diff options
author | Sergey Popov <pinkbyte@gentoo.org> | 2013-02-20 14:03:53 +0000 |
---|---|---|
committer | Sergey Popov <pinkbyte@gentoo.org> | 2013-02-20 14:03:53 +0000 |
commit | dc64f056e8f4188b80d5ddef037ea4241c5b4f7a (patch) | |
tree | 1a733826cf8dc0be6e3d20b4c040b270443643c2 | |
parent | Version bump to 1.2.10. Fixes bug#428822 and bug#455330. (diff) | |
download | historical-dc64f056e8f4188b80d5ddef037ea4241c5b4f7a.tar.gz historical-dc64f056e8f4188b80d5ddef037ea4241c5b4f7a.tar.bz2 historical-dc64f056e8f4188b80d5ddef037ea4241c5b4f7a.zip |
Add missing manpage from CVS, wrt bug #252780. Thanks to Mike Kazantsev for discovering this issue
Package-Manager: portage-2.2.0_alpha163/cvs/Linux x86_64
Manifest-Sign-Key: 0x1F357D42
-rw-r--r-- | net-misc/stone/ChangeLog | 7 | ||||
-rw-r--r-- | net-misc/stone/Manifest | 19 | ||||
-rw-r--r-- | net-misc/stone/files/stone.man | 464 | ||||
-rw-r--r-- | net-misc/stone/stone-2.3e-r1.ebuild | 3 |
4 files changed, 482 insertions, 11 deletions
diff --git a/net-misc/stone/ChangeLog b/net-misc/stone/ChangeLog index 840e63447932..997f0b5e3965 100644 --- a/net-misc/stone/ChangeLog +++ b/net-misc/stone/ChangeLog @@ -1,6 +1,11 @@ # ChangeLog for net-misc/stone # Copyright 1999-2013 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/net-misc/stone/ChangeLog,v 1.21 2013/02/20 13:56:01 pinkbyte Exp $ +# $Header: /var/cvsroot/gentoo-x86/net-misc/stone/ChangeLog,v 1.22 2013/02/20 14:03:51 pinkbyte Exp $ + + 20 Feb 2013; Sergey Popov <pinkbyte@gentoo.org> stone-2.3e-r1.ebuild, + +files/stone.man: + Add missing manpage from CVS, wrt bug #252780. Thanks to Mike Kazantsev for + discovering this issue *stone-2.3e-r1 (20 Feb 2013) diff --git a/net-misc/stone/Manifest b/net-misc/stone/Manifest index dd23ed900715..5717dcabdb3c 100644 --- a/net-misc/stone/Manifest +++ b/net-misc/stone/Manifest @@ -2,19 +2,20 @@ Hash: SHA256 AUX stone-2.3e-makefile.patch 551 SHA256 ca9cb87e0e6411b48b84c099adc57b729ae9d778ba7506c6dee2f57aabd6a98c SHA512 ab9051fc87046484c755830f1803b1ac9ceca5c0fdc00e09f690eae538d7cd7611049fcad4100c43cf996dacea2eb57360778eb91aa40b76b697a217e105c18c WHIRLPOOL 7bea2b8781ad93689b5d0c4ad2f2497f95723f3f17d31449e04616bf45bb1dad7b710e6a0df0131c41ce4321e5fdfaed561ec1826f8845624e45eee76164c438 +AUX stone.man 15094 SHA256 d45b4e0bfc06e86a12aba7dfaecdb5a0485ddc473a6dadc32c4e2956c5d8a9b4 SHA512 9ee8f9c95d6dffcd15b872bc40f1b58f3bd476ba93a61e404d2204b14d72f986683b98375aa195b4d3da8f31000d4c3c5b1c6e35a55ffbf3bda3a0f2b346d806 WHIRLPOOL cd108cf7e640d4d4ae9b169a2c44fee28c632f0088e18a65812c5091b27ecd82bedbacc6b743a2b1a5ad899ffc51c97b7ba5dfb7338159c4d4cb1a3f896e97d7 DIST stone-2.3e.tar.gz 92587 SHA256 b2b664ee6771847672e078e7870e56b886be70d9ff3d7b20d0b3d26ee950c670 SHA512 a0cccc123222c4fb4c1b2f031fc4d039f39e77691adc9f1df367d99bef8524738265350d1056c926c5f216236d2db25f31d14e9bec297b1bb4ea17e217c4983b WHIRLPOOL f73f5dd7d91f0d0e68065b0dd20adf50865c5081f1628154d9bf4b5c8c11fe9aa2355e7cc4dc6409f241325f509af4e5f1dd7eaf690eecca794c191dfa72028a -EBUILD stone-2.3e-r1.ebuild 904 SHA256 c28c981b08636c81b23ba421faa47adc1c77ba212b186cc6b4fbb69588a662f3 SHA512 cd985d0fdc79a38921d57172ab6f02948c92f150cb64990c68e7e7a613300c1ed72e8fa8c94192e9aa8111152aa26ba15e6890c5a4d7fe63199974cc5a6a9a00 WHIRLPOOL 8b99094472db4bb4cee3afa49506c72f767a857b8ed9c456c4be71f3776c047c3f8b84ae7847433ddd13b703660f28aa6dd56e377ecac98c07029547ec6ae6ce +EBUILD stone-2.3e-r1.ebuild 946 SHA256 3975dcd7f0218cee045473541f20fb8480d510161edcbb3472ccab1701d35de1 SHA512 1139c4620d6cec3e5ecd48a50b8110b083d146e79c228e5afe63d98bc503f0fe7802b32b29a6d6918065ea825e6f6b0db256c7be954531c118c754c4cca38cc1 WHIRLPOOL 84cb2bbb4aa2d816cd8eec1b301e46d34abaaf4cd3ab6c58b333c7c1f1adc37c0bba43a9a30026e54bd0eb41f0f6e75fff012c67b5545b95f1dbe5fe6c794ad4 EBUILD stone-2.3e.ebuild 814 SHA256 571660e2071fe431de75764964d21d9ec75a5bdf3b7d8b33fb8faee27a9d78b3 SHA512 910724d402660d2d1e7603fb167dcfdb457baa84fb9a48a3bad2da76466a8d0d4c96783e52025c3b187d498b6d1b302dc2dedbce473fa8c57d81a93e1efb41cc WHIRLPOOL e72bd9a5a7b89bd3f300dc2a516ddbacc40b45a1b8d499def0df8a9aa34cc895ed4b934f8c68889f8e2029a55220c5bfb77c0adc85c70ce78fdf9fb598ed14b4 -MISC ChangeLog 2731 SHA256 5ccaf73e468c6bad83a36d4f4686a79ad6af3d2fed9adc4804a5882333a2ea61 SHA512 b596cb845d36d75c59bb85ff80cb4e3c09e51340143a15d38ca7ec8108f55fed2b8022f68e92a9a3b4da8f545e3d4898fe7a7e86d8997fcc6502dd28fd593644 WHIRLPOOL ac64976515b34d81768a5ec36dbaa3588cc15977db5fbc793418ee802189b8c9dde3f9441358196b5a7ce7b2db075dd5a93a830de1b95ef74dbff1758a902101 +MISC ChangeLog 2927 SHA256 b806246decaae7e5035bf5bfaa6fd76988d6ee1dab15977b1756d5ee6269ca09 SHA512 21e63d3b7337e747f8bec5835344abd983311f41f934669432852510a3c77d067899b77b1584a2122d8c6adbe366b0571f44b02e5508bbf51b78c5763e936def WHIRLPOOL 948413f8a3a0b8537f16b7acda3b4b4b922d707b8e856180e5308bc85148c3b09383a904144af4011b9fc3fa136fd8a26178bf0cff1fff5b8da8c3281e7543a8 MISC metadata.xml 402 SHA256 68dd2c530f60976b0fa372e6150d108a82416096c59c96da9c5d252d18385c7b SHA512 0130e5b04515f2e51d93182f402edceb8d5528ebbff7c9a609607dbd8b459ffe4a726075a882ca1058cecebf7dbd6e9d6f84b12a038963f6d371453416936353 WHIRLPOOL 39c27bdeddb4e36067bcf6926ba95330d6c78c69c55dc7e57f9ee164abb93f741b6b43a3aaf1e446c89d620e1ed066804d74ff2f300aa487d1d325ad6d9283f5 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.19 (GNU/Linux) -iQEcBAEBCAAGBQJRJNXyAAoJECo/aRed9267JgIH/0xI2ykWelomatE+SwY3Z5Pt -ho2sYZCV1HYTxOJcp6r4KRCAzYO7yTpYRzHI/O+0GnkGrquUB6k4NHGBkVildAGr -V0NuPaeUZsqCjo1g/GTbmPApv3Xqgtol5TyeamuPm/8+IzluvAUiSwrZYkjvtUNa -26gUOD+LJuUhnkJqKkMwAl++qgsoj1FIMYsqVc05A17XUSdbKyuz4NhafdsKthVL -dv3O/NGTezAjkL/P3yx/Q11FDns2QoM9/nzVlkK2Hw4ym/zUUnpAkvtwRRLtRTIl -ZiEmno3KlqQK4h5TONhpuAHzvrVpfjXS88rx9hxNRhfbul9xacD/teVspfeW3QI= -=8l4o +iQEcBAEBCAAGBQJRJNfJAAoJECo/aRed9267Q5cH/1t7dO8cBwlcVtNbnEZsnCdB +UY64/+IHNNL769jOP3wHr+6OPLBJkNWHDNBQ99ksxU4HDoTeEInBy6S+hXWVdp8b +otEFdPN2TksTfdM0sFW1p8/IB2szLqgZWcgy68KStxRK6nyMKqYLTrLJb0ab4Zd0 +Y8fqQ4Um9UzNfQfmkRYA1t25WlnT0uggKmkWRfWO+OAgFQV2A3n12XvdmQ4HRlQM +u+wSesVG+F2I20wXgw7LTRvlqhKyL9DKpEVqP4yuNCrL4cR8Bf7gCnl6u1/G1O+7 +WOI4RuyHQR6P218IuEmaut+sRx9kJLyKdcsdldO7uiSzYh2guOzvhK60z1ZVoHA= +=QXPT -----END PGP SIGNATURE----- diff --git a/net-misc/stone/files/stone.man b/net-misc/stone/files/stone.man new file mode 100644 index 000000000000..fa10c6eef18f --- /dev/null +++ b/net-misc/stone/files/stone.man @@ -0,0 +1,464 @@ +.\" Roff format skeleton provided by Taketo Kabe <kabe@sra-tohoku.co.jp> +.TH stone 1 "version 2.3" +. +.SH NAME +stone \- Simple Repeater +. +.SH SYNOPSIS +.B "stone [-C \fIfile\fP] [-P \fIcommand\fP] [-Q \fIoptions\fP] [-N] [-d] [-p] [-n]" +.br +.B " [-u \fImax\fP] [-f \fIn\fP] [-l] [-L \fIfile\fP] [-a \fIfile\fP] [-i \fIfile\fP]" +.br +.B " [-X \fIn\fP] [-T \fIn\fP] [-r]" +.br +.B " [-x \fIport\fP[,\fIport\fP][-\fIport\fP]... \fIxhost\fP... --]" +.br +.B " [-s \fIsend\fP \fIexpect\fP... --]" +.br +.B " [-b [\fIvar\fP=\fIval\fP]... \fIn\fP \fImaster\fP:\fIport\fP \fIbackup\fP:\fIport\fP]" +.br +.B " [-B \fIhost\fP:\fIport\fP \fIhost1\fP:\fIport1\fP... --]" +.br +.B " [-I \fIhost\fP]" +.br +.B " [-o \fIn\fP] [-g \fIn\fP] [-t \fIdir\fP] [-D] [-c \fIdir\fP]" +.br +.B " [-q \fISSL\fP] [-z \fISSL\fP]" +.br +.B " [-M install \fIname\fP] [-M remove \fIname\fP]" +.br +.B " \fIst\fP [-- \fIst\fP]..." +. +.SH DESCRIPTION +\fBStone\fP is a TCP & UDP repeater in the application layer. It repeats TCP +and UDP from inside to outside of a firewall, or from outside to inside. +.P +\fBStone\fP has following features: +. +.TP +.B 1. Stone supports Win32. +Formerly, UNIX machines are used as firewalls, but recently +WindowsNT machines are used, too. You can easily run \fBstone\fP on +WindowsNT and Windows95. Of course, available on Linux, +FreeBSD, BSD/OS, SunOS, Solaris, HP-UX and so on. +. +.TP +.B 2. Simple. +\fBStone\fP's source code is only 8000 lines long (written in C +language), so you can minimize the risk of security +holes. +. +.TP +.B 3. Stone supports SSL. +Using OpenSSL (\fIhttp://www.openssl.org/\fP), \fBstone\fP can +encrypt/decrypt. Client verifications, and server verifications +are also supported. \fBStone\fP can send a substring of the subject +of the certificate to the destination. +. +.TP +.B 4. Stone is a http proxy. +\fBStone\fP can also be a tiny http proxy. +. +.TP +.B 5. POP -> APOP conversion. +With \fBstone\fP and a mailer that does not support APOP, you can +access to an APOP server. +. +.TP +.B 6. Stone supports IPv6. +\fBStone\fP can convert IP and IPv6 each other. With \fBstone\fP, you can +use IP-only software on IPv6 network. +. +.SH OPTIONS +If the \fB-C\fP \fIfile\fP flag is used, the program read these +options and \fIst\fPs from the configuration file \fIfile\fP. +If the \fB-P\fP \fIcommand\fP flag is used, the program executes +specified pre-processor to read the configuration file. \fB-Q\fP \fIoptions\fP +can be used to pass options to the pre-processor. If the \fB-N\fP +flag is used, \fBstone\fP will terminate after parsing options +and configuration file without opening the ports. +.P +If the \fB-d\fP flag is used, then increase the debug level. If +the \fB-p\fP flag is used, data repeated by \fBstone\fP are dumped. If +the \fB-n\fP is used, IP addresses and service port numbers are +shown instead of host names and service names. +.P +If the \fB-u\fP \fImax\fP flag (\fImax\fP is integer) is used, the +program memorize \fImax\fP UDP sources simultaneously. The default value +is 100. If the +\fB-f\fP \fIn\fP flag (\fIn\fP is integer) is used, the program spawn +\fIn\fP child processes. The default behavior is not to spawn any child processes. +.P +If the \fB-l\fP flag is