|
TCP wrappers is installed by default with a server-class installation of Red Hat Linux 8.0 and provides access control to a variety of services. Most modern network services, such as SSH, Telnet, and FTP, make use of TCP wrappers, a program designed to stand guard between an incoming request and the requested service. The idea behind TCP wrappers is that client requests to server applications are “wrapped” by an authenticating service, allowing a greater degree of access control and logging for anyone attempting to use the service.
The functionality behind TCP wrappers is provided by libwrap.a, a library that network services, such as xinetd, sshd, and portmap, are compiled against. Additional network services, even networking programs you may write, can be compiled against libwrap.a to provide this functionality. Red Hat Linux bundles the necessary TCP wrapper programs and library in the tcp_wrappers-version RPM file.
When a user attempts to gain client access to a network service that is using TCP wrappers, a small wrapper program reports the name of the service requested and the client’s host information. The wrapper program does not directly send any information back to the client, and after the access control directives are satisfied, the wrapper is unloaded and frees up its resources. The client and the server can then resume actions without further wrapper intervention. TCP wrappers provide two basic advantages over other network service control techniques:
The connecting client is unaware that TCP wrappers are in use. Legitimate users will not notice anything different, and attackers never receive any additional information about why their attempted connections have failed.
TCP wrappers operate separately from the applications the wrapper program protects. This allows many server applications to share a common set of configuration files for simpler management.
|