X-Git-Url: https://git.hcoop.net/hcoop/portal.git/blobdiff_plain/d5cb549c4142a5952e259caa202764cc2f53c12e..47ea7c948ab73a626681f1f75f42a67921c0ca9f:/sec.mlt diff --git a/sec.mlt b/sec.mlt index f29c9fd..020c0f9 100644 --- a/sec.mlt +++ b/sec.mlt @@ -13,7 +13,6 @@ val uname = case $"uname" of val socks = Sec.socketPerms {node = nodeNum, uname = uname}; val tpe = Sec.isTpe {node = nodeNum, uname = uname}; val cron = Sec.cronAllowed {node = nodeNum, uname = uname}; -val ftp = Sec.ftpAllowed {node = nodeNum, uname = uname}; ref showNormal = true; @@ -55,20 +54,6 @@ elseif $"cmd" = "cron2" then %>
Please read our wiki instructions on file transfer before requesting FTP access. Almost everyone should use alternative protocols to FTP that provide superior security benefits.
- - - -<% val rules = Sec.findFirewallRules {node = nodeNum, uname = uname}; -switch rules of - _::_ => %> -You can find a description of rule formats on our wiki. Enter here the rule you want, without the initial user portion. We also allow all members access to some services if they are commonly requested.
- -When requesting a Server or ProxiedServer rule, use a port above 50000 (there is a list of allocated ports). We may grant Server requests for ports under 50000 if it can be justified, but never for a ProxiedServer.
- -We very rarely grant requests for Client rules that don't include remote host whitelists. For example, important security concerns make it a bad idea for us to give anybody blanket IRC permissions. Instead, request specific servers. We will refuse such requests that include networks that are popularly considered fronts for illegal activity.
- - - -<% end %> +if showNormal then + @secnormal [("uname", [uname]), + ("nodeNum", [Int.toString nodeNum])]; +end %> <% @footer[] %> \ No newline at end of file