used, the program sends error messages to +the syslog instead of stderr. If the \fB-L\fP \fIfile\fP (\fIfile\fP +is a file name) flag is used, the program writes error messages +to the file. If the \fB-a\fP \fIfile\fP flag is used, the program +writes accounting to the file. If the \fB-i\fP \fIfile\fP flag is +used, the program writes its process ID to the file. +.P +The \fB-X\fP \fIn\fP flag alters the buffer size of the repeater. +The default value is 1000 bytes. If +the \fB-T\fP \fIn\fP is used, the timeout of TCP sessions can be +specified to \fIn\fP sec. Default: 600 (10 min). The \fB-r\fP flag is +used, SO_REUSEADDR is set on the socket of \fIst\fP . +.P +Using the \fB-x\fP \fIport\fP[,\fIport\fP][-\fIport\fP]... \fIxhost\fP... \fB--\FP flag, +the http proxy (described later) can only connect to +\fIxhost\fP:\fIport\fP. If more than one \fB-x\fP ... \fB--\fI flags are +designated, the posterior one whose \fIport\fP list matches the +connecting port. If the \fB-x\fP \fB--\fP is used, prior \fB-x\fP flags +are ignored. +.P +The \fB-b\fP \fIn\fP \fImaster\fP:\fIport\fP \fIbackup\fP:\fIport\fP flag designates +the backup destination for \fImaster\fP:\fIport\fP. The program checks +every \fIn\fP seconds whether \fImaster\fP:\fIport\fP is connectable, using +the health check script defined by \fB-s\fP flag described below. +If not, the backup is used instead. Alternative \fIhost\fP can be +checked, using host=\fIhost\fP and alternative \fIport\fP, using +port=\fIport\fP. +.P +The \fB-s\fP \fIsend\fP \fIexpect\fP... \fB--\fP flag defines the health check +script. Sending \fIsend\fP, then checks whether the response match +the regular expression \fIexpect\fP. +.P +The \fB-B\fP \fIhost\fP:\fIport\fP \fIhost1\fP:\fIport1\fP... \fB--\fP is for the +destination group. If the destination of \fIst\fP is \fIhost\fP:\fIport\fP, +the program chooses a destination randomly from the group. The +destination \fIhost\fP:\fIport\fP that is designated by \fB-b\fP flag and +turned out unhealthy, is excluded from the group. +.P +The \fB-I\fP \fIhost\fP designates the interface used as the source +address of the connection to the desctination. +.P +If the \fB-o\fP \fIn\fP or \fB-g\fP \fIn\fP flag is used, the program set +its uid or gid to \fIn\fP respectively. If the \fB-t\fP \fIdir\fP +flag (\fIdir\fP is a directory) is used, the program change its +root to the directory. If the \fB-D\fP flas is used, \fBstone\fP runs +as a daemon. The \fB-c\fP \fIdir\fP flag designates the +directory for core dump. +.P +The \fB-M\fP install \fIname\fP and the \fB-M\fP remove \fIname\fP flags are +for NT service. \fIname\fP is the service name. Start the +service using the command: net start \fIname\fP. To install \fBstone\fP +service as the name \fIrepeater\fP, for example: +.P +.RS +C:\\>\fBstone -M install \fIrepeater\fB -C \fIC:\\stone.cfg\fR +.br +C:\\>\fBnet start \fIrepeater\fR +.RE +.P +The \fB-q\fP \FISSL\FP and the \fB-z\fP \FISSL\FP flags are for SSL +encryption. The \fB-q\fP \FISSL\FP is for the client mode, that is, +when \fBstone\fP connects to the other SSL server as a SSL client. +The \fB-z\fP \FISSL\FP if for the server mode, that is, when other SSL +clients connect to the \fBstone\fP. +.P +\FISSL\FP is one of the following. +.P +.PD 0 +.IP default 15 +reset SSL options to the default. +Using multiple \fIst\fP, different SSL options can +be designated for each \fIst\fP. +.IP verbose +verbose mode. +.IP verify +require SSL certificate to the peer. +.IP verify,once +request a client certificate on the initial TLS/SSL +handshake. (\fB-z\fP only) +.IP verify,ifany +The certificate returned (if any) is checked. (\fB-z\fP only) +.IP verify,none +never request SSL certificate to the peer. +.IP crl_check +lookup CRLs. +.IP crl_check_all +lookup CRLs for whole chain. +.IP uniq +if the serial number of peer's SSL certificate +is different from the previous session, deny it. +.IP re\fIn\fP=\fIregex\fP +The certificate of the peer must satisfy the +\fIregex\fP. \fIn\fP is the depth. re0 means the subject +of the certificate, and re1 means the issure. +The maximum of \fIn\fP is 9. +.IP depth=\fIn\fP +The maximum of the certificate chain. +If the peer's certificate exceeds \fIn\fP, the +verification fails. The maximum of \fIn\fP is 9. +.IP tls1 +Just use TLSv1 protocol. +.IP ssl3 +Just use SSLv3 protocol. +.IP ssl2 +Just use SSLv2 protocol. +.IP no_tls1 +Turn off TLSv1 protocol. +.IP no_ssl3 +Turn off SSLv3 protocol. +.IP no_ssl2 +Turn off SSLv2 protocol. +.IP bugs +Switch on all SSL implementation bug workarounds. +.IP serverpref +Use server's cipher preferences (only SSLv2). +.IP sid_ctx=\fIstr\fP +Set session ID context. +.IP passfile=\fIfile\fP +The filename of the file containing password of the key +.IP key=\fIfile\fP +The filename of the secret key of the certificate. +.IP cert=\fIfile\fP +The filename of the certificate. +.IP CAfile=\fIfile\fP +The filename of the certificate of the CA. +.IP CApath=\fIdir\fP +The directory of the certificate files. +.IP pfx=\fIfile\fP +The filename of the PKCS#12 bag. +.IP cipher=\fIlist\fP +The list of ciphers. +.IP lb\fIn\fP=\fIm\fP +change the destination according to the +certificate of the peer. The number calculated +from the matched string to the \fIn\fPth ( ... ) in +the ``regex'' of SSL options (mod \fIm\fP) is used +to select the destination from the destination +group defined by \fB-B\fP flag. +.PD +.P +\fIst\fP is one of the following. Multiple \fIst\fP can be +designated, separated by \fB--\fP. +.P +.PD 0 +.IP (1) +\fIhost\fP:\fIport\fP \fIsport\fP [\fIxhost\fP...] +.IP (2) +\fIhost\fP:\fIport\fP \fIshost\fP:\fIsport\fP [\fIxhost\fP...] +.IP (3) +proxy \fIsport\fP [\fIxhost\fP...] +.IP (4) +\fIhost\fP:\fIport\fP/http \fIrequest\fP [\fIxhost\fP...] +.IP (5) +\fIhost\fP:\fIport\fP/proxy \fIheader\fP [\fIxhost\fP...] +.IP (6) +health \fIsport\fP [\fIxhost\fP...] +.PD +.P +The program repeats the connection on port \fIsport\fP to the +other machine \fIhost\fP port \fIport\fP. If the machine, on +which the program runs, has two or more interfaces, type (2) can +be used to repeat the connection on the specified interface +\fIshost\fP. You can also specify path name that begins with +``/'' or ``./'', instead of \fIhost\fP:\fIport\fP so that the +program handles a unix domain socket. +.P +Type (3) is a http proxy. Specify the machine, on which the +program runs, and port \fIsport\fP in the http proxy settings of +your WWW browser. +Extentions can be added to the ``proxy'' like \fIxhost\fP/\fIext\fP. +\fIext\fP is: +.P +.IP v4only +limit the destination within IP addresses. +.IP v6only +limit the destination within IPv6 addresses. +.P +Type (4) relays stream over http request. \fIrequest\fP is the +request specified in HTTP 1.0. In the \fIrequest\fP, \ is +the escape character, and the following substitution occurs. +.PP +.RS 8 +.PD 0 +.IP \\\\n 8 +newline (0x0A) +.IP \\\\r +return (0x0D) +.IP \\\\t +tab (0x09) +.IP \\\\\\\\ +\ itself (0x5C) +.IP \\\\a +the IP address of the client connecting to the \fBstone\fP. +.IP \\\\A +\fIIP address of the client\fP:\fIport number\fP +.IP \\\\0 +the serial number of peer's SSL certificate. +.IP "\\\\1 - \\\\9" +the matched string in the ``regex'' of SSL options. +.IP \\\\?1\fIthen\fP\\\\:\fIelse\fP\\\\/ +if \1 (\2 - \9 in a similar way) is not null, +\fIthen\fP, otherwise \fIelse\fP. +.PD +.RE +.P +Type (5) repeats http request with \fIheader\fP in the top of +request headers. The above escapes can be also used. +.P +Type (6) designates the port that other programs can check +whether the \fBstone\fP runs `healthy' or not. Following commands are +available to check the \fBstone\fP. +.P +.RS 8 +.PD 0 +.IP "HELO \fIany string\fP" 24 +returns the status of the \fBstone\fP +.IP "LIMIT \fIvar\fP \fIn\fP" +check the value of \fIvar\fP is +less than \fIn\fP +.PD +.RE +.P +\fIvar\fP is one of the following: +.P +.RS 8 +.PD 0 +.IP PAIR 16 +the number of ``pair'' +.IP CONN +the number of ``conn'' +.IP ESTABLISHED +seconds passed since the last conn established +.IP READWRITE +seconds passed since the last read/write +.IP ASYNC +the number of threads +.PD +.RE +.P +The response of the \fBstone\fP is 2xx when normal, or 5xx when +abnormal on the top of line. +.P +If the \fIxhost\fP are used, only machines or its IP addresses +listed in \fIxhost\fP separated by space character can +connect to the program and to be repeated. +.P +Extentions can be added to the \fIxhost\fP like +\fIxhost\fP/\fIex\fP,\fIex\fP.... \fIex\fP is: +.IP \fIm\fP +You can designate the length of prefix bits of the +netmask, so that only machines on specified. In the +case of class C network 192.168.1.0, for example, use +``192.168.1.0/24''. +.IP v4 +\fIxhost\fP is resolved as the IP address. +.IP v6 +\fIxhost\fP is resolved as the IPv6 address. +.IP p\fIm\fP +the data repeated by the program are dumped, only if it +was connected by the machines specified by \fIxhost\fP. \fIm\fP +is the dump mode, equivalent to the number of \fB-p\fP +options. +.P +Use ``!'' instead of ``\fIxhost\fP'', to deny machines by following +\fIxhost\fP. +.P +Extentions can be added to the \fIport\fP like +\fIport\fP/\fIext\fP,\fIext\fP.... \fIext\fP is: +.IP udp +repeats UDP instead of TCP. +.IP ssl +forwards with encryption. +.IP v6 +connects to the destination using IPv6. +.IP base +forwards with MIME base64 encoding. +.P +Extentions can be added to the \fIsport\fP like +\fIsport\fP/\fIext\fP,\fIext\fP.... \fIext\fP is: +.IP udp +repeats UDP instead of TCP. +.IP apop +converts POP to APOP. The conversion is derived from +the RSA Data