OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-src openpkg-web openpkg$ Date:   21-Oct-2003 12:09:13
  Branch: HEAD                             Handle: 2003102111091003

  Added files:
    openpkg-re/vcheck       vc.tcpwrappers
    openpkg-src/tcpwrappers hosts.allow tcpwrappers.patch tcpwrappers.spec
  Modified files:
    openpkg-web             news.txt

  Log:
    new package: tcpwrappers 7.6k (TCP Wrappers Toolkit)

  Summary:
    Revision    Changes     Path
    1.1         +9  -0      openpkg-re/vcheck/vc.tcpwrappers
    1.1         +34 -0      openpkg-src/tcpwrappers/hosts.allow
    1.1         +93 -0      openpkg-src/tcpwrappers/tcpwrappers.patch
    1.1         +121 -0     openpkg-src/tcpwrappers/tcpwrappers.spec
    1.7094      +1  -0      openpkg-web/news.txt
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-re/vcheck/vc.tcpwrappers
  ============================================================================
  $ cvs diff -u -r0 -r1.1 vc.tcpwrappers
  --- /dev/null 2003-10-21 12:09:11.000000000 +0200
  +++ vc.tcpwrappers    2003-10-21 12:09:11.000000000 +0200
  @@ -0,0 +1,9 @@
  +config = {
  +}
  +
  +prog tcpwrappers = {
  +  version   = 7.6k
  +  url       = http://www.web-insights.net/socket_wrappers/
  +  regex     = socket_wrappers-(__VER__)\.tar\.gz
  +}
  +
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/tcpwrappers/hosts.allow
  ============================================================================
  $ cvs diff -u -r0 -r1.1 hosts.allow
  --- /dev/null 2003-10-21 12:09:13.000000000 +0200
  +++ hosts.allow       2003-10-21 12:09:13.000000000 +0200
  @@ -0,0 +1,34 @@
  +##
  +##  hosts.allow -- TCP Wrappers Host Access Control List
  +##
  +
  +#   NOTE: The hosts.deny file is deprecated. Place both 'allow' and
  +#   'deny' rules in the hosts.allow file. See hosts_options(5) for the
  +#   format of this file. hosts_access(5) no longer fully applies.
  +
  +#   Start by allowing everything (this prevents the rest of the file
  +#   from working, so remove it when you need protection).
  +#   The rules here work on a "First match wins" basis.
  +ALL : ALL : allow
  +
  +#   OpenSSH sshd(8)
  +#sshd : .evil.cracker.example.com : deny 
  +
  +#   Protect against simple DNS spoofing attacks by checking that the
  +#   forward and reverse records for the remote host match. If a mismatch
  +#   occurs, access is denied, and any positive ident response within 20
  +#   seconds is logged. No protection is afforded against DNS poisoning,
  +#   IP spoofing or more complicated attacks. Hosts with no reverse DNS
  +#   pass this rule.
  +#ALL : PARANOID : RFC931 20 : deny
  +
  +#   Allow anything from localhost. Note that an IP address (not a host
  +#   name) *MUST* be specified for portmap(8).
  +#ALL : localhost 127.0.0.1 : allow
  +#ALL : my.machine.example.com 192.168.0.1 : allow
  +
  +#   The rest of the daemons are protected.
  +ALL : ALL \
  +    : severity auth.info \
  +    : twist /bin/echo "You are not welcome to use %d from %h."
  +
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/tcpwrappers/tcpwrappers.patch
  ============================================================================
  $ cvs diff -u -r0 -r1.1 tcpwrappers.patch
  --- /dev/null 2003-10-21 12:09:13.000000000 +0200
  +++ tcpwrappers.patch 2003-10-21 12:09:13.000000000 +0200
  @@ -0,0 +1,93 @@
  +Index: Makefile
  +--- Makefile.orig    2003-01-03 19:52:40.000000000 +0100
  ++++ Makefile 2003-10-21 12:08:03.000000000 +0200
  +@@ -128,12 +128,12 @@
  + 386bsd netbsd bsdos:
  +     @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
  +     LIBS= RANLIB=ranlib ARFLAGS=rv AUX_OBJ= NETGROUP= TLI= \
  +-    EXTRA_CFLAGS=VSYSLOG= all
  ++    EXTRA_CFLAGS= VSYSLOG= all
  + 
  + freebsd:
  +     @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
  +     LIBS= RANLIB=ranlib ARFLAGS=rv AUX_OBJ= NETGROUP= TLI= \
  +-    EXTRA_CFLAGS=VSYSLOG= all
  ++    EXTRA_CFLAGS=-I. VSYSLOG= all
  + 
  + linux:
  +     @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
  +Index: tcpd.h
  +--- tcpd.h.orig      2003-01-05 02:15:59.000000000 +0100
  ++++ tcpd.h   2003-10-21 12:08:03.000000000 +0200
  +@@ -7,6 +7,8 @@
  + #ifndef TCP_WRAPPERS_HEADER
  + #define TCP_WRAPPERS_HEADER
  + 
  ++#include <sys/types.h>
  ++#include <sys/socket.h>
  + #include <netinet/in.h>
  + #include <netdb.h>
  + 
  +Index: fix_options.c
  +--- fix_options.c.orig       2003-01-05 02:27:10.000000000 +0100
  ++++ fix_options.c    2003-10-21 12:08:31.000000000 +0200
  +@@ -47,7 +47,14 @@
  +     clean_exit(request);
  +     }
  +     if (ADDR_FAM(&ss) == AF_INET) {
  ++#if defined(__FreeBSD__) || defined(__sun__)
  ++        unsigned char optbuf[BUFFER_SIZE / 3];
  ++        int optlen;
  ++        struct in_addr dummy;
  ++        unsigned char *ucp;
  ++#else
  +         struct ip_opts optbuf;
  ++#endif
  +         char lbuf[BUFFER_SIZE], *lp, *cp;
  +         struct   protoent *ip;
  +         int optsize = sizeof(optbuf);
  +@@ -65,9 +72,15 @@
  +          * here was wrong.
