Lines Matching +full:sco +full:- +full:routing
2 configuration checker. See the `tcpdchk.8' manual page (`nroff -man'
9 - Improved the anti source-routing protection. The code in version
13 - The program no longer terminates case of a source-routed connection,
14 making the IP-spoofing code more usable for long-running daemons.
16 - When syslogging DNS hostname problems, always stop after a limited
22 - Optionally refuse source-routed TCP connections requests altogether.
25 - Support for IRIX 6 (Lael Tucker).
27 - Support for Amdahl UTS 2.1.5 (Richard E. Richmond).
29 - Support for SINIX 5.42 (Klaus Nielsen).
31 - SCO 5 now has vsyslog() (Bill Golden).
33 - Hints and tips for dealing with IRIX inetd (Niko Makila, Aaron
36 - Support for BSD/OS (Paul Borman).
38 - Support for Tandem (Emad Qawas).
40 - Support for ISC (Frederick B. Cohen).
42 - Workaround for UNICOS - it would choke on a setjmp() expression
45 - Increased the level of buffer overflow paranoia when printing
51 - IRIX 5.3 (and possibly, earlier releases, too) library routines call
52 the non-reentrant strtok() routine. The result is that hosts may slip
61 - More tests added to tcpdchk and tcpdmatch: make sure that the
65 - Edwin Kremer found an amusing fencepost error in the xgets()
68 - The access control routines now refuse to execute "dangerous" actions
73 - Support for Unicos 8.x (Bruce Kelly). The program now closes the
77 - Support for MachTen UNIX (Albert M.C Tam).
79 - Support for Interactive UNIX R3.2 V4.0 (Bobby D. Wright).
81 - Support for SCO 3.2v5.0.0 OpenServer 5 (bob@odt.handy.com)
83 - Support for Unixware 1.x and Unixware 2.x. The old Unixware Makefile
86 - Some FreeBSD 2.0 libc routines call strtok() and severely mess up the
90 - The programs now log a warning when they detect that a non-existent
93 - The hosts_access.3 manual page used obsolete names for the RQ_*
99 - Added a note to the README and manpages on using the IDENT service to
102 - Portability: ConvexOS puts RPC version numbers before the daemon path
105 - Portability: the AIX compiler disliked the strchr() declaration
108 - Backwards compatibility: some people relied on the old leading dot or
111 - Backwards compatibility: hostname lookup remains enabled when
112 -DPARANOID is turned off. In order to disable hostname lookups you
113 must turn off -DALWAYS_HOSTNAME.
115 - Eliminated false complaints from the tcpdmatch/tcpdchk configuration
122 - Portability: HP-UX permits you to break inetd.conf entries with
123 backslash-newline.
125 - Portability: EP/IX has no putenv() and some inetd.conf entries are
128 - Portability: SCO with NIS support has no *netgrent() routines.
133 - Added a last-minute workaround for a Solaris 2.4 gethostbyname()
134 foulup with multi-homed hosts in DNS through NIS mode.
136 - Added a last-minute defense against TLI weirdness: address lookups
139 - Dropped several new solutions that were in need of a problem. Beta
143 - Got rid of out the environment replacement routines, at least for
147 - By popular request I have added an option to send banner messages to
153 - At last: an extensible functional interface to the pattern matching
154 engine. request_init() and request_set() accept a variable-length
155 name-value argument list. The result can be passed to hosts_access().
157 - When PARANOID mode is disabled (compile time), the wrapper does no
163 - When PARANOID mode is disabled (compile time), hosts with a name/name
168 - New percent escapes: %A expands to the server address; %H expands to
174 - Symmetry: server and client host information is now treated on equal
177 - Lazy evaluation of host names, host addresses, usernames, and so on,
180 - Dropping #ifdefs for some archaic systems made the code simpler.
182 - Dropping the FAIL pattern made the pattern matcher much simpler. Run
186 - Moving host-specific pattern matching from string_match() to the
191 - daemon@host patterns trigger on clients that connect to a specific
198 - The new "tcpdchk" program critcizes all your access control rules and
201 with other DNS-related problems. See the "tcpdchk.8" manual page.
203 - The "tcpdmatch" program replaces the poor old "try" command. The new
206 conflicts and with other DNS-related problems. See the "tcpdmatch.8"
209 - In the access control tables, the `=' between option name and value
212 - Added 60-second timeout to the safe_finger command, to cover another
215 - Andrew Maffei provided code that works with WIN-TCP on NCR System V.4
224 - Keepalives option, to get rid of stuck daemons when people turn off
227 - Nice option, to calm down network daemons that take away too much CPU
230 - Ultrix perversion: the environ global pointer may be null. The
233 - Fixed a few places that still assumed the socket is on standard
237 - Just when I was going to release 6.2 I received code for Dynix/PTX.
245 - Resurrected my year-old code to reduce DNS load by appending a dot to
249 - Auxiliary code for the Pyramid, BSD universe. Karl Vogel figured out
253 - Improved support for Dynix/PTX. The wrapper should now be able to
256 - The try command now uses the hostname that gethostbyaddr() would
266 - Re-implemented all environment access routines. Most systems have
272 - Workaround for a weird problem with DG/UX when the wrapper is run as
274 call fails even with socket-based applications. The "fix" is to always
279 - Implemented a workaround for Dynix/PTX and other systems with TLI
286 - Easy-to-build procedures for SCO UNIX, ConvexOS with UltraNet, EP/IX,
289 - Variable rfc931 timeout. Files: rfc931.c, options.c, log_tcp.h, try.c.
291 - Further simplification of the rfc931 code. File: rfc931.c.
293 - The fromhost() interface stinks: I cannot change that, but at least
297 - Fixed a buglet: fromhost() would pass a garbage file descriptor to
300 - On some systems the finger client program lives in /usr/bsd. File:
306 - Easy build procedures for common platforms (sun, ultrix, aix, hpux
309 - TLI support, System V.4 style (Solaris, DG/UX).
311 - Username lookup integrated with the access control language.
315 - A safer finger command for booby traps. This one solves a host of
319 - KNOWN pattern that matches hosts whose name and address are known.
321 - Cleanup of diagnostics. Errors in access-control files are now shown
324 - With AIX 3.2, hostnames longer than 32 would be truncated. This
329 - With some IRIX versions, remote username lookups failed because the
333 - Added a DISCLAIMER document to help you satisfy legal departments.
341 - (Extension language) The ":" separator may now occur within options
345 - (Extension language) Better verification mode. When the `try' command
348 - (Extension language) New "allow" and "deny" keywords so you can now
349 have all rules within a single file. See "nroff -man hosts_options.5"
352 - (Extension language) "linger" keyword to set the socket linger time
355 - (Extension language) "severity" keyword to turn the logging noise up
363 - The additional protection against source-routing attacks from hosts
370 - Additional protection against source-routing attacks from hosts that
374 - The access control language has been extended with a simple but
377 lines can be continued with backslash-newline.
379 - All configurable stuff, including path names, has been moved into the
383 - Ported to Solaris 2. TLI-based applications not yet supported.
386 - A small loophole in the netgroup lookup code was closed, and the
389 - Still more documentation. The README file now provides tutorial
395 - Some sites reported that connections would be rejected because
397 special-cases localhost (problem reported by several sites).
399 - The programs now report an error if an existing access control file
404 - The timeout period for remote userid lookups was upped to 30 seconds,
409 - On hosts with more than one IP network interface, remote userid
411 problem and its solution were discussed on the rfc931-users mailing
415 - The result of % expansion (in shell commands) is now checked for
419 - A portability problem was fixed that caused compile-time problems
425 1 - network daemons no longer have to live within a common directory
426 2 - the access control code now uses both the host address and name
427 3 - an access control pattern that supports netmasks
428 4 - additional protection against forged host names
429 5 - a pattern that matches hosts whose name or address lookup fails
430 6 - an operator that prevents hosts or services from being matched
431 7 - optional remote username lookup with the RFC 931 protocol
432 8 - an optional umask to prevent the creation of world-writable files
433 9 - hooks for access control language extensions
434 10 - last but not least, thoroughly revised documentation.