]> git.pld-linux.org Git - packages/tcp_wrappers.git/blame - tcp_wrappers-man_fixes.patch
- typo.
[packages/tcp_wrappers.git] / tcp_wrappers-man_fixes.patch
CommitLineData
d8818d32 1diff -u tcp_wrappers_7.6.new/hosts_access.3 tcp_wrappers_7.6/hosts_access.3
2--- tcp_wrappers_7.6.new/hosts_access.3 Mon Feb 18 21:45:28 2002
3+++ tcp_wrappers_7.6/hosts_access.3 Sun Feb 11 17:01:27 1996
4@@ -78,7 +78,7 @@
5 hosts_access(5), format of the access control tables.
6 hosts_options(5), optional extensions to the base language.
7 .SH FILES
8-/etc/tcpd/hosts.allow, /etc/tcpd/hosts.deny, access control tables.
9+/etc/hosts.allow, /etc/hosts.deny, access control tables.
10 .SH BUGS
11 hosts_access() uses the strtok() library function. This may interfere
12 with other code that relies on strtok().
13diff -u tcp_wrappers_7.6.new/hosts_access.5 tcp_wrappers_7.6/hosts_access.5
14--- tcp_wrappers_7.6.new/hosts_access.5 Mon Feb 18 21:46:40 2002
15+++ tcp_wrappers_7.6/hosts_access.5 Mon Feb 18 21:47:11 2002
16@@ -21,10 +21,10 @@
17 at the first match:
18 .IP \(bu
19 Access will be granted when a (daemon,client) pair matches an entry in
20-the \fI/etc/tcpd/hosts.allow\fR file.
21+the \fI/etc/hosts.allow\fR file.
22 .IP \(bu
23 Otherwise, access will be denied when a (daemon,client) pair matches an
24-entry in the \fI/etc/tcpd/hosts.deny\fR file.
25+entry in the \fI/etc/hosts.deny\fR file.
26 .IP \(bu
27 Otherwise, access will be granted.
28 .PP
29@@ -285,7 +285,7 @@
30 file:
31 .PP
32 .ne 2
33-/etc/tcpd/hosts.deny:
34+/etc/hosts.deny:
35 .in +3
36 ALL: ALL
37 .PP
38@@ -296,7 +296,7 @@
39 For example:
40 .PP
41 .ne 2
42-/etc/tcpd/hosts.allow:
43+/etc/hosts.allow:
44 .in +3
45 ALL: LOCAL @some_netgroup
46 .br
47@@ -315,7 +315,7 @@
48 that it can be omitted. The explicitly non-authorized hosts are listed
49 in the deny file. For example:
50 .PP
51-/etc/tcpd/hosts.deny:
52+/etc/hosts.deny:
53 .in +3
54 ALL: some.host.name, .some.domain
55 .br
56@@ -330,13 +330,13 @@
57 host. The result is mailed to the superuser.
58 .PP
59 .ne 2
60-/etc/tcpd/hosts.allow:
61+/etc/hosts.allow:
62 .in +3
63 .nf
64 in.tftpd: LOCAL, .my.domain
65 .PP
66 .ne 2
67-/etc/tcpd/hosts.deny:
68+/etc/hosts.deny:
69 .in +3
70 .nf
71 in.tftpd: ALL: (/some/where/safe_finger -l @%h | \\
72@@ -370,8 +370,8 @@
73 .SH FILES
74 .na
75 .nf
76-/etc/tcpd/hosts.allow, (daemon,client) pairs that are granted access.
77-/etc/tcpd/hosts.deny, (daemon,client) pairs that are denied access.
78+/etc/hosts.allow, (daemon,client) pairs that are granted access.
79+/etc/hosts.deny, (daemon,client) pairs that are denied access.
80 .ad
81 .fi
82 .SH SEE ALSO
83diff -u tcp_wrappers_7.6.new/tcpd.8 tcp_wrappers_7.6/tcpd.8
84--- tcp_wrappers_7.6.new/tcpd.8 Mon Feb 18 21:46:29 2002
85+++ tcp_wrappers_7.6/tcpd.8 Wed Feb 21 16:39:16 1996
86@@ -31,7 +31,7 @@
87 especially when logfile information from several hosts is merged.
88 .PP
89 In order to find out where your logs are going, examine the syslog
90-configuration file, usually /etc/tcpd/syslog.conf.
91+configuration file, usually /etc/syslog.conf.
92 .SH ACCESS CONTROL
93 Optionally,
94 .I tcpd
95@@ -158,9 +158,9 @@
96 .PP
97 The default locations of the host access control tables are:
98 .PP
99-/etc/tcpd/hosts.allow
100+/etc/hosts.allow
101 .br
102-/etc/tcpd/hosts.deny
103+/etc/hosts.deny
104 .SH SEE ALSO
105 .na
106 .nf
107diff -u tcp_wrappers_7.6.new/tcpdchk.8 tcp_wrappers_7.6/tcpdchk.8
108--- tcp_wrappers_7.6.new/tcpdchk.8 Mon Feb 18 21:45:18 2002
109+++ tcp_wrappers_7.6/tcpdchk.8 Sun Jan 8 17:00:31 1995
110@@ -8,7 +8,7 @@
111 \fItcpdchk\fR examines your tcp wrapper configuration and reports all
112 potential and real problems it can find. The program examines the
113 \fItcpd\fR access control files (by default, these are
114-\fI/etc/tcpd/hosts.allow\fR and \fI/etc/tcpd/hosts.deny\fR), and compares the
115+\fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the
116 entries in these files against entries in the \fIinetd\fR or \fItlid\fR
117 network configuration files.
118 .PP
119@@ -44,9 +44,9 @@
120 .PP
121 The default locations of the \fItcpd\fR access control tables are:
122 .PP
123-/etc/tcpd/hosts.allow
124+/etc/hosts.allow
125 .br
126-/etc/tcpd/hosts.deny
127+/etc/hosts.deny
128 .SH SEE ALSO
129 .na
130 .nf
131diff -u tcp_wrappers_7.6.new/tcpdmatch.8 tcp_wrappers_7.6/tcpdmatch.8
132--- tcp_wrappers_7.6.new/tcpdmatch.8 Mon Feb 18 21:45:34 2002
133+++ tcp_wrappers_7.6/tcpdmatch.8 Sun Feb 11 17:01:36 1996
134@@ -11,7 +11,7 @@
135 request for service. Examples are given below.
136 .PP
137 The program examines the \fItcpd\fR access control tables (default
138-\fI/etc/tcpd/hosts.allow\fR and \fI/etc/tcpd/hosts.deny\fR) and prints its
139+\fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR) and prints its
140 conclusion. For maximal accuracy, it extracts additional information
141 from your \fIinetd\fR or \fItlid\fR network configuration file.
142 .PP
143@@ -76,9 +76,9 @@
144 .PP
145 The default locations of the \fItcpd\fR access control tables are:
146 .PP
147-/etc/tcpd/hosts.allow
148+/etc/hosts.allow
149 .br
150-/etc/tcpd/hosts.deny
151+/etc/hosts.deny
152 .SH SEE ALSO
153 .na
154 .nf
This page took 0.056255 seconds and 4 git commands to generate.