hosts.allow (81890) | hosts.allow (90319) |
---|---|
1# 2# hosts.allow access control file for "tcp wrapped" applications. | 1# 2# hosts.allow access control file for "tcp wrapped" applications. |
3# $FreeBSD: head/etc/hosts.allow 81890 2001-08-18 14:22:52Z dwmalone $ | 3# $FreeBSD: head/etc/hosts.allow 90319 2002-02-06 20:39:36Z markm $ |
4# 5# NOTE: The hosts.deny file is deprecated. 6# Place both 'allow' and 'deny' rules in the hosts.allow file. 7# See hosts_options(5) for the format of this file. 8# hosts_access(5) no longer fully applies. 9 10# _____ _ _ 11# | ____| __ __ __ _ _ __ ___ _ __ | | ___ | | --- 46 unchanged lines hidden (view full) --- 58exim : ALL : allow 59 60# Rpcbind is used for all RPC services; protect your NFS! 61# (IP addresses rather than hostnames *MUST* be used here) 62rpcbind : 192.0.2.32/255.255.255.224 : allow 63rpcbind : 192.0.2.96/255.255.255.224 : allow 64rpcbind : ALL : deny 65 | 4# 5# NOTE: The hosts.deny file is deprecated. 6# Place both 'allow' and 'deny' rules in the hosts.allow file. 7# See hosts_options(5) for the format of this file. 8# hosts_access(5) no longer fully applies. 9 10# _____ _ _ 11# | ____| __ __ __ _ _ __ ___ _ __ | | ___ | | --- 46 unchanged lines hidden (view full) --- 58exim : ALL : allow 59 60# Rpcbind is used for all RPC services; protect your NFS! 61# (IP addresses rather than hostnames *MUST* be used here) 62rpcbind : 192.0.2.32/255.255.255.224 : allow 63rpcbind : 192.0.2.96/255.255.255.224 : allow 64rpcbind : ALL : deny 65 |
66# NIS master server. Only local nets should have access 67ypserv : localhost : allow 68ypserv : .unsafe.my.net.example.com : deny 69ypserv : .my.net.example.com : allow 70ypserv : ALL : deny 71 |
|
66# Provide a small amount of protection for ftpd 67ftpd : localhost : allow 68ftpd : .nice.guy.example.com : allow 69ftpd : .evil.cracker.example.com : deny 70ftpd : ALL : allow 71 72# You need to be clever with finger; do _not_ backfinger!! You can easily 73# start a "finger war". 74fingerd : ALL \ 75 : spawn (echo Finger. | \ 76 /usr/bin/mail -s "tcpd\: %u@%h[%a] fingered me!" root) & \ 77 : deny 78 79# The rest of the daemons are protected. 80ALL : ALL \ 81 : severity auth.info \ 82 : twist /bin/echo "You are not welcome to use %d from %h." | 72# Provide a small amount of protection for ftpd 73ftpd : localhost : allow 74ftpd : .nice.guy.example.com : allow 75ftpd : .evil.cracker.example.com : deny 76ftpd : ALL : allow 77 78# You need to be clever with finger; do _not_ backfinger!! You can easily 79# start a "finger war". 80fingerd : ALL \ 81 : spawn (echo Finger. | \ 82 /usr/bin/mail -s "tcpd\: %u@%h[%a] fingered me!" root) & \ 83 : deny 84 85# The rest of the daemons are protected. 86ALL : ALL \ 87 : severity auth.info \ 88 : twist /bin/echo "You are not welcome to use %d from %h." |