diff options
author | kris <kris@FreeBSD.org> | 2002-10-13 11:56:09 +0800 |
---|---|---|
committer | kris <kris@FreeBSD.org> | 2002-10-13 11:56:09 +0800 |
commit | 7d37c01aab8e0436750ea1e2becefc65cd021d97 (patch) | |
tree | c0eecdeb6c560c4e2fee17544418d69ba7f4093f /security | |
parent | 0af12a0e5f07f2e4f3d8ff9f9ec18437a3c24df9 (diff) | |
download | freebsd-ports-gnome-7d37c01aab8e0436750ea1e2becefc65cd021d97.tar.gz freebsd-ports-gnome-7d37c01aab8e0436750ea1e2becefc65cd021d97.tar.zst freebsd-ports-gnome-7d37c01aab8e0436750ea1e2becefc65cd021d97.zip |
tcp_wrapper has been in the base system since 4.0-RELEASE. Remove it.
Diffstat (limited to 'security')
-rw-r--r-- | security/Makefile | 1 | ||||
-rw-r--r-- | security/tcp_wrapper/Makefile | 40 | ||||
-rw-r--r-- | security/tcp_wrapper/distinfo | 1 | ||||
-rw-r--r-- | security/tcp_wrapper/files/inetd.conf.wrapped.sample | 71 | ||||
-rw-r--r-- | security/tcp_wrapper/files/patch-aa | 319 | ||||
-rw-r--r-- | security/tcp_wrapper/files/patch-ab | 19 | ||||
-rw-r--r-- | security/tcp_wrapper/files/patch-ac | 42 | ||||
-rw-r--r-- | security/tcp_wrapper/files/patch-ad | 86 | ||||
-rw-r--r-- | security/tcp_wrapper/files/patch-ae | 40 | ||||
-rw-r--r-- | security/tcp_wrapper/files/patch-af | 40 | ||||
-rw-r--r-- | security/tcp_wrapper/pkg-comment | 1 | ||||
-rw-r--r-- | security/tcp_wrapper/pkg-descr | 17 | ||||
-rw-r--r-- | security/tcp_wrapper/pkg-plist | 10 | ||||
-rw-r--r-- | security/tcp_wrapper/scripts/configure | 14 |
14 files changed, 0 insertions, 701 deletions
diff --git a/security/Makefile b/security/Makefile index e504a83b9535..d84015b808e7 100644 --- a/security/Makefile +++ b/security/Makefile @@ -281,7 +281,6 @@ SUBDIR += sudo SUBDIR += super SUBDIR += swatch - SUBDIR += tcp_wrapper SUBDIR += tea-total SUBDIR += termlog SUBDIR += tinc diff --git a/security/tcp_wrapper/Makefile b/security/tcp_wrapper/Makefile deleted file mode 100644 index 1f385c3c5d94..000000000000 --- a/security/tcp_wrapper/Makefile +++ /dev/null @@ -1,40 +0,0 @@ -# New ports collection makefile for: tcp_wrapper -# Date created: 27 Oct 1994 -# Whom: torstenb -# -# $FreeBSD$ -# - -PORTNAME= tcp_wrappers -PORTVERSION= 7.6 -PORTREVISION= 1 -CATEGORIES= security -MASTER_SITES= ftp://ftp.porcupine.org/pub/security/ -DISTNAME= ${PORTNAME}_${PORTVERSION} - -MAINTAINER= torstenb@FreeBSD.org - -.if exists(/usr/include/tcpd.h) -FORBIDDEN= tcp_wrappers is in the base system -.endif - -INSTALLS_SHLIB= yes - -ALL_TARGET= freebsd -MAN3= hosts_access.3 -MAN5= hosts_access.5 hosts_options.5 -MAN8= tcpd.8 tcpdchk.8 tcpdmatch.8 - -post-install: - @${INSTALL_DATA} ${FILESDIR}/inetd.conf.wrapped.sample ${PREFIX}/etc - -update: - @cd ${FILESDIR} ; co -f $(CVSROOT)/src/etc/inetd.conf,v - @${SED} -e 's:/usr/libexec/[a-zA-Z]*:${PREFIX}/libexec/tcpd:g' \ - -e 's:/usr/local/libexec/[a-zA-Z]*:${PREFIX}/libexec/tcpd:g' \ - -e 's:/usr/local/sbin/[a-zA-Z]*:${PREFIX}/libexec/tcpd:g' \ - < ${FILESDIR}/inetd.conf > ${FILESDIR}/inetd.conf.wrapped.sample - @${RM} -f ${FILESDIR}/inetd.conf - @${ECHO} "Now manually fixup deamon paths from the /usr/local tree." - -.include <bsd.port.mk> diff --git a/security/tcp_wrapper/distinfo b/security/tcp_wrapper/distinfo deleted file mode 100644 index 0399c012b094..000000000000 --- a/security/tcp_wrapper/distinfo +++ /dev/null @@ -1 +0,0 @@ -MD5 (tcp_wrappers_7.6.tar.gz) = e6fa25f71226d090f34de3f6b122fb5a diff --git a/security/tcp_wrapper/files/inetd.conf.wrapped.sample b/security/tcp_wrapper/files/inetd.conf.wrapped.sample deleted file mode 100644 index 05068f037815..000000000000 --- a/security/tcp_wrapper/files/inetd.conf.wrapped.sample +++ /dev/null @@ -1,71 +0,0 @@ -# -# Internet server configuration database -# -# @(#)inetd.conf 5.4 (Berkeley) 6/30/90 -# -ftp stream tcp nowait root /usr/local/libexec/tcpd ftpd -l -telnet stream tcp nowait root /usr/local/libexec/tcpd telnetd -shell stream tcp nowait root /usr/local/libexec/tcpd rshd -login stream tcp nowait root /usr/local/libexec/tcpd rlogind -finger stream tcp nowait nobody /usr/local/libexec/tcpd fingerd -s -#exec stream tcp nowait root /usr/local/libexec/tcpd rexecd -#uucpd stream tcp nowait root /usr/local/libexec/tcpd uucpd -#nntp stream tcp nowait usenet /usr/local/libexec/tcpd nntpd -comsat dgram udp wait root /usr/local/libexec/tcpd comsat -ntalk dgram udp wait root /usr/local/libexec/tcpd ntalkd -#tftp dgram udp wait nobody /usr/local/libexec/tcpd tftpd /tftpboot -#bootps dgram udp wait root /usr/local/libexec/tcpd bootpd -# -# "Small servers" -- used to be standard on, but we're more conservative -# about things due to Internet security concerns. Only turn on what you -# need. -# -#daytime stream tcp nowait root internal -#daytime dgram udp wait root internal -#time stream tcp nowait root internal -#time dgram udp wait root internal -#echo stream tcp nowait root internal -#echo dgram udp wait root internal -#discard stream tcp nowait root internal -#discard dgram udp wait root internal -#chargen stream tcp nowait root internal -#chargen dgram udp wait root internal -# -# Kerberos authenticated services -# -#klogin stream tcp nowait root /usr/local/libexec/tcpd rlogind -k -#eklogin stream tcp nowait root /usr/local/libexec/tcpd rlogind -k -x -#kshell stream tcp nowait root /usr/local/libexec/tcpd rshd -k -#rkinit stream tcp nowait root /usr/local/libexec/tcpd rkinitd -# -# Services run ONLY on the Kerberos server -# -#krbupdate stream tcp nowait root /usr/local/libexec/tcpd registerd -#kpasswd stream tcp nowait root /usr/local/libexec/tcpd kpasswdd -# -# RPC based services (you MUST have portmapper running to use these) -# -#rstatd/1-3 dgram rpc/udp wait root /usr/local/libexec/tcpd.rstatd rpc.rstatd -#rusersd/1-2 dgram rpc/udp wait root /usr/local/libexec/tcpd.rusersd rpc.rusersd -#walld/1 dgram rpc/udp wait root /usr/local/libexec/tcpd.rwalld rpc.rwalld -#pcnfsd/1-2 dgram rpc/udp wait root /usr/local/libexec/tcpd.pcnfsd rpc.pcnfsd -#rquotad/1 dgram rpc/udp wait root /usr/local/libexec/tcpd.rquotad rpc.rquotad -#sprayd/1 dgram rpc/udp wait root /usr/local/libexec/tcpd.sprayd rpc.sprayd -# -# example entry for the optional pop3 server -# -#pop3 stream tcp nowait root /usr/local/libexec/tcpd /usr/local/libexec/popper -# -# example entry for the optional imap4 server -# -#imap4 stream tcp nowait root /usr/local/libexec/tcpd /usr/local/libexec/imapd -# -# example entry for the optional ident server -# -#ident stream tcp wait root /usr/local/libexec/tcpd /usr/local/sbin/identd -w -t120 -# -# Enable the following two entries to enable samba startup from inetd -# (from the Samba documentation). -# -#netbios-ssn stream tcp nowait root /usr/local/libexec/tcpd /usr/local/sbin/smbd -#netbios-ns dgram udp wait root /usr/local/libexec/tcpd /usr/local/sbin/nmbd diff --git a/security/tcp_wrapper/files/patch-aa b/security/tcp_wrapper/files/patch-aa deleted file mode 100644 index 7ae985109ae4..000000000000 --- a/security/tcp_wrapper/files/patch-aa +++ /dev/null @@ -1,319 +0,0 @@ -*** Makefile.orig Fri Mar 21 12:27:21 1997 ---- Makefile Wed Sep 16 17:41:52 1998 -*************** -*** 47,53 **** - #REAL_DAEMON_DIR=/usr/sbin - # - # BSD 4.4 -! #REAL_DAEMON_DIR=/usr/libexec - # - # HP-UX SCO Unicos - #REAL_DAEMON_DIR=/etc ---- 47,53 ---- - #REAL_DAEMON_DIR=/usr/sbin - # - # BSD 4.4 -! REAL_DAEMON_DIR=/usr/libexec - # - # HP-UX SCO Unicos - #REAL_DAEMON_DIR=/etc -*************** -*** 138,144 **** - - freebsd: - @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \ -! LIBS= RANLIB=ranlib ARFLAGS=rv AUX_OBJ= NETGROUP= TLI= \ - EXTRA_CFLAGS=-DSYS_ERRLIST_DEFINED VSYSLOG= all - - linux: ---- 138,144 ---- - - freebsd: - @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \ -! LIBS= RANLIB=ranlib ARFLAGS=rv AUX_OBJ= NETGROUP=-DNETGROUP TLI= \ - EXTRA_CFLAGS=-DSYS_ERRLIST_DEFINED VSYSLOG= all - - linux: -*************** -*** 391,397 **** - # the ones provided with this source distribution. The environ.c module - # implements setenv(), getenv(), and putenv(). - -! AUX_OBJ= setenv.o - #AUX_OBJ= environ.o - #AUX_OBJ= environ.o strcasecmp.o - ---- 391,397 ---- - # the ones provided with this source distribution. The environ.c module - # implements setenv(), getenv(), and putenv(). - -! #AUX_OBJ= setenv.o - #AUX_OBJ= environ.o - #AUX_OBJ= environ.o strcasecmp.o - -*************** -*** 454,460 **** - # host name aliases. Compile with -DSOLARIS_24_GETHOSTBYNAME_BUG to work - # around this. The workaround does no harm on other Solaris versions. - -! BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DLIBC_CALLS_STRTOK - #BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DINET_ADDR_BUG - #BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DSOLARIS_24_GETHOSTBYNAME_BUG - ---- 454,460 ---- - # host name aliases. Compile with -DSOLARIS_24_GETHOSTBYNAME_BUG to work - # around this. The workaround does no harm on other Solaris versions. - -! #BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DLIBC_CALLS_STRTOK - #BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DINET_ADDR_BUG - #BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DSOLARIS_24_GETHOSTBYNAME_BUG - -*************** -*** 472,478 **** - # If your system supports vsyslog(), comment out the following definition. - # If in doubt leave it in, it won't harm. - -! VSYSLOG = -Dvsyslog=myvsyslog - - # End of the system dependencies. - ################################# ---- 472,478 ---- - # If your system supports vsyslog(), comment out the following definition. - # If in doubt leave it in, it won't harm. - -! #VSYSLOG = -Dvsyslog=myvsyslog - - # End of the system dependencies. - ################################# -*************** -*** 491,497 **** - # Uncomment the next definition to turn on the language extensions - # (examples: allow, deny, banners, twist and spawn). - # -! #STYLE = -DPROCESS_OPTIONS # Enable language extensions. - - ################################################################ - # Optional: Changing the default disposition