hosts.allow 1.3 KB

1234567891011121314151617181920212223242526272829303132333435
  1. ##
  2. ## hosts.allow -- TCP Wrappers Host Access Control List
  3. ##
  4. # NOTE: The hosts.deny file is deprecated. Place both 'allow' and
  5. # 'deny' rules in the hosts.allow file. See hosts_options(5) for the
  6. # format of this file. hosts_access(5) no longer fully applies.
  7. # Start by allowing everything (this prevents the rest of the file
  8. # from working, so remove it when you need protection).
  9. # The rules here work on a "First match wins" basis.
  10. ALL : ALL : allow
  11. # OpenSSH sshd(8)
  12. #sshd : .evil.cracker.example.com : deny
  13. # Protect against simple DNS spoofing attacks by checking that the
  14. # forward and reverse records for the remote host match. If a mismatch
  15. # occurs, access is denied, and any positive ident response within 20
  16. # seconds is logged. No protection is afforded against DNS poisoning,
  17. # IP spoofing or more complicated attacks. Hosts with no reverse DNS
  18. # pass this rule.
  19. #ALL : PARANOID : RFC931 20 : deny
  20. # Allow anything from localhost. Note that an IP address (not a host
  21. # name) *MUST* be specified for portmap(8).
  22. #ALL : localhost 127.0.0.1 : allow
  23. #ALL : my.machine.example.com 192.168.0.1 : allow
  24. # The rest of the daemons are protected.
  25. ALL : ALL \
  26. : severity auth.info \
  27. : twist /bin/echo "You are not welcome to use %d from %h."