PNG  IHDRX cHRMz&u0`:pQ<bKGD pHYsodtIME MeqIDATxw]Wug^Qd˶ 6`!N:!@xI~)%7%@Bh&`lnjVF29gΨ4E$|>cɚ{gk= %,a KX%,a KX%,a KX%,a KX%,a KX%,a KX%, b` ǟzeאfp]<!SJmɤY޲ڿ,%c ~ع9VH.!Ͳz&QynֺTkRR.BLHi٪:l;@(!MԴ=žI,:o&N'Kù\vRmJ雵֫AWic H@" !: Cé||]k-Ha oݜ:y F())u]aG7*JV@J415p=sZH!=!DRʯvɱh~V\}v/GKY$n]"X"}t@ xS76^[bw4dsce)2dU0 CkMa-U5tvLƀ~mlMwfGE/-]7XAƟ`׮g ewxwC4\[~7@O-Q( a*XGƒ{ ՟}$_y3tĐƤatgvێi|K=uVyrŲlLӪuܿzwk$m87k( `múcE)"@rK( z4$D; 2kW=Xb$V[Ru819קR~qloѱDyįݎ*mxw]y5e4K@ЃI0A D@"BDk_)N\8͜9dz"fK0zɿvM /.:2O{ Nb=M=7>??Zuo32 DLD@D| &+֎C #B8ַ`bOb $D#ͮҪtx]%`ES`Ru[=¾!@Od37LJ0!OIR4m]GZRJu$‡c=%~s@6SKy?CeIh:[vR@Lh | (BhAMy=݃  G"'wzn޺~8ԽSh ~T*A:xR[ܹ?X[uKL_=fDȊ؂p0}7=D$Ekq!/t.*2ʼnDbŞ}DijYaȲ(""6HA;:LzxQ‘(SQQ}*PL*fc\s `/d'QXW, e`#kPGZuŞuO{{wm[&NBTiiI0bukcA9<4@SӊH*؎4U/'2U5.(9JuDfrޱtycU%j(:RUbArLֺN)udA':uGQN"-"Is.*+k@ `Ojs@yU/ H:l;@yyTn}_yw!VkRJ4P)~y#)r,D =ě"Q]ci'%HI4ZL0"MJy 8A{ aN<8D"1#IJi >XjX֔#@>-{vN!8tRݻ^)N_╗FJEk]CT՟ YP:_|H1@ CBk]yKYp|og?*dGvzنzӴzjֺNkC~AbZƷ`.H)=!QͷVTT(| u78y֮}|[8-Vjp%2JPk[}ԉaH8Wpqhwr:vWª<}l77_~{s۴V+RCģ%WRZ\AqHifɤL36: #F:p]Bq/z{0CU6ݳEv_^k7'>sq*+kH%a`0ԣisqにtү04gVgW΂iJiS'3w.w}l6MC2uԯ|>JF5`fV5m`Y**Db1FKNttu]4ccsQNnex/87+}xaUW9y>ͯ骵G{䩓Գ3+vU}~jJ.NFRD7<aJDB1#ҳgSb,+CS?/ VG J?|?,2#M9}B)MiE+G`-wo߫V`fio(}S^4e~V4bHOYb"b#E)dda:'?}׮4繏`{7Z"uny-?ǹ;0MKx{:_pÚmFמ:F " .LFQLG)Q8qN q¯¯3wOvxDb\. BKD9_NN &L:4D{mm o^tֽ:q!ƥ}K+<"m78N< ywsard5+вz~mnG)=}lYݧNj'QJS{S :UYS-952?&O-:W}(!6Mk4+>A>j+i|<<|;ر^߉=HE|V#F)Emm#}/"y GII웻Jі94+v뾧xu~5C95~ūH>c@덉pʃ1/4-A2G%7>m;–Y,cyyaln" ?ƻ!ʪ<{~h~i y.zZB̃/,雋SiC/JFMmBH&&FAbϓO^tubbb_hZ{_QZ-sύodFgO(6]TJA˯#`۶ɟ( %$&+V'~hiYy>922 Wp74Zkq+Ovn錄c>8~GqܲcWꂎz@"1A.}T)uiW4="jJ2W7mU/N0gcqܗOO}?9/wìXžΏ0 >֩(V^Rh32!Hj5`;O28؇2#ݕf3 ?sJd8NJ@7O0 b־?lldщ̡&|9C.8RTWwxWy46ah嘦mh٤&l zCy!PY?: CJyв]dm4ǜҐR޻RլhX{FƯanшQI@x' ao(kUUuxW_Ñ줮[w8 FRJ(8˼)_mQ _!RJhm=!cVmm ?sFOnll6Qk}alY}; "baӌ~M0w,Ggw2W:G/k2%R,_=u`WU R.9T"v,<\Ik޽/2110Ӿxc0gyC&Ny޽JҢrV6N ``یeA16"J³+Rj*;BϜkZPJaÍ<Jyw:NP8/D$ 011z֊Ⱳ3ι֘k1V_"h!JPIΣ'ɜ* aEAd:ݺ>y<}Lp&PlRfTb1]o .2EW\ͮ]38؋rTJsǏP@芎sF\> P^+dYJLbJ C-xϐn> ι$nj,;Ǖa FU *择|h ~izť3ᤓ`K'-f tL7JK+vf2)V'-sFuB4i+m+@My=O҈0"|Yxoj,3]:cо3 $#uŘ%Y"y죯LebqtҢVzq¼X)~>4L׶m~[1_k?kxֺQ`\ |ٛY4Ѯr!)N9{56(iNq}O()Em]=F&u?$HypWUeB\k]JɩSع9 Zqg4ZĊo oMcjZBU]B\TUd34ݝ~:7ڶSUsB0Z3srx 7`:5xcx !qZA!;%͚7&P H<WL!džOb5kF)xor^aujƍ7 Ǡ8/p^(L>ὴ-B,{ۇWzֺ^k]3\EE@7>lYBȝR.oHnXO/}sB|.i@ɥDB4tcm,@ӣgdtJ!lH$_vN166L__'Z)y&kH;:,Y7=J 9cG) V\hjiE;gya~%ks_nC~Er er)muuMg2;֫R)Md) ,¶ 2-wr#F7<-BBn~_(o=KO㭇[Xv eN_SMgSҐ BS헃D%g_N:/pe -wkG*9yYSZS.9cREL !k}<4_Xs#FmҶ:7R$i,fi!~' # !6/S6y@kZkZcX)%5V4P]VGYq%H1!;e1MV<!ϐHO021Dp= HMs~~a)ަu7G^];git!Frl]H/L$=AeUvZE4P\.,xi {-~p?2b#amXAHq)MWǾI_r`S Hz&|{ +ʖ_= (YS(_g0a03M`I&'9vl?MM+m~}*xT۲(fY*V4x@29s{DaY"toGNTO+xCAO~4Ϳ;p`Ѫ:>Ҵ7K 3}+0 387x\)a"/E>qpWB=1 ¨"MP(\xp߫́A3+J] n[ʼnӼaTbZUWb={~2ooKױӰp(CS\S筐R*JغV&&"FA}J>G֐p1ٸbk7 ŘH$JoN <8s^yk_[;gy-;߉DV{c B yce% aJhDȶ 2IdйIB/^n0tNtџdcKj4϶v~- CBcgqx9= PJ) dMsjpYB] GD4RDWX +h{y`,3ꊕ$`zj*N^TP4L:Iz9~6s) Ga:?y*J~?OrMwP\](21sZUD ?ܟQ5Q%ggW6QdO+\@ ̪X'GxN @'4=ˋ+*VwN ne_|(/BDfj5(Dq<*tNt1х!MV.C0 32b#?n0pzj#!38}޴o1KovCJ`8ŗ_"]] rDUy޲@ Ȗ-;xџ'^Y`zEd?0„ DAL18IS]VGq\4o !swV7ˣι%4FѮ~}6)OgS[~Q vcYbL!wG3 7띸*E Pql8=jT\꘿I(z<[6OrR8ºC~ډ]=rNl[g|v TMTղb-o}OrP^Q]<98S¤!k)G(Vkwyqyr޽Nv`N/e p/~NAOk \I:G6]4+K;j$R:Mi #*[AȚT,ʰ,;N{HZTGMoּy) ]%dHء9Պ䠬|<45,\=[bƟ8QXeB3- &dҩ^{>/86bXmZ]]yޚN[(WAHL$YAgDKp=5GHjU&99v簪C0vygln*P)9^͞}lMuiH!̍#DoRBn9l@ xA/_v=ȺT{7Yt2N"4!YN`ae >Q<XMydEB`VU}u]嫇.%e^ánE87Mu\t`cP=AD/G)sI"@MP;)]%fH9'FNsj1pVhY&9=0pfuJ&gޤx+k:!r˭wkl03׼Ku C &ѓYt{.O.zҏ z}/tf_wEp2gvX)GN#I ݭ߽v/ .& и(ZF{e"=V!{zW`, ]+LGz"(UJp|j( #V4, 8B 0 9OkRrlɱl94)'VH9=9W|>PS['G(*I1==C<5"Pg+x'K5EMd؞Af8lG ?D FtoB[je?{k3zQ vZ;%Ɠ,]E>KZ+T/ EJxOZ1i #T<@ I}q9/t'zi(EMqw`mYkU6;[t4DPeckeM;H}_g pMww}k6#H㶏+b8雡Sxp)&C $@'b,fPߑt$RbJ'vznuS ~8='72_`{q纶|Q)Xk}cPz9p7O:'|G~8wx(a 0QCko|0ASD>Ip=4Q, d|F8RcU"/KM opKle M3#i0c%<7׿p&pZq[TR"BpqauIp$ 8~Ĩ!8Սx\ւdT>>Z40ks7 z2IQ}ItԀ<-%S⍤};zIb$I 5K}Q͙D8UguWE$Jh )cu4N tZl+[]M4k8֦Zeq֮M7uIqG 1==tLtR,ƜSrHYt&QP윯Lg' I,3@P'}'R˪e/%-Auv·ñ\> vDJzlӾNv5:|K/Jb6KI9)Zh*ZAi`?S {aiVDԲuy5W7pWeQJk֤#5&V<̺@/GH?^τZL|IJNvI:'P=Ϛt"¨=cud S Q.Ki0 !cJy;LJR;G{BJy޺[^8fK6)=yʊ+(k|&xQ2`L?Ȓ2@Mf 0C`6-%pKpm')c$׻K5[J*U[/#hH!6acB JA _|uMvDyk y)6OPYjœ50VT K}cǻP[ $:]4MEA.y)|B)cf-A?(e|lɉ#P9V)[9t.EiQPDѠ3ϴ;E:+Օ t ȥ~|_N2,ZJLt4! %ա]u {+=p.GhNcŞQI?Nd'yeh n7zi1DB)1S | S#ًZs2|Ɛy$F SxeX{7Vl.Src3E℃Q>b6G ўYCmtկ~=K0f(=LrAS GN'ɹ9<\!a`)֕y[uՍ[09` 9 +57ts6}b4{oqd+J5fa/,97J#6yν99mRWxJyѡyu_TJc`~W>l^q#Ts#2"nD1%fS)FU w{ܯ R{ ˎ󅃏џDsZSQS;LV;7 Od1&1n$ N /.q3~eNɪ]E#oM~}v֯FڦwyZ=<<>Xo稯lfMFV6p02|*=tV!c~]fa5Y^Q_WN|Vs 0ҘދU97OI'N2'8N֭fgg-}V%y]U4 峧p*91#9U kCac_AFңĪy뚇Y_AiuYyTTYЗ-(!JFLt›17uTozc. S;7A&&<ԋ5y;Ro+:' *eYJkWR[@F %SHWP 72k4 qLd'J "zB6{AC0ƁA6U.'F3:Ȅ(9ΜL;D]m8ڥ9}dU "v!;*13Rg^fJyShyy5auA?ɩGHRjo^]׽S)Fm\toy 4WQS@mE#%5ʈfFYDX ~D5Ϡ9tE9So_aU4?Ѽm%&c{n>.KW1Tlb}:j uGi(JgcYj0qn+>) %\!4{LaJso d||u//P_y7iRJ߬nHOy) l+@$($VFIQ9%EeKʈU. ia&FY̒mZ=)+qqoQn >L!qCiDB;Y<%} OgBxB!ØuG)WG9y(Ą{_yesuZmZZey'Wg#C~1Cev@0D $a@˲(.._GimA:uyw֬%;@!JkQVM_Ow:P.s\)ot- ˹"`B,e CRtaEUP<0'}r3[>?G8xU~Nqu;Wm8\RIkբ^5@k+5(By'L&'gBJ3ݶ!/㮻w҅ yqPWUg<e"Qy*167΃sJ\oz]T*UQ<\FԎ`HaNmڜ6DysCask8wP8y9``GJ9lF\G g's Nn͵MLN֪u$| /|7=]O)6s !ĴAKh]q_ap $HH'\1jB^s\|- W1:=6lJBqjY^LsPk""`]w)󭃈,(HC ?䔨Y$Sʣ{4Z+0NvQkhol6C.婧/u]FwiVjZka&%6\F*Ny#8O,22+|Db~d ~Çwc N:FuuCe&oZ(l;@ee-+Wn`44AMK➝2BRՈt7g*1gph9N) *"TF*R(#'88pm=}X]u[i7bEc|\~EMn}P瘊J)K.0i1M6=7'_\kaZ(Th{K*GJyytw"IO-PWJk)..axӝ47"89Cc7ĐBiZx 7m!fy|ϿF9CbȩV 9V-՛^pV̌ɄS#Bv4-@]Vxt-Z, &ֺ*diؠ2^VXbs֔Ìl.jQ]Y[47gj=幽ex)A0ip׳ W2[ᎇhuE^~q흙L} #-b۸oFJ_QP3r6jr+"nfzRJTUqoaۍ /$d8Mx'ݓ= OՃ| )$2mcM*cЙj}f };n YG w0Ia!1Q.oYfr]DyISaP}"dIӗթO67jqR ҊƐƈaɤGG|h;t]䗖oSv|iZqX)oalv;۩meEJ\!8=$4QU4Xo&VEĊ YS^E#d,yX_> ۘ-e\ "Wa6uLĜZi`aD9.% w~mB(02G[6y.773a7 /=o7D)$Z 66 $bY^\CuP. (x'"J60׿Y:Oi;F{w佩b+\Yi`TDWa~|VH)8q/=9!g߆2Y)?ND)%?Ǐ`k/sn:;O299yB=a[Ng 3˲N}vLNy;*?x?~L&=xyӴ~}q{qE*IQ^^ͧvü{Huu=R|>JyUlZV, B~/YF!Y\u_ݼF{_C)LD]m {H 0ihhadd nUkf3oٺCvE\)QJi+֥@tDJkB$1!Đr0XQ|q?d2) Ӣ_}qv-< FŊ߫%roppVBwü~JidY4:}L6M7f٬F "?71<2#?Jyy4뷢<_a7_=Q E=S1И/9{+93֮E{ǂw{))?maÆm(uLE#lïZ  ~d];+]h j?!|$F}*"4(v'8s<ŏUkm7^7no1w2ؗ}TrͿEk>p'8OB7d7R(A 9.*Mi^ͳ; eeUwS+C)uO@ =Sy]` }l8^ZzRXj[^iUɺ$tj))<sbDJfg=Pk_{xaKo1:-uyG0M ԃ\0Lvuy'ȱc2Ji AdyVgVh!{]/&}}ċJ#%d !+87<;qN޼Nفl|1N:8ya  8}k¾+-$4FiZYÔXk*I&'@iI99)HSh4+2G:tGhS^繿 Kتm0 вDk}֚+QT4;sC}rՅE,8CX-e~>G&'9xpW,%Fh,Ry56Y–hW-(v_,? ; qrBk4-V7HQ;ˇ^Gv1JVV%,ik;D_W!))+BoS4QsTM;gt+ndS-~:11Sgv!0qRVh!"Ȋ(̦Yl.]PQWgٳE'`%W1{ndΗBk|Ž7ʒR~,lnoa&:ü$ 3<a[CBݮwt"o\ePJ=Hz"_c^Z.#ˆ*x z̝grY]tdkP*:97YľXyBkD4N.C_[;F9`8& !AMO c `@BA& Ost\-\NX+Xp < !bj3C&QL+*&kAQ=04}cC!9~820G'PC9xa!w&bo_1 Sw"ܱ V )Yl3+ס2KoXOx]"`^WOy :3GO0g;%Yv㐫(R/r (s } u B &FeYZh0y> =2<Ϟc/ -u= c&׭,.0"g"7 6T!vl#sc>{u/Oh Bᾈ)۴74]x7 gMӒ"d]U)}" v4co[ ɡs 5Gg=XR14?5A}D "b{0$L .\4y{_fe:kVS\\O]c^W52LSBDM! C3Dhr̦RtArx4&agaN3Cf<Ԉp4~ B'"1@.b_/xQ} _߃҉/gٓ2Qkqp0շpZ2fԫYz< 4L.Cyυι1t@鎫Fe sYfsF}^ V}N<_`p)alٶ "(XEAVZ<)2},:Ir*#m_YӼ R%a||EƼIJ,,+f"96r/}0jE/)s)cjW#w'Sʯ5<66lj$a~3Kʛy 2:cZ:Yh))+a߭K::N,Q F'qB]={.]h85C9cr=}*rk?vwV렵ٸW Rs%}rNAkDv|uFLBkWY YkX מ|)1!