1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-11-23 00:43:28 +00:00

tcp_wrapper has been in the base system since 4.0-RELEASE. Remove it.

This commit is contained in:
Kris Kennaway 2002-10-13 03:56:09 +00:00
parent 9427bf4fc5
commit 362faceac7
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=67939
14 changed files with 0 additions and 701 deletions

View File

@ -281,7 +281,6 @@
SUBDIR += sudo
SUBDIR += super
SUBDIR += swatch
SUBDIR += tcp_wrapper
SUBDIR += tea-total
SUBDIR += termlog
SUBDIR += tinc

View File

@ -1,40 +0,0 @@
# New ports collection makefile for: tcp_wrapper
# Date created: 27 Oct 1994
# Whom: torstenb
#
# $FreeBSD$
#
PORTNAME= tcp_wrappers
PORTVERSION= 7.6
PORTREVISION= 1
CATEGORIES= security
MASTER_SITES= ftp://ftp.porcupine.org/pub/security/
DISTNAME= ${PORTNAME}_${PORTVERSION}
MAINTAINER= torstenb@FreeBSD.org
.if exists(/usr/include/tcpd.h)
FORBIDDEN= tcp_wrappers is in the base system
.endif
INSTALLS_SHLIB= yes
ALL_TARGET= freebsd
MAN3= hosts_access.3
MAN5= hosts_access.5 hosts_options.5
MAN8= tcpd.8 tcpdchk.8 tcpdmatch.8
post-install:
@${INSTALL_DATA} ${FILESDIR}/inetd.conf.wrapped.sample ${PREFIX}/etc
update:
@cd ${FILESDIR} ; co -f $(CVSROOT)/src/etc/inetd.conf,v
@${SED} -e 's:/usr/libexec/[a-zA-Z]*:${PREFIX}/libexec/tcpd:g' \
-e 's:/usr/local/libexec/[a-zA-Z]*:${PREFIX}/libexec/tcpd:g' \
-e 's:/usr/local/sbin/[a-zA-Z]*:${PREFIX}/libexec/tcpd:g' \
< ${FILESDIR}/inetd.conf > ${FILESDIR}/inetd.conf.wrapped.sample
@${RM} -f ${FILESDIR}/inetd.conf
@${ECHO} "Now manually fixup deamon paths from the /usr/local tree."
.include <bsd.port.mk>

