01_man_portability 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249
  1. diff -ruNp tcp_wrappers_7.6.orig/hosts_access.3 tcp_wrappers_7.6/hosts_access.3
  2. --- tcp_wrappers_7.6.orig/hosts_access.3 2005-03-09 18:30:25.000000000 +0100
  3. +++ tcp_wrappers_7.6/hosts_access.3 2005-03-09 18:27:03.000000000 +0100
  4. @@ -3,7 +3,7 @@
  5. hosts_access, hosts_ctl, request_init, request_set \- access control library
  6. .SH SYNOPSIS
  7. .nf
  8. -#include "tcpd.h"
  9. +#include <tcpd.h>
  10. extern int allow_severity;
  11. extern int deny_severity;
  12. diff -ruNp tcp_wrappers_7.6.orig/hosts_access.5 tcp_wrappers_7.6/hosts_access.5
  13. --- tcp_wrappers_7.6.orig/hosts_access.5 2005-03-09 18:30:25.000000000 +0100
  14. +++ tcp_wrappers_7.6/hosts_access.5 2005-03-09 18:30:18.000000000 +0100
  15. @@ -8,9 +8,9 @@ name, host name/address) patterns. Exam
  16. impatient reader is encouraged to skip to the EXAMPLES section for a
  17. quick introduction.
  18. .PP
  19. -An extended version of the access control language is described in the
  20. -\fIhosts_options\fR(5) document. The extensions are turned on at
  21. -program build time by building with -DPROCESS_OPTIONS.
  22. +The extended version of the access control language is described in the
  23. +\fIhosts_options\fR(5) document. \fBNote that this language supersedes
  24. +the meaning of \fIshell_command\fB as documented below.\fR
  25. .PP
  26. In the following text, \fIdaemon\fR is the process name of a
  27. network daemon process, and \fIclient\fR is the name and/or address of
  28. @@ -346,8 +346,8 @@ in.tftpd: LOCAL, .my.domain
  29. /etc/hosts.deny:
  30. .in +3
  31. .nf
  32. -in.tftpd: ALL: (/some/where/safe_finger -l @%h | \\
  33. - /usr/ucb/mail -s %d-%h root) &
  34. +in.tftpd: ALL: (/usr/sbin/safe_finger -l @%h | \\
  35. + /usr/bin/mail -s %d-%h root) &
  36. .fi
  37. .PP
  38. The safe_finger command comes with the tcpd wrapper and should be
  39. @@ -383,6 +383,7 @@ that shouldn\'t. All problems are repor
  40. .fi
  41. .SH SEE ALSO
  42. .nf
  43. +hosts_options(5) extended syntax.
  44. tcpd(8) tcp/ip daemon wrapper program.
  45. tcpdchk(8), tcpdmatch(8), test programs.
  46. .SH BUGS
  47. diff -ruNp tcp_wrappers_7.6.orig/hosts_options.5 tcp_wrappers_7.6/hosts_options.5
  48. --- tcp_wrappers_7.6.orig/hosts_options.5 2005-03-09 18:30:24.000000000 +0100
  49. +++ tcp_wrappers_7.6/hosts_options.5 2005-03-09 18:27:03.000000000 +0100
  50. @@ -2,10 +2,8 @@
  51. .SH NAME
  52. hosts_options \- host access control language extensions
  53. .SH DESCRIPTION
  54. -This document describes optional extensions to the language described
  55. -in the hosts_access(5) document. The extensions are enabled at program
  56. -build time. For example, by editing the Makefile and turning on the
  57. -PROCESS_OPTIONS compile-time option.
  58. +This document describes extensions to the language described
  59. +in the hosts_access(5) document.
  60. .PP
  61. The extensible language uses the following format:
  62. .sp
  63. @@ -58,12 +56,12 @@ Notice the leading dot on the domain nam
  64. Execute, in a child process, the specified shell command, after
  65. performing the %<letter> expansions described in the hosts_access(5)
  66. manual page. The command is executed with stdin, stdout and stderr
  67. -connected to the null device, so that it won\'t mess up the
  68. +connected to the null device, so that it won't mess up the
  69. conversation with the client host. Example:
  70. .sp
  71. .nf
  72. .ti +3
  73. -spawn (/some/where/safe_finger -l @%h | /usr/ucb/mail root) &
  74. +spawn (/usr/sbin/safe_finger -l @%h | /usr/bin/mail root) &
  75. .fi
  76. .sp
  77. executes, in a background child process, the shell command "safe_finger
  78. diff -ruNp tcp_wrappers_7.6.orig/inetcf.c tcp_wrappers_7.6/inetcf.c
  79. --- tcp_wrappers_7.6.orig/inetcf.c 1997-02-12 02:13:24.000000000 +0100
  80. +++ tcp_wrappers_7.6/inetcf.c 2005-03-09 18:27:03.000000000 +0100
  81. @@ -26,13 +26,17 @@ extern void exit();
  82. * guesses. Shorter names follow longer ones.
