tcpdchk - tcp wrapper configuration checker
tcpdchk [-a] [-d] [-i inet_conf] [-v]
tcpdchk examines your tcp wrapper configuration and reports all potential and real problems it can find. The program examines the tcpd access control files (by default, these are /etc/hosts.allow and /etc/hosts.deny), and compares the entries in these files against entries in the inetd network configuration file. tcpdchk reports problems such as non-existent pathnames; services that appear in tcpd access control rules, but are not controlled by tcpd; services that should not be wrapped; non-existent host names or non- internet address forms; occurrences of host aliases instead of official host names; hosts with a name/address conflict; inappropriate use of wildcard patterns; inappropriate use of NIS netgroups or references to non-existent NIS netgroups; references to non-existent options; invalid arguments to options; and so on. Where possible, tcpdchk provides a helpful suggestion to fix the problem.
-a Report access control rules that permit access without an explicit ALLOW keyword. -d Examine hosts.allow and hosts.deny files in the current directory instead of the default ones. -i inet_conf Specify this option when tcpdchk is unable to find your inetd.conf network configuration file, or when you suspect that the program uses the wrong one. -v Display the contents of each access control rule. Daemon lists, client lists, shell commands and options are shown in a pretty- printed format; this makes it easier for you to spot any discrepancies between what you want and what the program understands.
The default locations of the tcpd access control tables are: /etc/hosts.allow /etc/hosts.deny
tcpdmatch(8), explain what tcpd would do in specific cases. hosts_access(5), format of the tcpd access control tables. hosts_options(5), format of the language extensions. inetd.conf(5), format of the inetd control file.
Wietse Venema (firstname.lastname@example.org), Department of Mathematics and Computing Science, Eindhoven University of Technology Den Dolech 2, P.O. Box 513, 5600 MB Eindhoven, The Netherlands TCPDCHK(8)
More Linux Commands
wcstombs(3) - convert a wide-character string to a multibyte
If dest is not NULL, the wcstombs() function converts the wide-character string src to a multibyte string starting at dest. At most n bytes are written to dest.
mysql_table(5) - Postfix MySQL client configuration.........
mysql_table.5 - The Postfix mail system uses optional tables for address rewriting or mail routing. These tables are usually in dbm or db format. Alternatively,
gnutls_certificate_free_credentials(3) - API function.......
This structure is complex enough to manipulate directly thus this helper function is provided in order to free (deallocate) it. This function does not free any
XtSessionGetToken(3) - token management for checkpointing...
The XtSessionGetToken function will return NULL if the checkpoint operation instigated by the session manager is not currently under way. To indicate the comple
tzset(3) - initialize time conversion information (ManPage)
The tzset() function initializes the tzname variable from the TZ environment variable. This function is automatically called by the other time conversion functi
padsp(1) - PulseAudio OSS Wrapper - Linux manual page.......
padsp.1 - padsp starts the specified program and redirects its access to OSS compatible audio devices (/dev/dsp and auxiliary devices) to a PulseAudio sound ser
ldap_unbind(3) - LDAP bind routines - Linux manual page.....
These routines provide various interfaces to the LDAP bind operation. After an association with an LDAP server is made using ldap_init(3), an LDAP bind operatio
Tcl_SetEnsembleUnknownHandler(3) - manipulate ensemble comma
An ensemble is a command, bound to some namespace, which consists of a collection of subcommands implemented by other Tcl commands. The first argument to the en
xml2-config(1) - script to get information about the install
xml-config is a tool that is used to determine the compile and linker flags that should be used to compile and link programs that use GNOME-XML. OPTIONS xml-con
aio_cancel(3) - cancel an outstanding asynchronous I/O reque
The aio_cancel() function attempts to cancel outstanding asynchronous I/O requests for the file descriptor fd. If aiocbp is NULL, all such requests are canceled
XkbAddGeomShape(3) - Add a shape to a keyboard geometry.....
XkbAddGeomShape.3 - Xkb provides functions to add a single new element to the top-level keyboard geometry. In each case the num_ * fields of the corresponding s
gkeytool-4.6(1) - Manage private keys and public certificate
Cryptographic credentials, in a Java environment, are usually stored in a Key Store. The Java SDK specifies a Key Store as a persistent container of two types o