opieaccess.5 (22348) | opieaccess.5 (22372) |
---|---|
1.\" opieaccess.5: Manual page describing the /etc/opieaccess file. 2.\" 3.\" Portions of this software are Copyright 1995 by Randall Atkinson and Dan 4.\" McDonald, All Rights Reserved. All Rights under this copyright are assigned 5.\" to the U.S. Naval Research Laboratory (NRL). The NRL Copyright Notice and 6.\" License Agreement applies to this software. 7.\" 8.\" History: 9.\" 10.\" Written at NRL for OPIE 2.0. 11.\" 12.ll 6i 13.pl 10.5i 14.\" @(#)opieaccess.5 2.0 (NRL) 1/10/95 15.\" 16.lt 6.0i 17.TH OPIEACCESS 5 "January 10, 1995" 18.AT 3 19.SH NAME | 1.\" opieaccess.5: Manual page describing the /etc/opieaccess file. 2.\" 3.\" Portions of this software are Copyright 1995 by Randall Atkinson and Dan 4.\" McDonald, All Rights Reserved. All Rights under this copyright are assigned 5.\" to the U.S. Naval Research Laboratory (NRL). The NRL Copyright Notice and 6.\" License Agreement applies to this software. 7.\" 8.\" History: 9.\" 10.\" Written at NRL for OPIE 2.0. 11.\" 12.ll 6i 13.pl 10.5i 14.\" @(#)opieaccess.5 2.0 (NRL) 1/10/95 15.\" 16.lt 6.0i 17.TH OPIEACCESS 5 "January 10, 1995" 18.AT 3 19.SH NAME |
20[/etc/]opieaccess \- OPIE database of trusted networks | 20/etc/opieaccess \- OPIE database of trusted networks |
21 22.SH DESCRIPTION 23The 24.I opieaccess 25file contains a list of networks that are considered trusted by the system as 26far as security against passive attacks is concerned. Users from networks so 27trusted will be able to log in using OPIE responses, but not be required to 28do so, while users from networks that are not trusted will always be required --- 31 unchanged lines hidden (view full) --- 60.fi 61 62Subnets can be controlled by using the appropriate address and mask. Individual 63hosts can be controlled by using the appropriate address and a mask of 64255.255.255.255. If no rules are matched, the default is to deny non-0PIE 65logins. 66 67.SH SEE ALSO | 21 22.SH DESCRIPTION 23The 24.I opieaccess 25file contains a list of networks that are considered trusted by the system as 26far as security against passive attacks is concerned. Users from networks so 27trusted will be able to log in using OPIE responses, but not be required to 28do so, while users from networks that are not trusted will always be required --- 31 unchanged lines hidden (view full) --- 60.fi 61 62Subnets can be controlled by using the appropriate address and mask. Individual 63hosts can be controlled by using the appropriate address and a mask of 64255.255.255.255. If no rules are matched, the default is to deny non-0PIE 65logins. 66 67.SH SEE ALSO |
68.BR ftpd (8) 69.BR login (1), |
|
68.BR opie (4), 69.BR opiekeys (5), 70.BR opiepasswd (1), 71.BR opieinfo (1), | 70.BR opie (4), 71.BR opiekeys (5), 72.BR opiepasswd (1), 73.BR opieinfo (1), |
72.BR opiesu (1), 73.BR opielogin (1), 74.BR opieftpd (8) | 74.BR su (1), |
75 76.SH AUTHOR 77Bellcore's S/Key was written by Phil Karn, Neil M. Haller, and John S. Walden 78of Bellcore. OPIE was created at NRL by Randall Atkinson, Dan McDonald, and 79Craig Metz. 80 81S/Key is a trademark of Bell Communications Research (Bellcore). 82 83.SH CONTACT 84OPIE is discussed on the Bellcore "S/Key Users" mailing list. To join, 85send an email request to: 86.sp 87skey-users-request@thumper.bellcore.com | 75 76.SH AUTHOR 77Bellcore's S/Key was written by Phil Karn, Neil M. Haller, and John S. Walden 78of Bellcore. OPIE was created at NRL by Randall Atkinson, Dan McDonald, and 79Craig Metz. 80 81S/Key is a trademark of Bell Communications Research (Bellcore). 82 83.SH CONTACT 84OPIE is discussed on the Bellcore "S/Key Users" mailing list. To join, 85send an email request to: 86.sp 87skey-users-request@thumper.bellcore.com |