  83. */
  84. char *inet_files[] = {
  85. +#if 0
  86. "/private/etc/inetd.conf", /* NEXT */
  87. "/etc/inet/inetd.conf", /* SYSV4 */
  88. "/usr/etc/inetd.conf", /* IRIX?? */
  89. +#endif
  90. "/etc/inetd.conf", /* BSD */
  91. +#if 0
  92. "/etc/net/tlid.conf", /* SYSV4?? */
  93. "/etc/saf/tlid.conf", /* SYSV4?? */
  94. "/etc/tlid.conf", /* SYSV4?? */
  95. +#endif
  96. 0,
  97. };
  98. diff -ruNp tcp_wrappers_7.6.orig/tcpd.8 tcp_wrappers_7.6/tcpd.8
  99. --- tcp_wrappers_7.6.orig/tcpd.8 1996-02-21 16:39:16.000000000 +0100
  100. +++ tcp_wrappers_7.6/tcpd.8 2005-03-09 18:27:03.000000000 +0100
  101. @@ -12,7 +12,11 @@ The program supports both 4.3BSD-style s
  102. TLI. Functionality may be limited when the protocol underneath TLI is
  103. not an internet protocol.
  104. .PP
  105. -Operation is as follows: whenever a request for service arrives, the
  106. +There are two possible modes of operation: execution of \fItcpd\fP
  107. +before a service started by \fIinetd\fP, or linking a daemon with
  108. +the \fIlibwrap\fP shared library as documented in the \fIhosts_access\fR(3)
  109. +manual page. Operation when started by \fIinetd\fP
  110. +is as follows: whenever a request for service arrives, the
  111. \fIinetd\fP daemon is tricked into running the \fItcpd\fP program
  112. instead of the desired server. \fItcpd\fP logs the request and does
  113. some additional checks. When all is well, \fItcpd\fP runs the
  114. @@ -88,11 +92,11 @@ configuration files.
  115. .sp
  116. .in +5
  117. # mkdir /other/place
  118. -# mv /usr/etc/in.fingerd /other/place
  119. -# cp tcpd /usr/etc/in.fingerd
  120. +# mv /usr/sbin/in.fingerd /other/place
  121. +# cp tcpd /usr/sbin/in.fingerd
  122. .fi
  123. .PP
  124. -The example assumes that the network daemons live in /usr/etc. On some
  125. +The example assumes that the network daemons live in /usr/sbin. On some
  126. systems, network daemons live in /usr/sbin or in /usr/libexec, or have
  127. no `in.\' prefix to their name.
  128. .SH EXAMPLE 2
  129. @@ -101,35 +105,34 @@ are left in their original place.
  130. .PP
  131. In order to monitor access to the \fIfinger\fR service, perform the
  132. following edits on the \fIinetd\fR configuration file (usually
  133. -\fI/etc/inetd.conf\fR or \fI/etc/inet/inetd.conf\fR):
  134. +\fI/etc/inetd.conf\fR):
  135. .nf
  136. .sp
  137. .ti +5
  138. -finger stream tcp nowait nobody /usr/etc/in.fingerd in.fingerd
  139. +finger stream tcp nowait nobody /usr/sbin/in.fingerd in.fingerd
  140. .sp
  141. becomes:
  142. .sp
  143. .ti +5
  144. -finger stream tcp nowait nobody /some/where/tcpd in.fingerd
  145. +finger stream tcp nowait nobody /usr/sbin/tcpd in.fingerd
  146. .sp
  147. .fi
  148. .PP
  149. -The example assumes that the network daemons live in /usr/etc. On some
  150. +The example assumes that the network daemons live in /usr/sbin. On some
  151. systems, network daemons live in /usr/sbin or in /usr/libexec, the
  152. daemons have no `in.\' prefix to their name, or there is no userid
  153. field in the inetd configuration file.
  154. .PP
  155. Similar changes will be needed for the other services that are to be
  156. covered by \fItcpd\fR. Send a `kill -HUP\' to the \fIinetd\fR(8)
  157. -process to make the changes effective. AIX users may also have to
  158. -execute the `inetimp\' command.
  159. +process to make the changes effective.
