Hi,

I was bored (insomnia actually) so I decided to sit down and figure out
how to hack dpkg-ftp to run over the TIS-FWTK FTP proxy we have here.

The chat for the firewall looks like
   user <Firewall User>
   pass <Firewall Pass>
   user <targ user>@<targ host>
   pass <targ pass>
  <connected..>

It's an authenticated [EMAIL PROTECTED] type firewall. I know a few other ppl on
the list are behind such a beast. The trick to allow dselect to run is
amazingly simple, in /usr/lib/dpkg/methods/ftp edit the files install,
setup and update.

In each of the three files look for the line  
 if(!$ftp->login($::username, $pass)) { print $ftp->message()

Directly after that place these two lines:
 $ftp->_USER("[EMAIL PROTECTED]");
 $ftp->_PASS("[EMAIL PROTECTED]");            

Replace with the ftp server you wish to use and your email addy. Go into
dselect and configure the ftp method. Set the server to be your firewall
address and user + pass to be your firewall authentication. Be sure to
disable passive support (n)

Plug in the proper info for the rest and tada, dpkg over an evil sort of
firewall.

Oh, if you happen to be behind a simpler [EMAIL PROTECTED] firewall without
authentication then you can bypass it transparently by setting the
environment variable FTP_FIREWALL to the address of your firewall, set
dpkg-ftp as if you don't have a firewall.

Hopefully g'night,
Jason


--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
[EMAIL PROTECTED] . 
Trouble?  e-mail to [EMAIL PROTECTED] .

Reply via email to