Penguin
Annotated edit history of tcpdchk(8) version 1, including all changes. View license author blame.
Rev Author # Line
1 perry 1 TCPDCHK
2 !!!TCPDCHK
3 NAME
4 SYNOPSYS
5 DESCRIPTION
6 OPTIONS
7 FILES
8 SEE ALSO
9 AUTHORS
10 ----
11 !!NAME
12
13
14 tcpdchk - tcp wrapper configuration checker
15 !!SYNOPSYS
16
17
18 tcpdchk [[-a] [[-d] [[-i inet_conf] [[-v]
19 !!DESCRIPTION
20
21
22 ''tcpdchk'' examines your tcp wrapper configuration and
23 reports all potential and real problems it can find. The
24 program examines the ''tcpd'' access control files (by
25 default, these are ''/etc/hosts.allow'' and
26 ''/etc/hosts.deny''), and compares the entries in these
27 files against entries in the ''inetd'' or ''tlid''
28 network configuration files.
29
30
31 ''tcpdchk'' reports problems such as non-existent
32 pathnames; services that appear in ''tcpd'' access
33 control rules, but are not controlled by ''tcpd'';
34 services that should not be wrapped; non-existent host names
35 or non-internet address forms; occurrences of host aliases
36 instead of official host names; hosts with a name/address
37 conflict; inappropriate use of wildcard patterns;
38 inappropriate use of NIS netgroups or references to
39 non-existent NIS netgroups; references to non-existent
40 options; invalid arguments to options; and so
41 on.
42
43
44 Where possible, ''tcpdchk'' provides a helpful suggestion
45 to fix the problem.
46 !!OPTIONS
47
48
49 -a
50
51
52 Report access control rules that permit access without an
53 explicit ALLOW keyword. This applies only when the extended
54 access control language is enabled (build with
55 -DPROCESS_OPTIONS).
56
57
58 -d
59
60
61 Examine ''hosts.allow'' and ''hosts.deny'' files in
62 the current directory instead of the default
63 ones.
64
65
66 -i inet_conf
67
68
69 Specify this option when ''tcpdchk'' is unable to find
70 your ''inetd.conf'' or ''tlid.conf'' network
71 configuration file, or when you suspect that the program
72 uses the wrong one.
73
74
75 -v
76
77
78 Display the contents of each access control rule. Daemon
79 lists, client lists, shell commands and options are shown in
80 a pretty-printed format; this makes it easier for you to
81 spot any discrepancies between what you want and what the
82 program understands.
83 !!FILES
84
85
86 The default locations of the ''tcpd'' access control
87 tables are:
88
89
90 /etc/hosts.allow
91 /etc/hosts.deny
92 !!SEE ALSO
93
94
95 tcpdmatch(8), explain what tcpd would do in specific cases.
96 hosts_access(5), format of the tcpd access control tables.
97 hosts_options(5), format of the language extensions.
98 inetd.conf(5), format of the inetd control file.
99 tlid.conf(5), format of the tlid control file.
100 !!AUTHORS
101
102
103 Wietse Venema (wietse@wzv.win.tue.nl),
104 Department of Mathematics and Computing Science,
105 Eindhoven University of Technology
106 Den Dolech 2, P.O. Box 513,
107 5600 MB Eindhoven, The Netherlands
108 ----
This page is a man page (or other imported legacy content). We are unable to automatically determine the license status of this page.