📄 changes
字号:
Request: after building the programs, please run the `tcpdchk' wrapperconfiguration checker. See the `tcpdchk.8' manual page (`nroff -man'format) for instructions. `tcpdchk' automatically identifies the mostcommon configuration problems, and will save you and me a lot of time.Changes per release 7.6 (Mar 1997)==================================- Improved the anti source-routing protection. The code in version7.5 was not as strong as it could be, because I tried to be compatiblewith Linux. That was a mistake. Sorry for the inconvenience.- The program no longer terminates case of a source-routed connection,making the IP-spoofing code more usable for long-running daemons.- When syslogging DNS hostname problems, always stop after a limitednumber of characters.Changes per release 7.5 (Feb 1997)==================================- Optionally refuse source-routed TCP connections requests altogether.Credits to Niels Provos of Universitaet Hamburg. File: fix_options.c.- Support for IRIX 6 (Lael Tucker).- Support for Amdahl UTS 2.1.5 (Richard E. Richmond).- Support for SINIX 5.42 (Klaus Nielsen).- SCO 5 now has vsyslog() (Bill Golden).- Hints and tips for dealing with IRIX inetd (Niko Makila, AaronM Lee).- Support for BSD/OS (Paul Borman).- Support for Tandem (Emad Qawas).- Support for ISC (Frederick B. Cohen).- Workaround for UNICOS - it would choke on a setjmp() expression(Bruce Kelly). File: hosts_access.c, tcpdchk.c.- Increased the level of buffer overflow paranoia when printingunwanted IP options. File: fix_options.c.Changes per release 7.4 (Mar 1996)==================================- IRIX 5.3 (and possibly, earlier releases, too) library routines callthe non-reentrant strtok() routine. The result is that hosts may slipthrough allow/deny filters. Workaround is to not rely on the vendor'sstrtok() routine (#ifdef LIBC_CALLS_STRTOK). Credits to Th. Eifert(Aachen University) for spotting this one. This fix supersedes theearlier workaround for a similar problem in FreeBSD 2.0.Changes per release 7.3 (Feb 1996)==================================- More tests added to tcpdchk and tcpdmatch: make sure that theREAL_DAEMON_DIR actually is a directory and not a regular file;detect if tcpd recursively calls itself.- Edwin Kremer found an amusing fencepost error in the xgets()routine: lines longer than BUFLEN characters would be garbled.- The access control routines now refuse to execute "dangerous" actionssuch as `twist' when they are called from within a resident process.This prevents you from shooting yourself into the foot with criticalsystems programs such as, e.g., portmap or rpcbind.- Support for Unicos 8.x (Bruce Kelly). The program now closes thesyslog client socket before running the real daemon: Cray UNICOSrefuses to checkpoint processes with open network ports.- Support for MachTen UNIX (Albert M.C Tam).- Support for Interactive UNIX R3.2 V4.0 (Bobby D. Wright).- Support for SCO 3.2v5.0.0 OpenServer 5 (bob@odt.handy.com)- Support for Unixware 1.x and Unixware 2.x. The old Unixware Makefilerule was broken. Sorry about that.- Some FreeBSD 2.0 libc routines call strtok() and severely mess up theallow/deny rule processing. This is very bad. Workaround: call our ownstrtok() clone (#ifdef USE_STRSEP).- The programs now log a warning when they detect that a non-existentbanner directory is specified.- The hosts_access.3 manual page used obsolete names for the RQ_*constants.Changes per release 7.2 (Jan 1995)==================================- Added a note to the README and manpages on using the IDENT service todetect sequence number spoofing and other host impersonation attacks.- Portability: ConvexOS puts RPC version numbers before the daemon pathname (Jukka Ukkonen).- Portability: the AIX compiler disliked the strchr() declarationin socket.c. I should have removed it when I included <string.h>.- Backwards compatibility: some people relied on the old leading dot ortrailing dot magic in daemon process names.- Backwards compatibility: hostname lookup remains enabled when-DPARANOID is turned off. In order to disable hostname lookups youmust turn off -DALWAYS_HOSTNAME.- Eliminated false complaints from the tcpdmatch/tcpdchk configurationchecking programs about process names not in inetd.conf or about KNOWNusername patterns.Changes per release 7.1 (Jan 1995)==================================- Portability: HP-UX permits you to break inetd.conf entries withbackslash-newline.- Portability: EP/IX has no putenv() and some inetd.conf entries arespread out over two lines.- Portability: SCO with NIS support has no *netgrent() routines.Changes per release 7.0 (Jan 1995) ==================================- Added a last-minute workaround for a Solaris 2.4 gethostbyname()foulup with multi-homed hosts in DNS through NIS mode.- Added a last-minute defense against TLI weirdness: address lookupsapparently succeed but the result netbuf is empty (ticlts transport).- Dropped several new solutions that were in need of a problem. Betatesters may recognize what new features were kicked out during the lastweeks before release 7.0 came out. Such is life.- Got rid of out the environment replacement routines, at least formost architectures. One should not have to replace working systemsoftware when all that is needed is a 4.4BSD setenv() emulator.- By popular request I have added an option to send banner messages toclients. There is a Banners.Makefile that gives some aid for sites thatare going to use this feature. John C. Wingenbach did some pioneeringwork here. I used to think that banners are frivolous. Now that I hada personal need for them I know that banners can be useful.- At last: an extensible functional interface to the pattern matchingengine. request_init() and request_set() accept a variable-lengthname-value argument list. The result can be passed to hosts_access().- When PARANOID mode is disabled (compile time), the wrapper does nohostname lookup or hostname double checks unless required by %letterexpansions, or by access control rules that match host names. This isuseful for sites that don't care about internet hostnames anyway.Inspired by the authors of the firewalls and internet security book.- When PARANOID mode is disabled (compile time), hosts with a name/nameor name/address conflict can be matched with the PARANOID host wildcardpattern, so that you can take some intelligent action instead of justdropping clients. Like showing a banner that explains the problem.- New percent escapes: %A expands to the server address; %H expands tothe corresponding hostname (or address if no name is available); %n and%N expand to the client and server hostname (or "unknown"); %s expandsto everything we know about the server endpoint (the opposite of the %csequence for client information).- Symmetry: server and client host information is now treated on equalfooting, so that we can reuse a lot of code.- Lazy evaluation of host names, host addresses, usernames, and so on,to avoid doing unnecessary work.- Dropping #ifdefs for some archaic systems made the code simpler.- Dropping the FAIL pattern made the pattern matcher much simpler. Runthe "tcpdchk" program to scan your access control files for any uses ofthis obscure language feature.- Moving host-specific pattern matching from string_match() to thehost_match() routine made the code more accurate. Run the "tcpdchk"program to scan your access control files for any dependencies onundocumented or obscure language features that are gone.- daemon@host patterns trigger on clients that connect to a specificinternet address. This can be useful for service providers that offermultiple ftp or www archives on different internet addresses, allbelonging to one and the same host (www.foo.com, ftp.bar.com, you getthe idea). Inspired by a discussion with Rop Gonggrijp, Cor Bosman,and Casper Dik, and earlier discussions with Adrian van Bloois.- The new "tcpdchk" program critcizes all your access control rules andinetd.conf entries. Great for spotting obscure bugs in my own hosts.xxxfiles. This program also detects hosts with name/address conflicts andwith other DNS-related problems. See the "tcpdchk.8" manual page.- The "tcpdmatch" program replaces the poor old "try" command. The newprogram looks in your inetd.conf file and therefore produces much moreaccurate predictions. In addition, it detects hosts with name/addressconflicts and with other DNS-related problems. See the "tcpdmatch.8"manual page. The inetd.conf lookup was suggested by Everett F Batey.- In the access control tables, the `=' between option name and valueis no longer required.- Added 60-second timeout to the safe_finger command, to cover anotherpotential problem. Suggested by Peter Wemm.- Andrew Maffei provided code that works with WIN-TCP on NCR System V.4UNIX. It reportedly works with versions 02.02.01 and 02.03.00. The codepops off all streams modules above the device driver, pushes the timodmodule to get at the peer address, and then restores the streams stackto the initial state.Changes per release 6.3 (Mar 1994)==================================- Keepalives option, to get rid of stuck daemons when people turn offtheir PC while still connected. Files: options.c, hosts_options.5.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -