aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorkris <kris@FreeBSD.org>2002-10-13 11:56:09 +0800
committerkris <kris@FreeBSD.org>2002-10-13 11:56:09 +0800
commit7d37c01aab8e0436750ea1e2becefc65cd021d97 (patch)
treec0eecdeb6c560c4e2fee17544418d69ba7f4093f /security
parent0af12a0e5f07f2e4f3d8ff9f9ec18437a3c24df9 (diff)
downloadfreebsd-ports-gnome-7d37c01aab8e0436750ea1e2becefc65cd021d97.tar.gz
freebsd-ports-gnome-7d37c01aab8e0436750ea1e2becefc65cd021d97.tar.zst
freebsd-ports-gnome-7d37c01aab8e0436750ea1e2becefc65cd021d97.zip
tcp_wrapper has been in the base system since 4.0-RELEASE. Remove it.
Diffstat (limited to 'security')
-rw-r--r--security/Makefile1
-rw-r--r--security/tcp_wrapper/Makefile40
-rw-r--r--security/tcp_wrapper/distinfo1
-rw-r--r--security/tcp_wrapper/files/inetd.conf.wrapped.sample71
-rw-r--r--security/tcp_wrapper/files/patch-aa319
-rw-r--r--security/tcp_wrapper/files/patch-ab19
-rw-r--r--security/tcp_wrapper/files/patch-ac42
-rw-r--r--security/tcp_wrapper/files/patch-ad86
-rw-r--r--security/tcp_wrapper/files/patch-ae40
-rw-r--r--security/tcp_wrapper/files/patch-af40
-rw-r--r--security/tcp_wrapper/pkg-comment1
-rw-r--r--security/tcp_wrapper/pkg-descr17
-rw-r--r--security/tcp_wrapper/pkg-plist10
-rw-r--r--security/tcp_wrapper/scripts/configure14
14 files changed, 0 insertions, 701 deletions
diff --git a/security/Makefile b/security/Makefile
index e504a83b9535..d84015b808e7 100644
--- a/security/Makefile
+++ b/security/Makefile
@@ -281,7 +281,6 @@
SUBDIR += sudo
SUBDIR += super
SUBDIR += swatch
- SUBDIR += tcp_wrapper
SUBDIR += tea-total
SUBDIR += termlog
SUBDIR += tinc
diff --git a/security/tcp_wrapper/Makefile b/security/tcp_wrapper/Makefile
deleted file mode 100644
index 1f385c3c5d94..000000000000
--- a/security/tcp_wrapper/Makefile
+++ /dev/null
@@ -1,40 +0,0 @@
-# New ports collection makefile for: tcp_wrapper
-# Date created: 27 Oct 1994
-# Whom: torstenb
-#
-# $FreeBSD$
-#
-
-PORTNAME= tcp_wrappers
-PORTVERSION= 7.6
-PORTREVISION= 1
-CATEGORIES= security
-MASTER_SITES= ftp://ftp.porcupine.org/pub/security/
-DISTNAME= ${PORTNAME}_${PORTVERSION}
-
-MAINTAINER= torstenb@FreeBSD.org
-
-.if exists(/usr/include/tcpd.h)
-FORBIDDEN= tcp_wrappers is in the base system
-.endif
-
-INSTALLS_SHLIB= yes
-
-ALL_TARGET= freebsd
-MAN3= hosts_access.3
-MAN5= hosts_access.5 hosts_options.5
-MAN8= tcpd.8 tcpdchk.8 tcpdmatch.8
-
-post-install:
- @${INSTALL_DATA} ${FILESDIR}/inetd.conf.wrapped.sample ${PREFIX}/etc
-
-update:
- @cd ${FILESDIR} ; co -f $(CVSROOT)/src/etc/inetd.conf,v
- @${SED} -e 's:/usr/libexec/[a-zA-Z]*:${PREFIX}/libexec/tcpd:g' \
- -e 's:/usr/local/libexec/[a-zA-Z]*:${PREFIX}/libexec/tcpd:g' \
- -e 's:/usr/local/sbin/[a-zA-Z]*:${PREFIX}/libexec/tcpd:g' \
- < ${FILESDIR}/inetd.conf > ${FILESDIR}/inetd.conf.wrapped.sample
- @${RM} -f ${FILESDIR}/inetd.conf
- @${ECHO} "Now manually fixup deamon paths from the /usr/local tree."
