aboutsummaryrefslogtreecommitdiff
path: root/security/tcp_wrapper
diff options
context:
space:
mode:
authorTorsten Blum <torstenb@FreeBSD.org>1997-08-05 08:36:01 +0000
committerTorsten Blum <torstenb@FreeBSD.org>1997-08-05 08:36:01 +0000
commit8698aa65cfe4d6e350c519245df527eba949c2e5 (patch)
tree97f65b6b092bb7576de9b3fd15f405c8c42554ce /security/tcp_wrapper
parentab99236e2ceb2efff73277c9d060e43a58d10cd6 (diff)
downloadports-8698aa65cfe4d6e350c519245df527eba949c2e5.tar.gz
ports-8698aa65cfe4d6e350c519245df527eba949c2e5.zip
Notes
Diffstat (limited to 'security/tcp_wrapper')
-rw-r--r--security/tcp_wrapper/files/patch-ab19
-rw-r--r--security/tcp_wrapper/files/patch-ac42
-rw-r--r--security/tcp_wrapper/files/patch-ad86
-rw-r--r--security/tcp_wrapper/files/patch-ae40
-rw-r--r--security/tcp_wrapper/files/patch-af40
-rw-r--r--security/tcp_wrapper/scripts/configure14
6 files changed, 241 insertions, 0 deletions
diff --git a/security/tcp_wrapper/files/patch-ab b/security/tcp_wrapper/files/patch-ab
new file mode 100644
index 000000000000..53c21fb50165
--- /dev/null
+++ b/security/tcp_wrapper/files/patch-ab
@@ -0,0 +1,19 @@
+*** hosts_access.3.orig Tue Aug 5 10:14:01 1997
+--- hosts_access.3 Tue Aug 5 10:14:35 1997
+***************
+*** 78,84 ****
+ hosts_access(5), format of the access control tables.
+ hosts_options(5), optional extensions to the base language.
+ .SH FILES
+! /etc/hosts.allow, /etc/hosts.deny, access control tables.
+ .SH BUGS
+ hosts_access() uses the strtok() library function. This may interfere
+ with other code that relies on strtok().
+--- 78,84 ----
+ hosts_access(5), format of the access control tables.
+ hosts_options(5), optional extensions to the base language.
+ .SH FILES
+! !!PREFIX!!/etc/hosts.allow, !!PREFIX!!/etc/hosts.deny, access control tables.
+ .SH BUGS
+ hosts_access() uses the strtok() library function. This may interfere
+ with other code that relies on strtok().
diff --git a/security/tcp_wrapper/files/patch-ac b/security/tcp_wrapper/files/patch-ac
new file mode 100644
index 000000000000..b784180c8252
--- /dev/null
+++ b/security/tcp_wrapper/files/patch-ac
@@ -0,0 +1,42 @@
+*** hosts_access.5.orig Tue Aug 5 10:14:41 1997
+--- hosts_access.5 Tue Aug 5 10:15:08 1997
+***************
+*** 21,30 ****
+ at the first match:
+ .IP \(bu
+ Access will be granted when a (daemon,client) pair matches an entry in
+! the \fI/etc/hosts.allow\fR file.
+ .IP \(bu
+ Otherwise, access will be denied when a (daemon,client) pair matches an
+! entry in the \fI/etc/hosts.deny\fR file.
+ .IP \(bu
+ Otherwise, access will be granted.
+ .PP
+--- 21,30 ----
+ at the first match:
+ .IP \(bu
+ Access will be granted when a (daemon,client) pair matches an entry in
+! the \fI!!PREFIX!!/etc/hosts.allow\fR file.
+ .IP \(bu
+ Otherwise, access will be denied when a (daemon,client) pair matches an
+! entry in the \fI!!PREFIX!!/etc/hosts.deny\fR file.
+ .IP \(bu
+ Otherwise, access will be granted.
+ .PP
+***************
+*** 268,274 ****
+ file:
+ .PP
+ .ne 2
+! /etc/hosts.deny:
+ .in +3
+ ALL: ALL
+ .PP
+--- 268,274 ----
+ file:
+ .PP
+ .ne 2
+! !!PREFIX!!/etc/hosts.deny:
+ .in +3
+ ALL: ALL
+ .PP
diff --git a/security/tcp_wrapper/files/patch-ad b/security/tcp_wrapper/files/patch-ad
new file mode 100644
index 000000000000..734c123f68f5
--- /dev/null
+++ b/security/tcp_wrapper/files/patch-ad
@@ -0,0 +1,86 @@
+*** tcpd.8.orig Tue Aug 5 10:15:53 1997
+--- tcpd.8 Tue Aug 5 10:18:01 1997
+***************
+*** 88,99 ****
+ .sp
+ .in +5
+ # mkdir /other/place
+! # mv /usr/etc/in.fingerd /other/place
+! # cp tcpd /usr/etc/in.fingerd
+ .fi
+ .PP
+! The example assumes that the network daemons live in /usr/etc. On some
+! systems, network daemons live in /usr/sbin or in /usr/libexec, or have
+ no `in.\' prefix to their name.
+ .SH EXAMPLE 2
+ This example applies when \fItcpd\fR expects that the network daemons
+--- 88,99 ----
+ .sp
+ .in +5
+ # mkdir /other/place
+! # mv /usr/libexec/fingerd /other/place
+! # cp tcpd /usr/libexec/fingerd
+ .fi
+ .PP
+! The example assumes that the network daemons live in /usr/libexec. On some
+! systems, network daemons live in /usr/sbin or in /usr/etc, or have
+ no `in.\' prefix to their name.
+ .SH EXAMPLE 2
+ This example applies when \fItcpd\fR expects that the network daemons
+***************
+*** 105,111 ****
+ .nf
+ .sp
+ .ti +5
+! finger stream tcp nowait nobody /usr/etc/in.fingerd in.fingerd
+ .sp
+ becomes:
+ .sp
+--- 105,111 ----
+ .nf
+ .sp
+ .ti +5
+! finger stream tcp nowait nobody /usr/libexec/fingerd fingerd
+ .sp
+ becomes:
+ .sp
+***************
+*** 114,121 ****
+ .sp
+ .fi
+ .PP
+! The example assumes that the network daemons live in /usr/etc. On some
+! systems, network daemons live in /usr/sbin or in /usr/libexec, the
+ daemons have no `in.\' prefix to their name, or there is no userid
+ field in the inetd configuration file.
+ .PP
+--- 114,121 ----
+ .sp
+ .fi
+ .PP
+! The example assumes that the network daemons live in /usr/libexec. On some
+! systems, network daemons live in /usr/sbin or in /usr/etc, the
+ daemons have no `in.\' prefix to their name, or there is no userid
+ field in the inetd configuration file.
+ .PP
+***************
+*** 158,166 ****
+ .PP
+ The default locations of the host access control tables are:
+ .PP
+! /etc/hosts.allow
+ .br
+! /etc/hosts.deny
+ .SH SEE ALSO
+ .na
+ .nf
+--- 158,166 ----
+ .PP
+ The default locations of the host access control tables are:
+ .PP
+! !!PREFIX!!/etc/hosts.allow
+ .br
+! !!PREFIX!!/etc/hosts.deny
+ .SH SEE ALSO
+ .na
+ .nf
diff --git a/security/tcp_wrapper/files/patch-ae b/security/tcp_wrapper/files/patch-ae
new file mode 100644
index 000000000000..c1c87e528bf3
--- /dev/null
+++ b/security/tcp_wrapper/files/patch-ae
@@ -0,0 +1,40 @@
+*** tcpdchk.8.orig Tue Aug 5 10:18:09 1997
+--- tcpdchk.8 Tue Aug 5 10:18:29 1997
+***************
+*** 8,14 ****
+ \fItcpdchk\fR examines your tcp wrapper configuration and reports all
+ potential and real problems it can find. The program examines the
+ \fItcpd\fR access control files (by default, these are
+! \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the
+ entries in these files against entries in the \fIinetd\fR or \fItlid\fR
+ network configuration files.
+ .PP
+--- 8,14 ----
+ \fItcpdchk\fR examines your tcp wrapper configuration and reports all
+ potential and real problems it can find. The program examines the
+ \fItcpd\fR access control files (by default, these are
+! \fI!!PREFIX!!/etc/hosts.allow\fR and \fI!!PREFIX!!/etc/hosts.deny\fR), and compares the
+ entries in these files against entries in the \fIinetd\fR or \fItlid\fR
+ network configuration files.
+ .PP
+***************
+*** 44,52 ****
+ .PP
+ The default locations of the \fItcpd\fR access control tables are:
+ .PP
+! /etc/hosts.allow
+ .br
+! /etc/hosts.deny
+ .SH SEE ALSO
+ .na
+ .nf
+--- 44,52 ----
+ .PP
+ The default locations of the \fItcpd\fR access control tables are:
+ .PP
+! !!PREFIX!!/etc/hosts.allow
+ .br
+! !!PREFIX!!/etc/hosts.deny
+ .SH SEE ALSO
+ .na
+ .nf
diff --git a/security/tcp_wrapper/files/patch-af b/security/tcp_wrapper/files/patch-af
new file mode 100644
index 000000000000..0362d41aff80
--- /dev/null
+++ b/security/tcp_wrapper/files/patch-af
@@ -0,0 +1,40 @@
+*** tcpdmatch.8.orig Tue Aug 5 10:18:39 1997
+--- tcpdmatch.8 Tue Aug 5 10:18:56 1997
+***************
+*** 11,17 ****
+ request for service. Examples are given below.
+ .PP
+ The program examines the \fItcpd\fR access control tables (default
+! \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR) and prints its
+ conclusion. For maximal accuracy, it extracts additional information
+ from your \fIinetd\fR or \fItlid\fR network configuration file.
+ .PP
+--- 11,17 ----
+ request for service. Examples are given below.
+ .PP
+ The program examines the \fItcpd\fR access control tables (default
+! \fI!!PREFIX!!/etc/hosts.allow\fR and \fI!!PREFIXX!!/etc/hosts.deny\fR) and prints its
+ conclusion. For maximal accuracy, it extracts additional information
+ from your \fIinetd\fR or \fItlid\fR network configuration file.
+ .PP
+***************
+*** 76,84 ****
+ .PP
+ The default locations of the \fItcpd\fR access control tables are:
+ .PP
+! /etc/hosts.allow
+ .br
+! /etc/hosts.deny
+ .SH SEE ALSO
+ .na
+ .nf
+--- 76,84 ----
+ .PP
+ The default locations of the \fItcpd\fR access control tables are:
+ .PP
+! !!PREFIX!!/etc/hosts.allow
+ .br
+! !!PREFIX!!/etc/hosts.deny
+ .SH SEE ALSO
+ .na
+ .nf
diff --git a/security/tcp_wrapper/scripts/configure b/security/tcp_wrapper/scripts/configure
new file mode 100644
index 000000000000..cf7ffc8bdf27
--- /dev/null
+++ b/security/tcp_wrapper/scripts/configure
@@ -0,0 +1,14 @@
+#!/bin/sh
+#
+# $Id$
+#
+
+FILES="hosts_access.3 hosts_access.5 tcpd.8 tcpdchk.8 tcpdmatch.8"
+
+cd ${WRKSRC}
+
+for f in $FILES; do
+ mv $f $f.bak &&
+ sed <$f.bak >$f s+!!PREFIX!!+$PREFIX+g
+done
+