  +          */
  + 
  ++#if defined(__FreeBSD__) || defined(__sun__)
  ++#define ADDR_LEN sizeof(dummy.s_addr)
  ++            for (ucp = optbuf + ADDR_LEN; ucp < optbuf + optsize; ucp += optlen) {
  ++                u_char c = ucp[IPOPT_OPTVAL];
  ++#else
  +             for (i = 0; (void *)&optbuf.ip_opts[i] - (void *)&optbuf <
  +              optsize; ) {
  +             u_char c = (u_char)optbuf.ip_opts[i];
  ++#endif
  +             if (c == IPOPT_LSRR || c == IPOPT_SSRR) {
  +                 syslog(LOG_WARNING,
  +                   "refused connect from %s with IP source routing options",
  +@@ -77,7 +90,17 @@
  +             }
  +             if (c == IPOPT_EOL)
  +                 break;
  ++#if defined(__FreeBSD__) || defined(__sun__)
  ++                if (c == IPOPT_NOP)
  ++                    optlen = 1;
  ++                else {
  ++                    optlen = cp[IPOPT_OLEN];
  ++                    if (optlen <= 0) /* Do not loop! */
  ++                        break;
  ++                }
  ++#else
  +             i += (c == IPOPT_NOP) ? 1 : (u_char)optbuf.ip_opts[i+1];
  ++#endif
  +             }
  +     
  +         lp = lbuf;
  +Index: internal.h
  +--- internal.h.orig  2003-01-05 00:37:53.000000000 +0100
  ++++ internal.h       2003-10-21 12:08:03.000000000 +0200
  +@@ -7,6 +7,7 @@
  + #ifndef IMPL_HEADER
  + #define IMPL_HEADER
  + 
  ++#include <sys/types.h>
  + #include <sys/socket.h>
  + #include <stdio.h>
  + #include <string.h>
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/tcpwrappers/tcpwrappers.spec
  ============================================================================
  $ cvs diff -u -r0 -r1.1 tcpwrappers.spec
  --- /dev/null 2003-10-21 12:09:13.000000000 +0200
  +++ tcpwrappers.spec  2003-10-21 12:09:13.000000000 +0200
  @@ -0,0 +1,121 @@
  +##
  +##  tcpwrappers.spec -- OpenPKG RPM Specification
  +##  Copyright (c) 2000-2003 The OpenPKG Project <http://www.openpkg.org/>
  +##  Copyright (c) 2000-2003 Ralf S. Engelschall <[EMAIL PROTECTED]>
  +##  Copyright (c) 2000-2003 Cable & Wireless <http://www.cw.com/>
  +##
  +##  Permission to use, copy, modify, and distribute this software for
  +##  any purpose with or without fee is hereby granted, provided that
  +##  the above copyright notice and this permission notice appear in all
  +##  copies.
  +##
  +##  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
  +##  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
  +##  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
  +##  IN NO EVENT SHALL THE AUTHORS AND COPYRIGHT HOLDERS AND THEIR
  +##  CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  +##  SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
  +##  LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
  +##  USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
  +##  ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
  +##  OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
  +##  OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  +##  SUCH DAMAGE.
