next up previous contents index
Next: 5.8 Anonymous FTP Up: 5 Post Installation Configuration Previous: 5.6 Sendmail

5.7 Controlling Access to Services

As a security measure, most network services are managed by a protective program called a TCP wrapper. The protected services are those listed in /etc/inetd.conf that specify /usr/sbin/tcpd. tcpd can allow or deny access to a service based on the origin of the request, and the configuration in /etc/hosts.allow and /etc/hosts.deny.       By default Red Hat Linux allows all service requests. To disable or limit services you can edit /etc/hosts.allow. Here is an example /etc/hosts.allow file:

 

ALL: redhat.com .redhat.com
in.talkd: ALL
in.ntalkd: ALL
in.fingerd: ALL
in.ftpd: ALL

This configuration allows all connections from redhat.com and *.redhat.com machines. It also allows talk, finger, and ftp requests from all machines.

tcpd allows much more sophisticated access control, using a combination of /etc/hosts.allow and /etc/hosts.deny. Read the tcpd(8) and hosts_access(5) man pages for complete details.



Red Hat Software