View File

@ -1 +0,0 @@
MD5 (tcp_wrappers_7.6.tar.gz) = e6fa25f71226d090f34de3f6b122fb5a

View File

@ -1,71 +0,0 @@
#
# Internet server configuration database
#
# @(#)inetd.conf 5.4 (Berkeley) 6/30/90
#
ftp stream tcp nowait root /usr/local/libexec/tcpd ftpd -l
telnet stream tcp nowait root /usr/local/libexec/tcpd telnetd
shell stream tcp nowait root /usr/local/libexec/tcpd rshd
login stream tcp nowait root /usr/local/libexec/tcpd rlogind
finger stream tcp nowait nobody /usr/local/libexec/tcpd fingerd -s
#exec stream tcp nowait root /usr/local/libexec/tcpd rexecd
#uucpd stream tcp nowait root /usr/local/libexec/tcpd uucpd
#nntp stream tcp nowait usenet /usr/local/libexec/tcpd nntpd
comsat dgram udp wait root /usr/local/libexec/tcpd comsat
ntalk dgram udp wait root /usr/local/libexec/tcpd ntalkd
#tftp dgram udp wait nobody /usr/local/libexec/tcpd tftpd /tftpboot
#bootps dgram udp wait root /usr/local/libexec/tcpd bootpd
#
# "Small servers" -- used to be standard on, but we're more conservative
# about things due to Internet security concerns. Only turn on what you
# need.
#
#daytime stream tcp nowait root internal
#daytime dgram udp wait root internal
#time stream tcp nowait root internal
#time dgram udp wait root internal
#echo stream tcp nowait root internal
#echo dgram udp wait root internal
#discard stream tcp nowait root internal
#discard dgram udp wait root internal
#chargen stream tcp nowait root internal
#chargen dgram udp wait root internal
#
# Kerberos authenticated services
#
#klogin stream tcp nowait root /usr/local/libexec/tcpd rlogind -k
#eklogin stream tcp nowait root /usr/local/libexec/tcpd rlogind -k -x
#kshell stream tcp nowait root /usr/local/libexec/tcpd rshd -k
#rkinit stream tcp nowait root /usr/local/libexec/tcpd rkinitd
#
# Services run ONLY on the Kerberos server
#
#krbupdate stream tcp nowait root /usr/local/libexec/tcpd registerd
#kpasswd stream tcp nowait root /usr/local/libexec/tcpd kpasswdd
#
# RPC based services (you MUST have portmapper running to use these)
#
#rstatd/1-3 dgram rpc/udp wait root /usr/local/libexec/tcpd.rstatd rpc.rstatd
#rusersd/1-2 dgram rpc/udp wait root /usr/local/libexec/tcpd.rusersd rpc.rusersd
#walld/1 dgram rpc/udp wait root /usr/local/libexec/tcpd.rwalld rpc.rwalld
#pcnfsd/1-2 dgram rpc/udp wait root /usr/local/libexec/tcpd.pcnfsd rpc.pcnfsd
#rquotad/1 dgram rpc/udp wait root /usr/local/libexec/tcpd.rquotad rpc.rquotad
#sprayd/1 dgram rpc/udp wait root /usr/local/libexec/tcpd.sprayd rpc.sprayd
#
# example entry for the optional pop3 server
#
#pop3 stream tcp nowait root /usr/local/libexec/tcpd /usr/local/libexec/popper
#
# example entry for the optional imap4 server
#
#imap4 stream tcp nowait root /usr/local/libexec/tcpd /usr/local/libexec/imapd
#
# example entry for the optional ident server
#
#ident stream tcp wait root /usr/local/libexec/tcpd /usr/local/sbin/identd -w -t120
#
# Enable the following two entries to enable samba startup from inetd
# (from the Samba documentation).
#
#netbios-ssn stream tcp nowait root /usr/local/libexec/tcpd /usr/local/sbin/smbd
#netbios-ns dgram udp wait root /usr/local/libexec/tcpd /usr/local/sbin/nmbd

