Gentoo Archives: gentoo-commits

From: "Michał Górny" <mgorny@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] repo/gentoo:master commit in: net-misc/stone/files/, profiles/, net-misc/stone/
Date: Sat, 20 Apr 2019 23:27:48
Message-Id: 1555746818.7f1c0d8260a3836e42290398c81294e3d12749de.mgorny@gentoo
1 commit: 7f1c0d8260a3836e42290398c81294e3d12749de
2 Author: Michał Górny <mgorny <AT> gentoo <DOT> org>
3 AuthorDate: Sat Apr 20 07:53:38 2019 +0000
4 Commit: Michał Górny <mgorny <AT> gentoo <DOT> org>
5 CommitDate: Sat Apr 20 07:53:38 2019 +0000
6 URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=7f1c0d82
7
8 net-misc/stone: Remove last-rited pkg
9
10 Closes: https://bugs.gentoo.org/675612
11 Signed-off-by: Michał Górny <mgorny <AT> gentoo.org>
12
13 net-misc/stone/Manifest | 1 -
14 net-misc/stone/files/stone-2.3e-makefile.patch | 20 --
15 net-misc/stone/files/stone.man | 464 -------------------------
16 net-misc/stone/metadata.xml | 6 -
17 net-misc/stone/stone-2.3e-r1.ebuild | 46 ---
18 profiles/package.mask | 2 -
19 6 files changed, 539 deletions(-)
20
21 diff --git a/net-misc/stone/Manifest b/net-misc/stone/Manifest
22 deleted file mode 100644
23 index 52c68a4564e..00000000000
24 --- a/net-misc/stone/Manifest
25 +++ /dev/null
26 @@ -1 +0,0 @@
27 -DIST stone-2.3e.tar.gz 92587 BLAKE2B 3e87bb38ac111803bc8a3157be27b6645d8876033ae4c8b62a0167c2fc57f051b1deb2589387a8da1c5d68b0377fc2c120237d9d552ab8d693c41e842539bb0d SHA512 a0cccc123222c4fb4c1b2f031fc4d039f39e77691adc9f1df367d99bef8524738265350d1056c926c5f216236d2db25f31d14e9bec297b1bb4ea17e217c4983b
28
29 diff --git a/net-misc/stone/files/stone-2.3e-makefile.patch b/net-misc/stone/files/stone-2.3e-makefile.patch
30 deleted file mode 100644
31 index 5df2b6868a2..00000000000
32 --- a/net-misc/stone/files/stone-2.3e-makefile.patch
33 +++ /dev/null
34 @@ -1,20 +0,0 @@
35 ---- Makefile.orig 2013-02-20 17:45:36.000000000 +0400
36 -+++ Makefile 2013-02-20 17:47:19.323650328 +0400
37 -@@ -19,8 +19,6 @@
38 - # -DWINDOWS Windows95/98/NT
39 - # -DNT_SERVICE WindowsNT/2000 native service
40 -
41 --CFLAGS= # -g
42 --
43 - SSL= /usr/local/ssl
44 - SSL_FLAGS= -DUSE_SSL
45 - SSL_LIBS= -lssl -lcrypto
46 -@@ -60,7 +58,7 @@
47 - @echo "*** md5c.c is contained in RFC1321"
48 -
49 - stone: stone.c
50 -- $(CC) $(CFLAGS) $(FLAGS) -o $@ $? $(LIBS)
51 -+ $(CC) $(CFLAGS) $(FLAGS) ${LDFLAGS} -o $@ $? $(LIBS)
52 -
53 - pop_stone: $(POP_LIBS)
54 - $(MAKE) FLAGS="$(POP_FLAGS)" LIBS="$(POP_LIBS)" $(TARGET)
55
56 diff --git a/net-misc/stone/files/stone.man b/net-misc/stone/files/stone.man
57 deleted file mode 100644
58 index fa10c6eef18..00000000000
59 --- a/net-misc/stone/files/stone.man
60 +++ /dev/null
61 @@ -1,464 +0,0 @@
62 -.\" Roff format skeleton provided by Taketo Kabe <kabe@×××××××××××××.jp>
63 -.TH stone 1 "version 2.3"
64 -.
65 -.SH NAME
66 -stone \- Simple Repeater
67 -.
