head 1.2; access; symbols pkgsrc-2013Q2:1.2.0.8 pkgsrc-2013Q2-base:1.2 pkgsrc-2012Q4:1.2.0.6 pkgsrc-2012Q4-base:1.2 pkgsrc-2011Q4:1.2.0.4 pkgsrc-2011Q4-base:1.2 pkgsrc-2011Q2:1.2.0.2 pkgsrc-2011Q2-base:1.2 pkgsrc-2011Q1:1.1.1.1.0.4 pkgsrc-2011Q1-base:1.1.1.1 pkgsrc-2010Q4:1.1.1.1.0.2 pkgsrc-2010Q4-base:1.1.1.1 pkgsrc-base:1.1.1.1 TNF:1.1.1; locks; strict; comment @# @; 1.2 date 2011.05.02.10.11.34; author adam; state dead; branches; next 1.1; 1.1 date 2010.11.30.12.35.12; author adam; state Exp; branches 1.1.1.1; next ; 1.1.1.1 date 2010.11.30.12.35.12; author adam; state Exp; branches; next ; desc @@ 1.2 log @Changes rev.1: * Re-open log file on SIGHUP. * Install knockd man page into section 8 instead of section 1. @ text @$NetBSD: patch-ab,v 1.1 2010/11/30 12:35:12 adam Exp $ --- Makefile.in.orig 2010-11-30 10:30:02.000000000 +0000 +++ Makefile.in @@@@ -28,6 +28,7 @@@@ VERSION = 0.5 BINDIR = @@bindir@@ SBINDIR = @@sbindir@@ MANDIR = @@mandir@@ +DATADIR = @@datadir@@ INSTALL = @@INSTALL@@ INSTALL_PROGRAM = @@INSTALL_PROGRAM@@ $(AM_INSTALL_PROGRAM_FLAGS) @@@@ -68,11 +68,11 @@@@ dist: distclean (cd ..; tar czvf knock-$(VERSION).tar.gz knock-$(VERSION)) install: all - $(INSTALL) -D -m0755 knockd $(DESTDIR)$(SBINDIR)/knockd - $(INSTALL) -D -m0755 knock $(DESTDIR)$(BINDIR)/knock - $(INSTALL) -D -m0644 $(MANSRC)knockd.1 $(DESTDIR)$(MANDIR)/man1/knockd.1 - $(INSTALL) -D -m0644 $(MANSRC)knock.1 $(DESTDIR)$(MANDIR)/man1/knock.1 - $(INSTALL) -D -m0644 knockd.conf $(DESTDIR)/etc/knockd.conf + ${BSD_INSTALL_PROGRAM} knockd $(DESTDIR)$(SBINDIR)/knockd + ${BSD_INSTALL_PROGRAM} knock $(DESTDIR)$(BINDIR)/knock + ${BSD_INSTALL_MAN} $(MANSRC)knockd.1 $(DESTDIR)$(MANDIR)/man1/knockd.1 + ${BSD_INSTALL_MAN} $(MANSRC)knock.1 $(DESTDIR)$(MANDIR)/man1/knock.1 + ${BSD_INSTALL_DATA} knockd.conf $(DESTDIR)$(DATADIR)/examples/knock/knockd.conf clean: rm -f *~ $(OBJDIR)*.o $(MANSRC)*.1 @ 1.1 log @Initial revision @ text @d1 1 a1 1 $NetBSD$ @ 1.1.1.1 log @knockd is a port-knock server. It listens to all traffic on an ethernet (or PPP) interface, looking for special "knock" sequences of port-hits. A client makes these port-hits by sending a TCP (or UDP) packet to a port on the server. This port need not be open - since knockd listens at the link-layer level, it sees all traffic even if it's destined for a closed port. When the server detects a specific sequence of port-hits, it runs a command defined in its configuration file. This can be used to open up holes in a firewall for quick access. @ text @@