*BSD News Article 73472


Return to BSD News archive

#! rnews 1082 bsd
Path: euryale.cc.adfa.oz.au!newshost.anu.edu.au!harbinger.cc.monash.edu.au!munnari.OZ.AU!news.ecn.uoknor.edu!news.eng.convex.com!newshost.convex.com!newsgate.duke.edu!news.mathworks.com!newsfeed.internetmci.com!news.sprintlink.net!news-stk-200.sprintlink.net!worldlinx.com!news.soonet.ca!news
From: Don Joy <joydon@soonet.ca>
Newsgroups: comp.unix.bsd.misc
Subject: Tcp Wrappers
Date: Fri, 12 Jul 1996 07:34:58 -0400
Organization: SooNet Corp
Lines: 11
Message-ID: <31E63862.36A2@soonet.ca>
NNTP-Posting-Host: voyager.explorer.soonet.ca
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-Mailer: Mozilla 2.02Gold (Win95; I)

I'm using bsd 2.1 and i'm running tcp wrapper to limit who can access
services, especially telnet.  It works great except if someone telnets
in using a port parameter such as "telnet host 119".  In this case, the
access list seems to be bypassed entirely and they are givin access
where they wouldn't normally have been.  Anyone have a workaround for
this.  Thanks.
-- 
Don Joy
System Administrator
SooNet Corp.