mirror of
https://git.FreeBSD.org/ports.git
synced 2024-11-23 00:43:28 +00:00
tcp_wrapper has been in the base system since 4.0-RELEASE. Remove it.
This commit is contained in:
parent
9427bf4fc5
commit
362faceac7
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=67939
@ -281,7 +281,6 @@
|
||||
SUBDIR += sudo
|
||||
SUBDIR += super
|
||||
SUBDIR += swatch
|
||||
SUBDIR += tcp_wrapper
|
||||
SUBDIR += tea-total
|
||||
SUBDIR += termlog
|
||||
SUBDIR += tinc
|
||||
|
@ -1,40 +0,0 @@
|
||||
# New ports collection makefile for: tcp_wrapper
|
||||
# Date created: 27 Oct 1994
|
||||
# Whom: torstenb
|
||||
#
|
||||
# $FreeBSD$
|
||||
#
|
||||
|
||||
PORTNAME= tcp_wrappers
|
||||
PORTVERSION= 7.6
|
||||
PORTREVISION= 1
|
||||
CATEGORIES= security
|
||||
MASTER_SITES= ftp://ftp.porcupine.org/pub/security/
|
||||
DISTNAME= ${PORTNAME}_${PORTVERSION}
|
||||
|
||||
MAINTAINER= torstenb@FreeBSD.org
|
||||
|
||||
.if exists(/usr/include/tcpd.h)
|
||||
FORBIDDEN= tcp_wrappers is in the base system
|
||||
.endif
|
||||
|
||||
INSTALLS_SHLIB= yes
|
||||
|
||||
ALL_TARGET= freebsd
|
||||
MAN3= hosts_access.3
|
||||
MAN5= hosts_access.5 hosts_options.5
|
||||
MAN8= tcpd.8 tcpdchk.8 tcpdmatch.8
|
||||
|
||||
post-install:
|
||||
@${INSTALL_DATA} ${FILESDIR}/inetd.conf.wrapped.sample ${PREFIX}/etc
|
||||
|
||||
update:
|
||||
@cd ${FILESDIR} ; co -f $(CVSROOT)/src/etc/inetd.conf,v
|
||||
@${SED} -e 's:/usr/libexec/[a-zA-Z]*:${PREFIX}/libexec/tcpd:g' \
|
||||
-e 's:/usr/local/libexec/[a-zA-Z]*:${PREFIX}/libexec/tcpd:g' \
|
||||
-e 's:/usr/local/sbin/[a-zA-Z]*:${PREFIX}/libexec/tcpd:g' \
|
||||
< ${FILESDIR}/inetd.conf > ${FILESDIR}/inetd.conf.wrapped.sample
|
||||
@${RM} -f ${FILESDIR}/inetd.conf
|
||||
@${ECHO} "Now manually fixup deamon paths from the /usr/local tree."
|
||||
|
||||
.include <bsd.port.mk>
|
@ -1 +0,0 @@
|
||||
MD5 (tcp_wrappers_7.6.tar.gz) = e6fa25f71226d090f34de3f6b122fb5a
|
@ -1,71 +0,0 @@
|
||||
#
|
||||
# Internet server configuration database
|
||||
#
|
||||
# @(#)inetd.conf 5.4 (Berkeley) 6/30/90
|
||||
#
|
||||
ftp stream tcp nowait root /usr/local/libexec/tcpd ftpd -l
|
||||
telnet stream tcp nowait root /usr/local/libexec/tcpd telnetd
|
||||
shell stream tcp nowait root /usr/local/libexec/tcpd rshd
|
||||
login stream tcp nowait root /usr/local/libexec/tcpd rlogind
|
||||
finger stream tcp nowait nobody /usr/local/libexec/tcpd fingerd -s
|
||||
#exec stream tcp nowait root /usr/local/libexec/tcpd rexecd
|
||||
#uucpd stream tcp nowait root /usr/local/libexec/tcpd uucpd
|
||||
#nntp stream tcp nowait usenet /usr/local/libexec/tcpd nntpd
|
||||
comsat dgram udp wait root /usr/local/libexec/tcpd comsat
|
||||
ntalk dgram udp wait root /usr/local/libexec/tcpd ntalkd
|
||||
#tftp dgram udp wait nobody /usr/local/libexec/tcpd tftpd /tftpboot
|
||||
#bootps dgram udp wait root /usr/local/libexec/tcpd bootpd
|
||||
#
|
||||
# "Small servers" -- used to be standard on, but we're more conservative
|
||||
# about things due to Internet security concerns. Only turn on what you
|
||||
# need.
|
||||
#
|
||||
#daytime stream tcp nowait root internal
|
||||
#daytime dgram udp wait root internal
|
||||
#time stream tcp nowait root internal
|
||||
#time dgram udp wait root internal
|
||||
#echo stream tcp nowait root internal
|
||||
#echo dgram udp wait root internal
|
||||
#discard stream tcp nowait root internal
|
||||
#discard dgram udp wait root internal
|
||||
#chargen stream tcp nowait root internal
|
||||
#chargen dgram udp wait root internal
|
||||
#
|
||||
# Kerberos authenticated services
|
||||
#
|
||||
#klogin stream tcp nowait root /usr/local/libexec/tcpd rlogind -k
|
||||
#eklogin stream tcp nowait root /usr/local/libexec/tcpd rlogind -k -x
|
||||
#kshell stream tcp nowait root /usr/local/libexec/tcpd rshd -k
|
||||
#rkinit stream tcp nowait root /usr/local/libexec/tcpd rkinitd
|
||||
#
|
||||
# Services run ONLY on the Kerberos server
|
||||
#
|
||||
#krbupdate stream tcp nowait root /usr/local/libexec/tcpd registerd
|
||||
#kpasswd stream tcp nowait root /usr/local/libexec/tcpd kpasswdd
|
||||
#
|
||||
# RPC based services (you MUST have portmapper running to use these)
|
||||
#
|
||||
#rstatd/1-3 dgram rpc/udp wait root /usr/local/libexec/tcpd.rstatd rpc.rstatd
|
||||
#rusersd/1-2 dgram rpc/udp wait root /usr/local/libexec/tcpd.rusersd rpc.rusersd
|
||||
#walld/1 dgram rpc/udp wait root /usr/local/libexec/tcpd.rwalld rpc.rwalld
|
||||
#pcnfsd/1-2 dgram rpc/udp wait root /usr/local/libexec/tcpd.pcnfsd rpc.pcnfsd
|
||||
#rquotad/1 dgram rpc/udp wait root /usr/local/libexec/tcpd.rquotad rpc.rquotad
|
||||
#sprayd/1 dgram rpc/udp wait root /usr/local/libexec/tcpd.sprayd rpc.sprayd
|
||||
#
|
||||
# example entry for the optional pop3 server
|
||||
#
|
||||
#pop3 stream tcp nowait root /usr/local/libexec/tcpd /usr/local/libexec/popper
|
||||
#
|
||||
# example entry for the optional imap4 server
|
||||
#
|
||||
#imap4 stream tcp nowait root /usr/local/libexec/tcpd /usr/local/libexec/imapd
|
||||
#
|
||||
# example entry for the optional ident server
|
||||
#
|
||||
#ident stream tcp wait root /usr/local/libexec/tcpd /usr/local/sbin/identd -w -t120
|
||||
#
|
||||
# Enable the following two entries to enable samba startup from inetd
|
||||
# (from the Samba documentation).
|
||||
#
|
||||
#netbios-ssn stream tcp nowait root /usr/local/libexec/tcpd /usr/local/sbin/smbd
|
||||
#netbios-ns dgram udp wait root /usr/local/libexec/tcpd /usr/local/sbin/nmbd
|
@ -1,319 +0,0 @@
|
||||
*** Makefile.orig Fri Mar 21 12:27:21 1997
|
||||
--- Makefile Wed Sep 16 17:41:52 1998
|
||||
***************
|
||||
*** 47,53 ****
|
||||
#REAL_DAEMON_DIR=/usr/sbin
|
||||
#
|
||||
# BSD 4.4
|
||||
! #REAL_DAEMON_DIR=/usr/libexec
|
||||
#
|
||||
# HP-UX SCO Unicos
|
||||
#REAL_DAEMON_DIR=/etc
|
||||
--- 47,53 ----
|
||||
#REAL_DAEMON_DIR=/usr/sbin
|
||||
#
|
||||
# BSD 4.4
|
||||
! REAL_DAEMON_DIR=/usr/libexec
|
||||
#
|
||||
# HP-UX SCO Unicos
|
||||
#REAL_DAEMON_DIR=/etc
|
||||
***************
|
||||
*** 138,144 ****
|
||||
|
||||
freebsd:
|
||||
@make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
|
||||
! LIBS= RANLIB=ranlib ARFLAGS=rv AUX_OBJ= NETGROUP= TLI= \
|
||||
EXTRA_CFLAGS=-DSYS_ERRLIST_DEFINED VSYSLOG= all
|
||||
|
||||
linux:
|
||||
--- 138,144 ----
|
||||
|
||||
freebsd:
|
||||
@make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
|
||||
! LIBS= RANLIB=ranlib ARFLAGS=rv AUX_OBJ= NETGROUP=-DNETGROUP TLI= \
|
||||
EXTRA_CFLAGS=-DSYS_ERRLIST_DEFINED VSYSLOG= all
|
||||
|
||||
linux:
|
||||
***************
|
||||
*** 391,397 ****
|
||||
# the ones provided with this source distribution. The environ.c module
|
||||
# implements setenv(), getenv(), and putenv().
|
||||
|
||||
! AUX_OBJ= setenv.o
|
||||
#AUX_OBJ= environ.o
|
||||
#AUX_OBJ= environ.o strcasecmp.o
|
||||
|
||||
--- 391,397 ----
|
||||
# the ones provided with this source distribution. The environ.c module
|
||||
# implements setenv(), getenv(), and putenv().
|
||||
|
||||
! #AUX_OBJ= setenv.o
|
||||
#AUX_OBJ= environ.o
|
||||
#AUX_OBJ= environ.o strcasecmp.o
|
||||
|
||||
***************
|
||||
*** 454,460 ****
|
||||
# host name aliases. Compile with -DSOLARIS_24_GETHOSTBYNAME_BUG to work
|
||||
# around this. The workaround does no harm on other Solaris versions.
|
||||
|
||||
! BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DLIBC_CALLS_STRTOK
|
||||
#BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DINET_ADDR_BUG
|
||||
#BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DSOLARIS_24_GETHOSTBYNAME_BUG
|
||||
|
||||
--- 454,460 ----
|
||||
# host name aliases. Compile with -DSOLARIS_24_GETHOSTBYNAME_BUG to work
|
||||
# around this. The workaround does no harm on other Solaris versions.
|
||||
|
||||
! #BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DLIBC_CALLS_STRTOK
|
||||
#BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DINET_ADDR_BUG
|
||||
#BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DSOLARIS_24_GETHOSTBYNAME_BUG
|
||||
|
||||
***************
|
||||
*** 472,478 ****
|
||||
# If your system supports vsyslog(), comment out the following definition.
|
||||
# If in doubt leave it in, it won't harm.
|
||||
|
||||
! VSYSLOG = -Dvsyslog=myvsyslog
|
||||
|
||||
# End of the system dependencies.
|
||||
#################################
|
||||
--- 472,478 ----
|
||||
# If your system supports vsyslog(), comment out the following definition.
|
||||
# If in doubt leave it in, it won't harm.
|
||||
|
||||
! #VSYSLOG = -Dvsyslog=myvsyslog
|
||||
|
||||
# End of the system dependencies.
|
||||
#################################
|
||||
***************
|
||||
*** 491,497 ****
|
||||
# Uncomment the next definition to turn on the language extensions
|
||||
# (examples: allow, deny, banners, twist and spawn).
|
||||
#
|
||||
! #STYLE = -DPROCESS_OPTIONS # Enable language extensions.
|
||||
|
||||
################################################################
|
||||
# Optional: Changing the default disposition of logfile records
|
||||
--- 491,497 ----
|
||||
# Uncomment the next definition to turn on the language extensions
|
||||
# (examples: allow, deny, banners, twist and spawn).
|
||||
#
|
||||
! STYLE = -DPROCESS_OPTIONS # Enable language extensions.
|
||||
|
||||
################################################################
|
||||
# Optional: Changing the default disposition of logfile records
|
||||
***************
|
||||
*** 514,520 ****
|
||||
#
|
||||
# The LOG_XXX names below are taken from the /usr/include/syslog.h file.
|
||||
|
||||
! FACILITY= LOG_MAIL # LOG_MAIL is what most sendmail daemons use
|
||||
|
||||
# The syslog priority at which successful connections are logged.
|
||||
|
||||
--- 514,521 ----
|
||||
#
|
||||
# The LOG_XXX names below are taken from the /usr/include/syslog.h file.
|
||||
|
||||
! #FACILITY= LOG_MAIL # LOG_MAIL is what most sendmail daemons use
|
||||
! FACILITY= LOG_AUTH
|
||||
|
||||
# The syslog priority at which successful connections are logged.
|
||||
|
||||
***************
|
||||
*** 590,596 ****
|
||||
# look for access control information. Watch out for the quotes and
|
||||
# backslashes when you make changes.
|
||||
|
||||
! TABLES = -DHOSTS_DENY=\"/etc/hosts.deny\" -DHOSTS_ALLOW=\"/etc/hosts.allow\"
|
||||
|
||||
####################################################
|
||||
# Optional: dealing with host name/address conflicts
|
||||
--- 591,597 ----
|
||||
# look for access control information. Watch out for the quotes and
|
||||
# backslashes when you make changes.
|
||||
|
||||
! TABLES = -DHOSTS_DENY=\"${PREFIX}/etc/hosts.deny\" -DHOSTS_ALLOW=\"${PREFIX}/etc/hosts.allow\"
|
||||
|
||||
####################################################
|
||||
# Optional: dealing with host name/address conflicts
|
||||
***************
|
||||
*** 610,616 ****
|
||||
# Paranoid mode implies hostname lookup. In order to disable hostname
|
||||
# lookups altogether, see the next section.
|
||||
|
||||
! PARANOID= -DPARANOID
|
||||
|
||||
########################################
|
||||
# Optional: turning off hostname lookups
|
||||
--- 611,617 ----
|
||||
# Paranoid mode implies hostname lookup. In order to disable hostname
|
||||
# lookups altogether, see the next section.
|
||||
|
||||
! #PARANOID= -DPARANOID
|
||||
|
||||
########################################
|
||||
# Optional: turning off hostname lookups
|
||||
***************
|
||||
*** 657,665 ****
|
||||
# Protection against weird shells or weird make programs.
|
||||
|
||||
SHELL = /bin/sh
|
||||
! .c.o:; $(CC) $(CFLAGS) -c $*.c
|
||||
|
||||
! CFLAGS = -O -DFACILITY=$(FACILITY) $(ACCESS) $(PARANOID) $(NETGROUP) \
|
||||
$(BUGS) $(SYSTYPE) $(AUTH) $(UMASK) \
|
||||
-DREAL_DAEMON_DIR=\"$(REAL_DAEMON_DIR)\" $(STYLE) $(KILL_OPT) \
|
||||
-DSEVERITY=$(SEVERITY) -DRFC931_TIMEOUT=$(RFC931_TIMEOUT) \
|
||||
--- 658,671 ----
|
||||
# Protection against weird shells or weird make programs.
|
||||
|
||||
SHELL = /bin/sh
|
||||
! PREFIX ?= /usr/local
|
||||
!
|
||||
! .SUFFIXES: .c .so .o
|
||||
!
|
||||
! .c.so:
|
||||
! ${CC} -fpic -DPIC ${CFLAGS} -c ${.IMPSRC} -o ${.TARGET}
|
||||
|
||||
! CFLAGS += -DFACILITY=$(FACILITY) $(ACCESS) $(PARANOID) $(NETGROUP) \
|
||||
$(BUGS) $(SYSTYPE) $(AUTH) $(UMASK) \
|
||||
-DREAL_DAEMON_DIR=\"$(REAL_DAEMON_DIR)\" $(STYLE) $(KILL_OPT) \
|
||||
-DSEVERITY=$(SEVERITY) -DRFC931_TIMEOUT=$(RFC931_TIMEOUT) \
|
||||
***************
|
||||
*** 684,692 ****
|
||||
refuse.c tcpdchk.8 setenv.c inetcf.c inetcf.h scaffold.c \
|
||||
scaffold.h tcpdmatch.8 README.NIS
|
||||
|
||||
! LIB = libwrap.a
|
||||
|
||||
- all other: config-check tcpd tcpdmatch try-from safe_finger tcpdchk
|
||||
|
||||
# Invalidate all object files when the compiler options (CFLAGS) have changed.
|
||||
|
||||
--- 690,724 ----
|
||||
refuse.c tcpdchk.8 setenv.c inetcf.c inetcf.h scaffold.c \
|
||||
scaffold.h tcpdmatch.8 README.NIS
|
||||
|
||||
! LIB = libwrap.a
|
||||
! .if ${PORTOBJFORMAT} == elf
|
||||
! SLIB = libwrap.so.7
|
||||
! .else
|
||||
! SLIB = libwrap.so.7.6
|
||||
! .endif
|
||||
!
|
||||
! all other: config-check $(LIB) $(SLIB) tcpd tcpdmatch try-from safe_finger tcpdchk
|
||||
!
