From owner-freebsd-ports Mon Sep 13 2:30: 7 1999 Delivered-To: freebsd-ports@freebsd.org Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (Postfix) with ESMTP id 29EE014CBF for ; Mon, 13 Sep 1999 02:30:01 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.9.3/8.9.2) id CAA45000; Mon, 13 Sep 1999 02:30:01 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: from planka.carrier.kiev.ua (planka.carrier.kiev.ua [193.193.193.106]) by hub.freebsd.org (Postfix) with ESMTP id 389CC14CBF for ; Mon, 13 Sep 1999 02:28:58 -0700 (PDT) (envelope-from tasic@planka.carrier.kiev.ua) Received: (from root@localhost) by planka.carrier.kiev.ua (8.9.3/8.9.3) id MAA16134; Mon, 13 Sep 1999 12:28:49 +0300 (EEST) (envelope-from tasic) Message-Id: <199909130928.MAA16134@planka.carrier.kiev.ua> Date: Mon, 13 Sep 1999 12:28:49 +0300 (EEST) From: root@planka.carrier.kiev.ua Reply-To: tasic@lucky.net To: FreeBSD-gnats-submit@freebsd.org X-Send-Pr-Version: 3.2 Subject: ports/13716: tac_plus.F4.0.2 port for FreeBSD Sender: owner-freebsd-ports@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 13716 >Category: ports >Synopsis: tac_plus.F4.0.2 port for FreeBSD >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Mon Sep 13 02:30:00 PDT 1999 >Closed-Date: >Last-Modified: >Originator: Taras Heychenko >Release: FreeBSD 3.3-RC i386 >Organization: Lucky Net Ltd. >Environment: Sending from FreeBSD-3.3, but also wors on 2.2.6-RELEASE. Should work on 2.2.x-RELEASE. >Description: # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # tac_plus.F4.0.2.alpha/ # tac_plus.F4.0.2.alpha/Makefile # tac_plus.F4.0.2.alpha/pkg # tac_plus.F4.0.2.alpha/pkg/COMMENT # tac_plus.F4.0.2.alpha/pkg/DESCR # tac_plus.F4.0.2.alpha/pkg/PLIST # tac_plus.F4.0.2.alpha/files # tac_plus.F4.0.2.alpha/files/md5 # tac_plus.F4.0.2.alpha/files/patch-ba # tac_plus.F4.0.2.alpha/files/tac_plus.conf.example # tac_plus.F4.0.2.alpha/patches # tac_plus.F4.0.2.alpha/patches/patch-aa # echo c - tac_plus.F4.0.2.alpha/ mkdir -p tac_plus.F4.0.2.alpha/ > /dev/null 2>&1 echo x - tac_plus.F4.0.2.alpha/Makefile sed 's/^X//' >tac_plus.F4.0.2.alpha/Makefile << 'END-of-tac_plus.F4.0.2.alpha/Makefile' X# New ports collection makefile for: tac_plus X# Version required: F4.0.2.alpha X# Date created: 9 Sep 1999 X# Whom: Taras Heychenko X# X# $FreeBSD$ X# X XDISTNAME= tac_plus.F4.0.2.alpha XPKGNAME= tac_plus-F4.0.2 XCATEGORIES= net XMASTER_SITES= ftp://ftp-eng.cisco.com/pub/tacacs/ XEXTRACT_SUFX= .tar.Z X XMAINTAINER= tasic@lucky.net X XEXTRACT_CMD= ${TAR} XEXTRACT_BEFORE_ARGS= -xzf XEXTRACT_AFTER_ARGS= # empty XALL_TARGET= tac_plus XMAN1= tac_plus.1 XEXTRA_PATCH= patch-ba X X# To change the text displayed when users are prompted to enter X# a username, set appropriately TAC_CHANGE_PROMPT variable. X.if defined(TAC_CHANGE_PROMPT) && ${TAC_CHANGE_PROMPT} == YES Xpre-patch: X @${CP} ${FILESDIR}/${EXTRA_PATCH} ${PATCHDIR} X.endif X Xdo-install: X ${INSTALL_PROGRAM} ${WRKSRC}/tac_plus ${PREFIX}/sbin X ${INSTALL_MAN} ${WRKSRC}/tac_plus.1 ${PREFIX}/man/man1/tac_plus.1 X ${INSTALL_DATA} ${FILESDIR}/tac_plus.conf.example ${PREFIX}/etc/ X @if [ ! -f ${PREFIX}/etc/rc.d/tac_plus.sh ]; then \ X ${ECHO} "Installing ${PREFIX}/etc/rc.d/tac_plus.sh startup file."; \ X ${ECHO} "#!/bin/sh" > ${PREFIX}/etc/rc.d/tac_plus.sh; \ X ${ECHO} "[ -x ${PREFIX}/sbin/tac_plus -a -f ${PREFIX}/etc/tac_plus.conf ] && ${PREFIX}/sbin/tac_plus -C ${PREFIX}/etc/tac_plus.conf && echo -n ' tac_plus'" >> ${PREFIX}/etc/rc.d/tac_plus.sh; \ X chmod 751 ${PREFIX}/etc/rc.d/tac_plus.sh; \ X fi X.if !defined(NOPORTDOCS) X @${MKDIR} ${PREFIX}/share/doc/tac_plus X ${INSTALL_DATA} ${WRKSRC}/users_guide ${PREFIX}/share/doc/tac_plus X.endif X Xpost-install: X strip ${PREFIX}/sbin/tac_plus X Xpre-clean: X @${RM} -f ${PATCHDIR}/${EXTRA_PATCH} X X.include END-of-tac_plus.F4.0.2.alpha/Makefile echo c - tac_plus.F4.0.2.alpha/pkg mkdir -p tac_plus.F4.0.2.alpha/pkg > /dev/null 2>&1 echo x - tac_plus.F4.0.2.alpha/pkg/COMMENT sed 's/^X//' >tac_plus.F4.0.2.alpha/pkg/COMMENT << 'END-of-tac_plus.F4.0.2.alpha/pkg/COMMENT' XA remote authentication/authorization/accounting server. END-of-tac_plus.F4.0.2.alpha/pkg/COMMENT echo x - tac_plus.F4.0.2.alpha/pkg/DESCR sed 's/^X//' >tac_plus.F4.0.2.alpha/pkg/DESCR << 'END-of-tac_plus.F4.0.2.alpha/pkg/DESCR' Xtacacs+ s program that allow authorization and Xauthentication via net on remote access servers. XAuthnticate users, authorize commands and log Xaccounting information. X XDetails are described at: Xhttp://www.cisco.com/warp/public/146/187.html X X-- Taras Xtasic@lucky.net END-of-tac_plus.F4.0.2.alpha/pkg/DESCR echo x - tac_plus.F4.0.2.alpha/pkg/PLIST sed 's/^X//' >tac_plus.F4.0.2.alpha/pkg/PLIST << 'END-of-tac_plus.F4.0.2.alpha/pkg/PLIST' Xetc/rc.d/tac_plus.sh Xetc/tac_plus.conf.example Xsbin/tac_plus Xshare/doc/tac_plus/users_guide X@dirrm share/doc/tac_plus END-of-tac_plus.F4.0.2.alpha/pkg/PLIST echo c - tac_plus.F4.0.2.alpha/files mkdir -p tac_plus.F4.0.2.alpha/files > /dev/null 2>&1 echo x - tac_plus.F4.0.2.alpha/files/md5 sed 's/^X//' >tac_plus.F4.0.2.alpha/files/md5 << 'END-of-tac_plus.F4.0.2.alpha/files/md5' XMD5 (tac_plus.F4.0.2.alpha.tar.Z) = c79a89c93074b30b5e7b70af28c3c285 END-of-tac_plus.F4.0.2.alpha/files/md5 echo x - tac_plus.F4.0.2.alpha/files/patch-ba sed 's/^X//' >tac_plus.F4.0.2.alpha/files/patch-ba << 'END-of-tac_plus.F4.0.2.alpha/files/patch-ba' X*** authen.c.orig Thu Sep 9 15:21:09 1999 X--- authen.c Thu Sep 9 15:21:28 1999 X*************** X*** 227,235 **** X X datap->status = TAC_PLUS_AUTHEN_STATUS_GETUSER; X if (datap->service == TAC_PLUS_AUTHEN_SVC_LOGIN) { X! prompt = "\nUser Access Verification\n\nUsername: "; X } else { X! prompt = "Username: "; X } X send_authen_reply(TAC_PLUS_AUTHEN_STATUS_GETUSER, /* status */ X prompt, /* msg */ X--- 227,235 ---- X X datap->status = TAC_PLUS_AUTHEN_STATUS_GETUSER; X if (datap->service == TAC_PLUS_AUTHEN_SVC_LOGIN) { X! prompt = "\nUser Access Verification\n\nlogin: "; X } else { X! prompt = "login: "; X } X send_authen_reply(TAC_PLUS_AUTHEN_STATUS_GETUSER, /* status */ X prompt, /* msg */ X*** default_v0_fn.c.orig