home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky comp.protocols.tcp-ip:5685 comp.unix.bsd:10373
- Newsgroups: comp.protocols.tcp-ip,comp.unix.bsd
- Path: sparky!uunet!spool.mu.edu!uwm.edu!ux1.cso.uiuc.edu!news.cso.uiuc.edu!ncsa.uiuc.edu!vwelch
- From: vwelch@ncsa.uiuc.edu (Von Welch)
- Subject: Re: Limiting Telnet access.
- References: <1992Dec17.230214.16501@vector.dallas.tx.us>
- Message-ID: <BzGoq4.Jx6@news.cso.uiuc.edu>
- Sender: usenet@news.cso.uiuc.edu (Net Noise owner)
- Organization: Nat'l Ctr for Supercomp App (NCSA) @ University of Illinois
- Date: Fri, 18 Dec 1992 15:37:15 GMT
- Lines: 12
-
- In article <1992Dec17.230214.16501@vector.dallas.tx.us>, tbo@vector.dallas.tx.us (Terry Bohaning) writes:
- |> Has anyone modified the telnet daemon to include to capability
- |> for an allow/deny file. What I'm thinking of is a way to prevent
- |> any machine not listed in an allow file or every machine except
- |> those listed in a deny file from telneting into our machines.
-
- Look for a program called tcpwrapper. It does just what you are looking for.
-
- --
- Von Welch (vwelch@ncsa.uiuc.edu) NCSA Networking Development Group
-
- - I speak only for myself and those who think exactly like me -
-