d8249966c8
Now, "finger" is invoked with "--" before the first network supplied argument, so the "--" and "-l" hacks will be stopped.