|
||||
! install:
|
||||
! ${INSTALL} -o ${BINOWN} -g ${BINGRP} -c -m 644 \
|
||||
! tcpd.h ${PREFIX}/include
|
||||
! ${INSTALL} -o ${BINOWN} -g ${BINGRP} -c -m 644 \
|
||||
! $(LIB) $(SLIB) ${PREFIX}/lib
|
||||
! (cd ${PREFIX}/lib;ln -sf $(SLIB) `echo $(SLIB) | sed 's/\.so.*$$/.so/'`)
|
||||
! ranlib ${PREFIX}/lib/$(LIB)
|
||||
! ${INSTALL} -o ${BINOWN} -g ${BINGRP} -cs -m ${BINMODE} \
|
||||
! tcpd ${PREFIX}/libexec
|
||||
! ${INSTALL} -o ${BINOWN} -g ${BINGRP} -cs -m ${BINMODE} \
|
||||
! tcpdchk tcpdmatch ${PREFIX}/sbin
|
||||
! ${INSTALL} -o ${BINOWN} -g ${BINGRP} -cs -m ${BINMODE} \
|
||||
! try-from safe_finger ${PREFIX}/bin
|
||||
! ${INSTALL} -o ${MANOWN} -g ${MANGRP} -c -m ${MANMODE} \
|
||||
! tcpd.8 tcpdchk.8 tcpdmatch.8 ${PREFIX}/man/man8
|
||||
! ${INSTALL} -o ${MANOWN} -g ${MANGRP} -c -m ${MANMODE} \
|
||||
! hosts_access.3 ${PREFIX}/man/man3
|
||||
! ${INSTALL} -o ${MANOWN} -g ${MANGRP} -c -m ${MANMODE} \
|
||||
! hosts_access.5 hosts_options.5 ${PREFIX}/man/man5
|
||||
|
||||
|
||||
# Invalidate all object files when the compiler options (CFLAGS) have changed.
|
||||
|
||||
***************
|
||||
*** 703,729 ****
|
||||
$(AR) $(ARFLAGS) $(LIB) $(LIB_OBJ)
|
||||
-$(RANLIB) $(LIB)
|
||||
|
||||
! tcpd: tcpd.o $(LIB)
|
||||
! $(CC) $(CFLAGS) -o $@ tcpd.o $(LIB) $(LIBS)
|
||||
|
||||
! miscd: miscd.o $(LIB)
|
||||
! $(CC) $(CFLAGS) -o $@ miscd.o $(LIB) $(LIBS)
|
||||
|
||||
! safe_finger: safe_finger.o $(LIB)
|
||||
! $(CC) $(CFLAGS) -o $@ safe_finger.o $(LIB) $(LIBS)
|
||||
|
||||
TCPDMATCH_OBJ = tcpdmatch.o fakelog.o inetcf.o scaffold.o
|
||||
|
||||
! tcpdmatch: $(TCPDMATCH_OBJ) $(LIB)
|
||||
! $(CC) $(CFLAGS) -o $@ $(TCPDMATCH_OBJ) $(LIB) $(LIBS)
|
||||
|
||||
! try-from: try-from.o fakelog.o $(LIB)
|
||||
! $(CC) $(CFLAGS) -o $@ try-from.o fakelog.o $(LIB) $(LIBS)
|
||||
|
||||
TCPDCHK_OBJ = tcpdchk.o fakelog.o inetcf.o scaffold.o
|
||||
|
||||
! tcpdchk: $(TCPDCHK_OBJ) $(LIB)
|
||||
! $(CC) $(CFLAGS) -o $@ $(TCPDCHK_OBJ) $(LIB) $(LIBS)
|
||||
|
||||
shar: $(KIT)
|
||||
@shar $(KIT)
|
||||
--- 735,770 ----
|
||||
$(AR) $(ARFLAGS) $(LIB) $(LIB_OBJ)
|
||||
-$(RANLIB) $(LIB)
|
||||
|
||||
! $(SLIB): $(LIB_OBJ:S/o$/so/g) shdata.so
|
||||
! rm -f $(SLIB)
|
||||
! .if ${PORTOBJFORMAT} == elf
|
||||
! $(CC) -o $(SLIB) -shared -Wl,-soname,$(SLIB) $(LIB_OBJ:S/o$/so/g) shdata.so
|
||||
! .else
|
||||
! ld -Bshareable -o $(SLIB) $(LIB_OBJ:S/o$/so/g) shdata.so
|
||||
! .endif
|
||||
! ln -sf $(SLIB) `echo $(SLIB) | sed 's/\.so.*$$/.so/'`
|
||||
!
|
||||
! tcpd: tcpd.o $(SLIB)
|
||||
! $(CC) $(CFLAGS) -o $@ tcpd.o -L. -lwrap $(LIBS)
|
||||
|
||||
! miscd: miscd.o $(SLIB)
|
||||
! $(CC) $(CFLAGS) -o $@ miscd.o -L. -lwrap $(LIBS)
|
||||
|
||||
! safe_finger: safe_finger.o $(SLIB)
|
||||
! $(CC) $(CFLAGS) -o $@ safe_finger.o -L. -lwrap $(LIBS)
|
||||
|
||||
TCPDMATCH_OBJ = tcpdmatch.o fakelog.o inetcf.o scaffold.o
|
||||
|
||||
! tcpdmatch: $(TCPDMATCH_OBJ) $(SLIB)
|
||||
! $(CC) $(CFLAGS) -o $@ $(TCPDMATCH_OBJ) -L. -lwrap $(LIBS)
|
||||
|
||||
! try-from: try-from.o fakelog.o $(SLIB)
|
||||
! $(CC) $(CFLAGS) -o $@ try-from.o fakelog.o -L. -lwrap $(LIBS)
|
||||
|
||||
TCPDCHK_OBJ = tcpdchk.o fakelog.o inetcf.o scaffold.o
|
||||
|
||||
! tcpdchk: $(TCPDCHK_OBJ) $(SLIB)
|
||||
! $(CC) $(CFLAGS) -o $@ $(TCPDCHK_OBJ) -L. -lwrap $(LIBS)
|
||||
|
||||
shar: $(KIT)
|
||||
@shar $(KIT)
|
||||
***************
|
||||
*** 739,745 ****
|
||||
|
||||
clean:
|
||||
rm -f tcpd miscd safe_finger tcpdmatch tcpdchk try-from *.[oa] core \
|
||||
! cflags
|
||||
|
||||
tidy: clean
|
||||
chmod -R a+r .
