*BSD News Article 73450


Return to BSD News archive

Path: euryale.cc.adfa.oz.au!newshost.anu.edu.au!harbinger.cc.monash.edu.au!news.mira.net.au!news.vbc.net!garlic.com!news.scruz.net!kithrup.com!news.Stanford.EDU!agate!howland.reston.ans.net!nntp.coast.net!news.kei.com!newsfeed.internetmci.com!news.sprintlink.net!news-stk-200.sprintlink.net!worldlinx.com!news.soonet.ca!news
From: Don Joy <joydon@soonet.ca>
Newsgroups: comp.unix.bsd.bsdi.misc
Subject: Tcp Wrapper
Date: Thu, 11 Jul 1996 23:19:14 -0400
Organization: SooNet Corp
Lines: 11
Message-ID: <31E5C432.3A25@soonet.ca>
NNTP-Posting-Host: voyager.explorer.soonet.ca
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-Mailer: Mozilla 2.02Gold (Win95; I)

I'm using bsd 2.1 and i'm running tcp wrapper to limit who can access 
services, especially telnet.  It works great except if someone telnets 
in using a port parameter such as "telnet host 119".  In this case, the 
access list seems to be bypassed entirely and they are givin access 
where they wouldn't normally have been.  Anyone have a workaround for 
this.  Thanks.
-- 
Don Joy
System Administrator
SooNet Corp.