-
-.include <bsd.port.mk>
diff --git a/security/tcp_wrapper/distinfo b/security/tcp_wrapper/distinfo
deleted file mode 100644
index 0399c012b094..000000000000
--- a/security/tcp_wrapper/distinfo
+++ /dev/null
@@ -1 +0,0 @@
-MD5 (tcp_wrappers_7.6.tar.gz) = e6fa25f71226d090f34de3f6b122fb5a
diff --git a/security/tcp_wrapper/files/inetd.conf.wrapped.sample b/security/tcp_wrapper/files/inetd.conf.wrapped.sample
deleted file mode 100644
index 05068f037815..000000000000
--- a/security/tcp_wrapper/files/inetd.conf.wrapped.sample
+++ /dev/null
@@ -1,71 +0,0 @@
-#
-# Internet server configuration database
-#
-# @(#)inetd.conf 5.4 (Berkeley) 6/30/90
-#
-ftp stream tcp nowait root /usr/local/libexec/tcpd ftpd -l
-telnet stream tcp nowait root /usr/local/libexec/tcpd telnetd
-shell stream tcp nowait root /usr/local/libexec/tcpd rshd
-login stream tcp nowait root /usr/local/libexec/tcpd rlogind
-finger stream tcp nowait nobody /usr/local/libexec/tcpd fingerd -s
-#exec stream tcp nowait root /usr/local/libexec/tcpd rexecd
-#uucpd stream tcp nowait root /usr/local/libexec/tcpd uucpd
-#nntp stream tcp nowait usenet /usr/local/libexec/tcpd nntpd
-comsat dgram udp wait root /usr/local/libexec/tcpd comsat
-ntalk dgram udp wait root /usr/local/libexec/tcpd ntalkd
-#tftp dgram udp wait nobody /usr/local/libexec/tcpd tftpd /tftpboot
-#bootps dgram udp wait root /usr/local/libexec/tcpd bootpd
-#
-# "Small servers" -- used to be standard on, but we're more conservative
-# about things due to Internet security concerns. Only turn on what you
-# need.
-#
-#daytime stream tcp nowait root internal
-#daytime dgram udp wait root internal
-#time stream tcp nowait root internal
-#time dgram udp wait root internal
-#echo stream tcp nowait root internal
-#echo dgram udp wait root internal
-#discard stream tcp nowait root internal
-#discard dgram udp wait root internal
-#chargen stream tcp nowait root internal
-#chargen dgram udp wait root internal
-#
-# Kerberos authenticated services
-#
-#klogin stream tcp nowait root /usr/local/libexec/tcpd rlogind -k
-#eklogin stream tcp nowait root /usr/local/libexec/tcpd rlogind -k -x
-#kshell stream tcp nowait root /usr/local/libexec/tcpd rshd -k
-#rkinit stream tcp nowait root /usr/local/libexec/tcpd rkinitd
-#
-# Services run ONLY on the Kerberos server
-#
-#krbupdate stream tcp nowait root /usr/local/libexec/tcpd registerd
-#kpasswd stream tcp nowait root /usr/local/libexec/tcpd kpasswdd
-#
-# RPC based services (you MUST have portmapper running to use these)
-#
-#rstatd/1-3 dgram rpc/udp wait root /usr/local/libexec/tcpd.rstatd rpc.rstatd
-#rusersd/1-2 dgram rpc/udp wait root /usr/local/libexec/tcpd.rusersd rpc.rusersd
-#walld/1 dgram rpc/udp wait root /usr/local/libexec/tcpd.rwalld rpc.rwalld
-#pcnfsd/1-2 dgram rpc/udp wait root /usr/local/libexec/tcpd.pcnfsd rpc.pcnfsd
-#rquotad/1 dgram rpc/udp wait root /usr/local/libexec/tcpd.rquotad rpc.rquotad
-#sprayd/1 dgram rpc/udp wait root /usr/local/libexec/tcpd.sprayd rpc.sprayd
-#
-# example entry for the optional pop3 server
-#
-#pop3 stream tcp nowait root /usr/local/libexec/tcpd /usr/local/libexec/popper
-#
-# example entry for the optional imap4 server
-#
-#imap4 stream tcp nowait root /usr/local/libexec/tcpd /usr/local/libexec/imapd
-#
-# example entry for the optional ident server
-#
-#ident stream tcp wait root /usr/local/libexec/tcpd /usr/local/sbin/identd -w -t120
-#
-# Enable the following two entries to enable samba startup from inetd
-# (from the Samba documentation).
