head	1.1;
branch	1.1.1;
access;
symbols
	RELENG_8_4:1.1.1.1.0.78
	RELENG_9_1_0_RELEASE:1.1.1.1
	RELENG_9_1:1.1.1.1.0.76
	RELENG_9_1_BP:1.1.1.1
	RELENG_8_3_0_RELEASE:1.1.1.1
	RELENG_8_3:1.1.1.1.0.74
	RELENG_8_3_BP:1.1.1.1
	RELENG_9_0_0_RELEASE:1.1.1.1
	RELENG_9_0:1.1.1.1.0.72
	RELENG_9_0_BP:1.1.1.1
	RELENG_9:1.1.1.1.0.70
	RELENG_9_BP:1.1.1.1
	RELENG_7_4_0_RELEASE:1.1.1.1
	RELENG_8_2_0_RELEASE:1.1.1.1
	RELENG_7_4:1.1.1.1.0.68
	RELENG_7_4_BP:1.1.1.1
	RELENG_8_2:1.1.1.1.0.66
	RELENG_8_2_BP:1.1.1.1
	RELENG_8_1_0_RELEASE:1.1.1.1
	RELENG_8_1:1.1.1.1.0.64
	RELENG_8_1_BP:1.1.1.1
	RELENG_7_3_0_RELEASE:1.1.1.1
	RELENG_7_3:1.1.1.1.0.62
	RELENG_7_3_BP:1.1.1.1
	RELENG_8_0_0_RELEASE:1.1.1.1
	RELENG_8_0:1.1.1.1.0.60
	RELENG_8_0_BP:1.1.1.1
	RELENG_8:1.1.1.1.0.58
	RELENG_8_BP:1.1.1.1
	RELENG_7_2_0_RELEASE:1.1.1.1
	RELENG_7_2:1.1.1.1.0.56
	RELENG_7_2_BP:1.1.1.1
	RELENG_7_1_0_RELEASE:1.1.1.1
	RELENG_6_4_0_RELEASE:1.1.1.1
	RELENG_7_1:1.1.1.1.0.54
	RELENG_7_1_BP:1.1.1.1
	RELENG_6_4:1.1.1.1.0.52
	RELENG_6_4_BP:1.1.1.1
	RELENG_7_0_0_RELEASE:1.1.1.1
	RELENG_6_3_0_RELEASE:1.1.1.1
	RELENG_7_0:1.1.1.1.0.50
	RELENG_7_0_BP:1.1.1.1
	RELENG_6_3:1.1.1.1.0.48
	RELENG_6_3_BP:1.1.1.1
	RELENG_7:1.1.1.1.0.46
	RELENG_7_BP:1.1.1.1
	RELENG_6_2_0_RELEASE:1.1.1.1
	RELENG_6_2:1.1.1.1.0.44
	RELENG_6_2_BP:1.1.1.1
	RELENG_5_5_0_RELEASE:1.1.1.1
	RELENG_5_5:1.1.1.1.0.42
	RELENG_5_5_BP:1.1.1.1
	RELENG_6_1_0_RELEASE:1.1.1.1
	RELENG_6_1:1.1.1.1.0.40
	RELENG_6_1_BP:1.1.1.1
	RELENG_6_0_0_RELEASE:1.1.1.1
	RELENG_6_0:1.1.1.1.0.38
	RELENG_6_0_BP:1.1.1.1
	RELENG_6:1.1.1.1.0.36
	RELENG_6_BP:1.1.1.1
	RELENG_5_4_0_RELEASE:1.1.1.1
	RELENG_5_4:1.1.1.1.0.34
