mirror of
https://git.FreeBSD.org/ports.git
synced 2025-01-11 07:22:22 +00:00
/etc/hosts.{allow,deny} -> $PREFIX/etc/hosts.{allow,deny}
This commit is contained in:
parent
ab99236e2c
commit
8698aa65cf
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=7484
19
security/tcp_wrapper/files/patch-ab
Normal file
19
security/tcp_wrapper/files/patch-ab
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
*** hosts_access.3.orig Tue Aug 5 10:14:01 1997
|
||||||
|
--- hosts_access.3 Tue Aug 5 10:14:35 1997
|
||||||
|
***************
|
||||||
|
*** 78,84 ****
|
||||||
|
hosts_access(5), format of the access control tables.
|
||||||
|
hosts_options(5), optional extensions to the base language.
|
||||||
|
.SH FILES
|
||||||
|
! /etc/hosts.allow, /etc/hosts.deny, access control tables.
|
||||||
|
.SH BUGS
|
||||||
|
hosts_access() uses the strtok() library function. This may interfere
|
||||||
|
with other code that relies on strtok().
|
||||||
|
--- 78,84 ----
|
||||||
|
hosts_access(5), format of the access control tables.
|
||||||
|
hosts_options(5), optional extensions to the base language.
|
||||||
|
.SH FILES
|
||||||
|
! !!PREFIX!!/etc/hosts.allow, !!PREFIX!!/etc/hosts.deny, access control tables.
|
||||||
|
.SH BUGS
|
||||||
|
hosts_access() uses the strtok() library function. This may interfere
|
||||||
|
with other code that relies on strtok().
|
42
security/tcp_wrapper/files/patch-ac
Normal file
42
security/tcp_wrapper/files/patch-ac
Normal file
@ -0,0 +1,42 @@
|
|||||||
|
*** hosts_access.5.orig Tue Aug 5 10:14:41 1997
|
||||||
|
--- hosts_access.5 Tue Aug 5 10:15:08 1997
|
||||||
|
***************
|
||||||
|
*** 21,30 ****
|
||||||
|
at the first match:
|
||||||
|
.IP \(bu
|
||||||
|
Access will be granted when a (daemon,client) pair matches an entry in
|
||||||
|
! the \fI/etc/hosts.allow\fR file.
|
||||||
|
.IP \(bu
|
||||||
|
Otherwise, access will be denied when a (daemon,client) pair matches an
|
||||||
|
! entry in the \fI/etc/hosts.deny\fR file.
|
||||||
|
.IP \(bu
|
||||||
|
Otherwise, access will be granted.
|
||||||
|
.PP
|
||||||
|
--- 21,30 ----
|
||||||
|
at the first match:
|
||||||
|
.IP \(bu
|
||||||
|
Access will be granted when a (daemon,client) pair matches an entry in
|
||||||
|
! the \fI!!PREFIX!!/etc/hosts.allow\fR file.
|
||||||
|
.IP \(bu
|
||||||
|
Otherwise, access will be denied when a (daemon,client) pair matches an
|
||||||
|
! entry in the \fI!!PREFIX!!/etc/hosts.deny\fR file.
|
||||||
|
.IP \(bu
|
||||||
|
Otherwise, access will be granted.
|
||||||
|
.PP
|
||||||
|
***************
|
||||||
|
*** 268,274 ****
|
||||||
|
file:
|
||||||
|
.PP
|
||||||
|
.ne 2
|
||||||
|
! /etc/hosts.deny:
|
||||||
|
.in +3
|
||||||
|
ALL: ALL
|
||||||
|
.PP
|
||||||
|
--- 268,274 ----
|
||||||
|
file:
|
||||||
|
.PP
|
||||||
|
.ne 2
|
||||||
|
! !!PREFIX!!/etc/hosts.deny:
|
||||||
|
.in +3
|
||||||
|
ALL: ALL
|
||||||
|
.PP
|
86
security/tcp_wrapper/files/patch-ad
Normal file
86
security/tcp_wrapper/files/patch-ad
Normal file
@ -0,0 +1,86 @@
|
|||||||
|
*** tcpd.8.orig Tue Aug 5 10:15:53 1997
|
||||||
|
--- tcpd.8 Tue Aug 5 10:18:01 1997
|
||||||
|
***************
|
||||||
|
*** 88,99 ****
|
||||||
|
.sp
|
||||||
|
.in +5
|
||||||
|
# mkdir /other/place
|
||||||
|
! # mv /usr/etc/in.fingerd /other/place
|
||||||
|
! # cp tcpd /usr/etc/in.fingerd
|
||||||
|
.fi
|
||||||
|
.PP
|
||||||
|
! The example assumes that the network daemons live in /usr/etc. On some
|
||||||
|
! systems, network daemons live in /usr/sbin or in /usr/libexec, or have
|
||||||
|
no `in.\' prefix to their name.
