From owner-freebsd-ports Thu Jan 7 14:00:12 1999 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id OAA14590 for freebsd-ports-outgoing; Thu, 7 Jan 1999 14:00:12 -0800 (PST) (envelope-from owner-freebsd-ports@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id OAA14569 for ; Thu, 7 Jan 1999 14:00:08 -0800 (PST) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id OAA20525; Thu, 7 Jan 1999 14:00:02 -0800 (PST) Received: from disavowed.broken.net (disavowed.broken.net [204.216.142.33]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id NAA14476 for ; Thu, 7 Jan 1999 13:59:30 -0800 (PST) (envelope-from ian@disavowed.broken.net) Received: (from ian@localhost) by disavowed.broken.net (8.8.7/8.8.7) id NAA10935; Thu, 7 Jan 1999 13:56:15 -0800 (PST) Message-Id: <199901072156.NAA10935@disavowed.broken.net> Date: Thu, 7 Jan 1999 13:56:15 -0800 (PST) From: ian@broken.net Reply-To: ian@broken.net To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: ports/9377: www/ijb update Sender: owner-freebsd-ports@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 9377 >Category: ports >Synopsis: www/ijb update >Confidential: yes >Severity: non-critical >Priority: low >Responsible: freebsd-ports >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Thu Jan 7 14:00:01 PST 1999 >Closed-Date: >Last-Modified: >Originator: Ian Struble >Release: FreeBSD 3.0-CURRENT i386 >Organization: >Environment: >Description: The ijb port was not compiling cleanly because of an update. The update involved a security issue so all users should upgrade. The makefile was modified to reflect the new version, the files/md5 was updated and the following files were deleted: patches/patch-ab patches/patch-ac patches/patch-ad patches/patch-ae patches/patch-af patches/patch-ag And thank Mike Harding for bugging me about the stale port! >How-To-Repeat: >Fix: apply the following patch to the existing ijb directory. ---- diff -ruN ijb_old/Makefile ijb/Makefile --- ijb_old/Makefile Thu Jan 7 12:10:34 1999 +++ ijb/Makefile Thu Jan 7 13:37:02 1999 @@ -6,7 +6,7 @@ # $Id: Makefile,v 1.1.1.1 1998/05/03 20:51:37 mph Exp $ DISTNAME= ijb20 -PKGNAME= ijb-2.0 +PKGNAME= ijb-2.0.2 CATEGORIES= www MASTER_SITES= http://www.junkbusters.com/ht/en/ EXTRACT_SUFX= .tar.Z diff -ruN ijb_old/files/md5 ijb/files/md5 --- ijb_old/files/md5 Thu Jan 7 12:10:33 1999 +++ ijb/files/md5 Thu Jan 7 13:30:21 1999 @@ -1 +1 @@ -MD5 (ijb20.tar.Z) = 049bc49131665c6510ae23cdb7354011 +MD5 (ijb20.tar.Z) = 1404ac1659334aecd4aa86db6a8b8edf diff -ruN ijb_old/patches/patch-ab ijb/patches/patch-ab --- ijb_old/patches/patch-ab Thu Jan 7 12:10:33 1999 +++ ijb/patches/patch-ab Wed Dec 31 16:00:00 1969 @@ -1,245 +0,0 @@ -*** junkbstr.ini.orig Sat May 2 13:08:49 1998 ---- junkbstr.ini Sat May 2 13:19:13 1998 -*************** -*** 1,120 **** -! # Sample Configuration file for the Internet Junkbuster 2.0 -! -! # -! # Copyright 1997-8 Junkbusters Corp. For distribution, modification and use -! # under the GNU General Public License. These files come with NO WARRANTY. -! # See http://www.junkbusters.com/ht/en/gpl.html or README file for details. -! # -! # When starting the proxy, give the name of this file as an argument. -! # Any changes made to this file are *not* automatically loaded; you have -! # to stop and restart the proxy. -! -! # For information see http://www.junkbusters.com/ht/en/ijbman.html -! # or the documentation that came with the release -! -! # the blockfile contains patterns to be blocked by the proxy -! # -! blockfile sblock.ini # comments are OK here, too -! # -! # or can use full paths for files, like so -! # -! #blockfile /usr/local/lib/junkbusters/blockfile -! -! # the cookiefile contains patterns to specify the cookie management policy -! # -! #cookiefile scookie.ini -! -! # the logfile is where all logging and error messages are written -! # -! #logfile logfile -! -! # the jarfile is where cookies can be stored -! # -! #jarfile jarfile -! -! # the forwardfile defines domain-specific routing -! # -! #forwardfile sforward.ini -! -! # file which lists and into which trusted domains are written -! # -! #trustfile strust.ini -! # files specify locations of "for information about trusted referers, see.." -! # multiple trust_info_url lines are OK -! # -! # trust_info_url http://internet.junkbuster.com/ -! # trust_info_url http://www.yoursite.com/trust_policy.html -! # -! -! # The access control