  160. .SH EXAMPLE 3
  161. In the case of daemons that do not live in a common directory ("secret"
  162. or otherwise), edit the \fIinetd\fR configuration file so that it
  163. specifies an absolute path name for the process name field. For example:
  164. .nf
  165. .sp
  166. - ntalk dgram udp wait root /some/where/tcpd /usr/local/lib/ntalkd
  167. + ntalk dgram udp wait root /usr/sbin/tcpd /usr/local/lib/ntalkd
  168. .sp
  169. .fi
  170. .PP
  171. @@ -164,6 +167,7 @@ The default locations of the host access
  172. .SH SEE ALSO
  173. .na
  174. .nf
  175. +hosts_access(3), functions provided by the libwrap library.
  176. hosts_access(5), format of the tcpd access control tables.
  177. syslog.conf(5), format of the syslogd control file.
  178. inetd.conf(5), format of the inetd control file.
  179. diff -ruNp tcp_wrappers_7.6.orig/tcpdchk.8 tcp_wrappers_7.6/tcpdchk.8
  180. --- tcp_wrappers_7.6.orig/tcpdchk.8 1995-01-08 17:00:31.000000000 +0100
  181. +++ tcp_wrappers_7.6/tcpdchk.8 2005-03-09 18:27:03.000000000 +0100
  182. @@ -9,8 +9,8 @@ tcpdchk [-a] [-d] [-i inet_conf] [-v]
  183. potential and real problems it can find. The program examines the
  184. \fItcpd\fR access control files (by default, these are
  185. \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the
  186. -entries in these files against entries in the \fIinetd\fR or \fItlid\fR
  187. -network configuration files.
  188. +entries in these files against entries in the \fIinetd\fR
  189. +network configuration file.
  190. .PP
  191. \fItcpdchk\fR reports problems such as non-existent pathnames; services
  192. that appear in \fItcpd\fR access control rules, but are not controlled
  193. @@ -26,14 +26,13 @@ problem.
  194. .SH OPTIONS
  195. .IP -a
  196. Report access control rules that permit access without an explicit
  197. -ALLOW keyword. This applies only when the extended access control
  198. -language is enabled (build with -DPROCESS_OPTIONS).
  199. +ALLOW keyword.
  200. .IP -d
  201. Examine \fIhosts.allow\fR and \fIhosts.deny\fR files in the current
  202. directory instead of the default ones.
  203. .IP "-i inet_conf"
  204. Specify this option when \fItcpdchk\fR is unable to find your
  205. -\fIinetd.conf\fR or \fItlid.conf\fR network configuration file, or when
  206. +\fIinetd.conf\fR network configuration file, or when
  207. you suspect that the program uses the wrong one.
  208. .IP -v
  209. Display the contents of each access control rule. Daemon lists, client
  210. @@ -54,7 +53,6 @@ tcpdmatch(8), explain what tcpd would do
  211. hosts_access(5), format of the tcpd access control tables.
  212. hosts_options(5), format of the language extensions.
  213. inetd.conf(5), format of the inetd control file.
  214. -tlid.conf(5), format of the tlid control file.
  215. .SH AUTHORS
  216. .na
  217. .nf
  218. diff -ruNp tcp_wrappers_7.6.orig/tcpdmatch.8 tcp_wrappers_7.6/tcpdmatch.8
  219. --- tcp_wrappers_7.6.orig/tcpdmatch.8 2005-03-09 18:30:24.000000000 +0100
  220. +++ tcp_wrappers_7.6/tcpdmatch.8 2005-03-09 18:27:03.000000000 +0100
  221. @@ -13,7 +13,7 @@ request for service. Examples are given
  222. The program examines the \fItcpd\fR access control tables (default
  223. \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR) and prints its
  224. conclusion. For maximal accuracy, it extracts additional information
  225. -from your \fIinetd\fR or \fItlid\fR network configuration file.
  226. +from your \fIinetd\fR network configuration file.
  227. .PP
  228. When \fItcpdmatch\fR finds a match in the access control tables, it
  229. identifies the matched rule. In addition, it displays the optional
  230. @@ -50,7 +50,7 @@ Examine \fIhosts.allow\fR and \fIhosts.d
  231. directory instead of the default ones.
  232. .IP "-i inet_conf"
  233. Specify this option when \fItcpdmatch\fR is unable to find your
  234. -\fIinetd.conf\fR or \fItlid.conf\fR network configuration file, or when
  235. +\fIinetd.conf\fR network configuration file, or when
  236. you suspect that the program uses the wrong one.
  237. .SH EXAMPLES
  238. To predict how \fItcpd\fR would handle a telnet request from the local
  239. @@ -86,7 +86,6 @@ tcpdchk(8), tcpd configuration checker
  240. hosts_access(5), format of the tcpd access control tables.
  241. hosts_options(5), format of the language extensions.
  242. inetd.conf(5), format of the inetd control file.
  243. -tlid.conf(5), format of the tlid control file.
  244. .SH AUTHORS
  245. .na
  246. .nf