of logfile records ---- 491,497 ---- - # Uncomment the next definition to turn on the language extensions - # (examples: allow, deny, banners, twist and spawn). - # -! STYLE = -DPROCESS_OPTIONS # Enable language extensions. - - ################################################################ - # Optional: Changing the default disposition of logfile records -*************** -*** 514,520 **** - # - # The LOG_XXX names below are taken from the /usr/include/syslog.h file. - -! FACILITY= LOG_MAIL # LOG_MAIL is what most sendmail daemons use - - # The syslog priority at which successful connections are logged. - ---- 514,521 ---- - # - # The LOG_XXX names below are taken from the /usr/include/syslog.h file. - -! #FACILITY= LOG_MAIL # LOG_MAIL is what most sendmail daemons use -! FACILITY= LOG_AUTH - - # The syslog priority at which successful connections are logged. - -*************** -*** 590,596 **** - # look for access control information. Watch out for the quotes and - # backslashes when you make changes. - -! TABLES = -DHOSTS_DENY=\"/etc/hosts.deny\" -DHOSTS_ALLOW=\"/etc/hosts.allow\" - - #################################################### - # Optional: dealing with host name/address conflicts ---- 591,597 ---- - # look for access control information. Watch out for the quotes and - # backslashes when you make changes. - -! TABLES = -DHOSTS_DENY=\"${PREFIX}/etc/hosts.deny\" -DHOSTS_ALLOW=\"${PREFIX}/etc/hosts.allow\" - - #################################################### - # Optional: dealing with host name/address conflicts -*************** -*** 610,616 **** - # Paranoid mode implies hostname lookup. In order to disable hostname - # lookups altogether, see the next section. - -! PARANOID= -DPARANOID - - ######################################## - # Optional: turning off hostname lookups ---- 611,617 ---- - # Paranoid mode implies hostname lookup. In order to disable hostname - # lookups altogether, see the next section. - -! #PARANOID= -DPARANOID - - ######################################## - # Optional: turning off hostname lookups -*************** -*** 657,665 **** - # Protection against weird shells or weird make programs. - - SHELL = /bin/sh -! .c.o:; $(CC) $(CFLAGS) -c $*.c - -! CFLAGS = -O -DFACILITY=$(FACILITY) $(ACCESS) $(PARANOID) $(NETGROUP) \ - $(BUGS) $(SYSTYPE) $(AUTH) $(UMASK) \ - -DREAL_DAEMON_DIR=\"$(REAL_DAEMON_DIR)\" $(STYLE) $(KILL_OPT) \ - -DSEVERITY=$(SEVERITY) -DRFC931_TIMEOUT=$(RFC931_TIMEOUT) \ ---- 658,671 ---- - # Protection against weird shells or weird make programs. - - SHELL = /bin/sh -! PREFIX ?= /usr/local -! -! .SUFFIXES: .c .so .o -! -! .c.so: -! ${CC} -fpic -DPIC ${CFLAGS} -c ${.IMPSRC} -o ${.TARGET} - -! CFLAGS += -DFACILITY=$(FACILITY) $(ACCESS) $(PARANOID) $(NETGROUP) \ - $(BUGS) $(SYSTYPE) $(AUTH) $(UMASK) \ - -DREAL_DAEMON_DIR=\"$(REAL_DAEMON_DIR)\" $(STYLE) $(KILL_OPT) \ - -DSEVERITY=$(SEVERITY) -DRFC931_TIMEOUT=$(RFC931_TIMEOUT) \ -*************** -*** 684,692 **** - refuse.c tcpdchk.8 setenv.c inetcf.c inetcf.h scaffold.c \ - scaffold.h tcpdmatch.8 README.NIS - -! LIB = libwrap.a - -- all other: config-check tcpd tcpdmatch try-from safe_finger tcpdchk - - # Invalidate all object files when the compiler options (CFLAGS) have changed. - ---- 690,724 ---- - refuse.c tcpdchk.8 setenv.c inetcf.c inetcf.h scaffold.c \ - scaffold.h tcpdmatch.8 README.NIS - -! LIB = libwrap.a -! .if ${PORTOBJFORMAT} == elf -! SLIB = libwrap.so.7 -! .else -! SLIB = libwrap.so.7.6 -! .endif -! -! all other: config-check $(LIB) $(SLIB) tcpd tcpdmatch try-from safe_finger tcpdchk -! -! install: -! ${INSTALL} -o ${BINOWN} -g ${BINGRP} -c -m 644 \ -! tcpd.h ${PREFIX}/include -! ${INSTALL} -o ${BINOWN} -g ${BINGRP} -c -m 644 \ -! $(LIB) $(SLIB) ${PREFIX}/lib -! (cd ${PREFIX}/lib;ln -sf $(SLIB) `echo $(SLIB) | sed 's/\.so.*$$/.so/'`) -! ranlib ${PREFIX}/lib/$(LIB) -! ${INSTALL} -o ${BINOWN} -g ${BINGRP} -cs -m ${BINMODE} \ -! tcpd ${PREFIX}/libexec -! ${INSTALL} -o ${BINOWN} -g ${BINGRP} -cs -m ${BINMODE} \ -! tcpdchk tcpdmatch ${PREFIX}/sbin -! ${INSTALL} -o ${BINOWN} -g ${BINGRP} -cs -m ${BINMODE} \ -! try-from safe_finger ${PREFIX}/bin -! ${INSTALL} -o ${MANOWN} -g ${MANGRP} -c -m ${MANMODE} \ -! tcpd.8 tcpdchk.8 tcpdmatch.8 ${PREFIX}/man/man8 -! ${INSTALL} -o ${MANOWN} -g ${MANGRP} -c -m ${MANMODE} \ -! hosts_access.3 ${PREFIX}/man/man3 -! ${INSTALL} -o ${MANOWN} -g ${MANGRP} -c -m ${MANMODE} \ -! hosts_access.5 hosts_options.5 ${PREFIX}/man/man5 - - - # Invalidate all object files when the compiler options (CFLAGS) have changed. - -*************** -*** 703,729 **** - $(AR) $(ARFLAGS) $(LIB) $(LIB_OBJ) - -$(RANLIB) $(LIB) - -! tcpd: tcpd.o $(LIB) -! $(CC) $(CFLAGS) -o $@ tcpd.o $(LIB) $(LIBS) - -! miscd: miscd.o $(LIB) -! $(CC) $(CFLAGS) -o $@ miscd.o $(LIB) $(LIBS) - -! safe_finger: safe_finger.o $(LIB) -! $(CC) $(CFLAGS) -o $@ safe_finger.o $(LIB) $(LIBS) - - TCPDMATCH_OBJ = tcpdmatch.o fakelog.o inetcf.o scaffold.o - -! tcpdmatch: $(TCPDMATCH_OBJ) $(LIB) -! $(CC) $(CFLAGS) -o $@ $(TCPDMATCH_OBJ) $(LIB) $(LIBS) - -! try-from: try-from.o fakelog.o $(LIB) -! $(CC) $(CFLAGS) -o $@ try-from.o fakelog.o $(LIB) $(LIBS) - - TCPDCHK_OBJ = tcpdchk.o fakelog.o inetcf.o scaffold.o - -! tcpdchk: $(TCPDCHK_OBJ) $(LIB) -! $(CC) $(CFLAGS) -o $@ $(TCPDCHK_OBJ) $(LIB) $(LIBS) - - shar: $(KIT) - @shar $(KIT) ---- 735,770 ---- - $(AR) $(ARFLAGS) $(LIB) $(LIB_OBJ) - -$(RANLIB) $(LIB) - -! $(SLIB): $(LIB_OBJ:S/o$/so/g) shdata.so -! rm -f $(SLIB) -! .if ${PORTOBJFORMAT} == elf -! $(CC) -o $(SLIB) -shared -Wl,-soname,$(SLIB) $(LIB_OBJ:S/o$/so/g) shdata.so -! .else -! ld -Bshareable -o $(SLIB) $(LIB_OBJ:S/o$/so/g) shdata.so -! .endif -! ln -sf $(SLIB) `echo $(SLIB) | sed 's/\.so.*$$/.so/'` -! -! tcpd: tcpd.o $(SLIB) -! $(CC) $(CFLAGS) -o $@ tcpd.o -L. -lwrap $(LIBS) - -! miscd: miscd.o $(SLIB) -! $(CC) $(CFLAGS) -o $@ miscd.o -L. -lwrap $(LIBS) - -! safe_finger: safe_finger.o $(SLIB) -! $(CC) $(CFLAGS) -o $@ safe_finger.o -L. -lwrap $(LIBS) - - TCPDMATCH_OBJ = tcpdmatch.o fakelog.o inetcf.o scaffold.o - -! tcpdmatch: $(TCPDMATCH_OBJ) $(SLIB) -! $(CC) $(CFLAGS) -o $@ $(TCPDMATCH_OBJ) -L. -lwrap $(LIBS) - -! try-from: try-from.o fakelog.o $(SLIB) -! $(CC) $(CFLAGS) -o $@ try-from.o fakelog.o -L. -lwrap $(LIBS) - - TCPDCHK_OBJ = tcpdchk.o fakelog.o inetcf.o scaffold.o - -! tcpdchk: $(TCPDCHK_OBJ) $(SLIB) -! $(CC) $(CFLAGS) -o $@ $(TCPDCHK_OBJ) -L. -lwrap $(LIBS) - - shar: $(KIT) - @shar $(KIT) -*************** -*** 739,745 **** - - clean: - rm -f tcpd miscd safe_finger tcpdmatch tcpdchk try-from *.[oa] core \ -! cflags - - tidy: clean - chmod -R a+r . ---- 780,786 ---- - - clean: - rm -f tcpd miscd safe_finger tcpdmatch tcpdchk try-from *.