From f5a0df91932d38949380ecce69f17f54aee886a6 Mon Sep 17 00:00:00 2001 From: CentOS Buildsys Date: Mar 15 2013 11:56:18 +0000 Subject: import authd-1.4.3-38.el7.src.rpm --- diff --git a/.authd.metadata b/.authd.metadata new file mode 100644 index 0000000..af6e736 --- /dev/null +++ b/.authd.metadata @@ -0,0 +1 @@ +d6ae05231612e45273930ee1ecb13d2e3b8557e1 SOURCES/authd-1.4.3.tar.gz diff --git a/README.md b/README.md deleted file mode 100644 index 0e7897f..0000000 --- a/README.md +++ /dev/null @@ -1,5 +0,0 @@ -The master branch has no content - -Look at the c7 branch if you are working with CentOS-7, or the c4/c5/c6 branch for CentOS-4, 5 or 6 - -If you find this file in a distro specific branch, it means that no content has been checked in yet diff --git a/SOURCES/auth.socket b/SOURCES/auth.socket new file mode 100644 index 0000000..d701b04 --- /dev/null +++ b/SOURCES/auth.socket @@ -0,0 +1,9 @@ +[Unit] +Description=Authd Activation Socket + +[Socket] +ListenStream=113 +Accept=true + +[Install] +WantedBy=sockets.target diff --git a/SOURCES/auth@.service b/SOURCES/auth@.service new file mode 100644 index 0000000..8da5bd2 --- /dev/null +++ b/SOURCES/auth@.service @@ -0,0 +1,8 @@ +[Unit] +Description=Authd Ident Protocol Requests Server +After=local-fs.target + +[Service] +User=ident +ExecStart=/usr/sbin/in.authd -t60 --xerror --os -E +StandardInput=socket diff --git a/SOURCES/authd-1.4.3-disable.patch b/SOURCES/authd-1.4.3-disable.patch new file mode 100644 index 0000000..132a726 --- /dev/null +++ b/SOURCES/authd-1.4.3-disable.patch @@ -0,0 +1,17 @@ +--- authd-1.4.3/xinetd.conf.auth.old 2004-07-10 05:17:24.000000000 +0200 ++++ authd-1.4.3/xinetd.conf.auth 2005-04-07 13:00:50.000000000 +0200 +@@ -1,4 +1,4 @@ +-# default: on ++# default: off + # description: The authd server handles ident protocol requests. \ + # The Identification Protocol (a.k.a., "ident", a.k.a., "the Ident \ + # Protocol") provides a means to determine the identity of a user of a \ +@@ -8,7 +8,7 @@ + # SPAM HARVESTERS) BEFORE RUNNING THIS DAEMON WITH NO ARGUMENTS. + service auth + { +- disable = no ++ disable = yes + socket_type = stream + wait = no + user = ident diff --git a/SOURCES/authd-1.4.3-gcc4.patch b/SOURCES/authd-1.4.3-gcc4.patch new file mode 100644 index 0000000..b25fc7e --- /dev/null +++ b/SOURCES/authd-1.4.3-gcc4.patch @@ -0,0 +1,29 @@ +--- authd-1.4.3/authd.c.old 2004-11-16 00:25:24.000000000 +0100 ++++ authd-1.4.3/authd.c 2005-03-07 14:48:08.000000000 +0100 +@@ -579,7 +579,7 @@ + char *laddr = NULL, *raddr = NULL; + bool is_port_pair_found = false; + +- static char *created_verbose(const char *name, unsigned long id) { ++ char *created_verbose(const char *name, unsigned long id) { + size_t n; time_t tod; + char *s, when[USERID_MAX_LEN], *host1, *port1, *host2, *port2; + const char *const UTC_FMT = "%FT%TZ", *const TZ_FMT = "(%a %EX %z/%Z)"; + +New for GCC 4.3: +--- authd-1.4.3/authd.old 2008-02-12 10:57:06.000000000 +0100 ++++ authd-1.4.3/authd.c 2008-02-12 10:57:54.000000000 +0100 +@@ -195,11 +195,11 @@ + } + + static char *created_pton_hex(const char *prefix) { +- struct in6_addr addr; const size_t SIZE = sizeof(addr.in6_u.u6_addr8); ++ struct in6_addr addr; const size_t SIZE = sizeof(addr.s6_addr); + + assert(prefix != NULL); + if (inet_pton(AF_INET6, prefix, &addr) <= 0) return NULL; +- return created_addr_hex((const void *) addr.in6_u.u6_addr8, SIZE); ++ return created_addr_hex((const void *) addr.s6_addr, SIZE); + } + + static void create_opt(int argc, char *argv[]) { diff --git a/SOURCES/authd-1.4.3-ipv6-mapping.patch b/SOURCES/authd-1.4.3-ipv6-mapping.patch new file mode 100644 index 0000000..c128fc4 --- /dev/null +++ b/SOURCES/authd-1.4.3-ipv6-mapping.patch @@ -0,0 +1,24 @@ +--- authd-1.4.3/authd.c.old 2005-06-24 16:08:04.000000000 +0200 ++++ authd-1.4.3/authd.c 2005-06-24 16:12:06.000000000 +0200 +@@ -485,8 +485,19 @@ + + assert(opt.mapped != NULL); + strcpy(peer_128, opt.mapped); strcpy(host_128, opt.mapped); +- strncpy(host_128, addr_hex, z); +- strncpy(peer_128, peer_addr_hex, strlen(peer_addr_hex)); ++ ++ /* ++ If mapping IPV4 to IPV6 space is enabled, ++ take only last 4 numbers of IPV6 ++ */ ++ if(opt.mapped[0]) { ++ strncpy(host_128, addr_hex+z-8, 8); ++ strncpy(peer_128, peer_addr_hex, 8); ++ } else { ++ strncpy(host_128, addr_hex, z); ++ strncpy(peer_128, peer_addr_hex, strlen(peer_addr_hex)); ++ } ++ + if (strcmp(peer_128, host_128) != 0) return addr; + } + // hex addr must have even number of digits diff --git a/SOURCES/authd-1.4.3-jiffies64.patch b/SOURCES/authd-1.4.3-jiffies64.patch new file mode 100644 index 0000000..dd96e2e --- /dev/null +++ b/SOURCES/authd-1.4.3-jiffies64.patch @@ -0,0 +1,35 @@ +diff -up authd-1.4.3/authd.c.jiffies64 authd-1.4.3/authd.c +--- authd-1.4.3/authd.c.jiffies64 2004-11-16 00:25:24.000000000 +0100 ++++ authd-1.4.3/authd.c 2008-03-25 11:22:35.000000000 +0100 +@@ -347,6 +347,22 @@ static void create_opt(int argc, char *a + + static const char *const DELIM = ",: \t\r\n\v\f"; + ++static unsigned long long get_tok_ullong(char *s, unsigned base) { ++ unsigned long long ull = ULLONG_MAX; ++ ++ assert(base <= 36); ++ if ((s = strtok(s, DELIM)) != NULL) { ++ char *endptr; ++ ++ ull = strtoull(s, &endptr, (int) base); ++ if ((errno == ERANGE && ull == ULLONG_MAX) || is_bad_strto(s, endptr)) ++ errno = EINVAL; ++ } ++ else errno = EINVAL; ++ return ull; ++} ++ ++ + static unsigned long get_tok_uint(char *s, unsigned base) { + unsigned long ul = ULONG_MAX; + +@@ -643,7 +659,7 @@ static bool get_info(reply_t *out, reque + (void) get_tok_uint(NULL, 16); // tx_queue + (void) get_tok_uint(NULL, 16); // rx_queue + (void) get_tok_uint(NULL, 16); // tr (boolean) +- (void) get_tok_uint(NULL, 16); // tm->when (unit: jiffies) ++ (void) get_tok_ullong(NULL, 16); // tm->when (unit: jiffies) + strtok(NULL, DELIM); // retrnsmt + uid = get_tok_uint(NULL, 10); // uid (base 10 uint) + strtok(NULL, DELIM); // timeout diff --git a/SOURCES/authd-1.4.3-license.patch b/SOURCES/authd-1.4.3-license.patch new file mode 100644 index 0000000..2419989 --- /dev/null +++ b/SOURCES/authd-1.4.3-license.patch @@ -0,0 +1,26 @@ +diff -up authd-1.4.3/authd.c.license authd-1.4.3/authd.c +--- authd-1.4.3/authd.c.license 2012-11-19 14:03:09.106765657 +0100 ++++ authd-1.4.3/authd.c 2012-11-19 14:06:30.963307749 +0100 +@@ -16,7 +16,8 @@ + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software +- * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA ++ * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA ++ * 02110-1301, USA. + * + * Initial Author: Adrian Havill + */ +diff -up authd-1.4.3/COPYING.license authd-1.4.3/COPYING +--- authd-1.4.3/COPYING.license 2012-11-19 14:09:42.166714836 +0100 ++++ authd-1.4.3/COPYING 2012-11-19 14:10:21.805213199 +0100 +@@ -5,7 +5,8 @@ NOTE: authd is released under the GPL wi + Version 2, June 1991 + + Copyright (C) 1989, 1991 Free Software Foundation, Inc. +- 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA ++ 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA ++ + Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed. + diff --git a/SOURCES/authd-1.4.3-locale.patch b/SOURCES/authd-1.4.3-locale.patch new file mode 100644 index 0000000..6ab91bb --- /dev/null +++ b/SOURCES/authd-1.4.3-locale.patch @@ -0,0 +1,11 @@ +--- authd-1.4.3/authd.c~ 2006-07-21 22:32:26.000000000 +0930 ++++ authd-1.4.3/authd.c 2006-07-22 00:32:11.000000000 +0930 +@@ -979,6 +979,8 @@ + mtrace(); + # endif + if (setlocale(LC_ALL, "") == NULL) abort(); ++ errno = 0; /* not an error for some locale files to ++ be missing */ + if (signal(SIGALRM, catch_signal) == SIG_ERR) abort(); + if (textdomain(PACKAGE) == NULL) handle_error(NULL); + if (bindtextdomain(PACKAGE, NULL) == NULL) handle_error(NULL); diff --git a/SOURCES/authd-1.4.3-longopt-identifier.patch b/SOURCES/authd-1.4.3-longopt-identifier.patch new file mode 100644 index 0000000..1cb45e3 --- /dev/null +++ b/SOURCES/authd-1.4.3-longopt-identifier.patch @@ -0,0 +1,11 @@ +--- authd-1.4.3/authd.c.old 2007-09-19 11:39:25.000000000 +0200 ++++ authd-1.4.3/authd.c 2007-09-19 11:40:02.000000000 +0200 +@@ -203,7 +203,7 @@ static char *created_pton_hex(const char + } + + static void create_opt(int argc, char *argv[]) { +- enum { $_LONGOPT = UCHAR_MAX, // no short opt value overlap ++ enum { PRE_FIRST_LONGOPT = UCHAR_MAX, // no short opt value overlap + CODESET_LONGOPT, IDENT_LONGOPT, FN_LONGOPT, LANG_LONGOPT, + MAPPED_LONGOPT, OS_LONGOPT, PASSWD_LONGOPT, USERNAME_LONGOPT + }; diff --git a/SOURCES/authd-1.4.3-valist.patch b/SOURCES/authd-1.4.3-valist.patch new file mode 100644 index 0000000..fe97a4c --- /dev/null +++ b/SOURCES/authd-1.4.3-valist.patch @@ -0,0 +1,22 @@ +diff -up authd-1.4.3/authd.c.valist authd-1.4.3/authd.c +--- authd-1.4.3/authd.c.valist 2008-05-21 14:55:30.000000000 +0200 ++++ authd-1.4.3/authd.c 2008-05-21 14:56:34.000000000 +0200 +@@ -80,13 +80,16 @@ static void log_printf(int level, const + if (opt.debug || level != LOG_DEBUG) { + va_list ap; + +- va_start(ap, s); + if (s == NULL || *s == '\0') { + s = strerror(errno); + assert(strchr(s, '%') == NULL); + } +- if (opt.log) ++ if (opt.log) { ++ va_start(ap, s); + vsyslog(level, s, ap); ++ va_end(ap); ++ } ++ va_start(ap, s); + if (vfprintf(level == LOG_INFO ? stdout : stderr, s, ap) < 0) { + perror(program_invocation_name); + level = INT_MIN; diff --git a/SPECS/authd.spec b/SPECS/authd.spec new file mode 100644 index 0000000..e6d2a7e --- /dev/null +++ b/SPECS/authd.spec @@ -0,0 +1,311 @@ +Summary: A RFC 1413 ident protocol daemon +Name: authd +Version: 1.4.3 +Release: 38%{?dist} +License: GPLv2+ +Group: System Environment/Daemons +URL: https://fedorahosted.org/authd/ +Obsoletes: pidentd <= 3.2 +Provides: pidentd = 3.2 +Requires(post): openssl +Source0: http://fedorahosted.org/releases/a/u/authd/authd-1.4.3.tar.gz +Source1: auth.socket +Source2: auth@.service +Patch0: authd-1.4.3-gcc4.patch +Patch1: authd-1.4.3-disable.patch +Patch2: authd-1.4.3-ipv6-mapping.patch +Patch3: authd-1.4.3-locale.patch +Patch4: authd-1.4.3-longopt-identifier.patch +Patch5: authd-1.4.3-jiffies64.patch +Patch6: authd-1.4.3-valist.patch +Patch7: authd-1.4.3-license.patch +BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root +BuildRequires: openssl-devel gettext help2man systemd-units +Requires(post): systemd-units +Requires(preun): systemd-units +Requires(postun): systemd-units + +%description +authd is a small and fast RFC 1413 ident protocol daemon +with both xinetd server and interactive modes that +supports IPv6 and IPv4 as well as the more popular features +of pidentd. + +%prep +%setup -q +%patch0 -p1 +%patch1 -p1 +%patch2 -p1 -b .ipv6map +%patch3 -p1 -b .locale +%patch4 -p1 +%patch5 -p1 -b .jiffies64 +%patch6 -p1 -b .valist +%patch7 -p1 -b .license +sed -i -e "s|/etc|%{_sysconfdir}|" config.h + +%build +CFLAGS=$RPM_OPT_FLAGS make prefix=%{_prefix} + +%install +rm -rf $RPM_BUILD_ROOT +%makeinstall + +install -d ${RPM_BUILD_ROOT}%{_unitdir}/ +install -m 644 %{SOURCE1} ${RPM_BUILD_ROOT}%{_unitdir}/ +install -m 644 %{SOURCE2} ${RPM_BUILD_ROOT}%{_unitdir}/ + +install -d ${RPM_BUILD_ROOT}%{_sysconfdir}/ +touch ${RPM_BUILD_ROOT}%{_sysconfdir}/ident.key + +install -d ${RPM_BUILD_ROOT}/%{_mandir}/man1/ +help2man -N -v -V ${RPM_BUILD_ROOT}/%{_sbindir}/in.authd -o \ + ${RPM_BUILD_ROOT}/%{_mandir}/man1/in.authd.1 + +%find_lang %{name} + +%clean +rm -rf $RPM_BUILD_ROOT + +%post +/usr/sbin/adduser -s /sbin/nologin -u 98 -r -d '/' ident 2>/dev/null || true +/usr/bin/openssl rand -base64 -out %{_sysconfdir}/ident.key 32 +echo CHANGE THE LINE ABOVE TO A PASSPHRASE >> %{_sysconfdir}/ident.key +/bin/chown ident:ident %{_sysconfdir}/ident.key +chmod o-rw %{_sysconfdir}/ident.key +%systemd_post auth.socket + +%postun +%systemd_postun_with_restart auth.socket + +%preun +%systemd_preun auth.socket + +%files -f authd.lang +%defattr(-,root,root,-) +%verify(not md5 size mtime user group) %config(noreplace) %attr(640,root,root) %{_sysconfdir}/ident.key +%doc COPYING README.html rfc1413.txt +%{_sbindir}/in.authd +%{_mandir}/*/* +%{_unitdir}/* + +%changelog +* Wed Feb 13 2013 Fedora Release Engineering - 1.4.3-38 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild + +* Fri Nov 30 2012 Roman Rakus - 1.4.3-37 +- Fix a typo in build requirements + +* Fri Nov 30 2012 Roman Rakus - 1.4.3-36 +- Provide native systemd service file + Resolves: #737153 + +* Thu Nov 29 2012 Roman Rakus - 1.4.3-35 +- Generate and include man page + +* Mon Nov 19 2012 Roman Rakus - 1.4.3-34 +- Fixed address in license text + +* Wed Jul 18 2012 Fedora Release Engineering - 1.4.3-33 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild + +* Thu Jan 12 2012 Fedora Release Engineering - 1.4.3-32 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild + +* Mon Feb 07 2011 Fedora Release Engineering - 1.4.3-31 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild + +* Mon Jun 14 2010 Roman Rakus - 1.4.3-30 +- Use only once defattr macro +- Use RPM_OPT_FLAGS for CFLAGS in build section + +* Fri Aug 21 2009 Tomas Mraz - 1.4.3-28 +- rebuilt with new openssl + +* Fri Jul 24 2009 Fedora Release Engineering - 1.4.3-27 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild + +* Thu Apr 09 2009 Roman Rakus - 1.4.3-26 +- get back to older version of jiffies64 patch + +* Tue Mar 31 2009 Roman Rakus - 1.4.3-25 +- Fixed source tag + +* Tue Mar 31 2009 Roman Rakus - 1.4.3-24 +- Fixed using valist with log option on. + Resolves: #446844 +- user ident has home dir set to / + Resolves: #458144 + +* Mon Feb 23 2009 Fedora Release Engineering - 1.4.3-23 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild + +* Thu Jan 15 2009 Tomas Mraz - 1.4.3-22 +- rebuild with new openssl + +* Wed Jul 23 2008 Roman Rakus - 1.4.3-21 +- Corrected config directive for ident.key to noreplace +- Fixed some typos in specfile + +* Tue Apr 29 2008 Roman Rakus - 1.4.3-20 +- another corrections of jiffies64 patch + +* Wed Mar 26 2008 Roman Rakus - 1.4.3-19 +- corrected jiffies64 patch + +* Thu Mar 6 2008 Roman Rakus - 1.4.3-18 +- corrected Source0 +- corrected link in URL +- source added to svn on fedorahosted + +* Wed Mar 5 2008 Roman Rakus - 1.4.3-16 +- fixed Source0 + +* Wed Mar 5 2008 Roman Rakus - 1.4.3-15 +- added dist tag +- added URL + +* Tue Feb 26 2008 Roman Rakus - 1.4.3-14 +- fix 234262 bug + +* Wed Feb 13 2008 Jan Safranek - 1.4.3-13 +- fix rpmlint errors + +* Tue Feb 12 2008 Jan Safranek - 1.4.3-12 +- fix build with new gcc + +* Fri Dec 07 2007 Release Engineering - 1.4.3-11 +- Rebuild for deps + +* Wed Sep 19 2007 Ondrej Dvoracek - 1.4.3-10 +- corrected illegal identifier in longopt enumeration (#245436) +- corrected summary and license + +* Mon Jul 24 2006 Martin Stransky - 1.4.3-9 +- added locale patch (#199721) + +* Wed Jul 12 2006 Jesse Keating - 1.4.3-8.1 +- rebuild + +* Sun May 28 2006 Martin Stransky - 1.4.3-8 +- added gettext dependency (#193350) + +* Fri Feb 10 2006 Jesse Keating - 1.4.3-7.1 +- bump again for double-long bug on ppc(64) + +* Tue Feb 07 2006 Martin Stransky - 1.4.3-7 +- re-tag + +* Tue Feb 07 2006 Jesse Keating - 1.4.3-6.devel.2 +- rebuilt for new gcc4.1 snapshot and glibc changes + +* Fri Dec 09 2005 Jesse Keating +- rebuilt + +* Tue Nov 8 2005 Martin Stransky +- rebuilt + +* Thu Jun 24 2005 Martin Stransky - 1.4.3-5.devel +- add xinetd to Prereq +- fix for #150502 (authd doesn't map IPv6 to IPv4 from xinetd) + +* Fri Apr 8 2005 Martin Stransky - 1.4.3-4.devel +- clear last update + +* Fri Apr 8 2005 Martin Stransky - 1.4.3-3.devel +- delete user "ident" after uninstalation + +* Thu Apr 7 2005 Martin Stransky - 1.4.3-2.devel +- in.authd disabled by default (#151905) + +* Mon Mar 7 2005 Martin Stransky - 1.4.3-1.devel +- update to 1.4.3 +- gcc4.0 patch +- add post-uninstall reconfiguration (#150460) + +* Mon Feb 14 2005 Adrian