View File

@ -1,319 +0,0 @@
*** Makefile.orig Fri Mar 21 12:27:21 1997
--- Makefile Wed Sep 16 17:41:52 1998
***************
*** 47,53 ****
#REAL_DAEMON_DIR=/usr/sbin
#
# BSD 4.4
! #REAL_DAEMON_DIR=/usr/libexec
#
# HP-UX SCO Unicos
#REAL_DAEMON_DIR=/etc
--- 47,53 ----
#REAL_DAEMON_DIR=/usr/sbin
#
# BSD 4.4
! REAL_DAEMON_DIR=/usr/libexec
#
# HP-UX SCO Unicos
#REAL_DAEMON_DIR=/etc
***************
*** 138,144 ****
freebsd:
@make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
! LIBS= RANLIB=ranlib ARFLAGS=rv AUX_OBJ= NETGROUP= TLI= \
EXTRA_CFLAGS=-DSYS_ERRLIST_DEFINED VSYSLOG= all
linux:
--- 138,144 ----
freebsd:
@make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
! LIBS= RANLIB=ranlib ARFLAGS=rv AUX_OBJ= NETGROUP=-DNETGROUP TLI= \
EXTRA_CFLAGS=-DSYS_ERRLIST_DEFINED VSYSLOG= all
linux:
***************
*** 391,397 ****
# the ones provided with this source distribution. The environ.c module
# implements setenv(), getenv(), and putenv().
! AUX_OBJ= setenv.o
#AUX_OBJ= environ.o
#AUX_OBJ= environ.o strcasecmp.o
--- 391,397 ----
# the ones provided with this source distribution. The environ.c module
# implements setenv(), getenv(), and putenv().
! #AUX_OBJ= setenv.o
#AUX_OBJ= environ.o
#AUX_OBJ= environ.o strcasecmp.o
***************
*** 454,460 ****
# host name aliases. Compile with -DSOLARIS_24_GETHOSTBYNAME_BUG to work
# around this. The workaround does no harm on other Solaris versions.
! BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DLIBC_CALLS_STRTOK
#BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DINET_ADDR_BUG
#BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DSOLARIS_24_GETHOSTBYNAME_BUG
--- 454,460 ----
# host name aliases. Compile with -DSOLARIS_24_GETHOSTBYNAME_BUG to work
# around this. The workaround does no harm on other Solaris versions.
! #BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DLIBC_CALLS_STRTOK
#BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DINET_ADDR_BUG
#BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DSOLARIS_24_GETHOSTBYNAME_BUG
***************
*** 472,478 ****
# If your system supports vsyslog(), comment out the following definition.
# If in doubt leave it in, it won't harm.
! VSYSLOG = -Dvsyslog=myvsyslog
# End of the system dependencies.
#################################
--- 472,478 ----
# If your system supports vsyslog(), comment out the following definition.
# If in doubt leave it in, it won't harm.
! #VSYSLOG = -Dvsyslog=myvsyslog
# End of the system dependencies.
#################################
***************
*** 491,497 ****
# Uncomment the next definition to turn on the language extensions
# (examples: allow, deny, banners, twist and spawn).
#
! #STYLE = -DPROCESS_OPTIONS # Enable language extensions.
################################################################
# Optional: Changing the default disposition of logfile records
--- 491,497 ----
# Uncomment the next definition to turn on the language extensions
# (examples: allow, deny, banners, twist and spawn).
#
! STYLE = -DPROCESS_OPTIONS # Enable language extensions.
################################################################
