From owner-FreeBSD-net-jp@jp.freebsd.org  Thu Aug  7 10:57:13 1997
Received: by jaz.jp.freebsd.org (8.8.7+2.7Wbeta5/8.7.3) id KAA06281
	Thu, 7 Aug 1997 10:57:13 +0900 (JST)
Received: by jaz.jp.freebsd.org (8.8.7+2.7Wbeta5/8.7.3) with ESMTP id KAA06262
	for <FreeBSD-net-jp@jp.freebsd.org>; Thu, 7 Aug 1997 10:57:11 +0900 (JST)
Received: by dell.ip.elec.mie-u.ac.jp (8.8.6/3.4W4)
	id KAA24693; Thu, 7 Aug 1997 10:57:09 +0900 (JST)
Date: Thu, 7 Aug 1997 10:57:09 +0900 (JST)
From: Hiroshi_Kamabe@ip.elec.mie-u.ac.jp (Hiroshi Kamabe)
Message-Id: <199708070157.KAA24693@dell.ip.elec.mie-u.ac.jp>
To: FreeBSD-net-jp@jp.freebsd.org
In-reply-to: <199708070139.KAA00276@mx1.osk.threewebnet.or.jp> (message from SATOKO KUMAGAI on Thu, 7 Aug 1997 10:39:04 +0900 (JST))
Reply-To: FreeBSD-net-jp@jp.freebsd.org
Precedence: list
X-Distribute: distribute [version 2.1 (Alpha) patchlevel=20]
X-Sequence: FreeBSD-net-jp 32
Subject: [FreeBSD-net-jp 32] Re: tcp_wrapper
Errors-To: owner-FreeBSD-net-jp@jp.freebsd.org
Sender: owner-FreeBSD-net-jp@jp.freebsd.org

$B3yIt$H?=$7$^$9!%(B

>Date: Thu, 7 Aug 1997 10:39:04 +0900 (JST)

> $B$3$s$J$3$H:#99J9$/$HE\$i$l$k$+$bCN$l$^$;$s$,(B....
> hosts.allow$B$G(BIP$B%"%I%l%9$N@)8B$r$7$^$9$h$M!#$=$l$J$N$K(Bhosts.deny$B$G$b(B
>$B$^$?@)8B$9$k$C$F$$$&$N$O$I$&$$$&$3$H$J$s$G$7$g$&$+!)(B
>ALL : ALL$B$H=q$/$3$H$GA4$F$N%"%/%;%9$r6X;_$7$F$$$k$N$K!"(Bhosts.allow$B$G(BOK
>$B$7$?$b$N$,%"%/%;%9$G$-$k!"$H$$$&$N$OL7=b$7$F$$$k$h$&$K;W$&$N$G$9$,(B...

  $B%"%/%;%9$N@)8f$,0J2<$N$h$&$K$J$C$F$$$k$?$a$G$9!%(B

$B!J(Bman 5 hosts_acc$B$+$iH4?h!K(B

ACCESS CONTROL FILES
       The access control software consults two files. The search
       stops at the first match:

       o      Access will be granted when a (daemon,client)  pair
              matches an entry in the /etc/hosts.allow file.

       o      Otherwise,  access  will  be  denied  when  a (dae-
              mon,client)  pair   matches   an   entry   in   the
              /etc/hosts.deny file.

       o      Otherwise, access will be granted.

       A  non-existing  access  control  file is treated as if it
       were an empty file. Thus, access control can be turned off
       by providing no access control files.

-- 
	$B3yIt(B $B9@(B,  $B;0=EBg3X!&9)3XIt!&EE5$EE;R9)3X2J(B
	Hiroshi_Kamabe@ip.elec.mie-u.ac.jp
