From owner-man-jp-reviewer@jp.freebsd.org  Tue May  4 17:44:25 1999
Received: (from daemon@localhost)
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) id RAA00391;
	Tue, 4 May 1999 17:44:25 +0900 (JST)
	(envelope-from owner-man-jp-reviewer@jp.FreeBSD.org)
Received: from mail.yk.rim.or.jp (root@mail.yk.rim.or.jp [202.247.130.37])
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) with ESMTP id RAA00386
	for <man-jp-reviewer@jp.freebsd.org>; Tue, 4 May 1999 17:44:24 +0900 (JST)
	(envelope-from k-horik@yk.rim.or.jp)
Received: from localhost (ppp943.yk.rim.or.jp [202.247.185.194])
	by mail.yk.rim.or.jp (8.8.8/3.6W-RIMNET-98-06-09) with ESMTP id RAA03929
	for <man-jp-reviewer@jp.freebsd.org>; Tue, 4 May 1999 17:44:22 +0900 (JST)
To: man-jp-reviewer@jp.freebsd.org
X-Mailer: Mew version 1.93 on Emacs 19.34 / Mule 2.3 (SUETSUMUHANA)
Mime-Version: 1.0
Content-Type: Multipart/Mixed;
	boundary="--Next_Part(Tue_May__4_16:54:38_1999_518)--"
Content-Transfer-Encoding: 7bit
Message-Id: <19990504174341T.k-horik@yk.rim.or.jp>
Date: Tue, 04 May 1999 17:43:41 +0900
From: Kazuo Horikawa <k-horik@yk.rim.or.jp>
X-Dispatcher: imput version 980905(IM100)
Lines: 234
Reply-To: man-jp-reviewer@jp.freebsd.org
Precedence: list
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+990430
X-Sequence: man-jp-reviewer 1343
Subject: [man-jp-reviewer 1343] tcpdmatch.8 (3.1-19990501-STABLE) 
Errors-To: owner-man-jp-reviewer@jp.freebsd.org
Sender: owner-man-jp-reviewer@jp.freebsd.org
X-Originator: k-horik@yk.rim.or.jp

----Next_Part(Tue_May__4_16:54:38_1999_518)--
Content-Type: Text/Plain; charset=iso-2022-jp
Content-Transfer-Encoding: 7bit

 $BKY@n$G$9!#(B

 tcpdmatch.8 $B$NK]Lu$G$9!#(B


----Next_Part(Tue_May__4_16:54:38_1999_518)--
Content-Type: Text/Plain; charset=iso-2022-jp
Content-Transfer-Encoding: 7bit
Content-Description: tcpdmatch.8 Japanese
Content-Disposition: attachment; filename=tcpdmatch.8

