![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.150087 |
Category: | Policy |
Title: | Linux: /etc/hosts.allow content |
Summary: | The access control software consults two files. The search stops;at the first match:;; - Access will be granted when a (daemon, client) pair matches an entry in the /etc/hosts.allow file.;; - Otherwise, access will be denied when a (daemon, client) pair matches an entry in the /etc/hosts.deny file.;; - Otherwise, access will be granted.;;A non-existing access control file is treated as if it were an empty file. Thus, access control can;be turned off by providing no access control files.;;Note: This script shows the content of /etc/hosts.allow file only. |
Description: | Summary: The access control software consults two files. The search stops at the first match: - Access will be granted when a (daemon, client) pair matches an entry in the /etc/hosts.allow file. - Otherwise, access will be denied when a (daemon, client) pair matches an entry in the /etc/hosts.deny file. - Otherwise, access will be granted. A non-existing access control file is treated as if it were an empty file. Thus, access control can be turned off by providing no access control files. Note: This script shows the content of /etc/hosts.allow file only. CVSS Score: 0.0 CVSS Vector: AV:L/AC:H/Au:S/C:N/I:N/A:N |
Copyright | Copyright (C) 2020 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |