Red Hat Linux 8.0: The Official Red Hat Linux Reference Guide | ||
---|---|---|
Prev | Chapter 8. TCP Wrappers and xinetd | Next |
Additional information concerning TCP wrappers and xinetd is available on system documentation and on the Web.
The bundled documentation on your system is a good place to start looking for additional TCP Wrappers, xinetd, and access control configuration options.
/usr/share/doc/tcp_wrappers-<version> — Contains a README file that discusses how TCP wrappers work and the various hostname and host address spoofing risks that exist.
/usr/share/doc/xinetd-<version> — Includes a README file that discusses aspects of access control and a sample.conf file with various ideas for modifying /etc/xinetd.d service configurations.
For detailed information concerning the creation of TCP wrapper access control rules, read the hosts_access(5)and hosts_options(5) man pages.
The xinetd(8) and xinetd.conf(5) man pages contain additional information for creating xinetd configuration files and a description of how xinetd works.
http://www.xinetd.org — The home of xinetd, containing sample configuration files, a full listing of features, and an informative FAQ.
http://www.macsecurity.org/resources/xinetd/tutorial.shtml — A thorough tutorial that discusses many different ways to tweak default xinetd configuration files to meet specific security goals.