07-03-2002
you can check with which tcpd if your OS supports TCP Wrappers
greetz
adme
10 More Discussions You Might Find Interesting
1. Cybersecurity
restricted access...
Hi
I need to restrict users shell access to only $HOME under /home for each user. I don't want them getting out of their own directories. From what I understand chroot is something I could use, but I want to avoid this since it involves creating symbolic links to a number... (9 Replies)
Discussion started by: alwayslearningunix
9 Replies
2. UNIX for Dummies Questions & Answers
I need to create a user that only has access to 1 directory (e.g. /vol/mita/test). The user needs to be able to rsh into that directory to run a script. The user should not be able to navigate to any other directories above /vol/mita/test. Any help would be appreciated! (4 Replies)
Discussion started by: ngagne
4 Replies
3. Cybersecurity
Dear Experts,
Is there a way to restrict telnet to specific IPs
Thanks (6 Replies)
Discussion started by: geraldwilson
6 Replies
4. Solaris
Hi All,
I'm on Solaris 8, I need to provide Read-only access to a user to 2 directories only.
Using rsh (restricted shell) as the user's login shell, I can restrict the user's access to a certain directory only, but how can I set in such a way that the user can access only the 2 directories... (4 Replies)
Discussion started by: max_min
4 Replies
5. Shell Programming and Scripting
Somewhat long story:
I have a simple Perl CGI script that uses Expect to Telnet to a device and grab some data, and then spits it back to Perl for display on the Webpage.
This works for many devices I've tried, but one device just fails, it keeps rejecting the password on this device, only... (1 Reply)
Discussion started by: jondo
1 Replies
6. Linux
I have a need to allow only certain IP addresses to access a machine running Linux. I don't know how would i do it, not an expert at CMD?
Thanks in advance for your help. (2 Replies)
Discussion started by: waqaslone
2 Replies
7. UNIX for Dummies Questions & Answers
Hi,
I was writing one script which includes to switch to the another telnet automatically from the present telnet server. I was using rlogin but firstly it takes the same user name of the present telnet and secondly it is prompting for the password.
But i want to switch to the another telnet... (2 Replies)
Discussion started by: Prateek
2 Replies
8. Shell Programming and Scripting
how can i make my users to not use particular commands in the network
like:wall.......
pl z help me regarding this (1 Reply)
Discussion started by: yashwanthguru
1 Replies
9. UNIX for Dummies Questions & Answers
Hi,
I want to know the difference between these two services. Both are under xinetd. Both are used for enabling and disabling Telnet service. So, can somebody please explain me the difference between the two ?
Thanks in advance :) (0 Replies)
Discussion started by: kashifsd17
0 Replies
10. Solaris
OK. So I can prevent remote systems from logging in as root by uncommenting the CONSOLE entry /etc/default/login.
BUT, is there a way to stop su - (when already logged in as own user)?
The way we do it is to set up sudoers so users who need access can do sudo su - (2 Replies)
Discussion started by: psychocandy
2 Replies
LEARN ABOUT MOJAVE
tcpdchk
TCPDCHK(8) System Manager's Manual TCPDCHK(8)
NAME
tcpdchk - tcp wrapper configuration checker
SYNOPSIS
tcpdchk [-a] [-d] [-i inet_conf] [-v]
DESCRIPTION
tcpdchk examines your tcp wrapper configuration and reports all potential and real problems it can find. The program examines the tcpd
access control files (by default, these are /etc/hosts.allow and /etc/hosts.deny), and compares the entries in these files against entries
in the inetd network configuration file.
tcpdchk reports problems such as non-existent pathnames; services that appear in tcpd access control rules, but are not controlled by tcpd;
services that should not be wrapped; non-existent host names or non-internet address forms; occurrences of host aliases instead of official
host names; hosts with a name/address conflict; inappropriate use of wildcard patterns; inappropriate use of NIS netgroups or references to
non-existent NIS netgroups; references to non-existent options; invalid arguments to options; and so on.
Where possible, tcpdchk provides a helpful suggestion to fix the problem.
OPTIONS
-a Report access control rules that permit access without an explicit ALLOW keyword.
-d Examine hosts.allow and hosts.deny files in the current directory instead of the default ones.
-i inet_conf
Specify this option when tcpdchk is unable to find your inetd.conf network configuration file, or when you suspect that the program
uses the wrong one.
-v Display the contents of each access control rule. Daemon lists, client lists, shell commands and options are shown in a pretty-
printed format; this makes it easier for you to spot any discrepancies between what you want and what the program understands.
FILES
The default locations of the tcpd access control tables are:
/etc/hosts.allow
/etc/hosts.deny
SEE ALSO
tcpdmatch(8), explain what tcpd would do in specific cases.
hosts_access(5), format of the tcpd access control tables.
hosts_options(5), format of the language extensions.
inetd.conf(5), format of the inetd control file.
AUTHORS
Wietse Venema (wietse@wzv.win.tue.nl),
Department of Mathematics and Computing Science,
Eindhoven University of Technology
Den Dolech 2, P.O. Box 513,
5600 MB Eindhoven, The Netherlands
TCPDCHK(8)