[Lunar-commits] r26668 - moonbase/trunk/wifi/airsnort
Dennis Veatch
stumbles at lunar-linux.org
Fri Nov 9 18:20:20 CET 2007
Author: stumbles
Date: 2007-11-09 18:20:19 +0100 (Fri, 09 Nov 2007)
New Revision: 26668
Modified:
moonbase/trunk/wifi/airsnort/BUILD
moonbase/trunk/wifi/airsnort/DETAILS
Log:
This patch fixes a build error dealing with linux/if.h and
linux/types.h
Tested on current and new kernel-headers.
Modified: moonbase/trunk/wifi/airsnort/BUILD
===================================================================
--- moonbase/trunk/wifi/airsnort/BUILD 2007-11-09 17:01:48 UTC (rev 26667)
+++ moonbase/trunk/wifi/airsnort/BUILD 2007-11-09 17:20:19 UTC (rev 26668)
@@ -1,5 +1,7 @@
-(
+(
+ patch_it $SOURCE_CACHE/$SOURCE1 0 &&
+
echo CFLAGS:= $CFLAGS &&
echo OPTS:= $OPTS &&
set -x && #Let's show the logs what we've used for debug
Modified: moonbase/trunk/wifi/airsnort/DETAILS
===================================================================
--- moonbase/trunk/wifi/airsnort/DETAILS 2007-11-09 17:01:48 UTC (rev 26667)
+++ moonbase/trunk/wifi/airsnort/DETAILS 2007-11-09 17:20:19 UTC (rev 26668)
@@ -1,9 +1,12 @@
MODULE=airsnort
VERSION=0.2.7e
SOURCE=airsnort-$VERSION.tar.gz
+ SOURCE1=airsnort-0.2.7e-packetsource.patch
SOURCE_DIRECTORY=$BUILD_DIRECTORY/airsnort-$VERSION
SOURCE_URL=$SFORGE_URL/airsnort/
+ SOURCE1_URL=$PATCH_URL
SOURCE_VFY=sha1:311f252793a123d476d98115edb8eb1d9f698a30
+ SOURCE1_VFY=sha1:448f9cd2ca386827642686610eea034cc75f1fd5
WEB_SITE=http://airsnort.shmoo.com/
ENTERED=20030107
UPDATED=20060106
@@ -11,17 +14,17 @@
SHORT="wireless LAN (WLAN) tool which recovers encryption keys"
cat << EOF
-AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys.
-AirSnort operates by passively monitoring transmissions, computing the
-encryption key when enough packets have been gathered.
-802.11b, using the Wired Equivalent Protocol (WEP), is crippled with
-numerous security flaws. Most damning of these is the weakness described
-in "Weaknesses in the Key Scheduling Algorithm of RC4" by Scott Fluhrer,
-Itsik Mantin and Adi Shamir. Adam Stubblefield was the first to implement
-this attack, but he has not made his software public. AirSnort, along with
-WEPCrack, which was released about the same time as AirSnort, are the
-first publicly available implementaions of this attack.
-AirSnort requires approximately 5-10 million encrypted packets to be
-gathered. Once enough packets have been gathered, AirSnort can guess the
-encryption password in under a second.
+AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys.
+AirSnort operates by passively monitoring transmissions, computing the
+encryption key when enough packets have been gathered.
+802.11b, using the Wired Equivalent Protocol (WEP), is crippled with
+numerous security flaws. Most damning of these is the weakness described
+in "Weaknesses in the Key Scheduling Algorithm of RC4" by Scott Fluhrer,
+Itsik Mantin and Adi Shamir. Adam Stubblefield was the first to implement
+this attack, but he has not made his software public. AirSnort, along with
+WEPCrack, which was released about the same time as AirSnort, are the
+first publicly available implementaions of this attack.
+AirSnort requires approximately 5-10 million encrypted packets to be
+gathered. Once enough packets have been gathered, AirSnort can guess the
+encryption password in under a second.
EOF
More information about the Lunar-commits
mailing list