summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJason McIntyre <jmc@cvs.openbsd.org>2003-06-02 11:47:12 +0000
committerJason McIntyre <jmc@cvs.openbsd.org>2003-06-02 11:47:12 +0000
commit14eeb8ccfb08bca3016156701a9d7444058aae95 (patch)
tree7216f4e5c9bfd94382401b4299a462c635c7d30c
parentffbc2b20d6f53275f7df6b2dcd2b699ee239fefd (diff)
- section reorder
- new sentence, new line
-rw-r--r--lib/libwrap/hosts_access.312
-rw-r--r--lib/libwrap/hosts_access.544
2 files changed, 28 insertions, 28 deletions
diff --git a/lib/libwrap/hosts_access.3 b/lib/libwrap/hosts_access.3
index 497922d72cd..88c49d42ff6 100644
--- a/lib/libwrap/hosts_access.3
+++ b/lib/libwrap/hosts_access.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: hosts_access.3,v 1.10 2003/05/24 18:30:32 jmc Exp $
+.\" $OpenBSD: hosts_access.3,v 1.11 2003/06/02 11:47:10 jmc Exp $
.\"
.\" Copyright (c) 1997, Jason Downs. All rights reserved.
.\"
@@ -122,11 +122,6 @@ variables determine
how accepted and rejected requests may be logged.
They must be provided
by the caller and may be modified by rules in the access control tables.
-.Sh DIAGNOSTICS
-Problems are reported via the syslog daemon.
-.Sh SEE ALSO
-.Xr hosts_access 5 ,
-.Xr hosts_options 5
.Sh FILES
.Bl -tag -width /etc/hosts.allow -compact
.It Pa /etc/hosts.allow
@@ -134,6 +129,11 @@ Access control table (allow list)
.It Pa /etc/hosts.deny
Access control table (deny list)
.El
+.Sh DIAGNOSTICS
+Problems are reported via the syslog daemon.
+.Sh SEE ALSO
+.Xr hosts_access 5 ,
+.Xr hosts_options 5
.Sh AUTHORS
.Bd -unfilled -offset indent
Wietse Venema (wietse@wzv.win.tue.nl)
diff --git a/lib/libwrap/hosts_access.5 b/lib/libwrap/hosts_access.5
index 06ae23d6d57..35c4f1aadad 100644
--- a/lib/libwrap/hosts_access.5
+++ b/lib/libwrap/hosts_access.5
@@ -1,4 +1,4 @@
-.\" $OpenBSD: hosts_access.5,v 1.16 2003/01/18 23:40:57 deraadt Exp $
+.\" $OpenBSD: hosts_access.5,v 1.17 2003/06/02 11:47:11 jmc Exp $
.\"
.\" Copyright (c) 1997, Jason Downs. All rights reserved.
.\"
@@ -56,8 +56,8 @@ In the following text,
.Ar daemon
is the process name of a network daemon process, and
.Ar client
-is the name and/or address of a host requesting service. Network daemon
-process names are specified in the inetd configuration file.
+is the name and/or address of a host requesting service.
+Network daemon process names are specified in the inetd configuration file.
.Sh ACCESS CONTROL FILES
The access control software consults two files.
The search stops at the first match:
@@ -218,10 +218,10 @@ host names may be unavailable due to temporary name server problems.
A network address will be unavailable when the software cannot figure out
what type of network it is talking to.
.\" .IP PARANOID
-.\" Matches any host whose name does not match its address. When tcpd is
-.\" built with -DPARANOID (default mode), it drops requests from such
-.\" clients even before looking at the access control tables. Build
-.\" without -DPARANOID when you want more control over such requests.
+.\" Matches any host whose name does not match its address.
+.\" When tcpd is built with -DPARANOID (default mode), it drops requests
+.\" from such clients even before looking at the access control tables.
+.\" Build without -DPARANOID when you want more control over such requests.
.El
.Sh OPERATORS
.IP EXCEPT
@@ -503,6 +503,13 @@ On network firewall systems this trick can be carried even further.
The typical network firewall only provides a limited set of services to
the outer world. All other services can be "bugged" just like the above
tftp example. The result is an excellent early-warning system.
+.Sh FILES
+.Bl -tag -width /etc/hosts.allow -compact
+.It Pa /etc/hosts.allow
+Access control table (allow list)
+.It Pa /etc/hosts.deny
+Access control table (deny list)
+.El
.Sh DIAGNOSTICS
An error is reported when a syntax error is found in a host access
control rule; when the length of an access control rule exceeds the
@@ -511,17 +518,18 @@ terminated by a newline character; when the result of %<letter>
expansion would overflow an internal buffer; when a system call fails
that shouldn\'t.
All problems are reported via the syslog daemon.
-.Sh FILES
-.Bl -tag -width /etc/hosts.allow -compact
-.It Pa /etc/hosts.allow
-Access control table (allow list)
-.It Pa /etc/hosts.deny
-Access control table (deny list)
-.El
.Sh SEE ALSO
.Xr tcpd 8 ,
.Xr tcpdchk 8 ,
.Xr tcpdmatch 8
+.Sh AUTHORS
+.Bd -unfilled -offset indent
+Wietse Venema (wietse@wzv.win.tue.nl)
+Department of Mathematics and Computing Science
+Eindhoven University of Technology
+Den Dolech 2, P.O. Box 513,
+5600 MB Eindhoven, The Netherlands
+.Ed
.Sh BUGS
If a name server lookup times out, the host name will not be available
to the access control software, even though the host is registered.
@@ -531,12 +539,4 @@ netgroup lookups are case sensitive.
.Pp
The total length of an entry can be no more than 2047 characters long,
including the final newline.
-.Sh AUTHORS
-.Bd -unfilled -offset indent
-Wietse Venema (wietse@wzv.win.tue.nl)
-Department of Mathematics and Computing Science
-Eindhoven University of Technology
-Den Dolech 2, P.O. Box 513,
-5600 MB Eindhoven, The Netherlands
-.Ed
\" @(#) hosts_access.5 1.20 95/01/30 19:51:46