| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
| |
PR: bin/59674
Submitted by: Vaclav Rehak <vasek@zoom-int.cz>
|
|
|
|
|
| |
this segfaults on ia64. (Cannot cast an int to a pointer).
The rest of the code does it this way rather than use system includes....
|
|\
| |
| |
| | |
which included commits to RCS files with non-trunk default branches.
|
| |
| |
| |
| |
| |
| |
| |
| | |
+* Redistribution and use in source and binary forms, with or without
+* modification, are permitted provided that this entire copyright notice
+* is duplicated in all such copies.
Obtained from: ftp://ftp.porcupine.org/pub/security/tcp_wrappers_license
|
| |
| |
| |
| |
| |
| | |
import.
Submitted by: Tony Finch <dot@dotat.at>
|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
and level names.
Add FreeBSD tag.
PR: 24218
Approved by: markm
|
| |
| |
| |
| |
| |
| |
| |
| | |
- validate scope in sockaddr comparison logic
patch was originally submitted by itojun and slightly modified by me.
Reviewed by: itojun, kris
|
| |
| |
| |
| |
| |
| |
| |
| | |
implementation of getaddrinfo() may return NULL ai_canonname.
There is no consensus how getaddrinfo() should fill ai_canonname
when numeric hostname is given.
Reported by: kris
|
| |
| |
| |
| |
| |
| |
| |
| | |
It enables us to control link-local connections by interface like
this:
ALL : [fe80::%ed0]/10 : allow
ALL : [fe80::]/10 : deny
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
across several packets. This is done by not turning off buffering
on the stdio stream for the ident connection. Originally this was
done to avoid reading back what you'd just written into the buffer.
However ANSI C gives a list of functions which should allow you to
safely change direction on a stdio stream, and Wietse found that
fseek seemed to be the most portable.
The original patch used a different workaround, but this should be
a real fix.
PR: 16086
Reviewed by: wietse@porcupine.org
(Original version) Approved by: markm
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Now when tcp_wrapper is enabled by inetd -wW,
several accesses which should be permitted are refused only for IPv6,
if hostname is used to decide the host to be allowed.
IPv6 users will be just upset.
About security related concern.
-All extensions are wrapped by #ifdef INET6, so people can completely
disable the extension by recompile libwrap without INET6 option.
-Access via IPv6 is not enabled by default.
People need to enable IPv6 access by changing /etc/inetd.conf at first,
by adding tcp6 and/or tcp46 entries.
-The base of patches are from KAME package and are actually daily used
for more than a year in several Japanese IPv6 environments.
-Patches are reviewed by markm.
Approved by: jkh
Submitted by: Hajimu UMEMOTO <ume@mahoroba.org>
Reviewed by: markm
Obtained from: KAME project
|
| |
| |
| |
| |
| |
| |
| |
| | |
be used as a valid pattern in the access control language.
Patch obtained from ftp://ftp.porcupine.org/pub/security/ .
Requested by: markm
|
|/
|
|
| |
for tcpdchk
|
|
Rest of build to follow.
|