Re: Security with TCP Wrappers

2002-10-28 Thread Jay Scrivner
Dave, You are going to need to restart your network services for TCP Wrappers to take effect: ex., /etc/init.d/network restart Your hosts.deny file should have in it ALL:ALL to deny access via any service from any IP address. If you want to allow access from one specific IP address: ALL:xxx

RE: Security with TCP Wrappers

2002-10-28 Thread David Davenport
alf Of Emmanuel Seyman Sent: 28 October 2002 16:14 To: [EMAIL PROTECTED] Subject: Re: Security with TCP Wrappers On Mon, Oct 28, 2002 at 03:10:52PM -, David Davenport wrote: > > RE: Security with TCP WrappersIt appears that whatever I enter in these > files I can still get access via

Re: Security with TCP Wrappers

2002-10-28 Thread Michael Schwendt
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Mon, 28 Oct 2002 17:14:00 +0100, Emmanuel Seyman wrote: > > RE: Security with TCP WrappersIt appears that whatever I enter in > > these files I can still get access via telnet form any maching (even > > if I add single ip exclusions). Is there any

Re: Security with TCP Wrappers

2002-10-28 Thread Emmanuel Seyman
On Mon, Oct 28, 2002 at 03:10:52PM -, David Davenport wrote: > > RE: Security with TCP WrappersIt appears that whatever I enter in these > files I can still get access via telnet form any maching (even if I add > single ip exclusions). Is there any way that something is set elsewhere so > that

RE: Security with TCP Wrappers

2002-10-28 Thread David Davenport
Title: RE: Security with TCP Wrappers It appears that whatever  I enter in these files I can still get access via telnet form any maching (even if I add single ip exclusions). Is there any way that something is set elsewhere so that these files are being ignored? -Original Message

RE: Security with TCP Wrappers

2002-10-28 Thread aljuhani
Hi. No there is not need to start xinetd or any other service. Saving any changes to hosts.allow or .deny will make whatever in there applied. Al-Juhani [EMAIL PROTECTED] >= Original Message From [EMAIL PROTECTED] = >On Mon, Oct 28, 2002 at 11:26:53AM -, David Davenport wrote: >> >>

RE: Security with TCP Wrappers

2002-10-28 Thread Spanke, Alexander
Title: RE: Security with TCP Wrappers Hi, For an Subnet, your entry in the hosts.allow should be     in.telnetd : 192.168.1.0/255.255.255.0 Change the Ip Adress and Subnetmask to your, that should be all Alex  -Original Message- From:   David Davenport [mailto:[EMAIL

Re: Security with TCP Wrappers

2002-10-28 Thread Michael Schwendt
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Mon, 28 Oct 2002 11:26:53 -, David Davenport wrote: > I am trying to disable telnet access from certain systems/subnets to a > Linux Server. I understand this can be acheievd by adding entries to > the hosts.allow and hosts.deny files. > > I h

RE: Security with TCP Wrappers

2002-10-28 Thread aljuhani
in the hosts.allow enter: in.telnetd: x.x.x. where x.x.x. is the IP address of your address also you need to add localhost as below: in.telnetd: localhost IP_Address1 IP_Address2 IP_Address3 in the hosts.deny add the following: ALL: ALL to block all and only allow any hosts under hosts.allow

RE: Security with TCP Wrappers

2002-10-28 Thread David Davenport
Hi Emmanuel I tried that - still no luck.. -Original Message- From: [EMAIL PROTECTED] [mailto:redhat-list-admin@;redhat.com]On Behalf Of Emmanuel Seyman Sent: 28 October 2002 11:52 To: [EMAIL PROTECTED] Subject: Re: Security with TCP Wrappers On Mon, Oct 28, 2002 at 11:26:53AM

Re: Security with TCP Wrappers

2002-10-28 Thread Emmanuel Seyman
On Mon, Oct 28, 2002 at 11:26:53AM -, David Davenport wrote: > > Am I missing something? I think you need to restart xinetd for it to read the /etc/host.* files. Emmanuel -- redhat-list mailing list unsubscribe mailto:redhat-list-request@;redhat.com?subject=unsubscribe https://listman.re

Security with TCP Wrappers

2002-10-28 Thread David Davenport
Dear All I'm new to Linux so please forgive me if this is a dumb question. I am trying to disable telnet access from certain systems/subnets to a Linux Server. I understand this can be acheievd by adding entries to the hosts.allow and hosts.deny files. I have added in.telnetd: x.x.x. to the a