aboutsummaryrefslogtreecommitdiff
path: root/.pc
diff options
context:
space:
mode:
authorToni Uhlig <matzeton@googlemail.com>2017-11-04 17:43:22 +0100
committerToni Uhlig <matzeton@googlemail.com>2017-11-04 17:43:22 +0100
commit168e28e950f8540b287aa095f03ce37f4e3811e1 (patch)
treee76829264efa3eb11864e75eaade1b966b6ae011 /.pc
initial commit
Diffstat (limited to '.pc')
-rw-r--r--.pc/.quilt_patches1
-rw-r--r--.pc/.quilt_series1
-rw-r--r--.pc/.version1
-rwxr-xr-x.pc/add_hardening_flags.diff/Makefile55
-rw-r--r--.pc/applied-patches4
-rwxr-xr-x.pc/fix_minus_chars_in_man.patch/ptunnel.8123
-rwxr-xr-x.pc/fix_typo.diff/README118
-rwxr-xr-x.pc/makefile-debian-prefix.patch/Makefile55
8 files changed, 358 insertions, 0 deletions
diff --git a/.pc/.quilt_patches b/.pc/.quilt_patches
new file mode 100644
index 0000000..6857a8d
--- /dev/null
+++ b/.pc/.quilt_patches
@@ -0,0 +1 @@
+debian/patches
diff --git a/.pc/.quilt_series b/.pc/.quilt_series
new file mode 100644
index 0000000..c206706
--- /dev/null
+++ b/.pc/.quilt_series
@@ -0,0 +1 @@
+series
diff --git a/.pc/.version b/.pc/.version
new file mode 100644
index 0000000..0cfbf08
--- /dev/null
+++ b/.pc/.version
@@ -0,0 +1 @@
+2
diff --git a/.pc/add_hardening_flags.diff/Makefile b/.pc/add_hardening_flags.diff/Makefile
new file mode 100755
index 0000000..01612d7
--- /dev/null
+++ b/.pc/add_hardening_flags.diff/Makefile
@@ -0,0 +1,55 @@
+# Makefile for the pingtunnel utility
+# (c) 2004-2009 Daniel Stoedle, daniels@cs.uit.no
+# ptunnel.exe target added by Mike Miller, mike@mikeage.net
+
+CC = gcc
+CFLAGS = -Wall -g
+LDOPTS = -lpthread -lpcap
+PT_OBJS = ptunnel.o md5.o
+
+WIN32_CC = mingw32-gcc
+WIN32_CFLAGS = -g -Wall -DWIN32 -I"c:\Program Files\WpdPack\Include"
+WIN32_LDOPTS = -lwpcap -lwsock32 -L"c:\Program Files\WpdPack\Lib"
+WIN32_PT_OBJS = ptunnel.obj md5.obj
+
+prefix = /usr
+bindir = $(prefix)/bin
+mandir = $(prefix)/share/man/man8
+
+all: ptunnel
+
+dist:
+ rm -rf PingTunnel/
+ mkdir PingTunnel
+ cp ptunnel.c ptunnel.h Makefile.dist PingTunnel/
+ mv PingTunnel/Makefile.dist PingTunnel/Makefile
+
+
+install: ptunnel
+ install -d $(bindir)/
+ install -d $(mandir)/
+ install ./ptunnel $(bindir)/ptunnel
+ install ./ptunnel.8 $(mandir)/ptunnel.8
+
+ptunnel: $(PT_OBJS)
+ $(CC) -o $@ $^ $(LDOPTS) `[ -e /usr/include/selinux/selinux.h ] && echo -lselinux`
+
+ptunnel.exe: $(WIN32_PT_OBJS)
+ $(CC) -o $@ $^ $(WIN32_LDOPTS)
+
+clean:
+ -rm -f *.o ptunnel
+ -rm -f *.obj ptunnel.exe
+ -rm -f .depend
+
+depend: .depend
+.depend:
+ $(CC) $(CFLAGS) -MM *.c > $@
+
+%.o:%.c
+ $(CC) $(CFLAGS) `[ -e /usr/include/selinux/selinux.h ] && echo -DHAVE_SELINUX` -c -o $@ $<
+
+%.obj:%.c
+ $(WIN32_CC) $(WIN32_CFLAGS) -c -o $@ $<
+
+-include .depend
diff --git a/.pc/applied-patches b/.pc/applied-patches
new file mode 100644
index 0000000..9a8f77a
--- /dev/null
+++ b/.pc/applied-patches
@@ -0,0 +1,4 @@
+add_hardening_flags.diff
+fix_typo.diff
+fix_minus_chars_in_man.patch
+makefile-debian-prefix.patch
diff --git a/.pc/fix_minus_chars_in_man.patch/ptunnel.8 b/.pc/fix_minus_chars_in_man.patch/ptunnel.8
new file mode 100755
index 0000000..dff91e5
--- /dev/null
+++ b/.pc/fix_minus_chars_in_man.patch/ptunnel.8
@@ -0,0 +1,123 @@
+.TH ptunnel 8 "September 5, 2011" "Version 0.72" "Yellow Lemon Software"
+.SH NAME
+ptunnel \- tunnel TCP connections over ICMP echo request/reply packets.
+.SH SYNOPSIS
+.B ptunnel
+\-p proxy_address \-lp listen_port \-da destination_address \-dp dest_port [\-c network_device] [\-v verbosity] [-f file] [-udp] [-syslog]
+
+.B ptunnel
+[\-c network_device] [\-v verbosity] [\-f file] [\-udp] [\-syslog] [\-daemon file]
+
+.B ptunnel
+[\-u] [\-x password] [\-setuid user] [\-setgid group] [\-chroot dir] [\-setcon context]
+
+.B ptunnel
+\-h
+.SH DESCRIPTION
+ptunnel is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies. At first glance, this might seem like a rather useless thing to do, but it can actually come in handy in some cases. The following example illustrates the main motivation in creating ptunnel:
+.PP
+Setting: You're on the go, and stumble across an open wireless network. The network gives you an IP address, but won't let you send TCP or UDP packets out to the rest of the internet, for instance to check your mail. What to do? By chance, you discover that the network will allow you to ping any computer on the rest of the internet. With ptunnel, you can utilize this feature to check your mail, or do other things that require TCP.
+.SH OPTIONS
+.TP
+.SH Client options:
+.TP
+.B \-p proxy_address
+Specify the host on which the proxy is running.
+.TP
+.B \-lp listen_port
+Specifies the port on which the client will listen for incoming TCP connections.
+.TP
+.B \-da destination_addr
+Specifies the address to which you want your packets tunneled after reaching the proxy when in client mode, or restricts the destination packets can be forwarded to when in server mode.
+.TP
+.B \-dp destination_port
+Specifies/restrict the port that the proxy should tunnel the TCP connection to.
+.TP
+.SH Shared options:
+.TP
+.B \-c network_device
+Specify the network interface to capture packets from. Note that packet capturing isn't always necessary, but you should try this if you experience problems with ptunnel.
+.TP
+.B \-v verbosity
+Controls the verbosity level. -1 is no output, 0 shows errors only, 1 shows info messages, 2 gives more output, 3 provides even more output, level 4 displays debug info and level 5 displays absolutely everything, including the nasty details of sends and receives.
+.TP
+.B \-udp
+Enables tunneling over UDP port 53 (DNS) instead of using ICMP. This will only work if your proxy can accept incoming traffic on port 53, and the client is able to send data to the proxy on port 53. Note that this option does not wrap ptunnel's data in DNS-compliant packets. This option must be given on both the proxy and client side for things to work correctly.
+.TP
+.B \-syslog (Not available on Windows.)
+Changes logging to use the built-in syslog fascility.
