diff -u tcp_wrappers_7.6/hosts_access.3 tcp_wrappers_7.6.new/hosts_access.3 --- tcp_wrappers_7.6/hosts_access.3 Sun Feb 11 17:01:27 1996 +++ tcp_wrappers_7.6.new/hosts_access.3 Mon Feb 18 21:45:28 2002 @@ -78,7 +78,7 @@ hosts_access(5), format of the access control tables. hosts_options(5), optional extensions to the base language. .SH FILES -/etc/hosts.allow, /etc/hosts.deny, access control tables. +/etc/tcpd/hosts.allow, /etc/tcpd/hosts.deny, access control tables. .SH BUGS hosts_access() uses the strtok() library function. This may interfere with other code that relies on strtok(). diff -u tcp_wrappers_7.6/hosts_access.5 tcp_wrappers_7.6.new/hosts_access.5 --- tcp_wrappers_7.6/hosts_access.5 Mon Feb 18 21:47:11 2002 +++ tcp_wrappers_7.6.new/hosts_access.5 Mon Feb 18 21:46:40 2002 @@ -21,10 +21,10 @@ at the first match: .IP \(bu Access will be granted when a (daemon,client) pair matches an entry in -the \fI/etc/hosts.allow\fR file. +the \fI/etc/tcpd/hosts.allow\fR file. .IP \(bu Otherwise, access will be denied when a (daemon,client) pair matches an -entry in the \fI/etc/hosts.deny\fR file. +entry in the \fI/etc/tcpd/hosts.deny\fR file. .IP \(bu Otherwise, access will be granted. .PP @@ -285,7 +285,7 @@ file: .PP .ne 2 -/etc/hosts.deny: +/etc/tcpd/hosts.deny: .in +3 ALL: ALL .PP @@ -296,7 +296,7 @@ For example: .PP .ne 2 -/etc/hosts.allow: +/etc/tcpd/hosts.allow: .in +3 ALL: LOCAL @some_netgroup .br @@ -315,7 +315,7 @@ that it can be omitted. The explicitly non-authorized hosts are listed in the deny file. For example: .PP -/etc/hosts.deny: +/etc/tcpd/hosts.deny: .in +3 ALL: some.host.name, .some.domain .br @@ -330,16 +330,16 @@ host. The result is mailed to the superuser. .PP .ne 2 -/etc/hosts.allow: +/etc/tcpd/hosts.allow: .in +3 .nf in.tftpd: LOCAL, .my.domain .PP .ne 2 -/etc/hosts.deny: +/etc/tcpd/hosts.deny: .in +3 .nf -in.tftpd: ALL: (/some/where/safe_finger -l @%h | \\ +in.tftpd: ALL: spawn (/some/where/safe_finger -l @%h | \\ /usr/ucb/mail -s %d-%h root) & .fi .PP @@ -370,8 +370,8 @@ .SH FILES .na .nf -/etc/hosts.allow, (daemon,client) pairs that are granted access. -/etc/hosts.deny, (daemon,client) pairs that are denied access. +/etc/tcpd/hosts.allow, (daemon,client) pairs that are granted access. +/etc/tcpd/hosts.deny, (daemon,client) pairs that are denied access. .ad .fi .SH SEE ALSO diff -u tcp_wrappers_7.6/tcpd.8 tcp_wrappers_7.6.new/tcpd.8 --- tcp_wrappers_7.6/tcpd.8 Wed Feb 21 16:39:16 1996 +++ tcp_wrappers_7.6.new/tcpd.8 Mon Feb 18 21:46:29 2002 @@ -31,7 +31,7 @@ especially when logfile information from several hosts is merged. .PP In order to find out where your logs are going, examine the syslog -configuration file, usually /etc/syslog.conf. +configuration file, usually /etc/tcpd/syslog.conf. .SH ACCESS CONTROL Optionally, .I tcpd @@ -158,9 +158,9 @@ .PP The default locations of the host access control tables are: .PP -/etc/hosts.allow +/etc/tcpd/hosts.allow .br -/etc/hosts.deny +/etc/tcpd/hosts.deny .SH SEE ALSO .na .nf diff -u tcp_wrappers_7.6/tcpdchk.8 tcp_wrappers_7.6.new/tcpdchk.8 --- tcp_wrappers_7.6/tcpdchk.8 Sun Jan 8 17:00:31 1995 +++ tcp_wrappers_7.6.new/tcpdchk.8 Mon Feb 18 21:45:18 2002 @@ -8,7 +8,7 @@ \fItcpdchk\fR examines your tcp wrapper configuration and reports all potential and real problems it can find. The program examines the \fItcpd\fR access control files (by default, these are -\fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the +\fI/etc/tcpd/hosts.allow\fR and \fI/etc/tcpd/hosts.deny\fR), and compares the entries in these files against entries in the \fIinetd\fR or \fItlid\fR network configuration files. .PP @@ -44,9 +44,9 @@ .PP The default locations of the \fItcpd\fR access control tables are: .PP -/etc/hosts.allow +/etc/tcpd/hosts.allow .br -/etc/hosts.deny +/etc/tcpd/hosts.deny .SH SEE ALSO .na .nf diff -u tcp_wrappers_7.6/tcpdmatch.8 tcp_wrappers_7.6.new/tcpdmatch.8 --- tcp_wrappers_7.6/tcpdmatch.8 Sun Feb 11 17:01:36 1996 +++ tcp_wrappers_7.6.new/tcpdmatch.8 Mon Feb 18 21:45:34 2002 @@ -11,7 +11,7 @@ request for service. Examples are given below. .PP The program examines the \fItcpd\fR access control tables (default -\fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR) and prints its +\fI/etc/tcpd/hosts.allow\fR and \fI/etc/tcpd/hosts.deny\fR) and prints its conclusion. For maximal accuracy, it extracts additional information from your \fIinetd\fR or \fItlid\fR network configuration file. .PP @@ -76,9 +76,9 @@ .PP The default locations of the \fItcpd\fR access control tables are: .PP -/etc/hosts.allow +/etc/tcpd/hosts.allow .br -/etc/hosts.deny +/etc/tcpd/hosts.deny .SH SEE ALSO .na .nf