|
||||||
|
.SH EXAMPLE 2
|
||||||
|
This example applies when \fItcpd\fR expects that the network daemons
|
||||||
|
--- 88,99 ----
|
||||||
|
.sp
|
||||||
|
.in +5
|
||||||
|
# mkdir /other/place
|
||||||
|
! # mv /usr/libexec/fingerd /other/place
|
||||||
|
! # cp tcpd /usr/libexec/fingerd
|
||||||
|
.fi
|
||||||
|
.PP
|
||||||
|
! The example assumes that the network daemons live in /usr/libexec. On some
|
||||||
|
! systems, network daemons live in /usr/sbin or in /usr/etc, or have
|
||||||
|
no `in.\' prefix to their name.
|
||||||
|
.SH EXAMPLE 2
|
||||||
|
This example applies when \fItcpd\fR expects that the network daemons
|
||||||
|
***************
|
||||||
|
*** 105,111 ****
|
||||||
|
.nf
|
||||||
|
.sp
|
||||||
|
.ti +5
|
||||||
|
! finger stream tcp nowait nobody /usr/etc/in.fingerd in.fingerd
|
||||||
|
.sp
|
||||||
|
becomes:
|
||||||
|
.sp
|
||||||
|
--- 105,111 ----
|
||||||
|
.nf
|
||||||
|
.sp
|
||||||
|
.ti +5
|
||||||
|
! finger stream tcp nowait nobody /usr/libexec/fingerd fingerd
|
||||||
|
.sp
|
||||||
|
becomes:
|
||||||
|
.sp
|
||||||
|
***************
|
||||||
|
*** 114,121 ****
|
||||||
|
.sp
|
||||||
|
.fi
|
||||||
|
.PP
|
||||||
|
! The example assumes that the network daemons live in /usr/etc. On some
|
||||||
|
! systems, network daemons live in /usr/sbin or in /usr/libexec, the
|
||||||
|
daemons have no `in.\' prefix to their name, or there is no userid
|
||||||
|
field in the inetd configuration file.
|
||||||
|
.PP
|
||||||
|
--- 114,121 ----
|
||||||
|
.sp
|
||||||
|
.fi
|
||||||
|
.PP
|
||||||
|
! The example assumes that the network daemons live in /usr/libexec. On some
|
||||||
|
! systems, network daemons live in /usr/sbin or in /usr/etc, the
|
||||||
|
daemons have no `in.\' prefix to their name, or there is no userid
|
||||||
|
field in the inetd configuration file.
|
||||||
|
.PP
|
||||||
|
***************
|
||||||
|
*** 158,166 ****
|
||||||
|
.PP
|
||||||
|
The default locations of the host access control tables are:
|
||||||
|
.PP
|
||||||
|
! /etc/hosts.allow
|
||||||
|
.br
|
||||||
|
! /etc/hosts.deny
|
||||||
|
.SH SEE ALSO
|
||||||
|
.na
|
||||||
|
.nf
|
||||||
|
--- 158,166 ----
|
||||||
|
.PP
|
||||||
|
The default locations of the host access control tables are:
|
||||||
|
.PP
|
||||||
|
! !!PREFIX!!/etc/hosts.allow
|
||||||
|
.br
|
||||||
|
! !!PREFIX!!/etc/hosts.deny
|
||||||
|
.SH SEE ALSO
|
||||||
|
.na
|
||||||
|
.nf
|
40
security/tcp_wrapper/files/patch-ae
Normal file
40
security/tcp_wrapper/files/patch-ae
Normal file
@ -0,0 +1,40 @@
|
|||||||
|
*** tcpdchk.8.orig Tue Aug 5 10:18:09 1997
|
||||||
|
--- tcpdchk.8 Tue Aug 5 10:18:29 1997
|
||||||
|
***************
|
||||||
|
*** 8,14 ****
|
||||||
|
\fItcpdchk\fR examines your tcp wrapper configuration and reports all
|
||||||
|
potential and real problems it can find. The program examines the
|
||||||
|
\fItcpd\fR access control files (by default, these are
|
||||||
|
! \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the
|
||||||
|
entries in these files against entries in the \fIinetd\fR or \fItlid\fR
|
||||||
|
network configuration files.
|
||||||
|
.PP
|
||||||
|
--- 8,14 ----
|
||||||
|
\fItcpdchk\fR examines your tcp wrapper configuration and reports all
|
||||||
|
potential and real problems it can find. The program examines the
|
||||||
|
\fItcpd\fR access control files (by default, these are
|
||||||
|
! \fI!!PREFIX!!/etc/hosts.allow\fR and \fI!!PREFIX!!/etc/hosts.deny\fR), and compares the
|
||||||
|
entries in these files against entries in the \fIinetd\fR or \fItlid\fR
|
||||||
|
network configuration files.
|
||||||
|
.PP
|
||||||
|
***************
|
||||||
|
*** 44,52 ****
|
||||||
|
.PP
|
||||||
|
The default locations of the \fItcpd\fR access control tables are:
|
||||||
|
.PP
|
||||||
|
! /etc/hosts.allow
|
||||||
|
.br
|
||||||
|
! /etc/hosts.deny
|
||||||
|
.SH SEE ALSO
|
||||||
|
.na
|
||||||
|
.nf
|
||||||
|
--- 44,52 ----
|
||||||
|
.PP
|
||||||
|
The default locations of the \fItcpd\fR access control tables are:
|
||||||
|
.PP
|
||||||
|
! !!PREFIX!!/etc/hosts.allow
|
||||||
|
.br
|
||||||
|
! !!PREFIX!!/etc/hosts.deny
|
||||||
|
.SH SEE ALSO
|
||||||
|
.na
|
||||||
|
.nf
|
40
security/tcp_wrapper/files/patch-af
Normal file
40
security/tcp_wrapper/files/patch-af
Normal file
@ -0,0 +1,40 @@
|
|||||||
|
*** tcpdmatch.8.orig Tue Aug 5 10:18:39 1997
|
||||||
|
--- tcpdmatch.8 Tue Aug 5 10:18:56 1997
|
||||||
|
***************
|
||||||
|
*** 11,17 ****
|
||||||
|
request for service. Examples are given below.
|
||||||
|
.PP
|
||||||
|
The program examines the \fItcpd\fR access control tables (default
|
||||||
|
! \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR) and prints its
|
||||||
|
conclusion. For maximal accuracy, it extracts additional information
|
||||||
|
from your \fIinetd\fR or \fItlid\fR network configuration file.
|
||||||
|
.PP
|
||||||
|
--- 11,17 ----
|
||||||
|
request for service. Examples are given below.
|
||||||
|
.PP
|
||||||
|
The program examines the \fItcpd\fR access control tables (default
|
||||||
|
! \fI!!PREFIX!!/etc/hosts.allow\fR and \fI!!PREFIXX!!/etc/hosts.deny\fR) and prints its
|
||||||
|
conclusion. For maximal accuracy, it extracts additional information
|
||||||
|
from your \fIinetd\fR or \fItlid\fR network configuration file.
|
||||||
|
.PP
|
||||||
|
***************
|
||||||
|
*** 76,84 ****
|
||||||
|
.PP
|
||||||
|
The default locations of the \fItcpd\fR access control tables are:
|
||||||
|
.PP
|
||||||
|
! /etc/hosts.allow
|
||||||
|
.br
|
||||||
|
! /etc/hosts.deny
|
||||||
|
.SH SEE ALSO
|
||||||
|
.na
|
||||||
|
.nf
|
||||||
|
--- 76,84 ----
|
||||||
|
.PP
|
||||||
|
The default locations of the \fItcpd\fR access control tables are:
|
||||||
|
.PP
|
||||||
|
! !!PREFIX!!/etc/hosts.allow
|
||||||
|
.br
|
||||||
|
! !!PREFIX!!/etc/hosts.deny
|
||||||
|
.SH SEE ALSO
|
||||||
|
.na
|
||||||
|
.nf
|
14
security/tcp_wrapper/scripts/configure
vendored
Normal file
14
security/tcp_wrapper/scripts/configure
vendored
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
#!/bin/sh
|
||||||
|
#
|
||||||
|
# $Id$
|
||||||
|
#
|
||||||
|
|
||||||
|
FILES="hosts_access.3 hosts_access.5 tcpd.8 tcpdchk.8 tcpdmatch.8"
|
||||||
|
|
||||||
|
cd ${WRKSRC}
|
||||||
|
|
||||||
|
for f in $FILES; do
|
||||||
|
mv $f $f.bak &&
|
||||||
|
sed <$f.bak >$f s+!!PREFIX!!+$PREFIX+g
|
||||||
|
done
|
||||||
|
|
Loading…
Reference in New Issue
Block a user