+.TP
+.B \-daemon file (Not available on Windows.)
+Run in background, writing PID in file.
+.TP
+.B \-u
+Attempts to run ptunnel without privileges. This doesn't usually work! On UNIX systems please consider using the following three options instead:
+.TP
+.B \-setuid user (Not available on Windows.)
+When started in privileged mode, drop down to user's rights as soon as possible.
+.TP
+.B \-setgid group (Not available on Windows.)
+When started in privileged mode, drop down to group's rights as soon as possible.
+.TP
+.B \-chroot dir (Not available on Windows.)
+When started in privileged mode, restrict file access to the specified directory.
+.TP
+.B \-setcon context (Not available on Windows.)
+Set SELinux context when all there is left to do are network I/O operations.
+In order to be able to combine with -chroot you will have to `mount --bind /proc /chrootdir/proc`
+.TP
+.B \-x password
+Specifies a password or passphrase to use. This will allow you to protect the proxy from use by others who don't know the password. It needs to be specified on both proxy and client.
+.TP
+.B \-f file
+Specifies a log file. If you specify -syslog, syslog is always used instead.
+.TP
+.B \-h
+Displays brief usage information.
+
+.SH EXAMPLES
+The following assumes that ptunnel is run as root, both on the proxy and client. To tunnel ssh connections from the client machine via a proxy running on proxy.pingtunnel.com to the computer login.domain.com, the following command line would be used:
+.TP
+.B ptunnel \-p proxy.pingtunnel.com \-lp 8000 \-da login.domain.com \-dp 22
+.PP
+An ssh connection to login.domain.com can now be established as follows:
+.TP
+.B ssh \-p 8000 localhost
+.PP
+If ssh complains about potential man-in-the-middle attacks, simply remove the offending key from the known_hosts file. The warning/error is expected if you have previously ssh'd to your local computer (i.e., ssh localhost), or you have used ptunnel to forward ssh connections to different hosts.
+
+Of course, for all of this to work, you need to start the proxy on your proxy-computer (proxy.pingtunnel.com). Doing this is very simple:
+
+.B ptunnel
+
+If you find that the proxy isn't working, you will need to enable packet capturing on the main network device. Currently this device is assumed to be an ethernet-device (i.e., ethernet or wireless). Packet capturing is enabled by giving the -c switch, and supplying the device name to capture packets on (for instance eth0 or en1). The same goes for the client. On Mac OS X, packet capturing must always be enabled (both for proxy and client), as resent packets won't be received otherwise.
+
+To protect yourself from others using your proxy, you can protect access to it with a password using the <tt>-x</tt> switch. The password is never sent in the clear, but keep in mind that it may be visible from tools like top or ps, which can display the command line used to start an application.
+
+.SH EXIT STATUS
+.B ptunnel
+does not exit until forced to do so by an interrupt (Ctrl-C) or if it crashes.
+.SH BUGS
+.B ptunnel
+currently does not handle packet capturing on network interfaces other than ethernet or wireless correctly.
+.SH AUTHORS AND CONTRIBUTORS
+Daniel Stoedle (daniels@cs.uit.no)
+
+Windows port: Mike Miller (mike@mikeage.net)
+
+SELinux support: Sebastien Raveau (sebastien.raveau@epita.fr)
+
+Patches: Joe McKenzie, Steffen Wendzel and StalkR.
+
+.SH LICENSE
+.B ptunnel
+is licensed under the BSD License.
+.SH AVAILABILITY
+.TP
+The ptunnel homepage is currently located here:
+http://www.cs.uit.no/~daniels/PingTunnel/
+.TP
+The freshmeat project page is located here:
+http://freshmeat.net/projects/ptunnel/
+.PP
+Please take the time to rate ptunnel if you find it useful. Thanks!
diff --git a/.pc/fix_typo.diff/README b/.pc/fix_typo.diff/README
new file mode 100755
index 0000000..985464a
--- /dev/null
+++ b/.pc/fix_typo.diff/README
@@ -0,0 +1,118 @@
+PingTunnel Read Me
+==================
+
+What is ptunnel?