$#3%y?pF<@<Rr0}: }\J [5FRxY<9"SQdE(Q*Qʻ)q1E0B_O24[U'],lOb ]~WjHޏTQ5Syu wq)xnw8~)c 쫬gٲߠ H% k5dƝk> kEj,0% b"vi2Wس_CuK)K{n|>t{P1򨾜j>'kEkƗBg*H%'_aY6Bn!TL&ɌOb{c`'d^{t\i^[uɐ[}q0lM˕G:‚4kb祔c^:?bpg… +37stH:0}en6x˟%/<]BL&* 5&fK9Mq)/iyqtA%kUe[ڛKN]Ě^,"`/ s[EQQm?|XJ߅92m]G.E΃ח U*Cn.j_)Tѧj̿30ڇ!A0=͜ar I3$C^-9#|pk!)?7.x9 @OO;WƝZBFU keZ75F6Tc6"ZȚs2y/1 ʵ:u4xa`C>6Rb/Yм)^=+~uRd`/|_8xbB0?Ft||Z\##|K 0>>zxv8۴吅q 8ĥ)"6>~\8:qM}#͚'ĉ#p\׶ l#bA?)|g g9|8jP(cr,BwV (WliVxxᡁ@0Okn;ɥh$_ckCgriv}>=wGzβ KkBɛ[˪ !J)h&k2%07δt}!d<9;I&0wV/ v 0<H}L&8ob%Hi|޶o&h1L|u֦y~󛱢8fٲUsւ)0oiFx2}X[zVYr_;N(w]_4B@OanC?gĦx>мgx>ΛToZoOMp>40>V Oy V9iq!4 LN,ˢu{jsz]|"R޻&'ƚ{53ўFu(<٪9:΋]B;)B>1::8;~)Yt|0(pw2N%&X,URBK)3\zz&}ax4;ǟ(tLNg{N|Ǽ\G#C9g$^\}p?556]/RP.90 k,U8/u776s ʪ_01چ|\N 0VV*3H鴃J7iI!wG_^ypl}r*jɤSR 5QN@ iZ#1ٰy;_\3\BQQ x:WJv츟ٯ$"@6 S#qe딇(/P( Dy~TOϻ<4:-+F`0||;Xl-"uw$Цi󼕝mKʩorz"mϺ$F:~E'ҐvD\y?Rr8_He@ e~O,T.(ފR*cY^m|cVR[8 JҡSm!ΆԨb)RHG{?MpqrmN>߶Y)\p,d#xۆWY*,l6]v0h15M˙MS8+EdI='LBJIH7_9{Caз*Lq,dt >+~ّeʏ?xԕ4bBAŚjﵫ!'\Ը$WNvKO}ӽmSşذqsOy?\[,d@'73'j%kOe`1.g2"e =YIzS2|zŐƄa\U,dP;jhhhaxǶ?КZ՚.q SE+XrbOu%\GتX(H,N^~]JyEZQKceTQ]VGYqnah;y$cQahT&QPZ*iZ8UQQM.qo/T\7X"u?Mttl2Xq(IoW{R^ ux*SYJ! 4S.Jy~ BROS[V|žKNɛP(L6V^|cR7i7nZW1Fd@ Ara{詑|(T*dN]Ko?s=@ |_EvF]׍kR)eBJc" MUUbY6`~V޴dJKß&~'d3i WWWWWW
Current Directory: /usr/share/doc/tcp_wrappers-libs
Viewing File: /usr/share/doc/tcp_wrappers-libs/CHANGES
Request: after building the programs, please run the `tcpdchk' wrapper configuration checker. See the `tcpdchk.8' manual page (`nroff -man' format) for instructions. `tcpdchk' automatically identifies the most common configuration problems, and will save you and me a lot of time. Changes per release 7.6 (Mar 1997) ================================== - Improved the anti source-routing protection. The code in version 7.5 was not as strong as it could be, because I tried to be compatible with Linux. That was a mistake. Sorry for the inconvenience. - The program no longer terminates case of a source-routed connection, making the IP-spoofing code more usable for long-running daemons. - When syslogging DNS hostname problems, always stop after a limited number of characters. Changes per release 7.5 (Feb 1997) ================================== - Optionally refuse source-routed TCP connections requests altogether. Credits to Niels Provos of Universitaet Hamburg. File: fix_options.c. - Support for IRIX 6 (Lael Tucker). - Support for Amdahl UTS 2.1.5 (Richard E. Richmond). - Support for SINIX 5.42 (Klaus Nielsen). - SCO 5 now has vsyslog() (Bill Golden). - Hints and tips for dealing with IRIX inetd (Niko Makila, Aaron M Lee). - Support for BSD/OS (Paul Borman). - Support for Tandem (Emad Qawas). - Support for ISC (Frederick B. Cohen). - Workaround for UNICOS - it would choke on a setjmp() expression (Bruce Kelly). File: hosts_access.c, tcpdchk.c. - Increased the level of buffer overflow paranoia when printing unwanted IP options. File: fix_options.c. Changes per release 7.4 (Mar 1996) ================================== - IRIX 5.3 (and possibly, earlier releases, too) library routines call the non-reentrant strtok() routine. The result is that hosts may slip through allow/deny filters. Workaround is to not rely on the vendor's strtok() routine (#ifdef LIBC_CALLS_STRTOK). Credits to Th. Eifert (Aachen University) for spotting this one. This fix supersedes the earlier workaround for a similar problem in FreeBSD 2.0. Changes per release 7.3 (Feb 1996) ================================== - More tests added to tcpdchk and