Chapter 8. TCP Wrappers and
xinetd
127
8.4. Additional Resources
Additional information concerning TCP wrappers and
xinetd
is available on system documentation
and on the Web.
8.4.1. Installed Documentation
The bundled documentation on your system is a good place to start looking for additional TCP Wrap 
pers,
xinetd
, and access control configuration options.
  /usr/share/doc/tcp_wrappers  version
  Contains a
README
file that discusses how
F
G
TCP wrappers work and the various hostname and host address spoofing risks that exist.
  /usr/share/doc/xinetd  version
  Includes a
README
file that discusses aspects of ac 
F
G
cess control and a
sample.conf
file with various ideas for modifying
/etc/xinetd.d
service
configurations.
For detailed information concerning the creation of TCP wrapper access control rules, read the
hosts_access(5)and hosts_options(5) man pages.
The xinetd(8) and xinetd.conf(5) man pages contain additional information for creating
xinetd
configuration files and a description of how
xinetd
works.
8.4.2. Useful Websites
http://www.xinetd.org   The home of
xinetd
, containing sample configuration files, a full listing
of features, and an informative FAQ.
http://www.macsecurity.org/resources/xinetd/tutorial.shtml   A thorough tutorial that discusses
many different ways to tweak default
xinetd
configuration files to meet specific security goals.






footer




 

 

 

 

 Home | About Us | Network | Services | Support | FAQ | Control Panel | Order Online | Sitemap | Contact

tomcat hosting

 

Our partners: PHP: Hypertext Preprocessor Best Web Hosting Java Web Hosting Inexpensive Web Hosting  Jsp Web Hosting

Cheapest Web Hosting Jsp Hosting Cheap Hosting

Visionwebhosting.net Business web hosting division of Web Design Plus. All rights reserved