-#
-#netbios-ssn stream tcp nowait root /usr/local/libexec/tcpd /usr/local/sbin/smbd
-#netbios-ns dgram udp wait root /usr/local/libexec/tcpd /usr/local/sbin/nmbd
diff --git a/security/tcp_wrapper/files/patch-aa b/security/tcp_wrapper/files/patch-aa
deleted file mode 100644
index 7ae985109ae4..000000000000
--- a/security/tcp_wrapper/files/patch-aa
+++ /dev/null
@@ -1,319 +0,0 @@
-*** Makefile.orig Fri Mar 21 12:27:21 1997
---- Makefile Wed Sep 16 17:41:52 1998
-***************
-*** 47,53 ****
- #REAL_DAEMON_DIR=/usr/sbin
- #
- # BSD 4.4
-! #REAL_DAEMON_DIR=/usr/libexec
- #
- # HP-UX SCO Unicos
- #REAL_DAEMON_DIR=/etc
---- 47,53 ----
- #REAL_DAEMON_DIR=/usr/sbin
- #
- # BSD 4.4
-! REAL_DAEMON_DIR=/usr/libexec
- #
- # HP-UX SCO Unicos
- #REAL_DAEMON_DIR=/etc
-***************
-*** 138,144 ****
-
- freebsd:
- @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
-! LIBS= RANLIB=ranlib ARFLAGS=rv AUX_OBJ= NETGROUP= TLI= \
- EXTRA_CFLAGS=-DSYS_ERRLIST_DEFINED VSYSLOG= all
-
- linux:
---- 138,144 ----
-
- freebsd:
- @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
-! LIBS= RANLIB=ranlib ARFLAGS=rv AUX_OBJ= NETGROUP=-DNETGROUP TLI= \
- EXTRA_CFLAGS=-DSYS_ERRLIST_DEFINED VSYSLOG= all
-
- linux:
-***************
-*** 391,397 ****
- # the ones provided with this source distribution. The environ.c module
- # implements setenv(), getenv(), and putenv().
-
-! AUX_OBJ= setenv.o
- #AUX_OBJ= environ.o
- #AUX_OBJ= environ.o strcasecmp.o
-
---- 391,397 ----
- # the ones provided with this source distribution. The environ.c module
- # implements setenv(), getenv(), and putenv().
-
-! #AUX_OBJ= setenv.o
- #AUX_OBJ= environ.o
- #AUX_OBJ= environ.o strcasecmp.o
-
-***************
-*** 454,460 ****
- # host name aliases. Compile with -DSOLARIS_24_GETHOSTBYNAME_BUG to work
- # around this. The workaround does no harm on other Solaris versions.
-
-! BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DLIBC_CALLS_STRTOK
- #BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DINET_ADDR_BUG
- #BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DSOLARIS_24_GETHOSTBYNAME_BUG
-
---- 454,460 ----
- # host name aliases. Compile with -DSOLARIS_24_GETHOSTBYNAME_BUG to work
- # around this. The workaround does no harm on other Solaris versions.
-
-! #BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DLIBC_CALLS_STRTOK
- #BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DINET_ADDR_BUG
- #BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DSOLARIS_24_GETHOSTBYNAME_BUG
-
-***************
-*** 472,478 ****
- # If your system supports vsyslog(), comment out the following definition.
- # If in doubt leave it in, it won't harm.
-
-! VSYSLOG = -Dvsyslog=myvsyslog
-
- # End of the system dependencies.
- #################################
---- 472,478 ----
- # If your system supports vsyslog(), comment out the following definition.
- # If in doubt leave it in, it won't harm.
-
-! #VSYSLOG = -Dvsyslog=myvsyslog
-
- # End of the system dependencies.
- #################################
-***************
-*** 491,497 ****
- # Uncomment the next definition to turn on the language extensions
- # (examples: allow, deny, banners, twist and spawn).
- #
-! #STYLE = -DPROCESS_OPTIONS # Enable language extensions.
-
- ################################################################
- # Optional: Changing the default disposition of logfile records
---- 491,497 ----
- # Uncomment the next definition to turn on the language extensions
- # (examples: allow, deny, banners, twist and spawn).
- #
-! STYLE = -DPROCESS_OPTIONS # Enable language extensions.
-
- ################################################################
- # Optional: Changing the default disposition of logfile records
-***************
-*** 514,520 ****
- #
- # The LOG_XXX names below are taken from the /usr/include/syslog.h file.
