This is a rewrite of security/p0f. Since the fingerprint format is different
and no longer matches the format used in OpenBSD (for tcpdump and PF's OS
detection features) I think it makes sense to add it as a separate (non
conflicting) port rather than update the existing one.

-- -- -- --
P0f is a tool that utilizes an array of sophisticated, purely passive
traffic fingerprinting mechanisms to identify the players behind any
incidental TCP/IP communications (often as little as a single normal SYN)
without interfering in any way. Version 3 is a complete rewrite of the
original codebase, incorporating a significant number of improvements to
network-level fingerprinting, and introducing the ability to reason about
application-level payloads (e.g., HTTP).

The tool can be operated in the foreground or as a daemon, and offers a
simple real-time API (via unix domain sockets) for third-party components
that wish to obtain additional information about the actors they are
talking to.
-- -- -- --

any comments/OKs?

Attachment: p0f3.tgz
Description: application/tar-gz

Reply via email to