Displaying 7 results from an estimated 7 matches for "hosts_options".
1998 Aug 05
6
Problem with TCP_wrappers
Hi,
I''m running into something weird here.
I''m using RH5.1 with tcp_wrappers 7.6.
The syntax for hosts.allow and hosts.deny is:
<service list> : <access list> [ : <shell_command> ]
Everything works when I _don''t_ use the shell_command.
I used the _exact_ line as in the man-pages utilising "safe_finger" (comes
with tcp_wrappers), tcpdchk
2015 Oct 14
3
tcp wrappers Question..
hey folks, I keep seeing this on the internet
"The user name lookup feature of TCP Wrappers uses identd to identify
the username of the remote host. By default, this feature is disabled,
as identd may appear hung when there are a large number of TCP connections."
but I cant seem to find out how/where to enable said feature.
Jason
2015 Jul 03
3
upsd: ERR ACCESS-DENIED with PowerWalker UPS
...md PowerWalker at localhost test.battery.start.deep
Username (root): admin
Password:
Unexpected response from upsd: ERR ACCESS-DENIED
/etc/hosts.allow:
<code>
# /etc/hosts.allow: list of hosts that are allowed to access the system.
# See the manual pages hosts_access(5) and
hosts_options(5).
#
# Example: ALL: LOCAL @some_netgroup
# ALL: .foobar.edu EXCEPT terminalserver.foobar.edu
#
# If you're going to protect the portmapper use the name "rpcbind" for the
# daemon name. See rpcbind(8) and rpc.mountd(8) for further information.
#
upsd : admin at localh...
2015 Oct 14
0
tcp wrappers Question..
On 10/14/2015 11:39 AM, Jason Welsh wrote:
> but I cant seem to find out how/where to enable said feature.
See the man pages for hosts_options and hosts_access. It is rare for
systems to support RFC 931 and common for firewalls to drop requests
(creating long delays in connections), so user name lookup is probably
only useful within a private network of systems that you control, on
which you have enabled identd on each client system.
2004 Aug 06
1
LiveIce/IceCast Error
Greetings everyone....
I tried posting this once before, but got no response.
When I run liveice, I get an "Error:sending data to remote server
message" from liveice, and then it hangs (I actually have to open
another console window to kill the process).
The IceCast server respond with the following:
Kicking source 1 [127.0.0.1] [Access Denied (tcp wrappers (source
connection))]
2015 Mar 01
12
IP drop list
I wonder if there is an easy way to provide dovecot a flat text file of
ipv4 #'s which should be ignored or dropped?
I have accumulated 45,000+ IPs which routinely try dictionary and
12345678 password attempts. The file is too big to create firewall
drops, and I don't want to compile with wrappers *if* dovecot has an
easy ability to do this. If dovecot could parse a flat text file of
1998 Aug 02
0
ipportfw - security
...t;hosts.access" (I think!), and hosts.{allow,deny} don;t
: function. But it doesn't look like it's compiled that way
: (-DPROCESS_OPTIONS)...
I think tcp_wrappers 7.6 was built using -DPROCESS_OPTIONS.
At least the "twist" keyword works for me in hosts.{allow,deny}
(see the hosts_options(5) manpage). I don't know anything about the
hosts.access file, though.
When we are on this topic, I am still having problems with
the "setenv" keyword in the hosts.{allow,deny}. It simply does not
work for me. I have tried to use the "setenv" keyword for qmail's incom...