[oa] core \ -! cflags *.so $(SLIB) - - tidy: clean - chmod -R a+r . -*** /dev/null Thu Jan 25 06:52:04 1996 ---- shdata.c Thu Jan 25 06:54:34 1996 -*************** -*** 0 **** ---- 1,2 ---- -+ int allow_severity; -+ int deny_severity; diff --git a/security/tcp_wrapper/files/patch-ab b/security/tcp_wrapper/files/patch-ab deleted file mode 100644 index 53c21fb50165..000000000000 --- a/security/tcp_wrapper/files/patch-ab +++ /dev/null @@ -1,19 +0,0 @@ -*** hosts_access.3.orig Tue Aug 5 10:14:01 1997 ---- hosts_access.3 Tue Aug 5 10:14:35 1997 -*************** -*** 78,84 **** - hosts_access(5), format of the access control tables. - hosts_options(5), optional extensions to the base language. - .SH FILES -! /etc/hosts.allow, /etc/hosts.deny, access control tables. - .SH BUGS - hosts_access() uses the strtok() library function. This may interfere - with other code that relies on strtok(). ---- 78,84 ---- - hosts_access(5), format of the access control tables. - hosts_options(5), optional extensions to the base language. - .SH FILES -! !!PREFIX!!/etc/hosts.allow, !!PREFIX!!/etc/hosts.deny, access control tables. - .SH BUGS - hosts_access() uses the strtok() library function. This may interfere - with other code that relies on strtok(). diff --git a/security/tcp_wrapper/files/patch-ac b/security/tcp_wrapper/files/patch-ac deleted file mode 100644 index b784180c8252..000000000000 --- a/security/tcp_wrapper/files/patch-ac +++ /dev/null @@ -1,42 +0,0 @@ -*** hosts_access.5.orig Tue Aug 5 10:14:41 1997 ---- hosts_access.5 Tue Aug 5 10:15:08 1997 -*************** -*** 21,30 **** - at the first match: - .IP \(bu - Access will be granted when a (daemon,client) pair matches an entry in -! the \fI/etc/hosts.allow\fR file. - .IP \(bu - Otherwise, access will be denied when a (daemon,client) pair matches an -! entry in the \fI/etc/hosts.deny\fR file. - .IP \(bu - Otherwise, access will be granted. - .PP ---- 21,30 ---- - at the first match: - .IP \(bu - Access will be granted when a (daemon,client) pair matches an entry in -! the \fI!!PREFIX!!/etc/hosts.allow\fR file. - .IP \(bu - Otherwise, access will be denied when a (daemon,client) pair matches an -! entry in the \fI!!PREFIX!!/etc/hosts.deny\fR file. - .IP \(bu - Otherwise, access will be granted. - .PP -*************** -*** 268,274 **** - file: - .PP - .ne 2 -! /etc/hosts.deny: - .in +3 - ALL: ALL - .PP ---- 268,274 ---- - file: - .PP - .ne 2 -! !!PREFIX!!/etc/hosts.deny: - .in +3 - ALL: ALL - .PP diff --git a/security/tcp_wrapper/files/patch-ad b/security/tcp_wrapper/files/patch-ad deleted file mode 100644 index 734c123f68f5..000000000000 --- a/security/tcp_wrapper/files/patch-ad +++ /dev/null @@ -1,86 +0,0 @@ -*** tcpd.8.orig Tue Aug 5 10:15:53 1997 ---- tcpd.8 Tue Aug 5 10:18:01 1997 -*************** -*** 88,99 **** - .sp - .in +5 - # mkdir /other/place -! # mv /usr/etc/in.fingerd /other/place -! # cp tcpd /usr/etc/in.fingerd - .fi - .PP -! The example assumes that the network daemons live in /usr/etc. On some -! systems, network daemons live in /usr/sbin or in /usr/libexec, or have - no `in.\' prefix to their name. - .SH EXAMPLE 2 - This example applies when \fItcpd\fR expects that the network daemons ---- 88,99 ---- - .sp - .in +5 - # mkdir /other/place -! # mv /usr/libexec/fingerd /other/place -! # cp tcpd /usr/libexec/fingerd - .fi - .PP -! The example assumes that the network daemons live in /usr/libexec. On some -! systems, network daemons live in /usr/sbin or in /usr/etc, or have - no `in.\' prefix to their name. - .SH EXAMPLE 2 - This example applies when \fItcpd\fR expects that the network daemons -*************** -*** 105,111 **** - .nf - .sp - .ti +5 -! finger stream tcp nowait nobody /usr/etc/in.fingerd in.fingerd - .sp - becomes: - .sp ---- 105,111 ---- - .nf - .sp - .ti +5 -! finger stream tcp nowait nobody /usr/libexec/fingerd fingerd - .sp - becomes: - .sp -*************** -*** 114,121 **** - .sp - .fi - .PP -! The example assumes that the network daemons live in /usr/etc. On some -! systems, network daemons live in /usr/sbin or in /usr/libexec, the - daemons have no `in.\' prefix to their name, or there is no userid - field in the inetd configuration file. - .PP ---- 114,121 ---- - .sp - .fi - .PP -! The example assumes that the network daemons live in /usr/libexec. On some -! systems, network daemons live in /usr/sbin or in /usr/etc, the - daemons have no `in.\' prefix to their name, or there is no userid - field in the inetd configuration file. - .PP -*************** -*** 158,166 **** - .PP - The default locations of the host access control tables are: - .PP -! /etc/hosts.allow - .br -! /etc/hosts.deny - .SH SEE ALSO - .na - .nf ---- 158,166 ---- - .PP - The default locations of the host access control tables are: - .PP -! !!PREFIX!!/etc/hosts.allow - .br -! !!PREFIX!!/etc/hosts.deny - .SH SEE ALSO - .na - .nf diff --git a/security/tcp_wrapper/files/patch-ae b/security/tcp_wrapper/files/patch-ae deleted file mode 100644 index c1c87e528bf3..000000000000 --- a/security/tcp_wrapper/files/patch-ae +++ /dev/null @@ -1,40 +0,0 @@ -*** tcpdchk.8.orig Tue Aug 5 10:18:09 1997 ---- tcpdchk.8 Tue Aug 5 10:18:29 1997 -*************** -*** 8,14 **** - \fItcpdchk\fR examines your tcp wrapper configuration and reports all - potential and real problems it can find. The program examines the - \fItcpd\fR access control files (by default, these are -! \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the - entries in these files against entries in the \fIinetd\fR or \fItlid\fR - network configuration files. - .PP ---- 8,14 ---- - \fItcpdchk\fR examines your tcp wrapper configuration and reports all - potential and real problems it can find. The program examines the - \fItcpd\fR access control files (by default, these are -! \fI!!PREFIX!!/etc/hosts.allow\fR and \fI!!PREFIX!!/etc/hosts.deny\fR), and compares the - entries in these files against entries in the \fIinetd\fR or \fItlid\fR - network configuration files. - .PP -*************** -*** 44,52 **** - .PP - The default locations of the \fItcpd\fR access control tables are: - .PP -! /etc/hosts.allow - .br -! /etc/hosts.deny - .SH SEE ALSO - .na - .nf ---- 44,52 ---- - .PP - The default locations of the \fItcpd\fR access control tables are: - .PP -! !!PREFIX!!/etc/hosts.allow - .br -! !!PREFIX!!