aboutsummaryrefslogtreecommitdiff
path: root/etc/hosts.allow
diff options
context:
space:
mode:
authorMark Murray <markm@FreeBSD.org>1999-03-28 10:47:26 +0000
committerMark Murray <markm@FreeBSD.org>1999-03-28 10:47:26 +0000
commitf8b0e8c9ff02561cf6efcecbcf9dcab7f0aa8ca8 (patch)
treeb45df552f14227367535b1f3db1306906899c2b0 /etc/hosts.allow
parentccaba9fc2b2de84943b5b459352984f8f3e8d8b9 (diff)
downloadsrc-f8b0e8c9ff02561cf6efcecbcf9dcab7f0aa8ca8.tar.gz
src-f8b0e8c9ff02561cf6efcecbcf9dcab7f0aa8ca8.zip
Notes
Diffstat (limited to 'etc/hosts.allow')
-rw-r--r--etc/hosts.allow48
1 files changed, 48 insertions, 0 deletions
diff --git a/etc/hosts.allow b/etc/hosts.allow
new file mode 100644
index 000000000000..b421ab15058c
--- /dev/null
+++ b/etc/hosts.allow
@@ -0,0 +1,48 @@
+#
+# hosts.allow access control file for "tcp wrapped" apps.
+# $Id$
+#
+# NOTE: The hosts.deny file is not longer used. Instead, put both 'allow'
+# and 'deny' rules in the hosts.allow file.
+# see hosts_options(5) for the format of this file.
+# hosts_access(5) no longer fully applies.
+
+# This is an example! You will need to modify it for your specific
+# requirements!
+
+# Start by allowing everything (this prevents the rest of the file
+# from working, so remove it when you need protection).
+ALL : ALL : allow
+
+# Wrapping sshd(8) is not normally a good idea, but if you
+# need to do it, here's how
+#sshd : .evil.hacker.org : deny
+
+# Prevent those with no reverse DNS from connecting.
+ALL : PARANOID : RFC931 20 : deny
+
+# Allow anything from localhost
+ALL : localhost : allow
+
+# Sendmail can help protect you against spammers and relay-rapers
+sendmail : localhost : allow
+sendmail : .mydomain.com : allow
+sendmail : .evil.spamnest.org : deny
+sendmail : ALL : allow
+
+# Provide a small amount of protection for ftpd
+ftpd : .warez.d00d.org : deny
+ftpd : ALL : allow
+
+# You need to be clever with finger; do _not_ backfinger!! You can easily
+# start a "finger war".
+fingerd : ALL \
+ : spawn (echo Finger. | \
+ /usr/bin/mail -s "tcpd\: %u@%h[%a] fingered me!" root) & \
+ : deny
+
+# The rest of the daemons are protected. Backfinger and log by email.
+ALL : ALL \
+ : severity auth.info : spawn (/usr/bin/safe_finger -l @%h | \
+ /usr/bin/mail -s "tcpd\: %u@%h[%a] tried to use %d (denied)" root) & \
+ : twist /bin/echo "You are not welcome to use %d from %h."