tcpdchk(8)


NAME

   tcpdchk - tcp wrapper configuration checker

SYNOPSIS

   tcpdchk [-a] [-d] [-i inet_conf] [-v]

DESCRIPTION

   tcpdchk  examines  your  tcp  wrapper  configuration  and  reports  all
   potential and real problems it can find. The program examines the  tcpd
   access  control  files  (by  default,  these  are  /etc/hosts.allow and
   /etc/hosts.deny), and compares  the  entries  in  these  files  against
   entries in the inetd network configuration file.

   tcpdchk  reports problems such as non-existent pathnames; services that
   appear in tcpd access control rules, but are not  controlled  by  tcpd;
   services  that  should  not be wrapped; non-existent host names or non-
   internet address forms; occurrences of host aliases instead of official
   host  names;  hosts  with a name/address conflict; inappropriate use of
   wildcard patterns; inappropriate use of NIS netgroups or references  to
   non-existent NIS netgroups; references to non-existent options; invalid
   arguments to options; and so on.

   Where possible, tcpdchk  provides  a  helpful  suggestion  to  fix  the
   problem.

OPTIONS

   -a     Report  access  control  rules  that  permit  access  without an
          explicit ALLOW keyword.

   -d     Examine  hosts.allow  and  hosts.deny  files  in   the   current
          directory instead of the default ones.

   -i inet_conf
          Specify  this  option  when  tcpdchk  is  unable  to  find  your
          inetd.conf network configuration file, or when you suspect  that
          the program uses the wrong one.

   -v     Display the contents of each access control rule.  Daemon lists,
          client lists, shell commands and options are shown in a  pretty-
          printed  format;  this  makes  it  easier  for  you  to spot any
          discrepancies  between  what  you  want  and  what  the  program
          understands.

FILES

   The default locations of the tcpd access control tables are:

   /etc/hosts.allow
   /etc/hosts.deny

SEE ALSO

   tcpdmatch(8), explain what tcpd would do in specific cases.
   hosts_access(5), format of the tcpd access control tables.
   hosts_options(5), format of the language extensions.
   inetd.conf(5), format of the inetd control file.

AUTHORS

   Wietse Venema (wietse@wzv.win.tue.nl),
   Department of Mathematics and Computing Science,
   Eindhoven University of Technology
   Den Dolech 2, P.O. Box 513,
   5600 MB Eindhoven, The Netherlands

                                                                TCPDCHK(8)


More Linux Commands

manpages/wcstombs.3.html
wcstombs(3) - convert a wide-character string to a multibyte
If dest is not NULL, the wcstombs() function converts the wide-character string src to a multibyte string starting at dest. At most n bytes are written to dest.

manpages/mysql_table.5.html
mysql_table(5) - Postfix MySQL client configuration.........
mysql_table.5 - The Postfix mail system uses optional tables for address rewriting or mail routing. These tables are usually in dbm or db format. Alternatively,

manpages/gnutls_certificate_free_credentials.3.html
gnutls_certificate_free_credentials(3) - API function.......
This structure is complex enough to manipulate directly thus this helper function is provided in order to free (deallocate) it. This function does not free any

manpages/XtSessionGetToken.3.html
XtSessionGetToken(3) - token management for checkpointing...
The XtSessionGetToken function will return NULL if the checkpoint operation instigated by the session manager is not currently under way. To indicate the comple

manpages/tzset.3.html
tzset(3) - initialize time conversion information (ManPage)
The tzset() function initializes the tzname variable from the TZ environment variable. This function is automatically called by the other time conversion functi

manpages/padsp.1.html
padsp(1) - PulseAudio OSS Wrapper - Linux manual page.......
padsp.1 - padsp starts the specified program and redirects its access to OSS compatible audio devices (/dev/dsp and auxiliary devices) to a PulseAudio sound ser

manpages/ldap_unbind.3.html
ldap_unbind(3) - LDAP bind routines - Linux manual page.....
These routines provide various interfaces to the LDAP bind operation. After an association with an LDAP server is made using ldap_init(3), an LDAP bind operatio

manpages/Tcl_SetEnsembleUnknownHandler.3.html
Tcl_SetEnsembleUnknownHandler(3) - manipulate ensemble comma
An ensemble is a command, bound to some namespace, which consists of a collection of subcommands implemented by other Tcl commands. The first argument to the en

manpages/xml2-config.1.html
xml2-config(1) - script to get information about the install
xml-config is a tool that is used to determine the compile and linker flags that should be used to compile and link programs that use GNOME-XML. OPTIONS xml-con

manpages/aio_cancel.3.html
aio_cancel(3) - cancel an outstanding asynchronous I/O reque
The aio_cancel() function attempts to cancel outstanding asynchronous I/O requests for the file descriptor fd. If aiocbp is NULL, all such requests are canceled

manpages/XkbAddGeomShape.3.html
XkbAddGeomShape(3) - Add a shape to a keyboard geometry.....
XkbAddGeomShape.3 - Xkb provides functions to add a single new element to the top-level keyboard geometry. In each case the num_ * fields of the corresponding s

manpages/gkeytool-4.6.1.html
gkeytool-4.6(1) - Manage private keys and public certificate
Cryptographic credentials, in a Java environment, are usually stored in a Key Store. The Java SDK specifies a Key Store as a persistent container of two types o





We can't live, work or learn in freedom unless the software we use is free.