|
||||
--- 780,786 ----
|
||||
|
||||
clean:
|
||||
rm -f tcpd miscd safe_finger tcpdmatch tcpdchk try-from *.[oa] core \
|
||||
! cflags *.so $(SLIB)
|
||||
|
||||
tidy: clean
|
||||
chmod -R a+r .
|
||||
*** /dev/null Thu Jan 25 06:52:04 1996
|
||||
--- shdata.c Thu Jan 25 06:54:34 1996
|
||||
***************
|
||||
*** 0 ****
|
||||
--- 1,2 ----
|
||||
+ int allow_severity;
|
||||
+ int deny_severity;
|
@ -1,19 +0,0 @@
|
||||
*** hosts_access.3.orig Tue Aug 5 10:14:01 1997
|
||||
--- hosts_access.3 Tue Aug 5 10:14:35 1997
|
||||
***************
|
||||
*** 78,84 ****
|
||||
hosts_access(5), format of the access control tables.
|
||||
hosts_options(5), optional extensions to the base language.
|
||||
.SH FILES
|
||||
! /etc/hosts.allow, /etc/hosts.deny, access control tables.
|
||||
.SH BUGS
|
||||
hosts_access() uses the strtok() library function. This may interfere
|
||||
with other code that relies on strtok().
|
||||
--- 78,84 ----
|
||||
hosts_access(5), format of the access control tables.
|
||||
hosts_options(5), optional extensions to the base language.
|
||||
.SH FILES
|
||||
! !!PREFIX!!/etc/hosts.allow, !!PREFIX!!/etc/hosts.deny, access control tables.
|
||||
.SH BUGS
|
||||
hosts_access() uses the strtok() library function. This may interfere
|
||||
with other code that relies on strtok().
|
@ -1,42 +0,0 @@
|
||||
*** hosts_access.5.orig Tue Aug 5 10:14:41 1997
|
||||
--- hosts_access.5 Tue Aug 5 10:15:08 1997
|
||||
***************
|
||||
*** 21,30 ****
|
||||
at the first match:
|
||||
.IP \(bu
|
||||
Access will be granted when a (daemon,client) pair matches an entry in
|
||||
! the \fI/etc/hosts.allow\fR file.
|
||||
.IP \(bu
|
||||
Otherwise, access will be denied when a (daemon,client) pair matches an
|
||||
! entry in the \fI/etc/hosts.deny\fR file.
|
||||
.IP \(bu
|
||||
Otherwise, access will be granted.
|
||||
.PP
|
||||
--- 21,30 ----
|
||||
at the first match:
|
||||
.IP \(bu
|
||||
Access will be granted when a (daemon,client) pair matches an entry in
|
||||
! the \fI!!PREFIX!!/etc/hosts.allow\fR file.
|
||||
.IP \(bu
|
||||
Otherwise, access will be denied when a (daemon,client) pair matches an
|
||||
! entry in the \fI!!PREFIX!!/etc/hosts.deny\fR file.
|
||||
.IP \(bu
|
||||
Otherwise, access will be granted.
|
||||
.PP
|
||||
***************
|
||||
*** 268,274 ****
|
||||
file:
|
||||
.PP
|
||||
.ne 2
|
||||
! /etc/hosts.deny:
|
||||
.in +3
|
||||
ALL: ALL
|
||||
.PP
|
||||
--- 268,274 ----
|
||||
file:
|
||||
.PP
|
||||
.ne 2
|
||||
! !!PREFIX!!/etc/hosts.deny:
|
||||
.in +3
|
||||
ALL: ALL
|
||||
.PP
|
@ -1,86 +0,0 @@
|
||||
*** tcpd.8.orig Tue Aug 5 10:15:53 1997
|
||||
--- tcpd.8 Tue Aug 5 10:18:01 1997
|
||||
***************
|
||||
*** 88,99 ****
|
||||
.sp
|
||||
.in +5
|
||||
# mkdir /other/place
|
||||
! # mv /usr/etc/in.fingerd /other/place
|
||||
! # cp tcpd /usr/etc/in.fingerd
|
||||
.fi
|
||||
.PP
|
||||
! The example assumes that the network daemons live in /usr/etc. On some
|
||||
! systems, network daemons live in /usr/sbin or in /usr/libexec, or have
|
||||
no `in.\' prefix to their name.
|
||||
.SH EXAMPLE 2
|
||||
This example applies when \fItcpd\fR expects that the network daemons
|
||||
--- 88,99 ----
|
||||
.sp
|
||||
.in +5
|
||||
# mkdir /other/place
|
||||
! # mv /usr/libexec/fingerd /other/place
|
||||
! # cp tcpd /usr/libexec/fingerd
|
||||
.fi
|
||||
.PP
|
||||
! The example assumes that the network daemons live in /usr/libexec. On some
|
||||
! systems, network daemons live in /usr/sbin or in /usr/etc, or have
|
||||
no `in.\' prefix to their name.
|
||||
.SH EXAMPLE 2
|
||||
This example applies when \fItcpd\fR expects that the network daemons
|
||||
***************
|
||||
*** 105,111 ****
|
||||
.nf
|
||||
.sp
|
||||
.ti +5
|
||||
! finger stream tcp nowait nobody /usr/etc/in.fingerd in.fingerd
|
||||
.sp
|
||||
becomes:
|
||||
.sp
|
||||
--- 105,111 ----
|
||||
.nf
|
||||
.sp
|
||||
.ti +5
|
||||
! finger stream tcp nowait nobody /usr/libexec/fingerd fingerd
|
||||
.sp
|
||||
becomes:
|
||||
.sp
|
||||
***************
|
||||
*** 114,121 ****
|
||||
.sp
|
||||
.fi
|
||||
.PP
|
||||
! The example assumes that the network daemons live in /usr/etc. On some
|
||||
! systems, network daemons live in /usr/sbin or in /usr/libexec, the
|
||||
daemons have no `in.\' prefix to their name, or there is no userid
|
||||
field in the inetd configuration file.
|
||||
.PP
|
||||
--- 114,121 ----
|
||||
.sp
|
||||
.fi
|
||||
.PP
|
||||
! The example assumes that the network daemons live in /usr/libexec. On some
|
||||
! systems, network daemons live in /usr/sbin or in /usr/etc, the
|
||||
daemons have no `in.\' prefix to their name, or there is no userid
|
||||
field in the inetd configuration file.
|
||||
.PP
|
||||
***************
|
||||
*** 158,166 ****
|
||||
.PP
|
||||
The default locations of the host access control tables are:
|
||||
.PP
|
||||
! /etc/hosts.allow
|
||||
.br
|
||||
! /etc/hosts.deny
|
||||
.SH SEE ALSO
|
||||
.na
|
||||
.nf
|
||||
--- 158,166 ----
|
||||
.PP
|
||||
The default locations of the host access control tables are:
|
||||
.PP
|
||||
! !!PREFIX!!/etc/hosts.allow
|
||||
.br
|
||||
! !!PREFIX!!/etc/hosts.deny
|
||||
.SH SEE ALSO
|
||||
.na
|
||||
.nf
|
@ -1,40 +0,0 @@
|
||||
*** tcpdchk.8.orig Tue Aug 5 10:18:09 1997
|
||||
--- tcpdchk.8 Tue Aug 5 10:18:29 1997
|
||||
***************
|
||||
*** 8,14 ****
|
||||
\fItcpdchk\fR examines your tcp wrapper configuration and reports all
|
||||
potential and real problems it can find. The program examines the
|
||||
\fItcpd\fR access control files (by default, these are
|
||||
! \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the
|
||||
entries in these files against entries in the \fIinetd\fR or \fItlid\fR
|
||||
network configuration files.
|
||||
.PP
|
||||
--- 8,14 ----
|
||||
\fItcpdchk\fR examines your tcp wrapper configuration and reports all
|
||||
potential and real problems it can find. The program examines the
|
||||
\fItcpd\fR access control files (by default, these are
|
||||
! \fI!!PREFIX!!/etc/hosts.allow\fR and \fI!!PREFIX!!/etc/hosts.deny\fR), and compares the
|
||||
entries in these files against entries in the \fIinetd\fR or \fItlid\fR
|
||||
network configuration files.
