home *** CD-ROM | disk | FTP | other *** search
- @(#) BLURB 1.9 93/07/02 16:33:34
-
- With the programs that come with this kit you can monitor and control
- who connects to your TFTP, EXEC, FTP, RSH, TELNET, RLOGIN, FINGER, and
- SYSTAT network services, and many others.
-
- Optional features are: access control based on pattern matching; remote
- username lookup using the RFC 931 protocol; protection against attacks
- from hosts that pretend to have someone elses name; protection against
- attacks from hosts that pretend to have someone elses network address.
-
- The programs can be installed without requiring any changes to existing
- software or configuration files. By default, they just log the remote
- host name and do some sanity checks on the origin the request. No
- information is exchanged with the remote client process.
-
- The most notable differences with respect to the previous release are:
-
- - Support for System V.4-style TLI, a protocol-independent network
- programming interface. When the programs find out that TCP/IP is
- being used underneath TLI, they behave exactly as in the case of
- socket-based applications. In case of other underlying protocols,
- the optional remote username lookups will not work, and the network
- address information is in some generic universal format so that
- net/mask patterns will probably not work either.
-
- The default mode of operation (no TLI support) should be identical to
- earlier versions.
-
- Wietse Venema (wietse@wzv.win.tue.nl),
- Department of Mathematics and Computing Science,
- Eindhoven University of Technology,
- The Netherlands.
-