[techtalk] Security techniques ( Redhat 6.2 question)
Alex Yan
flare at serv.net
Tue May 23 18:25:08 EST 2000
Hi Beverly,
I think that the hosts.allow and hosts.deny files are both used by
tcpd, and if she's not running inetd, then she's probably not running
anything with the tcpd wrapper, in which case, whatever remaining
services she has won't use those files for keeping out intruders.
This is the way I think it works:
inetd: looks up all the services in inetd.conf and connects them to
their respective ports
tcpd: a wrapper for running those services, which reads hosts.allow
and hosts.deny to determine whether a client has permissions
to connect to that service. tcpd is usually invoked in
inetd.conf:
telnet stream tcp nowait root /usr/sbin/tcpd in.telnetd
in.telnetd: one of the services that is run, wrapped by tcpd, managed
by inetd.
So theoretically, one could run those services with the tcpd wrapper
directly, which would still give you that nice security layer. But I
don't know how to do that. :)
I hope I didn't confuse anyone.
--
-Alex Yan
flare at serv.net
More information about the Techtalk
mailing list