68 -.SH SYNOPSIS
69 -.B "stone [-C \fIfile\fP] [-P \fIcommand\fP] [-Q \fIoptions\fP] [-N] [-d] [-p] [-n]"
70 -.br
71 -.B " [-u \fImax\fP] [-f \fIn\fP] [-l] [-L \fIfile\fP] [-a \fIfile\fP] [-i \fIfile\fP]"
72 -.br
73 -.B " [-X \fIn\fP] [-T \fIn\fP] [-r]"
74 -.br
75 -.B " [-x \fIport\fP[,\fIport\fP][-\fIport\fP]... \fIxhost\fP... --]"
76 -.br
77 -.B " [-s \fIsend\fP \fIexpect\fP... --]"
78 -.br
79 -.B " [-b [\fIvar\fP=\fIval\fP]... \fIn\fP \fImaster\fP:\fIport\fP \fIbackup\fP:\fIport\fP]"
80 -.br
81 -.B " [-B \fIhost\fP:\fIport\fP \fIhost1\fP:\fIport1\fP... --]"
82 -.br
83 -.B " [-I \fIhost\fP]"
84 -.br
85 -.B " [-o \fIn\fP] [-g \fIn\fP] [-t \fIdir\fP] [-D] [-c \fIdir\fP]"
86 -.br
87 -.B " [-q \fISSL\fP] [-z \fISSL\fP]"
88 -.br
89 -.B " [-M install \fIname\fP] [-M remove \fIname\fP]"
90 -.br
91 -.B " \fIst\fP [-- \fIst\fP]..."
92 -.
93 -.SH DESCRIPTION
94 -\fBStone\fP is a TCP & UDP repeater in the application layer. It repeats TCP
95 -and UDP from inside to outside of a firewall, or from outside to inside.
96 -.P
97 -\fBStone\fP has following features:
98 -.
99 -.TP
100 -.B 1. Stone supports Win32.
101 -Formerly, UNIX machines are used as firewalls, but recently
102 -WindowsNT machines are used, too. You can easily run \fBstone\fP on
103 -WindowsNT and Windows95. Of course, available on Linux,
104 -FreeBSD, BSD/OS, SunOS, Solaris, HP-UX and so on.
105 -.
106 -.TP
107 -.B 2. Simple.
108 -\fBStone\fP's source code is only 8000 lines long (written in C
109 -language), so you can minimize the risk of security
110 -holes.
111 -.
112 -.TP
113 -.B 3. Stone supports SSL.
114 -Using OpenSSL (\fIhttp://www.openssl.org/\fP), \fBstone\fP can
115 -encrypt/decrypt. Client verifications, and server verifications
116 -are also supported. \fBStone\fP can send a substring of the subject
117 -of the certificate to the destination.
118 -.
119 -.TP
120 -.B 4. Stone is a http proxy.
121 -\fBStone\fP can also be a tiny http proxy.
122 -.
123 -.TP
124 -.B 5. POP -> APOP conversion.
125 -With \fBstone\fP and a mailer that does not support APOP, you can
126 -access to an APOP server.
127 -.
128 -.TP
129 -.B 6. Stone supports IPv6.
130 -\fBStone\fP can convert IP and IPv6 each other. With \fBstone\fP, you can
131 -use IP-only software on IPv6 network.
132 -.
133 -.SH OPTIONS
134 -If the \fB-C\fP \fIfile\fP flag is used, the program read these
135 -options and \fIst\fPs from the configuration file \fIfile\fP.
136 -If the \fB-P\fP \fIcommand\fP flag is used, the program executes
137 -specified pre-processor to read the configuration file. \fB-Q\fP \fIoptions\fP
138 -can be used to pass options to the pre-processor. If the \fB-N\fP
139 -flag is used, \fBstone\fP will terminate after parsing options
140 -and configuration file without opening the ports.
141 -.P
142 -If the \fB-d\fP flag is used, then increase the debug level. If
143 -the \fB-p\fP flag is used, data repeated by \fBstone\fP are dumped. If
144 -the \fB-n\fP is used, IP addresses and service port numbers are
145 -shown instead of host names and service names.
