summaryrefslogtreecommitdiff
path: root/usr/src/man/man1m/tcpd.1m
diff options
context:
space:
mode:
Diffstat (limited to 'usr/src/man/man1m/tcpd.1m')
-rw-r--r--usr/src/man/man1m/tcpd.1m115
1 files changed, 0 insertions, 115 deletions
diff --git a/usr/src/man/man1m/tcpd.1m b/usr/src/man/man1m/tcpd.1m
deleted file mode 100644
index 7ebd63d845..0000000000
--- a/usr/src/man/man1m/tcpd.1m
+++ /dev/null
@@ -1,115 +0,0 @@
-'\" t
-.\"
-.\" Modified for Solaris to to add the Solaris stability classification,
-.\" and to add a note about source availability.
-.\"
-.TH TCPD 1M "Sep 15, 2011"
-.SH NAME
-tcpd \- access control facility for internet services
-.SH DESCRIPTION
-.PP
-The \fItcpd\fR program can be set up to monitor incoming requests for
-\fItelnet\fR, \fIfinger\fR, \fIftp\fR, \fIexec\fR, \fIrsh\fR,
-\fIrlogin\fR, \fItftp\fR, \fItalk\fR, \fIcomsat\fR and other services
-that have a one-to-one mapping onto executable files.
-.PP
-The program supports both 4.3BSD-style sockets and System V.4-style
-TLI. Functionality may be limited when the protocol underneath TLI is
-not an internet protocol.
-.PP
-Operation is as follows: whenever a request for service arrives, the
-\fIinetd\fP daemon is tricked into running the \fItcpd\fP program
-instead of the desired server. \fItcpd\fP logs the request and does
-some additional checks. When all is well, \fItcpd\fP runs the
-appropriate server program and goes away.
-.PP
-Optional features are: pattern-based access control, client username
-lookups with the RFC 931 etc. protocol, protection against hosts that
-pretend to have someone elses host name, and protection against hosts
-that pretend to have someone elses network address.
-.SH LIBWRAP INTERFACE
-The same monitoring and access control functionality provided by the
-tcpd standalone program is also available through the libwrap shared
-library interface. Some programs, including the Solaris inetd daemon,
-have been modified to use the libwrap interface and thus do not
-require replacing the real server programs with tcpd. The libwrap
-interface is also more efficient and can be used for inetd internal
-services. See
-.BR inetd (1M)
-for more information.
-.SH LOGGING
-Connections that are monitored by
-.I tcpd
-are reported through the \fIsyslog\fR(3) facility. Each record contains
-a time stamp, the client host name and the name of the requested
-service. The information can be useful to detect unwanted activities,
-especially when logfile information from several hosts is merged.
-.PP
-In order to find out where your logs are going, examine the syslog
-configuration file, usually /etc/syslog.conf.
-.SH ACCESS CONTROL
-Optionally,
-.I tcpd
-supports a simple form of access control that is based on pattern
-matching. The access-control software provides hooks for the execution
-of shell commands when a pattern fires. For details, see the
-\fIhosts_access\fR(4) manual page.
-.SH HOST NAME VERIFICATION
-The authentication scheme of some protocols (\fIrlogin, rsh\fR) relies
-on host names. Some implementations believe the host name that they get
-from any random name server; other implementations are more careful but
-use a flawed algorithm.
-.PP
-.I tcpd
-verifies the client host name that is returned by the address->name DNS
-server by looking at the host name and address that are returned by the
-name->address DNS server. If any discrepancy is detected,
-.I tcpd
-concludes that it is dealing with a host that pretends to have someone
-elses host name.
-.PP
-If the sources are compiled with -DPARANOID,
-.I tcpd
-will drop the connection in case of a host name/address mismatch.
-Otherwise, the hostname can be matched with the \fIPARANOID\fR wildcard,
-after which suitable action can be taken.
-.SH HOST ADDRESS SPOOFING
-Optionally,
-.I tcpd
-disables source-routing socket options on every connection that it
-deals with. This will take care of most attacks from hosts that pretend
-to have an address that belongs to someone elses network. UDP services
-do not benefit from this protection. This feature must be turned on
-at compile time.
-.SH RFC 931
-When RFC 931 etc. lookups are enabled (compile-time option) \fItcpd\fR
-will attempt to establish the name of the client user. This will
-succeed only if the client host runs an RFC 931-compliant daemon.
-Client user name lookups will not work for datagram-oriented
-connections, and may cause noticeable delays in the case of connections
-from PCs.
-.PP
-Warning: If the local system runs an RFC 931 server it is important
-that it be configured NOT to use TCP Wrappers, or that TCP Wrappers
-be configured to avoid RFC 931-based access control for this service.
-If you use usernames in the access control files, make sure that you
-have a hosts.allow entry that allows the RFC 931 service (often called
-"identd" or "auth") without any username restrictions. Failure to heed
-this warning can result in two hosts getting in an endless loop of
-consulting each other's identd services.
-.SH EXAMPLES
-.\" Begin Sun update
-.SH ATTRIBUTES
-See
-.BR attributes (5)
-for descriptions of the following attributes:
-.sp
-.TS
-box;
-c | c
-l | l .
-ATTRIBUTE TYPE ATTRIBUTE VALUE
-=
-Interface Stability Committed
-.TE
-.\" End Sun update