:
>On Mon, Dec 09, 2002 at 03:43:01PM +1000, [EMAIL PROTECTED] wrote:
>>
>> I'm not sure how different 7.3 is from 8.0, but the 7.3
>> version of openssh is compiled with tcp-wrappers, but
>> does not normally use xinted. Sshd is probably already
>> running a
On Mon, Dec 09, 2002 at 03:43:01PM +1000, [EMAIL PROTECTED] wrote:
>
> I'm not sure how different 7.3 is from 8.0, but the 7.3
> version of openssh is compiled with tcp-wrappers, but
> does not normally use xinted. Sshd is probably already
> running as a separate daemon so what
I'm not sure how different 7.3 is from 8.0, but the 7.3
version of openssh is compiled with tcp-wrappers, but
does not normally use xinted. Sshd is probably already
running as a separate daemon so what you put in xinetd.d/ssh
might have no effect.
> chkconfig --list sshd
should show s
Hi!
I try of put my SSH (redhat 8.0 updated yesterday) with TCP Wrappers,looking at the
package
requires "tcp wrappers",so I suppose will be compiled with,because read hosts.allow and
only give if allowed,i tried of put a file /etc/xinetd/ssh and had not result when I
want control
Dave,
You are going to need to restart your network services for TCP Wrappers to
take effect:
ex., /etc/init.d/network restart
Your hosts.deny file should have in it
ALL:ALL
to deny access via any service from any IP address. If you want to allow
access from one specific IP address
alf Of Emmanuel Seyman
Sent: 28 October 2002 16:14
To: [EMAIL PROTECTED]
Subject: Re: Security with TCP Wrappers
On Mon, Oct 28, 2002 at 03:10:52PM -, David Davenport wrote:
>
> RE: Security with TCP WrappersIt appears that whatever I enter in these
> files I can still get access via
lusions). Is there any way that something is
> > set elsewhere so that these files are being ignored?
>
> Short of re-compiling, I don't think it's possible to set
> xinetd-related services without tcp wrappers support.
>
> Do you have any weird error messages in
elsewhere so
> that these files are being ignored?
Short of re-compiling, I don't think it's possible to set xinetd-related
services without tcp wrappers support.
Do you have any weird error messages in /var/log/messages when you restart
xinetd? Also, please check your /etc/hosts.deny to c
Title: RE: Security with TCP Wrappers
It
appears that whatever I enter in these files I can still get access via
telnet form any maching (even if I add single ip exclusions). Is there any way
that something is set elsewhere so that these files are being
ignored?
-Original Message
Hi.
No there is not need to start xinetd or any other service. Saving any changes
to hosts.allow or .deny will make whatever in there applied.
Al-Juhani
[EMAIL PROTECTED]
>= Original Message From [EMAIL PROTECTED] =
>On Mon, Oct 28, 2002 at 11:26:53AM -, David Davenport wrote:
>>
>>
Title: RE: Security with TCP Wrappers
Hi,
For an Subnet, your entry in the hosts.allow should be
in.telnetd : 192.168.1.0/255.255.255.0
Change the Ip Adress and Subnetmask to your, that should be all
Alex
-Original Message-
From: David Davenport [mailto:[EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Mon, 28 Oct 2002 11:26:53 -, David Davenport wrote:
> I am trying to disable telnet access from certain systems/subnets to a
> Linux Server. I understand this can be acheievd by adding entries to
> the hosts.allow and hosts.deny files.
>
> I h
in the hosts.allow enter:
in.telnetd: x.x.x.
where x.x.x. is the IP address of your address also you need to add localhost
as below:
in.telnetd: localhost IP_Address1 IP_Address2 IP_Address3
in the hosts.deny add the following:
ALL: ALL
to block all and only allow any hosts under hosts.allow
Hi Emmanuel
I tried that - still no luck..
-Original Message-
From: [EMAIL PROTECTED]
[mailto:redhat-list-admin@;redhat.com]On Behalf Of Emmanuel Seyman
Sent: 28 October 2002 11:52
To: [EMAIL PROTECTED]
Subject: Re: Security with TCP Wrappers
On Mon, Oct 28, 2002 at 11:26:53AM
On Mon, Oct 28, 2002 at 11:26:53AM -, David Davenport wrote:
>
> Am I missing something?
I think you need to restart xinetd for it to read the /etc/host.* files.
Emmanuel
--
redhat-list mailing list
unsubscribe mailto:redhat-list-request@;redhat.com?subject=unsubscribe
https://listman.re
Dear All
I'm new to Linux so please forgive me if this is a dumb question.
I am trying to disable telnet access from certain systems/subnets to a Linux
Server. I understand this can be acheievd by adding entries to the
hosts.allow and hosts.deny files.
I have added
in.telnetd: x.x.x.
to the a
On Tue, 14 Nov 2000, Nitebirdz wrote:
I checked xinted.org and read that xinetd which is the replacement for
inetd in RH 7.0 can be compiled with support for hosts deny/allow. Since
redhat has both files present I believe they have compiled the binaries
with this support. You can also use tcpd b
On Thu, 9 Nov 2000, Ed Lazor wrote:
> I've been using /etc/hosts.deny and /etc/hosts.allow for a while now. I
> verified it's working by getting blocked when trying to telnet, ftp, etc.
> in from remote systems that weren't in the hosts.allow.
>
> Funny thing is that the documentation I read
Not sure...As I noted, I'm not sure if/how xinetd might be working
with tcp wrappers...but apparently, it is.
At Thu, 09 Nov 2000 13:52:21 -0800 , [EMAIL PROTECTED] wrote:
>I've been using /etc/hosts.deny and /etc/hosts.allow for a while now. I
>verified it's working by
I've been using /etc/hosts.deny and /etc/hosts.allow for a while now. I
verified it's working by getting blocked when trying to telnet, ftp, etc.
in from remote systems that weren't in the hosts.allow.
Funny thing is that the documentation I read says you must run the service
through /usr/sbi
I'm running 7.6 with no problems. Show us your host.allow host.deny
files, with obvious changes to important data such as host names and IPs.
Marco
--
PLEASE read the Red Hat FAQ, Tips, Errata and the MAILING LIST ARCHIVES!
http://www.redhat.com/RedHat-FAQ /RedHat-Errata /RedHat-Tips /maili
Hello:
I'm a bit perplexed, tcp wrappers give me me a the following erros in my
/var/log/secure:
May 10 13:38:53 spot in.telnetd[469]: warning: /etc/hosts.allow, line 0:
missing newline or line too long
May 10 13:38:53 spot in.telnetd[469]: warning: /etc/hosts.deny, line 8:
missing newli
>Here is my hosts.deny file (just testing it out with ftpd):
>
>in.ftpd: ALL: (/usr/sbin/safe_finger -l @%h | \
>/bin/mail -s %d-%h root) &
>
Hi, Brian
This is mine, i don't use it only for ftpd but for ftpd, telnetd .
I hope this helps.
ALL:ALL:spawn (/usr/sbin/safe_finger -l @%h
):
in.ftpd: ALL /usr/sbin/safe_finger -l @%h | \
/bin/mail -s %d-%h root &
I no longer get an error in my logs, but root doesn't get any mail
either, so this obviously doesn't fix it.
Could anyone point me in the right direction? (I did read the TCP
wrappers doc in /usr/
24 matches
Mail list logo