Release Notes: This version includes proper handling of ARP packets. It also adds support for Mac OS X by automatically disabling kqueue and poll on Mac OS X, so that Honeyd gets notified on bpf events. It's easier to compile due to removed dependence on libdnsres; libevent's DNS support is used instead. A more flexible configuration of proxy directive supports hybrid honeypot environments.
Release Notes: A crash in the ARP handling code was fixed. The default actions for UDP packets were fixed.
Release Notes: Subsystem support was improved. A stats collector was added. SMTP and Proxy subsystems were added for high-performance. Security fixes were done.
Release Notes: This release adds an internal Web server that shows traffic statistics. Support for statistics reporting so that an aggregator daemon can collect statistics from Honeyd deployments around the world to detect new worms. Support for DHCP Honeypots. A security update check that provides warnings on the Web interface and in syslog if the current Honeyd version has known vulnerabilities.
Release Notes: Several bugs that would cause operating system detection with nmap to fail were fixed along with compilation issues for honeydctl on Linux and *BSD. Support for log rotation via SIGUSR1 was added.
Release Notes: Support was added for ethernet-level simulation in virtual honeypots and dynamic configuration of a running Honeyd daemon via a management console. Some bugfixes were also made.
Release Notes: This version no longer answers to TCP segments that carry both SYN and RST flags. Without this fix, it is easy to remotely detect Honeyd. It also now drops privileges if permitted by configuration.
Release Notes: This release correctly initializes memory for port configuration and checks for addr_net in the configure script to inform people about installing a more recent version of libdnet.
Release Notes: This version features a whole bunch of new features, including dynamic templates that allow the honeypots to adapt based on the operating system, source IP addresses of the adversary, etc, passive fingerprinting that allows the identification of the remote host, a tarpit to slow down spammers, support for internal Python services, and many bugfixes.
Release Notes: Portability fixes, ICMP Unreachable codes for routing topology, and various other bugfixes.