-
-! FACILITY= LOG_MAIL # LOG_MAIL is what most sendmail daemons use
-
- # The syslog priority at which successful connections are logged.
-
---- 514,521 ----
- #
- # The LOG_XXX names below are taken from the /usr/include/syslog.h file.
-
-! #FACILITY= LOG_MAIL # LOG_MAIL is what most sendmail daemons use
-! FACILITY= LOG_AUTH
-
- # The syslog priority at which successful connections are logged.
-
-***************
-*** 590,596 ****
- # look for access control information. Watch out for the quotes and
- # backslashes when you make changes.
-
-! TABLES = -DHOSTS_DENY=\"/etc/hosts.deny\" -DHOSTS_ALLOW=\"/etc/hosts.allow\"
-
- ####################################################
- # Optional: dealing with host name/address conflicts
---- 591,597 ----
- # look for access control information. Watch out for the quotes and
- # backslashes when you make changes.
-
-! TABLES = -DHOSTS_DENY=\"${PREFIX}/etc/hosts.deny\" -DHOSTS_ALLOW=\"${PREFIX}/etc/hosts.allow\"
-
- ####################################################
- # Optional: dealing with host name/address conflicts
-***************
-*** 610,616 ****
- # Paranoid mode implies hostname lookup. In order to disable hostname
- # lookups altogether, see the next section.
-
-! PARANOID= -DPARANOID
-
- ########################################
- # Optional: turning off hostname lookups
---- 611,617 ----
- # Paranoid mode implies hostname lookup. In order to disable hostname
- # lookups altogether, see the next section.
-
-! #PARANOID= -DPARANOID
-
- ########################################
- # Optional: turning off hostname lookups
-***************
-*** 657,665 ****
- # Protection against weird shells or weird make programs.
-
- SHELL = /bin/sh
-! .c.o:; $(CC) $(CFLAGS) -c $*.c
-
-! CFLAGS = -O -DFACILITY=$(FACILITY) $(ACCESS) $(PARANOID) $(NETGROUP) \
- $(BUGS) $(SYSTYPE) $(AUTH) $(UMASK) \
- -DREAL_DAEMON_DIR=\"$(REAL_DAEMON_DIR)\" $(STYLE) $(KILL_OPT) \
- -DSEVERITY=$(SEVERITY) -DRFC931_TIMEOUT=$(RFC931_TIMEOUT) \
---- 658,671 ----
- # Protection against weird shells or weird make programs.
-
- SHELL = /bin/sh
-! PREFIX ?= /usr/local
-!
-! .SUFFIXES: .c .so .o
-!
-! .c.so:
-! ${CC} -fpic -DPIC ${CFLAGS} -c ${.IMPSRC} -o ${.TARGET}
-
-! CFLAGS += -DFACILITY=$(FACILITY) $(ACCESS) $(PARANOID) $(NETGROUP) \
- $(BUGS) $(SYSTYPE) $(AUTH) $(UMASK) \
- -DREAL_DAEMON_DIR=\"$(REAL_DAEMON_DIR)\" $(STYLE) $(KILL_OPT) \
- -DSEVERITY=$(SEVERITY) -DRFC931_TIMEOUT=$(RFC931_TIMEOUT) \
-***************
-*** 684,692 ****
- refuse.c tcpdchk.8 setenv.c inetcf.c inetcf.h scaffold.c \
- scaffold.h tcpdmatch.8 README.NIS
-
-! LIB = libwrap.a
-
-- all other: config-check tcpd tcpdmatch try-from safe_finger tcpdchk
-
- # Invalidate all object files when the compiler options (CFLAGS) have changed.
-
---- 690,724 ----
- refuse.c tcpdchk.8 setenv.c inetcf.c inetcf.h scaffold.c \
- scaffold.h tcpdmatch.8 README.NIS
-
-! LIB = libwrap.a
-! .if ${PORTOBJFORMAT} == elf
-! SLIB = libwrap.so.7
-! .else
-! SLIB = libwrap.so.7.6
-! .endif
-!
-! all other: config-check $(LIB) $(SLIB) tcpd tcpdmatch try-from safe_finger tcpdchk
-!
