10.5.4.3. TCP wrappers
TCP wrapping provides much the same results as the packet
filters, but works differently. The wrapper actually accepts the
connection attempt, then examines configuration files and decides
whether to accept or reject the connection request. It controls
connections at the application level rather than at the network
level.
TCP wrappers are typically used with xinetd to provide host name and IP-address-based
access control. In addition, these tools include logging and
utilization management capabilities that are easy to configure.
The advantages of TCP wrappers are that the connecting client is
unaware that wrappers are used, and that they operate separately
from the applications they protect.
The host based access is controlled in the hosts.allow and hosts.deny files. More information can be found in
the TCP wrapper documentation files in /usr/share/doc/tcp_wrappers[-<version>/] or
/usr/share/doc/tcp and in the man pages
for the host based access control files, which contain
examples.