Index | Directory | Calendar | Contact ASU | Campuses: Main West East Extended
  Arizona State University
  Unix Network Users Group

 Search:
  


  
tcp_wrapper

UNUG Home
Up
Ports
Sendmail
tcp_wrapper
PGP
Firewalls
Linux
Sun OS
Web
setuid
tcpdump
CERT/Hacker Reports
Vendor
SSH
Monitor
Kerberos
AFS
Xhosts
r Command
su_users
Installation
Virus, Trojan, Worm, etc.
Filesystem
Passwords
Monitor Logs
Physical Security
User Management

 

3.  Tcp_wrapper

A tcp_wrapper is a security tool that will enable an administrator to control what IP addresses can have access to certain configurable ports.  If your system does not need to be open to the world, then one of the best practices that can be applied is to install and configure a tcp_wrapper.  The latest version of tcp_wrapper is available at ftp://ftp.cert.org/pub/tools/tcp_wrappers/.  You will need to download and compile the source (more information is available in README files).  Some administrators may consider the tcp_wrapper one of the most valuable tools since it prevents hackers from gaining login access through conventional means.

The administrator should start with a default "noone can get in" by adding an "all: all" line in hosts.deny and then specifically grant access to hosts that need it in hosts.allow.

One feature of tcp_wrapper is the ability to execute your own script just prior to the system executing a vital program like telnet or ftp.  This allows you to do a number of things.  For example, your script could log the IP address and domain name of every connection attempt.  It could send you an email if the connection attempt is not what you might expect.  Or, it could even run finger back to the IP address of the machine that is making the connection.  Obviously, this can be a very powerful tool and allows you to decide who and who can’t log into your system.

 Copyright © Arizona Board of Regents

Updated: 10/13/00