summaryrefslogtreecommitdiffstats
path: root/meta/packages/tcp-wrappers/tcp-wrappers-7.6/00_man_quoting.diff
diff options
context:
space:
mode:
Diffstat (limited to 'meta/packages/tcp-wrappers/tcp-wrappers-7.6/00_man_quoting.diff')
-rw-r--r--meta/packages/tcp-wrappers/tcp-wrappers-7.6/00_man_quoting.diff75
1 files changed, 0 insertions, 75 deletions
diff --git a/meta/packages/tcp-wrappers/tcp-wrappers-7.6/00_man_quoting.diff b/meta/packages/tcp-wrappers/tcp-wrappers-7.6/00_man_quoting.diff
deleted file mode 100644
index ff60a843e4..0000000000
--- a/meta/packages/tcp-wrappers/tcp-wrappers-7.6/00_man_quoting.diff
+++ /dev/null
@@ -1,75 +0,0 @@
1diff -ruN tcp_wrappers_7.6.orig/hosts_access.5 tcp_wrappers_7.6/hosts_access.5
2--- tcp_wrappers_7.6.orig/hosts_access.5 1995-01-30 19:51:47.000000000 +0100
3+++ tcp_wrappers_7.6/hosts_access.5 2004-04-09 16:59:45.000000000 +0200
4@@ -173,7 +173,7 @@
5 Patterns like these can be used when the machine has different internet
6 addresses with different internet hostnames. Service providers can use
7 this facility to offer FTP, GOPHER or WWW archives with internet names
8-that may even belong to different organizations. See also the `twist'
9+that may even belong to different organizations. See also the `twist\'
10 option in the hosts_options(5) document. Some systems (Solaris,
11 FreeBSD) can have more than one internet address on one physical
12 interface; with other systems you may have to resort to SLIP or PPP
13@@ -236,10 +236,10 @@
14 Before accepting a client request, the wrappers can use the IDENT
15 service to find out that the client did not send the request at all.
16 When the client host provides IDENT service, a negative IDENT lookup
17-result (the client matches `UNKNOWN@host') is strong evidence of a host
18+result (the client matches `UNKNOWN@host\') is strong evidence of a host
19 spoofing attack.
20 .PP
21-A positive IDENT lookup result (the client matches `KNOWN@host') is
22+A positive IDENT lookup result (the client matches `KNOWN@host\') is
23 less trustworthy. It is possible for an intruder to spoof both the
24 client connection and the IDENT lookup, although doing so is much
25 harder than spoofing just a client connection. It may also be that
26diff -ruN tcp_wrappers_7.6.orig/hosts_options.5 tcp_wrappers_7.6/hosts_options.5
27--- tcp_wrappers_7.6.orig/hosts_options.5 1994-12-28 17:42:29.000000000 +0100
28+++ tcp_wrappers_7.6/hosts_options.5 2004-04-09 16:59:49.000000000 +0200
29@@ -124,7 +124,7 @@
30 value is taken.
31 .SH MISCELLANEOUS
32 .IP "banners /some/directory"
33-Look for a file in `/some/directory' with the same name as the daemon
34+Look for a file in `/some/directory\' with the same name as the daemon
35 process (for example in.telnetd for the telnet service), and copy its
36 contents to the client. Newline characters are replaced by
37 carriage-return newline, and %<letter> sequences are expanded (see
38diff -ruN tcp_wrappers_7.6.orig/tcpdmatch.8 tcp_wrappers_7.6/tcpdmatch.8
39--- tcp_wrappers_7.6.orig/tcpdmatch.8 1996-02-11 17:01:36.000000000 +0100
40+++ tcp_wrappers_7.6/tcpdmatch.8 2004-04-09 17:00:49.000000000 +0200
41@@ -26,7 +26,7 @@
42 A daemon process name. Typically, the last component of a daemon
43 executable pathname.
44 .IP client
45-A host name or network address, or one of the `unknown' or `paranoid'
46+A host name or network address, or one of the `unknown\' or `paranoid\'
47 wildcard patterns.
48 .sp
49 When a client host name is specified, \fItcpdmatch\fR gives a
50@@ -37,13 +37,13 @@
51 .PP
52 Optional information specified with the \fIdaemon@server\fR form:
53 .IP server
54-A host name or network address, or one of the `unknown' or `paranoid'
55-wildcard patterns. The default server name is `unknown'.
56+A host name or network address, or one of the `unknown\' or `paranoid\'
57+wildcard patterns. The default server name is `unknown\'.
58 .PP
59 Optional information specified with the \fIuser@client\fR form:
60 .IP user
61 A client user identifier. Typically, a login name or a numeric userid.
62-The default user name is `unknown'.
63+The default user name is `unknown\'.
64 .SH OPTIONS
65 .IP -d
66 Examine \fIhosts.allow\fR and \fIhosts.deny\fR files in the current
67@@ -70,7 +70,7 @@
68 .ti +5
69 tcpdmatch in.telnetd paranoid
70 .PP
71-On some systems, daemon names have no `in.' prefix, or \fItcpdmatch\fR
72+On some systems, daemon names have no `in.\' prefix, or \fItcpdmatch\fR
73 may need some help to locate the inetd configuration file.
74 .SH FILES
75 .PP