Linux Security Configuration TCP Wrappers
At the machine level Check Request Server
What checks the request? External Firewalls (not here) Hosts Allow/Deny Individual servers Firewall software –ipchains –iptables –shorewall
(X)inetd based requests Compare against “host” files inetd Server non-inetd Server
How does it check? hosts.allow hosts.deny lockd: , rquotad: , mountd: , statd: , lockd: ALL mountd: ALL statd: ALL FIRST Check to see if it is allowed. If so pass to server. SECOND Check to see if it is denied. If so do NOT pass to server. LAST If not Allowed OR denied, then pass to server
What does this affect? Remember ONLY those services launched by (X)inetd. And even THEN only those wrapped in TCPwrappers. Services launched at boot/etc are NOT affected.
Recent Development Portmapper
RPC portmapper Portmapper is a program which handles remote procedure calls. Functions similar to inetd except that it handles RPC calls. Portmapper now uses hosts.allow and hosts.deny nfs related services (previously shown) are the ones most likely impacting you.