1 |
commit: 7f1c0d8260a3836e42290398c81294e3d12749de |
2 |
Author: Michał Górny <mgorny <AT> gentoo <DOT> org> |
3 |
AuthorDate: Sat Apr 20 07:53:38 2019 +0000 |
4 |
Commit: Michał Górny <mgorny <AT> gentoo <DOT> org> |
5 |
CommitDate: Sat Apr 20 07:53:38 2019 +0000 |
6 |
URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=7f1c0d82 |
7 |
|
8 |
net-misc/stone: Remove last-rited pkg |
9 |
|
10 |
Closes: https://bugs.gentoo.org/675612 |
11 |
Signed-off-by: Michał Górny <mgorny <AT> gentoo.org> |
12 |
|
13 |
net-misc/stone/Manifest | 1 - |
14 |
net-misc/stone/files/stone-2.3e-makefile.patch | 20 -- |
15 |
net-misc/stone/files/stone.man | 464 ------------------------- |
16 |
net-misc/stone/metadata.xml | 6 - |
17 |
net-misc/stone/stone-2.3e-r1.ebuild | 46 --- |
18 |
profiles/package.mask | 2 - |
19 |
6 files changed, 539 deletions(-) |
20 |
|
21 |
diff --git a/net-misc/stone/Manifest b/net-misc/stone/Manifest |
22 |
deleted file mode 100644 |
23 |
index 52c68a4564e..00000000000 |
24 |
--- a/net-misc/stone/Manifest |
25 |
+++ /dev/null |
26 |
@@ -1 +0,0 @@ |
27 |
-DIST stone-2.3e.tar.gz 92587 BLAKE2B 3e87bb38ac111803bc8a3157be27b6645d8876033ae4c8b62a0167c2fc57f051b1deb2589387a8da1c5d68b0377fc2c120237d9d552ab8d693c41e842539bb0d SHA512 a0cccc123222c4fb4c1b2f031fc4d039f39e77691adc9f1df367d99bef8524738265350d1056c926c5f216236d2db25f31d14e9bec297b1bb4ea17e217c4983b |
28 |
|
29 |
diff --git a/net-misc/stone/files/stone-2.3e-makefile.patch b/net-misc/stone/files/stone-2.3e-makefile.patch |
30 |
deleted file mode 100644 |
31 |
index 5df2b6868a2..00000000000 |
32 |
--- a/net-misc/stone/files/stone-2.3e-makefile.patch |
33 |
+++ /dev/null |
34 |
@@ -1,20 +0,0 @@ |
35 |
---- Makefile.orig 2013-02-20 17:45:36.000000000 +0400 |
36 |
-+++ Makefile 2013-02-20 17:47:19.323650328 +0400 |
37 |
-@@ -19,8 +19,6 @@ |
38 |
- # -DWINDOWS Windows95/98/NT |
39 |
- # -DNT_SERVICE WindowsNT/2000 native service |
40 |
- |
41 |
--CFLAGS= # -g |
42 |
-- |
43 |
- SSL= /usr/local/ssl |
44 |
- SSL_FLAGS= -DUSE_SSL |
45 |
- SSL_LIBS= -lssl -lcrypto |
46 |
-@@ -60,7 +58,7 @@ |
47 |
- @echo "*** md5c.c is contained in RFC1321" |
48 |
- |
49 |
- stone: stone.c |
50 |
-- $(CC) $(CFLAGS) $(FLAGS) -o $@ $? $(LIBS) |
51 |
-+ $(CC) $(CFLAGS) $(FLAGS) ${LDFLAGS} -o $@ $? $(LIBS) |
52 |
- |
53 |
- pop_stone: $(POP_LIBS) |
54 |
- $(MAKE) FLAGS="$(POP_FLAGS)" LIBS="$(POP_LIBS)" $(TARGET) |
55 |
|
56 |
diff --git a/net-misc/stone/files/stone.man b/net-misc/stone/files/stone.man |
57 |
deleted file mode 100644 |
58 |
index fa10c6eef18..00000000000 |
59 |
--- a/net-misc/stone/files/stone.man |
60 |
+++ /dev/null |
61 |
@@ -1,464 +0,0 @@ |
62 |
-.\" Roff format skeleton provided by Taketo Kabe <kabe@×××××××××××××.jp> |
63 |
-.TH stone 1 "version 2.3" |
64 |
-. |
65 |
-.SH NAME |
66 |
-stone \- Simple Repeater |
67 |
-. |
68 |
-.SH SYNOPSIS |
69 |
-.B "stone [-C \fIfile\fP] [-P \fIcommand\fP] [-Q \fIoptions\fP] [-N] [-d] [-p] [-n]" |
70 |
-.br |
71 |
-.B " [-u \fImax\fP] [-f \fIn\fP] [-l] [-L \fIfile\fP] [-a \fIfile\fP] [-i \fIfile\fP]" |
72 |
-.br |
73 |
-.B " [-X \fIn\fP] [-T \fIn\fP] [-r]" |
74 |
-.br |
75 |
-.B " [-x \fIport\fP[,\fIport\fP][-\fIport\fP]... \fIxhost\fP... --]" |
76 |
-.br |
77 |
-.B " [-s \fIsend\fP \fIexpect\fP... --]" |
78 |
-.br |
79 |
-.B " [-b [\fIvar\fP=\fIval\fP]... \fIn\fP \fImaster\fP:\fIport\fP \fIbackup\fP:\fIport\fP]" |
80 |
-.br |
81 |
-.B " [-B \fIhost\fP:\fIport\fP \fIhost1\fP:\fIport1\fP... --]" |
82 |
-.br |
83 |
-.B " [-I \fIhost\fP]" |
84 |
-.br |
85 |
-.B " [-o \fIn\fP] [-g \fIn\fP] [-t \fIdir\fP] [-D] [-c \fIdir\fP]" |
86 |
-.br |
87 |
-.B " [-q \fISSL\fP] [-z \fISSL\fP]" |
88 |
-.br |
89 |
-.B " [-M install \fIname\fP] [-M remove \fIname\fP]" |
90 |
-.br |
91 |
-.B " \fIst\fP [-- \fIst\fP]..." |
92 |
-. |
93 |
-.SH DESCRIPTION |
94 |
-\fBStone\fP is a TCP & UDP repeater in the application layer. It repeats TCP |
95 |
-and UDP from inside to outside of a firewall, or from outside to inside. |
96 |
-.P |
97 |
-\fBStone\fP has following features: |
98 |
-. |
99 |
-.TP |
100 |
-.B 1. Stone supports Win32. |
101 |
-Formerly, UNIX machines are used as firewalls, but recently |
102 |
-WindowsNT machines are used, too. You can easily run \fBstone\fP on |
103 |
-WindowsNT and Windows95. Of course, available on Linux, |
104 |
-FreeBSD, BSD/OS, SunOS, Solaris, HP-UX and so on. |
105 |
-. |
106 |
-.TP |
107 |
-.B 2. Simple. |
108 |
-\fBStone\fP's source code is only 8000 lines long (written in C |
109 |
-language), so you can minimize the risk of security |
110 |
-holes. |
111 |
-. |
112 |
-.TP |
113 |
-.B 3. Stone supports SSL. |
114 |
-Using OpenSSL (\fIhttp://www.openssl.org/\fP), \fBstone\fP can |
115 |
-encrypt/decrypt. Client verifications, and server verifications |
116 |
-are also supported. \fBStone\fP can send a substring of the subject |
117 |
-of the certificate to the destination. |
118 |
-. |
119 |
-.TP |
120 |
-.B 4. Stone is a http proxy. |
121 |
-\fBStone\fP can also be a tiny http proxy. |
122 |
-. |
123 |
-.TP |
124 |
-.B 5. POP -> APOP conversion. |
125 |
-With \fBstone\fP and a mailer that does not support APOP, you can |
126 |
-access to an APOP server. |
127 |
-. |
128 |
-.TP |
129 |
-.B 6. Stone supports IPv6. |
130 |
-\fBStone\fP can convert IP and IPv6 each other. With \fBstone\fP, you can |
131 |
-use IP-only software on IPv6 network. |
132 |
-. |
133 |
-.SH OPTIONS |
134 |
-If the \fB-C\fP \fIfile\fP flag is used, the program read these |
135 |
-options and \fIst\fPs from the configuration file \fIfile\fP. |
136 |
-If the \fB-P\fP \fIcommand\fP flag is used, the program executes |
137 |
-specified pre-processor to read the configuration file. \fB-Q\fP \fIoptions\fP |
138 |
-can be used to pass options to the pre-processor. If the \fB-N\fP |
139 |
-flag is used, \fBstone\fP will terminate after parsing options |
140 |
-and configuration file without opening the ports. |
141 |
-.P |
142 |
-If the \fB-d\fP flag is used, then increase the debug level. If |
143 |
-the \fB-p\fP flag is used, data repeated by \fBstone\fP are dumped. If |
144 |
-the \fB-n\fP is used, IP addresses and service port numbers are |
145 |
-shown instead of host names and service names. |
146 |
-.P |
147 |
-If the \fB-u\fP \fImax\fP flag (\fImax\fP is integer) is used, the |
148 |
-program memorize \fImax\fP UDP sources simultaneously. The default value |
149 |
-is 100. If the |
150 |
-\fB-f\fP \fIn\fP flag (\fIn\fP is integer) is used, the program spawn |
151 |
-\fIn\fP child processes. The default behavior is not to spawn any child processes. |
152 |
-.P |
153 |
-If the \fB-l\fP flag is used, the program sends error messages to |
154 |
-the syslog instead of stderr. If the \fB-L\fP \fIfile\fP (\fIfile\fP |
155 |
-is a file name) flag is used, the program writes error messages |
156 |
-to the file. If the \fB-a\fP \fIfile\fP flag is used, the program |
157 |
-writes accounting to the file. If the \fB-i\fP \fIfile\fP flag is |
158 |
-used, the program writes its process ID to the file. |
159 |
-.P |
160 |
-The \fB-X\fP \fIn\fP flag alters the buffer size of the repeater. |
161 |
-The default value is 1000 bytes. If |
162 |
-the \fB-T\fP \fIn\fP is used, the timeout of TCP sessions can be |
163 |
-specified to \fIn\fP sec. Default: 600 (10 min). The \fB-r\fP flag is |
164 |
-used, SO_REUSEADDR is set on the socket of \fIst\fP . |
165 |
-.P |
166 |
-Using the \fB-x\fP \fIport\fP[,\fIport\fP][-\fIport\fP]... \fIxhost\fP... \fB--\FP flag, |
167 |
-the http proxy (described later) can only connect to |
168 |
-\fIxhost\fP:\fIport\fP. If more than one \fB-x\fP ... \fB--\fI flags are |
169 |
-designated, the posterior one whose \fIport\fP list matches the |
170 |
-connecting port. If the \fB-x\fP \fB--\fP is used, prior \fB-x\fP flags |
171 |
-are ignored. |
172 |
-.P |
173 |
-The \fB-b\fP \fIn\fP \fImaster\fP:\fIport\fP \fIbackup\fP:\fIport\fP flag designates |
174 |
-the backup destination for \fImaster\fP:\fIport\fP. The program checks |
175 |
-every \fIn\fP seconds whether \fImaster\fP:\fIport\fP is connectable, using |
176 |
-the health check script defined by \fB-s\fP flag described below. |
177 |
-If not, the backup is used instead. Alternative \fIhost\fP can be |
178 |
-checked, using host=\fIhost\fP and alternative \fIport\fP, using |
179 |
-port=\fIport\fP. |
180 |
-.P |
181 |
-The \fB-s\fP \fIsend\fP \fIexpect\fP... \fB--\fP flag defines the health check |
182 |
-script. Sending \fIsend\fP, then checks whether the response match |
183 |
-the regular expression \fIexpect\fP. |
184 |
-.P |
185 |
-The \fB-B\fP \fIhost\fP:\fIport\fP \fIhost1\fP:\fIport1\fP... \fB--\fP is for the |
186 |
-destination group. If the destination of \fIst\fP is \fIhost\fP:\fIport\fP, |
187 |
-the program chooses a destination randomly from the group. The |
188 |
-destination \fIhost\fP:\fIport\fP that is designated by \fB-b\fP flag and |
189 |
-turned out unhealthy, is excluded from the group. |
190 |
-.P |
191 |
-The \fB-I\fP \fIhost\fP designates the interface used as the source |
192 |
-address of the connection to the desctination. |
193 |
-.P |
194 |
-If the \fB-o\fP \fIn\fP or \fB-g\fP \fIn\fP flag is used, the program set |
195 |
-its uid or gid to \fIn\fP respectively. If the \fB-t\fP \fIdir\fP |
196 |
-flag (\fIdir\fP is a directory) is used, the program change its |
197 |
-root to the directory. If the \fB-D\fP flas is used, \fBstone\fP runs |
198 |
-as a daemon. The \fB-c\fP \fIdir\fP flag designates the |
199 |
-directory for core dump. |
200 |
-.P |
201 |
-The \fB-M\fP install \fIname\fP and the \fB-M\fP remove \fIname\fP flags are |
202 |
-for NT service. \fIname\fP is the service name. Start the |
203 |
-service using the command: net start \fIname\fP. To install \fBstone\fP |
204 |
-service as the name \fIrepeater\fP, for example: |
205 |
-.P |
206 |
-.RS |
207 |
-C:\\>\fBstone -M install \fIrepeater\fB -C \fIC:\\stone.cfg\fR |
208 |
-.br |
209 |
-C:\\>\fBnet start \fIrepeater\fR |
210 |
-.RE |
211 |
-.P |
212 |
-The \fB-q\fP \FISSL\FP and the \fB-z\fP \FISSL\FP flags are for SSL |
213 |
-encryption. The \fB-q\fP \FISSL\FP is for the client mode, that is, |
214 |
-when \fBstone\fP connects to the other SSL server as a SSL client. |
215 |
-The \fB-z\fP \FISSL\FP if for the server mode, that is, when other SSL |
216 |
-clients connect to the \fBstone\fP. |
217 |
-.P |
218 |
-\FISSL\FP is one of the following. |
219 |
-.P |
220 |
-.PD 0 |
221 |
-.IP default 15 |
222 |
-reset SSL options to the default. |
223 |
-Using multiple \fIst\fP, different SSL options can |
224 |
-be designated for each \fIst\fP. |
225 |
-.IP verbose |
226 |
-verbose mode. |
227 |
-.IP verify |
228 |
-require SSL certificate to the peer. |
229 |
-.IP verify,once |
230 |
-request a client certificate on the initial TLS/SSL |
231 |
-handshake. (\fB-z\fP only) |
232 |
-.IP verify,ifany |
233 |
-The certificate returned (if any) is checked. (\fB-z\fP only) |
234 |
-.IP verify,none |
235 |
-never request SSL certificate to the peer. |
236 |
-.IP crl_check |
237 |
-lookup CRLs. |
238 |
-.IP crl_check_all |
239 |
-lookup CRLs for whole chain. |
240 |
-.IP uniq |
241 |
-if the serial number of peer's SSL certificate |
242 |
-is different from the previous session, deny it. |
243 |
-.IP re\fIn\fP=\fIregex\fP |
244 |
-The certificate of the peer must satisfy the |
245 |
-\fIregex\fP. \fIn\fP is the depth. re0 means the subject |
246 |
-of the certificate, and re1 means the issure. |
247 |
-The maximum of \fIn\fP is 9. |
248 |
-.IP depth=\fIn\fP |
249 |
-The maximum of the certificate chain. |
250 |
-If the peer's certificate exceeds \fIn\fP, the |
251 |
-verification fails. The maximum of \fIn\fP is 9. |
252 |
-.IP tls1 |
253 |
-Just use TLSv1 protocol. |
254 |
-.IP ssl3 |
255 |
-Just use SSLv3 protocol. |
256 |
-.IP ssl2 |
257 |
-Just use SSLv2 protocol. |
258 |
-.IP no_tls1 |
259 |
-Turn off TLSv1 protocol. |
260 |
-.IP no_ssl3 |
261 |
-Turn off SSLv3 protocol. |
262 |
-.IP no_ssl2 |
263 |
-Turn off SSLv2 protocol. |
264 |
-.IP bugs |
265 |
-Switch on all SSL implementation bug workarounds. |
266 |
-.IP serverpref |
267 |
-Use server's cipher preferences (only SSLv2). |
268 |
-.IP sid_ctx=\fIstr\fP |
269 |
-Set session ID context. |
270 |
-.IP passfile=\fIfile\fP |
271 |
-The filename of the file containing password of the key |
272 |
-.IP key=\fIfile\fP |
273 |
-The filename of the secret key of the certificate. |
274 |
