On Jul 3, 2015, at 8:45 AM, Sami Mäntysaari <s...@sami-mantysaari.com> wrote:

> /etc/hosts.allow:
> <code>
> # /etc/hosts.allow: list of hosts that are allowed to access the system.
> #                   See the manual pages hosts_access(5) and
> hosts_options(5).
> #
> # Example:    ALL: LOCAL @some_netgroup
> #             ALL: .foobar.edu EXCEPT terminalserver.foobar.edu
> #
> # If you're going to protect the portmapper use the name "rpcbind" for the
> # daemon name. See rpcbind(8) and rpc.mountd(8) for further information.
> #
> 
> upsd : admin at localhost : ALLOW
> </code>

I started looking into this a bit more. There are a few debug statements we 
could add to the upsd source code, but to be honest, my personal preference is 
to use a kernel-level firewall and/or bind to the localhost interface, rather 
than use tcp_wrappers and hosts.allow.

By default, upsd will listen to localhost:3943 (unless you add additional 
LISTEN statements to upsd.conf, or compile in a different listening address). 
So commenting out the "upsd:..." line in /etc/hosts.allow should work.

If your upsd.conf had extra LISTEN statements, you will need to completely 
restart upsd (the "upsd -c reload" only works for basic configuration changes).

-- 
Charles Lepple
clepple@gmail




_______________________________________________
Nut-upsuser mailing list
Nut-upsuser@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/nut-upsuser

Reply via email to