tcpd.8 (bbf215553c7233fbab8a0afdf1fac74c44781867) | tcpd.8 (10d41d991988b6dfe2f102d139fb64152e1614ce) |
---|---|
1'\" t 2.\" 3.\" Modified for Solaris to to add the Solaris stability classification, 4.\" and to add a note about source availability. 5.\" 6.TH TCPD 8 "Sep 15, 2011" 7.SH NAME 8tcpd \- access control facility for internet services 9.SH DESCRIPTION | 1'\" t 2.\" 3.\" Modified for Solaris to to add the Solaris stability classification, 4.\" and to add a note about source availability. 5.\" 6.TH TCPD 8 "Sep 15, 2011" 7.SH NAME 8tcpd \- access control facility for internet services 9.SH DESCRIPTION |
10.PP | |
11The \fItcpd\fR program can be set up to monitor incoming requests for 12\fItelnet\fR, \fIfinger\fR, \fIftp\fR, \fIexec\fR, \fIrsh\fR, 13\fIrlogin\fR, \fItftp\fR, \fItalk\fR, \fIcomsat\fR and other services 14that have a one-to-one mapping onto executable files. 15.PP 16The program supports both 4.3BSD-style sockets and System V.4-style 17TLI. Functionality may be limited when the protocol underneath TLI is 18not an internet protocol. --- 16 unchanged lines hidden (view full) --- 35require replacing the real server programs with tcpd. The libwrap 36interface is also more efficient and can be used for inetd internal 37services. See 38.BR inetd (8) 39for more information. 40.SH LOGGING 41Connections that are monitored by 42.I tcpd | 10The \fItcpd\fR program can be set up to monitor incoming requests for 11\fItelnet\fR, \fIfinger\fR, \fIftp\fR, \fIexec\fR, \fIrsh\fR, 12\fIrlogin\fR, \fItftp\fR, \fItalk\fR, \fIcomsat\fR and other services 13that have a one-to-one mapping onto executable files. 14.PP 15The program supports both 4.3BSD-style sockets and System V.4-style 16TLI. Functionality may be limited when the protocol underneath TLI is 17not an internet protocol. --- 16 unchanged lines hidden (view full) --- 34require replacing the real server programs with tcpd. The libwrap 35interface is also more efficient and can be used for inetd internal 36services. See 37.BR inetd (8) 38for more information. 39.SH LOGGING 40Connections that are monitored by 41.I tcpd |
43are reported through the \fIsyslog\fR(3) facility. Each record contains | 42are reported through the \fIsyslog\fR(3C) facility. Each record contains |
44a time stamp, the client host name and the name of the requested 45service. The information can be useful to detect unwanted activities, 46especially when logfile information from several hosts is merged. 47.PP 48In order to find out where your logs are going, examine the syslog 49configuration file, usually /etc/syslog.conf. 50.SH ACCESS CONTROL 51Optionally, --- 64 unchanged lines hidden --- | 43a time stamp, the client host name and the name of the requested 44service. The information can be useful to detect unwanted activities, 45especially when logfile information from several hosts is merged. 46.PP 47In order to find out where your logs are going, examine the syslog 48configuration file, usually /etc/syslog.conf. 49.SH ACCESS CONTROL 50Optionally, --- 64 unchanged lines hidden --- |