	RELENG_5_4_BP:1.1.1.1
	RELENG_4_11_0_RELEASE:1.1.1.1
	RELENG_4_11:1.1.1.1.0.32
	RELENG_4_11_BP:1.1.1.1
	RELENG_5_3_0_RELEASE:1.1.1.1
	RELENG_5_3:1.1.1.1.0.30
	RELENG_5_3_BP:1.1.1.1
	RELENG_5:1.1.1.1.0.28
	RELENG_5_BP:1.1.1.1
	RELENG_4_10_0_RELEASE:1.1.1.1
	RELENG_4_10:1.1.1.1.0.26
	RELENG_4_10_BP:1.1.1.1
	RELENG_5_2_1_RELEASE:1.1.1.1
	RELENG_5_2_0_RELEASE:1.1.1.1
	RELENG_5_2:1.1.1.1.0.24
	RELENG_5_2_BP:1.1.1.1
	RELENG_4_9_0_RELEASE:1.1.1.1
	RELENG_4_9:1.1.1.1.0.22
	RELENG_4_9_BP:1.1.1.1
	RELENG_5_1_0_RELEASE:1.1.1.1
	RELENG_5_1:1.1.1.1.0.20
	RELENG_5_1_BP:1.1.1.1
	RELENG_4_8_0_RELEASE:1.1.1.1
	RELENG_4_8:1.1.1.1.0.18
	RELENG_4_8_BP:1.1.1.1
	RELENG_5_0_0_RELEASE:1.1.1.1
	RELENG_5_0:1.1.1.1.0.16
	RELENG_5_0_BP:1.1.1.1
	RELENG_4_7_0_RELEASE:1.1.1.1
	RELENG_4_7:1.1.1.1.0.14
	RELENG_4_7_BP:1.1.1.1
	RELENG_4_6_2_RELEASE:1.1.1.1
	RELENG_4_6_1_RELEASE:1.1.1.1
	RELENG_4_6_0_RELEASE:1.1.1.1
	RELENG_4_6:1.1.1.1.0.12
	RELENG_4_6_BP:1.1.1.1
	RELENG_4_5_0_RELEASE:1.1.1.1
	RELENG_4_5:1.1.1.1.0.10
	RELENG_4_5_BP:1.1.1.1
	RELENG_4_4_0_RELEASE:1.1.1.1
	RELENG_4_4:1.1.1.1.0.8
	RELENG_4_4_BP:1.1.1.1
	RELENG_4_3_0_RELEASE:1.1.1.1
	RELENG_4_3:1.1.1.1.0.6
	RELENG_4_3_BP:1.1.1.1
	RELENG_4_2_0_RELEASE:1.1.1.1
	RELENG_4_1_1_RELEASE:1.1.1.1
	PRE_SMPNG:1.1.1.1
	RELENG_4_1_0_RELEASE:1.1.1.1
	RELENG_3_5_0_RELEASE:1.1.1.1.2.1
	RELENG_4_0_0_RELEASE:1.1.1.1
	RELENG_4:1.1.1.1.0.4
	RELENG_4_BP:1.1.1.1
	RELENG_3_4_0_RELEASE:1.1.1.1.2.1
	RELENG_3_3_0_RELEASE:1.1.1.1.2.1
	RELENG_3_2_PAO:1.1.1.1.2.1.0.2
	RELENG_3_2_PAO_BP:1.1.1.1.2.1
	RELENG_3_2_0_RELEASE:1.1.1.1.2.1
	RELENG_3:1.1.1.1.0.2
	v_7_6:1.1.1.1
	WVENEMA:1.1.1;
locks; strict;
comment	@# @;


1.1
date	99.03.14.17.13.19;	author markm;	state Exp;
branches
	1.1.1.1;
next	;

1.1.1.1
date	99.03.14.17.13.19;	author markm;	state Exp;
branches
	1.1.1.1.2.1
	1.1.1.1.78.1;
next	;

1.1.1.1.2.1
date	99.04.20.19.19.59;	author obrien;	state Exp;
branches;
next	;

1.1.1.1.78.1
date	99.03.14.17.13.19;	author svnexp;	state dead;
branches;
next	1.1.1.1.78.2;

1.1.1.1.78.2
date	2013.03.28.13.02.02;	author svnexp;	state Exp;
branches;
next	;


desc
@@


1.1
log
@Initial revision
@
text
@@@(#) BLURB 1.28 97/03/21 19:27:18

With this package you can monitor and filter incoming requests for the
SYSTAT, FINGER, FTP, TELNET, RLOGIN, RSH, EXEC, TFTP, TALK, and other
network services.

The package provides tiny daemon wrapper programs that can be installed
without any changes to existing software or to existing configuration
files.  The wrappers report the name of the client host and of the
requested service; the wrappers do not exchange information with the
client or server applications, and impose no overhead on the actual
conversation between the client and server applications.

This patch upgrades the tcp wrappers version 7.5 source code to
version 7.6.  The source-routing protection in version 7.5 was not
as strong as it could be. And all this effort was not needed with
modern UNIX systems that can already stop source-routed traffic in
the kernel. Examples are 4.4BSD derivatives, Solaris 2.x, and Linux.

This release does not introduce new features. Do not bother applying
this patch when you built your version 7.x tcp wrapper without
enabling the KILL_IP_OPTIONS compiler switch; when you can disable
IP source routing options in the kernel; when you run a UNIX version
that pre-dates 4.4BSD, such as SunOS 4. Such systems are unable to
receive source-routed connections and are therefore not vulnerable
to IP spoofing attacks with source-routed TCP connections.

A complete change log is given in the CHANGES document.  As always,
problem reports and suggestions for improvement are welcome.

	Wietse Venema (wietse@@wzv.win.tue.nl),
	Department of Mathematics and Computing Science,
	Eindhoven University of Technology,
	The Netherlands.

	Currently visiting IBM T.J. Watson Research, Hawthorne NY, USA.
@


1.1.1.1
log
@Clean import of TCP-wrappers by Wietse Venema.
Rest of build to follow.
@
text
@@


1.1.1.1.78.1
log
@file BLURB was added on branch RELENG_8_4 on 2013-03-28 13:02:02 +0000
@
text
@d1 36
@


1.1.1.1.78.2
log
@## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/248810
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
@
text
@a0 36
@@(#) BLURB 1.28 97/03/21 19:27:18

With this package you can monitor and filter incoming requests for the
SYSTAT, FINGER, FTP, TELNET, RLOGIN, RSH, EXEC, TFTP, TALK, and other
network services.

The package provides tiny daemon wrapper programs that can be installed
without any changes to existing software or to existing configuration
files.  The wrappers report the name of the client host and of the
requested service; the wrappers do not exchange information with the
client or server applications, and impose no overhead on the actual
conversation between the client and server applications.

This patch upgrades the tcp wrappers version 7.5 source code to
version 7.6.  The source-routing protection in version 7.5 was not
as strong as it could be. And all this effort was not needed with
modern UNIX systems that can already stop source-routed traffic in
the kernel. Examples are 4.4BSD derivatives, Solaris 2.x, and Linux.

This release does not introduce new features. Do not bother applying
this patch when you built your version 7.x tcp wrapper without
enabling the KILL_IP_OPTIONS compiler switch; when you can disable
IP source routing options in the kernel; when you run a UNIX version
that pre-dates 4.4BSD, such as SunOS 4. Such systems are unable to
receive source-routed connections and are therefore not vulnerable
to IP spoofing attacks with source-routed TCP connections.

A complete change log is given in the CHANGES document.  As always,
problem reports and suggestions for improvement are welcome.

	Wietse Venema (wietse@@wzv.win.tue.nl),
	Department of Mathematics and Computing Science,
	Eindhoven University of Technology,
	The Netherlands.

	Currently visiting IBM T.J. Watson Research, Hawthorne NY, USA.
@


1.1.1.1.2.1
log
@MFC: bring tcp_wrappers to 3-STABLE

Ok'ed by:	markm
@
text
@@