-.IP cert=\fIfile\fP |
275 |
-The filename of the certificate. |
276 |
-.IP CAfile=\fIfile\fP |
277 |
-The filename of the certificate of the CA. |
278 |
-.IP CApath=\fIdir\fP |
279 |
-The directory of the certificate files. |
280 |
-.IP pfx=\fIfile\fP |
281 |
-The filename of the PKCS#12 bag. |
282 |
-.IP cipher=\fIlist\fP |
283 |
-The list of ciphers. |
284 |
-.IP lb\fIn\fP=\fIm\fP |
285 |
-change the destination according to the |
286 |
-certificate of the peer. The number calculated |
287 |
-from the matched string to the \fIn\fPth ( ... ) in |
288 |
-the ``regex'' of SSL options (mod \fIm\fP) is used |
289 |
-to select the destination from the destination |
290 |
-group defined by \fB-B\fP flag. |
291 |
-.PD |
292 |
-.P |
293 |
-\fIst\fP is one of the following. Multiple \fIst\fP can be |
294 |
-designated, separated by \fB--\fP. |
295 |
-.P |
296 |
-.PD 0 |
297 |
-.IP (1) |
298 |
-\fIhost\fP:\fIport\fP \fIsport\fP [\fIxhost\fP...] |
299 |
-.IP (2) |
300 |
-\fIhost\fP:\fIport\fP \fIshost\fP:\fIsport\fP [\fIxhost\fP...] |
301 |
-.IP (3) |
302 |
-proxy \fIsport\fP [\fIxhost\fP...] |
303 |
-.IP (4) |
304 |
-\fIhost\fP:\fIport\fP/http \fIrequest\fP [\fIxhost\fP...] |
305 |
-.IP (5) |
306 |
-\fIhost\fP:\fIport\fP/proxy \fIheader\fP [\fIxhost\fP...] |
307 |
-.IP (6) |
308 |
-health \fIsport\fP [\fIxhost\fP...] |
309 |
-.PD |
310 |
-.P |
311 |
-The program repeats the connection on port \fIsport\fP to the |
312 |
-other machine \fIhost\fP port \fIport\fP. If the machine, on |
313 |
-which the program runs, has two or more interfaces, type (2) can |
314 |
-be used to repeat the connection on the specified interface |
315 |
-\fIshost\fP. You can also specify path name that begins with |
316 |
-``/'' or ``./'', instead of \fIhost\fP:\fIport\fP so that the |
317 |
-program handles a unix domain socket. |
318 |
-.P |
319 |
-Type (3) is a http proxy. Specify the machine, on which the |
320 |
-program runs, and port \fIsport\fP in the http proxy settings of |
321 |
-your WWW browser. |
322 |
-Extentions can be added to the ``proxy'' like \fIxhost\fP/\fIext\fP. |
323 |
-\fIext\fP is: |
324 |
-.P |
325 |
-.IP v4only |
326 |
-limit the destination within IP addresses. |
327 |
-.IP v6only |
328 |
-limit the destination within IPv6 addresses. |
329 |
-.P |
330 |
-Type (4) relays stream over http request. \fIrequest\fP is the |
331 |
-request specified in HTTP 1.0. In the \fIrequest\fP, \ is |
332 |
-the escape character, and the following substitution occurs. |
333 |
-.PP |
334 |
-.RS 8 |
335 |
-.PD 0 |
336 |
-.IP \\\\n 8 |
337 |
-newline (0x0A) |
338 |
-.IP \\\\r |
339 |
-return (0x0D) |
340 |
-.IP \\\\t |
341 |
-tab (0x09) |
342 |
-.IP \\\\\\\\ |
343 |
-\ itself (0x5C) |
344 |
-.IP \\\\a |
345 |
-the IP address of the client connecting to the \fBstone\fP. |
346 |
-.IP \\\\A |
347 |
-\fIIP address of the client\fP:\fIport number\fP |
348 |
-.IP \\\\0 |
349 |
-the serial number of peer's SSL certificate. |
350 |
-.IP "\\\\1 - \\\\9" |
351 |
-the matched string in the ``regex'' of SSL options. |
352 |
-.IP \\\\?1\fIthen\fP\\\\:\fIelse\fP\\\\/ |
353 |
