icon Top 9 categories map      RocketAware > man pages >


Tips: Browse or Search all pages for efficient awareness of more than 6000 of the most popular reusable and open source applications, functions, libraries, and FAQs.

The "RKT couplings" below include links to source code, updates, additional information, advice, FAQs, and overviews.


Search all pages


By activity
Professions, Sciences, Humanities, Business, ...

User Interface
Text-based, GUI, Audio, Video, Keyboards, Mouse, Images,...

Text Strings
Conversions, tests, processing, manipulation,...

Integer, Floating point, Matrix, Statistics, Boolean, ...

Algorithms, Memory, Process control, Debugging, ...

Stored Data
Data storage, Integrity, Encryption, Compression, ...

Networks, protocols, Interprocess, Remote, Client Server, ...

Hard World
Timing, Calendar and Clock, Audio, Video, Printer, Controls...

File System
Management, Filtering, File & Directory access, Viewers, ...


RocketLink!--> Man page versions: OpenBSD FreeBSD RedHat Others

HOSTS_ACCESS(3)           OpenBSD Programmer's Manual          HOSTS_ACCESS(3)

     hosts_access, hosts_ctl, request_init, request_set - access control li-

     #include <tcpd.h>

     extern int allow_severity;
     extern int deny_severity;

     struct request_info *
     request_init(struct request_info *request, int key, value, ..., 0);

     struct request_info *
     request_set(struct request_info *request, int key, value, ..., 0);

     hosts_access(struct request_info *request);

     hosts_ctl(char *daemon, char *client_name, char *client_addr,
             char *client_user);

     The routines described in this document are part of the libwrap.a li-
     brary.  They implement a rule-based access control language with optional
     shell commands that are executed when a rule fires.

     request_init() initializes a structure with information about a client
     request.  request_set() updates an already initialized request structure.
     Both functions take a variable-length list of key-value pairs and return
     their first argument.  The argument lists are terminated with a zero key
     value.  All string-valued arguments are copied.  The expected keys (and
     corresponding value types) are:

     RQ_FILE (int)             The file descriptor associated with the re-

     RQ_CLIENT_NAME (char *)   The client host name.

     RQ_CLIENT_ADDR (char *)   A printable representation of the client net-
                               work address.

     RQ_CLIENT_SIN (struct sockaddr_in *)
                               An internal representation of the client net-
                               work address and port.  The contents of the
                               structure are not copied.

     RQ_SERVER_NAME (char *)   The hostname associated with the server end-
                               point address.

     RQ_SERVER_ADDR (char *)   A printable representation of the server end-
                               point address.

     RQ_SERVER_SIN (struct sockaddr_in *)
                               An internal representation of the server end-
                               point address and port.  The contents of the
                               structure are not copied.

     RQ_DAEMON (char *)        The name of the daemon process running on the
                               server host.

     RQ_USER (char *)          The name of the user on whose behalf the client
                               host makes the request.

     hosts_access() consults the access control tables described in the
     hosts_access(5) manual page.  When internal endpoint information is
     available, host names and client user names are looked up on demand, us-
     ing the request structure as a cache.  hosts_access() returns zero if ac-
     cess should be denied.

     hosts_ctl() is a wrapper around the request_init() and hosts_access()
     routines with a perhaps more convenient interface (though it does not
     pass on enough information to support automated client username lookups).
     The client host address, client host name and username arguments should
     contain valid data or STRING_UNKNOWN.  hosts_ctl() returns zero if access
     should be denied.

     The allow_severity and deny_severity variables determine how accepted and
     rejected requests may be logged. They must be provided by the caller and
     may be modified by rules in the access control tables.

     Problems are reported via the syslog daemon.

     hosts_access(5),  hosts_options(5).

     /etc/hosts.allow  Access control table (allow list)
     /etc/hosts.deny   Access control table (deny list)

     hosts_access() uses the strtok() library function. This may interfere
     with other code that relies on strtok().

           Wietse Venema (wietse@wzv.win.tue.nl)
           Department of Mathematics and Computing Science
           Eindhoven University of Technology
           Den Dolech 2, P.O. Box 513,
           5600 MB Eindhoven, The Netherlands

OpenBSD 2.6                      June 23, 1997                               2

Source: OpenBSD 2.6 man pages. Copyright: Portions are copyrighted by BERKELEY
SOFTWARE DESIGN, INC., The Regents of the University of California, Massachusetts
Institute of Technology, Free Software Foundation, FreeBSD Inc., and others.

(Corrections, notes, and links courtesy of RocketAware.com)

[Detailed Topics]
OpenBSD sources for hosts_access(3)

[Overview Topics]

Up to: Remote Process Communication - Methods of communicating to remote processes. Remote Procedure Calls, sockets, data format translation, et al

RocketLink!--> Man page versions: OpenBSD FreeBSD RedHat Others

Rapid-Links: Search | About | Comments | Submit Path: RocketAware > man pages > hosts_access.3/
RocketAware.com is a service of Mib Software
Copyright 1999, Forrest J. Cavalier III. All Rights Reserved.
We welcome submissions and comments