# $Id$

PortSystem 1.0

name            fwknop-client
version         2.6.5
conflicts       fwknop
categories      net security
license         GPL-2+
maintainers     blair
description     'FireWall KNock OPerator': a port knocker to Linux servers
homepage        http://www.cipherdyne.org/fwknop/
platforms       darwin

long_description \
    fwknop stands for the 'FireWall KNock OPerator', and implements an \
    authorization scheme called Single Packet Authorization (SPA) that \
    is based around Netfilter and libpcap.  SPA requires only a single \
    encrypted packet in order to communicate various pieces of \
    information including desired access through a Netfilter policy \
    and/or complete commands to execute on the target system.  By \
    using Netfilter to maintain a 'default drop' stance, the main \
    application of this program is to protect services such as OpenSSH \
    with an additional layer of security in order to make the \
    exploitation of vulnerabilities (both 0-day and unpatched code) \
    much more difficult.  The authorization server passively monitors \
    authorization packets via libcap and hence there is no 'server' to \
    which to connect in the traditional sense.  Access to a protected \
    service is only granted after a valid encrypted and non-replayed \
    packet is monitored.  This port installs the client side script \
    that you run to gain access to a Linux box.

master_sites    ${homepage}download

distname        fwknop-${version}
use_bzip2       yes
checksums       md5    1ae000a499bf604a2aeef4d0a7a178c8 \
                rmd160 87222bbb6f1b356b09d5a4f864c5b9b1ec2f5ef1 \
                sha256 ed71e480c39060bdb9ee2a8a6e5d8d492c81b43335bc45a44cc4797d6016df03

depends_lib-append      port:gnupg \
                        port:gpgme

use_autoreconf  yes

configure.args-append   --disable-server

test.run        yes
test.target     check