-! install:
-! ${INSTALL} -o ${BINOWN} -g ${BINGRP} -c -m 644 \
-! tcpd.h ${PREFIX}/include
-! ${INSTALL} -o ${BINOWN} -g ${BINGRP} -c -m 644 \
-! $(LIB) $(SLIB) ${PREFIX}/lib
-! (cd ${PREFIX}/lib;ln -sf $(SLIB) `echo $(SLIB) | sed 's/\.so.*$$/.so/'`)
-! ranlib ${PREFIX}/lib/$(LIB)
-! ${INSTALL} -o ${BINOWN} -g ${BINGRP} -cs -m ${BINMODE} \
-! tcpd ${PREFIX}/libexec
-! ${INSTALL} -o ${BINOWN} -g ${BINGRP} -cs -m ${BINMODE} \
-! tcpdchk tcpdmatch ${PREFIX}/sbin
-! ${INSTALL} -o ${BINOWN} -g ${BINGRP} -cs -m ${BINMODE} \
-! try-from safe_finger ${PREFIX}/bin
-! ${INSTALL} -o ${MANOWN} -g ${MANGRP} -c -m ${MANMODE} \
-! tcpd.8 tcpdchk.8 tcpdmatch.8 ${PREFIX}/man/man8
-! ${INSTALL} -o ${MANOWN} -g ${MANGRP} -c -m ${MANMODE} \
-! hosts_access.3 ${PREFIX}/man/man3
-! ${INSTALL} -o ${MANOWN} -g ${MANGRP} -c -m ${MANMODE} \
-! hosts_access.5 hosts_options.5 ${PREFIX}/man/man5
-
-
- # Invalidate all object files when the compiler options (CFLAGS) have changed.
-
-***************
-*** 703,729 ****
- $(AR) $(ARFLAGS) $(LIB) $(LIB_OBJ)
- -$(RANLIB) $(LIB)
-
-! tcpd: tcpd.o $(LIB)
-! $(CC) $(CFLAGS) -o $@ tcpd.o $(LIB) $(LIBS)
-
-! miscd: miscd.o $(LIB)
-! $(CC) $(CFLAGS) -o $@ miscd.o $(LIB) $(LIBS)
-
-! safe_finger: safe_finger.o $(LIB)
-! $(CC) $(CFLAGS) -o $@ safe_finger.o $(LIB) $(LIBS)
-
- TCPDMATCH_OBJ = tcpdmatch.o fakelog.o inetcf.o scaffold.o
-
-! tcpdmatch: $(TCPDMATCH_OBJ) $(LIB)
-! $(CC) $(CFLAGS) -o $@ $(TCPDMATCH_OBJ) $(LIB) $(LIBS)
-
-! try-from: try-from.o fakelog.o $(LIB)
-! $(CC) $(CFLAGS) -o $@ try-from.o fakelog.o $(LIB) $(LIBS)
-
- TCPDCHK_OBJ = tcpdchk.o fakelog.o inetcf.o scaffold.o
-
-! tcpdchk: $(TCPDCHK_OBJ) $(LIB)
-! $(CC) $(CFLAGS) -o $@ $(TCPDCHK_OBJ) $(LIB) $(LIBS)
-
- shar: $(KIT)
- @shar $(KIT)
---- 735,770 ----
- $(AR) $(ARFLAGS) $(LIB) $(LIB_OBJ)
- -$(RANLIB) $(LIB)
-
-! $(SLIB): $(LIB_OBJ:S/o$/so/g) shdata.so
-! rm -f $(SLIB)
-! .if ${PORTOBJFORMAT} == elf
-! $(CC) -o $(SLIB) -shared -Wl,-soname,$(SLIB) $(LIB_OBJ:S/o$/so/g) shdata.so
-! .else
-! ld -Bshareable -o $(SLIB) $(LIB_OBJ:S/o$/so/g) shdata.so
-! .endif
-! ln -sf $(SLIB) `echo $(SLIB) | sed 's/\.so.*$$/.so/'`
-!
