diff options
author | Torsten Blum <torstenb@FreeBSD.org> | 1997-08-05 08:36:01 +0000 |
---|---|---|
committer | Torsten Blum <torstenb@FreeBSD.org> | 1997-08-05 08:36:01 +0000 |
commit | 8698aa65cfe4d6e350c519245df527eba949c2e5 (patch) | |
tree | 97f65b6b092bb7576de9b3fd15f405c8c42554ce /security/tcp_wrapper | |
parent | ab99236e2ceb2efff73277c9d060e43a58d10cd6 (diff) | |
download | ports-8698aa65cfe4d6e350c519245df527eba949c2e5.tar.gz ports-8698aa65cfe4d6e350c519245df527eba949c2e5.zip |
Notes
Diffstat (limited to 'security/tcp_wrapper')
-rw-r--r-- | security/tcp_wrapper/files/patch-ab | 19 | ||||
-rw-r--r-- | security/tcp_wrapper/files/patch-ac | 42 | ||||
-rw-r--r-- | security/tcp_wrapper/files/patch-ad | 86 | ||||
-rw-r--r-- | security/tcp_wrapper/files/patch-ae | 40 | ||||
-rw-r--r-- | security/tcp_wrapper/files/patch-af | 40 | ||||
-rw-r--r-- | security/tcp_wrapper/scripts/configure | 14 |
6 files changed, 241 insertions, 0 deletions
diff --git a/security/tcp_wrapper/files/patch-ab b/security/tcp_wrapper/files/patch-ab new file mode 100644 index 000000000000..53c21fb50165 --- /dev/null +++ b/security/tcp_wrapper/files/patch-ab @@ -0,0 +1,19 @@ +*** hosts_access.3.orig Tue Aug 5 10:14:01 1997 +--- hosts_access.3 Tue Aug 5 10:14:35 1997 +*************** +*** 78,84 **** + hosts_access(5), format of the access control tables. + hosts_options(5), optional extensions to the base language. + .SH FILES +! /etc/hosts.allow, /etc/hosts.deny, access control tables. + .SH BUGS + hosts_access() uses the strtok() library function. This may interfere + with other code that relies on strtok(). +--- 78,84 ---- + hosts_access(5), format of the access control tables. + hosts_options(5), optional extensions to the base language. + .SH FILES +! !!PREFIX!!/etc/hosts.allow, !!PREFIX!!/etc/hosts.deny, access control tables. + .SH BUGS + hosts_access() uses the strtok() library function. This may interfere + with other code that relies on strtok(). diff --git a/security/tcp_wrapper/files/patch-ac b/security/tcp_wrapper/files/patch-ac new file mode 100644 index 000000000000..b784180c8252 --- /dev/null +++ b/security/tcp_wrapper/files/patch-ac @@ -0,0 +1,42 @@ +*** hosts_access.5.orig Tue Aug 5 10:14:41 1997 +--- hosts_access.5 Tue Aug 5 10:15:08 1997 +*************** +*** 21,30 **** + at the first match: + .IP \(bu + Access will be granted when a (daemon,client) pair matches an entry in +! the \fI/etc/hosts.allow\fR file. + .IP \(bu + Otherwise, access will be denied when a (daemon,client) pair matches an +! entry in the \fI/etc/hosts.deny\fR file. + .IP \(bu + Otherwise, access will be granted. + .PP +--- 21,30 ---- + at the first match: + .IP \(bu + Access will be granted when a (daemon,client) pair matches an entry in +! the \fI!!PREFIX!!/etc/hosts.allow\fR file. + .IP \(bu + Otherwise, access will be denied when a (daemon,client) pair matches an +! entry in the \fI!!PREFIX!!/etc/hosts.deny\fR file. + .IP \(bu + Otherwise, access will be granted. + .PP +*************** +*** 268,274 **** + file: + .PP + .ne 2 +! /etc/hosts.deny: + .in +3 + ALL: ALL + .PP +--- 268,274 ---- + file: + .PP + .ne 2 +! !!PREFIX!!/etc/hosts.deny: + .in +3 + ALL: ALL + .PP diff --git a/security/tcp_wrapper/files/patch-ad b/security/tcp_wrapper/files/patch-ad new file mode 100644 index 000000000000..734c123f68f5 --- /dev/null +++ b/security/tcp_wrapper/files/patch-ad @@ -0,0 +1,86 @@ +*** tcpd.8.orig Tue Aug 5 10:15:53 1997 +--- tcpd.8 Tue Aug 5 10:18:01 1997 +*************** +*** 88,99 **** + .sp + .in +5 + # mkdir /other/place +! # mv /usr/etc/in.fingerd /other/place +! # cp tcpd /usr/etc/in.fingerd + .fi + .PP +! The example assumes that the network daemons live in /usr/etc. On some +! systems, network daemons live in /usr/sbin or in /usr/libexec, or have + no `in.\' prefix to their name. + .SH EXAMPLE 2 + This example applies when \fItcpd\fR expects that the network daemons +--- 88,99 ---- + .sp + .in +5 + # mkdir /other/place +! # mv /usr/libexec/fingerd /other/place +! # cp tcpd /usr/libexec/fingerd + .fi + .PP +! The example assumes that the network daemons live in /usr/libexec. On some +! systems, network daemons live in /usr/sbin or in /usr/etc, or have + no `in.