|File Search||Catalog||Content Search|
These programs log the client host name of incoming telnet, ftp, rsh, rlogin, finger etc. requests. Security options are: access control per host, domain and/or service; detection of host name spoofing or host address spoofing; booby traps to implement an early-warning system.
HOSTS_ACCESS(3) HOSTS_ACCESS(3) NAME hosts_access, hosts_ctl, request_init, request_set - access control library SYNOPSIS #include <tcpd.h> extern int allow_severity; extern int deny_severity; struct request_info *request_init(request, key, value, ..., 0) struct request_info *request; struct reque more»
tcp-wrappers (7.6.dbs-13) unstable; urgency=medium * New debconf translation: nb. (Closes: #412329) -- Marco d'Itri <email@example.com> Sun, 25 Feb 2007 21:05:12 +0100 tcp-wrappers (7.6.dbs-12) unstable; urgency=high * Fixed the match_port patch to not break matching on daemon names in a corner case (when request->server->sin has not been initialised by the caller). Patch courtesy of J more»
Request: after building the programs, please run the `tcpdchk' wrapper configuration checker. See the `tcpdchk.8' manual page (`nroff -man' format) for instructions. `tcpdchk' automatically identifies the most common configuration problems, and will save you and me a lot of time. Changes per release 7.6 (Mar 1997) ================================== - Improved the anti source-routing protection. more»
This package was debianized by Anthony Towns <firstname.lastname@example.org> on Tue, 10 Aug 1999 12:06:33 +1000. I more»