Lines Matching full:access
3 hosts_access \- format of host access control files
5 This manual page describes a simple access control language that is
11 An extended version of the access control language is described in the
19 .SH ACCESS CONTROL FILES
20 The access control software consults two files. The search stops
23 Access will be granted when a (daemon,client) pair matches an entry in
26 Otherwise, access will be denied when a (daemon,client) pair matches an
29 Otherwise, access will be granted.
31 A non-existing access control file is treated as if it were an empty
32 file. Thus, access control can be turned off by providing no access
34 .SH ACCESS CONTROL RULES
35 Each access control file consists of zero or more lines of text. These
66 With the exception of NIS (YP) netgroup lookups, all access control
70 The access control language implements the following patterns:
107 The access control language supports explicit wildcards:
127 clients even before looking at the access control tables. Build
141 If the first-matched access control rule contains a shell command, that
264 The language is flexible enough that different types of access control
266 uses two access control tables, the most common policies can be
271 terminates when a match is found, and that access is granted when no
278 In this case, access is denied by default. Only explicitly authorized
279 hosts are permitted access.
281 The default policy (no access) is implemented with a trivial deny
289 This denies all service to all hosts, unless they are permitted access
302 The first rule permits access from hosts in the local domain (no `.\'
304 netgroup. The second rule permits access from all hosts in the
308 Here, access is granted by default; only explicitly specified hosts are
311 The default policy (access granted) makes the allow file redundant so
361 An error is reported when a syntax error is found in a host access
362 control rule; when the length of an access control rule exceeds the
363 capacity of an internal buffer; when an access control rule is not
376 /etc/hosts.allow, (daemon,client) pairs that are granted access.
377 /etc/hosts.deny, (daemon,client) pairs that are denied access.
386 to the access control software, even though the host is registered.