Thu Sep 9 15:22:52 1999 X--- default_v0_fn.c Thu Sep 9 15:23:09 1999 X*************** X*** 87,95 **** X /* No username. Try requesting one */ X data->status = TAC_PLUS_AUTHEN_STATUS_GETUSER; X if (data->service == TAC_PLUS_AUTHEN_SVC_LOGIN) { X! prompt = "\nUser Access Verification\n\nUsername: "; X } else { X! prompt = "Username: "; X } X data->server_msg = tac_strdup(prompt); X p->state = STATE_AUTHEN_GETUSER; X--- 87,95 ---- X /* No username. Try requesting one */ X data->status = TAC_PLUS_AUTHEN_STATUS_GETUSER; X if (data->service == TAC_PLUS_AUTHEN_SVC_LOGIN) { X! prompt = "\nUser Access Verification\n\nlogin: "; X } else { X! prompt = "login: "; X } X data->server_msg = tac_strdup(prompt); X p->state = STATE_AUTHEN_GETUSER; X*** skey_fn.c.orig Thu Sep 9 15:23:23 1999 X--- skey_fn.c Thu Sep 9 15:23:56 1999 X*************** X*** 116,124 **** X /* No username. Try requesting one */ X data->status = TAC_PLUS_AUTHEN_STATUS_GETUSER; X if (data->service == TAC_PLUS_AUTHEN_SVC_LOGIN) { X! prompt = "\nUser Access Verification\n\nUsername: "; X } else { X! prompt = "Username: "; X } X data->server_msg = tac_strdup(prompt); X p->state = STATE_AUTHEN_GETUSER; X--- 116,124 ---- X /* No username. Try requesting one */ X data->status = TAC_PLUS_AUTHEN_STATUS_GETUSER; X if (data->service == TAC_PLUS_AUTHEN_SVC_LOGIN) { X! prompt = "\nUser Access Verification\n\nlogin: "; X } else { X! prompt = "login: "; X } X data->server_msg = tac_strdup(prompt); X p->state = STATE_AUTHEN_GETUSER; END-of-tac_plus.F4.0.2.alpha/files/patch-ba echo x - tac_plus.F4.0.2.alpha/files/tac_plus.conf.example sed 's/^X//' >tac_plus.F4.0.2.alpha/files/tac_plus.conf.example << 'END-of-tac_plus.F4.0.2.alpha/files/tac_plus.conf.example' X# /usr/local/etc/tac_plus.conf X X # This is example from old version of tac_plus. It will work X # but config file have new features. I recomend to read X # /usr/local/share/doc/tac_plus/users_guide X Xuser=fred { X name = "Fred Flintstone" X login = des mEX027bHtzTlQ X X # Remember that authorization is also recursive over groups, in X # the same way that password lookups are recursive. Thus, if you X # place a user in a group, the daemon will look in the group for X # authorization parameters if it cannot find them in the user X # declaration. X member = admin X X expires = "May 23 2005" X X service = exec { X # When Fred starts an exec, his connection access list is 5 X acl = 5 X X # We require this autocmd to be done at startup X autocmd = "telnet foo" X } X X # All commands except telnet 131.108.13.* are denied for Fred X cmd = telnet { X # Fred can run the following telnet command X permit 131\.108\.13\.[0-9]+ X X deny .