-if \1 (\2 - \9 in a similar way) is not null, |
354 |
-\fIthen\fP, otherwise \fIelse\fP. |
355 |
-.PD |
356 |
-.RE |
357 |
-.P |
358 |
-Type (5) repeats http request with \fIheader\fP in the top of |
359 |
-request headers. The above escapes can be also used. |
360 |
-.P |
361 |
-Type (6) designates the port that other programs can check |
362 |
-whether the \fBstone\fP runs `healthy' or not. Following commands are |
363 |
-available to check the \fBstone\fP. |
364 |
-.P |
365 |
-.RS 8 |
366 |
-.PD 0 |
367 |
-.IP "HELO \fIany string\fP" 24 |
368 |
-returns the status of the \fBstone\fP |
369 |
-.IP "LIMIT \fIvar\fP \fIn\fP" |
370 |
-check the value of \fIvar\fP is |
371 |
-less than \fIn\fP |
372 |
-.PD |
373 |
-.RE |
374 |
-.P |
375 |
-\fIvar\fP is one of the following: |
376 |
-.P |
377 |
-.RS 8 |
378 |
-.PD 0 |
379 |
-.IP PAIR 16 |
380 |
-the number of ``pair'' |
381 |
-.IP CONN |
382 |
-the number of ``conn'' |
383 |
-.IP ESTABLISHED |
384 |
-seconds passed since the last conn established |
385 |
-.IP READWRITE |
386 |
-seconds passed since the last read/write |
387 |
-.IP ASYNC |
388 |
-the number of threads |
389 |
-.PD |
390 |
-.RE |
391 |
-.P |
392 |
-The response of the \fBstone\fP is 2xx when normal, or 5xx when |
393 |
-abnormal on the top of line. |
394 |
-.P |
395 |
-If the \fIxhost\fP are used, only machines or its IP addresses |
396 |
-listed in \fIxhost\fP separated by space character can |
397 |
-connect to the program and to be repeated. |
398 |
-.P |
399 |
-Extentions can be added to the \fIxhost\fP like |
400 |
-\fIxhost\fP/\fIex\fP,\fIex\fP.... \fIex\fP is: |
401 |
-.IP \fIm\fP |
402 |
-You can designate the length of prefix bits of the |
403 |
-netmask, so that only machines on specified. In the |
404 |
-case of class C network 192.168.1.0, for example, use |
405 |
-``192.168.1.0/24''. |
406 |
-.IP v4 |
407 |
-\fIxhost\fP is resolved as the IP address. |
408 |
-.IP v6 |
409 |
-\fIxhost\fP is resolved as the IPv6 address. |
410 |
-.IP p\fIm\fP |
411 |
-the data repeated by the program are dumped, only if it |
412 |
-was connected by the machines specified by \fIxhost\fP. \fIm\fP |
413 |
-is the dump mode, equivalent to the number of \fB-p\fP |
414 |
-options. |
415 |
-.P |
416 |
-Use ``!'' instead of ``\fIxhost\fP'', to deny machines by following |
417 |
-\fIxhost\fP. |
418 |
-.P |
419 |
-Extentions can be added to the \fIport\fP like |
420 |
-\fIport\fP/\fIext\fP,\fIext\fP.... \fIext\fP is: |
421 |
-.IP udp |
422 |
-repeats UDP instead of TCP. |
423 |
-.IP ssl |
424 |
-forwards with encryption. |
425 |
-.IP v6 |
426 |
-connects to the destination using IPv6. |
427 |
-.IP base |
428 |
-forwards with MIME base64 encoding. |
429 |
-.P |
430 |
-Extentions can be added to the \fIsport\fP like |
431 |
-\fIsport\fP/\fIext\fP,\fIext\fP.... \fIext\fP is: |
432 |
-.IP udp |
433 |
-repeats UDP instead of TCP. |
434 |
-.IP apop |
435 |
-converts POP to APOP. The conversion is derived from |
436 |
-the RSA Data Security, Inc. MD5 Message-Digest Algorithm. |
437 |
-.IP ssl |
438 |
-forwards with decryption. |
439 |
-.IP v6 |
440 |
-accepts connection using IPv6. If \fIshost\fP is omitted |
441 |
-like (1), IP is also acceptable. |
442 |
-.IP v6only |
443 |
-accepts connection using IPv6 only. Even if \fIshost\fP is |
444 |
-omitted like (1), IP is not acceptable. |
445 |
-.IP base |
446 |
-forwards with MIME base64 decoding. |
447 |
-.IP http |
448 |
-relays stream over http. |
449 |
-.IP ident |
450 |
-identifies the owner of the incoming connection |
451 |
-on the peer using ident protocol (RFC1413). |
452 |
-.SH EXAMPLES |
453 |
-.PD 0 |
454 |
-.IP \fIouter\fP\^: |
455 |
-a machine in the outside of the firewall |
456 |
-.IP \fIinner\fP\^: |
457 |
-a machine in the inside of the firewall |
458 |
-.IP \fIfwall\fP\^: |
459 |
-the firewall on which the \fBstone\fP is executed |
460 |
-.PD |
461 |
-.TP |
462 |
-\fBstone \fIouter\fB:telnet 10023\fR |
463 |
-Repeats the telnet protocol to \fIouter\fP. |
464 |
-Run telnet fwall 10023 on \fIinner\fR. |
465 |
-.TP |
466 |
-\fBstone \fIouter\fB:domain/udp domain/udp\fR |
467 |
-Repeats the DNS query to \fIouter\fP. |
468 |
-Run \fBnslookup -\fP \fIfwall\fP on \fIinner\fP. |
469 |
-.TP |
470 |
-\fBstone \fIouter\fB:ntp/udp ntp/udp\fR |
471 |
-Repeats the NTP to \fIouter\fP. |
472 |
-Run \fBntpdate \fIfwall\fR on \fIinner\fP. |
473 |
-.TP |
474 |
-\fBstone localhost:http 443/ssl\fR |
475 |
-Make WWW server that supports https. |
476 |
-Access \fBhttps://\fIfwall\fB/\fR using a WWW browser. |
477 |
-.TP |
478 |
-\fBstone localhost:telnet 10023/ssl\fR |
479 |
-Make telnet server that supports SSL. |
480 |
-Run \fBSSLtelnet -z ssl \fIfwall\fB 10023\fR on \fIinner\fP. |
481 |
-.TP |
482 |
-\fBstone proxy 8080\fR |
483 |
-http proxy |
484 |
-.TP |
485 |
-\fBstone\fP \fIouter\fB:110/apop 110\fR |
486 |
-connect to \fIinner\fP:pop using a mailer that does not |
487 |
-support APOP. |
488 |
-.PP |
489 |
-Where \fIfwall\fP is a http proxy (port 8080): |
490 |
-.TP |
491 |
-\fBstone \fIfwall\fB:8080/http 10023 'POST http://\fIouter\fB:8023 HTTP/1.0'\fR |
492 |
-.br |
493 |
-.ns |
494 |
-.TP |
495 |
-\fBstone localhost:telnet 8023/http |
496 |
-.nf |
497 |
-Run \fBstone\fPs on \fIinner\fP and \fIouter\fP respectively. |
498 |
-Relays stream over http. |
499 |
-.TP |
500 |
-\fBstone \fIfwall\fB:8080/proxy 9080 \'Proxy-Authorization: Basic \fIc2VuZ29rdTpoaXJvYWtp\fB\'\fR |
501 |
-for browser that does not support proxy authorization. |
502 |
-.fi |
503 |
-. |
504 |
-.SH HOMEPAGE |
505 |
-The official homepage of \fBstone\fP is: |
506 |
-.br |
507 |
-\fIhttp://www.gcd.org/sengoku/stone/\fP |
508 |
-. |
509 |
-.SH COPYRIGHT |
510 |
-All rights about this program \fBstone\fP are reserved by the |
511 |
-original author, Hiroaki Sengoku. The program is free software; |
512 |
-you can redistribute it and/or modify it under the terms of the |
513 |
-\fIGNU IGeneral Public License (GPL)\fP. Furthermore you can link it |
514 |
-with openssl. |
515 |
-. |
516 |
-.SH NO WARRANTY |
517 |
-This program is distributed in the hope that it will be useful, |
518 |
-but WITHOUT ANY WARRANTY. |
519 |
-. |
520 |
-.SH AUTHOR |
521 |
-.nf |
522 |
-Hiroaki Sengoku |
523 |
-sengoku@×××.org |
524 |
-http://www.gcd.org/sengoku/ |
525 |
-.fi |
526 |
|
527 |
diff --git a/net-misc/stone/metadata.xml b/net-misc/stone/metadata.xml |
528 |
deleted file mode 100644 |
529 |
index fde75b04e63..00000000000 |
530 |
--- a/net-misc/stone/metadata.xml |
531 |
+++ /dev/null |
532 |
@@ -1,6 +0,0 @@ |
533 |
-<?xml version="1.0" encoding="UTF-8"?> |
534 |
-<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> |
535 |
-<pkgmetadata> |
536 |
-<!-- maintainer-needed --> |
537 |
-<longdescription>Stone is a TCP/IP packet repeater in the application layer. It repeats TCP and UDP packets from inside to outside of a firewall, or from outside to inside.</longdescription> |
538 |
-</pkgmetadata> |
539 |
|
540 |
diff --git a/net-misc/stone/stone-2.3e-r1.ebuild b/net-misc/stone/stone-2.3e-r1.ebuild |
541 |
deleted file mode 100644 |
542 |
index 6e1111841a3..00000000000 |
543 |
--- a/net-misc/stone/stone-2.3e-r1.ebuild |
544 |
+++ /dev/null |
545 |
@@ -1,46 +0,0 @@ |
546 |
-# Copyright 1999-2013 Gentoo Foundation |
547 |
-# Distributed under the terms of the GNU General Public License v2 |
548 |
- |
549 |
-EAPI=5 |
550 |
- |
551 |
-inherit eutils flag-o-matic toolchain-funcs |
552 |
- |
553 |
-DESCRIPTION="A simple TCP/IP packet repeater" |
554 |
-HOMEPAGE="http://www.gcd.org/sengoku/stone/" |
555 |
-SRC_URI="http://www.gcd.org/sengoku/stone/${P}.tar.gz" |
556 |
- |
557 |
-LICENSE="GPL-2" |
558 |
-SLOT="0" |
559 |
-KEYWORDS="amd64 ppc ~sparc x86" |
560 |
-IUSE="ssl" |
561 |
- |
562 |
-DEPEND="ssl? ( dev-libs/openssl )" |
563 |
-RDEPEND="${DEPEND}" |
564 |
- |
565 |
-S="${WORKDIR}/${PN}-2.3d-2.3.2.7" |
566 |
- |
567 |
-PATCHES=( "${FILESDIR}/${P}-makefile.patch" ) # bug #337879 |
568 |
- |
569 |
-src_prepare() { |
570 |
- tc-export CC |
571 |
- append-cflags "-D_GNU_SOURCE" |
572 |
- |
573 |
- epatch "${PATCHES[@]}" |
574 |
- epatch_user |
575 |
-} |
576 |
- |
577 |
-src_compile() { |
578 |
- local myargs |
579 |
- if use ssl ; then |
580 |
- myargs="SSL=/usr linux-ssl" |
581 |
- else |
582 |
- myargs="linux" |
583 |
- fi |
584 |
- emake ${myargs} |
585 |
-} |
586 |
- |
587 |
-src_install() { |
588 |
- dobin stone |
589 |
- newman "${FILESDIR}/${PN}.man" "${PN}.1" |
590 |
- dodoc README* |
591 |
-} |
592 |
|
593 |
diff --git a/profiles/package.mask b/profiles/package.mask |
594 |
index 398ec66549d..740da127d94 100644 |
595 |
--- a/profiles/package.mask |
596 |
+++ b/profiles/package.mask |
597 |
@@ -627,7 +627,6 @@ x11-libs/hippo-canvas |
598 |
# net-mail/uw-imap: #678606, last upstream release in 2011 |
599 |
# net-mail/uw-mailutils: #674174, same as uw-imap |
600 |
# net-misc/sslwrap: #674524, last updated upstream in 2000 |
601 |
-# net-misc/stone: #675612, needs new snapshot, current ver is from 2008 |
602 |
# |
603 |
# Removal in 30 days. |
604 |
app-crypt/keynote |
605 |
@@ -652,7 +651,6 @@ net-mail/up-imapproxy |
606 |
net-mail/uw-imap |
607 |
net-mail/uw-mailutils |
608 |
net-misc/sslwrap |
609 |
-net-misc/stone |
610 |
|
611 |
# Miroslav Šulc <fordfrog@g.o> (19 Mar 2019) |
612 |
# Depends on >=virtual/{jdk,jre}-11 which is masked |