# $Id: Portfile 119525 2014-04-29 02:53:07Z blair@macports.org $

PortSystem 1.0

name            fwknop-client
version         2.6.2
conflicts       fwknop
categories      net security
license         GPL-2+
maintainers     blair
description     'FireWall KNock OPerator': a port knocker to Linux servers
homepage        http://www.cipherdyne.org/fwknop/
platforms       darwin

long_description \
    fwknop stands for the 'FireWall KNock OPerator', and implements an \
    authorization scheme called Single Packet Authorization (SPA) that \
    is based around Netfilter and libpcap.  SPA requires only a single \
    encrypted packet in order to communicate various pieces of \
    information including desired access through a Netfilter policy \
    and/or complete commands to execute on the target system.  By \
    using Netfilter to maintain a 'default drop' stance, the main \
    application of this program is to protect services such as OpenSSH \
    with an additional layer of security in order to make the \
    exploitation of vulnerabilities (both 0-day and unpatched code) \
    much more difficult.  The authorization server passively monitors \
    authorization packets via libcap and hence there is no 'server' to \
    which to connect in the traditional sense.  Access to a protected \
    service is only granted after a valid encrypted and non-replayed \
    packet is monitored.  This port installs the client side script \
    that you run to gain access to a Linux box.

master_sites    ${homepage}download

distname        fwknop-${version}
use_bzip2       yes
checksums       md5    4c68128297f76ee536a446fcdd496435 \
                rmd160 dadae561dc36cf9ce66e4b8eec119bf904c4e81b \
                sha256 354b904073dda328c65e5590bfb57b01242f30d98af3ffc9525129ab7e75dbb6

depends_lib-append      port:gnupg \
                        port:gpgme

use_autoreconf  yes

configure.args-append   --disable-server

test.run        yes
test.target     check
