1 diff -u tcp_wrappers_7.6/hosts_access.3 tcp_wrappers_7.6.new/hosts_access.3
2 --- tcp_wrappers_7.6/hosts_access.3 Sun Feb 11 17:01:27 1996
3 +++ tcp_wrappers_7.6.new/hosts_access.3 Mon Feb 18 21:45:28 2002
5 hosts_access(5), format of the access control tables.
6 hosts_options(5), optional extensions to the base language.
8 -/etc/hosts.allow, /etc/hosts.deny, access control tables.
9 +/etc/tcpd/hosts.allow, /etc/tcpd/hosts.deny, access control tables.
11 hosts_access() uses the strtok() library function. This may interfere
12 with other code that relies on strtok().
13 diff -u tcp_wrappers_7.6/hosts_access.5 tcp_wrappers_7.6.new/hosts_access.5
14 --- tcp_wrappers_7.6/hosts_access.5 Mon Feb 18 21:47:11 2002
15 +++ tcp_wrappers_7.6.new/hosts_access.5 Mon Feb 18 21:46:40 2002
19 Access will be granted when a (daemon,client) pair matches an entry in
20 -the \fI/etc/hosts.allow\fR file.
21 +the \fI/etc/tcpd/hosts.allow\fR file.
23 Otherwise, access will be denied when a (daemon,client) pair matches an
24 -entry in the \fI/etc/hosts.deny\fR file.
25 +entry in the \fI/etc/tcpd/hosts.deny\fR file.
27 Otherwise, access will be granted.
34 +/etc/tcpd/hosts.deny:
43 +/etc/tcpd/hosts.allow:
45 ALL: LOCAL @some_netgroup
48 that it can be omitted. The explicitly non-authorized hosts are listed
49 in the deny file. For example:
52 +/etc/tcpd/hosts.deny:
54 ALL: some.host.name, .some.domain
57 host. The result is mailed to the superuser.
61 +/etc/tcpd/hosts.allow:
64 in.tftpd: LOCAL, .my.domain
68 +/etc/tcpd/hosts.deny:
71 -in.tftpd: ALL: (/some/where/safe_finger -l @%h | \\
72 +in.tftpd: ALL: spawn (/some/where/safe_finger -l @%h | \\
73 /usr/ucb/mail -s %d-%h root) &
80 -/etc/hosts.allow, (daemon,client) pairs that are granted access.
81 -/etc/hosts.deny, (daemon,client) pairs that are denied access.
82 +/etc/tcpd/hosts.allow, (daemon,client) pairs that are granted access.
83 +/etc/tcpd/hosts.deny, (daemon,client) pairs that are denied access.
87 diff -u tcp_wrappers_7.6/tcpd.8 tcp_wrappers_7.6.new/tcpd.8
88 --- tcp_wrappers_7.6/tcpd.8 Wed Feb 21 16:39:16 1996
89 +++ tcp_wrappers_7.6.new/tcpd.8 Mon Feb 18 21:46:29 2002
91 especially when logfile information from several hosts is merged.
93 In order to find out where your logs are going, examine the syslog
94 -configuration file, usually /etc/syslog.conf.
95 +configuration file, usually /etc/tcpd/syslog.conf.
101 The default locations of the host access control tables are:
104 +/etc/tcpd/hosts.allow
107 +/etc/tcpd/hosts.deny
111 diff -u tcp_wrappers_7.6/tcpdchk.8 tcp_wrappers_7.6.new/tcpdchk.8
112 --- tcp_wrappers_7.6/tcpdchk.8 Sun Jan 8 17:00:31 1995
113 +++ tcp_wrappers_7.6.new/tcpdchk.8 Mon Feb 18 21:45:18 2002
115 \fItcpdchk\fR examines your tcp wrapper configuration and reports all
116 potential and real problems it can find. The program examines the
117 \fItcpd\fR access control files (by default, these are
118 -\fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the
119 +\fI/etc/tcpd/hosts.allow\fR and \fI/etc/tcpd/hosts.deny\fR), and compares the
120 entries in these files against entries in the \fIinetd\fR or \fItlid\fR
121 network configuration files.
125 The default locations of the \fItcpd\fR access control tables are:
128 +/etc/tcpd/hosts.allow
131 +/etc/tcpd/hosts.deny
135 diff -u tcp_wrappers_7.6/tcpdmatch.8 tcp_wrappers_7.6.new/tcpdmatch.8
136 --- tcp_wrappers_7.6/tcpdmatch.8 Sun Feb 11 17:01:36 1996
137 +++ tcp_wrappers_7.6.new/tcpdmatch.8 Mon Feb 18 21:45:34 2002
139 request for service. Examples are given below.
141 The program examines the \fItcpd\fR access control tables (default
142 -\fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR) and prints its
143 +\fI/etc/tcpd/hosts.allow\fR and \fI/etc/tcpd/hosts.deny\fR) and prints its
144 conclusion. For maximal accuracy, it extracts additional information
145 from your \fIinetd\fR or \fItlid\fR network configuration file.
149 The default locations of the \fItcpd\fR access control tables are:
152 +/etc/tcpd/hosts.allow
155 +/etc/tcpd/hosts.deny