Provided by: tcpd_7.6.q-32_amd64 bug

NAME

       tcpdmatch - tcp wrapper oracle

SYNOPSIS

       tcpdmatch [-d] [-i inet_conf] daemon client

       tcpdmatch [-d] [-i inet_conf] daemon[@server] [user@]client

DESCRIPTION

       tcpdmatch  predicts  how  the  tcp  wrapper  would  handle a specific request for service.
       Examples are given below.

       The program  examines  the  tcpd  access  control  tables  (default  /etc/hosts.allow  and
       /etc/hosts.deny)  and prints its conclusion.  For maximal accuracy, it extracts additional
       information from your inetd network configuration file.

       When tcpdmatch finds a match in the access control tables, it identifies the matched rule.
       In  addition,  it  displays  the  optional  shell  commands or options in a pretty-printed
       format; this makes it easier for you to spot any discrepancies between what you  want  and
       what the program understands.

ARGUMENTS

       The following two arguments are always required:

       daemon A  daemon  process  name.  Typically,  the  last  component  of a daemon executable
              pathname.

       client A host name or network address, or one of  the  `unknown´  or  `paranoid´  wildcard
              patterns.

              When a client host name is specified, tcpdmatch gives a prediction for each address
              listed for that client.

              When a client address is specified, tcpdmatch predicts  what  tcpd  would  do  when
              client name lookup fails.

       Optional information specified with the daemon@server form:

       server A  host  name  or  network  address, or one of the `unknown´ or `paranoid´ wildcard
              patterns. The default server name is `unknown´.

       Optional information specified with the user@client form:

       user   A client user identifier. Typically, a login name or a numeric userid.  The default
              user name is `unknown´.

OPTIONS

       -d     Examine  hosts.allow  and  hosts.deny files in the current directory instead of the
              default ones.

       -i inet_conf
              Specify this option when tcpdmatch  is  unable  to  find  your  inetd.conf  network
              configuration file, or when you suspect that the program uses the wrong one.

EXAMPLES

       To predict how tcpd would handle a telnet request from the local system:

            tcpdmatch in.telnetd localhost

       The same request, pretending that hostname lookup failed:

            tcpdmatch in.telnetd 127.0.0.1

       To predict what tcpd would do when the client name does not match the client address:

            tcpdmatch in.telnetd paranoid

       On  some  systems,  daemon  names have no `in.´ prefix, or tcpdmatch may need some help to
       locate the inetd configuration file.

FILES

       The default locations of the tcpd access control tables are:

       /etc/hosts.allow
       /etc/hosts.deny

SEE ALSO

       tcpdchk(8), tcpd configuration checker
       hosts_access(5), format of the tcpd access control tables.
       hosts_options(5), format of the language extensions.
       inetd.conf(5), format of the inetd control file.

AUTHORS

       Wietse Venema (wietse@wzv.win.tue.nl),
       Department of Mathematics and Computing Science,
       Eindhoven University of Technology
       Den Dolech 2, P.O. Box 513,
       5600 MB Eindhoven, The Netherlands

                                                                                     TCPDMATCH(8)