Download List

项目描述

IP Sentinel is a tool that tries to prevent
unauthorized usage of IP addresses within an
ethernet broadcast domain by answering ARP
requests. After receiving faked replies,
requesting parties store the MAC in their ARP
tables and will send future packets to this
invalid MAC, rendering the IP unreachable.

系统要求

System requirement is not defined
Information regarding Project Releases and Project Resources. Note that the information here is a quote from Freecode.com page, and the downloads themselves may not be hosted on OSDN.

2005-03-29 23:15
0.12

这个版本增加了一个“ -行动”选项,执行程序时,不允许ARP包检测。 IP地址排序发生在1 endian的,中立的方式,与旧,不推荐使用记录格式支持身体从源头上删除。
标签: Minor feature enhancements
This version adds an "--action" option to execute a program when a disallowed ARP packet is detected. Sorting of IP addresses happens in an endian-neutral manner, and support for the old, deprecated logging format was physically removed from the source.

2004-12-16 13:01
0.11

这个版本使我们能够阻止具有一定的主机的MAC地址,不论其知识产权。此功能可以帮助孤立蠕虫或病毒感染的主机。默认的选项发生了变化。
标签: Minor feature enhancements
This version made it possible to block hosts with a certain MAC address regardless of their IP. This feature could help to isolate hosts infected by worms or viruses. The default options were changed.

2004-06-17 17:31
0.10

代码清理是在这个版本的主要变化。与dietlibc 0.26汇编问题是固定,tai64n格式现在使用的时间戳。
标签: Code cleanup
Code cleanups are the main change in this version.
Compilation issues with dietlibc 0.26 were fixed,
and the tai64n format is now used for timestamps.

2003-12-16 02:19
0.9

此版本修正了处理陆委会注解的IP地址时,存在一个比较一般的规则。它提供了海湾合作委员会和dietlibc错误的解决方法还,并与陆委会重复的网络行为注释现在可以预测,以便为网络的MAC例如池可配置。
标签: Minor bugfixes
This release fixes the handling of MAC-annotated IPs when there exists a more general rule. It provides workarounds for gcc and dietlibc bugs also, and the behavior on duplicate networks with MAC-annotation is now predictable so that e.g. MAC pools for networks can be configured.

2003-10-31 04:49
0.8

这个版本修复了从错误与0.0.0.0的IP,这是通过DHCP或爸爸组合使用模式。现在允许指定源互委会,地址和毒害的入侵者的IP时,他发出了请求。在结合的MAC标记的IP地址,正确的MAC可以传播当入侵者使用的IP暂时关闭机器。某些代码的其他部分更RFC826标准。
标签: Minor feature enhancements
This version fixes a bug in the FROM-mode in
combination with 0.0.0.0 IPs, which are used by
DHCP or DAD. It is now permissible to specify MACs
of source-addresses, and to poison an intruders IP
when he has sent a request. In combination with
MAC-tagged IP addresses, the correct MAC can be
propagated when an intruder uses the IP of
temporarily turned off machines. Some other parts
of the code were made more RFC826 compliant.

Project Resources