Havill +- rebuilt + +* Fri Oct 15 2004 Adrian Havill - 1.4.2-8 +- tweak setting of uid/gid for key file so systems with no prior + ident user/group don't generate a warning (#135837) + +* Thu Oct 14 2004 Adrian Havill - 1.4.2-4 +- slightly better error checking for insane cases +- tweak of the openssl requires dependency loop (#131291) +- as ident.key is created in %%post, tweak so verify passes (#131530) +- make the uid/gid for ident conform to the past (#135752) + +* Wed Jul 28 2004 Adrian Havill - 1.4.1-1 +- only scan for ESTABLISHED connections +- extra debug output for crypto + +* Mon Jul 26 2004 Adrian Havill - 1.4.0-1 +- revise makefile; don't over-optimize as gcc can produce bad code +- ptr cleanup when multiquery and missing /proc/net/tcp* +- improve create_opt (error handling, debugging, identifiers) +- add --prefix option for matching IPv4 to IPv6 + +* Tue Jul 13 2004 Adrian Havill - 1.3.4-1 +- retry reading proc with pauses to reduce false negatives +- match IPv4 addresses against IPv6 compatibility addresses + +* Mon Jul 12 2004 Adrian Havill - 1.3.3-1 +- use gnu *_unlocked stream funcs for faster I/O + +* Sat Jul 10 2004 Adrian Havill - 1.3.2-1 +- enforce rfc restriction limiting port search to the connected + local/foreign pair + +* Fri Jul 08 2004 Adrian Havill - 1.3.1-1 +- increase default connections-per-sec/max-instances for HP +- more doc cleanup +- remove unnecessary rootdir check for -N/--ident + +* Fri Jul 02 2004 Adrian Havill - 1.3.0-1 +- add unknown-error only -e option +- edit readme, add rfc to docdir +- code cleanup; remove static buffers, orthagonalize id names +- ipv6 hybrid addr zero run correction +- extra eight bits added to random key + +* Wed Jun 30 2004 Adrian Havill - 1.2.8-1 +- zero out invalid port(s) + +* Tue Jun 29 2004 Adrian Havill - 1.2.7-1 +- added Provides to satisfy HP pkg rpm dep (#121447, #111640) +- more code cleanup; minimize --resolve dns lookups + +* Mon Jun 28 2004 Adrian Havill - 1.2.6-1 +- incorporated suggestions from Thomas Zehetbauer (#124914) + +* Sat Jun 26 2004 Adrian Havill - 1.2.5-1 +- clean up src + +* Thu Jun 24 2004 Adrian Havill - 1.2.4-1 +- code vet and minor changes re alan@'s comments +- default operating mode to alias all usernames as 'nobody' + to prevent noobies from getting their mail addr harvested +- clean up README documentation + +* Wed Jun 23 2004 Adrian Havill - 1.2.3-1 +- mark xinetd conf file as a noreplace config file +- more robust error checking for proper rfc1413 tokens + +* Tue Jun 22 2004 Adrian Havill - 1.2.1-1 +- add Requires and BuildRequires + +* Mon Jun 21 2004 Adrian Havill - 1.2.0-1 +- A few tweaks in the cmdline options for orthagonality +- minor bug fix regarding reading from stdin in some multiquery cmdline cases +- add --resolve + +* Sun Jun 20 2004 Adrian Havill - 1.1.0-1 +- add extra options for --help, --usage + +* Sat Jun 19 2004 Adrian Havill - 1.0.0-2 +- Obsolete pidentd -- authd and pidentd can't/shouldn't coexist on FC/RHEL +- license tweak to allow openssl under any condition +- no spec url needed; package is not worthy enough. + +* Fri Jun 18 2004 Jens Petersen - 1.0.0-1 +- Initial packaging