tcpdchk - tcp wrapper configuration checker


   tcpdchk [-a] [-d] [-i inet_conf] [-v]


   tcpdchk  examines  your  tcp  wrapper  configuration  and  reports  all
   potential and real problems it can find. The program examines the  tcpd
   access  control  files  (by  default,  these  are  /etc/hosts.allow and
   /etc/hosts.deny), and compares  the  entries  in  these  files  against
   entries in the inetd network configuration file.

   tcpdchk  reports problems such as non-existent pathnames; services that
   appear in tcpd access control rules, but are not  controlled  by  tcpd;
   services  that  should  not be wrapped; non-existent host names or non-
   internet address forms; occurrences of host aliases instead of official
   host  names;  hosts  with a name/address conflict; inappropriate use of
   wildcard patterns; inappropriate use of NIS netgroups or references  to
   non-existent NIS netgroups; references to non-existent options; invalid
   arguments to options; and so on.

   Where possible, tcpdchk  provides  a  helpful  suggestion  to  fix  the


   -a     Report  access  control  rules  that  permit  access  without an
          explicit ALLOW keyword.

   -d     Examine  hosts.allow  and  hosts.deny  files  in   the   current
          directory instead of the default ones.

   -i inet_conf
          Specify  this  option  when  tcpdchk  is  unable  to  find  your
          inetd.conf network configuration file, or when you suspect  that
          the program uses the wrong one.

   -v     Display the contents of each access control rule.  Daemon lists,
          client lists, shell commands and options are shown in a  pretty-
          printed  format;  this  makes  it  easier  for  you  to spot any
          discrepancies  between  what  you  want  and  what  the  program


   The default locations of the tcpd access control tables are:



   tcpdmatch(8), explain what tcpd would do in specific cases.
   hosts_access(5), format of the tcpd access control tables.
   hosts_options(5), format of the language extensions.
   inetd.conf(5), format of the inetd control file.


   Wietse Venema (,
   Department of Mathematics and Computing Science,
   Eindhoven University of Technology
   Den Dolech 2, P.O. Box 513,
   5600 MB Eindhoven, The Netherlands


More Linux Commands

wcstombs(3) - convert a wide-character string to a multibyte
If dest is not NULL, the wcstombs() function converts the wide-character string src to a multibyte string starting at dest. At most n bytes are written to dest.

mysql_table(5) - Postfix MySQL client configuration.........
mysql_table.5 - The Postfix mail system uses optional tables for address rewriting or mail routing. These tables are usually in dbm or db format. Alternatively,

gnutls_certificate_free_credentials(3) - API function.......
This structure is complex enough to manipulate directly thus this helper function is provided in order to free (deallocate) it. This function does not free any

XtSessionGetToken(3) - token management for checkpointing...
The XtSessionGetToken function will return NULL if the checkpoint operation instigated by the session manager is not currently under way. To indicate the comple

tzset(3) - initialize time conversion information (ManPage)
The tzset() function initializes the tzname variable from the TZ environment variable. This function is automatically called by the other time conversion functi

padsp(1) - PulseAudio OSS Wrapper - Linux manual page.......
padsp.1 - padsp starts the specified program and redirects its access to OSS compatible audio devices (/dev/dsp and auxiliary devices) to a PulseAudio sound ser

ldap_unbind(3) - LDAP bind routines - Linux manual page.....
These routines provide various interfaces to the LDAP bind operation. After an association with an LDAP server is made using ldap_init(3), an LDAP bind operatio

Tcl_SetEnsembleUnknownHandler(3) - manipulate ensemble comma
An ensemble is a command, bound to some namespace, which consists of a collection of subcommands implemented by other Tcl commands. The first argument to the en

xml2-config(1) - script to get information about the install
xml-config is a tool that is used to determine the compile and linker flags that should be used to compile and link programs that use GNOME-XML. OPTIONS xml-con

aio_cancel(3) - cancel an outstanding asynchronous I/O reque
The aio_cancel() function attempts to cancel outstanding asynchronous I/O requests for the file descriptor fd. If aiocbp is NULL, all such requests are canceled

XkbAddGeomShape(3) - Add a shape to a keyboard geometry.....
XkbAddGeomShape.3 - Xkb provides functions to add a single new element to the top-level keyboard geometry. In each case the num_ * fields of the corresponding s

gkeytool-4.6(1) - Manage private keys and public certificate
Cryptographic credentials, in a Java environment, are usually stored in a Key Store. The Java SDK specifies a Key Store as a persistent container of two types o

We can't live, work or learn in freedom unless the software we use is free.