Pick a Free OS

User login

Navigation

TCP Wrappers: Part 2

The first entry in the above configuration tells TCP Wrappers that all connections to the RSH daemon should be dropped and a reverse finger should be sent to client, logging all the information obtained.

in.telnetd: 202.54.11.23 192.168.1.

This entry simply denies all connection attempts from the IP address 202.54.11.23 and all machines from the subnet 192.168.1.*.

Conclusion

We hope this up-to-date information on the usage and working of TCP Wrappers will serve you well against the crackers and script kiddies who target unprotected hosts. Just before we wind up, a reminder that securing and fortifying your machines is an on going process and any lax can cost you more than what you bargained for.