list file can be used to restrict IP addresses -! # that are permitted to use the proxy (see warnings in the FAQ). -! # -! #aclfile saclfile.ini -! -! # add an "X-Forwarded-For:" specification to each request header -! # -! #add-forwarded-header -! -! # if logging cookies into a jarfile, and no other wafers were -! # explicity set, then by default a vanilla wafer is sent with -! # each request. -! # -! # setting 'suppress-vanilla-wafer' stops this vanilla wafer from -! # being sent. -! # -! #suppress-vanilla-wafer -! -! # add these wafers to each request header -! # multiple wafer lines are OK -! # -! #wafer NOTE=Like most people, I want my browsing to be anonymous. -! #wafer WARNING=Please do not attempt to track me. -! -! # Anything can be added to the request headers. Please don't litter. -! # multiple add-header lines are OK -! # -! #add-header Forwarded: by http://pro-privacy-isp.net -! #add-header Proxy-Connection: Keep-Alive -! -! # listen-address specifies where the Junkbuster will listen for connections -! # (it's equivalent to the -h option in Version 1) -! # The default is to bind to all IP addresses (INADDR_ANY) -! # Specifying a port is optional; if unspecified the defaults is 8000 -! # -! #listen-address localhost -! #listen-address 124.207.250.245:8080 -! -! # user-agent specifies treatment of the "User-Agent:" (and "UA-*:") header(s) -! # -! #user-agent @ -! -! # referer specifies treatment of the "Referer:" header -! # -! #referer @ -! -! # from specifies value to be subsituted if browser provides a "From:" header -! # -! #from spam-me-senseless@sittingduck.net -! -! # hide-console is used only on Win32. It instructs the Internet Junkbuster -! # to disconnect from and hide the command console. -! # -! #hide-console -! -! # debug sets the level of debugging information to log in the logfile -! # -! # debug 1 # GPC = show each GET/POST/CONNECT request -! # debug 2 # CONN = show each connection status -! # debug 4 # IO = show I/O status -! # debug 8 # HDR = show header parsing -! # debug 16 # LOG = log all data into the logfile -! # -! # multiple "debug" directives, are OK - they're logical-OR'd together -! # -! # debug 15 # same as setting the first 4 listed above -! -! # single-threaded operation (i.e. disallows multiple threads or processes) -! # This is most often used for debugging because it keeps the -! # debugging output "in order" for easy reading. -! # -! #single-threaded ---- 1,120 ---- -! # Sample Configuration file for the Internet Junkbuster 2.0 -! -! # -! # Copyright 1997-8 Junkbusters Corp. For distribution, modification and use -! # under the GNU General Public License. These files come with NO WARRANTY. -! # See http://www.junkbusters.com/ht/en/gpl.html or README file for details. -! # -! # When starting the proxy, give the name of this file as an argument. -! # Any changes made to this file are *not* automatically loaded; you have -! # to stop and restart the proxy. -! -! # For information see http://www.junkbusters.com/ht/en/ijbman.html -! # or the documentation that came with the release -! -! # the blockfile contains patterns to be blocked by the proxy -! # -! #blockfile sblock.ini # comments are OK here, too -! # -! # or can use full paths for files, like so -! # -! blockfile /usr/local/etc/junkbuster/blockfile -! -! # the cookiefile contains patterns to specify the cookie management policy -! # -! #cookiefile cookiefile -! -! # the logfile is where all logging and error messages are written -! # -! #logfile logfile -! -! # the jarfile is where cookies can be stored -! # -! #jarfile jarfile -! -! # the forwardfile defines domain-specific routing -! # -! #forwardfile forwardfile -! -! # file which lists and into which trusted domains are written -! # -! #trustfile trustfile -! # files specify locations of "for information about trusted referers, see.." -! # multiple trust_info_url lines are OK -! # -! # trust_info_url http://internet.junkbuster.com/ -! # trust_info_url http://www.yoursite.com/trust_policy.html -! # -! -! # The access control list file can be used to restrict IP addresses -! # that are permitted to use the proxy (see warnings in the FAQ). -! # -! #aclfile aclfile -! -! # add an "X-Forwarded-For:" specification to each request header -! # -! #add-forwarded-header -! -! # if logging cookies into a jarfile, and no other wafers were -! # explicity set, then by default a vanilla