Репозиторий ALT Linux backports/2.4
Последнее обновление: 9 июля 2008 | Пакетов: 497 | Посещений: 1584294
 поиск   регистрация   авторизация 
 
Группа :: Система/Основа
Пакет: xinetd

 Главная   Изменения   Спек   Патчи   Загрузить   Bugs and FR 

Патч: xinetd-2.3.12-rh-tcp_rpc.patch


--- xinetd-2.3.12/xinetd/service.c.tcp_rpc	2003-06-27 21:05:06 -0400
+++ xinetd-2.3.12/xinetd/service.c	2004-01-29 23:09:29 -0500
@@ -181,6 +181,9 @@
    else
       memset( &tsin, 0, sizeof(tsin));
 
+   if ( SC_PROTOVAL ( scp ) == IPPROTO_TCP ) {
+      M_SET ( scp->sc_xflags, SF_NOLIBWRAP );
+   }
    if( SC_IPV4( scp ) ) {
       tsin.sa_in.sin_family = AF_INET ;
       sin_len = sizeof(struct sockaddr_in);
--- xinetd-2.3.12/xinetd/xinetd.conf.man.tcp_rpc	2004-01-30 12:38:59 -0500
+++ xinetd-2.3.12/xinetd/xinetd.conf.man	2004-01-30 12:43:50 -0500
@@ -123,6 +123,8 @@
 to the service.  This may be needed in order to use libwrap functionality
 not available to long-running processes such as xinetd; in this case,
 the tcpd program can be called explicitly (see also the NAMEINARGS flag).
+For RPC services using TCP transport, this flag is automatically turned on,
+because xinetd cannot get remote host address information for the rpc port.
 .TP
 .B SENSOR
 This replaces the service with a sensor that detects accesses to the 
@@ -1215,6 +1217,10 @@
 access control on the address of the remote host is not performed when
 \fIwait\fP is \fIyes\fP and \fIsocket_type\fP is \fIstream\fP.
 .LP
+The NOLIBWRAP flag is automatically turned on for RPC services whose
+\fIsocket_type\fP is \fIstream\fP because xinetd cannot determine the
+address of the remote host.
+.LP
 If the 
 .B INTERCEPT
 flag is not used,
 
design & coding: Vladimir Lettiev aka crux © 2004-2005