Installation guide
Chapter 8. TCP Wrappers and xinetd 127
8.4. Additional Resources
Additional information concerning TCP wrappers and xinetd is available on system documentation
and on the Web.
8.4.1. Installed Documentation
The bundled documentation on your system is a good place to start looking for additional TCP Wrap-
pers, xinetd, and access control configuration options.
• /usr/share/doc/tcp_wrappers-
version — Contains a README file that discusses how
TCP wrappers work and the various hostname and host address spoofing risks that exist.
• /usr/share/doc/xinetd-
version — Includes a README file that discusses aspects of ac-
cess control and a sample.conf file with various ideas for modifying /etc/xinetd.d service
configurations.
• For detailed information concerning the creation of TCP wrapper access control rules, read the
hosts_access(5)and hosts_options(5) man pages.
• The xinetd(8) and xinetd.conf(5) man pages contain additional information for creating xinetd
configuration files and a description of how xinetd works.
8.4.2. Useful Websites
• http://www.xinetd.org — The home of xinetd, containing sample configuration files, a full listing
of features, and an informative FAQ.
• http://www.macsecurity.org/resources/xinetd/tutorial.shtml — A thorough tutorial that discusses
many different ways to tweak default xinetd configuration files to meet specific security goals.