# Optional: Changing the default disposition of logfile records
***************
*** 514,520 ****
#
# The LOG_XXX names below are taken from the /usr/include/syslog.h file.
! FACILITY= LOG_MAIL # LOG_MAIL is what most sendmail daemons use
# The syslog priority at which successful connections are logged.
--- 514,521 ----
#
# The LOG_XXX names below are taken from the /usr/include/syslog.h file.
! #FACILITY= LOG_MAIL # LOG_MAIL is what most sendmail daemons use
! FACILITY= LOG_AUTH
# The syslog priority at which successful connections are logged.
***************
*** 590,596 ****
# look for access control information. Watch out for the quotes and
# backslashes when you make changes.
! TABLES = -DHOSTS_DENY=\"/etc/hosts.deny\" -DHOSTS_ALLOW=\"/etc/hosts.allow\"
####################################################
# Optional: dealing with host name/address conflicts
--- 591,597 ----
# look for access control information. Watch out for the quotes and
# backslashes when you make changes.
! TABLES = -DHOSTS_DENY=\"${PREFIX}/etc/hosts.deny\" -DHOSTS_ALLOW=\"${PREFIX}/etc/hosts.allow\"
####################################################
# Optional: dealing with host name/address conflicts
***************
*** 610,616 ****
# Paranoid mode implies hostname lookup. In order to disable hostname
# lookups altogether, see the next section.
! PARANOID= -DPARANOID
########################################
# Optional: turning off hostname lookups
--- 611,617 ----
# Paranoid mode implies hostname lookup. In order to disable hostname
# lookups altogether, see the next section.
! #PARANOID= -DPARANOID
########################################
# Optional: turning off hostname lookups
***************
*** 657,665 ****
# Protection against weird shells or weird make programs.
SHELL = /bin/sh
! .c.o:; $(CC) $(CFLAGS) -c $*.c
! CFLAGS = -O -DFACILITY=$(FACILITY) $(ACCESS) $(PARANOID) $(NETGROUP) \
$(BUGS) $(SYSTYPE) $(AUTH) $(UMASK) \
-DREAL_DAEMON_DIR=\"$(REAL_DAEMON_DIR)\" $(STYLE) $(KILL_OPT) \
-DSEVERITY=$(SEVERITY) -DRFC931_TIMEOUT=$(RFC931_TIMEOUT) \
--- 658,671 ----
# Protection against weird shells or weird make programs.
SHELL = /bin/sh
! PREFIX ?= /usr/local
!
! .SUFFIXES: .c .so .o
!
! .c.so:
! ${CC} -fpic -DPIC ${CFLAGS} -c ${.IMPSRC} -o ${.TARGET}
! CFLAGS += -DFACILITY=$(FACILITY) $(ACCESS) $(PARANOID) $(NETGROUP) \
$(BUGS) $(SYSTYPE) $(AUTH) $(UMASK) \
-DREAL_DAEMON_DIR=\"$(REAL_DAEMON_DIR)\" $(STYLE) $(KILL_OPT) \
-DSEVERITY=$(SEVERITY) -DRFC931_TIMEOUT=$(RFC931_TIMEOUT) \
***************
*** 684,692 ****
refuse.c tcpdchk.8 setenv.c inetcf.c inetcf.h scaffold.c \
scaffold.h tcpdmatch.8 README.NIS
! LIB = libwrap.a
- all other: config-check tcpd tcpdmatch try-from safe_finger tcpdchk
# Invalidate all object files when the compiler options (CFLAGS) have changed.
--- 690,724 ----
refuse.c tcpdchk.8 setenv.c inetcf.c inetcf.h scaffold.c \
scaffold.h tcpdmatch.8 README.NIS
! LIB = libwrap.a
! .if ${PORTOBJFORMAT} == elf
! SLIB = libwrap.so.7
! .else
! SLIB = libwrap.so.7.6
! .endif
!
! all other: config-check $(LIB) $(SLIB) tcpd tcpdmatch try-from safe_finger tcpdchk
!
! install:
! ${INSTALL} -o ${BINOWN} -g ${BINGRP} -c -m 644 \
! tcpd.h ${PREFIX}/include
! ${INSTALL} -o ${BINOWN} -g ${BINGRP} -c -m 644 \
! $(LIB) $(SLIB) ${PREFIX}/lib
! (cd ${PREFIX}/lib;ln -sf $(SLIB) `echo $(SLIB) | sed 's/\.so.*$$/.so/'`)
! ranlib ${PREFIX}/lib/$(LIB)
! ${INSTALL} -o ${BINOWN} -g ${BINGRP} -cs -m ${BINMODE} \
! tcpd ${PREFIX}/libexec
! ${INSTALL} -o ${BINOWN} -g ${BINGRP} -cs -m ${BINMODE} \
! tcpdchk tcpdmatch ${PREFIX}/sbin
! ${INSTALL} -o ${BINOWN} -g ${BINGRP} -cs -m ${BINMODE} \
! try-from safe_finger ${PREFIX}/bin
! ${INSTALL} -o ${MANOWN} -g ${MANGRP} -c -m ${MANMODE} \
! tcpd.8 tcpdchk.8 tcpdmatch.8 ${PREFIX}/man/man8
! ${INSTALL} -o ${MANOWN} -g ${MANGRP} -c -m ${MANMODE} \
! hosts_access.3 ${PREFIX}/man/man3
! ${INSTALL} -o ${MANOWN} -g ${MANGRP} -c -m ${MANMODE} \
! hosts_access.5 hosts_options.5 ${PREFIX}/man/man5
# Invalidate all object files when the compiler options (CFLAGS) have changed.
***************
*** 703,729 ****
$(AR) $(ARFLAGS) $(LIB) $(LIB_OBJ)
-$(RANLIB) $(LIB)
! tcpd: tcpd.o $(LIB)
! $(CC) $(CFLAGS) -o $@ tcpd.o $(LIB) $(LIBS)
! miscd: miscd.o $(LIB)
! $(CC) $(CFLAGS) -o $@ miscd.o $(LIB) $(LIBS)
! safe_finger: safe_finger.o $(LIB)
! $(CC) $(CFLAGS) -o $@ safe_finger.o $(LIB) $(LIBS)
TCPDMATCH_OBJ = tcpdmatch.o fakelog.o inetcf.o scaffold.o
! tcpdmatch: $(TCPDMATCH_OBJ) $(LIB)
! $(CC) $(CFLAGS) -o $@ $(TCPDMATCH_OBJ) $(LIB) $(LIBS)
! try-from: try-from.o fakelog.o $(LIB)
! $(CC) $(CFLAGS) -o $@ try-from.o fakelog.o $(LIB) $(LIBS)
TCPDCHK_OBJ = tcpdchk.o fakelog.o inetcf.o scaffold.o
! tcpdchk: $(TCPDCHK_OBJ) $(LIB)
! $(CC) $(CFLAGS) -o $@ $(TCPDCHK_OBJ) $(LIB) $(LIBS)
shar: $(KIT)
@shar $(KIT)
--- 735,770 ----
$(AR) $(ARFLAGS) $(LIB) $(LIB_OBJ)
-$(RANLIB) $(LIB)
! $(SLIB): $(LIB_OBJ:S/o$/so/g) shdata.so
! rm -f $(SLIB)
! .if ${PORTOBJFORMAT} == elf
! $(CC) -o $(SLIB) -shared -Wl,-soname,$(SLIB) $(LIB_OBJ:S/o$/so/g) shdata.so
! .else
! ld -Bshareable -o $(SLIB) $(LIB_OBJ:S/o$/so/g) shdata.so
! .endif
! ln -sf $(SLIB) `echo $(SLIB) | sed 's/\.so.*$$/.so/'`
!
! tcpd: tcpd.o $(SLIB)
! $(CC) $(CFLAGS) -o $@ tcpd.o -L. -lwrap $(LIBS)
! miscd: miscd.o $(SLIB)
! $(CC) $(CFLAGS) -o $@ miscd.o -L. -lwrap $(LIBS)
! safe_finger: safe_finger.o $(SLIB)
! $(CC) $(CFLAGS) -o $@ safe_finger.o -L. -lwrap $(LIBS)
TCPDMATCH_OBJ = tcpdmatch.o fakelog.o inetcf.o scaffold.o
! tcpdmatch: $(TCPDMATCH_OBJ) $(SLIB)
! $(CC) $(CFLAGS) -o $@ $(TCPDMATCH_OBJ) -L. -lwrap $(LIBS)
! try-from: try-from.o fakelog.o $(SLIB)
! $(CC) $(CFLAGS) -o $@ try-from.o fakelog.o -L. -lwrap $(LIBS)
TCPDCHK_OBJ = tcpdchk.o fakelog.o inetcf.o scaffold.o
! tcpdchk: $(TCPDCHK_OBJ) $(SLIB)
! $(CC) $(CFLAGS) -o $@ $(TCPDCHK_OBJ) -L. -lwrap $(LIBS)
shar: $(KIT)
@shar $(KIT)
***************
*** 739,745 ****
clean:
rm -f tcpd miscd safe_finger tcpdmatch tcpdchk try-from *.[oa] core \
! cflags
tidy: clean
chmod -R a+r .
--- 780,786 ----
clean:
rm -f tcpd miscd safe_finger tcpdmatch tcpdchk try-from *.[oa] core \
! cflags *.so $(SLIB)
tidy: clean
chmod -R a+r .
*** /dev/null Thu Jan 25 06:52:04 1996
--- shdata.c Thu Jan 25 06:54:34 1996
***************
*** 0 ****
--- 1,2 ----
+ int allow_severity;
+ int deny_severity;

View File

@ -1,19 +0,0 @@
*** hosts_access.3.orig Tue Aug 5 10:14:01 1997
--- hosts_access.3 Tue Aug 5 10:14:35 1997
***************
*** 78,84 ****
hosts_access(5), format of the access control tables.
hosts_options(5), optional extensions to the base language.
.SH FILES
! /etc/hosts.allow, /etc/hosts.deny, access control tables.
.SH BUGS
hosts_access() uses the strtok() library function. This may interfere
with other code that relies on strtok().
--- 78,84 ----
hosts_access(5), format of the access control tables.
hosts_options(5), optional extensions to the base language.
.SH FILES
! !!PREFIX!!/etc/hosts.allow, !!PREFIX!!/etc/hosts.deny, access control tables.
.SH BUGS
hosts_access() uses the strtok() library function. This may interfere
with other code that relies on strtok().

View File

@ -1,42 +0,0 @@
*** hosts_access.5.orig Tue Aug 5 10:14:41 1997
--- hosts_access.5 Tue Aug 5 10:15:08 1997
***************
*** 21,30 ****
at the first match:
.IP \(bu
Access will be granted when a (daemon,client) pair matches an entry in
! the \fI/etc/hosts.allow\fR file.
.IP \(bu
Otherwise, access will be denied when a (daemon,client) pair matches an
! entry in the \fI/etc/hosts.deny\fR file.
.IP \(bu
Otherwise, access will be granted.
.PP
--- 21,30 ----
at the first match:
.IP \(bu
Access will be granted when a (daemon,client) pair matches an entry in
! the \fI!!PREFIX!!/etc/hosts.allow\fR file.
.IP \(bu
Otherwise, access will be denied when a (daemon,client) pair matches an
! entry in the \fI!!PREFIX!!/etc/hosts.deny\fR file.
.IP \(bu
Otherwise, access will be granted.
.PP
***************
*** 268,274 ****
file:
.PP
.ne 2
! /etc/hosts.deny:
.in +3
ALL: ALL
.PP
--- 268,274 ----
file:
.PP
.ne 2
! !!PREFIX!!/etc/hosts.deny:
.in +3
ALL: ALL
.PP

View File

@ -1,86 +0,0 @@
*** tcpd.8.orig Tue Aug 5 10:15:53 1997
--- tcpd.8 Tue Aug 5 10:18:01 1997
***************
*** 88,99 ****
.sp
.in +5
# mkdir /other/place
! # mv /usr/etc/in.fingerd /other/place
! # cp tcpd /usr/etc/in.fingerd
.fi
.PP
! The example assumes that the network daemons live in /usr/etc. On some
! systems, network daemons live in /usr/sbin or in /usr/libexec, or have
no `in.\' prefix to their name.
.SH EXAMPLE 2
This example applies when \fItcpd\fR expects that the network daemons
--- 88,99 ----
.sp
.in +5
# mkdir /other/place
! # mv /usr/libexec/fingerd /other/place
! # cp tcpd /usr/libexec/fingerd
.fi
.PP
! The example assumes that the network daemons live in /usr/libexec. On some
! systems, network daemons live in /usr/sbin or in /usr/etc, or have
no `in.\' prefix to their name.
.SH EXAMPLE 2
This example applies when \fItcpd\fR expects that the network daemons
***************
*** 105,111 ****
.nf
.sp
.ti +5
! finger stream tcp nowait nobody /usr/etc/in.fingerd in.fingerd
.sp
becomes:
.sp
--- 105,111 ----
.nf
.sp
.ti +5
! finger stream tcp nowait nobody /usr/libexec/fingerd fingerd
.sp
becomes:
.sp
***************
*** 114,121 ****
.sp
.fi
.PP
! The example assumes that the network daemons live in /usr/etc. On some
! systems, network daemons live in /usr/sbin or in /usr/libexec, the
daemons have no `in.\' prefix to their name, or there is no userid
field in the inetd configuration file.
.PP
--- 114,121 ----
.sp
.fi
.PP
! The example assumes that the network daemons live in /usr/libexec. On some
! systems, network daemons live in /usr/sbin or in /usr/etc, the
daemons have no `in.\' prefix to their name, or there is no userid
field in the inetd configuration file.
.PP
***************
*** 158,166 ****
.PP
The default locations of the host access control tables are:
.PP
! /etc/hosts.allow
.br
! /etc/hosts.deny
.SH SEE ALSO
.na
.nf
--- 158,166 ----
.PP
The default locations of the host access control tables are:
.PP
! !!PREFIX!!/etc/hosts.allow
.br
! !!PREFIX!!/etc/hosts.deny
.SH SEE ALSO
.na
.nf

