networks

General discussion about Linux, Linux distribution, using Linux etc.
nabeel
Cadet
Posts: 4
Joined: Sun Nov 09, 2003 4:13 pm
Location: pakistan/karachi
Contact:

networks

Postby nabeel » Mon Dec 01, 2003 1:00 am

what is tcp/ip wrappers in linux

LinuxFreaK
Site Admin
Posts: 5132
Joined: Fri May 02, 2003 10:24 am
Location: Karachi
Contact:

Re: networks

Postby LinuxFreaK » Mon Dec 01, 2003 1:18 am

Dear Nabeel,
Salam,

nabeel wrote:what is tcp/ip wrappers in linux


The tcpd daemon, commonly known as TCP wrapper, is the first line of defense, and is the simplest way of limiting access to your machine and therefore increasing security. It comes as part of Red Hat installation and is simple to configure. There are three configuration files: /etc/hosts.allow which checks for hosts which are allowed connections, /etc/hosts.deny which is read if the host was not found in /etc/hosts.allow and checks for hosts which are to be refused connection, and /etc/inetd.conf which you should not have to modify to configure tcpd. hosts_access(5) man page provides good source of information on the syntax of both /etc/hosts.allow and /etc/hosts.deny.

For More Information Check ..........

Best Regards.
Farrukh Ahmed

zaeemarshad
Lieutenant Colonel
Posts: 660
Joined: Sat Jul 06, 2002 12:35 pm
Location: Islamabad
Contact:

Postby zaeemarshad » Tue Dec 02, 2003 12:18 am

basically tcp wrappers allows you to control how have access to what services over a network. u can control access on basis of domain name, ip address etc etc. inetd.conf is abandoned in Red Hat Linux though still in use in slackware and few other distros. xinetd is the way to go. its more flexible with much greater control.
actually tcp wrappers employs a system of checks to enuser that those programs are authorized to grant the requested deamon the power to do what it needs to do. it uses the tcpd daemon and replaces the daemons in the system with its own daemon that function as a filter on that particular port until the appropriate call is made and then checks the ip the request came from and then consults the configuration files host.allow and host.deny to take appropriate action.

i hope this explains tcp wrappers. u can find real good tutorials on the net explaining how to configure tcp wrappers in linux.

Regards
Zaeem Arshad


Return to “General”

Who is online

Users browsing this forum: No registered users and 2 guests