2008-08-29 07:49:41 +00:00
|
|
|
diff -up tcp_wrappers_7.6/hosts_access.c.patch12 tcp_wrappers_7.6/hosts_access.c
|
|
|
|
--- tcp_wrappers_7.6/hosts_access.c.patch12 2008-08-29 09:45:12.000000000 +0200
|
|
|
|
+++ tcp_wrappers_7.6/hosts_access.c 2008-08-29 09:45:12.000000000 +0200
|
|
|
|
@@ -66,6 +66,7 @@ static char sep[] = ", \t\r\n";
|
2004-09-09 13:07:52 +00:00
|
|
|
|
|
|
|
#define YES 1
|
|
|
|
#define NO 0
|
|
|
|
+#define ERR -1
|
|
|
|
|
|
|
|
/*
|
|
|
|
* These variables are globally visible so that they can be redirected in
|
2008-08-29 07:49:41 +00:00
|
|
|
@@ -106,7 +107,6 @@ int hosts_access(request)
|
2004-09-09 13:07:52 +00:00
|
|
|
struct request_info *request;
|
|
|
|
{
|
|
|
|
int verdict;
|
|
|
|
-
|
|
|
|
/*
|
|
|
|
* If the (daemon, client) pair is matched by an entry in the file
|
|
|
|
* /etc/hosts.allow, access is granted. Otherwise, if the (daemon,
|
2008-08-29 07:49:41 +00:00
|
|
|
@@ -129,9 +129,9 @@ struct request_info *request;
|
2004-09-09 13:07:52 +00:00
|
|
|
return (verdict == AC_PERMIT);
|
|
|
|
if (table_match(hosts_allow_table, request))
|
|
|
|
return (YES);
|
|
|
|
- if (table_match(hosts_deny_table, request))
|
|
|
|
- return (NO);
|
|
|
|
- return (YES);
|
|
|
|
+ if (table_match(hosts_deny_table, request) == NO)
|
|
|
|
+ return (YES);
|
|
|
|
+ return (NO);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* table_match - match table entries with (daemon, client) pair */
|
2008-08-29 07:49:41 +00:00
|
|
|
@@ -175,6 +175,7 @@ struct request_info *request;
|
2004-09-09 13:07:52 +00:00
|
|
|
(void) fclose(fp);
|
|
|
|
} else if (errno != ENOENT) {
|
|
|
|
tcpd_warn("cannot open %s: %m", table);
|
|
|
|
+ match = ERR;
|
|
|
|
}
|
|
|
|
if (match) {
|
|
|
|
if (hosts_access_verbose > 1)
|