Security, Inc. MD5 Message-Digest Algorithm. +.IP ssl +forwards with decryption. +.IP v6 +accepts connection using IPv6. If \fIshost\fP is omitted +like (1), IP is also acceptable. +.IP v6only +accepts connection using IPv6 only. Even if \fIshost\fP is +omitted like (1), IP is not acceptable. +.IP base +forwards with MIME base64 decoding. +.IP http +relays stream over http. +.IP ident +identifies the owner of the incoming connection +on the peer using ident protocol (RFC1413). +.SH EXAMPLES +.PD 0 +.IP \fIouter\fP\^: +a machine in the outside of the firewall +.IP \fIinner\fP\^: +a machine in the inside of the firewall +.IP \fIfwall\fP\^: +the firewall on which the \fBstone\fP is executed +.PD +.TP +\fBstone \fIouter\fB:telnet 10023\fR +Repeats the telnet protocol to \fIouter\fP. +Run telnet fwall 10023 on \fIinner\fR. +.TP +\fBstone \fIouter\fB:domain/udp domain/udp\fR +Repeats the DNS query to \fIouter\fP. +Run \fBnslookup -\fP \fIfwall\fP on \fIinner\fP. +.TP +\fBstone \fIouter\fB:ntp/udp ntp/udp\fR +Repeats the NTP to \fIouter\fP. +Run \fBntpdate \fIfwall\fR on \fIinner\fP. +.TP +\fBstone localhost:http 443/ssl\fR +Make WWW server that supports https. +Access \fBhttps://\fIfwall\fB/\fR using a WWW browser. +.TP +\fBstone localhost:telnet 10023/ssl\fR +Make telnet server that supports SSL. +Run \fBSSLtelnet -z ssl \fIfwall\fB 10023\fR on \fIinner\fP. +.TP +\fBstone proxy 8080\fR +http proxy +.TP +\fBstone\fP \fIouter\fB:110/apop 110\fR +connect to \fIinner\fP:pop using a mailer that does not +support APOP. +.PP +Where \fIfwall\fP is a http proxy (port 8080): +.TP +\fBstone \fIfwall\fB:8080/http 10023 'POST http://\fIouter\fB:8023 HTTP/1.0'\fR +.br +.ns +.TP +\fBstone localhost:telnet 8023/http +.nf +Run \fBstone\fPs on \fIinner\fP and \fIouter\fP respectively. +Relays stream over http. +.TP +\fBstone \fIfwall\fB:8080/proxy 9080 \'Proxy-Authorization: Basic \fIc2VuZ29rdTpoaXJvYWtp\fB\'\fR +for browser that does not support proxy authorization. +.fi +. +.SH HOMEPAGE +The official homepage of \fBstone\fP is: +.br +\fIhttp://www.gcd.org/sengoku/stone/\fP +. +.SH COPYRIGHT +All rights about this program \fBstone\fP are reserved by the +original author, Hiroaki Sengoku. The program is free software; +you can redistribute it and/or modify it under the terms of the +\fIGNU IGeneral Public License (GPL)\fP. Furthermore you can link it +with openssl. +. +.SH NO WARRANTY +This program is distributed in the hope that it will be useful, +but WITHOUT ANY WARRANTY. +. +.SH AUTHOR +.nf +Hiroaki Sengoku +sengoku@gcd.org +http://www.gcd.org/sengoku/ +.fi diff --git a/net-misc/stone/stone-2.3e-r1.ebuild b/net-misc/stone/stone-2.3e-r1.ebuild index 704b86e198d2..9d6e62e72cee 100644 --- a/net-misc/stone/stone-2.3e-r1.ebuild +++ b/net-misc/stone/stone-2.3e-r1.ebuild @@ -1,6 +1,6 @@ # Copyright 1999-2013 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/net-misc/stone/stone-2.3e-r1.ebuild,v 1.1 2013/02/20 13:56:01 pinkbyte Exp $ +# $Header: /var/cvsroot/gentoo-x86/net-misc/stone/stone-2.3e-r1.ebuild,v 1.2 2013/02/20 14:03:51 pinkbyte Exp $ EAPI=5 @@ -41,5 +41,6 @@ src_compile() { src_install() { dobin stone + newman "${FILESDIR}/${PN}.man" "${PN}.1" dodoc README* } |