Date: Wed, 12 Dec 2001 19:46:17 +0100 From: Krzysztof Zaraska <kzaraska@student.uci.agh.edu.pl> To: Rasputin <rasputin@submonkey.net>, freebsd-security@freebsd.org Subject: Re: hosts.allow Message-ID: <20011212194617.1333e91f.kzaraska@student.uci.agh.edu.pl> In-Reply-To: <20011212182706.A21749@shikima.mine.nu> References: <20011212182706.A21749@shikima.mine.nu>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 12 Dec 2001 18:27:06 +0000 Rasputin wrote: > > > I just noticed I have a hosts.allow that is set up to all kinds of > wierd examples: > > > # hosts.allow access control file for "tcp wrapped" applications. > # $FreeBSD: src/etc/hosts.allow,v 1.8.2.5 2001/08/30 16:02:37 dwmalone Exp $ > > Should/is this enabled by default? At least my "stock" version [v 1.8.2.3 2000/07/20 15:17:44] had this near the top: # Start by allowing everything (this prevents the rest of the file # from working, so remove it when you need protection). # The rules here work on a "First match wins" basis. ALL : ALL : allow So the examples don't matter. But this default setup is insecure anyhow. Krzysztof To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011212194617.1333e91f.kzaraska>