tcpdmatch: make sure that the REAL_DAEMON_DIR actually is a directory and not a regular file; detect if tcpd recursively calls itself. - Edwin Kremer found an amusing fencepost error in the xgets() routine: lines longer than BUFLEN characters would be garbled. - The access control routines now refuse to execute "dangerous" actions such as `twist' when they are called from within a resident process. This prevents you from shooting yourself into the foot with critical systems programs such as, e.g., portmap or rpcbind. - Support for Unicos 8.x (Bruce Kelly). The program now closes the syslog client socket before running the real daemon: Cray UNICOS refuses to checkpoint processes with open network ports. - Support for MachTen UNIX (Albert M.C Tam). - Support for Interactive UNIX R3.2 V4.0 (Bobby D. Wright). - Support for SCO 3.2v5.0.0 OpenServer 5 (bob@odt.handy.com) - Support for Unixware 1.x and Unixware 2.x. The old Unixware Makefile rule was broken. Sorry about that. - Some FreeBSD 2.0 libc routines call strtok() and severely mess up the allow/deny rule processing. This is very bad. Workaround: call our own strtok() clone (#ifdef USE_STRSEP). - The programs now log a warning when they detect that a non-existent banner directory is specified. - The hosts_access.3 manual page used obsolete names for the RQ_* constants. Changes per release 7.2 (Jan 1995) ================================== - Added a note to the README and manpages on using the IDENT service to detect sequence number spoofing and other host impersonation attacks. - Portability: ConvexOS puts RPC version numbers before the daemon path name (Jukka Ukkonen). - Portability: the AIX compiler disliked the strchr() declaration in socket.c. I should have removed it when I included <string.h>. - Backwards compatibility: some people relied on the old leading dot or trailing dot magic in daemon process names. - Backwards compatibility: hostname lookup remains enabled when -DPARANOID is turned off. In order to disable hostname lookups you must turn off -DALWAYS_HOSTNAME. - Eliminated false complaints from the tcpdmatch/tcpdchk configuration checking programs about process names not in inetd.conf or about KNOWN username patterns. Changes per release 7.1 (Jan 1995) ================================== - Portability: HP-UX permits you to break inetd.conf entries with backslash-newline. - Portability: EP/IX has no putenv() and some inetd.conf entries are spread out over two lines. - Portability: SCO with NIS support has no *netgrent() routines. Changes per release 7.0 (Jan 1995) ================================== - Added a last-minute workaround for a Solaris 2.4 gethostbyname() foulup with multi-homed hosts in DNS through NIS mode. - Added a last-minute defense against TLI weirdness: address lookups apparently succeed but the result netbuf is empty (ticlts transport). - Dropped several new solutions that were in need of a problem. Beta testers may recognize what new features were kicked out during the last weeks before release 7.0 came out. Such is life. - Got rid of out the environment replacement routines, at least for most architectures. One should not have to replace working system software when all that is needed is a 4.4BSD setenv() emulator. - By popular request I have added an option to send banner messages to clients. There is a Banners.Makefile that gives some aid