.\" jpman %Id: tcpdmatch.8,v 0.0 1999/05/02 12:21:22 horikawa Stab %
.TH TCPDMATCH 8
.SH $BL>>N(B
tcpdmatch \- tcp $B%i%C%Q$NM=8@<T(B
.SH $B=q<0(B
tcpdmatch [-d] [-i inet_conf] daemon client
.sp
tcpdmatch [-d] [-i inet_conf] daemon[@server] [user@]client
.SH $B2r@b(B
.PP
\fItcpdmatch\fR $B$O!"(B
$B%5!<%S%9$KBP$9$k8GM-$NMW5a$r(B tcp $B%i%C%Q$,$I$N$h$&$K07$&$+$rM=8@$7$^$9!#(B
$B;HMQNc$O8e=R$7$F$$$^$9!#(B
.PP
$B$3$N%W%m%0%i%`$O!"(B
\fItcpd\fR $B$N%"%/%;%9@)8fI=(B
($B%G%U%)%k%H$G$O(B \fI/etc/hosts.allow\fR $B$H(B \fI/etc/hosts.deny\fR $B$G$9(B)
$B$r8!::$7!"$=$N$^$H$a$rI=<($7$^$9!#(B
$B@:EY$r:GBg$K$9$k$?$a$K!"(B
\fIinetd\fR $B$^$?$O(B \fItlid\fR $B$N%M%C%H%o!<%/@_Dj%U%!%$%k$+$i!"(B
$BDI2C$N>pJs$r<hF@$7$^$9!#(B
.PP
\fItcpdmatch\fR $B$,%"%/%;%9@)8fI=$G%^%C%A$r8!=P$9$k$H!"(B
$B%^%C%A$7$?%k!<%k$rF1Dj$7$^$9!#(B
$B99$K!"%*%W%7%g%s$N%7%'%k%3%^%s%I$H%*%W%7%g%s$r!"(B
$B@6=q$7$FI=<($7$^$9(B;
$B$3$l$K$h$j!"$"$J$?$NMWK>$H%W%m%0%i%`$NM}2r$H$N4V$N?)$$0c$$$r!"(B
$BMF0W$KH/8+$G$-$k$h$&$K$7$^$9!#(B
.SH $B0z?t(B
$B<!$K<($9(B 2 $B$D$N0z?t$,!">o$KI,MW$G$9(B:
.IP daemon
$B%G!<%b%s$N%W%m%;%9L>!#(B
$BE57?E*$K$O!"%G!<%b%s$N<B9T%Q%9L>$N:G8e$NItJ,$G$9!#(B
.IP client
$B%[%9%HL>$+%M%C%H%o!<%/%"%I%l%9!"(B
$B$^$?$O(B `unknown' $B$+(B `paranoid' $B$N%o%$%k%I%+!<%I%Q%?!<%s$G$9!#(B
.sp
$B%/%i%$%"%s%H$N%[%9%HL>$,;XDj$5$l$k$H!"(B
$B$=$N%/%i%$%"%s%H$KBP$7$FNs5s$5$l$F$$$k3F%"%I%l%9$KBP$7!"(B
\fItcpdmatch\fR $B$OM=8@$rDs6!$7$^$9!#(B
.sp
$B%/%i%$%"%s%H$N%"%I%l%9$,;XDj$5$l$k$H!"(B
$B%/%i%$%"%s%HL>8!:w$N<:GT;~$K(B \fItcpd\fR $B$,$I$&$9$k$+$r!"(B
\fItcpdmatch\fR $B$OM=8@$7$^$9!#(B
.PP
$B%*%W%7%g%s$N>pJs$r!"(B\fIdaemon@server\fR $B$N7A<0$G;XDj$7$^$9(B:
.IP server
$B%[%9%HL>$+%M%C%H%o!<%/%"%I%l%9!"(B
$B$^$?$O(B `unknown' $B$+(B `paranoid' $B$N%o%$%k%I%+!<%I%Q%?!<%s$G$9!#(B
$B%G%U%)%k%H$N%5!<%PL>$O(B `unknown' $B$G$9!#(B
.PP
$B%*%W%7%g%s$N>pJs$r!"(B\fIuser@client\fR $B$N7A<0$G;XDj$7$^$9(B:
.IP user
$B%/%i%$%"%s%H%f!<%6<1JL;R$G$9!#(B
$BE57?E*$K$O!"%m%0%$%sL>$+!"?tCM$N%f!<%6(B id $B$G$9!#(B
$B%G%U%)%k%H$N%f!<%6L>$O(B `unknown' $B$G$9!#(B
.SH $B%*%W%7%g%s(B
.IP -d
$B%G%U%)%k%H$N$b$N$G$J$/!"(B
$B%+%l%s%H%G%#%l%/%H%j$N%U%!%$%k(B \fIhosts.allow\fR $B$H(B \fIhosts.deny\fR $B$r(B
$B8!::$7$^$9!#(B
.IP "-i inet_conf"
\fIinetd.conf\fR $B$+(B \fItlid.conf\fR $B$N(B
$B%M%C%H%o!<%/@_Dj%U%!%$%k$r(B \fItcpdchk\fR $B$,8+IU$1$i$l$J$$$H$-$+!"(B
$B8m$C$?$b$N$r;H$C$F$$$k5?$$$,$"$k$H$-$K!"(B
$B$3$N%*%W%7%g%s$r;HMQ$7$F$/$@$5$$!#(B
.SH $B;HMQNc(B
$B%m!<%+%k%7%9%F%`$+$i$N(B telnet $BMW5a$r(B \fItcpd\fR $B$,$I$N$h$&$K07$&$+$r(B
$BM=8@$9$k$K$O!"<!$N$h$&$K$7$^$9(B:
.sp
.ti +5
tcpdmatch in.telnetd localhost
.PP
$BF1$8MW5a$r!"%[%9%HL>8!:w$N<:GT$rAu$C$F!";n$7$^$9(B:
.sp
.ti +5
tcpdmatch in.telnetd 127.0.0.1
.PP
$B%/%i%$%"%s%HL>$,%/%i%$%"%s%H%"%I%l%9$K%^%C%A$7$J$$$H$-$K(B
tcpd $B$,$I$&$9$k$+$rM=8@$9$k$K$O!"<!$N$h$&$K$7$^$9(B:
.sp
.ti +5
tcpdmatch in.telnetd paranoid
.PP
$B%7%9%F%`$K$h$C$F$O!"(B
$B%G!<%b%s$NL>A0$K(B `in.' $B%W%l%U%#%C%/%9$,IU$+$J$$$b$N$d!"(B
\fItcpdmatch\fR $B$,(B inetd $B@_Dj%U%!%$%k$N0LCV$r8+IU$1$k$N$KJd=u$,I,MW$J$b$N$,(B
$B$"$j$^$9!#(B
.SH $B4XO"%U%!%$%k(B
.PP
\fItcpd\fR $B$N%"%/%;%9@)8fI=$N!"%G%U%)%k%H$NCV>l$O<!$NDL$j$G$9(B:
.PP
/etc/hosts.allow
.br
/etc/hosts.deny
.SH $B4XO"9`L\(B
.na
.nf
tcpdchk(8), tcpd $B$N@_Dj%A%'%C%+!#(B
hosts_access(5), tcpd $B$N%"%/%;%9@)8fI=$N=q<0!#(B
hosts_options(5), $B8@8l3HD%$N=q<0!#(B
inetd.conf(5), inetd $B@)8f%U%!%$%k$N=q<0!#(B
tlid.conf(5), tlid $B@)8f%U%!%$%k$N=q<0!#(B
.SH $B:n<T(B
.na
.nf
Wietse Venema (wietse@wzv.win.tue.nl),
Department of Mathematics and Computing Science,
Eindhoven University of Technology
Den Dolech 2, P.O. Box 513, 
5600 MB Eindhoven, The Netherlands
\" @(#) tcpdmatch.8 1.5 96/02/11 17:01:35