-! tcpd: tcpd.o $(SLIB)
-! $(CC) $(CFLAGS) -o $@ tcpd.o -L. -lwrap $(LIBS)
-
-! miscd: miscd.o $(SLIB)
-! $(CC) $(CFLAGS) -o $@ miscd.o -L. -lwrap $(LIBS)
-
-! safe_finger: safe_finger.o $(SLIB)
-! $(CC) $(CFLAGS) -o $@ safe_finger.o -L. -lwrap $(LIBS)
-
- TCPDMATCH_OBJ = tcpdmatch.o fakelog.o inetcf.o scaffold.o
-
-! tcpdmatch: $(TCPDMATCH_OBJ) $(SLIB)
-! $(CC) $(CFLAGS) -o $@ $(TCPDMATCH_OBJ) -L. -lwrap $(LIBS)
-
-! try-from: try-from.o fakelog.o $(SLIB)
-! $(CC) $(CFLAGS) -o $@ try-from.o fakelog.o -L. -lwrap $(LIBS)
-
- TCPDCHK_OBJ = tcpdchk.o fakelog.o inetcf.o scaffold.o
-
-! tcpdchk: $(TCPDCHK_OBJ) $(SLIB)
-! $(CC) $(CFLAGS) -o $@ $(TCPDCHK_OBJ) -L. -lwrap $(LIBS)
-
- shar: $(KIT)
- @shar $(KIT)
-***************
-*** 739,745 ****
-
- clean:
- rm -f tcpd miscd safe_finger tcpdmatch tcpdchk try-from *.[oa] core \
-! cflags
-
- tidy: clean
- chmod -R a+r .
---- 780,786 ----
-
- clean:
- rm -f tcpd miscd safe_finger tcpdmatch tcpdchk try-from *.[oa] core \
-! cflags *.so $(SLIB)
-
- tidy: clean
- chmod -R a+r .
-*** /dev/null Thu Jan 25 06:52:04 1996
---- shdata.c Thu Jan 25 06:54:34 1996
-***************
-*** 0 ****
---- 1,2 ----
-+ int allow_severity;
-+ int deny_severity;
diff --git a/security/tcp_wrapper/files/patch-ab b/security/tcp_wrapper/files/patch-ab
deleted file mode 100644
index 53c21fb50165..000000000000
--- a/security/tcp_wrapper/files/patch-ab
+++ /dev/null
@@ -1,19 +0,0 @@
-*** hosts_access.3.orig Tue Aug 5 10:14:01 1997
---- hosts_access.3 Tue Aug 5 10:14:35 1997
-***************
-*** 78,84 ****
- hosts_access(5), format of the access control tables.
- hosts_options(5), optional extensions to the base language.
- .SH FILES
-! /etc/hosts.allow, /etc/hosts.deny, access control tables.
- .SH BUGS
- hosts_access() uses the strtok() library function. This may interfere
- with other code that relies on strtok().
---- 78,84 ----
- hosts_access(5), format of the access control tables.
- hosts_options(5), optional extensions to the base language.
- .SH FILES
-! !!PREFIX!!/etc/hosts.allow, !!PREFIX!!/etc/hosts.deny, access control tables.
- .SH BUGS
- hosts_access() uses the strtok() library function. This may interfere
- with other code that relies on strtok().
diff --git a/security/tcp_wrapper/files/patch-ac b/security/tcp_wrapper/files/patch-ac
deleted file mode 100644
index b784180c8252..000000000000
--- a/security/tcp_wrapper/files/patch-ac
+++ /dev/null
@@ -1,42 +0,0 @@
-*** hosts_access.5.orig Tue Aug 5 10:14:41 1997
---- hosts_access.5 Tue Aug 5 10:15:08 1997
-***************
-*** 21,30 ****
- at the first match:
- .IP \(bu
- Access will be granted when a (daemon,client) pair matches an entry in
-! the \fI/etc/hosts.allow\fR file.
- .IP \(bu
- Otherwise, access will be denied when a (daemon,client) pair matches an
-! entry in the \fI/etc/hosts.deny\fR file.
- .IP \(bu
- Otherwise, access will be granted.
- .PP
---- 21,30 ----
- at the first match:
- .IP \(bu
- Access will be granted when a (daemon,client) pair matches an entry in
-! the \fI!!PREFIX!!/etc/hosts.allow\fR file.
- .IP \(bu
- Otherwise, access will be denied when a (daemon,client) pair matches an
-! entry in the \fI!!PREFIX!!/etc/hosts.deny\fR file.
- .IP \(bu
- Otherwise, access will be granted.
