All Red Hat Linux documents are copyrighted to Red Hat Inc.

15.5. Additional Resources

Additional information concerning TCP wrappers and xinetd is available from system documentation and on the Web.

15.5.1. Installed Documentation

The bundled documentation on your system is a good place to start looking for additional TCP Wrappers, xinetd, and access control configuration options.

  • /usr/share/doc/tcp_wrappers-<version>/ — Contains a README file that discusses how TCP wrappers work and the various hostname and host address spoofing risks that exist.

  • /usr/share/doc/xinetd-<version>/ — Includes a README file that discusses aspects of access control and a sample.conf file with various ideas for modifying service-specific configuration files in the /etc/xinetd.d/ directory.

  • man 5 hosts_access — The man page for the TCP wrappers hosts access control files.

  • man hosts_options — The man page for the TCP wrappers options fields.

  • man xinetd.conf — The man page listing xinetd configuration options.

  • man xinetd — The man page for the xinetd super service daemon.

15.5.2. Useful Websites

15.5.3. Related Books

  • Red Hat Linux Security Guide ; Red Hat, Inc. — Provides an overview of workstation, server, and network security with specific suggestions regarding TCP wrappers and xinetd.

  • Hacking Linux Exposed by Brian Hatch, James Lee, and George Kurtz; Osbourne/McGraw-Hill — An excellent security resource with featuring information about TCP wrappers and xinetd.

© Copyright 2003-2023 The ultimate PHP Editor and PHP IDE site.