Return to BSD News archive
#! rnews 1082 bsd Path: euryale.cc.adfa.oz.au!newshost.anu.edu.au!harbinger.cc.monash.edu.au!munnari.OZ.AU!news.ecn.uoknor.edu!news.eng.convex.com!newshost.convex.com!newsgate.duke.edu!news.mathworks.com!newsfeed.internetmci.com!news.sprintlink.net!news-stk-200.sprintlink.net!worldlinx.com!news.soonet.ca!news From: Don Joy <joydon@soonet.ca> Newsgroups: comp.unix.bsd.misc Subject: Tcp Wrappers Date: Fri, 12 Jul 1996 07:34:58 -0400 Organization: SooNet Corp Lines: 11 Message-ID: <31E63862.36A2@soonet.ca> NNTP-Posting-Host: voyager.explorer.soonet.ca Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Mailer: Mozilla 2.02Gold (Win95; I) I'm using bsd 2.1 and i'm running tcp wrapper to limit who can access services, especially telnet. It works great except if someone telnets in using a port parameter such as "telnet host 119". In this case, the access list seems to be bypassed entirely and they are givin access where they wouldn't normally have been. Anyone have a workaround for this. Thanks. -- Don Joy System Administrator SooNet Corp.