tcpd.8 (bbf215553c7233fbab8a0afdf1fac74c44781867) tcpd.8 (10d41d991988b6dfe2f102d139fb64152e1614ce)
1'\" t
2.\"
3.\" Modified for Solaris to to add the Solaris stability classification,
4.\" and to add a note about source availability.
5.\"
6.TH TCPD 8 "Sep 15, 2011"
7.SH NAME
8tcpd \- access control facility for internet services
9.SH DESCRIPTION
1'\" t
2.\"
3.\" Modified for Solaris to to add the Solaris stability classification,
4.\" and to add a note about source availability.
5.\"
6.TH TCPD 8 "Sep 15, 2011"
7.SH NAME
8tcpd \- access control facility for internet services
9.SH DESCRIPTION
10.PP
11The \fItcpd\fR program can be set up to monitor incoming requests for
12\fItelnet\fR, \fIfinger\fR, \fIftp\fR, \fIexec\fR, \fIrsh\fR,
13\fIrlogin\fR, \fItftp\fR, \fItalk\fR, \fIcomsat\fR and other services
14that have a one-to-one mapping onto executable files.
15.PP
16The program supports both 4.3BSD-style sockets and System V.4-style
17TLI. Functionality may be limited when the protocol underneath TLI is
18not an internet protocol.

--- 16 unchanged lines hidden (view full) ---

35require replacing the real server programs with tcpd. The libwrap
36interface is also more efficient and can be used for inetd internal
37services. See
38.BR inetd (8)
39for more information.
40.SH LOGGING
41Connections that are monitored by
42.I tcpd
10The \fItcpd\fR program can be set up to monitor incoming requests for
11\fItelnet\fR, \fIfinger\fR, \fIftp\fR, \fIexec\fR, \fIrsh\fR,
12\fIrlogin\fR, \fItftp\fR, \fItalk\fR, \fIcomsat\fR and other services
13that have a one-to-one mapping onto executable files.
14.PP
15The program supports both 4.3BSD-style sockets and System V.4-style
16TLI. Functionality may be limited when the protocol underneath TLI is
17not an internet protocol.

--- 16 unchanged lines hidden (view full) ---

34require replacing the real server programs with tcpd. The libwrap
35interface is also more efficient and can be used for inetd internal
36services. See
37.BR inetd (8)
38for more information.
39.SH LOGGING
40Connections that are monitored by
41.I tcpd
43are reported through the \fIsyslog\fR(3) facility. Each record contains
42are reported through the \fIsyslog\fR(3C) facility. Each record contains
44a time stamp, the client host name and the name of the requested
45service. The information can be useful to detect unwanted activities,
46especially when logfile information from several hosts is merged.
47.PP
48In order to find out where your logs are going, examine the syslog
49configuration file, usually /etc/syslog.conf.
50.SH ACCESS CONTROL
51Optionally,

--- 64 unchanged lines hidden ---
43a time stamp, the client host name and the name of the requested
44service. The information can be useful to detect unwanted activities,
45especially when logfile information from several hosts is merged.
46.PP
47In order to find out where your logs are going, examine the syslog
48configuration file, usually /etc/syslog.conf.
49.SH ACCESS CONTROL
50Optionally,

--- 64 unchanged lines hidden ---