|
||||
.PP
|
||||
***************
|
||||
*** 44,52 ****
|
||||
.PP
|
||||
The default locations of the \fItcpd\fR access control tables are:
|
||||
.PP
|
||||
! /etc/hosts.allow
|
||||
.br
|
||||
! /etc/hosts.deny
|
||||
.SH SEE ALSO
|
||||
.na
|
||||
.nf
|
||||
--- 44,52 ----
|
||||
.PP
|
||||
The default locations of the \fItcpd\fR access control tables are:
|
||||
.PP
|
||||
! !!PREFIX!!/etc/hosts.allow
|
||||
.br
|
||||
! !!PREFIX!!/etc/hosts.deny
|
||||
.SH SEE ALSO
|
||||
.na
|
||||
.nf
|
@ -1,40 +0,0 @@
|
||||
*** tcpdmatch.8.orig Tue Aug 5 10:18:39 1997
|
||||
--- tcpdmatch.8 Tue Aug 5 10:18:56 1997
|
||||
***************
|
||||
*** 11,17 ****
|
||||
request for service. Examples are given below.
|
||||
.PP
|
||||
The program examines the \fItcpd\fR access control tables (default
|
||||
! \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR) and prints its
|
||||
conclusion. For maximal accuracy, it extracts additional information
|
||||
from your \fIinetd\fR or \fItlid\fR network configuration file.
|
||||
.PP
|
||||
--- 11,17 ----
|
||||
request for service. Examples are given below.
|
||||
.PP
|
||||
The program examines the \fItcpd\fR access control tables (default
|
||||
! \fI!!PREFIX!!/etc/hosts.allow\fR and \fI!!PREFIX!!/etc/hosts.deny\fR) and prints its
|
||||
conclusion. For maximal accuracy, it extracts additional information
|
||||
from your \fIinetd\fR or \fItlid\fR network configuration file.
|
||||
.PP
|
||||
***************
|
||||
*** 76,84 ****
|
||||
.PP
|
||||
The default locations of the \fItcpd\fR access control tables are:
|
||||
.PP
|
||||
! /etc/hosts.allow
|
||||
.br
|
||||
! /etc/hosts.deny
|
||||
.SH SEE ALSO
|
||||
.na
|
||||
.nf
|
||||
--- 76,84 ----
|
||||
.PP
|
||||
The default locations of the \fItcpd\fR access control tables are:
|
||||
.PP
|
||||
! !!PREFIX!!/etc/hosts.allow
|
||||
.br
|
||||
! !!PREFIX!!/etc/hosts.deny
|
||||
.SH SEE ALSO
|
||||
.na
|
||||
.nf
|
@ -1 +0,0 @@
|
||||
TCP/IP daemon wrapper package
|
@ -1,17 +0,0 @@
|
||||
With this package you can monitor and filter incoming requests for the
|
||||
SYSTAT, FINGER, FTP, TELNET, RLOGIN, RSH, EXEC, TFTP, TALK, and other
|
||||
network services.
|
||||
|
||||
The package provides tiny daemon wrapper programs that can be installed
|
||||
without any changes to existing software or to existing configuration
|
||||
files. The wrappers report the name of the client host and of the
|
||||
requested service; the wrappers do not exchange information with the
|
||||
client or server applications, and impose no overhead on the actual
|
||||
conversation between the client and server applications.
|
||||
|
||||
Optional features are: access control to restrict what systems can
|
||||
connect to what network daemons; client user name lookups with the RFC
|
||||
931 etc. protocol; additional protection against hosts that pretend to
|
||||
have someone elses host name; additional protection against hosts that
|
||||
pretend to have someone elses host address.
|
||||
|
@ -1,10 +0,0 @@
|
||||
include/tcpd.h
|
||||
libexec/tcpd
|
||||
sbin/tcpdchk
|
||||
sbin/tcpdmatch
|
||||
bin/safe_finger
|
||||
bin/try-from
|
||||
lib/libwrap.a
|
||||
lib/libwrap.so.7.6
|
||||
lib/libwrap.so
|
||||
etc/inetd.conf.wrapped.sample
|
14
security/tcp_wrapper/scripts/configure
vendored
14
security/tcp_wrapper/scripts/configure
vendored
@ -1,14 +0,0 @@
|
||||
#!/bin/sh
|
||||
#
|
||||
# $FreeBSD$
|
||||
#
|
||||
|
||||
FILES="hosts_access.3 hosts_access.5 tcpd.8 tcpdchk.8 tcpdmatch.8"
|
||||
|
||||
cd ${WRKSRC}
|
||||
|
||||
for f in $FILES; do
|
||||
mv $f $f.bak &&
|
||||
sed <$f.bak >$f s+!!PREFIX!!+$PREFIX+g
|
||||
done
|
||||
|
Loading…
Reference in New Issue
Block a user