United States-English |
|
|
HP-UX Reference > Ttcpdmatch(1)HP-UX 11i Version 3: February 2007 |
|
NAMEtcpdmatch — evaluate tcp wrapper service requests SYNOPSYS/usr/bin/tcpdmatch [-d] [-i inet_conf] daemon client /usr/bin/tcpdmatch [-d] [-i inet_conf] daemon[@server] [user @]client DESCRIPTIONtcpdmatch predicts how the tcp wrapper would handle a specific request for service. Examples are given below. The program examines the tcpd access control tables (default /etc/hosts.allow and /etc/hosts.deny) and prints its conclusion. For maximum accuracy, it extracts additional information from the inetd configuration file. When tcpdmatch finds a match in the access control tables, it identifies the matched rule. In addition, it displays the optional shell commands or options in a printable format. The display helps you find any discrepancies between what you want and what tcpdmatch understands for the access control rules. ArgumentsThe daemon and client arguments are always required.
Optional information specified with the daemon@server form:
Optional information specified with the user@client form:
Options
EXAMPLESTo predict how tcpd would handle a telnet request from the local system: tcpdmatch telnetd localhost The same request, pretending that hostname lookup failed: tcpdmatch telnetd 127.0.0.1 To predict what tcpd would do when the client name does not match the client address: tcpdmatch telnetd paranoid AUTHORWietse Venema (wietse@wzv.win.tue.nl), Department of Mathematics and Computing Science, Eindhoven University of Technology Den Dolech 2, P.O. Box 513, 5600 MB Eindhoven, The Netherlands FILESThe default locations of the tcpd access control tables are:
SEE ALSOtcpdchk(1), tcpd configuration checker. inetd.conf(4), format of the inetd control file. hosts_access(5), format of the tcpd access control tables. hosts_options(5), format of the language extensions. |
Printable version | ||
|