3 serv.access \- Internet service access list
13 file contains a list of rules that guide the access checks made by the
15 function. The file is a text file containing entries that look as follows:
24 Each of the service names is a service name from the
26 file. The same names are used in the
28 configuration file that guides
31 The checks may look as follows:
37 Allow all, or allow none. Used to explicitly set the initial state.
42 Grant access to one of the services if the host name of the remote system
49 Deny access to one of the services if the host name of the remote system
62 Grants or denies access to a remote host with IP address
64 or the remote host whose IP address is within the network
67 tells the number of bits used for the network address, i.e. the top
69 bits of the network address must equal the host address.
74 This is not a check, but a flag that instruct
76 to log the result of the access check whether it succeeds or not to
78 By default only failure is logged.
81 The first "+" or "\-" access check sets the tone. Read it as "access denied
82 unless +...", or "access granted unless \-...". An access check will
83 therefore almost always start with a "+" check. To make the initial state
84 clear you can start with a lone "+" or "\-". Checks are done from left
85 to right. A check that doesn't match does not change the outcome. A check
86 that can't change the outcome is skipped.
88 Both the service and the host names may contain the
90 wildcard that matches any number of characters including none. Letters are
91 compared ignoring case. A service name may appear in more than one rule,
92 but a service mentioned explicitly is not matched by wildcard patterns in
95 A check for a hostname causes
97 to do a reverse lookup on the IP address of the remote host to find its
98 name. This name is then looked up to find the host's IP address(es).
99 If those lookups fail then all
101 checks cause access to be denied, and no
104 The DNS lookup failures may be a
105 misconfiguration, but could indicate a break-in attempt from a badly
106 maintained host. You can use a simple "+*" in an otherwise empty list to
107 just deny misconfigured hosts.
109 An IP or network address check is simply done on the remote hosts IP
110 address. Such a check has no overhead, but a
112 flag will cause a reverse lookup anyway.
114 Comments start with "#" and continue until end of line.
116 Example access file on a machine that offers most services only to hosts within
117 the cs.vu.nl domain, and news (nntp) only to two machines and a specific
123 # Service # Access list
124 login shell: +*.cs.vu.nl log;
125 telnet pop smtp finger: + log;
126 nntp: +flotsam.cs.vu.nl +jetsam.cs.vu.nl
127 +172.16.102.0/24 log;
132 More paranoid example that limits all services by default, but allows ftp and
138 # Service # Access list
141 nntp: +flotsam.cs.vu.nl +jetsam.cs.vu.nl
142 +172.16.102.0/24 log;
147 (Note that the last rule doesn't match any of the services mentioned
152 The service access check file.
158 It may be wise not to put checks on telnet. It is reasonably secure, since
159 it always requires a password, and your only way in if things are seriously
162 IP and DNS based access checks will stop most crackers, but not the really
163 determined ones. Luckily MINIX 3 is sufficiently strange to thwart the well
164 known cracking schemes. But don't ever allow yourself to feel secure.
166 Kees J. Bot <kjb@cs.vu.nl>