|
|
|
|
NOTE: CentOS Enterprise Linux is built from the Red Hat Enterprise Linux source code. Other than logo and name changes CentOS Enterprise Linux is compatible with the equivalent Red Hat version. This document applies equally to both Red Hat and CentOS Enterprise Linux.
Additional information concerning TCP wrappers and xinetd is available from system documentation and on
the Internet.
The bundled documentation on your system is a good place to
start looking for additional TCP Wrappers, xinetd, and access control configuration
options.
-
/usr/share/doc/tcp_wrappers-<version>/ — This directory
contains a README file that discusses how
TCP wrappers work and the various hostname and host address
spoofing risks that exist.
-
/usr/share/doc/xinetd-<version>/ — This directory
contains a README file that discusses
aspects of access control and a sample.conf file with various ideas for modifying
service-specific configuration files in the /etc/xinetd.d/ directory.
-
TCP wrappers and xinetd related man
pages — There are a number of man pages for the various
applications and configuration files involved with TCP wrappers and
xinetd. The following lists some of the
more important man pages.
- Server Applications
-
- Configuration Files
-
-
man 5 hosts_access — The man page
for the TCP wrappers hosts access control files.
-
man hosts_options — The man page
for the TCP wrappers options fields.
-
man xinetd.conf — The man page
listing xinetd configuration options.
-
Red Hat Enterprise Linux Security
Guide; Red Hat, Inc. — Provides an overview of
workstation, server, and network security with specific suggestions
regarding TCP wrappers and xinetd.
-
Hacking Linux Exposed by Brian Hatch,
James Lee, and George Kurtz; Osbourne/McGraw-Hill — An
excellent security resource with featuring information about TCP
wrappers and xinetd.
|
|
|