1 diff -urN NoCatAuth-nightly/bin/detect-fw.sh NoCatAuth-nightly.new/bin/detect-fw.sh
2 --- NoCatAuth-nightly/bin/detect-fw.sh 2010-03-27 17:44:01.000000000 +0100
3 +++ NoCatAuth-nightly.new/bin/detect-fw.sh 2010-03-27 17:44:39.000000000 +0100
5 if [ -n "$1" -a -n "$2" -a -d "$2/$1" ]; then
9 -# Do we have iptables *and* are running Linux 2.4?
11 -elif which iptables >/dev/null 2>&1 ; then
16 -# Or do we have ipchains?
18 -elif which ipchains >/dev/null 2>&1; then
23 -# Or ip_filter (e.g. *BSD, Solaris, HP-UX, etc)?
24 -# <http://www.ipfilter.org/>
26 -elif which ipf >/dev/null 2>&1; then
27 -ipf_running="`ipf -V | grep 'Running' | awk '{print $2}'`";
28 - if [ "$ipf_running" = "yes" ]; then
32 - echo "ERROR: ip_filter appears to exist, but we're not postive that it's running"
33 - echo "1. You must be root for us to verify this"
34 - echo "2. Check that it's compiled in your kernel (either staticlly or a loaded module)"
37 -# Or packetfilter (OpenBSD 3.0+)
38 -elif which pfctl >/dev/null 2>&1; then
43 - echo "No supported firewalls detected! Check your path."
44 - echo "Supported firewalls include: iptables, ipchains, ipf, pf."
48 -echo $(which $FW_BIN) found.
54 # Remove the existing *.fw links in /usr/local/nocat/bin (or wherever this is being run from)