1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-01-13 07:34:50 +00:00

Delete port: tac_plus

PR:		ports/13301
Submitted by:	Igor Vinokurov <igor@rtsnet.ru>
This commit is contained in:
Bill Fenner 1999-09-07 06:58:57 +00:00
parent 9938af1744
commit 94cc83be1a
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=21357
11 changed files with 0 additions and 416 deletions

View File

@ -148,7 +148,6 @@
SUBDIR += sniffit
SUBDIR += socks5
SUBDIR += sup
SUBDIR += tac_plus
SUBDIR += tcpflow
SUBDIR += tcpshow
SUBDIR += tcptrace

View File

@ -1,49 +0,0 @@
# New ports collection makefile for: tac_plus
# Version required: 2.1
# Date created: 4 Mar 1997
# Whom: Igor Vinokurov <igor@zynaps.ru>
#
# $FreeBSD$
#
DISTNAME= tac_plus.2.1
PKGNAME= tac_plus-2.1
CATEGORIES= net
MASTER_SITES= ftp://ftpeng.cisco.com/pub/tacacs/old/
EXTRACT_SUFX= .tar
MAINTAINER= igor@zynaps.ru
EXTRACT_CMD= ${TAR}
EXTRACT_BEFORE_ARGS= -xf
EXTRACT_AFTER_ARGS= # empty
ALL_TARGET= tac_plus
MAN8= tac_plus.8
EXTRA_PATCH= patch-ba
# To change the text displayed when users are prompted to enter
# a username, set appropriately TAC_CHANGE_PROMPT variable.
.if defined(TAC_CHANGE_PROMPT) && ${TAC_CHANGE_PROMPT} == YES
pre-patch:
@${CP} ${FILESDIR}/${EXTRA_PATCH} ${PATCHDIR}
.endif
do-install:
${INSTALL_PROGRAM} ${WRKSRC}/tac_plus ${PREFIX}/sbin
${INSTALL_MAN} ${WRKSRC}/tac_plus.1 ${PREFIX}/man/man8/tac_plus.8
${INSTALL_DATA} ${FILESDIR}/tac_plus.conf.example ${PREFIX}/etc/
@if [ ! -f ${PREFIX}/etc/rc.d/tac_plus.sh ]; then \
${ECHO} "Installing ${PREFIX}/etc/rc.d/tac_plus.sh startup file."; \
${ECHO} "#!/bin/sh" > ${PREFIX}/etc/rc.d/tac_plus.sh; \
${ECHO} "[ -x ${PREFIX}/sbin/tac_plus -a -f ${PREFIX}/etc/tac_plus.conf ] && ${PREFIX}/sbin/tac_plus -C ${PREFIX}/etc/tac_plus.conf && ${ECHO} -n ' tac_plus'" >> ${PREFIX}/etc/rc.d/tac_plus.sh; \
${CHMOD} 751 ${PREFIX}/etc/rc.d/tac_plus.sh; \
fi
.if !defined(NOPORTDOCS)
@${MKDIR} ${PREFIX}/share/doc/tac_plus
${INSTALL_DATA} ${WRKSRC}/users_guide ${PREFIX}/share/doc/tac_plus
.endif
pre-clean:
@${RM} -f ${PATCHDIR}/${EXTRA_PATCH}
.include <bsd.port.mk>

View File

@ -1 +0,0 @@
MD5 (tac_plus.2.1.tar) = f7263da703c509d14d26139790cc6acc

View File

@ -1,69 +0,0 @@
*** authen.c.orig Sat Jul 29 02:49:15 1995
--- authen.c Wed Jul 16 15:00:40 1997
***************
*** 209,217 ****
datap->status = TAC_PLUS_AUTHEN_STATUS_GETUSER;
if (datap->service == TAC_PLUS_AUTHEN_SVC_LOGIN) {
! prompt = "\nUser Access Verification\n\nUsername: ";
} else {
! prompt = "Username: ";
}
send_authen_reply(TAC_PLUS_AUTHEN_STATUS_GETUSER, /* status */
prompt, /* msg */
--- 209,217 ----
datap->status = TAC_PLUS_AUTHEN_STATUS_GETUSER;
if (datap->service == TAC_PLUS_AUTHEN_SVC_LOGIN) {
! prompt = "\nUser Access Verification\n\nlogin: ";
} else {
! prompt = "login: ";
}
send_authen_reply(TAC_PLUS_AUTHEN_STATUS_GETUSER, /* status */
prompt, /* msg */
*** default_fn.c.orig Sat Jul 29 02:49:18 1995
--- default_fn.c Wed Jul 16 15:00:52 1997
***************
*** 76,84 ****
/* No username. Try requesting one */
data->status = TAC_PLUS_AUTHEN_STATUS_GETUSER;
if (data->service == TAC_PLUS_AUTHEN_SVC_LOGIN) {
! prompt = "\nUser Access Verification\n\nUsername: ";
} else {
! prompt = "Username: ";
}
data->server_msg = tac_strdup(prompt);
p->state = STATE_AUTHEN_GETUSER;
--- 76,84 ----
/* No username. Try requesting one */
data->status = TAC_PLUS_AUTHEN_STATUS_GETUSER;
if (data->service == TAC_PLUS_AUTHEN_SVC_LOGIN) {
! prompt = "\nUser Access Verification\n\nlogin: ";
} else {
! prompt = "login: ";
}
data->server_msg = tac_strdup(prompt);
p->state = STATE_AUTHEN_GETUSER;
*** skey_fn.c.orig Wed Jul 16 14:38:34 1997
--- skey_fn.c Wed Jul 16 15:01:01 1997
***************
*** 104,112 ****
/* No username. Try requesting one */
data->status = TAC_PLUS_AUTHEN_STATUS_GETUSER;
if (data->service == TAC_PLUS_AUTHEN_SVC_LOGIN) {
! prompt = "\nUser Access Verification\n\nUsername: ";
} else {
! prompt = "Username: ";
}
data->server_msg = tac_strdup(prompt);
p->state = STATE_AUTHEN_GETUSER;
--- 104,112 ----
/* No username. Try requesting one */
data->status = TAC_PLUS_AUTHEN_STATUS_GETUSER;
if (data->service == TAC_PLUS_AUTHEN_SVC_LOGIN) {
! prompt = "\nUser Access Verification\n\nlogin: ";
} else {
! prompt = "login: ";
}
data->server_msg = tac_strdup(prompt);
p->state = STATE_AUTHEN_GETUSER;

View File

@ -1,71 +0,0 @@
*** Makefile.orig Sat Jul 29 02:49:20 1995
--- Makefile Mon Mar 3 17:24:49 1997
***************
*** 22,30 ****
# OSLIBS=-lsocket -lnsl
# For FreeBSD
! # OS=-DFREEBSD
# You may also need to add
! # OSLIBS=-lcrypt
# For LINUX
# OS=-DLINUX
--- 22,30 ----
# OSLIBS=-lsocket -lnsl
# For FreeBSD
! OS=-DFREEBSD
# You may also need to add
! OSLIBS=-lcrypt
# For LINUX
# OS=-DLINUX
***************
*** 40,47 ****
# FLAGS = -DTAC_PLUS_USERID=$(USERID) -DTAC_PLUS_GROUPID=$(GROUPID)
# Definitions for SKEY functionality
! # DEFINES = -DSKEY
! # LIBS = ../crimelab/skey/src/libskey.a
# INCLUDES = -I../crimelab/skey/src
DEBUG = -g
--- 40,47 ----
# FLAGS = -DTAC_PLUS_USERID=$(USERID) -DTAC_PLUS_GROUPID=$(GROUPID)
# Definitions for SKEY functionality
! DEFINES = -DSKEY
! LIBS = -lskey -lmd
# INCLUDES = -I../crimelab/skey/src
DEBUG = -g
***************
*** 50,62 ****
# possible), containing its process id. Uncomment and modify the
# following line to change this filename
! # PIDFILE = -DTAC_PLUS_PIDFILE=\"/var/run/tac_plus.pid\"
#
# End of customisable section of Makefile
#
! CFLAGS = $(DEBUG) $(DEFINES) $(INCLUDES) $(FLAGS) $(OS) $(PIDFILE)
SRCS = acct.c authen.c author.c choose_authen.c config.c do_acct.c \
do_author.c dump.c encrypt.c expire.c md5.c \
--- 50,62 ----
# possible), containing its process id. Uncomment and modify the
# following line to change this filename
! PIDFILE = -DTAC_PLUS_PIDFILE=\"/var/run/tac_plus.pid\"
#
# End of customisable section of Makefile
#
! CFLAGS += $(DEBUG) $(DEFINES) $(INCLUDES) $(FLAGS) $(OS) $(PIDFILE)
SRCS = acct.c authen.c author.c choose_authen.c config.c do_acct.c \
do_author.c dump.c encrypt.c expire.c md5.c \

View File

@ -1,28 +0,0 @@
*** skey_fn.c.orig Sat Jul 29 02:49:18 1995
--- skey_fn.c Mon Mar 3 17:33:57 1997
***************
*** 153,158 ****
--- 153,163 ----
char buf[256];
sprintf(buf, "%s\nPassword: ", skeyprompt);
data->server_msg = tac_strdup(buf);
+
+ /* We try to make it in accordance of standard FreeBSD
+ * behaviour in order to avoid surprises for user */
+ data->flags = TAC_PLUS_AUTHEN_FLAG_NOECHO;
+
data->status = TAC_PLUS_AUTHEN_STATUS_GETPASS;
p->state = STATE_AUTHEN_GETPASS;
return (0);
*** tac_plus.h.orig Sat Jul 29 02:49:19 1995
--- tac_plus.h Mon Mar 3 17:35:51 1997
***************
*** 91,96 ****
--- 91,97 ----
#ifdef FREEBSD
#define CONST_SYSERRLIST
#define STDLIB_MALLOC
+ #define NO_PWAGE
#define VOIDSIG
#endif

View File

@ -1,107 +0,0 @@
*** tac_plus.1.orig Sat Jul 29 02:49:20 1995
--- tac_plus.1 Mon Mar 3 17:34:30 1997
***************
*** 30,36 ****
authorisation and accounting.
.LP
On startup, tac_plus creates the file
! .B /etc/tac_plus.pid ,
if possible, containing its process id.
.LP
.SH ARGUMENTS and OPTIONS
--- 30,36 ----
authorisation and accounting.
.LP
On startup, tac_plus creates the file
! .B /var/run/tac_plus.pid ,
if possible, containing its process id.
.LP
.SH ARGUMENTS and OPTIONS
***************
*** 79,91 ****
.B \-d <level>
Switch on debugging and write debug output into
.B
! /tmp/var/tac_plus.log.
See the definitions of debugging flags at the bottom of tac_plus.h for
available flags and their meanings. Most flags cause extra messages
to be sent to
.B
! /tmp/var/tac_plus.log
and also to
.B
syslog.
--- 79,91 ----
.B \-d <level>
Switch on debugging and write debug output into
.B
! /var/tmp/tac_plus.log.
See the definitions of debugging flags at the bottom of tac_plus.h for
available flags and their meanings. Most flags cause extra messages
to be sent to
.B
! /var/tmp/tac_plus.log
and also to
.B
syslog.
***************
*** 177,183 ****
facility.
.nf
! local6.info /var/adm/messages
.fi
.LP
--- 177,183 ----
facility.
.nf
! local6.info /var/log/tac_plus.log
.fi
.LP
***************
*** 194,200 ****
.B /var/tmp/tac_plus.log
Contains debugging output when -d is in effect.
.TP
! .B /etc/tac_plus.pid
contains the process id of currently running daemon.
.SH BUGS
The configuration file syntax is too complex.
--- 194,200 ----
.B /var/tmp/tac_plus.log
Contains debugging output when -d is in effect.
.TP
! .B /var/run/tac_plus.pid
contains the process id of currently running daemon.
.SH BUGS
The configuration file syntax is too complex.
*** users_guide.orig Sat Jul 29 02:49:20 1995
--- users_guide Mon Mar 3 19:51:56 1997
***************
*** 996,1005 ****
and then send the daemon a SIGUSR1. This will cause it to reinitialize
itself and re-read the configuration file.
! On startup, tac_plus creates the file /etc/tac_plus.pid , if possible,
containing its process id, so something like the following should work:
! # kill -USR1 `cat /etc/tac_plus.pid`
It's a good idea to check that the daemon is still running after
sending it a SIGUSR1, since a syntactically incorrect configuration
--- 996,1005 ----
and then send the daemon a SIGUSR1. This will cause it to reinitialize
itself and re-read the configuration file.
! On startup, tac_plus creates the file /var/run/tac_plus.pid, if possible,
containing its process id, so something like the following should work:
! # kill -USR1 `cat /var/run/tac_plus.pid`
It's a good idea to check that the daemon is still running after
sending it a SIGUSR1, since a syntactically incorrect configuration

View File

@ -1,76 +0,0 @@
# /usr/local/etc/tac_plus.conf
user=fred {
name = "Fred Flintstone"
login = des mEX027bHtzTlQ
# Remember that authorization is also recursive over groups, in
# the same way that password lookups are recursive. Thus, if you
# place a user in a group, the daemon will look in the group for
# authorization parameters if it cannot find them in the user
# declaration.
member = admin
expires = "May 23 2005"
service = exec {
# When Fred starts an exec, his connection access list is 5
acl = 5
# We require this autocmd to be done at startup
autocmd = "telnet foo"
}
# All commands except telnet 131.108.13.* are denied for Fred
cmd = telnet {
# Fred can run the following telnet command
permit 131\.108\.13\.[0-9]+
deny .*
}
service = ppp protocol = ip {
# Fred can run ip over ppp only if he uses one
# of the following mandatory addresses If he supplies no
# address, the first one here will be mandated
addr=131.108.12.11
addr=131.108.12.12
addr=131.108.12.13
addr=131.108.12.14
# Fred's mandatory input access list number is 101
inacl=101
# We will suggest an output access list of 102, but Fred may
# choose to ignore or override it
optional outacl=102
}
service = slip {
# Fred can run slip. When he does, he will have to use
# these mandatory access lists
inacl=101
outacl=102
}
# set a timeout in the lcp layer of ppp
service = ppp protocol = lcp {
timeout = 10
}
}
user = wilma {
# Wilma has no password of her own, but she's a group member so
# she'll use the group password if there is one. Same for her
# password expiry date
member = admin
}
group = admin {
# group members who don't have their own password will be looked
# up in /etc/passwd
login = file /etc/passwd
# group members who have no expiry date set will use this one
expires = "Jan 1 1998"
}

View File

@ -1 +0,0 @@
A remote authentication/authorization/accounting server

View File

@ -1,8 +0,0 @@
tacacs+ services network requests for authentication
and authorization, verifies identities, grants or denies
authorizations, and logs accounting records.
WWW: http://www.cisco.com/warp/public/146/187.html
-- Igor
igor@zynaps.ru

View File

@ -1,5 +0,0 @@
sbin/tac_plus
etc/rc.d/tac_plus.sh
etc/tac_plus.conf.example
share/doc/tac_plus/users_guide
@dirrm share/doc/tac_plus