/etc/hosts.deny - .SH SEE ALSO - .na - .nf diff --git a/security/tcp_wrapper/files/patch-af b/security/tcp_wrapper/files/patch-af deleted file mode 100644 index 437720f9296f..000000000000 --- a/security/tcp_wrapper/files/patch-af +++ /dev/null @@ -1,40 +0,0 @@ -*** tcpdmatch.8.orig Tue Aug 5 10:18:39 1997 ---- tcpdmatch.8 Tue Aug 5 10:18:56 1997 -*************** -*** 11,17 **** - request for service. Examples are given below. - .PP - The program examines the \fItcpd\fR access control tables (default -! \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR) and prints its - conclusion. For maximal accuracy, it extracts additional information - from your \fIinetd\fR or \fItlid\fR network configuration file. - .PP ---- 11,17 ---- - request for service. Examples are given below. - .PP - The program examines the \fItcpd\fR access control tables (default -! \fI!!PREFIX!!/etc/hosts.allow\fR and \fI!!PREFIX!!/etc/hosts.deny\fR) and prints its - conclusion. For maximal accuracy, it extracts additional information - from your \fIinetd\fR or \fItlid\fR network configuration file. - .PP -*************** -*** 76,84 **** - .PP - The default locations of the \fItcpd\fR access control tables are: - .PP -! /etc/hosts.allow - .br -! /etc/hosts.deny - .SH SEE ALSO - .na - .nf ---- 76,84 ---- - .PP - The default locations of the \fItcpd\fR access control tables are: - .PP -! !!PREFIX!!/etc/hosts.allow - .br -! !!PREFIX!!/etc/hosts.deny - .SH SEE ALSO - .na - .nf diff --git a/security/tcp_wrapper/pkg-comment b/security/tcp_wrapper/pkg-comment deleted file mode 100644 index a003e5c9eabb..000000000000 --- a/security/tcp_wrapper/pkg-comment +++ /dev/null @@ -1 +0,0 @@ -TCP/IP daemon wrapper package diff --git a/security/tcp_wrapper/pkg-descr b/security/tcp_wrapper/pkg-descr deleted file mode 100644 index 2aaa609c4c94..000000000000 --- a/security/tcp_wrapper/pkg-descr +++ /dev/null @@ -1,17 +0,0 @@ -With this package you can monitor and filter incoming requests for the -SYSTAT, FINGER, FTP, TELNET, RLOGIN, RSH, EXEC, TFTP, TALK, and other -network services. - -The package provides tiny daemon wrapper programs that can be installed -without any changes to existing software or to existing configuration -files. The wrappers report the name of the client host and of the -requested service; the wrappers do not exchange information with the -client or server applications, and impose no overhead on the actual -conversation between the client and server applications. - -Optional features are: access control to restrict what systems can -connect to what network daemons; client user name lookups with the RFC -931 etc. protocol; additional protection against hosts that pretend to -have someone elses host name; additional protection against hosts that -pretend to have someone elses host address. - diff --git a/security/tcp_wrapper/pkg-plist b/security/tcp_wrapper/pkg-plist deleted file mode 100644 index 3980821b3f38..000000000000 --- a/security/tcp_wrapper/pkg-plist +++ /dev/null @@ -1,10 +0,0 @@ -include/tcpd.h -libexec/tcpd -sbin/tcpdchk -sbin/tcpdmatch -bin/safe_finger -bin/try-from -lib/libwrap.a -lib/libwrap.so.7.6 -lib/libwrap.so -etc/inetd.conf.wrapped.sample diff --git a/security/tcp_wrapper/scripts/configure b/security/tcp_wrapper/scripts/configure deleted file mode 100644 index ae837b94e861..000000000000 --- a/security/tcp_wrapper/scripts/configure +++ /dev/null @@ -1,14 +0,0 @@ -#!/bin/sh -# -# $FreeBSD$ -# - -FILES="hosts_access.3 hosts_access.5 tcpd.8 tcpdchk.8 tcpdmatch.8" - -cd ${WRKSRC} - -for f in $FILES; do - mv $f $f.bak && - sed <$f.bak >$f s+!!PREFIX!!+$PREFIX+g -done - |