* X } X X service = ppp protocol = ip { X # Fred can run ip over ppp only if he uses one X # of the following mandatory addresses If he supplies no X # address, the first one here will be mandated X addr=131.108.12.11 X addr=131.108.12.12 X addr=131.108.12.13 X addr=131.108.12.14 X X # Fred's mandatory input access list number is 101 X inacl=101 X X # We will suggest an output access list of 102, but Fred may X # choose to ignore or override it X optional outacl=102 X } X X service = slip { X # Fred can run slip. When he does, he will have to use X # these mandatory access lists X inacl=101 X outacl=102 X } X X # set a timeout in the lcp layer of ppp X service = ppp protocol = lcp { X timeout = 10 X } X} X Xuser = wilma { X # Wilma has no password of her own, but she's a group member so X # she'll use the group password if there is one. Same for her X # password expiry date X member = admin X} X Xgroup = admin { X # group members who don't have their own password will be looked X # up in /etc/passwd X login = file /etc/passwd X X # group members who have no expiry date set will use this one X expires = "Jan 1 1998" X} END-of-tac_plus.F4.0.2.alpha/files/tac_plus.conf.example echo c - tac_plus.F4.0.2.alpha/patches mkdir -p tac_plus.F4.0.2.alpha/patches > /dev/null 2>&1 echo x - tac_plus.F4.0.2.alpha/patches/patch-aa sed 's/^X//' >tac_plus.F4.0.2.alpha/patches/patch-aa << 'END-of-tac_plus.F4.0.2.alpha/patches/patch-aa' X*** Makefile.orig Thu Sep 9 15:29:14 1999 X--- Makefile Thu Sep 9 15:46:20 1999 X*************** X*** 35,43 **** X # OSLIBS=-lsocket -lnsl X X # For FreeBSD X! # OS=-DFREEBSD X # You may also need to add: X! # OSLIBS=-lcrypt X # NOTE: If you want your password encryption to be compatible with X # e.g. SunOS, you may need to instead use: X # OSLIBS=-ldescrypt X--- 35,43 ---- X # OSLIBS=-lsocket -lnsl X X # For FreeBSD X! OS=-DFREEBSD X # You may also need to add: X! OSLIBS=-lcrypt X # NOTE: If you want your password encryption to be compatible with X # e.g. SunOS, you may need to instead use: X # OSLIBS=-ldescrypt X*************** X*** 77,89 **** X # possible), containing its process id. Uncomment and modify the X # following line to change this filename X X! # PIDFILE = -DTAC_PLUS_PIDFILE=\"/var/run/tac_plus.pid\" X X # X # End of customisable section of Makefile X # X X! CFLAGS = $(DEBUG) $(DEFINES) $(INCLUDES) $(FLAGS) $(OS) $(PIDFILE) $(MAXSESS) X X HFILES = expire.h parse.h regmagic.h md5.h regexp.h tac_plus.h X X--- 77,89 ---- X # possible), containing its process id. Uncomment and modify the X # following line to change this filename X X! PIDFILE = -DTAC_PLUS_PIDFILE=\"/var/run/tac_plus.pid\" X X # X # End of customisable section of Makefile X # X X! CFLAGS += $(DEBUG) $(DEFINES) $(INCLUDES) $(FLAGS) $(OS) $(PIDFILE) $(MAXSESS) X X HFILES = expire.h parse.h regmagic.h md5.h regexp.h tac_plus.h X X*************** X*** 122,129 **** X -rm -f *.o *~ *.BAK tac_plus generate_passwd X X install: X! cp tac_plus /usr/local/bin X! cp tac_plus.1 /usr/man/manl/tac_plus.l X X depend: X makedepend $(CFLAGS) $(SRCS) X--- 122,129 ---- X -rm -f *.o *~ *.BAK tac_plus generate_passwd X X install: X! cp tac_plus /usr/local/sbin X! cp tac_plus.1 /usr/local/man/man1/tac_plus.1 X X depend: X makedepend $(CFLAGS) $(SRCS) END-of-tac_plus.F4.0.2.alpha/patches/patch-aa exit >How-To-Repeat: >Fix: >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message