]>
Commit | Line | Data |
---|---|---|
d8818d32 | 1 | diff -u tcp_wrappers_7.6.new/hosts_access.3 tcp_wrappers_7.6/hosts_access.3 |
2 | --- tcp_wrappers_7.6.new/hosts_access.3 Mon Feb 18 21:45:28 2002 | |
3 | +++ tcp_wrappers_7.6/hosts_access.3 Sun Feb 11 17:01:27 1996 | |
4 | @@ -78,7 +78,7 @@ | |
5 | hosts_access(5), format of the access control tables. | |
6 | hosts_options(5), optional extensions to the base language. | |
7 | .SH FILES | |
8 | -/etc/tcpd/hosts.allow, /etc/tcpd/hosts.deny, access control tables. | |
9 | +/etc/hosts.allow, /etc/hosts.deny, access control tables. | |
10 | .SH BUGS | |
11 | hosts_access() uses the strtok() library function. This may interfere | |
12 | with other code that relies on strtok(). | |
13 | diff -u tcp_wrappers_7.6.new/hosts_access.5 tcp_wrappers_7.6/hosts_access.5 | |
14 | --- tcp_wrappers_7.6.new/hosts_access.5 Mon Feb 18 21:46:40 2002 | |
15 | +++ tcp_wrappers_7.6/hosts_access.5 Mon Feb 18 21:47:11 2002 | |
16 | @@ -21,10 +21,10 @@ | |
17 | at the first match: | |
18 | .IP \(bu | |
19 | Access will be granted when a (daemon,client) pair matches an entry in | |
20 | -the \fI/etc/tcpd/hosts.allow\fR file. | |
21 | +the \fI/etc/hosts.allow\fR file. | |
22 | .IP \(bu | |
23 | Otherwise, access will be denied when a (daemon,client) pair matches an | |
24 | -entry in the \fI/etc/tcpd/hosts.deny\fR file. | |
25 | +entry in the \fI/etc/hosts.deny\fR file. | |
26 | .IP \(bu | |
27 | Otherwise, access will be granted. | |
28 | .PP | |
29 | @@ -285,7 +285,7 @@ | |
30 | file: | |
31 | .PP | |
32 | .ne 2 | |
33 | -/etc/tcpd/hosts.deny: | |
34 | +/etc/hosts.deny: | |
35 | .in +3 | |
36 | ALL: ALL | |
37 | .PP | |
38 | @@ -296,7 +296,7 @@ | |
39 | For example: | |
40 | .PP | |
41 | .ne 2 | |
42 | -/etc/tcpd/hosts.allow: | |
43 | +/etc/hosts.allow: | |
44 | .in +3 | |
45 | ALL: LOCAL @some_netgroup | |
46 | .br | |
47 | @@ -315,7 +315,7 @@ | |
48 | that it can be omitted. The explicitly non-authorized hosts are listed | |
49 | in the deny file. For example: | |
50 | .PP | |
51 | -/etc/tcpd/hosts.deny: | |
52 | +/etc/hosts.deny: | |
53 | .in +3 | |
54 | ALL: some.host.name, .some.domain | |
55 | .br | |
56 | @@ -330,13 +330,13 @@ | |
57 | host. The result is mailed to the superuser. | |
58 | .PP | |
59 | .ne 2 | |
60 | -/etc/tcpd/hosts.allow: | |
61 | +/etc/hosts.allow: | |
62 | .in +3 | |
63 | .nf | |
64 | in.tftpd: LOCAL, .my.domain | |
65 | .PP | |
66 | .ne 2 | |
67 | -/etc/tcpd/hosts.deny: | |
68 | +/etc/hosts.deny: | |
69 | .in +3 | |
70 | .nf | |
71 | in.tftpd: ALL: (/some/where/safe_finger -l @%h | \\ | |
72 | @@ -370,8 +370,8 @@ | |
73 | .SH FILES | |
74 | .na | |
75 | .nf | |
76 | -/etc/tcpd/hosts.allow, (daemon,client) pairs that are granted access. | |
77 | -/etc/tcpd/hosts.deny, (daemon,client) pairs that are denied access. | |
78 | +/etc/hosts.allow, (daemon,client) pairs that are granted access. | |
79 | +/etc/hosts.deny, (daemon,client) pairs that are denied access. | |
80 | .ad | |
81 | .fi | |
82 | .SH SEE ALSO | |