wafer is sent with -! # each request. -! # -! # setting 'suppress-vanilla-wafer' stops this vanilla wafer from -! # being sent. -! # -! #suppress-vanilla-wafer -! -! # add these wafers to each request header -! # multiple wafer lines are OK -! # -! #wafer NOTE=Like most people, I want my browsing to be anonymous. -! #wafer WARNING=Please do not attempt to track me. -! -! # Anything can be added to the request headers. Please don't litter. -! # multiple add-header lines are OK -! # -! #add-header Forwarded: by http://pro-privacy-isp.net -! #add-header Proxy-Connection: Keep-Alive -! -! # listen-address specifies where the Junkbuster will listen for connections -! # (it's equivalent to the -h option in Version 1) -! # The default is to bind to all IP addresses (INADDR_ANY) -! # Specifying a port is optional; if unspecified the defaults is 8000 -! # -! #listen-address localhost -! #listen-address 124.207.250.245:8080 -! -! # user-agent specifies treatment of the "User-Agent:" (and "UA-*:") header(s) -! # -! #user-agent @ -! -! # referer specifies treatment of the "Referer:" header -! # -! #referer @ -! -! # from specifies value to be subsituted if browser provides a "From:" header -! # -! #from spam-me-senseless@sittingduck.net -! -! # hide-console is used only on Win32. It instructs the Internet Junkbuster -! # to disconnect from and hide the command console. -! # -! #hide-console -! -! # debug sets the level of debugging information to log in the logfile -! # -! # debug 1 # GPC = show each GET/POST/CONNECT request -! # debug 2 # CONN = show each connection status -! # debug 4 # IO = show I/O status -! # debug 8 # HDR = show header parsing -! # debug 16 # LOG = log all data into the logfile -! # -! # multiple "debug" directives, are OK - they're logical-OR'd together -! # -! # debug 15 # same as setting the first 4 listed above -! -! # single-threaded operation (i.e. disallows multiple threads or processes) -! # This is most often used for debugging because it keeps the -! # debugging output "in order" for easy reading. -! # -! #single-threaded diff -ruN ijb_old/patches/patch-ac ijb/patches/patch-ac --- ijb_old/patches/patch-ac Thu Jan 7 12:10:33 1999 +++ ijb/patches/patch-ac Wed Dec 31 16:00:00 1969 @@ -1,203 +0,0 @@ -*** saclfile.ini.orig Sat May 2 13:09:56 1998 ---- saclfile.ini Sat May 2 13:12:00 1998 -*************** -*** 1,99 **** -! # Access Control List for the Internet Junkbuster 2.0 -! # -! # Copyright 1997-8 Junkbusters Corp. For distribution, modification and use -! # under the GNU General Public License. These files come with NO WARRANTY. -! # See http://www.junkbusters.com/ht/en/gpl.html or README file for details. -! # -! # Access controls are included at the request of some ISPs and systems -! # administrators, and are not usually needed by individual users. -! # Please note the warnings in the FAQ that this proxy is not -! # intended to be a substitute for a firewall or to encourage anyone -! # to defer addressing basic security weaknesses. -! # For details see http://www.junkbusters.com/ht/en/ijbman.html#aclfile -! -! # If no access file is specified, the proxy talks to anyone that connects. -! # If an access file is specified, the proxy talks only to IP addresses -! # permitted somewhere in this file and not denied later in this file. -! # -! # Summary -- if using an ACL: -! # -! # Client must have permission to receive service -! # LAST match in ACL file wins -! # Default behavior is to deny service -! # -! # Syntax for an entry in an Access Control List is: -! # -! # ACTION SRC_ADDR[/SRC_MASKLEN] [ DST_ADDR[/DST_MASKLEN] ] -! # -! # where the fields are -! # -! # ACTION = "permit" | "deny" -! # -! # SRC_ADDR = client hostname or dotted IP address -! # SRC_MASKLEN = number of bits in the subnet mask for the source -! # -! # DST_ADDR = server or forwarder hostname or dotted IP address -! # DST_MASKLEN = number of bits in the subnet mask for the target -! # -! # field separator (FS) is whitespace (space or tab) -! # -! # IMPORTANT NOTE -! # ============== -! # If the junkbuster is using a forwarder or a gateway for a particular -! # destination URL, the DST_ADDRR that is examined is the address of -! # the forwarder or the gateway and NOT the address of the ultimate target. -! # This is necessary because it may be impossible for the local -! # junkbuster to determine the address of the ultimate target -! # (that's often what gateways are used for). -! # -! # Here are a few examples to show how the ACL works: -! -! # localhost is OK -- no DST_ADDR implies that ALL destination addresses are OK -! # permit localhost -! -! # a silly example to illustrate: -! # -! # permit any host on the class-C subnet with junkbusters to go anywhere -! # -! # permit www.junkbusters.com/24 -! # -! # except deny one particular IP address from using it at all -! # -! # deny ident.junkbusters.com -! -! # another example -! # -! # You can specify an explicit network address and subnet mask. -! # Explicit addresses do not have to be resolved to be used. -! # -! # permit 207.153.200.0/24 -! -! # a subnet mask of 0 matches anything, so the next line permits everyone. -! # -! # permit 0.0.0.0/0 -! -! # Note: you cannot say -! # -! # permit .org -! # -! # to allow all .org domains; every IP-address listed must resolve fully. -! -! # An ISP may want to provide a junkbuster that is accessible by "the world" -! # and yet restrict use of some of their private content to hosts on its -! # internal network (i.e. its own subscribers). Say, for instance the -! # ISP owns the Class-B IP address block 123.124.0.0 (a 16 bit netmask). -! # This is how they could do it: -! -! # permit 0.0.0.0/0 0.0.0.0/0 # other clients can go anywhere -! # with the following exceptions: -! # -! # deny 0.0.0.0/0 123.124.0.0/16 # block all external requests for -! # sites on the ISP's network -! # -! # permit 0.0.0.0/0 www.my_isp.com # except for the ISP's main web site -! # -! # permit 123.124.0.0/16 0.0.0.0/0 # the ISP's clients can go anywhere -! -! # Note that some hostnames may be listed with multiple IP addresses; -! # the primary value returned by gethostbyname() is used. -! # ---- 1,99 ---- -! # Access Control List for the Internet Junkbuster 2.0 -! # -! # Copyright 1997-8 Junkbusters Corp. For distribution, modification and use -! # under the GNU General Public License. These files come with NO WARRANTY. -! # See http://www.junkbusters.com/ht/en/gpl.html or README file for details. -! # -! # Access controls are included at the request of some ISPs and systems -! # administrators, and are not usually needed by individual users. -! # Please note the warnings in the FAQ that this proxy is not -! # intended to be a substitute for a firewall or to encourage anyone -! # to defer addressing basic security weaknesses. -! # For details see http://www.junkbusters.com/ht/en/ijbman.html#aclfile -! -! # If no access file is specified, the proxy talks to anyone that connects. -! # If an access file is specified, the proxy talks only to IP addresses -! # permitted somewhere in this file and not denied later in this file. -! # -! # Summary -- if using an ACL: -! # -! # Client must have permission to receive service -! # LAST match in ACL file wins -! # Default behavior is to deny service -! # -! # Syntax for an entry in an Access Control List is: -! # -! # ACTION SRC_ADDR[/SRC_MASKLEN] [ DST_ADDR[/DST_MASKLEN] ] -! # -! # where the fields are -! # -! # ACTION = "permit" | "deny" -! # -! # SRC_ADDR = client hostname or dotted IP address -! # SRC_MASKLEN = number of bits in the subnet mask for the source -! # -! # DST_ADDR = server or forwarder hostname or dotted IP address -! # DST_MASKLEN = number of bits in the subnet mask for the target -! # -! # field separator (FS) is whitespace (space or tab) -! # -! # IMPORTANT NOTE -! # ============== -! # If the junkbuster is using a forwarder or a gateway for a particular -! # destination URL, the DST_ADDRR that is examined is the address of -! # the forwarder or the gateway and NOT the address of the ultimate target. -! # This is necessary because it may be impossible for the local -! # junkbuster to determine the address of the ultimate target -! # (that's often what gateways are used for). -! # -! # Here are a few examples to show how the ACL works: -! -! # localhost is OK -- no DST_ADDR implies that ALL destination addresses are OK -! # permit localhost -! -! # a silly example to illustrate: -! # -! # permit any host on the class-C subnet with junkbusters to go anywhere -! # -! # permit www.junkbusters.com/24 -! # -! # except deny one particular IP address from using it at all -! # -! # deny ident.junkbusters.com -! -! # another example -! # -! # You can specify an explicit network address and subnet mask. -! # Explicit addresses do not have