authpf.8 (67ecd4f3a477a0ca5b76a1694f89755df27a8679) | authpf.8 (5ee7cd2107c8ffd1fe70115deabd6599dffb313b) |
---|---|
1.\" $FreeBSD$ |
|
1.\" $OpenBSD: authpf.8,v 1.43 2007/02/24 17:21:04 beck Exp $ 2.\" 3.\" Copyright (c) 1998-2007 Bob Beck (beck@openbsd.org>. All rights reserved. 4.\" 5.\" Permission to use, copy, modify, and distribute this software for any 6.\" purpose with or without fee is hereby granted, provided that the above 7.\" copyright notice and this permission notice appear in all copies. 8.\" 9.\" THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES 10.\" WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF 11.\" MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR 12.\" ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 13.\" WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 14.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 15.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 16.\" | 2.\" $OpenBSD: authpf.8,v 1.43 2007/02/24 17:21:04 beck Exp $ 3.\" 4.\" Copyright (c) 1998-2007 Bob Beck (beck@openbsd.org>. All rights reserved. 5.\" 6.\" Permission to use, copy, modify, and distribute this software for any 7.\" purpose with or without fee is hereby granted, provided that the above 8.\" copyright notice and this permission notice appear in all copies. 9.\" 10.\" THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES 11.\" WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF 12.\" MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR 13.\" ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 14.\" WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 15.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 16.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 17.\" |
17.Dd January 10, 2002 | 18.Dd March 28, 2006 |
18.Dt AUTHPF 8 19.Os 20.Sh NAME 21.Nm authpf 22.Nd authenticating gateway user shell 23.Sh SYNOPSIS 24.Nm authpf 25.Sh DESCRIPTION --- 18 unchanged lines hidden (view full) --- 44can be used to ensure users are held accountable for their network traffic. 45.Pp 46.Nm 47can add filter and translation rules using the syntax described in 48.Xr pf.conf 5 . 49.Nm 50requires that the 51.Xr pf 4 | 19.Dt AUTHPF 8 20.Os 21.Sh NAME 22.Nm authpf 23.Nd authenticating gateway user shell 24.Sh SYNOPSIS 25.Nm authpf 26.Sh DESCRIPTION --- 18 unchanged lines hidden (view full) --- 45can be used to ensure users are held accountable for their network traffic. 46.Pp 47.Nm 48can add filter and translation rules using the syntax described in 49.Xr pf.conf 5 . 50.Nm 51requires that the 52.Xr pf 4 |
52system be enabled before use. | 53system be enabled and a 54.Xr fdescfs 5 55file system be mounted at 56.Pa /dev/fd 57before use. |
53.Nm 54can also maintain the list of IP address of connected users 55in the "authpf_users" 56.Pa table . 57.Pp 58.Nm 59is meant to be used with users who can connect via 60.Xr ssh 1 --- 441 unchanged lines hidden (view full) --- 502.It Pa /etc/authpf/authpf.allow 503.It Pa /etc/authpf/authpf.rules 504.It Pa /etc/authpf/authpf.message 505.It Pa /etc/authpf/authpf.problem 506.El 507.Sh SEE ALSO 508.Xr pf 4 , 509.Xr pf.conf 5 , | 58.Nm 59can also maintain the list of IP address of connected users 60in the "authpf_users" 61.Pa table . 62.Pp 63.Nm 64is meant to be used with users who can connect via 65.Xr ssh 1 --- 441 unchanged lines hidden (view full) --- 507.It Pa /etc/authpf/authpf.allow 508.It Pa /etc/authpf/authpf.rules 509.It Pa /etc/authpf/authpf.message 510.It Pa /etc/authpf/authpf.problem 511.El 512.Sh SEE ALSO 513.Xr pf 4 , 514.Xr pf.conf 5 , |
515.Xr fdescfs 5 , |
|
510.Xr securelevel 7 , 511.Xr ftp-proxy 8 512.Sh HISTORY 513The 514.Nm 515program first appeared in 516.Ox 3.1 . 517.Sh BUGS 518Configuration issues are tricky. 519The authenticating 520.Xr ssh 1 521connection may be secured, but if the network is not secured the user may 522expose insecure protocols to attackers on the same network, or enable other 523attackers on the network to pretend to be the user by spoofing their IP 524address. 525.Pp 526.Nm 527is not designed to prevent users from denying service to other users. | 516.Xr securelevel 7 , 517.Xr ftp-proxy 8 518.Sh HISTORY 519The 520.Nm 521program first appeared in 522.Ox 3.1 . 523.Sh BUGS 524Configuration issues are tricky. 525The authenticating 526.Xr ssh 1 527connection may be secured, but if the network is not secured the user may 528expose insecure protocols to attackers on the same network, or enable other 529attackers on the network to pretend to be the user by spoofing their IP 530address. 531.Pp 532.Nm 533is not designed to prevent users from denying service to other users. |