diff options
author | Gordon Malm <gengor@gentoo.org> | 2009-03-24 18:08:48 +0000 |
---|---|---|
committer | Gordon Malm <gengor@gentoo.org> | 2009-03-24 18:08:48 +0000 |
commit | 20d10eb67da2e1eac55be8418866978851c90478 (patch) | |
tree | 6ee17081021ae1dce6fd2627e488e66a4162252b /sys-apps/gradm/files | |
parent | version bump; cleanup; some cosmetic (diff) | |
download | historical-20d10eb67da2e1eac55be8418866978851c90478.tar.gz historical-20d10eb67da2e1eac55be8418866978851c90478.tar.bz2 historical-20d10eb67da2e1eac55be8418866978851c90478.zip |
Clean out old versions of sys-apps/gradm
Package-Manager: portage-2.1.6.7/cvs/Linux i686
Diffstat (limited to 'sys-apps/gradm/files')
8 files changed, 0 insertions, 255 deletions
diff --git a/sys-apps/gradm/files/2.1.6.200506131347-non-lazy-bindings.patch b/sys-apps/gradm/files/2.1.6.200506131347-non-lazy-bindings.patch deleted file mode 100644 index da0b1997f965..000000000000 --- a/sys-apps/gradm/files/2.1.6.200506131347-non-lazy-bindings.patch +++ /dev/null @@ -1,12 +0,0 @@ -diff -Nur gradm2.orig/Makefile gradm2/Makefile ---- gradm2.orig/Makefile 2005-05-14 19:10:34.000000000 +0000 -+++ gradm2/Makefile 2005-09-17 14:47:32.573701563 +0000 -@@ -53,7 +53,7 @@ - @if [ ! -f /usr/include/security/pam_appl.h ] ; then \ - echo "Unable to detect PAM headers, disabling PAM support." ; \ - else \ -- $(CC) $(CFLAGS) -o $@ gradm_pam.c -lpam -lpam_misc $(LDFLAGS) ; \ -+ $(CC) $(CFLAGS) -o $@ gradm_pam.c -lpam -lpam_misc -Wl,-z,now $(LDFLAGS) ; \ - fi - - grlearn: grlearn.c gradm_lib.c grlearn2_config.tab.c lex.grlearn_config.c diff --git a/sys-apps/gradm/files/gradm_2.1.8.200601212342-fix_gradm_pam_symlinks.patch b/sys-apps/gradm/files/gradm_2.1.8.200601212342-fix_gradm_pam_symlinks.patch deleted file mode 100644 index 95a441aa8913..000000000000 --- a/sys-apps/gradm/files/gradm_2.1.8.200601212342-fix_gradm_pam_symlinks.patch +++ /dev/null @@ -1,13 +0,0 @@ ---- gradm2/gradm_adm.c 2005/12/07 00:15:18 1.73 -+++ gradm2/gradm_adm.c 2006/02/05 22:51:05 1.74 -@@ -158,8 +158,8 @@ add_gradm_pam_acl(struct role_acl *role) - add_proc_object_acl(current_subject, "/dev/null", proc_object_mode_conv("rw"), GR_FEXIST); - add_proc_object_acl(current_subject, "/lib", proc_object_mode_conv("rx"), GR_FEXIST); - add_proc_object_acl(current_subject, "/usr/lib", proc_object_mode_conv("rx"), GR_FEXIST); -- add_proc_object_acl(current_subject, "/lib64", proc_object_mode_conv("rx"), GR_FEXIST); -- add_proc_object_acl(current_subject, "/usr/lib64", proc_object_mode_conv("rx"), GR_FEXIST); -+ add_proc_object_acl(current_subject, "/lib64", proc_object_mode_conv("rx"), GR_FEXIST | GR_SYMLINK); -+ add_proc_object_acl(current_subject, "/usr/lib64", proc_object_mode_conv("rx"), GR_FEXIST | GR_SYMLINK); - add_proc_object_acl(current_subject, GRPAM_PATH, proc_object_mode_conv("x"), GR_FEXIST); - - add_cap_acl(current_subject, "-CAP_ALL"); diff --git a/sys-apps/gradm/files/gradm_2.1.8.200601212342-increase_num_pointers.patch b/sys-apps/gradm/files/gradm_2.1.8.200601212342-increase_num_pointers.patch deleted file mode 100644 index 2613b09db4bc..000000000000 --- a/sys-apps/gradm/files/gradm_2.1.8.200601212342-increase_num_pointers.patch +++ /dev/null @@ -1,13 +0,0 @@ ---- gradm2/gradm_parse.c 2006/01/22 04:40:42 1.105 -+++ gradm2/gradm_parse.c 2006/02/08 00:42:51 1.106 -@@ -576,8 +576,8 @@ add_proc_object_acl(struct proc_acl *sub - file_len++; - - num_objects++; -- /* one for the object, one for the filename, one for the name entry struct in the kernel*/ -- num_pointers += 3; -+ /* one for the object, one for the filename, one for the name entry struct, and one for the inodev_entry struct in the kernel*/ -+ num_pointers += 4; - - if (lstat(filename, &fstat)) { - dfile = add_deleted_file(filename); diff --git a/sys-apps/gradm/files/gradm_2.1.8.200601212342-ip_state_interface_fix.patch b/sys-apps/gradm/files/gradm_2.1.8.200601212342-ip_state_interface_fix.patch deleted file mode 100644 index e048375ea20e..000000000000 --- a/sys-apps/gradm/files/gradm_2.1.8.200601212342-ip_state_interface_fix.patch +++ /dev/null @@ -1,10 +0,0 @@ ---- gradm2/gradm.l 2006/01/02 01:44:39 1.90 -+++ gradm2/gradm.l 2006/02/06 23:27:16 1.91 -@@ -125,6 +125,7 @@ IP [0-9]{1,3}"."[0-9]{1,3}"."[0-9]{1,3}" - return NOT; - } - <IPIP_STATE>[-a-zA-Z0-9_]{1,7}("#"[0-9]{1,3})? { -+ BEGIN(IP_STATE); - gr_line = yytext; - gradmlval.string = gr_strdup(gr_line); - gr_line = strchr(gradmlval.string, '#'); diff --git a/sys-apps/gradm/files/gradm_2.1.9.200602141850-fix-admin-role.patch b/sys-apps/gradm/files/gradm_2.1.9.200602141850-fix-admin-role.patch deleted file mode 100644 index f68275961170..000000000000 --- a/sys-apps/gradm/files/gradm_2.1.9.200602141850-fix-admin-role.patch +++ /dev/null @@ -1,11 +0,0 @@ ---- gradm2/gradm_analyze.c 2006/01/08 17:45:37 1.36 -+++ gradm2/gradm_analyze.c 2006/03/05 00:35:52 1.37 -@@ -260,6 +260,8 @@ handle_notrojan_mode(void) - for_each_role(role2, current_role) { - if (!strcmp(role2->rolename, ":::kernel:::")) - continue; -+ if (role2->roletype & GR_ROLE_GOD) -+ continue; - for_each_subject(subj2, role2) { - if (subj2 == subj - || (subj2-> diff --git a/sys-apps/gradm/files/gradm_2.1.9.200602141850-fix-define-order.patch b/sys-apps/gradm/files/gradm_2.1.9.200602141850-fix-define-order.patch deleted file mode 100644 index c64466fb130d..000000000000 --- a/sys-apps/gradm/files/gradm_2.1.9.200602141850-fix-define-order.patch +++ /dev/null @@ -1,17 +0,0 @@ ---- gradm2/gradm_sym.c 2004/12/15 21:21:50 1.8 -+++ gradm2/gradm_sym.c 2006/03/13 23:07:49 1.9 -@@ -10,8 +10,12 @@ static unsigned int symtab_size = 0; - - void interpret_variable(struct var_object *var) - { -- for (; var; var = var->prev) { -- add_proc_object_acl(current_subject, var->filename, var->mode, GR_FEXIST); -+ struct var_object *tmp; -+ for (tmp = var; tmp->prev; tmp = tmp->prev) -+ ; -+ -+ for (; tmp; tmp = tmp->next) { -+ add_proc_object_acl(current_subject, tmp->filename, tmp->mode, GR_FEXIST); - } - - return; diff --git a/sys-apps/gradm/files/grsecurity b/sys-apps/gradm/files/grsecurity deleted file mode 100644 index e746201aced4..000000000000 --- a/sys-apps/gradm/files/grsecurity +++ /dev/null @@ -1,102 +0,0 @@ -# GR Security toggles. -# -# Note: chpax support has been removed from this init script. -# Configure /etc/conf.d/chpax instead - -# Check your running kernel for valid options. -# "sysctl -a | grep kernel.grsecurity. | cut -d '.' -f 3 | awk '{print $1}'" -# -# Some of the kernel options may be: -# -# allow_ptrace_group -# alt_ipc_perms -# altered_pings -# audit_chdir -# audit_gid -# audit_group -# audit_ipc -# audit_mount -# audit_ptrace -# chroot_caps -# chroot_deny_chdir -# chroot_deny_chmod -# chroot_deny_chroot -# chroot_deny_fchdir -# chroot_deny_mknod -# chroot_deny_mount -# chroot_deny_pivot -# chroot_deny_ptrace -# chroot_deny_shmat -# chroot_deny_sysctl -# chroot_deny_unix -# chroot_enforce_chdir -# chroot_execlog -# chroot_findtask -# chroot_restrict_nice -# chroot_restrict_sigs -# coredump -# deny_phys_root -# deny_pseudo_root -# deny_serial_root -# dmesg -# exec_logging -# execve_limiting -# fifo_restrictions -# fork_bomb_prot -# forkfail_logging -# grsec_lock -# linking_restrictions -# rand_ip_ids -# rand_isns -# rand_pids -# rand_rpc -# rand_tcp_src_ports -# rand_ttl -# restrict_ptrace -# secure_fds -# secure_kbmap -# signal_logging -# socket_all -# socket_client -# socket_server -# suid_logging -# suid_root_logging -# timechange_logging -# tpe -# tpe_glibc -# tpe_restrict_all - -# Strict set with negligible performance impact: -#ENABLED="audit_chdir audit_group audit_ipc audit_mount chroot_caps \ -# chroot_deny_chmod chroot_deny_chroot chroot_deny_fchdir \ -# chroot_deny_mknod chroot_deny_mount chroot_deny_pivot \ -# chroot_deny_shmat chroot_deny_sysctl chroot_deny_unix \ -# chroot_enforce_chdir chroot_execlog chroot_findtask \ -# chroot_restrict_nice dmesg exec_logging execve_limiting \ -# fifo_restrictions forkfail_logging linking_restrictions rand_isns \ -# rand_ip_ids rand_pids rand_rpc rand_tcp_src_ports signal_logging \ -# socket_all socket_client socket_server timechange_logging tpe" - -ENABLED="" - -# Set when audit_group is enabled -audit_gid=1007 - -# Set when allow_ptrace_group is enabled -ptrace_gid=10 - -# Set when tpe is enabled -tpe_gid=1005 - -# Set when fork_bomb_prot is enabled -fork_bomb_gid=1006 -fork_bomb_sec=40 -fork_bomb_max=20 - -# Set when one of socket_* is enabled -socket_all_gid=1004 -socket_client_gid=1003 -socket_server_gid=1002 - -# Lock the above settings on boot -LOCK=0 diff --git a/sys-apps/gradm/files/grsecurity.rc b/sys-apps/gradm/files/grsecurity.rc deleted file mode 100644 index d0bff63f6f3f..000000000000 --- a/sys-apps/gradm/files/grsecurity.rc +++ /dev/null @@ -1,77 +0,0 @@ -#!/sbin/runscript -# Copyright 1999-2004 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-apps/gradm/files/grsecurity.rc,v 1.9 2004/07/15 00:42:30 agriffis Exp $ - -# Note: chpax support has been removed from this init script. -# Configure /etc/conf.d/chpax and add chpax to your default runlevel instead - - -PROCDIR=/proc/sys/kernel/grsecurity - -depend() { - need bootmisc localmount - after chpax -} - -checkconfig() { - if [ ! -d ${PROCDIR} ] ; then - eerror "You must have GR security turned on in your kernel." - return 1 - fi -} - -start() { - checkconfig || return 1 - - ebegin "Starting grsecurity" - - for x in ${ENABLED}; do - # [ -f ${PROCDIR}/${x} ] && continue - # einfo "\tEnabling kernel.grsecurity.${x}" - case "${x}" in - audit_group) - echo ${audit_gid} > ${PROCDIR}/audit_gid - echo 1 > ${PROCDIR}/${x} - ;; - tpe) - echo ${tpe_gid} > ${PROCDIR}/tpe_gid - echo 1 > ${PROCDIR}/${x} - ;; - allow_ptrace_group) - echo ${ptrace_gid} > ${PROCDIR}/ptrace_gid - echo 1 > ${PROCDIR}/${x} - ;; - fork_bomb_prot) - echo ${fork_bomb_gid} >${PROCDIR}/fork_bomb_gid - echo ${fork_bomb_sec} >${PROCDIR}/fork_bomb_sec - echo ${fork_bomb_max} >${PROCDIR}/fork_bomb_max - echo 1 > ${PROCDIR}/${x} - ;; - socket_all) - echo ${socket_all_gid} >${PROCDIR}/socket_all_gid - echo 1 > ${PROCDIR}/${x} - ;; - socket_client) - echo ${socket_client_gid} >${PROCDIR}/socket_client_gid - echo 1 > ${PROCDIR}/${x} - ;; - socket_server) - echo ${socket_server_gid} >${PROCDIR}/socket_server_gid - echo 1 > ${PROCDIR}/${x} - ;; - *) - [ -f ${PROCDIR}/${x} ] && echo 1 >${PROCDIR}/${x} - ;; - esac - done - - [ -f ${PROCDIR}/grsec_lock ] && echo ${LOCK} >${PROCDIR}/grsec_lock - - eend ${?} -} - -#stop() { -# ebegin "Stopping grsecurity" -# eend ${?} -#} |