diff options
| author | gt145670 <none@none> | 2006-11-27 21:03:24 -0800 |
|---|---|---|
| committer | gt145670 <none@none> | 2006-11-27 21:03:24 -0800 |
| commit | 8dffef91737b06b306a05685fdd319dbf21e38f2 (patch) | |
| tree | 693006afd6ac4579e06986c293665b6142b112a5 /usr/src/cmd/tcpd | |
| parent | 5b20c9b9a6310325c6694300121cac966537ae22 (diff) | |
| download | illumos-joyent-8dffef91737b06b306a05685fdd319dbf21e38f2.tar.gz | |
6228056 tcpd(1m) still talks about inetd.conf
6451473 incomplete TCP wrapper documentation
Diffstat (limited to 'usr/src/cmd/tcpd')
| -rw-r--r-- | usr/src/cmd/tcpd/hosts_access.5 | 6 | ||||
| -rw-r--r-- | usr/src/cmd/tcpd/tcpd.8 | 74 |
2 files changed, 20 insertions, 60 deletions
diff --git a/usr/src/cmd/tcpd/hosts_access.5 b/usr/src/cmd/tcpd/hosts_access.5 index 5fe1f2969b..8f10de4d19 100644 --- a/usr/src/cmd/tcpd/hosts_access.5 +++ b/usr/src/cmd/tcpd/hosts_access.5 @@ -66,6 +66,10 @@ List elements should be separated by blanks and/or commas. With the exception of NIS (YP) netgroup lookups, all access control checks are case insensitive. .ne 4 +.SH HOST ADDRESSES +IPv4 client addresses can be denoted in their usual dotted notation, i.e. +x.x.x.x, but IPv6 addresses require a square brace around them - e.g. +[::1]. .SH PATTERNS The access control language implements the following patterns: .IP \(bu @@ -89,6 +93,8 @@ An expression of the form `n.n.n.n/m.m.m.m\' is interpreted as a bitwise AND of the address and the `mask\'. For example, the net/mask pattern `131.155.72.0/255.255.254.0\' matches every address in the range `131.155.72.0\' through `131.155.73.255\'. +.IP \(bu +Prefixes can be specified for IPv6 address, e.g. [fe80]::/10 .SH WILDCARDS The access control language supports explicit wildcards: .IP ALL diff --git a/usr/src/cmd/tcpd/tcpd.8 b/usr/src/cmd/tcpd/tcpd.8 index 351390714b..b33320f5cf 100644 --- a/usr/src/cmd/tcpd/tcpd.8 +++ b/usr/src/cmd/tcpd/tcpd.8 @@ -73,76 +73,30 @@ succeed only if the client host runs an RFC 931-compliant daemon. Client user name lookups will not work for datagram-oriented connections, and may cause noticeable delays in the case of connections from PCs. -.SH EXAMPLES -The details of using \fItcpd\fR depend on pathname information that was -compiled into the program. -.SH EXAMPLE 1 -This example applies when \fItcpd\fR expects that the original network -daemons will be moved to an "other" place. -.PP -In order to monitor access to the \fIfinger\fR service, move the -original finger daemon to the "other" place and install tcpd in the -place of the original finger daemon. No changes are required to -configuration files. + +.SH EXAMPLE +In order to monitor access to the \fIfinger\fR service, run the following +command to enable the tcp_wrapper : .nf .sp -.in +5 -# mkdir /other/place -# mv /usr/etc/in.fingerd /other/place -# cp tcpd /usr/etc/in.fingerd -.fi -.PP -The example assumes that the network daemons live in /usr/etc. On some -systems, network daemons live in /usr/sbin or in /usr/libexec, or have -no `in.\' prefix to their name. -.SH EXAMPLE 2 -This example applies when \fItcpd\fR expects that the network daemons -are left in their original place. -.PP -In order to monitor access to the \fIfinger\fR service, perform the -following edits on the \fIinetd\fR configuration file (usually -\fI/etc/inetd.conf\fR or \fI/etc/inet/inetd.conf\fR): -.nf -.sp -.ti +5 -finger stream tcp nowait nobody /usr/etc/in.fingerd in.fingerd -.sp -becomes: -.sp .ti +5 -finger stream tcp nowait nobody /some/where/tcpd in.fingerd +inetadm -m network/finger tcp_wrapper=TRUE .sp .fi .PP -The example assumes that the network daemons live in /usr/etc. On some -systems, network daemons live in /usr/sbin or in /usr/libexec, the -daemons have no `in.\' prefix to their name, or there is no userid -field in the inetd configuration file. +The example assumes that the network/finger service hasn't been removed from +your system. .PP Similar changes will be needed for the other services that are to be -covered by \fItcpd\fR. Send a `kill -HUP\' to the \fIinetd\fR(8) -process to make the changes effective. AIX users may also have to -execute the `inetimp\' command. -.SH EXAMPLE 3 -In the case of daemons that do not live in a common directory ("secret" -or otherwise), edit the \fIinetd\fR configuration file so that it -specifies an absolute path name for the process name field. For example: -.nf -.sp - ntalk dgram udp wait root /some/where/tcpd /usr/local/lib/ntalkd -.sp -.fi -.PP -Only the last component (ntalkd) of the pathname will be used for -access control and logging. +covered by \fItcpd\fR. In case a (non-standard) daemon does not exist as a +service already, use \fIsmf(5)\fR to make it a service by creating a manifest, +and then enable tcp_wrappers for that service as shown in the example. + .SH BUGS Some UDP (and RPC) daemons linger around for a while after they have -finished their work, in case another request comes in. In the inetd -configuration file these services are registered with the \fIwait\fR -option. Only the request that started such a daemon will be logged. +finished their work, in case another request comes in. .PP -The program does not work with RPC services over TCP. These services -are registered as \fIrpc/tcp\fR in the inetd configuration file. The +The program does not work with RPC services over TCP. The only non-trivial service that is affected by this limitation is \fIrexd\fR, which is used by the \fIon(1)\fR command. This is no great loss. On most systems, \fIrexd\fR is less secure than a wildcard in @@ -166,7 +120,7 @@ The default locations of the host access control tables are: .nf hosts_access(5), format of the tcpd access control tables. syslog.conf(5), format of the syslogd control file. -inetd.conf(5), format of the inetd control file. +smf(5), service management facility. .SH AUTHORS .na .nf |
