AW: [suse-security] tcp-wrapper-/-logs
![](https://seccdn.libravatar.org/avatar/c64c2eacb8f713e5e3fd051c8a060920.jpg?s=120&d=mm&r=g)
Yes, there is tcpd (package networking), which is called for each daemon started by inetd. But you can also choose ssl_wrap (package security), which can lead to problems with clients, who are not capable of ssl-encryption (telnet, ftp, ...). I didn't find a log-file either, so perhaps one of suse can answer this question? -----Ursprüngliche Nachricht----- Von: da_bug [mailto:da_bug@gmx.net] Gesendet: Mittwoch, 17. Oktober 2001 18:03 An: suse-security@suse.com Betreff: [suse-security] tcp-wrapper-/-logs Hi! Has Suse 7.2 or 7.3 in the default-install a tcp-wrapper running? If so which one? ..and how can I generally find out if there is a wrapper or something like this running? ..and where is the log-file? (I didn't find one... like /var/log/secure as in many distributions) Thanks & Bye ;-) -- To unsubscribe, e-mail: suse-security-unsubscribe@suse.com For additional commands, e-mail: suse-security-help@suse.com
![](https://seccdn.libravatar.org/avatar/360c89473e19c7f8c9fe5ca60e12f8ce.jpg?s=120&d=mm&r=g)
* Peer Stefan wrote on Thu, Oct 18, 2001 at 08:13 +0200:
I didn't find a log-file either, so perhaps one of suse can answer this question?
By default it logs via syslog to /var/log/messsage (or another file, depends on /etc/syslog.conf). Example output: Oct 24 12:18:21 dx in.fingerd[6804]: refused connect from root@127.0.0.1 (127.0.0.1) You can use "spwan" to do additional things: [hosts.allow] in.telnetd: *.local echo "teln\:`/usr/sbin/logdate` %d %u@%h" | /var/log/access/Pallowed Pallowed is a kinde of filter. You could use: in.telnetd: *.local echo "teln\:`/bin/date` %d %u@%h" > /var/log/mylog or whatever. oki, Steffen -- Dieses Schreiben wurde maschinell erstellt, es trägt daher weder Unterschrift noch Siegel.
participants (2)
-
Peer Stefan
-
Steffen Dettmer