  +##
  +
  +#   package information
  +Name:         tcpwrappers
  +Summary:      TCP Wrappers Toolkit
  +URL:          http://www.web-insights.net/socket_wrappers/
  +Vendor:       Wietse Venema, Steve Grubb
  +Packager:     The OpenPKG Project
  +Distribution: OpenPKG [EVAL]
  +Group:        Network
  +License:      BSD
  +Version:      7.6k
  +Release:      20031021
  +
  +#   list of sources
  +Source0:      
http://www.web-insights.net/socket_wrappers/socket_wrappers-%{version}.tar.gz
  +Source1:      hosts.allow
  +Patch0:       tcpwrappers.patch
  +
  +#   build information
  +Prefix:       %{l_prefix}
  +BuildRoot:    %{l_buildroot}
  +BuildPreReq:  OpenPKG, openpkg >= 20030103
  +PreReq:       OpenPKG, openpkg >= 20030103
  +AutoReq:      no
  +AutoReqProv:  no
  +
  +%description
  +    The TCP Wrappers package allows you to monitor and filter incoming
  +    requests for various network services. It provides tiny daemon
  +    wrapper programs that can be installed without any changes to
  +    existing software or to existing configuration files. The wrappers
  +    report the name of the client host and of the requested service.
  +    The wrappers do not exchange information with the client or server
  +    applications, and impose no overhead on the actual conversation
  +    between the client and server applications.
  +
  +    Additionally, the wrapper functionality is available as a C API
  +    for use in other networking applications, too.
  +
  +    This package actually is based on Steve Grubb's revised version
  +    (Socket Wrappers) of Wietse Venema's original TCP Wrappers.
  +
  +%prep
  +    %setup -q -n socket_wrappers-%{version}
  +    %patch -p0
  +    chmod a+w Makefile.orig
  +    %{l_shtool} subst \
  +        -e 's;/etc/hosts\.deny;%{l_prefix}/etc/tcpwrappers/hosts.deny;g' \
  +        -e 's;/etc/hosts\.allow;%{l_prefix}/etc/tcpwrappers/hosts.allow;g' \
  +        Makefile
  +
  +%build
  +    case "%{l_platform -t}" in
  +        *-freebsd* ) platform="freebsd" ;;
  +        *-linux*   ) platform="linux"   ;;
  +        *-sunos*   ) platform="sunos5"  ;;
  +        *          ) platform="other"   ;;
  +    esac
  +    %{l_make} %{l_mflags} \
  +        $platform \
  +        CC="%{l_cc} %{l_cflags -O}"
  +
  +%install
  +    rm -rf $RPM_BUILD_ROOT
  +    %{l_shtool} mkdir -f -p -m 755 \
  +        $RPM_BUILD_ROOT%{l_prefix}/etc/tcpwrappers \
  +        $RPM_BUILD_ROOT%{l_prefix}/sbin \
  +        $RPM_BUILD_ROOT%{l_prefix}/lib \
  +        $RPM_BUILD_ROOT%{l_prefix}/include \
  +        $RPM_BUILD_ROOT%{l_prefix}/man/man3 \
  +        $RPM_BUILD_ROOT%{l_prefix}/man/man5 \
  +        $RPM_BUILD_ROOT%{l_prefix}/man/man8
  +    %{l_shtool} install -c -s -m 755 \
  +        tcpd tcpdchk tcpdmatch try-from safe_finger \
  +        $RPM_BUILD_ROOT%{l_prefix}/sbin/
  +    %{l_shtool} install -c -m 644 \
  +        tcpd.h $RPM_BUILD_ROOT%{l_prefix}/include/
  +    %{l_shtool} install -c -m 644 \
  +        libwrap.a $RPM_BUILD_ROOT%{l_prefix}/lib/
  +    %{l_shtool} install -c -m 644 \
  +        *.3 $RPM_BUILD_ROOT%{l_prefix}/man/man3/
  +    %{l_shtool} install -c -m 644 \
  +        *.5 $RPM_BUILD_ROOT%{l_prefix}/man/man5/
  +    %{l_shtool} install -c -m 644 \
  +        *.8 $RPM_BUILD_ROOT%{l_prefix}/man/man8/
  +    %{l_shtool} install -c -m 644 \
  +        %{SOURCE hosts.allow} \
  +        $RPM_BUILD_ROOT%{l_prefix}/etc/tcpwrappers/
  +    %{l_rpmtool} files -v -ofiles -r$RPM_BUILD_ROOT \
  +        %{l_files_std} \
  +        '%config %{l_prefix}/etc/tcpwrappers/*'
  +
  +%files -f files
  +
  +%clean
  +    rm -rf $RPM_BUILD_ROOT
  +
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/news.txt
  ============================================================================
  $ cvs diff -u -r1.7093 -r1.7094 news.txt
  --- openpkg-web/news.txt      21 Oct 2003 09:17:24 -0000      1.7093
  +++ openpkg-web/news.txt      21 Oct 2003 10:09:11 -0000      1.7094
  @@ -1,3 +1,4 @@
  +21-Oct-2003: New package: P<tcpwrappers-7.6k-20031021>
   21-Oct-2003: Upgraded package: P<perl-www-1.2.2-1.2.2>
   21-Oct-2003: Upgraded package: P<perl-www-1.3.2-1.3.2>
   21-Oct-2003: Upgraded package: P<perl-5.8.0-1.2.2>
  @@ .
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [EMAIL PROTECTED]

Reply via email to