TCP Wrappers Release Notes

What’s in This Version
TCP Wrapper Features
Chapter 1 15
# /usr/bin/safe_finger -l @xyz.abc.def.com
This command prints the user information on the remote host
“xyz.abc.def.com”.
HP recommends using this program in the implementation of Traps
in the access control language of /etc/hosts.allow and /etc/hosts.deny.
NOTE Refer to hosts_access(5) man page for more information on setting
Traps.
Troubleshooting
TCP Wrappers daemon logs the information related to a connection and
problems encountered, before invoking the original daemon in syslog
(default /var/adm/syslog/syslog.log). The logging level parameter can be
specified as either ‘normal’ or ‘extended’ in the /etc/tcpd.conf file. A value
of “extended” will cause the TCP Wrappers daemon to log the ACLs
information like: the entry with which the client request is matched and
its related options. By default, the value for this entry is “normal”, in
which case tcpd will log the connection details about refusal or
acceptance of the connection. TCP Wrappers suite also provides tools
tcpdchk and tcpdmatch to validate the inetd.conf, hosts.allow and
hosts.deny entries in the configuration file and to predict how tcpd would
handle a specific service request respectively.
Refer to tcpdchk and tcpdmatch sections on page 13 for more
information.