146 -.P
147 -If the \fB-u\fP \fImax\fP flag (\fImax\fP is integer) is used, the
148 -program memorize \fImax\fP UDP sources simultaneously. The default value
149 -is 100. If the
150 -\fB-f\fP \fIn\fP flag (\fIn\fP is integer) is used, the program spawn
151 -\fIn\fP child processes. The default behavior is not to spawn any child processes.
152 -.P
153 -If the \fB-l\fP flag is used, the program sends error messages to
154 -the syslog instead of stderr. If the \fB-L\fP \fIfile\fP (\fIfile\fP
155 -is a file name) flag is used, the program writes error messages
156 -to the file. If the \fB-a\fP \fIfile\fP flag is used, the program
157 -writes accounting to the file. If the \fB-i\fP \fIfile\fP flag is
158 -used, the program writes its process ID to the file.
159 -.P
160 -The \fB-X\fP \fIn\fP flag alters the buffer size of the repeater.
161 -The default value is 1000 bytes. If
162 -the \fB-T\fP \fIn\fP is used, the timeout of TCP sessions can be
163 -specified to \fIn\fP sec. Default: 600 (10 min). The \fB-r\fP flag is
164 -used, SO_REUSEADDR is set on the socket of \fIst\fP .
165 -.P
166 -Using the \fB-x\fP \fIport\fP[,\fIport\fP][-\fIport\fP]... \fIxhost\fP... \fB--\FP flag,
167 -the http proxy (described later) can only connect to
168 -\fIxhost\fP:\fIport\fP. If more than one \fB-x\fP ... \fB--\fI flags are
169 -designated, the posterior one whose \fIport\fP list matches the
170 -connecting port. If the \fB-x\fP \fB--\fP is used, prior \fB-x\fP flags
171 -are ignored.
172 -.P
173 -The \fB-b\fP \fIn\fP \fImaster\fP:\fIport\fP \fIbackup\fP:\fIport\fP flag designates
174 -the backup destination for \fImaster\fP:\fIport\fP. The program checks
175 -every \fIn\fP seconds whether \fImaster\fP:\fIport\fP is connectable, using
176 -the health check script defined by \fB-s\fP flag described below.
177 -If not, the backup is used instead. Alternative \fIhost\fP can be
178 -checked, using host=\fIhost\fP and alternative \fIport\fP, using
179 -port=\fIport\fP.
180 -.P
181 -The \fB-s\fP \fIsend\fP \fIexpect\fP... \fB--\fP flag defines the health check
182 -script. Sending \fIsend\fP, then checks whether the response match
183 -the regular expression \fIexpect\fP.
184 -.P
185 -The \fB-B\fP \fIhost\fP:\fIport\fP \fIhost1\fP:\fIport1\fP... \fB--\fP is for the
186 -destination group. If the destination of \fIst\fP is \fIhost\fP:\fIport\fP,
187 -the program chooses a destination randomly from the group. The
188 -destination \fIhost\fP:\fIport\fP that is designated by \fB-b\fP flag and
189 -turned out unhealthy, is excluded from the group.
190 -.P
191 -The \fB-I\fP \fIhost\fP designates the interface used as the source
192 -address of the connection to the desctination.
193 -.P
194 -If the \fB-o\fP \fIn\fP or \fB-g\fP \fIn\fP flag is used, the program set
195 -its uid or gid to \fIn\fP respectively. If the \fB-t\fP \fIdir\fP
196 -flag (\fIdir\fP is a directory) is used, the program change its
197 -root to the directory. If the \fB-D\fP flas is used, \fBstone\fP runs
198 -as a daemon. The \fB-c\fP \fIdir\fP flag designates the
199 -directory for core dump.
200 -.P
201 -The \fB-M\fP install \fIname\fP and the \fB-M\fP remove \fIname\fP flags are
202 -for NT service. \fIname\fP is the service name. Start the
203 -service using the command: net start \fIname\fP. To install \fBstone\fP
204 -service as the name \fIrepeater\fP, for example:
205 -.P
206 -.RS
207 -C:\\>\fBstone -M install \fIrepeater\fB -C \fIC:\\stone.cfg\fR
208 -.br
209 -C:\\>\fBnet start \fIrepeater\fR
210 -.RE
211 -.P
212 -The \fB-q\fP \FISSL\FP and the \fB-z\fP \FISSL\FP flags are for SSL
213 -encryption. The \fB-q\fP \FISSL\FP is for the client mode, that is,
214 -when \fBstone\fP connects to the other SSL server as a SSL client.
215 -The \fB-z\fP \FISSL\FP if for the server mode, that is, when other SSL
216 -clients connect to the \fBstone\fP.
217 -.P
218 -\FISSL\FP is one of the following.
219 -.P
220 -.PD 0
221 -.IP default 15
222 -reset SSL options to the default.
223 -Using multiple \fIst\fP, different SSL options can
224 -be designated for each \fIst\fP.
225 -.IP verbose
226 -verbose mode.
227 -.IP verify
228 -require SSL certificate to the peer.
229 -.IP verify,once
230 -request a client certificate on the initial TLS/SSL
231 -handshake. (\fB-z\fP only)
232 -.IP verify,ifany
233 -The certificate returned (if any) is checked. (\fB-z\fP only)
234 -.IP verify,none
235 -never request SSL certificate to the peer.
236 -.IP crl_check
237 -lookup CRLs.
238 -.IP crl_check_all
239 -lookup CRLs for whole chain.
240 -.IP uniq
241 -if the serial number of peer's SSL certificate
242 -is different from the previous session, deny it.
243 -.IP re\fIn\fP=\fIregex\fP
244 -The certificate of the peer must satisfy the
245 -\fIregex\fP. \fIn\fP is the depth. re0 means the subject
246 -of the certificate, and re1 means the issure.
247 -The maximum of \fIn\fP is 9.
248 -.IP depth=\fIn\fP
249 -The maximum of the certificate chain.
250 -If the peer's certificate exceeds \fIn\fP, the
251 -verification fails. The maximum of \fIn\fP is 9.
252 -.IP tls1
253 -Just use TLSv1 protocol.
254 -.IP ssl3
255 -Just use SSLv3 protocol.
256 -.IP ssl2
257 -Just use SSLv2 protocol.
258 -.IP no_tls1
259 -Turn off TLSv1 protocol.
260 -.IP no_ssl3
261 -Turn off SSLv3 protocol.
262 -.IP no_ssl2
263 -Turn off SSLv2 protocol.
264 -.IP bugs
265 -Switch on all SSL implementation bug workarounds.
266 -.IP serverpref
267 -Use server's cipher preferences (only SSLv2).
268 -.IP sid_ctx=\fIstr\fP
269 -Set session ID context.
270 -.IP passfile=\fIfile\fP
271 -The filename of the file containing password of the key
272 -.IP key=\fIfile\fP
273 -The filename of the secret key of the certificate.
274 -.IP cert=\fIfile\fP
275 -The filename of the certificate.
276 -.IP CAfile=\fIfile\fP
277 -The filename of the certificate of the CA.
278 -.IP CApath=\fIdir\fP
279 -The directory of the certificate files.
280 -.IP pfx=\fIfile\fP
281 -The filename of the PKCS#12 bag.
282 -.IP cipher=\fIlist\fP
283 -The list of ciphers.
284 -.IP lb\fIn\fP=\fIm\fP
285 -change the destination according to the
286 -certificate of the peer. The number calculated
287 -from the matched string to the \fIn\fPth ( ... ) in
288 -the ``regex'' of SSL options (mod \fIm\fP) is used
289 -to select the destination from the destination
290 -group defined by \fB-B\fP flag.
291 -.PD
292 -.P
293 -\fIst\fP is one of the following. Multiple \fIst\fP can be
294 -designated, separated by \fB--\fP.
295 -.P
296 -.PD 0
297 -.IP (1)
298 -\fIhost\fP:\fIport\fP \fIsport\fP [\fIxhost\fP...]
299 -.IP (2)
300 -\fIhost\fP:\fIport\fP \fIshost\fP:\fIsport\fP [\fIxhost\fP...]
301 -.IP (3)
302 -proxy \fIsport\fP [\fIxhost\fP...]
303 -.IP (4)
304 -\fIhost\fP:\fIport\fP/http \fIrequest\fP [\fIxhost\fP...]
305 -.IP (5)
306 -\fIhost\fP:\fIport\fP/proxy \fIheader\fP [\fIxhost\fP...]
307 -.IP (6)
308 -health \fIsport\fP [\fIxhost\fP...]
309 -.PD
310 -.P
311 -The program repeats the connection on port \fIsport\fP to the
312 -other machine \fIhost\fP port \fIport\fP. If the machine, on
313 -which the program runs, has two or more interfaces, type (2) can
314 -be used to repeat the connection on the specified interface
315 -\fIshost\fP. You can also specify path name that begins with
316 -``/'' or ``./'', instead of \fIhost\fP:\fIport\fP so that the
317 -program handles a unix domain socket.
318 -.P
319 -Type (3) is a http proxy. Specify the machine, on which the
320 -program runs, and port \fIsport\fP in the http proxy settings of
321 -your WWW browser.
322 -Extentions can be added to the ``proxy'' like \fIxhost\fP/\fIext\fP.
323 -\fIext\fP is:
324 -.P
325 -.IP v4only
326 -limit the destination within IP addresses.
327 -.IP v6only
328 -limit the destination within IPv6 addresses.
329 -.P
330 -Type (4) relays stream over http request. \fIrequest\fP is the
331 -request specified in HTTP 1.0. In the \fIrequest\fP, \ is
332 -the escape character, and the following substitution occurs.
333 -.PP
334 -.RS 8
335 -.PD 0
336 -.IP \\\\n 8
337 -newline (0x0A)
338 -.IP \\\\r
339 -return (0x0D)
340 -.IP \\\\t
341 -tab (0x09)
342 -.IP \\\\\\\\
343 -\ itself (0x5C)
344 -.IP \\\\a
345 -the IP address of the client connecting to the \fBstone\fP.
346 -.IP \\\\A
347 -\fIIP address of the client\fP:\fIport number\fP
348 -.IP \\\\0
349 -the serial number of peer's SSL certificate.
350 -.IP "\\\\1 - \\\\9"
351 -the matched string in the ``regex'' of SSL options.
352 -.IP \\\\?1\fIthen\fP\\\\:\fIelse\fP\\\\/
353 -if \1 (\2 - \9 in a similar way) is not null,
354 -\fIthen\fP, otherwise \fIelse\fP.
355 -.PD
356 -.RE
357 -.P
358 -Type (5) repeats http request with \fIheader\fP in the top of
359 -request headers. The above escapes can be also used.
360 -.P
361 -Type (6) designates the port that other programs can check
362 -whether the \fBstone\fP runs `healthy' or not. Following commands are
363 -available to check the \fBstone\fP.
364 -.P
365 -.RS 8
366 -.PD 0
367 -.IP "HELO \fIany string\fP" 24
368 -returns the status of the \fBstone\fP
369 -.IP "LIMIT \fIvar\fP \fIn\fP"
370 -check the value of \fIvar\fP is
371 -less than \fIn\fP
372 -.PD
373 -.RE
374 -.P
375 -\fIvar\fP is one of the following:
376 -.P
377 -.RS 8
378 -.PD 0
379 -.IP PAIR 16
380 -the number of ``pair''
381 -.IP CONN
382 -the number of ``conn''
383 -.IP ESTABLISHED
384 -seconds passed since the last conn established
385 -.IP READWRITE
386 -seconds passed since the last read/write
387 -.IP ASYNC
388 -the number of threads
389 -.PD
390 -.RE
391 -.P
392 -The response of the \fBstone\fP is 2xx when normal, or 5xx when
393 -abnormal on the top of line.
394 -.P
395 -If the \fIxhost\fP are used, only machines or its IP addresses
396 -listed in \fIxhost\fP separated by space character can
397 -connect to the program and to be repeated.
398 -.P
399 -Extentions can be added to the \fIxhost\fP like
400 -\fIxhost\fP/\fIex\fP,\fIex\fP.... \fIex\fP is:
401 -.IP \fIm\fP
402 -You can designate the length of prefix bits of the
403 -netmask, so that only machines on specified. In the
404 -case of class C network 192.168.1.0, for example, use
405 -``192.168.1.0/24''.
406 -.IP v4
407 -\fIxhost\fP is resolved as the IP address.
408 -.IP v6
409 -\fIxhost\fP is resolved as the IPv6 address.
410 -.IP p\fIm\fP
411 -the data repeated by the program are dumped, only if it
412 -was connected by the machines specified by \fIxhost\fP. \fIm\fP
413 -is the dump mode, equivalent to the number of \fB-p\fP
414 -options.
415 -.P
416 -Use ``!'' instead of ``\fIxhost\fP'', to deny machines by following
417 -\fIxhost\fP.
418 -.P
419 -Extentions can be added to the \fIport\fP like
420 -\fIport\fP/\fIext\fP,\fIext\fP.... \fIext\fP is:
421 -.IP udp
422 -repeats UDP instead of TCP.
423 -.IP ssl
424 -forwards with encryption.
425 -.IP v6
426 -connects to the destination using IPv6.
427 -.IP base
428 -forwards with MIME base64 encoding.
429 -.P
430 -Extentions can be added to the \fIsport\fP like
431 -\fIsport\fP/\fIext\fP,\fIext\fP.... \fIext\fP is:
432 -.IP udp
433 -repeats UDP instead of TCP.
434 -.IP apop
435 -converts POP to APOP. The conversion is derived from
436 -the RSA Data Security, Inc. MD5 Message-Digest Algorithm.
437 -.IP ssl
438 -forwards with decryption.
439 -.IP v6
440 -accepts connection using IPv6. If \fIshost\fP is omitted
441 -like (1), IP is also acceptable.
442 -.IP v6only
443 -accepts connection using IPv6 only. Even if \fIshost\fP is
444 -omitted like (1), IP is not acceptable.
445 -.IP base
446 -forwards with MIME base64 decoding.
447 -.IP http
448 -relays stream over http.
449 -.IP ident
450 -identifies the owner of the incoming connection
451 -on the peer using ident protocol (RFC1413).
452 -.SH EXAMPLES
453 -.PD 0
454 -.IP \fIouter\fP\^:
455 -a machine in the outside of the firewall
456 -.IP \fIinner\fP\^:
457 -a machine in the inside of the firewall
458 -.IP \fIfwall\fP\^:
459 -the firewall on which the \fBstone\fP is executed
460 -.PD
461 -.TP
462 -\fBstone \fIouter\fB:telnet 10023\fR
463 -Repeats the telnet protocol to \fIouter\fP.
464 -Run telnet fwall 10023 on \fIinner\fR.
465 -.TP
466 -\fBstone \fIouter\fB:domain/udp domain/udp\fR
467 -Repeats the DNS query to \fIouter\fP.
468 -Run \fBnslookup -\fP \fIfwall\fP on \fIinner\fP.
469 -.TP
470 -\fBstone \fIouter\fB:ntp/udp ntp/udp\fR
471 -Repeats the NTP to \fIouter\fP.
472 -Run \fBntpdate \fIfwall\fR on \fIinner\fP.
473 -.TP
474 -\fBstone localhost:http 443/ssl\fR
475 -Make WWW server that supports https.
476 -Access \fBhttps://\fIfwall\fB/\fR using a WWW browser.
477 -.TP
478 -\fBstone localhost:telnet 10023/ssl\fR
479 -Make telnet server that supports SSL.
480 -Run \fBSSLtelnet -z ssl \fIfwall\fB 10023\fR on \fIinner\fP.
481 -.TP
482 -\fBstone proxy 8080\fR
483 -http proxy
484 -.TP
485 -\fBstone\fP \fIouter\fB:110/apop 110\fR
486 -connect to \fIinner\fP:pop using a mailer that does not
487 -support APOP.
488 -.PP
489 -Where \fIfwall\fP is a http proxy (port 8080):
490 -.TP
491 -\fBstone \fIfwall\fB:8080/http 10023 'POST http://\fIouter\fB:8023 HTTP/1.0'\fR
492 -.br
493 -.ns
494 -.TP
495 -\fBstone localhost:telnet 8023/http
496 -.nf
497 -Run \fBstone\fPs on \fIinner\fP and \fIouter\fP respectively.
498 -Relays stream over http.
499 -.TP
500 -\fBstone \fIfwall\fB:8080/proxy 9080 \'Proxy-Authorization: Basic \fIc2VuZ29rdTpoaXJvYWtp\fB\'\fR
501 -for browser that does not support proxy authorization.
502 -.fi
503 -.
504 -.SH HOMEPAGE
505 -The official homepage of \fBstone\fP is:
506 -.br
507 -\fIhttp://www.gcd.org/sengoku/stone/\fP
508 -.
509 -.SH COPYRIGHT
510 -All rights about this program \fBstone\fP are reserved by the
511 -original author, Hiroaki Sengoku. The program is free software;
512 -you can redistribute it and/or modify it under the terms of the
513 -\fIGNU IGeneral Public License (GPL)\fP. Furthermore you can link it
514 -with openssl.
515 -.
516 -.SH NO WARRANTY
517 -This program is distributed in the hope that it will be useful,
518 -but WITHOUT ANY WARRANTY.
519 -.
520 -.SH AUTHOR
521 -.nf
522 -Hiroaki Sengoku
523 -sengoku@×××.org
524 -http://www.gcd.org/sengoku/
525 -.fi
526
527 diff --git a/net-misc/stone/metadata.xml b/net-misc/stone/metadata.xml
528 deleted file mode 100644
529 index fde75b04e63..00000000000
530 --- a/net-misc/stone/metadata.xml
531 +++ /dev/null
532 @@ -1,6 +0,0 @@
533 -<?xml version="1.0" encoding="UTF-8"?>
534 -<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
535 -<pkgmetadata>
536 -<!-- maintainer-needed -->
537 -<longdescription>Stone is a TCP/IP packet repeater in the application layer. It repeats TCP and UDP packets from inside to outside of a firewall, or from outside to inside.</longdescription>
538 -</pkgmetadata>
539
540 diff --git a/net-misc/stone/stone-2.3e-r1.ebuild b/net-misc/stone/stone-2.3e-r1.ebuild
541 deleted file mode 100644
542 index 6e1111841a3..00000000000
543 --- a/net-misc/stone/stone-2.3e-r1.ebuild
544 +++ /dev/null
545 @@ -1,46 +0,0 @@
546 -# Copyright 1999-2013 Gentoo Foundation
547 -# Distributed under the terms of the GNU General Public License v2
548 -
549 -EAPI=5
550 -
551 -inherit eutils flag-o-matic toolchain-funcs
552 -
553 -DESCRIPTION="A simple TCP/IP packet repeater"
554 -HOMEPAGE="http://www.gcd.org/sengoku/stone/"
555 -SRC_URI="http://www.gcd.org/sengoku/stone/${P}.tar.gz"
556 -
557 -LICENSE="GPL-2"
558 -SLOT="0"
559 -KEYWORDS="amd64 ppc ~sparc x86"
560 -IUSE="ssl"
561 -
562 -DEPEND="ssl? ( dev-libs/openssl )"
563 -RDEPEND="${DEPEND}"
564 -
565 -S="${WORKDIR}/${PN}-2.3d-2.3.2.7"
566 -
567 -PATCHES=( "${FILESDIR}/${P}-makefile.patch" ) # bug #337879
568 -
569 -src_prepare() {
570 - tc-export CC
571 - append-cflags "-D_GNU_SOURCE"
572 -
573 - epatch "${PATCHES[@]}"
574 - epatch_user
575 -}
576 -
577 -src_compile() {
578 - local myargs
579 - if use ssl ; then
580 - myargs="SSL=/usr linux-ssl"
581 - else
582 - myargs="linux"
583 - fi
584 - emake ${myargs}
585 -}
586 -
587 -src_install() {
588 - dobin stone
589 - newman "${FILESDIR}/${PN}.man" "${PN}.1"
590 - dodoc README*
591 -}
592
593 diff --git a/profiles/package.mask b/profiles/package.mask
594 index 398ec66549d..740da127d94 100644
595 --- a/profiles/package.mask
596 +++ b/profiles/package.mask
597 @@ -627,7 +627,6 @@ x11-libs/hippo-canvas
598 # net-mail/uw-imap: #678606, last upstream release in 2011
599 # net-mail/uw-mailutils: #674174, same as uw-imap
600 # net-misc/sslwrap: #674524, last updated upstream in 2000
601 -# net-misc/stone: #675612, needs new snapshot, current ver is from 2008
602 #
603 # Removal in 30 days.
604 app-crypt/keynote
605 @@ -652,7 +651,6 @@ net-mail/up-imapproxy
606 net-mail/uw-imap
607 net-mail/uw-mailutils
608 net-misc/sslwrap
609 -net-misc/stone
610
611 # Miroslav Šulc <fordfrog@g.o> (19 Mar 2019)
612 # Depends on >=virtual/{jdk,jre}-11 which is masked