3 .\" Modified for Solaris to to add the Solaris stability classification,
4 .\" and to add a note about source availability.
6 .TH TCPDMATCH 1M "Sep 15, 2011"
8 tcpdmatch \- tcp wrapper oracle
10 tcpdmatch [-d] [-i inet_conf] daemon client
12 tcpdmatch [-d] [-i inet_conf] daemon[@server] [user@]client
15 \fItcpdmatch\fR predicts how the tcp wrapper would handle a specific
16 request for service. Examples are given below.
18 The program examines the \fItcpd\fR access control tables (default
19 \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR) and prints its
20 conclusion. For maximal accuracy, it extracts additional information
21 from your \fIinetd\fR network configuration file.
23 When \fItcpdmatch\fR finds a match in the access control tables, it
24 identifies the matched rule. In addition, it displays the optional
25 shell commands or options in a pretty-printed format; this makes it
26 easier for you to spot any discrepancies between what you want and what
27 the program understands.
29 The following two arguments are always required:
31 A daemon process name. Typically, the last component of a daemon
34 A host name or network address, or one of the `unknown' or `paranoid'
37 When a client host name is specified, \fItcpdmatch\fR gives a
38 prediction for each address listed for that client.
40 When a client address is specified, \fItcpdmatch\fR predicts what
41 \fItcpd\fR would do when client name lookup fails.
43 Optional information specified with the \fIdaemon@server\fR form:
45 A host name or network address, or one of the `unknown' or `paranoid'
46 wildcard patterns. The default server name is `unknown'.
48 Optional information specified with the \fIuser@client\fR form:
50 A client user identifier. Typically, a login name or a numeric userid.
51 The default user name is `unknown'.
54 Examine \fIhosts.allow\fR and \fIhosts.deny\fR files in the current
55 directory instead of the default ones.
57 Specify this option when \fItcpdmatch\fR is unable to find your
58 \fIinetd.conf\fR network configuration file, or when
59 you suspect that the program uses the wrong one.
61 To predict how \fItcpd\fR would handle a telnet request from the local
64 tcpdmatch in.telnetd localhost
66 The same request, pretending that hostname lookup failed:
68 tcpdmatch in.telnetd 127.0.0.1
70 To predict what tcpd would do when the client name does not match the
73 tcpdmatch in.telnetd paranoid
75 On some systems, daemon names have no `in.' prefix, or \fItcpdmatch\fR
76 may need some help to locate the inetd configuration file.
79 The default locations of the \fItcpd\fR access control tables are:
87 tcpdchk(1M), tcpd configuration checker
88 hosts_access(4), format of the tcpd access control tables.
89 hosts_options(4), format of the language extensions.
90 inetd.conf(4), format of the inetd control file.
91 inetd(1M), how to invoke tcpd from inetd using the libwrap library.
92 inetadm(1M), managing inetd services in the Service Management Framework.
96 Wietse Venema (wietse@wzv.win.tue.nl),
97 Department of Mathematics and Computing Science,
98 Eindhoven University of Technology
99 Den Dolech 2, P.O. Box 513,
100 5600 MB Eindhoven, The Netherlands
101 \" @(#) tcpdmatch.8 1.5 96/02/11 17:01:35
106 for descriptions of the following attributes:
112 ATTRIBUTE TYPE ATTRIBUTE VALUE
114 Interface Stability Committed