Query: tcpdchk
OS: hpux
Section: 1
Format: Original Unix Latex Style Formatted with HTML and a Horizontal Scroll Bar
tcpdchk(1) General Commands Manual tcpdchk(1)NAMEtcpdchk - check tcp wrapper configurationSYNOPSYSinet_conf]DESCRIPTIONexamines the tcp wrapper configuration and reports all potential and real problems it can encounter. The command examines the access con- trol files (by default, these are and and compares the entries in these files against entries in the configuration file. reports the following types of problems: non-existent pathnames, services that appear in access control rules but are not controlled by services that should not be wrapped, non-existent host names or non-internet address forms, occurrences of host aliases instead of official host names, hosts with a name/address conflict, inappropriate use of wildcard patterns, inappropriate use of NIS netgroups or references to non-existent NIS netgroups, references to non-existent options, invalid arguments to options. Wherever possible, provides a helpful suggestion to fix the problem. Options The following options are supported by If no options are specified, then it uses the default location of the files. Report access control rules that permit access without an explicit keyword. Examine the and files in the current directory instead of the default ones. Specify this option when is unable to find your configuration file, or when you suspect that is using the wrong file. inet_conf is the path name of the con- figuration file whose entries you want to examine. Display the contents of each access control rule. Daemon lists, client lists, shell commands and options are shown in a printable format. The display helps you find any discrepancies between what you want and what understands for the access control rules.AUTHORWietse Venema (wietse@wzv.win.tue.nl), Department of Mathematics and Computing Science, Eindhoven University of Technology Den Dolech 2, P.O. Box 513, 5600 MB Eindhoven, The NetherlandsFILESThe default locations of the access control tables are: (daemon, client) pairs that are granted access. (daemon, client) pairs that are denied access.SEE ALSOtcpdmatch(1), explains what would do in specific cases. inetd.conf(4), format of the control file. hosts_access(5), format of the access control tables. hosts_options(5), format of the language extensions. tcpdchk(1)