Host protection in the past was typically performed with application layer checks on the originating IP or hostname. This was (and still is) frequently accomplished with libwrap, which verifies whether or not to allow a connection based on the contents of the system wide configuration files /etc/hosts.allow and /etc/hosts.deny.
Host protection is one part of protecting a host, by preventing inbound packets from reaching higher layers. This is no substitute for tight application layer security. Strong network and host-level packet filters mitigate a host's exposure when it is connected to a network.
Example 7.1. Blocking a destination and using the REJECT target, cf. Example D.17, “Adding a prohibit route with route add”
|
本文探讨了传统的主机保护方式,包括使用libwrap验证连接请求,并通过配置文件实现允许或拒绝连接的功能。此外,还介绍了如何利用iptables阻止特定目的地的连接请求,并通过REJECT目标拒绝连接。
1336

被折叠的 条评论
为什么被折叠?



