Red Hat Linux 7.2: The Official Red Hat Linux Reference Guide | ||
---|---|---|
Prev | Chapter 9. TCP Wrappers and xinetd | Next |
Additional information concerning TCP wrappers and xinetd is available on your system and on the Web.
The bundled documentation on your system is a good place to start looking for additional TCP Wrappers, xinetd, and access control configuration options.
/usr/share/doc/tcp_wrappers-<version> — Contains a README file that discusses how TCP wrappers work and the various hostname and host address spoofing risks that exist.
/usr/share/doc/xinetd-<version> — Includes a README file that discusses aspects of access control and a sample.conf file with various ideas for modifying /etc/xinetd.d service configurations.
For detailed information concerning the creation of TCP wrapper access control rules, read the hosts_access (section 5) and hosts_options man pages.
The xinetd and xinetd.conf man pages contain additional information for creating xinetd configuration files and a description of how xinetd works.
http://www.xinetd.org — The home of xinetd, containing sample configuration files, a full listing of features, and an informative FAQ.
http://www.macsecurity.org/resources/xinetd/tutorial.shtml — A thorough tutorial that discusses many different ways to tweak default xinetd configuration files to meet specific security goals.