summaryrefslogtreecommitdiff
path: root/usr/src/man/man8/tcpd.8
diff options
context:
space:
mode:
Diffstat (limited to 'usr/src/man/man8/tcpd.8')
-rw-r--r--usr/src/man/man8/tcpd.82
1 files changed, 1 insertions, 1 deletions
diff --git a/usr/src/man/man8/tcpd.8 b/usr/src/man/man8/tcpd.8
index 6a3f59d456..7d8571fbec 100644
--- a/usr/src/man/man8/tcpd.8
+++ b/usr/src/man/man8/tcpd.8
@@ -53,7 +53,7 @@ Optionally,
supports a simple form of access control that is based on pattern
matching. The access-control software provides hooks for the execution
of shell commands when a pattern fires. For details, see the
-\fIhosts_access\fR(4) manual page.
+\fIhosts_access\fR(5) manual page.
.SH HOST NAME VERIFICATION
The authentication scheme of some protocols (\fIrlogin, rsh\fR) relies
on host names. Some implementations believe the host name that they get