From owner-freebsd-bugs@FreeBSD.ORG Tue Nov 16 22:20:32 2004 Return-Path: Delivered-To: freebsd-bugs@hub.freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 04D1116A4CE for ; Tue, 16 Nov 2004 22:20:32 +0000 (GMT) Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id E58B643D53 for ; Tue, 16 Nov 2004 22:20:31 +0000 (GMT) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.12.11/8.12.11) with ESMTP id iAGMKV7B076518 for ; Tue, 16 Nov 2004 22:20:31 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.12.11/8.12.11/Submit) id iAGMKV1A076517; Tue, 16 Nov 2004 22:20:31 GMT (envelope-from gnats) Date: Tue, 16 Nov 2004 22:20:31 GMT Message-Id: <200411162220.iAGMKV1A076517@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.org From: Dick Davies Subject: Re: bin/30235: /usr/sbin/portmap cannot listen to localhost UDP only (patch) X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list Reply-To: Dick Davies List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 16 Nov 2004 22:20:32 -0000 The following reply was made to PR bin/30235; it has been noted by GNATS. From: Dick Davies To: freebsd-gnats-submit@FreeBSD.org Cc: Robert Faulds Subject: Re: bin/30235: /usr/sbin/portmap cannot listen to localhost UDP only (patch) Date: Tue, 16 Nov 2004 22:14:30 +0000 * Robert Faulds [1102 20:02]: > Could we get this patch applied to stable, please? Please don't, it would be embarassing. I sent that patch 3 years ago, when I was only halfway through K&R. I can't believe it's taken that long to be looked at. I suspect no-one had the heart to close it, saying 'this is ugly as sin, I'm not committing this').. It was a kludge at the time (there *must* be a saner way to check an IP than to use strcmp) and it's not right to commit such a mess. A better fix would be to backport rpcbind to 4.* - I just checked that on a 5.3 system and it works as documented - then the portmap code could be taken out and shot. NB: this doesn't work for tcp ports in any case, and I don't know enough about NFS to know why '-h' only applies to udp. So a firewall would be a safer option if you are concerned about exposing ports. But feel free to use the patch if it's any use to you. -- With that big new contract, I've been able to make those government mandated upgrades you've all been suing me about. - Prof. Farnsworth Rasputin :: Jack of All Trades - Master of Nuns