+----------------
+Ptunnel is an application that allows you to reliably tunnel TCP connections
+to a remote host using ICMP echo request and reply packets, commonly known as
+ping requests and replies.
+
+
+Contact details
+---------------
+You can the author, Daniel Stoedle, here:
+ <daniels@cs.uit.no>
+The official ptunnel website is located here:
+ <http://www.cs.uit.no/~daniels/PingTunnel/>
+The Windows port was created by Mike Miller:
+ <mike@mikeage.net>
+
+
+Compiling
+---------
+To compile ptunnel, simply run make. If everything goes well, you should end up
+with a binary called ptunnel. This serves as both the client and proxy. You can
+optionally install it using "make install". On Windows, run "make ptunnel.exe"
+to compile the Windows binary. You will need mingw installed, as well as the
+WinPcap library. WinPcap is available here:
+ <http://www.winpcap.org/install/bin/WpdPack_4_0_2.zip>
+
+
+Running
+-------
+Ptunnel works best when running as root, and usually requires running as root.
+Again, from the website:
+
+Client: ./ptunnel -p <proxy address> -lp <listen port> -da <destination address>
+ -dp <dest port> [-c <network device>] [-v <verbosity>] [-u]
+ [-x password]
+Proxy: ./ptunnel [-c <network device>] [-v <verbosity>] [-u] [-x password]
+
+The -p switch sets the address of the host on which the proxy is running. A
+quick test to see if the proxy will work is simply to try pinging this host -
+if you get replies, you should be able to make the tunnel work.
+
+The -lp, -da and -dp switches set the local listening port, destination address
+and destination port. For instance, to tunnel ssh connections from the client
+machine via a proxy running on proxy.pingtunnel.com to the computer
+login.domain.com, the following command line would be used:
+
+sudo ./ptunnel -p proxy.pingtunnel.com -lp 8000 -da login.domain.com -dp 22
+
+An ssh connection to login.domain.com can now be established as follows:
+
+ssh -p 8000 localhost
+
+If ssh complains about potential man-in-the-middle attacks, simply remove the
+offending key from the known_hosts file. The warning/error is expected if you
+have previously ssh'd to your local computer (i.e., ssh localhost), or you have
+used ptunnel to forward ssh connections to different hosts.
+
+Of course, for all of this to work, you need to start the proxy on your
+proxy-computer (we'll call it proxy.pingtunnel.com here). Doing this is very
+simple:
+
+sudo ./ptunnel
+
+If you find that the proxy isn't working, you will need to enable packet
+capturing on the main network device. Currently this device is assumed to be
+an ethernet-device (i.e., ethernet or wireless). Packet capturing is enabled by
+giving the -c switch, and supplying the device name to capture packets on (for
+instance eth0 or en1). The same goes for the client. On versions of Mac OS X
+prior to 10.4 (Tiger), packet capturing must always be enabled (both for proxy
+and client), as resent packets won't be received otherwise.
+
+To protect yourself from others using your proxy, you can protect access to it
+with a password using the <tt>-x</tt> switch. The password is never sent in
+the clear, but keep in mind that it may be visible from tools like top or ps,
+which can display the command line used to start an application.
+
+Finally, the -u switch will attempt to run the proxy in unprivileged mode (i.e.,
+no need for root access), and the -v switch controls the amount of output from
+ptunnel. -1 indicates no output, 0 shows errors only, 1 shows info messages, 2
+gives more output, 3 provides even more output, level 4 displays debug info and
+level 5 displays absolutely everything, including the nasty details of sends and
+receives. The -f switch allows output to be saved to a logfile.
+
+Security features: Please see the ptunnel man-page for instructions.
