mirror of
https://git.FreeBSD.org/ports.git
synced 2024-12-23 04:23:08 +00:00
/etc/hosts.{allow,deny} -> $PREFIX/etc/hosts.{allow,deny}
This commit is contained in:
parent
ab99236e2c
commit
8698aa65cf
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=7484
19
security/tcp_wrapper/files/patch-ab
Normal file
19
security/tcp_wrapper/files/patch-ab
Normal file
@ -0,0 +1,19 @@
|
||||
*** hosts_access.3.orig Tue Aug 5 10:14:01 1997
|
||||
--- hosts_access.3 Tue Aug 5 10:14:35 1997
|
||||
***************
|
||||
*** 78,84 ****
|
||||
hosts_access(5), format of the access control tables.
|
||||
hosts_options(5), optional extensions to the base language.
|
||||
.SH FILES
|
||||
! /etc/hosts.allow, /etc/hosts.deny, access control tables.
|
||||
.SH BUGS
|
||||
hosts_access() uses the strtok() library function. This may interfere
|
||||
with other code that relies on strtok().
|
||||
--- 78,84 ----
|
||||
hosts_access(5), format of the access control tables.
|
||||
hosts_options(5), optional extensions to the base language.
|
||||
.SH FILES
|
||||
! !!PREFIX!!/etc/hosts.allow, !!PREFIX!!/etc/hosts.deny, access control tables.
|
||||
.SH BUGS
|
||||
hosts_access() uses the strtok() library function. This may interfere
|
||||
with other code that relies on strtok().
|
42
security/tcp_wrapper/files/patch-ac
Normal file
42
security/tcp_wrapper/files/patch-ac
Normal file
@ -0,0 +1,42 @@
|
||||
*** hosts_access.5.orig Tue Aug 5 10:14:41 1997
|
||||
--- hosts_access.5 Tue Aug 5 10:15:08 1997
|
||||
***************
|
||||
*** 21,30 ****
|
||||
at the first match:
|
||||
.IP \(bu
|
||||
Access will be granted when a (daemon,client) pair matches an entry in
|
||||
! the \fI/etc/hosts.allow\fR file.
|
||||
.IP \(bu
|
||||
Otherwise, access will be denied when a (daemon,client) pair matches an
|
||||
! entry in the \fI/etc/hosts.deny\fR file.
|
||||
.IP \(bu
|
||||
Otherwise, access will be granted.
|
||||
.PP
|
||||
--- 21,30 ----
|
||||
at the first match:
|
||||
.IP \(bu
|
||||
Access will be granted when a (daemon,client) pair matches an entry in
|
||||
! the \fI!!PREFIX!!/etc/hosts.allow\fR file.
|
||||
.IP \(bu
|
||||
Otherwise, access will be denied when a (daemon,client) pair matches an
|
||||
! entry in the \fI!!PREFIX!!/etc/hosts.deny\fR file.
|
||||
.IP \(bu
|
||||
Otherwise, access will be granted.
|
||||
.PP
|
||||
***************
|
||||
*** 268,274 ****
|
||||
file:
|
||||
.PP
|
||||
.ne 2
|
||||
! /etc/hosts.deny:
|
||||
.in +3
|
||||
ALL: ALL
|
||||
.PP
|
||||
--- 268,274 ----
|
||||
file:
|
||||
.PP
|
||||
.ne 2
|
||||
! !!PREFIX!!/etc/hosts.deny:
|
||||
.in +3
|
||||
ALL: ALL
|
||||
.PP
|
86
security/tcp_wrapper/files/patch-ad
Normal file
86
security/tcp_wrapper/files/patch-ad
Normal file
@ -0,0 +1,86 @@
|
||||
*** tcpd.8.orig Tue Aug 5 10:15:53 1997
|
||||
--- tcpd.8 Tue Aug 5 10:18:01 1997
|
||||
***************
|
||||
*** 88,99 ****
|
||||
.sp
|
||||
.in +5
|
||||
# mkdir /other/place
|
||||
! # mv /usr/etc/in.fingerd /other/place
|
||||
! # cp tcpd /usr/etc/in.fingerd
|
||||
.fi
|
||||
.PP
|
||||
! The example assumes that the network daemons live in /usr/etc. On some
|
||||
! systems, network daemons live in /usr/sbin or in /usr/libexec, or have
|
||||
no `in.\' prefix to their name.
|
||||
.SH EXAMPLE 2
|
||||
This example applies when \fItcpd\fR expects that the network daemons
|
||||
--- 88,99 ----
|
||||
.sp
|
||||
.in +5
|
||||
# mkdir /other/place
|
||||
! # mv /usr/libexec/fingerd /other/place
|
||||
! # cp tcpd /usr/libexec/fingerd
|
||||
.fi
|
||||
.PP
|
||||
! The example assumes that the network daemons live in /usr/libexec. On some
|
||||
! systems, network daemons live in /usr/sbin or in /usr/etc, or have
|
||||
no `in.\' prefix to their name.
|
||||
.SH EXAMPLE 2
|
||||
This example applies when \fItcpd\fR expects that the network daemons
|
||||
***************
|
||||
*** 105,111 ****
|
||||
.nf
|
||||
.sp
|
||||
.ti +5
|
||||
! finger stream tcp nowait nobody /usr/etc/in.fingerd in.fingerd
|
||||
.sp
|
||||
becomes:
|
||||
.sp
|
||||
--- 105,111 ----
|
||||
.nf
|
||||
.sp
|
||||
.ti +5
|
||||
! finger stream tcp nowait nobody /usr/libexec/fingerd fingerd
|
||||
.sp
|
||||
becomes:
|
||||
.sp
|
||||
***************
|
||||
*** 114,121 ****
|
||||
.sp
|
||||
.fi
|
||||
.PP
|
||||
! The example assumes that the network daemons live in /usr/etc. On some
|
||||
! systems, network daemons live in /usr/sbin or in /usr/libexec, the
|
||||
daemons have no `in.\' prefix to their name, or there is no userid
|
||||
field in the inetd configuration file.
|
||||
.PP
|
||||
--- 114,121 ----
|
||||
.sp
|
||||
.fi
|
||||
.PP
|
||||
! The example assumes that the network daemons live in /usr/libexec. On some
|
||||
! systems, network daemons live in /usr/sbin or in /usr/etc, the
|
||||
daemons have no `in.\' prefix to their name, or there is no userid
|
||||
field in the inetd configuration file.
|
||||
.PP
|
||||
***************
|
||||
*** 158,166 ****
|
||||
.PP
|
||||
The default locations of the host access control tables are:
|
||||
.PP
|
||||
! /etc/hosts.allow
|
||||
.br
|
||||
! /etc/hosts.deny
|
||||
.SH SEE ALSO
|
||||
.na
|
||||
.nf
|
||||
--- 158,166 ----
|
||||
.PP
|
||||
The default locations of the host access control tables are:
|
||||
.PP
|
||||
! !!PREFIX!!/etc/hosts.allow
|
||||
.br
|
||||
! !!PREFIX!!/etc/hosts.deny
|
||||
.SH SEE ALSO
|
||||
.na
|
||||
.nf
|
40
security/tcp_wrapper/files/patch-ae
Normal file
40
security/tcp_wrapper/files/patch-ae
Normal file
@ -0,0 +1,40 @@
|
||||
*** tcpdchk.8.orig Tue Aug 5 10:18:09 1997
|
||||
--- tcpdchk.8 Tue Aug 5 10:18:29 1997
|
||||
***************
|
||||
*** 8,14 ****
|
||||
\fItcpdchk\fR examines your tcp wrapper configuration and reports all
|
||||
potential and real problems it can find. The program examines the
|
||||
\fItcpd\fR access control files (by default, these are
|
||||
! \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the
|
||||
entries in these files against entries in the \fIinetd\fR or \fItlid\fR
|
||||
network configuration files.