\' prefix to their name. + .SH EXAMPLE 2 + This example applies when \fItcpd\fR expects that the network daemons +*************** +*** 105,111 **** + .nf + .sp + .ti +5 +! finger stream tcp nowait nobody /usr/etc/in.fingerd in.fingerd + .sp + becomes: + .sp +--- 105,111 ---- + .nf + .sp + .ti +5 +! finger stream tcp nowait nobody /usr/libexec/fingerd fingerd + .sp + becomes: + .sp +*************** +*** 114,121 **** + .sp + .fi + .PP +! The example assumes that the network daemons live in /usr/etc. On some +! systems, network daemons live in /usr/sbin or in /usr/libexec, the + daemons have no `in.\' prefix to their name, or there is no userid + field in the inetd configuration file. + .PP +--- 114,121 ---- + .sp + .fi + .PP +! The example assumes that the network daemons live in /usr/libexec. On some +! systems, network daemons live in /usr/sbin or in /usr/etc, the + daemons have no `in.\' prefix to their name, or there is no userid + field in the inetd configuration file. + .PP +*************** +*** 158,166 **** + .PP + The default locations of the host access control tables are: + .PP +! /etc/hosts.allow + .br +! /etc/hosts.deny + .SH SEE ALSO + .na + .nf +--- 158,166 ---- + .PP + The default locations of the host access control tables are: + .PP +! !!PREFIX!!/etc/hosts.allow + .br +! !!PREFIX!!/etc/hosts.deny + .SH SEE ALSO + .na + .nf diff --git a/security/tcp_wrapper/files/patch-ae b/security/tcp_wrapper/files/patch-ae new file mode 100644 index 000000000000..c1c87e528bf3 --- /dev/null +++ b/security/tcp_wrapper/files/patch-ae @@ -0,0 +1,40 @@ +*** tcpdchk.8.orig Tue Aug 5 10:18:09 1997 +--- tcpdchk.8 Tue Aug 5 10:18:29 1997 +*************** +*** 8,14 **** + \fItcpdchk\fR examines your tcp wrapper configuration and reports all + potential and real problems it can find. The program examines the + \fItcpd\fR access control files (by default, these are +! \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the + entries in these files against entries in the \fIinetd\fR or \fItlid\fR + network configuration files. + .PP +--- 8,14 ---- + \fItcpdchk\fR examines your tcp wrapper configuration and reports all + potential and real problems it can find. The program examines the + \fItcpd\fR access control files (by default, these are +! \fI!!PREFIX!!/etc/hosts.allow\fR and \fI!!PREFIX!!/etc/hosts.deny\fR), and compares the + entries in these files against entries in the \fIinetd\fR or \fItlid\fR + network configuration files. + .PP +*************** +*** 44,52 **** + .PP + The default locations of the \fItcpd\fR access control tables are: + .PP +! /etc/hosts.allow + .br +! /etc/hosts.deny + .SH SEE ALSO + .na + .nf +--- 44,52 ---- + .PP + The default locations of the \fItcpd\fR access control tables are: + .PP +! !!PREFIX!!/etc/hosts.allow + .br +! !!PREFIX!!/etc/hosts.deny + .SH SEE ALSO + .na + .nf diff --git a/security/tcp_wrapper/files/patch-af b/security/tcp_wrapper/files/patch-af new file mode 100644 index 000000000000..0362d41aff80 --- /dev/null +++ b/security/tcp_wrapper/files/patch-af @@ -0,0 +1,40 @@ +*** tcpdmatch.8.orig Tue Aug 5 10:18:39 1997 +--- tcpdmatch.8 Tue Aug 5 10:18:56 1997 +*************** +*** 11,17 **** + request for service. Examples are given below. + .PP + The program examines the \fItcpd\fR access control tables (default +! \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR) and prints its + conclusion. For maximal accuracy, it extracts additional information + from your \fIinetd\fR or \fItlid\fR network configuration file. + .PP +--- 11,17 ---- + request for service. Examples are given below. + .PP + The program examines the \fItcpd\fR access control tables (default +! \fI!!PREFIX!!/etc/hosts.allow\fR and \fI!!PREFIXX!!/etc/hosts.deny\fR) and prints its + conclusion. For maximal accuracy, it extracts additional information + from your \fIinetd\fR or \fItlid\fR network configuration file. + .PP +*************** +*** 76,84 **** + .PP + The default locations of the \fItcpd\fR access control tables are: + .PP +! /etc/hosts.allow + .br +! /etc/hosts.deny + .SH SEE ALSO + .na + .nf +--- 76,84 ---- + .PP + The default locations of the \fItcpd\fR access control tables are: + .PP +! !!PREFIX!!/etc/hosts.allow + .br +! !!PREFIX!!/etc/hosts.deny + .SH SEE ALSO + .na + .nf diff --git a/security/tcp_wrapper/scripts/configure b/security/tcp_wrapper/scripts/configure new file mode 100644 index 000000000000..cf7ffc8bdf27 --- /dev/null +++ b/security/tcp_wrapper/scripts/configure @@ -0,0 +1,14 @@ +#!/bin/sh +# +# $Id$ +# + +FILES="hosts_access.3 hosts_access.5 tcpd.8 tcpdchk.8 tcpdmatch.8" + +cd ${WRKSRC} + +for f in $FILES; do + mv $f $f.bak && + sed <$f.bak >$f s+!!PREFIX!!+$PREFIX+g +done + |