diff options
author | Mark Murray <markm@FreeBSD.org> | 1999-03-28 10:47:26 +0000 |
---|---|---|
committer | Mark Murray <markm@FreeBSD.org> | 1999-03-28 10:47:26 +0000 |
commit | f8b0e8c9ff02561cf6efcecbcf9dcab7f0aa8ca8 (patch) | |
tree | b45df552f14227367535b1f3db1306906899c2b0 /etc/hosts.allow | |
parent | ccaba9fc2b2de84943b5b459352984f8f3e8d8b9 (diff) | |
download | src-f8b0e8c9ff02561cf6efcecbcf9dcab7f0aa8ca8.tar.gz src-f8b0e8c9ff02561cf6efcecbcf9dcab7f0aa8ca8.zip |
Notes
Diffstat (limited to 'etc/hosts.allow')
-rw-r--r-- | etc/hosts.allow | 48 |
1 files changed, 48 insertions, 0 deletions
diff --git a/etc/hosts.allow b/etc/hosts.allow new file mode 100644 index 000000000000..b421ab15058c --- /dev/null +++ b/etc/hosts.allow @@ -0,0 +1,48 @@ +# +# hosts.allow access control file for "tcp wrapped" apps. +# $Id$ +# +# NOTE: The hosts.deny file is not longer used. Instead, put both 'allow' +# and 'deny' rules in the hosts.allow file. +# see hosts_options(5) for the format of this file. +# hosts_access(5) no longer fully applies. + +# This is an example! You will need to modify it for your specific +# requirements! + +# Start by allowing everything (this prevents the rest of the file +# from working, so remove it when you need protection). +ALL : ALL : allow + +# Wrapping sshd(8) is not normally a good idea, but if you +# need to do it, here's how +#sshd : .evil.hacker.org : deny + +# Prevent those with no reverse DNS from connecting. +ALL : PARANOID : RFC931 20 : deny + +# Allow anything from localhost +ALL : localhost : allow + +# Sendmail can help protect you against spammers and relay-rapers +sendmail : localhost : allow +sendmail : .mydomain.com : allow +sendmail : .evil.spamnest.org : deny +sendmail : ALL : allow + +# Provide a small amount of protection for ftpd +ftpd : .warez.d00d.org : deny +ftpd : ALL : allow + +# You need to be clever with finger; do _not_ backfinger!! You can easily +# start a "finger war". +fingerd : ALL \ + : spawn (echo Finger. | \ + /usr/bin/mail -s "tcpd\: %u@%h[%a] fingered me!" root) & \ + : deny + +# The rest of the daemons are protected. Backfinger and log by email. +ALL : ALL \ + : severity auth.info : spawn (/usr/bin/safe_finger -l @%h | \ + /usr/bin/mail -s "tcpd\: %u@%h[%a] tried to use %d (denied)" root) & \ + : twist /bin/echo "You are not welcome to use %d from %h." |