to be resolved to be used. -! # -! # permit 207.153.200.0/24 -! -! # a subnet mask of 0 matches anything, so the next line permits everyone. -! # -! # permit 0.0.0.0/0 -! -! # Note: you cannot say -! # -! # permit .org -! # -! # to allow all .org domains; every IP-address listed must resolve fully. -! -! # An ISP may want to provide a junkbuster that is accessible by "the world" -! # and yet restrict use of some of their private content to hosts on its -! # internal network (i.e. its own subscribers). Say, for instance the -! # ISP owns the Class-B IP address block 123.124.0.0 (a 16 bit netmask). -! # This is how they could do it: -! -! # permit 0.0.0.0/0 0.0.0.0/0 # other clients can go anywhere -! # with the following exceptions: -! # -! # deny 0.0.0.0/0 123.124.0.0/16 # block all external requests for -! # sites on the ISP's network -! # -! # permit 0.0.0.0/0 www.my_isp.com # except for the ISP's main web site -! # -! # permit 123.124.0.0/16 0.0.0.0/0 # the ISP's clients can go anywhere -! -! # Note that some hostnames may be listed with multiple IP addresses; -! # the primary value returned by gethostbyname() is used. -! # diff -ruN ijb_old/patches/patch-ad ijb/patches/patch-ad --- ijb_old/patches/patch-ad Thu Jan 7 12:10:33 1999 +++ ijb/patches/patch-ad Wed Dec 31 16:00:00 1969 @@ -1,105 +0,0 @@ -*** sblock.ini.orig Sat May 2 13:10:06 1998 ---- sblock.ini Sat May 2 13:12:07 1998 -*************** -*** 1,50 **** -! # Illustrative Blockfile for the Internet Junkbuster -! # -! # Copyright 1997-8 Junkbusters Corp. For distribution, modification and use -! # under the GNU General Public License. These files come with NO WARRANTY. -! # See http://www.junkbusters.com/ht/en/gpl.html or README file for details. -! # -! # For more detail, see http://www.junkbusters.com/ht/en/ijbfaq.html#blocking -! # -! # More comprehensive blockfiles are available elsewhere, ask a search engine -! # for documents that mention "junkbuster" and are called "blocklist" e.g. -! # http://altavista.digital.com/cgi-bin/query?pg=q&what=web&fmt=.&q=%2Bjunkbuster+%2Burl%3Ablocklist -! -! # Empty lines and comment lines beginning with a # is ignored. -! -! # The following line illustrates how to block a port (port 23 is telnet) -! :23 -! # for more detail see http://www.junkbusters/com/ht/en/ijbfaq.html#attack -! -! # To block a particular URL, you can list it in full (omit the http://): -! www.junkbusters.com/images/space.gif -! -! # Almost all the following examples are commented out. To make them work, -! # remove the comment so that this: -! # www7.suckerfinder.com/cgi-bin/compost_tumbler/strayed-in-from=14387 -! # looks like this: -! www7.suckerfinder.com/cgi-bin/compost_tumbler/strayed-in-from=14387 -! -! # You can chop off parts on the left and right to get a broader block: -! suckerfinder.com/cgi-bin/compost_tumbler/ -! -! # To block an entire site, simply include its domain name: -! # ad.manipumedia.net -! # patentlyoffensive.com -! -! # With no hostname, a pathname blocks regardless of the domain name: -! # /images/banners/mindless/ -! # /bandwidth-hogs/ -! -! # Provided pattern matching option was used in the Makefile (now the default) -! # you can use patterns such as -! # the /*.* allows matches anywhere in the URL -! # /*.*banner -! # /*.*/DespisedProductName.*.gif -! # you can put * in the domain part only, not the path. -! # ad*.*.* -! # For more details see http://www.junkbusters.com/ht/en/ijbfaq.html#regex -! -! # The ~ character in column one stops blocking if a previous pattern matched. -! # The last match wins, so these exceptions are usually placed at the end. -! # ~mycompany.com ---- 1,50 ---- -! # Illustrative Blockfile for the Internet Junkbuster -! # -! # Copyright 1997-8 Junkbusters Corp. For distribution, modification and use -! # under the GNU General Public License. These files come with NO WARRANTY. -! # See http://www.junkbusters.com/ht/en/gpl.html or README file for details. -! # -! # For more detail, see http://www.junkbusters.com/ht/en/ijbfaq.html#blocking -! # -! # More comprehensive blockfiles are available elsewhere, ask a search engine -! # for documents that mention "junkbuster" and are called "blocklist" e.g. -! # http://altavista.digital.com/cgi-bin/query?pg=q&what=web&fmt=.