|
||||
.PP
|
||||
--- 8,14 ----
|
||||
\fItcpdchk\fR examines your tcp wrapper configuration and reports all
|
||||
potential and real problems it can find. The program examines the
|
||||
\fItcpd\fR access control files (by default, these are
|
||||
! \fI!!PREFIX!!/etc/hosts.allow\fR and \fI!!PREFIX!!/etc/hosts.deny\fR), and compares the
|
||||
entries in these files against entries in the \fIinetd\fR or \fItlid\fR
|
||||
network configuration files.
|
||||
.PP
|
||||
***************
|
||||
*** 44,52 ****
|
||||
.PP
|
||||
The default locations of the \fItcpd\fR access control tables are:
|
||||
.PP
|
||||
! /etc/hosts.allow
|
||||
.br
|
||||
! /etc/hosts.deny
|
||||
.SH SEE ALSO
|
||||
.na
|
||||
.nf
|
||||
--- 44,52 ----
|
||||
.PP
|
||||
The default locations of the \fItcpd\fR access control tables are:
|
||||
.PP
|
||||
! !!PREFIX!!/etc/hosts.allow
|
||||
.br
|
||||
! !!PREFIX!!/etc/hosts.deny
|
||||
.SH SEE ALSO
|
||||
.na
|
||||
.nf
|
40
security/tcp_wrapper/files/patch-af
Normal file
40
security/tcp_wrapper/files/patch-af
Normal file
@ -0,0 +1,40 @@
|
||||
*** tcpdmatch.8.orig Tue Aug 5 10:18:39 1997
|
||||
--- tcpdmatch.8 Tue Aug 5 10:18:56 1997
|
||||
***************
|
||||
*** 11,17 ****
|
||||
request for service. Examples are given below.
|
||||
.PP
|
||||
The program examines the \fItcpd\fR access control tables (default
|
||||
! \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR) and prints its
|
||||
conclusion. For maximal accuracy, it extracts additional information
|
||||
from your \fIinetd\fR or \fItlid\fR network configuration file.
|
||||
.PP
|
||||
--- 11,17 ----
|
||||
request for service. Examples are given below.
|
||||
.PP
|
||||
The program examines the \fItcpd\fR access control tables (default
|
||||
! \fI!!PREFIX!!/etc/hosts.allow\fR and \fI!!PREFIXX!!/etc/hosts.deny\fR) and prints its
|
||||
conclusion. For maximal accuracy, it extracts additional information
|
||||
from your \fIinetd\fR or \fItlid\fR network configuration file.
|
||||
.PP
|
||||
***************
|
||||
*** 76,84 ****
|
||||
.PP
|
||||
The default locations of the \fItcpd\fR access control tables are:
|
||||
.PP
|
||||
! /etc/hosts.allow
|
||||
.br
|
||||
! /etc/hosts.deny
|
||||
.SH SEE ALSO
|
||||
.na
|
||||
.nf
|
||||
--- 76,84 ----
|
||||
.PP
|
||||
The default locations of the \fItcpd\fR access control tables are:
|
||||
.PP
|
||||
! !!PREFIX!!/etc/hosts.allow
|
||||
.br
|
||||
! !!PREFIX!!/etc/hosts.deny
|
||||
.SH SEE ALSO
|
||||
.na
|
||||
.nf
|
14
security/tcp_wrapper/scripts/configure
vendored
Normal file
14
security/tcp_wrapper/scripts/configure
vendored
Normal file
@ -0,0 +1,14 @@
|
||||
#!/bin/sh
|
||||
#
|
||||
# $Id$
|
||||
#
|
||||
|
||||
FILES="hosts_access.3 hosts_access.5 tcpd.8 tcpdchk.8 tcpdmatch.8"
|
||||
|
||||
cd ${WRKSRC}
|
||||
|
||||
for f in $FILES; do
|
||||
mv $f $f.bak &&
|
||||
sed <$f.bak >$f s+!!PREFIX!!+$PREFIX+g
|
||||
done
|
||||
|
Loading…
Reference in New Issue
Block a user