OpenSDE Packages Database (without history before r20070)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

91 lines
4.4 KiB

  1. # --- SDE-COPYRIGHT-NOTE-BEGIN ---
  2. # This copyright note is auto-generated by ./scripts/Create-CopyPatch.
  3. #
  4. # Filename: package/.../tcp_wrappers/0001-tcp_wrappers-7.6-man-quoting.patch
  5. # Copyright (C) 2011 The OpenSDE Project
  6. #
  7. # More information can be found in the files COPYING and README.
  8. #
  9. # This patch file is dual-licensed. It is available under the license the
  10. # patched project is licensed under, as long as it is an OpenSource license
  11. # as defined at http://www.opensource.org/ (e.g. BSD, X11) or under the terms
  12. # of the GNU General Public License as published by the Free Software
  13. # Foundation; either version 2 of the License, or (at your option) any later
  14. # version.
  15. # --- SDE-COPYRIGHT-NOTE-END ---
  16. diff -ruN tcp_wrappers_7.6.orig/hosts_access.5 tcp_wrappers_7.6/hosts_access.5
  17. --- tcp_wrappers_7.6.orig/hosts_access.5 1995-01-30 19:51:47.000000000 +0100
  18. +++ tcp_wrappers_7.6/hosts_access.5 2004-04-09 16:59:45.000000000 +0200
  19. @@ -173,7 +173,7 @@
  20. Patterns like these can be used when the machine has different internet
  21. addresses with different internet hostnames. Service providers can use
  22. this facility to offer FTP, GOPHER or WWW archives with internet names
  23. -that may even belong to different organizations. See also the `twist'
  24. +that may even belong to different organizations. See also the `twist\'
  25. option in the hosts_options(5) document. Some systems (Solaris,
  26. FreeBSD) can have more than one internet address on one physical
  27. interface; with other systems you may have to resort to SLIP or PPP
  28. @@ -236,10 +236,10 @@
  29. Before accepting a client request, the wrappers can use the IDENT
  30. service to find out that the client did not send the request at all.
  31. When the client host provides IDENT service, a negative IDENT lookup
  32. -result (the client matches `UNKNOWN@host') is strong evidence of a host
  33. +result (the client matches `UNKNOWN@host\') is strong evidence of a host
  34. spoofing attack.
  35. .PP
  36. -A positive IDENT lookup result (the client matches `KNOWN@host') is
  37. +A positive IDENT lookup result (the client matches `KNOWN@host\') is
  38. less trustworthy. It is possible for an intruder to spoof both the
  39. client connection and the IDENT lookup, although doing so is much
  40. harder than spoofing just a client connection. It may also be that
  41. diff -ruN tcp_wrappers_7.6.orig/hosts_options.5 tcp_wrappers_7.6/hosts_options.5
  42. --- tcp_wrappers_7.6.orig/hosts_options.5 1994-12-28 17:42:29.000000000 +0100
  43. +++ tcp_wrappers_7.6/hosts_options.5 2004-04-09 16:59:49.000000000 +0200
  44. @@ -124,7 +124,7 @@
  45. value is taken.
  46. .SH MISCELLANEOUS
  47. .IP "banners /some/directory"
  48. -Look for a file in `/some/directory' with the same name as the daemon
  49. +Look for a file in `/some/directory\' with the same name as the daemon
  50. process (for example in.telnetd for the telnet service), and copy its
  51. contents to the client. Newline characters are replaced by
  52. carriage-return newline, and %<letter> sequences are expanded (see
  53. diff -ruN tcp_wrappers_7.6.orig/tcpdmatch.8 tcp_wrappers_7.6/tcpdmatch.8
  54. --- tcp_wrappers_7.6.orig/tcpdmatch.8 1996-02-11 17:01:36.000000000 +0100
  55. +++ tcp_wrappers_7.6/tcpdmatch.8 2004-04-09 17:00:49.000000000 +0200
  56. @@ -26,7 +26,7 @@
  57. A daemon process name. Typically, the last component of a daemon
  58. executable pathname.
  59. .IP client
  60. -A host name or network address, or one of the `unknown' or `paranoid'
  61. +A host name or network address, or one of the `unknown\' or `paranoid\'
  62. wildcard patterns.
  63. .sp
  64. When a client host name is specified, \fItcpdmatch\fR gives a
  65. @@ -37,13 +37,13 @@
  66. .PP
  67. Optional information specified with the \fIdaemon@server\fR form:
  68. .IP server
  69. -A host name or network address, or one of the `unknown' or `paranoid'
  70. -wildcard patterns. The default server name is `unknown'.
  71. +A host name or network address, or one of the `unknown\' or `paranoid\'
  72. +wildcard patterns. The default server name is `unknown\'.
  73. .PP
  74. Optional information specified with the \fIuser@client\fR form:
  75. .IP user
  76. A client user identifier. Typically, a login name or a numeric userid.
  77. -The default user name is `unknown'.
  78. +The default user name is `unknown\'.
  79. .SH OPTIONS
  80. .IP -d
  81. Examine \fIhosts.allow\fR and \fIhosts.deny\fR files in the current
  82. @@ -70,7 +70,7 @@
  83. .ti +5
  84. tcpdmatch in.telnetd paranoid
  85. .PP
  86. -On some systems, daemon names have no `in.' prefix, or \fItcpdmatch\fR
  87. +On some systems, daemon names have no `in.\' prefix, or \fItcpdmatch\fR
  88. may need some help to locate the inetd configuration file.
  89. .SH FILES
  90. .PP