*nix Documentation Project
·  Home
 +   man pages
·  Linux HOWTOs
·  FreeBSD Tips
·  *niX Forums

  man pages->OpenBSD man pages -> tcpdmatch (8)              
Title
Content
Arch
Section
 

TCPDMATCH(8)

Contents


NAME    [Toc]    [Back]

     tcpdmatch - tcp wrapper oracle

SYNOPSIS    [Toc]    [Back]

     tcpdmatch [-d] [-i inet_conf] daemon client

     tcpdmatch  [-d]  [-i  inet_conf]  daemon  [@server]  [user@]
client

DESCRIPTION    [Toc]    [Back]

     tcpdmatch  predicts  how the tcp wrapper would handle a specific request
     for service.  Examples are given below.

     The program examines the tcpd(8) access control tables  (default
     /etc/hosts.allow and /etc/hosts.deny) and prints its conclusion.  For
     maximal accuracy, it extracts  additional  information  from
your inetd(8)
     network configuration file.

     When  tcpdmatch  finds a match in the access control tables,
it identifies
     the matched rule.  In addition,  it  displays  the  optional
shell commands
     or  options in a pretty-printed format; this makes it easier
for you to
     spot any discrepancies between what you want  and  what  the
program understands.


     The options are as follows:

     -d      Examine hosts.allow and hosts.deny files in the current directory
             instead of the default ones.

     -i inet_conf
             Specify this option when tcpdmatch is unable to find
your
             inetd.conf  network  configuration file, or when you
wish to test
             with a non-default one.

     The following two arguments are always required:

     daemon  A daemon process name.  Typically, the  last  component of a daemon
             executable pathname.
     client   A host name or network address, or one of the ``unknown'' or
             ``paranoid'' wildcard patterns.

     When a client host name is specified, tcpdmatch gives a prediction for
     each address listed for that client.

     When  a client address is specified, tcpdmatch predicts what
tcpd(8) would
     do when client name lookup fails.

     Optional information specified with the daemon@server form:

     server  A host name or network address, or one of the  ``unknown'' or
             ``paranoid''  wildcard patterns.  The default server
name is
             ``unknown''.

     Optional information specified with the user@client form:

     user    A client user identifier.  Typically, a  login  name
or a numeric
             user ID.  The default user name is ``unknown''.

FILES    [Toc]    [Back]

     The  default  locations of the tcpd(8) access control tables
are:

     /etc/hosts.allow  access control table (allow list)
     /etc/hosts.deny   access control table (deny list)

EXAMPLES    [Toc]    [Back]

     To predict how tcpd(8) would handle a  telnet  request  from
the local system:


           $ tcpdmatch telnetd localhost

     The same request, pretending that hostname lookup failed:

           $ tcpdmatch telnetd 127.0.0.1

     To  predict  what tcpd(8) would do when the client name does
not match the
     client address:

           $ tcpdmatch telnetd paranoid

SEE ALSO    [Toc]    [Back]

      
      
     hosts_access(5), hosts_options(5), inetd.conf(5), tcpdchk(8)

AUTHORS    [Toc]    [Back]

           Wietse Venema ([email protected]),
           Department of Mathematics and Computing Science,
           Eindhoven University of Technology
           Den Dolech 2, P.O. Box 513,
           5600 MB Eindhoven, The Netherlands

OpenBSD      3.6                           June      23,     1997
[ Back ]
 Similar pages
Name OS Title
termwrap Linux terminal wrapper
CPAN::Nox IRIX Wrapper around CPAN.pm without using any XS module
tcpdchk OpenBSD tcp wrapper configuration checker
tcpdchk FreeBSD tcp wrapper configuration checker
telnetlogin Linux login wrapper for telnetd
tcpdchk Linux tcp wrapper configuration checker
tcpdchk HP-UX check tcp wrapper configuration
tcpdmatch HP-UX evaluate tcp wrapper service requests
request_set OpenBSD tcp wrapper access control library
request_init OpenBSD tcp wrapper access control library
Copyright © 2004-2005 DeniX Solutions SRL
newsletter delivery service