TCP Wrapperes 的规则---配置hosts.deny
来源:互联网 发布:人工智能战胜人类 编辑:程序博客网 时间:2024/06/05 01:31
# hosts.deny This file describes the names of the hosts which are
# *not* allowed to use the local INET services, as decided
# by the '/usr/sbin/tcpd' server.
#
# The portmap line is redundant, but it is left to remind you that
# the new secure portmap uses hosts.deny and hosts.allow. In particular
# you should know that NFS uses portmap!
#当有不明来源扫描port时 ip被记录(下边的语法要有tcp wrappers的辅助,包含safe_finger这个指令!单纯的使用xinetd是无法做到下边的功能!确保安装啦 tcp_wrappers套件
)
in.telnetd: ALL : spawn (/bin/echo Security notice from host `/bin/hostname'; /
/bin/echo; /usr/sbin/safe_finger @%h ) | /
/bin/mail -s "%d -%h security" clin003@clin003 & /
:twist ( /bin/echo -e "/n/nWARNING connectin not allowed. Your attempt has been logged. ". )
in.ftpd: ALL : spawn (/bin/echo Security notice from host `/bin/hostname'; /
/bin/echo; /usr/sbin/safe_finger @%h ) | /
/bin/mail -s "%d -%h security" clin003@clin003 & /
:twist ( /bin/echo -e "/n/nWARNING connectin not allowed. Your attempt has been logged. ". )
#sshd: ALL
sshd: ALL : spawn (/bin/echo Security notice from host `/bin/hostname'; /
/bin/echo; /usr/sbin/safe_finger @%h ) | /
/bin/mail -s "%d -%h security" clin003@clin003 & /
:twist ( /bin/echo -e "/n/nWARNING connectin not allowed. Your attempt has been logged. ". )
-----------------这个规则设定来自网络(net)-----------------------------
# *not* allowed to use the local INET services, as decided
# by the '/usr/sbin/tcpd' server.
#
# The portmap line is redundant, but it is left to remind you that
# the new secure portmap uses hosts.deny and hosts.allow. In particular
# you should know that NFS uses portmap!
#当有不明来源扫描port时 ip被记录(下边的语法要有tcp wrappers的辅助,包含safe_finger这个指令!单纯的使用xinetd是无法做到下边的功能!确保安装啦 tcp_wrappers套件
)
in.telnetd: ALL : spawn (/bin/echo Security notice from host `/bin/hostname'; /
/bin/echo; /usr/sbin/safe_finger @%h ) | /
/bin/mail -s "%d -%h security" clin003@clin003 & /
:twist ( /bin/echo -e "/n/nWARNING connectin not allowed. Your attempt has been logged. ". )
in.ftpd: ALL : spawn (/bin/echo Security notice from host `/bin/hostname'; /
/bin/echo; /usr/sbin/safe_finger @%h ) | /
/bin/mail -s "%d -%h security" clin003@clin003 & /
:twist ( /bin/echo -e "/n/nWARNING connectin not allowed. Your attempt has been logged. ". )
#sshd: ALL
sshd: ALL : spawn (/bin/echo Security notice from host `/bin/hostname'; /
/bin/echo; /usr/sbin/safe_finger @%h ) | /
/bin/mail -s "%d -%h security" clin003@clin003 & /
:twist ( /bin/echo -e "/n/nWARNING connectin not allowed. Your attempt has been logged. ". )
-----------------这个规则设定来自网络(net)-----------------------------
- TCP Wrapperes 的规则---配置hosts.deny
- centos 安全配置应用之hosts.allow和hosts.deny
- 通过配置hosts.allow和hosts.deny限制登陆
- linux hosts的allow和deny
- /etc/hosts.allow和/etc/hosts.deny的作用
- linux下的hosts.allow和hosts.deny
- hosts.deny和hosts.allow限制SSH登陆的IP
- hosts.allow和hosts.deny
- hosts.allow和hosts.deny
- rsyncd.conf - hosts deny
- Apache的Order Allow,Deny 规则
- 使用 /etc/hosts.allow和/etc/hosts.deny 控制客户端的访问
- hosts.deny和hosts.allow 设置限制SSH登陆的IP
- /etc/hosts.allow和/etc/hosts.deny
- /etc/hosts.allow和/etc/hosts.deny
- apache-allow,deny规则
- Apache的Order Allow,Deny 配置详解
- linux远程访问权限控制(hosts.allow和hosts.deny)
- 使用Java中的Date和Calendar类
- 传输与交换
- 几个常见的关于日期的问题 选择自 baobao8505 的 Blog
- 十八个超经典故事
- 踩人
- TCP Wrapperes 的规则---配置hosts.deny
- C#实现WEB服务器
- struts学习笔记---配置数据源
- 礼佛礼仪须知
- C#中的数据类型
- 史上最简单的struts+spring+hibernate配置实例[修订版](2005-5-11 周三)_作者:heweiya
- 《大悲咒》原文及念诵注音
- javascript日期选择
- My wallop邀请(数量比较少,先到先得,PS:旧东西了)