Access control for TCP based services
DACinet uses the /etc/rc.dacinet startup file, and the configuration files it uses are /etc/security/priv, /etc/security/services, and /etc/security/acl.
Ports listed in /etc/security/services are considered exempt from the ACL checks. The file has the same format as /etc/services. The easiest way to initialize it is to copy the file from /etc to /etc/security and then delete all the ports for which ACLs should be applied. The ACLs are stored in two places. The currently active ACLs are stored in the kernel and can be read by running dacinet aclls. ACLs that will be reactivated at the next system boot by /etc/rc.tcpip are stored in /etc/security/acl. The following format is used:
service host/prefix-length [user|group]
Where the service can be specified either numerically or as listed in /etc/services, the host can be given either as a host name or a network address with a subnet mask specification and the user or group is specified with the u: or g: prefix. When no user or group is specified, then the ACL takes only the sending host into account. Prefixing the service with a - will disable access explicitly. ACLs are evaluated according to the first match. So you could specify access for a group of users, but explicitly deny it for a user in the group by placing the rule for this user in front of the group rule.
sco_printer 70000/tcp sco_spooler # For System V print IPC
sco_s5_port 70001/tcp lpNet_s5_port # For future use