Lines Matching +full:host +full:- +full:only

3 tcpd \- access control facility for internet services
9 that have a one-to-one mapping onto executable files.
11 The program supports both 4.3BSD-style sockets and System V.4-style
21 Optional features are: pattern-based access control, client username
23 pretend to have someone elses host name, and protection against hosts
29 a time stamp, the client host name and the name of the requested
39 matching. The access-control software provides hooks for the execution
42 .SH HOST NAME VERIFICATION
44 on host names. Some implementations believe the host name that they get
49 verifies the client host name that is returned by the address->name DNS
50 server by looking at the host name and address that are returned by the
51 name->address DNS server. If any discrepancy is detected,
53 concludes that it is dealing with a host that pretends to have someone
54 elses host name.
56 If the sources are compiled with -DPARANOID,
58 will drop the connection in case of a host name/address mismatch.
61 .SH HOST ADDRESS SPOOFING
64 disables source-routing socket options on every connection that it
70 When RFC 931 etc. lookups are enabled (compile-time option) \fItcpd\fR
72 succeed only if the client host runs an RFC 931-compliant daemon.
73 Client user name lookups will not work for datagram-oriented
123 covered by \fItcpd\fR. Send a `kill -HUP\' to the \fIinetd\fR(8)
136 Only the last component (ntalkd) of the pathname will be used for
142 option. Only the request that started such a daemon will be logged.
146 only non-trivial service that is affected by this limitation is
152 appear to come from the responding host. What happens is that the
156 from the local host.
159 The default locations of the host access control tables are: