more_man_pages 2.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869
  1. --- /dev/null
  2. +++ tcp-wrappers-7.6.q/try-from.8
  3. @@ -0,0 +1,28 @@
  4. +.TH TRY-FROM 8 "21th June 1997" Linux "Linux Programmer's Manual"
  5. +.SH NAME
  6. +try-from \- test program for the tcp_wrapper
  7. +.SH SYNOPSIS
  8. +.B try-from
  9. +.SH DESCRIPTION
  10. +The
  11. +.B try\-from
  12. +command can be called via a remote shell command to find out
  13. +if the hostname and address are properly recognized
  14. +by the
  15. +.B tcp_wrapper
  16. +library, if username lookup works, and (SysV only) if the TLI
  17. +on top of IP heuristics work. Diagnostics are reported through
  18. +.BR syslog (3)
  19. +and redirected to stderr.
  20. +
  21. +Example:
  22. +
  23. +rsh host /usr/sbin/try\-from
  24. +
  25. +.SH SEE ALSO
  26. +.BR hosts_access (5),
  27. +.BR hosts_options (5),
  28. +.BR tcpd (8)
  29. +.SH AUTHOR
  30. +Wietse Venema, Eindhoven University of Technology, The Netherlands.
  31. +
  32. --- /dev/null
  33. +++ tcp-wrappers-7.6.q/safe_finger.8
  34. @@ -0,0 +1,34 @@
  35. +.TH SAFE_FINGER 8 "21th June 1997" Linux "Linux Programmer's Manual"
  36. +.SH NAME
  37. +safe_finger \- finger client wrapper that protects against nasty stuff
  38. +from finger servers
  39. +.SH SYNOPSIS
  40. +.B safe_finger [finger_options]
  41. +.SH DESCRIPTION
  42. +The
  43. +.B safe_finger
  44. +command protects against nasty stuff from finger servers. Use this
  45. +program for automatic reverse finger probes from the
  46. +.B tcp_wrapper
  47. +.B (tcpd)
  48. +, not the raw finger command. The
  49. +.B safe_finger
  50. +command makes sure that the finger client is not run with root
  51. +privileges. It also runs the finger client with a defined PATH
  52. +environment.
  53. +.B safe_finger
  54. +will also protect you from problems caused by the output of some
  55. +finger servers. The problem: some programs may react to stuff in
  56. +the first column. Other programs may get upset by thrash anywhere
  57. +on a line. File systems may fill up as the finger server keeps
  58. +sending data. Text editors may bomb out on extremely long lines.
  59. +The finger server may take forever because it is somehow wedged.
  60. +.B safe_finger
  61. +takes care of all this badness.
  62. +.SH SEE ALSO
  63. +.BR hosts_access (5),
  64. +.BR hosts_options (5),
  65. +.BR tcpd (8)
  66. +.SH AUTHOR
  67. +Wietse Venema, Eindhoven University of Technology, The Netherlands.
  68. +