---
name: p0f2
version: 2.0.8_1
origin: net-mgmt/p0f2
comment: Passive OS fingerprinting tool
arch: freebsd:9:x86:64
www: http://lcamtuf.coredump.cx/p0f.shtml
maintainer: catone@cpan.org
prefix: /usr/local
licenselogic: single
flatsize: 233967
desc: |
  from the README:

  Passive OS fingerprinting is based on information coming from a remote host
  when it establishes a connection to our system.  Captured packets contain
  enough information to identify the operating system.  In contrast to active
  scanners such as nmap and QueSO, p0f does not send anything to the host being
  identified.

  For more information, read Spitzner's text at:
  http://www.enteract.com/~lspitz/finger.html .

  from the maintainer:

  Use of this program requires read access to the packet filtering
  device, typically /dev/bpf0.  Granting such access allows the users
  who have it to put your Ethernet device into promiscuous mode and
  sniff your network.  See
  http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
  if you do not understand how this can be harmful.  Running p0f with
  no options will cause it to analyse packets intended for other
  hosts.

  WWW:  http://lcamtuf.coredump.cx/p0f.shtml
categories: [security, net-mgmt]
files:
  /usr/local/bin/p0f: 7bb752b282d3fe1576233e4fea2bb7fb6b9990dcfa9e74cc3e6763f66713d037
  /usr/local/bin/p0fq: 7da5e7d3be9dbe4401f1214b185929a7f3d0b48563139133fb2f6e6809a719c3
  /usr/local/bin/p0frep: da756e9e826ab648c2c0dd29338db79c7e387628b4e8663b397f66d39fb238a1
  /usr/local/bin/sendack: 82f8bfc6645af71af4ff176041dd2258290552c54bfcdd9967ac4463b00905a1
  /usr/local/bin/sendack2: 3ca8e92e0fe6ee915e903c51da4bd9f17b357407d3aec367149e94e1a6e54b70
  /usr/local/bin/sendsyn: 6ca3c5549b77a8ee02ac70dadeae796e653bd9f66170ac5c1622111cb443149e
  /usr/local/etc/p0f/p0f.fp: db37e0bdc6f42cafd3f8535009bc12edf35c6db7813a8bdc99625bc7d0cadcde
  /usr/local/etc/p0f/p0fa.fp: 328f6fb928df4a56717315ec1be9d8811845553c5a31bba897d7580ec0d63f9c
  /usr/local/etc/p0f/p0fo.fp: 3cf4154a8a2994cea116970fd2c81d0c2534ee4930a96afa837476206fa09316
  /usr/local/etc/p0f/p0fr.fp: 01c723a9af74ca3021ba822750617f0c4f5d4bdfd9dad0778990226bf22a7cd0
  /usr/local/etc/rc.d/p0f2: adc4d36e27054bf8a77bb9e124f1665fc90d973f4b372e62ce21787220201cca
  /usr/local/man/man1/p0f.1.gz: 9c8cd4b1ce8c25de432ddc88bc2decfc35fad707671b443df15708e58be6bc10
  /usr/local/share/doc/p0f2/COPYING: 961c2671591840a60ec9b927dc6036ec5fc5fd861869647c2c4bc1050da48261
  /usr/local/share/doc/p0f2/CREDITS: df27d5387d3570d3132d23df4f93f8e5430395b26184cf4d4a66aff0433ffbc9
  /usr/local/share/doc/p0f2/ChangeLog: 7f0774810dc9c44d0eab2121f92aed56c560c1b129009f0dcef7ffdde057d5d1
  /usr/local/share/doc/p0f2/KNOWN_BUGS: 7d86e9a288c71e538f855d58e2acb67dbb981edef672738efbb61221865d8829
  /usr/local/share/doc/p0f2/README: bf68f082ff4bf6fc6a27cafb119145f5c97bda33dd2c37b8bffa102f4d9cb551
  /usr/local/share/doc/p0f2/TODO: 600d18b8e700d844f30b27d8b0bc55e4cba1fce69712a52afd2d06dbbc34b3f5
  /usr/local/share/doc/p0f2/win-memleak.txt: 603e80c40ee3019a10bda7259742fe4364e8354dee292221f60f8b7001e19c88
directories:
  /usr/local/share/doc/p0f2/: n
  /usr/local/etc/p0f/: y
scripts:
  post-install: |
    cd /usr/local
  pre-deinstall: |
    cd /usr/local
  post-deinstall: |
    cd /usr/local