83 | diff -u tcp_wrappers_7.6.new/tcpd.8 tcp_wrappers_7.6/tcpd.8 | |
84 | --- tcp_wrappers_7.6.new/tcpd.8 Mon Feb 18 21:46:29 2002 | |
85 | +++ tcp_wrappers_7.6/tcpd.8 Wed Feb 21 16:39:16 1996 | |
86 | @@ -31,7 +31,7 @@ | |
87 | especially when logfile information from several hosts is merged. | |
88 | .PP | |
89 | In order to find out where your logs are going, examine the syslog | |
90 | -configuration file, usually /etc/tcpd/syslog.conf. | |
91 | +configuration file, usually /etc/syslog.conf. | |
92 | .SH ACCESS CONTROL | |
93 | Optionally, | |
94 | .I tcpd | |
95 | @@ -158,9 +158,9 @@ | |
96 | .PP | |
97 | The default locations of the host access control tables are: | |
98 | .PP | |
99 | -/etc/tcpd/hosts.allow | |
100 | +/etc/hosts.allow | |
101 | .br | |
102 | -/etc/tcpd/hosts.deny | |
103 | +/etc/hosts.deny | |
104 | .SH SEE ALSO | |
105 | .na | |
106 | .nf | |
107 | diff -u tcp_wrappers_7.6.new/tcpdchk.8 tcp_wrappers_7.6/tcpdchk.8 | |
108 | --- tcp_wrappers_7.6.new/tcpdchk.8 Mon Feb 18 21:45:18 2002 | |
109 | +++ tcp_wrappers_7.6/tcpdchk.8 Sun Jan 8 17:00:31 1995 | |
110 | @@ -8,7 +8,7 @@ | |
111 | \fItcpdchk\fR examines your tcp wrapper configuration and reports all | |
112 | potential and real problems it can find. The program examines the | |
113 | \fItcpd\fR access control files (by default, these are | |
114 | -\fI/etc/tcpd/hosts.allow\fR and \fI/etc/tcpd/hosts.deny\fR), and compares the | |
115 | +\fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the | |
116 | entries in these files against entries in the \fIinetd\fR or \fItlid\fR | |
117 | network configuration files. | |
118 | .PP | |
119 | @@ -44,9 +44,9 @@ | |
120 | .PP | |
121 | The default locations of the \fItcpd\fR access control tables are: | |
122 | .PP | |
123 | -/etc/tcpd/hosts.allow | |
124 | +/etc/hosts.allow | |
125 | .br | |
126 | -/etc/tcpd/hosts.deny | |
127 | +/etc/hosts.deny | |
128 | .SH SEE ALSO | |
129 | .na | |
130 | .nf | |
131 | diff -u tcp_wrappers_7.6.new/tcpdmatch.8 tcp_wrappers_7.6/tcpdmatch.8 | |
132 | --- tcp_wrappers_7.6.new/tcpdmatch.8 Mon Feb 18 21:45:34 2002 | |
133 | +++ tcp_wrappers_7.6/tcpdmatch.8 Sun Feb 11 17:01:36 1996 | |
134 | @@ -11,7 +11,7 @@ | |
135 | request for service. Examples are given below. | |
136 | .PP | |
137 | The program examines the \fItcpd\fR access control tables (default | |
138 | -\fI/etc/tcpd/hosts.allow\fR and \fI/etc/tcpd/hosts.deny\fR) and prints its | |
139 | +\fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR) and prints its | |
140 | conclusion. For maximal accuracy, it extracts additional information | |
141 | from your \fIinetd\fR or \fItlid\fR network configuration file. | |
142 | .PP | |
143 | @@ -76,9 +76,9 @@ | |
144 | .PP | |
145 | The default locations of the \fItcpd\fR access control tables are: | |
146 | .PP | |
147 | -/etc/tcpd/hosts.allow | |
148 | +/etc/hosts.allow | |
149 | .br | |
150 | -/etc/tcpd/hosts.deny | |
151 | +/etc/hosts.deny | |
152 | .SH SEE ALSO | |
153 | .na | |
154 | .nf |