Article title: use TCP-Wrapper to manage Linux services. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Use
Article title: RedHat-Wrapper and xinetd implementation (1 ). Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Tcp wrapper access control based on tcpd ProcessThis is a mechanism that is simpler than iptables to set access control.Perform simple settings in the/etc/hosts. allow and/etc/hosts. deny files.To implement certain access control policies.There are
1. TCP Wrapper is an access control tool based on tcpd access. It can access most TCP-based services. Generally speaking, it can only implement the acceptance of tcpd management explicitly during compilation.
Their working principle is similar to
Tcpwrapper is based on tcpd process access control. this is a mechanism that is simpler than iptables to set access control. it only needs to be in/etc/hosts. allow and/etc/hosts. you can simply set the two deny files to implement certain access
Tcp_wrapper : The TCP wrapper, a free software developed by Wieste Venema designed to provide firewall services to Unix/linux servers, enables system administrators to record and control wrappers support for TCP-based service or daemon access.
Wrapper is a tool for access control, much like the iptables functionality, but much smaller than iptables functionality, and is typically used only when the following conditions are met to use TCP wrapperCheck if the software tool you want to
Tcp_wrappers is a software used to analyze TCP/IP packets, similar IP packet software and iptables,linux installed this software by default, as a secure system, Linux itself has two layers of security firewall, Through the IP filtering mechanism of
For more information, see: http://www.ibm.com/developerworks/cn/aix/library/au-tcpwrapper/I. Usefulness and usageThere is no host configured in Hosts.allow,hosts.deny, SSH to my system, I want to record his actions, in order to use for query
The purpose of tcpwrapper is to provide access control functions for services with weak access control functions. To understand access control, you must first understand the concept of service listening:
Two Methods of Service Listening:
Listen:
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.