- .PP
-***************
-*** 268,274 ****
- file:
- .PP
- .ne 2
-! /etc/hosts.deny:
- .in +3
- ALL: ALL
- .PP
---- 268,274 ----
- file:
- .PP
- .ne 2
-! !!PREFIX!!/etc/hosts.deny:
- .in +3
- ALL: ALL
- .PP
diff --git a/security/tcp_wrapper/files/patch-ad b/security/tcp_wrapper/files/patch-ad
deleted file mode 100644
index 734c123f68f5..000000000000
--- a/security/tcp_wrapper/files/patch-ad
+++ /dev/null
@@ -1,86 +0,0 @@
-*** tcpd.8.orig Tue Aug 5 10:15:53 1997
---- tcpd.8 Tue Aug 5 10:18:01 1997
-***************
-*** 88,99 ****
- .sp
- .in +5
- # mkdir /other/place
-! # mv /usr/etc/in.fingerd /other/place
-! # cp tcpd /usr/etc/in.fingerd
- .fi
- .PP
-! The example assumes that the network daemons live in /usr/etc. On some
-! systems, network daemons live in /usr/sbin or in /usr/libexec, or have
- no `in.\' prefix to their name.
- .SH EXAMPLE 2
- This example applies when \fItcpd\fR expects that the network daemons
---- 88,99 ----
- .sp
- .in +5
- # mkdir /other/place
-! # mv /usr/libexec/fingerd /other/place
-! # cp tcpd /usr/libexec/fingerd
- .fi
- .PP
-! The example assumes that the network daemons live in /usr/libexec. On some
-! systems, network daemons live in /usr/sbin or in /usr/etc, or have
- no `in.\' prefix to their name.
- .SH EXAMPLE 2
- This example applies when \fItcpd\fR expects that the network daemons
-***************
-*** 105,111 ****
- .nf
- .sp
- .ti +5
-! finger stream tcp nowait nobody /usr/etc/in.fingerd in.fingerd
- .sp
- becomes:
- .sp
---- 105,111 ----
- .nf
- .sp
- .ti +5
-! finger stream tcp nowait nobody /usr/libexec/fingerd fingerd
- .sp
- becomes:
- .sp
-***************
-*** 114,121 ****
- .sp
- .fi
- .PP
-! The example assumes that the network daemons live in /usr/etc. On some
-! systems, network daemons live in /usr/sbin or in /usr/libexec, the
- daemons have no `in.\' prefix to their name, or there is no userid
- field in the inetd configuration file.
- .PP
---- 114,121 ----
- .sp
- .fi
- .PP
-! The example assumes that the network daemons live in /usr/libexec. On some
-! systems, network daemons live in /usr/sbin or in /usr/etc, the
- daemons have no `in.\' prefix to their name, or there is no userid
- field in the inetd configuration file.
- .PP
-***************
-*** 158,166 ****
- .PP
- The default locations of the host access control tables are:
- .PP
-! /etc/hosts.allow
- .br
-! /etc/hosts.deny
- .SH SEE ALSO
- .na
- .nf
---- 158,166 ----
- .PP
- The default locations of the host access control tables are:
- .PP
-! !!PREFIX!!/etc/hosts.allow
- .br
-! !!PREFIX!!/etc/hosts.deny
- .SH SEE ALSO
- .na
- .nf
diff --git a/security/tcp_wrapper/files/patch-ae b/security/tcp_wrapper/files/patch-ae
deleted file mode 100644
index c1c87e528bf3..000000000000
--- a/security/tcp_wrapper/files/patch-ae
+++ /dev/null
@@ -1,40 +0,0 @@
-*** tcpdchk.8.orig Tue Aug 5 10:18:09 1997
---- tcpdchk.8 Tue Aug 5 10:18:29 1997
-***************
-*** 8,14 ****
- \fItcpdchk\fR examines your tcp wrapper configuration and reports all
- potential and real problems it can find. The program examines the
- \fItcpd\fR access control files (by default, these are
-! \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the
- entries in these files against entries in the \fIinetd\fR or \fItlid\fR
- network configuration files.
- .PP
---- 8,14 ----
- \fItcpdchk\fR examines your tcp wrapper configuration and reports all
- potential and real problems it can find. The program examines the
- \fItcpd\fR access control files (by default, these are
-! \fI!!PREFIX!!/etc/hosts.allow\fR and \fI!!PREFIX!!/etc/hosts.deny\fR), and compares the
- entries in these files against entries in the \fIinetd\fR or \fItlid\fR
- network configuration files.
