attack. Please read the documentation and consider the security
model for your service before using the S/Ident protocol for
authentication.
+ * Depend on tcpd and run under tcpd in the default inetd.conf entry.
* Mention the security vulnerability in all package descriptions.
* Indent the homepage in package descriptions to avoid wrapping.
* Remove unnecessary bits from debian/rules.
Package: sidentd
Architecture: any
-Depends: ${shlibs:Depends}, netbase
+Depends: ${shlibs:Depends}, netbase, tcpd
Recommends: krb5-user | heimdal-clients | kerberos4kth-clients
Description: Authenticate to network services via S/Ident
A daemon run from inetd or an equivalent which responds to network
set -e
+INETD='auth\t\tstream\ttcp\tnowait\troot\t/usr/sbin/tcpd /usr/sbin/sidentd'
+
case "$1" in
configure)
# Only try to add the inetd line on an initial installation.
if [ -z "$2" ] || [ x"$2" = x"<unknown>" ] ; then
- update-inetd --add \
- 'auth\t\tstream\ttcp\tnowait\troot\t/usr/sbin/sidentd sidentd'
+ update-inetd --add "$INETD"
fi
;;