home *** CD-ROM | disk | FTP | other *** search
- #
- # $Id: inet.access,v 4.3 1994/10/02 23:06:51 jraja Exp $
- #
- # Access control list for AmiTCP/IP.
- #
- # Copyright © 1994 AmiTCP/IP Group,
- # Network Solutions Development Inc.
- # All rights reserved.
- #
- ;
- ; Comments are from ';' or '#' to end of line
- ;
- ; AmiTCP/IP implements an access control feature similar to `tcpd' inside the
- ; protocol stack. This means connection doesn't even get established if the
- ; connection is to be denied, remote end just gets the usual
- ; `connection refused' error message.
- ;
- ; NOTE: The access control is functional on the commercial version of the
- ; AmiTCP/IP only.
- ;
- ; When connection request arrives, the access entry list is searched through
- ; sequentially line by line until a match is found. Access entry lines looks
- ; like the following...
- ;
- ; <service> <host/mask> <access> [LOG]
- ;
- ; It is first checked whether the port where connection is made matches the
- ; port given <service>. Service can be given as a port number, already parsed
- ; netdb service entry, or `*' or `@', meaning that check host for every
- ; destination port or every privileged destination port, respectively.
- ;
- ; Now, if port matched the source host internet address is compared with the
- ; host value given in current access entry. Mask can be used to ignore some
- ; bits when comparing, for example whole subnet can be checked with only one
- ; entry in access control list. The host value may also contain that mask
- ; information by having `*' in place of some number in host value given in
- ; internet not notation format (see the examples).
- ;
- ; If host matched, The next thing to do is to see whether connection is to
- ; be accepted or not. if <access> says `allow' connection is to be established,
- ; if `deny' connection request is dropped.
- ;
- ; If LOG is written last in the access entry list, Info whether connection
- ; was accepted or denied, with corresponding remote host and destination port
- ; is written to the syslog.
- ;
- ; *Example list
- ;
- ; Service Host[/Mask] Access [LOG]
- ;
- ; finger 127.1 allow LOG
- ; * 130.233.*.* allow
- ; nntp 130.233.0/255.252.0.0 allow LOG
- ; @ *.*.*.* deny
- ; * *.*.*.* allow LOG
- ;
- ; The list tells that finger queries from local host is to be logged. (2)
- ; All connections from hosts whose addresses start with 130.233 are to be
- ; allowed and (3) hosts in a bit wider set of class b -networks can access
- ; nntpd server of this host. and these connections will be logged.
- ; Next line tells that connections to any incoming privileged ports are to
- ; be disallowed and the last one will then allow the rest ports and this
- ; activity will be logged. Without this line these connections would be
- ; accepted silently, since that would be the default operation if no matches
- ; were found.
- ; The last 2 lines in that example are quite useful. It doesn't permit ftp to
- ; work since it binds a data transfer socket greater than 1023, but it
- ; disallows unwanted hosts to access normal features effectively. Some
- ; nonstandard services, such as netfs and irc can then be access controlled
- ; with port-spesific entries in this access control list.
-
- ;Service Host[/Mask] Access [LOG]
- ; *** add your entries here ***
-
- ###
- ## Emacs magic:
- ## Local Variables: **
- ## backup-by-copying:t **
- ## End: **
- ###
- ; EOF
-
-