for sites that are going to use this feature. John C. Wingenbach did some pioneering work here. I used to think that banners are frivolous. Now that I had a personal need for them I know that banners can be useful. - At last: an extensible functional interface to the pattern matching engine. request_init() and request_set() accept a variable-length name-value argument list. The result can be passed to hosts_access(). - When PARANOID mode is disabled (compile time), the wrapper does no hostname lookup or hostname double checks unless required by %letter expansions, or by access control rules that match host names. This is useful for sites that don't care about internet hostnames anyway. Inspired by the authors of the firewalls and internet security book. - When PARANOID mode is disabled (compile time), hosts with a name/name or name/address conflict can be matched with the PARANOID host wildcard pattern, so that you can take some intelligent action instead of just dropping clients. Like showing a banner that explains the problem. - New percent escapes: %A expands to the server address; %H expands to the corresponding hostname (or address if no name is available); %n and %N expand to the client and server hostname (or "unknown"); %s expands to everything we know about the server endpoint (the opposite of the %c sequence for client information). - Symmetry: server and client host information is now treated on equal footing, so that we can reuse a lot of code. - Lazy evaluation of host names, host addresses, usernames, and so on, to avoid doing unnecessary work. - Dropping #ifdefs for some archaic systems made the code simpler. - Dropping the FAIL pattern made the pattern matcher much simpler. Run the "tcpdchk" program to scan your access control files for any uses of this obscure language feature. - Moving host-specific pattern matching from string_match() to the host_match() routine made the code more accurate. Run the "tcpdchk" program to scan your access control files for any dependencies on undocumented or obscure language features that are gone. - daemon@host patterns trigger on clients that connect to a specific internet address. This can be useful for service providers that offer multiple ftp or www archives on different internet addresses, all belonging to one and the same host (www.foo.com, ftp.bar.com, you get the idea). Inspired by a discussion with Rop Gonggrijp, Cor Bosman, and Casper Dik, and earlier discussions with Adrian van Bloois. - The new "tcpdchk" program critcizes all your access control rules and inetd.conf entries. Great for spotting obscure bugs in my own hosts.xxx files. This program also detects hosts with name/address conflicts and with other DNS-related problems. See the "tcpdchk.8" manual page. - The "tcpdmatch" program replaces the poor old "try" command. The new program looks in your inetd.conf file and therefore produces much more accurate predictions. In addition, it detects hosts with name/address conflicts and with other DNS-related problems. See the "tcpdmatch.8" manual page. The inetd.conf lookup was suggested by Everett F Batey. - In the access control tables, the `=' between option name and value is no longer required. - Added 60-second timeout to the safe_finger command, to cover another potential problem. Suggested by Peter Wemm. - Andrew Maffei provided code that works with WIN-TCP on NCR System V.4 UNIX. It reportedly works with versions 02.02.01 and 02.03.00. The code pops off all streams modules above the device driver, pushes the timod module to get at the peer address, and then restores the streams stack to the initial state. Changes per release 6.3 (Mar 1994) ================================== - Keepalives option, to get rid of stuck daemons when people turn off their PC while still connected. Files: options.c, hosts_options.5. - Nice option, to calm down network daemons that take away too much CPU time. Files: options.c, hosts_options.5. - Ultrix perversion: the environ global pointer may be null. The environment replacement routines now check for this. File: environ.c. - Fixed a few places that still assumed the socket is on standard input. Fixed some error messages that did not provide access control file name and line number. File: options.c. - Just when I was going to release 6.2 I received code for Dynix/PTX. That code is specific to PTX 2.x, so I'll keep around my generic PTX code just in case. The difference is in the handling of UDP services. Files: tli_sequent.[hc]. Changes per release 6.2 (Feb 1994) ================================== - Resurrected my year-old code to reduce DNS load by appending a dot to the gethostbyname() argument. This feature is still experimental and it may go away if it causes more problems than it solves. File: socket.c. - Auxiliary code for the Pyramid, BSD universe. Karl Vogel figured out what was missing: yp_get_default_domain() and vfprintf(). Files: workarounds.c, vfprintf.c. - Improved support for Dynix/PTX. The wrapper should now be able to deal with all TLI over IP services. File: ptx.c. - The try command now uses the hostname that gethostbyaddr() would return, instead of the hostname returned by gethostbyname(). This can be significant on systems with NIS that have short host names in the hosts map. For example, gethostbyname("wzv.win.tue.nl") returns "wzv.win.tue.nl"; gethostbyaddr(131.155.210.17) returns "wzv", and that is what we should test with. File: try.c. Changes per release 6.1 (Dec 1993) ================================== - Re-implemented all environment access routines. Most systems have putenv() but no setenv(), some systems have setenv() but no putenv(), and there are even systems that have neither setenv() nor putenv(). The benefit of all this is that more systems can now be treated in the same way. File: environ.c. - Workaround for a weird problem with DG/UX when the wrapper is run as nobody (i.e. fingerd). For some reason the ioctl(fd, I_FIND, "sockmod") call fails even with socket-based applications. The "fix" is to always assume sockets when the ioctl(fd, I_FIND, "timod") call fails. File: fromhost.c. Thanks to Paul de Vries (vries@dutentb.et.tudelft.nl) for helping me to figure out this one. - Implemented a workaround for Dynix/PTX and other systems with TLI that lack some essential support routines. Thanks to Bugs Brouillard (brouill@hsuseq.humboldt.edu) for the hospitality to try things out. The trick is to temporarily switch to the socket API to identify the client, and to switch back to TLI when done. It still does not work right for basic network services such as telnet. File: fromhost.c. - Easy-to-build procedures for SCO UNIX, ConvexOS with UltraNet, EP/IX, Dynix 3.2, Dynix/PTX. File: Makefile. - Variable rfc931 timeout. Files: rfc931.c, options.c, log_tcp.h, try.c. - Further simplification of the rfc931 code. File: rfc931.c. - The fromhost() interface stinks: I cannot change that, but at least the from_sock() and from_tli() functions now accept a file descriptor argument. - Fixed a buglet: fromhost() would pass a garbage file descriptor to the isastream() call. - On some systems the finger client program lives in /usr/bsd. File: safe_finger.c. Changes per release 6.0 (Sept 1993) =================================== - Easy build procedures for common platforms (sun, ultrix, aix, hpux and others). - TLI support, System V.4 style (Solaris, DG/UX). - Username lookup integrated with the access control language. Selective username lookups are now the default (was: no username lookups). - A safer finger command for booby traps. This one solves a host of possible problems with automatic reverse fingers. Thanks, Borja Marcos (borjam@we.lc.ehu.es) for some inspiring discussions. - KNOWN pattern that matches hosts whose name and address are known. - Cleanup of diagnostics. Errors in access-control files are now shown with file name and line number. - With AIX 3.2, hostnames longer than 32 would be truncated. This caused hostname verification failures, so that service would be refused when paranoid mode was enabled. Found by: Adrian van Bloois (A.vanBloois@info.nic.surfnet.nl). - With some IRIX versions, remote username lookups failed because the fgets() library function does not handle partial read()s from sockets. Found by: Daniel O'Callaghan (danny@austin.unimelb.edu.au). - Added a DISCLAIMER document to help you satisfy legal departments. The extension language module has undergone major revisions and extensions. Thanks, John P. Rouillard (rouilj@ra.cs.umb.edu) for discussions, experiments, and for being a good guinea pig. The extensions are documented in hosts_options.5, and are enabled by editing the Makefile STYLE macro definition. - (Extension language) The ":" separator may now occur within options as long as it is protected with a backslash. A warning is issued when a rule ends on ":". - (Extension language) Better verification mode. When the `try' command is run, each option function now explains what it would do. - (Extension language) New "allow" and "deny" keywords so you can now have all rules within a single file. See "nroff -man hosts_options.5" for examples. - (Extension language) "linger" keyword to set the socket linger time (SO_LINGER). From: Marc Boucher <marc@cam.org>. - (Extension language) "severity" keyword to turn the logging noise up or down. Many sites wanted a means to shut up the program; other sites wanted to emphasize specific events. Adapted from code contributed by Dave Mitchell <D.Mitchell@dcs.shef.ac.uk>. Changes per release 5.1 (Mar 1993) ================================== - The additional protection against source-routing attacks from hosts that pretend to have someone elses network address has become optional because it causes kernel panics with SunOS <= 4.1.3. Changes per release 5.0 (Mar 1993) ================================== - Additional protection against source-routing attacks from hosts that pretend to have someone elses network address. For example, the address of a trusted host within your own network. - The access control language has been extended with a simple but powerful operator that