00_man_quoting.diff 3.7 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576
  1. diff -ruN tcp_wrappers_7.6.orig/hosts_access.5 tcp_wrappers_7.6/hosts_access.5
  2. --- tcp_wrappers_7.6.orig/hosts_access.5 1995-01-30 19:51:47.000000000 +0100
  3. +++ tcp_wrappers_7.6/hosts_access.5 2004-04-09 16:59:45.000000000 +0200
  4. @@ -173,7 +173,7 @@
  5. Patterns like these can be used when the machine has different internet
  6. addresses with different internet hostnames. Service providers can use
  7. this facility to offer FTP, GOPHER or WWW archives with internet names
  8. -that may even belong to different organizations. See also the `twist'
  9. +that may even belong to different organizations. See also the `twist\'
  10. option in the hosts_options(5) document. Some systems (Solaris,
  11. FreeBSD) can have more than one internet address on one physical
  12. interface; with other systems you may have to resort to SLIP or PPP
  13. @@ -236,10 +236,10 @@
  14. Before accepting a client request, the wrappers can use the IDENT
  15. service to find out that the client did not send the request at all.
  16. When the client host provides IDENT service, a negative IDENT lookup
  17. -result (the client matches `UNKNOWN@host') is strong evidence of a host
  18. +result (the client matches `UNKNOWN@host\') is strong evidence of a host
  19. spoofing attack.
  20. .PP
  21. -A positive IDENT lookup result (the client matches `KNOWN@host') is
  22. +A positive IDENT lookup result (the client matches `KNOWN@host\') is
  23. less trustworthy. It is possible for an intruder to spoof both the
  24. client connection and the IDENT lookup, although doing so is much
  25. harder than spoofing just a client connection. It may also be that
  26. diff -ruN tcp_wrappers_7.6.orig/hosts_options.5 tcp_wrappers_7.6/hosts_options.5
  27. --- tcp_wrappers_7.6.orig/hosts_options.5 1994-12-28 17:42:29.000000000 +0100
  28. +++ tcp_wrappers_7.6/hosts_options.5 2004-04-09 16:59:49.000000000 +0200
  29. @@ -124,7 +124,7 @@
  30. value is taken.
  31. .SH MISCELLANEOUS
  32. .IP "banners /some/directory"
  33. -Look for a file in `/some/directory' with the same name as the daemon
  34. +Look for a file in `/some/directory\' with the same name as the daemon
  35. process (for example in.telnetd for the telnet service), and copy its
  36. contents to the client. Newline characters are replaced by
  37. carriage-return newline, and %<letter> sequences are expanded (see
  38. diff -ruN tcp_wrappers_7.6.orig/tcpdmatch.8 tcp_wrappers_7.6/tcpdmatch.8
  39. --- tcp_wrappers_7.6.orig/tcpdmatch.8 1996-02-11 17:01:36.000000000 +0100
  40. +++ tcp_wrappers_7.6/tcpdmatch.8 2004-04-09 17:00:49.000000000 +0200
  41. @@ -26,7 +26,7 @@
  42. A daemon process name. Typically, the last component of a daemon
  43. executable pathname.
  44. .IP client
  45. -A host name or network address, or one of the `unknown' or `paranoid'
  46. +A host name or network address, or one of the `unknown\' or `paranoid\'
  47. wildcard patterns.
  48. .sp
  49. When a client host name is specified, \fItcpdmatch\fR gives a
  50. @@ -37,13 +37,13 @@
  51. .PP
  52. Optional information specified with the \fIdaemon@server\fR form:
  53. .IP server
  54. -A host name or network address, or one of the `unknown' or `paranoid'
  55. -wildcard patterns. The default server name is `unknown'.
  56. +A host name or network address, or one of the `unknown\' or `paranoid\'
  57. +wildcard patterns. The default server name is `unknown\'.
  58. .PP
  59. Optional information specified with the \fIuser@client\fR form:
  60. .IP user
  61. A client user identifier. Typically, a login name or a numeric userid.
  62. -The default user name is `unknown'.
  63. +The default user name is `unknown\'.
  64. .SH OPTIONS
  65. .IP -d
  66. Examine \fIhosts.allow\fR and \fIhosts.deny\fR files in the current
  67. @@ -70,7 +70,7 @@
  68. .ti +5
  69. tcpdmatch in.telnetd paranoid
  70. .PP
  71. -On some systems, daemon names have no `in.' prefix, or \fItcpdmatch\fR
  72. +On some systems, daemon names have no `in.\' prefix, or \fItcpdmatch\fR
  73. may need some help to locate the inetd configuration file.
  74. .SH FILES
  75. .PP