View File

@ -1,40 +0,0 @@
*** tcpdchk.8.orig Tue Aug 5 10:18:09 1997
--- tcpdchk.8 Tue Aug 5 10:18:29 1997
***************
*** 8,14 ****
\fItcpdchk\fR examines your tcp wrapper configuration and reports all
potential and real problems it can find. The program examines the
\fItcpd\fR access control files (by default, these are
! \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the
entries in these files against entries in the \fIinetd\fR or \fItlid\fR
network configuration files.
.PP
--- 8,14 ----
\fItcpdchk\fR examines your tcp wrapper configuration and reports all
potential and real problems it can find. The program examines the
\fItcpd\fR access control files (by default, these are
! \fI!!PREFIX!!/etc/hosts.allow\fR and \fI!!PREFIX!!/etc/hosts.deny\fR), and compares the
entries in these files against entries in the \fIinetd\fR or \fItlid\fR
network configuration files.
.PP
***************
*** 44,52 ****
.PP
The default locations of the \fItcpd\fR access control tables are:
.PP
! /etc/hosts.allow
.br
! /etc/hosts.deny
.SH SEE ALSO
.na
.nf
--- 44,52 ----
.PP
The default locations of the \fItcpd\fR access control tables are:
.PP
! !!PREFIX!!/etc/hosts.allow
.br
! !!PREFIX!!/etc/hosts.deny
.SH SEE ALSO
.na
.nf

View File

@ -1,40 +0,0 @@
*** tcpdmatch.8.orig Tue Aug 5 10:18:39 1997
--- tcpdmatch.8 Tue Aug 5 10:18:56 1997
***************
*** 11,17 ****
request for service. Examples are given below.
.PP
The program examines the \fItcpd\fR access control tables (default
! \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR) and prints its
conclusion. For maximal accuracy, it extracts additional information
from your \fIinetd\fR or \fItlid\fR network configuration file.
.PP
--- 11,17 ----
request for service. Examples are given below.
.PP
The program examines the \fItcpd\fR access control tables (default
! \fI!!PREFIX!!/etc/hosts.allow\fR and \fI!!PREFIX!!/etc/hosts.deny\fR) and prints its
conclusion. For maximal accuracy, it extracts additional information
from your \fIinetd\fR or \fItlid\fR network configuration file.
.PP
***************
*** 76,84 ****
.PP
The default locations of the \fItcpd\fR access control tables are:
.PP
! /etc/hosts.allow
.br
! /etc/hosts.deny
.SH SEE ALSO
.na
.nf
--- 76,84 ----
.PP
The default locations of the \fItcpd\fR access control tables are:
.PP
! !!PREFIX!!/etc/hosts.allow
.br
! !!PREFIX!!/etc/hosts.deny
.SH SEE ALSO
.na
.nf

View File

@ -1 +0,0 @@
TCP/IP daemon wrapper package

View File

@ -1,17 +0,0 @@
With this package you can monitor and filter incoming requests for the
SYSTAT, FINGER, FTP, TELNET, RLOGIN, RSH, EXEC, TFTP, TALK, and other
network services.
The package provides tiny daemon wrapper programs that can be installed
without any changes to existing software or to existing configuration
files. The wrappers report the name of the client host and of the
requested service; the wrappers do not exchange information with the
client or server applications, and impose no overhead on the actual
conversation between the client and server applications.
Optional features are: access control to restrict what systems can
connect to what network daemons; client user name lookups with the RFC
931 etc. protocol; additional protection against hosts that pretend to
have someone elses host name; additional protection against hosts that
pretend to have someone elses host address.

View File

@ -1,10 +0,0 @@
include/tcpd.h
libexec/tcpd
sbin/tcpdchk
sbin/tcpdmatch
bin/safe_finger
bin/try-from
lib/libwrap.a
lib/libwrap.so.7.6
lib/libwrap.so
etc/inetd.conf.wrapped.sample

View File

@ -1,14 +0,0 @@
#!/bin/sh
#
# $FreeBSD$
#
FILES="hosts_access.3 hosts_access.5 tcpd.8 tcpdchk.8 tcpdmatch.8"
cd ${WRKSRC}
for f in $FILES; do
mv $f $f.bak &&
sed <$f.bak >$f s+!!PREFIX!!+$PREFIX+g
done