greatly simplifies the design of rule sets (ALL: .foo.edu EXCEPT dialup.foo.edu). Blank lines are permitted, and long lines can be continued with backslash-newline. - All configurable stuff, including path names, has been moved into the Makefile so that you no longer have to hack source code to just configure the programs. - Ported to Solaris 2. TLI-based applications not yet supported. Several workarounds for System V bugs. - A small loophole in the netgroup lookup code was closed, and the remote username lookup code was made more portable. - Still more documentation. The README file now provides tutorial sections with introductions to client, server, inetd and syslogd. Changes per release 4.3 (Aug 1992) ================================== - Some sites reported that connections would be rejected because localhost != localhost.domain. The host name checking code now special-cases localhost (problem reported by several sites). - The programs now report an error if an existing access control file cannot be opened (e.g. due to lack of privileges). Until now, the programs would just pretend that the access control file does not exist (reported by Darren Reed, avalon@coombs.anu.edu.au). - The timeout period for remote userid lookups was upped to 30 seconds, in order to cope with slow hosts or networks. If this is too long for you, adjust the TIMEOUT definition in file rfc931.c (problem reported by several sites). - On hosts with more than one IP network interface, remote userid lookups could use the IP address of the "wrong" local interface. The problem and its solution were discussed on the rfc931-users mailing list. Scott Schwartz (schwartz@cs.psu.edu) folded the fix into the rfc931.c module. - The result of % expansion (in shell commands) is now checked for stuff that may confuse the shell; it is replaced by underscores (problem reported by Icarus Sparry, I.Sparry@gdr.bath.ac.uk). - A portability problem was fixed that caused compile-time problems on a CRAY (problem reported by Michael Barnett, mikeb@rmit.edu.au). Changes per release 4.0 (Jun 1992) ================================== 1 - network daemons no longer have to live within a common directory 2 - the access control code now uses both the host address and name 3 - an access control pattern that supports netmasks 4 - additional protection against forged host names 5 - a pattern that matches hosts whose name or address lookup fails 6 - an operator that prevents hosts or services from being matched 7 - optional remote username lookup with the RFC 931 protocol 8 - an optional umask to prevent the creation of world-writable files 9 - hooks for access control language extensions 10 - last but not least, thoroughly revised documentation. Changes per release 3.0 (Oct 1991) ================================== Enhancements over the previous release are: support for datagram (UDP and RPC) services, and execution of shell commands when a (remote host, requested service) pair matches a pattern in the access control tables. Changes per release 2.0 (May 1991) ================================== Enhancements over the previous release are: protection against rlogin and rsh attacks through compromised domain name servers, optional netgroup support for systems with NIS (formerly YP), and an extension of the wild card patterns supported by the access control files. Release 1.0 (Jan 1991)