Return to BSD News archive
Path: euryale.cc.adfa.oz.au!newshost.anu.edu.au!harbinger.cc.monash.edu.au!news.mira.net.au!news.vbc.net!garlic.com!news.scruz.net!kithrup.com!news.Stanford.EDU!agate!howland.reston.ans.net!nntp.coast.net!news.kei.com!newsfeed.internetmci.com!news.sprintlink.net!news-stk-200.sprintlink.net!worldlinx.com!news.soonet.ca!news From: Don Joy <joydon@soonet.ca> Newsgroups: comp.unix.bsd.bsdi.misc Subject: Tcp Wrapper Date: Thu, 11 Jul 1996 23:19:14 -0400 Organization: SooNet Corp Lines: 11 Message-ID: <31E5C432.3A25@soonet.ca> NNTP-Posting-Host: voyager.explorer.soonet.ca Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Mailer: Mozilla 2.02Gold (Win95; I) I'm using bsd 2.1 and i'm running tcp wrapper to limit who can access services, especially telnet. It works great except if someone telnets in using a port parameter such as "telnet host 119". In this case, the access list seems to be bypassed entirely and they are givin access where they wouldn't normally have been. Anyone have a workaround for this. Thanks. -- Don Joy System Administrator SooNet Corp.