Bug 267723 - [NEW PORT] net/eap_parrot Replay Extensible Authentication Protocol (EAP) packets between network interfaces
Summary: [NEW PORT] net/eap_parrot Replay Extensible Authentication Protocol (EAP) pac...
Status: New
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: --- Affects Only Me
Assignee: freebsd-ports-bugs (Nobody)
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2022-11-12 04:15 UTC by Mark LaPointe
Modified: 2022-11-12 05:37 UTC (History)
0 users

See Also:


Attachments
net/eap_parrot patch (5.07 KB, patch)
2022-11-12 04:15 UTC, Mark LaPointe
no flags Details | Diff
eap_parrot.shar (3.83 KB, patch)
2022-11-12 05:06 UTC, Mark LaPointe
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Mark LaPointe 2022-11-12 04:15:03 UTC
Created attachment 238025 [details]
net/eap_parrot patch

EAP Parrot can be used to replay Extensible Authentication Protocol (EAP) packets between network interfaces.

EAP Parrot was born due to a frustration with the modem and router combo box provided by AT&T's fiber service.

The built-in router has very small tables to manage the network traffic from the local area network (LAN).
And if one has a need for more than 40 IP addresses on their LAN, limitations with the router will be hit
even if one decides to utilize static IPv4 and IPv6 addresses.

Connectivity will be impacted by not being reachable by the outside world,
or simply not being able to get a DHCP response from the router even
though one has plenty of room in their configuration.
Comment 1 Mark LaPointe 2022-11-12 05:06:07 UTC
Created attachment 238026 [details]
eap_parrot.shar