HP-UX Internet Services Administrator's Guide (August 2003)
TCP Wrappers
TCP Wrappers Files
Chapter 352
The try-from utility can be executed from the command line as follows:
# remsh host /usr/bin/try-from
When the try-from utility is invoked, it prints the following output:
client address (%a):
client hostname (%n):
client username (%u):
client info (%c):
server address (%A):
server hostname (%N):
server process (%d):
server info (%s):
The client information describes how the remote host recognizes the
client in terms of an address, name, and user name, whereas, the server
information describes the remote host.
For more information on % <letter> expressions, type man 5
hosts_access at the HP-UX prompt.
The safe_finger Program
safe_finger, a wrapper program to the finger client, protects the data
sent by the remote finger server. This program accepts all the options
supported by the finger client.
For more information, type man 1 finger at the HP-UX prompt.
Following is an example of the safe_finger command:
# /usr/bin/safe_finger -l @xyz.abc.def.com
This command prints the user information on the remote host
xyz.abc.def.com.
HP recommends you to use this program to implement traps in the
access control language of the files /etc/hosts.allow and
/etc/hosts.deny.
For more information on setting traps, type man 5 hosts_access at the
HP-UX prompt.