wok-next view portmap/stuff/portmap-5beta-disable-tcp_wrapper.patch @ rev 13225

fail2ban: add fail2ban filter
author Pascal Bellard <pascal.bellard@slitaz.org>
date Mon Aug 13 19:15:01 2012 +0200 (2012-08-13)
parents
children
line source
1 --- portmap_5beta/Makefile Fri Feb 1 11:54:29 2008
2 +++ Makefile Fri Feb 1 11:55:19 2008
3 @@ -15,9 +15,9 @@
4 # no access control tables. The local system, since it runs the portmap
5 # daemon, is always treated as an authorized host.
7 -HOSTS_ACCESS= -DHOSTS_ACCESS
8 +#HOSTS_ACCESS= -DHOSTS_ACCESS
9 #WRAP_LIB = $(WRAP_DIR)/libwrap.a
10 -WRAP_LIB = -lwrap
11 +#WRAP_LIB = -lwrap
13 # Comment out if your RPC library does not allocate privileged ports for
14 # requests from processes with root privilege, or the new portmap will
15 @@ -25,7 +25,7 @@
16 # ports. You can find out by running "rpcinfo -p"; if all mountd and NIS
17 # daemons use a port >= 1024 you should probably disable the next line.
19 -CHECK_PORT = -DCHECK_PORT
20 +#CHECK_PORT = -DCHECK_PORT
22 # Warning: troublesome feature ahead!! Enable only when you are really
23 # desperate!!