[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[RFR] templates://tcp-wrappers/{tcpd.templates}



Please find, for review, the debconf templates and the debian/control
file of tcp-wrappers.

Some rationale for my proposed changes are mentioned at the end of
this mail.

This review will last from Saturday, March 31, 2007 to Tuesday, April 10, 2007.

Please send reviews as unified diffs (diff -u) against the original
files. Comments about your proposed changes will be appreciated.

The part to review in debian/control are the package description(s).

Your review should be sent as an answer to this mail.

When appropriate, I will send intermediate requests for review, with
"[RFRn]" (n>=2) as a subject tag.

When we will reach a consensus, I send a "Last Chance For
Comments" mail with "[LCFC]" as a subject tag.

Finally, the reviewed templates will be sent to the package maintainer
as a bug report, and a mail will be sent to this list with "[BTS]" as
a subject tag.

Note to tcp-wrappers maintainer(s): this review is CC'ed to you so that
you can comment on the proposed changes before we propose the rewrite
in a bug report. Please note that these changes will be reviewed and
are therefore *not* the final version.

Please take care to send any comment to debian-l10n-english.

Rationale:
Short description. Make it short. Move the daemon name to the long description

1st paragraph: rephrasing. Shorter sentence

Merge 2nd and 3rd paragraph and make them shorter and more direct style

4th (now 3rd) paragraph simplified as well. Last sentence removed. It
does not add much value and make the screen really too long.



-- 


Template: tcpd/paranoid-mode
Type: boolean
Default: false
_description: Use paranoid settings in hosts.allow and hosts.access?
 New /etc/hosts.allow and /etc/hosts.deny files for the TCP wrappers
 daemon (tcpd) will be created as they do not exist yet.
 .
 You can choose between a generic and permissive configuration which
 will allow any incoming connection or a paranoid configuration which
 will not allow remote connections regardless of where they originate
 from. The latter, even if more secure, will block out all
 communication, including, for example, remote administration.
 .
 Both files can be modified later to suit your needs as explained in
 the hosts_access(5) manpage. These settings will only affect network
 services that use the libwrap library. Restrictions for other
 services should be established by using firewall rules.
--- ../tcp-wrappers.old/debian/tcpd.templates	2007-03-29 06:12:08.859218328 +0200
+++ debian/tcpd.templates	2007-03-31 19:48:37.171236923 +0200
@@ -1,21 +1,17 @@
 Template: tcpd/paranoid-mode
 Type: boolean
 Default: false
-_description: Should tcpd setup paranoid hosts.allow and hosts.access?
- /etc/hosts.allow and /etc/hosts.deny will be setup since you do not have
- have any of these files yet. You can either have a generic and permissive
- configuration which will allow any incoming connection or a paranoid
- configuration which will not allow remote connections regardless of
- where they originate from.
+_description: Use paranoid settings in hosts.allow and hosts.access?
+ New /etc/hosts.allow and /etc/hosts.deny files for the TCP wrappers
+ daemon (tcpd) will be created as they do not exist yet.
  .
- The second option, even if more secure, will block out all communication,
- including, for example, remote administration. So if you need this
- don't choose it.
+ You can choose between a generic and permissive configuration which
+ will allow any incoming connection or a paranoid configuration which
+ will not allow remote connections regardless of where they originate
+ from. The latter, even if more secure, will block out all
+ communication, including, for example, remote administration.
  .
- Regardless of which option you select you can always manually edit both 
- files to suit your needs, for this, review the hosts_access(5) manpage. 
- This might include giving remote access of services to legitimate hosts.
- .
- Notice this only applies to internet services that use the libwrap library.
- Remote connections will still be possible to services that do not use
- this library, consider using firewall rules to block access to these.
+ Both files can be modified later to suit your needs as explained in
+ the hosts_access(5) manpage. These settings will only affect network
+ services that use the libwrap library. Restrictions for other
+ services should be established by using firewall rules.
Source: tcp-wrappers
Section: net
Priority: important
Maintainer: Marco d'Itri <md@linux.it>
Build-Depends: debhelper (>= 4), po-debconf
Standards-Version: 3.7.2.2

Package: tcpd
Architecture: any
Priority: important
Depends: ${shlibs:Depends}, ${misc:Depends}
Replaces: libwrap0 (<< 7.6-8)
Conflicts: netbase (<< 3.16-1)
Description: Wietse Venema's TCP wrapper utilities
 Wietse Venema's network logger, also known as TCPD or LOG_TCP.
 .
 These programs log the client host name of incoming telnet,
 ftp, rsh, rlogin, finger etc. requests. Security options are:
 access control per host, domain and/or service; detection of
 host name spoofing or host address spoofing; booby traps to
 implement an early-warning system.

Package: libwrap0
Section: libs
Priority: important
Architecture: any
Depends: ${shlibs:Depends}
Recommends: tcpd
Conflicts: netbase (<< 3.16-1)
Description: Wietse Venema's TCP wrappers library
 Wietse Venema's network logger, also known as TCPD or LOG_TCP.
 .
 These programs log the client host name of incoming telnet,
 ftp, rsh, rlogin, finger etc. requests. Security options are:
 access control per host, domain and/or service; detection of
 host name spoofing or host address spoofing; booby traps to
 implement an early-warning system.

Package: libwrap0-dev
Section: libdevel
Priority: optional
Architecture: any
Depends: libwrap0 (= ${Source-Version})
Provides: libwrap-dev
Conflicts: libwrap-dev, netbase (<< 3.16-1)
Description: Wietse Venema's TCP wrappers library, development files
 Wietse Venema's network logger, also known as TCPD or LOG_TCP.
 .
 These programs log the client host name of incoming telnet,
 ftp, rsh, rlogin, finger etc. requests. Security options are:
 access control per host, domain and/or service; detection of
 host name spoofing or host address spoofing; booby traps to
 implement an early-warning system.

Attachment: signature.asc
Description: Digital signature


Reply to: