1 diff -ru NoCatAuth-nightly/bin/detect-fw.sh NoCatAuth-patched/bin/detect-fw.sh
2 --- NoCatAuth-nightly/bin/detect-fw.sh 2002-08-08 23:28:43.000000000 -0700
3 +++ NoCatAuth-patched/bin/detect-fw.sh 2009-03-18 15:03:00.000000000 -0700
6 # Do we have iptables *and* are running Linux 2.4?
8 -elif which iptables >/dev/null 2>&1 && \
9 - test X"`uname -sr | cut -d. -f-2`" = X"Linux 2.4"; then
10 +elif which iptables >/dev/null 2>&1 ; then
14 diff -ru NoCatAuth-nightly/bin/gateway NoCatAuth-patched/bin/gateway
15 --- NoCatAuth-nightly/bin/gateway 2003-03-07 17:56:51.000000000 -0800
16 +++ NoCatAuth-patched/bin/gateway 2009-03-19 00:24:05.000000000 -0700
18 use lib "$FindBin::Bin/../lib";
21 +use sigtrap qw(stack-trace untrapped error-signals);
23 # Gracefully handle termination signals.
24 $SIG{INT} = sub { exit };
25 diff -ru NoCatAuth-nightly/lib/NoCat/Gateway.pm NoCatAuth-patched/lib/NoCat/Gateway.pm
26 --- NoCatAuth-nightly/lib/NoCat/Gateway.pm 2003-07-30 22:22:22.000000000 -0700
27 +++ NoCatAuth-patched/lib/NoCat/Gateway.pm 2009-03-19 00:22:09.000000000 -0700
35 return unless $self->bind_socket;
37 local $SIG{PIPE} = "IGNORE";
38 - local $SIG{CHLD} = sub { $kids++ };
39 + local $SIG{CHLD} = "IGNORE";
40 local $SIG{HUP} = sub { $hup++ };
44 $self->log( 6, "HUP received, resetting log file." );
48 - # See if any kids have expired, reap zombies
50 - 1 until ( wait == -1 );