = list_add(list, new)))
X@@ -370,7 +370,7 @@ ELEM *
X tcp_seg_interleave_overwrites(ELEM *seg)
X {
X ELEM *s, *new;
X- u_char nulls[PACKET], *newdata;
X+ u_char nulls[LIBNET_PACKET], *newdata;
X u_long newseq;
X int newlen;
X
X@@ -387,21 +387,21 @@ tcp_seg_interleave_overwrites(ELEM *seg)
X newlen = (ntohs(iph->ip_len) - (ip_hl + tcp_hl)) / 2;
X newseq = ntohl(tcph->th_seq) + newlen;
X
X- if (!(newdata = malloc(ip_hl + TCP_H + newlen)))
X+ if (!(newdata = malloc(ip_hl + LIBNET_TCP_H + newlen)))
X return NULL;
X
X /* Copy in IP, TCP headers and data. */
X- memcpy(newdata, s->data, ip_hl + TCP_H);
X- memcpy(newdata + ip_hl + TCP_H, nulls, newlen);
X+ memcpy(newdata, s->data, ip_hl + LIBNET_TCP_H);
X+ memcpy(newdata + ip_hl + LIBNET_TCP_H, nulls, newlen);
X
X /* Correct IP length, TCP header length, TCP seqnum, TCP checksum. */
X- ((struct ip *)newdata)->ip_len = htons(ip_hl + TCP_H + newlen);
X+ ((struct ip *)newdata)->ip_len = htons(ip_hl + LIBNET_TCP_H + newlen);
X ((struct tcphdr *)(newdata + ip_hl))->th_seq = htonl(newseq);
X- ((struct tcphdr *)(newdata + ip_hl))->th_off = TCP_H / 4; /* XXX - PAWS! */
X- libnet_do_checksum(newdata, IPPROTO_TCP, TCP_H + newlen);
X+ ((struct tcphdr *)(newdata + ip_hl))->th_off = LIBNET_TCP_H / 4; /* XXX - PAWS! */
X+ libnet_do_checksum(newdata, IPPROTO_TCP, LIBNET_TCP_H + newlen);
X
X /* Add null fragment after current fragment. */
X- new = list_elem(newdata, ip_hl + TCP_H + newlen);
X+ new = list_elem(newdata, ip_hl + LIBNET_TCP_H + newlen);
X free(newdata);
X
X if (!list_add(s, new))
END-of-./patches/patch-af
echo x - ./PLIST
sed 's/^X//' >./PLIST << 'END-of-./PLIST'
X@comment $NetBSD$
Xman/man8/fragrouter.8
Xsbin/fragrouter
END-of-./PLIST
echo x - ./distinfo
sed 's/^X//' >./distinfo << 'END-of-./distinfo'
X$NetBSD$
X
XSHA1 (fragrouter-1.6.tar.gz) = b5fb0e9c2096c92661696686aed630bc0f20ce7e
XSize (fragrouter-1.6.tar.gz) = 277726 bytes
XSHA1 (patch-aa) = 3e18f18b65604c5189c45f33f59fbbfaf45a8829
XSHA1 (patch-ab) = 1411859d2a2f782cfe0200028269741c50f994c2
XSHA1 (patch-ac) = 7554bf048fb05630d188e90f98dded450faa6cbe
XSHA1 (patch-ad) = a3982a88ccebf5effd79e878af368d5245867630
XSHA1 (patch-ae) = aa04159e7e8c7239b86c8c0766af889b2122c8b2
XSHA1 (patch-af) = 2b6fd70fb5198ca92bfbd0e7f0bb8a972c5ab297
END-of-./distinfo
echo x - ./DESCR
sed 's/^X//' >./DESCR << 'END-of-./DESCR'
XFragrouter is a program for routing network traffic in such a way as
Xto elude most network intrusion detection systems.
X
XThe attacks implemented correspond to those listed in the Secure
XNetworks ``Insertion, Evasion, and Denial of Service: Eluding Network
XIntrusion Detection'' paper of January, 1998.
END-of-./DESCR
exit