----Next_Part(Tue_May__4_16:54:38_1999_518)--
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Content-Description: tcpdmatch.8 English
Content-Disposition: attachment; filename=tcpdmatch.8.eng

.TH TCPDMATCH 8
.SH NAME
tcpdmatch \- tcp wrapper oracle
.SH SYNOPSYS
tcpdmatch [-d] [-i inet_conf] daemon client
.sp
tcpdmatch [-d] [-i inet_conf] daemon[@server] [user@]client
.SH DESCRIPTION
.PP
\fItcpdmatch\fR predicts how the tcp wrapper would handle a specific
request for service.  Examples are given below.
.PP
The program examines the \fItcpd\fR access control tables (default
\fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR) and prints its
conclusion.  For maximal accuracy, it extracts additional information
from your \fIinetd\fR or \fItlid\fR network configuration file.
.PP
When \fItcpdmatch\fR finds a match in the access control tables, it
identifies the matched rule. In addition, it displays the optional
shell commands or options in a pretty-printed format; this makes it
easier for you to spot any discrepancies between what you want and what
the program understands.
.SH ARGUMENTS
The following two arguments are always required:
.IP daemon
A daemon process name. Typically, the last component of a daemon
executable pathname.
.IP client
A host name or network address, or one of the `unknown' or `paranoid'
wildcard patterns.
.sp
When a client host name is specified, \fItcpdmatch\fR gives a
prediction for each address listed for that client.
.sp
When a client address is specified, \fItcpdmatch\fR predicts what
\fItcpd\fR would do when client name lookup fails.
.PP
Optional information specified with the \fIdaemon@server\fR form:
.IP server
A host name or network address, or one of the `unknown' or `paranoid'
wildcard patterns. The default server name is `unknown'.
.PP
Optional information specified with the \fIuser@client\fR form:
.IP user
A client user identifier. Typically, a login name or a numeric userid.
The default user name is `unknown'.
.SH OPTIONS
.IP -d
Examine \fIhosts.allow\fR and \fIhosts.deny\fR files in the current
directory instead of the default ones.
.IP "-i inet_conf"
Specify this option when \fItcpdmatch\fR is unable to find your
\fIinetd.conf\fR or \fItlid.conf\fR network configuration file, or when
you suspect that the program uses the wrong one.
.SH EXAMPLES
To predict how \fItcpd\fR would handle a telnet request from the local
system:
.sp
.ti +5
tcpdmatch in.telnetd localhost
.PP
The same request, pretending that hostname lookup failed:
.sp
.ti +5
tcpdmatch in.telnetd 127.0.0.1
.PP
To predict what tcpd would do when the client name does not match the
client address:
.sp
.ti +5
tcpdmatch in.telnetd paranoid
.PP
On some systems, daemon names have no `in.' prefix, or \fItcpdmatch\fR
may need some help to locate the inetd configuration file.
.SH FILES
.PP
The default locations of the \fItcpd\fR access control tables are:
.PP
/etc/hosts.allow
.br
/etc/hosts.deny
.SH SEE ALSO
.na
.nf
tcpdchk(8), tcpd configuration checker
hosts_access(5), format of the tcpd access control tables.
hosts_options(5), format of the language extensions.
inetd.conf(5), format of the inetd control file.
tlid.conf(5), format of the tlid control file.
.SH AUTHORS
.na
.nf
Wietse Venema (wietse@wzv.win.tue.nl),
Department of Mathematics and Computing Science,
Eindhoven University of Technology
Den Dolech 2, P.O. Box 513, 
5600 MB Eindhoven, The Netherlands
\" @(#) tcpdmatch.8 1.5 96/02/11 17:01:35

----Next_Part(Tue_May__4_16:54:38_1999_518)----