- .PP
-***************
-*** 44,52 ****
- .PP
- The default locations of the \fItcpd\fR access control tables are:
- .PP
-! /etc/hosts.allow
- .br
-! /etc/hosts.deny
- .SH SEE ALSO
- .na
- .nf
---- 44,52 ----
- .PP
- The default locations of the \fItcpd\fR access control tables are:
- .PP
-! !!PREFIX!!/etc/hosts.allow
- .br
-! !!PREFIX!!/etc/hosts.deny
- .SH SEE ALSO
- .na
- .nf
diff --git a/security/tcp_wrapper/files/patch-af b/security/tcp_wrapper/files/patch-af
deleted file mode 100644
index 437720f9296f..000000000000
--- a/security/tcp_wrapper/files/patch-af
+++ /dev/null
@@ -1,40 +0,0 @@
-*** tcpdmatch.8.orig Tue Aug 5 10:18:39 1997
---- tcpdmatch.8 Tue Aug 5 10:18:56 1997
-***************
-*** 11,17 ****
- request for service. Examples are given below.
- .PP
- The program examines the \fItcpd\fR access control tables (default
-! \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR) and prints its
- conclusion. For maximal accuracy, it extracts additional information
- from your \fIinetd\fR or \fItlid\fR network configuration file.
- .PP
---- 11,17 ----
- request for service. Examples are given below.
- .PP
- The program examines the \fItcpd\fR access control tables (default
-! \fI!!PREFIX!!/etc/hosts.allow\fR and \fI!!PREFIX!!/etc/hosts.deny\fR) and prints its
- conclusion. For maximal accuracy, it extracts additional information
- from your \fIinetd\fR or \fItlid\fR network configuration file.
- .PP
-***************
-*** 76,84 ****
- .PP
- The default locations of the \fItcpd\fR access control tables are:
- .PP
-! /etc/hosts.allow
- .br
-! /etc/hosts.deny
- .SH SEE ALSO
- .na
- .nf
---- 76,84 ----
- .PP
- The default locations of the \fItcpd\fR access control tables are:
- .PP
-! !!PREFIX!!/etc/hosts.allow
- .br
-! !!PREFIX!!/etc/hosts.deny
- .SH SEE ALSO
- .na
- .nf
diff --git a/security/tcp_wrapper/pkg-comment b/security/tcp_wrapper/pkg-comment
deleted file mode 100644
index a003e5c9eabb..000000000000
--- a/security/tcp_wrapper/pkg-comment
+++ /dev/null
@@ -1 +0,0 @@
-TCP/IP daemon wrapper package
diff --git a/security/tcp_wrapper/pkg-descr b/security/tcp_wrapper/pkg-descr
deleted file mode 100644
index 2aaa609c4c94..000000000000
--- a/security/tcp_wrapper/pkg-descr
+++ /dev/null
@@ -1,17 +0,0 @@
-With this package you can monitor and filter incoming requests for the
-SYSTAT, FINGER, FTP, TELNET, RLOGIN, RSH, EXEC, TFTP, TALK, and other
-network services.
-
-The package provides tiny daemon wrapper programs that can be installed
-without any changes to existing software or to existing configuration
-files. The wrappers report the name of the client host and of the
-requested service; the wrappers do not exchange information with the
-client or server applications, and impose no overhead on the actual
-conversation between the client and server applications.
-
-Optional features are: access control to restrict what systems can
-connect to what network daemons; client user name lookups with the RFC
-931 etc. protocol; additional protection against hosts that pretend to
-have someone elses host name; additional protection against hosts that
-pretend to have someone elses host address.
-
diff --git a/security/tcp_wrapper/pkg-plist b/security/tcp_wrapper/pkg-plist
deleted file mode 100644
index 3980821b3f38..000000000000
--- a/security/tcp_wrapper/pkg-plist
+++ /dev/null
@@ -1,10 +0,0 @@
-include/tcpd.h
-libexec/tcpd
-sbin/tcpdchk
-sbin/tcpdmatch
-bin/safe_finger
-bin/try-from
-lib/libwrap.a
-lib/libwrap.so.7.6
-lib/libwrap.so
-etc/inetd.conf.wrapped.sample
diff --git a/security/tcp_wrapper/scripts/configure b/security/tcp_wrapper/scripts/configure
deleted file mode 100644
index ae837b94e861..000000000000
--- a/security/tcp_wrapper/scripts/configure
+++ /dev/null
@@ -1,14 +0,0 @@
-#!/bin/sh
-#
-# $FreeBSD$
-#
-
-FILES="hosts_access.3 hosts_access.5 tcpd.8 tcpdchk.8 tcpdmatch.8"
-
-cd ${WRKSRC}
-
-for f in $FILES; do
- mv $f $f.bak &&
- sed <$f.bak >$f s+!!PREFIX!!+$PREFIX+g
-done
-