&q=%2Bjunkbuster+%2Burl%3Ablocklist -! -! # Empty lines and comment lines beginning with a # is ignored. -! -! # The following line illustrates how to block a port (port 23 is telnet) -! :23 -! # for more detail see http://www.junkbusters/com/ht/en/ijbfaq.html#attack -! -! # To block a particular URL, you can list it in full (omit the http://): -! www.junkbusters.com/images/space.gif -! -! # Almost all the following examples are commented out. To make them work, -! # remove the comment so that this: -! # www7.suckerfinder.com/cgi-bin/compost_tumbler/strayed-in-from=14387 -! # looks like this: -! www7.suckerfinder.com/cgi-bin/compost_tumbler/strayed-in-from=14387 -! -! # You can chop off parts on the left and right to get a broader block: -! suckerfinder.com/cgi-bin/compost_tumbler/ -! -! # To block an entire site, simply include its domain name: -! # ad.manipumedia.net -! # patentlyoffensive.com -! -! # With no hostname, a pathname blocks regardless of the domain name: -! # /images/banners/mindless/ -! # /bandwidth-hogs/ -! -! # Provided pattern matching option was used in the Makefile (now the default) -! # you can use patterns such as -! # the /*.* allows matches anywhere in the URL -! # /*.*banner -! # /*.*/DespisedProductName.*.gif -! # you can put * in the domain part only, not the path. -! # ad*.*.* -! # For more details see http://www.junkbusters.com/ht/en/ijbfaq.html#regex -! -! # The ~ character in column one stops blocking if a previous pattern matched. -! # The last match wins, so these exceptions are usually placed at the end. -! # ~mycompany.com diff -ruN ijb_old/patches/patch-ae ijb/patches/patch-ae --- ijb_old/patches/patch-ae Thu Jan 7 12:10:33 1999 +++ ijb/patches/patch-ae Wed Dec 31 16:00:00 1969 @@ -1,47 +0,0 @@ -*** scookie.ini.orig Sat May 2 13:10:16 1998 ---- scookie.ini Sat May 2 13:12:15 1998 -*************** -*** 1,21 **** -! # Illustrative Cookiefile for the Internet Junkbuster -! # For more detail, see http://www.junkbusters.com/ht/en/ijbfaq.html#cookies -! -! # Copyright 1997-8 Junkbusters Corp. For distribution, modification and use -! # under the GNU General Public License. These files come with NO WARRANTY. -! # See http://www.junkbusters.com/ht/en/gpl.html or README file for details. -! -! # Empty lines and lines beginning with a # is ignored. -! # To permit an entire site to set cookies, simply include its domain name: -! really-trustyworthy-people.org -! -! # You can allow cookies out, but stop them coming in: -! >send-user-cookies.com -! # For more details see http://www.junkbusters.com/ht/en/ijbfaq.html#crumble -! -! # With the -r @ option the cookiefile also allows selective disclosure of -! # Referer. The following line gives it to Intellicast's map server. (At -! # least at the time of writing; check View Document Info on the referring page) -! # For more details see http://www.junkbusters.com/ht/en/ijbfaq.html#breakage -! >uclick.com -! >208.194.150.32 ---- 1,21 ---- -! # Illustrative Cookiefile for the Internet Junkbuster -! # For more detail, see http://www.junkbusters.com/ht/en/ijbfaq.html#cookies -! -! # Copyright 1997-8 Junkbusters Corp. For distribution, modification and use -! # under the GNU General Public License. These files come with NO WARRANTY. -! # See http://www.junkbusters.com/ht/en/gpl.html or README file for details. -! -! # Empty lines and lines beginning with a # is ignored. -! # To permit an entire site to set cookies, simply include its domain name: -! really-trustyworthy-people.org -! -! # You can allow cookies out, but stop them coming in: -! >send-user-cookies.com -! # For more details see http://www.junkbusters.com/ht/en/ijbfaq.html#crumble -! -! # With the -r @ option the cookiefile also allows selective disclosure of -! # Referer. The following line gives it to Intellicast's map server. (At -! # least at the time of writing; check View Document Info on the referring page) -! # For more details see http://www.junkbusters.com/ht/en/ijbfaq.html#breakage -! >uclick.com -! >208.194.150.32 diff -ruN ijb_old/patches/patch-af ijb/patches/patch-af --- ijb_old/patches/patch-af Thu Jan 7 12:10:33 1999 +++ ijb/patches/patch-af Wed Dec 31 16:00:00 1969 @@ -1,159 +0,0 @@ -*** sforward.ini.orig Sat May 2 13:10:25 1998 ---- sforward.ini Sat May 2 13:12:19 1998 -*************** -*** 1,77 **** -! # Forwarding specification for Internet Junkbuster 2.0 -! # -! # Copyright 1997-8 Junkbusters Corp. For distribution, modification and use -! # under the GNU General Public License. These files come with NO WARRANTY. -! # See