+
+
+Supported operating systems
+---------------------------
+Ptunnel supports most operating systems with libpcap, the usual POSIX functions
+and a BSD sockets compatible API. In particular, it has been tested on Linux
+Fedora Core 2 and Mac OS X 10.3.6 and above. As of version 0.7, ptunnel can also
+be compiled on Windows, courtesy of Mike Miller, assuming mingw and WinPcap is
+installed.
+
+
+Credits and contributors
+------------------------
+Thanks to L. Peter Deutsch for his open-source MD5 implementation, included with
+ptunnel, but also available here:
+http://sourceforge.net/projects/libmd5-rfc/
+
+Many thanks also to Mike Miller <mike@mikeage.net> for his work on creating a
+Windows port of ptunnel.
+
+Thanks to Sebastien Raveau <sebastien.raveau@epita.fr> for implementing various
+security features and SELinux support.
+
+Also thanks to Joe McKenzie, Steffen Wendzel and StalkR for contributing patches to
+ptunnel.
+
+License
+-------
+Ping Tunnel is Copyright (c) 2004-2011, Daniel Stoedle <daniels@cs.uit.no>,
+Yellow Lemon Software. All rights reserved. Ping Tunnel is licensed under the
+BSD License. Please see the LICENSE file for details.
diff --git a/.pc/makefile-debian-prefix.patch/Makefile b/.pc/makefile-debian-prefix.patch/Makefile
new file mode 100755
index 0000000..e9c1b7a
--- /dev/null
+++ b/.pc/makefile-debian-prefix.patch/Makefile
@@ -0,0 +1,55 @@
+# Makefile for the pingtunnel utility
+# (c) 2004-2009 Daniel Stoedle, daniels@cs.uit.no
+# ptunnel.exe target added by Mike Miller, mike@mikeage.net
+
+CC = gcc
+CFLAGS = -Wall -g
+LDOPTS = -lpthread -lpcap
+PT_OBJS = ptunnel.o md5.o
+
+WIN32_CC = mingw32-gcc
+WIN32_CFLAGS = -g -Wall -DWIN32 -I"c:\Program Files\WpdPack\Include"
+WIN32_LDOPTS = -lwpcap -lwsock32 -L"c:\Program Files\WpdPack\Lib"
+WIN32_PT_OBJS = ptunnel.obj md5.obj
+
+prefix = /usr
+bindir = $(prefix)/bin
+mandir = $(prefix)/share/man/man8
+
+all: ptunnel
+
+dist:
+ rm -rf PingTunnel/
+ mkdir PingTunnel
+ cp ptunnel.c ptunnel.h Makefile.dist PingTunnel/
+ mv PingTunnel/Makefile.dist PingTunnel/Makefile
+
+
+install: ptunnel
+ install -d $(bindir)/
+ install -d $(mandir)/
+ install ./ptunnel $(bindir)/ptunnel
+ install ./ptunnel.8 $(mandir)/ptunnel.8
+
+ptunnel: $(PT_OBJS)
+ $(CC) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o $@ $^ $(LDOPTS) `[ -e /usr/include/selinux/selinux.h ] && echo -lselinux`
+
+ptunnel.exe: $(WIN32_PT_OBJS)
+ $(CC) -o $@ $^ $(WIN32_LDOPTS)
+
+clean:
+ -rm -f *.o ptunnel
+ -rm -f *.obj ptunnel.exe
+ -rm -f .depend
+
+depend: .depend
+.depend:
+ $(CC) $(CFLAGS) $(CPPFLAGS) -MM *.c > $@
+
+%.o:%.c
+ $(CC) $(CFLAGS) $(CPPFLAGS) `[ -e /usr/include/selinux/selinux.h ] && echo -DHAVE_SELINUX` -c -o $@ $<
+
+%.obj:%.c
+ $(WIN32_CC) $(WIN32_CFLAGS) -c -o $@ $<
+
+-include .depend