
Chapter 9. TCP Wrappers and xinetd 129
• /usr/share/doc/tcp_wrappers- version — Contains a README file that discusses how
TCP wrappers work and the various hostname and host address spoofing risks that exist.
• /usr/share/doc/xinetd-
version — Includes a README file that discusses aspects of ac-
cess control and a sample.conf file with various ideas for modifying /etc/xinetd.d service
configurations.
• For detailed information concerning the creation of TCP wrapper access control rules, read the
hosts_access(5)and hosts_options(5) man pages.
• The xinetd(8) and xinetd.conf(5) man pages contain additional information for creating xinetd
configuration files and a description of how xinetd works.
9.4.2. Useful Websites
• http://www.xinetd.org — The home of xinetd, containing sample configuration files, a full listing
of features, and an informative FAQ.
• http://www.macsecurity.org/resources/xinetd/tutorial.shtml — A thorough tutorial that discusses
many different ways to tweak default xinetd configuration files to meet specific security goals.
Commenti su questo manuale