http://www.junkbusters.com/ht/en/gpl.html or README file for details. -! # -! # This feature allows routing of HTTP requests via multiple proxies. -! # It can be used to better protect privacy and confidentiality when -! # accessing specific domains by routing requests to those domains -! # to a special purpose filtering proxy such as lpwa.com -! # -! # It can also be used in an environmnent with multiple networks to route -! # requests via multiple gateways allowing transparent access to multiple -! # networks without having to modify browser configurations. -! # -! # Also specified here are special gateway protocols such as SOCKS. -! -! # The syntax of each line is -! # -! # target_domain[:port][/path] forwarding_domain[:port] gateway_type gateway_domain[:port] -! # -! -! # A '.' in the forwarding domain/port means that requests made to the -! # target domain are not forwarded but are made directly by the proxy -! # (though the proxy may still use a gateway to contact the server) -! # -! # Lines are checked in turn, and the last match wins. -! # -! # There is an implicit line equivalent to the following, which specifies that -! # anything not finding a match on the list is to go out without forwarding -! # or gateway protocol; like so: -! # -! # * . . . # implicit -! -! # In this fictitious example, everything goes via an ISP's caching proxy, -! # except requests to that ISP: -! # -! # * caching.myisp.net:8000 . . -! # myisp.net . . . -! -! # In this example direct connections are made to all "internal" domains, -! # but everything else goes through Lucent's LPWA by way of the company's -! # SOCKS gateway to the Internet. -! # -! # * lpwa.com:8000 socks argyle.my_company.com:1080 -! # my_company.com . . . -! -! # This is how you could set up a site that always uses SOCKS but no forwarders -! # -! # * . socks knee.my_company.com:1080 -! -! # An advanced example for network administrators. -! # -! # If you're in a situation where you have links to multiple -! # ISP's that provide various special content to their subscribers -! # you can configure forwarding to pass requests to the specific -! # host that's connected to that ISP so that everybody can see -! # all of the content on all of the ISP's. -! # (whew! how's that for a run-on sentence?) -! # -! # This is tricky, but here's a sample: -! # -! # host-a has a PPP connection to isp-a.com -! # host-b has a PPP connection to isp-b.com -! -! # host-a can run an Internet Junkbusters with forwarding like this: -! # -! # / . . . -! # isp-b.com host-b:8000 . . -! # -! # host-b can run an Internet Junkbusters with forwarding like this: -! # / . . . -! # isp-a.com host-a:8000 . . -! # -! # Now, *anyone* on the Internet (including users on host-a and host-b) -! # can set their browser's proxy to *either* host-a or host-b and -! # be able to browse the content on isp-a or isp-b. ---- 1,77 ---- -! # Forwarding specification for Internet Junkbuster 2.0 -! # -! # Copyright 1997-8 Junkbusters Corp. For distribution, modification and use -! # under the GNU General Public License. These files come with NO WARRANTY. -! # See http://www.junkbusters.com/ht/en/gpl.html or README file for details. -! # -! # This feature allows routing of HTTP requests via multiple proxies. -! # It can be used to better protect privacy and confidentiality when -! # accessing specific domains by routing requests to those domains -! # to a special purpose filtering proxy such as lpwa.com -! # -! # It can also be used in an environmnent with multiple networks to route -! # requests via multiple gateways allowing transparent access to multiple -! # networks without having to modify browser configurations. -! # -! # Also specified here are special gateway protocols such as SOCKS. -! -! # The syntax of each line is -! # -! # target_domain[:port][/path] forwarding_domain[:port] gateway_type gateway_domain[:port] -! # -! -! # A '.' in the forwarding domain/port means that requests made to the -! # target domain are not forwarded but are made directly by the proxy -! # (though the proxy may still use a gateway to contact the server) -! # -! # Lines are checked in turn, and the last match wins. -! # -! # There is an implicit line equivalent to the following, which specifies that -! # anything not finding a match on the list is to go out without forwarding -! # or gateway protocol; like so: -! # -! # * . . . # implicit -! -! # In this fictitious example, everything goes via an ISP's caching proxy, -! # except requests to that ISP: -! # -! # * caching.myisp.net:8000 . . -! # myisp.net . . . -! -! # In this example direct connections are made to all "internal" domains, -! # but everything else goes through Lucent's LPWA by way of the company's -! # SOCKS gateway to the Internet. -! # -! # * lpwa.com:8000 socks argyle.my_company.com:1080 -! # my_company.com . . . -! -! # This is how you could set up a site that always uses SOCKS but no forwarders -! # -! # * . socks knee.my_company.com:1080 -! -! # An advanced example for network administrators. -! # -! # If you're in a situation where you have links to multiple -! # ISP's that provide various special content to their subscribers -! # you can configure forwarding to pass requests to the specific -! # host that's connected to that ISP so that everybody can see -! # all of the content on all of the ISP's. -! # (whew! how's that for a run-on sentence?) -! # -! # This is tricky, but here's a sample: -! # -! # host-a has a PPP connection to isp-a.com -! # host-b has a PPP connection to isp-b.com -! -! # host-a can run an Internet Junkbusters with forwarding like this: -! # -! # / . . . -! # isp-b.com host-b:8000 . . -! # -! # host-b can run an Internet Junkbusters with forwarding like this: -! # / . . . -! # isp-a.com host-a:8000 . . -! # -! # Now, *anyone* on the Internet (including users on host-a and host-b) -! # can set their browser's proxy to *either* host-a or host-b and -! # be able to browse the content on isp-a or isp-b. diff -ruN ijb_old/patches/patch-ag ijb/patches/patch-ag --- ijb_old/patches/patch-ag Thu Jan 7 12:10:33 1999 +++ ijb/patches/patch-ag Wed Dec 31 16:00:00 1969 @@ -1,53 +0,0 @@ -*** strust.ini.orig Sat May 2 13:10:33 1998 ---- strust.ini Sat May 2 13:12:26 1998 -*************** -*** 1,24 **** -! # Illustrative Trustfile for the Internet Junkbuster -! # -! # Copyright 1997-8 Junkbusters Corp. For distribution, modification and use -! # under the GNU General Public License. These files come with NO WARRANTY. -! # See http://www.junkbusters.com/ht/en/gpl.html or README file for details. -! -! # Trustfiles are an experimental feature used for building "whitelists" -! # (versus the usual "blacklists" in a blockfile). Most people don't use it. -! # For more detail, see http://www.junkbusters.com/ht/en/ijbman.html#trustfile -! # -! # This is like parsed exactly like a blockfile, except that a '+' -! # in column one is treated like a '~' (i.e. doesn't block) and -! # it adds the spec to the trusted-referer list. -! # -! # Also, the default is to block any URL that is NOT mentioned on this list. -! # -! # While browsing, the domains for URLs that are referred by a trusted referer -! # are added to this list. Thus this acts as a "white-list" of OK places -! # to browse. Note this means that the file will grow longer with use. -! # -! # Example: to allow only links that came from yahooligans, uncomment this line -! # +yahooligans.com -! # and remove the last line (* alone), which unblock everything: -! * ---- 1,24 ---- -! # Illustrative Trustfile for the Internet Junkbuster -! # -! # Copyright 1997-8 Junkbusters Corp. For distribution, modification and use -! # under the GNU General Public License. These files come with NO WARRANTY. -! # See http://www.junkbusters.com/ht/en/gpl.html or README file for details. -! -! # Trustfiles are an experimental feature used for building "whitelists" -! # (versus the usual "blacklists" in a blockfile). Most people don't use it. -! # For more detail, see http://www.junkbusters.com/ht/en/ijbman.html#trustfile -! # -! # This is like parsed exactly like a blockfile, except that a '+' -! # in column one is treated like a '~' (i.e. doesn't block) and -! # it adds the spec to the trusted-referer list. -! # -! # Also, the default is to block any URL that is NOT mentioned on this list. -! # -! # While browsing, the domains for URLs that are referred by a trusted referer -! # are added to this list. Thus this acts as a "white-list" of OK places -! # to browse. Note this means that the file will grow longer with use. -! # -! # Example: to allow only links that came from yahooligans, uncomment this line -! # +yahooligans.com -! # and remove the last line (* alone), which unblock everything: -! * >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message