Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 14 Oct 2004 13:59:25 +0400
From:      Denis Peplin <den@FreeBSD.org>
To:        freebsd-doc@FreeBSD.org, Tom Rhodes <trhodes@FreeBSD.org>
Subject:   TCP Wrappers section (handbook/security): services is not daemons
Message-ID:  <416E4DFD.3040203@FreeBSD.org>

next in thread | raw e-mail | index | archive | help
This is a multi-part message in MIME format.
--------------000609030204040806050200
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit

Hello!

Please, look at patch attached.

I will commit it if no objections.

--------------000609030204040806050200
Content-Type: text/plain;
 name="srv_d.diff"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline;
 filename="srv_d.diff"

Index: security/chapter.sgml
===================================================================
RCS file: /home/dcvs/doc/en_US.ISO8859-1/books/handbook/security/chapter.sgml,v
retrieving revision 1.228
diff -u -r1.228 chapter.sgml
--- security/chapter.sgml	3 Oct 2004 23:35:59 -0000	1.228
+++ security/chapter.sgml	14 Oct 2004 09:53:40 -0000
@@ -1482,9 +1482,9 @@
 
     <para>The <acronym>TCP</acronym> Wrappers software extends the
       abilities of <command>inetd</command> to provide support for
-      every server daemon under its control.  Using this method it
+      every service under its control.  Using this method it
       is possible to provide logging support, return messages to
-      connections, permit a daemon to only accept internal connections,
+      connections, permit a service to only accept internal connections,
       etc.  While some of these features can be provided by implementing
       a firewall, this will add not only an extra layer of protection
       but go beyond the amount of control a firewall can
@@ -1520,16 +1520,16 @@
 	  in <filename>/etc/hosts.allow</filename>.</para>
       </note>
 
-      <para>In the simplest configuration, daemon connection policies
+      <para>In the simplest configuration, service connection policies
 	are set to either be permitted or blocked depending on the
 	options in <filename>/etc/hosts.allow</filename>.  The default
-	configuration in &os; is to allow a connection to every daemon
+	configuration in &os; is to allow a connection to every service
 	started with <command>inetd</command>.  Changing this will be
 	discussed only after the basic configuration is covered.</para>
 
       <para>Basic configuration usually takes the form of
-	<literal>daemon : address : action</literal>.  Where
-	<literal>daemon</literal> is the daemon name which
+	<literal>service : address : action</literal>.  Where
+	<literal>service</literal> is the service name which
 	<command>inetd</command> started.  The
 	<literal>address</literal> can be a valid hostname, an
 	<acronym>IP</acronym> address or an IPv6 address enclosed in
@@ -1544,7 +1544,7 @@
 	in a later section.  A simple configuration line may easily be
 	constructed from that information alone.  For example, to
 	allow <acronym>POP</acronym>3 connections via the
-	<filename role="package">mail/qpopper</filename> daemon,
+	<filename role="package">mail/qpopper</filename> service,
 	the following lines should be appended to
 	<filename>hosts.allow</filename>:</para>
 
@@ -1564,7 +1564,7 @@
 	options too; they will allow for more control over the
 	way connections are handled.  In some cases it may be
 	a good idea to return a comment to certain hosts or
-	daemon connections.  In other cases, perhaps a log file
+	service connections.  In other cases, perhaps a log file
 	should be recorded or an email sent to the administrator.
 	Other situations may require the use of a service for local
 	connections only.  This	is all possible through the use of
@@ -1584,15 +1584,15 @@
 	  execute a shell command or script.  An example already exists
 	  in the <filename>hosts.allow</filename> file:</para>
 
-	<programlisting># The rest of the daemons are protected.
+	<programlisting># The rest of the services are protected.
 ALL : ALL \
         : severity auth.info \
         : twist /bin/echo "You are not welcome to use %d from %h."</programlisting>
 
 	<para>This example shows that the message,
-	  <quote>You are not allowed to use <literal>daemon</literal>
+	  <quote>You are not allowed to use <literal>service</literal>
 	  from <literal>hostname</literal>.</quote> will be returned
-	  for any daemon not previously configured in the access file.
+	  for any service not previously configured in the access file.
 	  This is extremely useful for sending a reply back to the
 	  connection initiator right after the established connection
 	  is dropped.  Note that any message returned
@@ -1603,7 +1603,7 @@
 	<warning>
 	  <para>It may be possible to launch a denial of service attack
 	    on the server if an attacker, or group of attackers could
-	    flood these daemons with connection requests.</para>
+	    flood these services with connection requests.</para>
 	</warning>
 
 	<para>Another possibility is to use the <option>spawn</option>
@@ -1624,7 +1624,7 @@
 	<para>This will deny all connection attempts from the
 	  <hostid role="fqdn">*.example.com</hostid> domain;
 	  simultaneously logging the hostname, <acronym>IP</acronym>
-	  address and the daemon which they attempted to access in the
+	  address and the service which they attempted to access in the
 	  <filename>/var/log/connections.log</filename> file.</para>
 
 	<para>Aside from the already explained substitution characters
@@ -1639,7 +1639,7 @@
 	  continuously throughout the examples.  Other options exist
 	  which could extend the functionality a bit further.  For
 	  instance, <literal>ALL</literal> may be used to match every
-	  instance of either a daemon, domain or an
+	  instance of either a service, domain or an
 	  <acronym>IP</acronym> address. Another wildcard available is
 	  <literal>PARANOID</literal> which may be used to match any
 	  host which provides an <acronym>IP</acronym> address that may

--------------000609030204040806050200--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?416E4DFD.3040203>