Sponsored Content
Operating Systems Linux How To Open Ports in RedHat ? Post 39976 by Sirius on Saturday 6th of September 2003 06:33:52 AM
Old 09-06-2003
but i wont to run ircd not from root access, i wont from user. so program can't open ports coz has no access

Quote:
Originally posted by Sirius
i wont to install ircd on my server my ports i need 6663-7000 closed. vs what command can i open them ?
 

9 More Discussions You Might Find Interesting

1. Cybersecurity

closing open ports

/* Linux Slackware */ Nmap shows the following ports open on the gateway. 21/tcp ftp 22/tcp ssh 23/tcp telnet 25/tcp smtp 37/tcp time 80/tcp http 113/tcp auth 515/tcp printer 587/tcp submission 1024/tcp kdm 6000/tcp x11 ------------------------------- i would like to close as... (10 Replies)
Discussion started by: LowOrderBit
10 Replies

2. UNIX for Advanced & Expert Users

determining open ports

hi all 1) how to determine available ports in a box (solaris) do i have to go for a netstat on all the ports? 2) how to block a particular port for a particular type of connection. Any help would be greatly appreciated Thanks (7 Replies)
Discussion started by: matrixmadhan
7 Replies

3. Shell Programming and Scripting

Check open ports every ...

Hello, i need a script (bash type maybe?..), which would check open ports on 127.0.0.1 and then compare open ports with "registered/allowed" port list and try to kill the program who uses unregistered ports. It would be great that script would be started lets say every 5 or 10 minutes. You see i... (2 Replies)
Discussion started by: MorchiuS
2 Replies

4. AIX

Open Ports on System

Hi Every body, What is the command on AIX 5.2 that can be used to get all open ports? (2 Replies)
Discussion started by: aldowsary
2 Replies

5. UNIX for Dummies Questions & Answers

open ports solaris 8

Hello, I have a number of Solaris 8 Sun servers that have open ports that I cannot identify. I see some with 1012-1020 (which are reserved ports according to the IANA. Lsof does not identify these. One server has all these on and one server just has 1017. *.1023 ... (3 Replies)
Discussion started by: csross
3 Replies

6. Solaris

open ports solaris 8

Hello, I have a number of Solaris 8 Sun servers that have open ports that I cannot identify. I see some with 1013-1023 (which are reserved ports according to the IANA. Lsof does not identify these. I rebooted the server and they went off, but this morning I saw they were all back on again. Any... (1 Reply)
Discussion started by: csgonan
1 Replies

7. Solaris

Open ports in solaris 10

hi guys, may i know the exact steps to open a port in solaris.i have some rough idea - which is adding the port number in /etc/services. but i am not sure the correct conventions, steps or any other steps. kindly advise.thanks guys ! (1 Reply)
Discussion started by: cromohawk
1 Replies

8. UNIX for Dummies Questions & Answers

open ports and services

just a quick question: a. whats the simplest command to check open port and the corresponding services? example: bash-2.05# netstat -an | grep LISTEN *.199 *.* 0 0 49152 0 LISTEN *.8989 *.* 0 0 49152 ... (1 Reply)
Discussion started by: lhareigh890
1 Replies

9. IP Networking

Open/close of ports

Hi, I have read some forum theads about the open and close ports. some points are clear and it is not working on my machine or something am i missing? I have commented out a port /etc/services, one application uses then when i use the telnet <hostname> <port_blocked> it shows connected..... (1 Reply)
Discussion started by: balamv
1 Replies
IAUTH.CONF(5)							File Formats Manual						     IAUTH.CONF(5)

NAME
iauth.conf - The Internet Relay Chat Authentication Configuration File DESCRIPTION
The iauth.conf file is read by the iauth program upon startup, it contains the list of modules that should be used to authenticate a par- ticular connection. The list is ordered, which means that the first module to successfully authenticate a connection will be the last to be tried. The file is divided in sections, the first section is used for iauth options, each subsequent section specifies a module with eventual options using the following format: module module-name [TAB]option = string [TAB]host = host-name [TAB]ip = ip-address [TAB]timeout = value [TAB]port = value [TAB]reason = string The section ends with an empty line. The module-name defines which module the section applies to. A particular module may be used in sev- eral sections. An option string of undefined format may be specified, it will then be passed to the module upon initialization, see the MODULES section to find out if a module accepts any option. If host-name and ip-address fields are specified, then the module will only be used for connections matching one of the fields given in the configuration. An entry prefixed with the character ! indicates a negative match. IP addresses are checked first. Port is mandatory for socks and webproxy modules and not used in others. It tells module what port it should connect to to do its work. If no host nor ip entry is specified, then the module will always be used. Reason is text to send to clients rejected by given module. When writing a configuration file, one should always verify the syntax using the iauth program to avoid later problems. IAUTH OPTIONS
timeout = <seconds> This allows to specify how much time each module has to complete its work for each connection. This option can also be specified individually for each module. The default is 30 seconds. required By specifying this keyword, the IRC server is told not to accept new user connections unless the authentication is handled by iauth. This does NOT mean that the server will wait forever to get the data from iauth, see the notimeout option. notimeout By specifying this keyword, the IRC server is told not to accept a user connection if iauth hasn't finished its work in time. Note that modules specified after delayed keyword are not considered. extinfo This keyword allows extra information (user supplied username, and eventually password) to be received by iauth from the server. This is only useful if a module using this information is loaded. delayed All modules below this keyword will run in "delayed" execution mode. This means that ircd gets (fake) message that iauth is done with this client so that it allows it. Modules however do work as usual and upon deciding that this client should be removed, mes- sage is sent to ircd and client removed. shared <name> <mod_name.so> If iauth was compiled with Dynamically Shared Module support, it can be told to dynamically load a module using this option. The module can then be loaded. MODULES
pipe This module is provided as a replacement to the (now obsolete) R configuration lines supported by the IRC daemon. It runs an exter- nal program with the client IP and port as arguments. The program should output either 'Y' (Yes, let the client in), or 'N' (No, don't let them in). Note that this module is quite expensive as it forks a separate process for each connection received by the IRC daemon. This module requires the following option: prog=/path/to/external/program socks This module performs a basic check to verify that the host where the connection originated from doesn't run a SOCKS v4 or v5 proxy server on a given in configuration port that is open to the world. It is useful to reject abusive clients using a relay to evade kill lines and bans. Multiple instances (with different ports) are allowed. This module understands ten options: reject to reject connections originating from a host where an open proxy was detected, log to log hostnames where an open proxy is detected. protocol to log protocol errors paranoid to consider proxies which deny the request because of a userid/ident mismatch to be OPEN proxies. megaparanoid which is paranoid plus it considers all proxies not explicitly stating they are closed to be OPEN proxies -- that includes all protocol errors, unexpected results etc. cache[=value] to set the cache lifetime in minutes. By default, caching is enabled for 30 minutes. A value of 0 disables caching. careful to make sure socks v5 is properly configured with IP rulesets. Without this parameter, module will not send additional query and assume first positive answer as valid. v4only to check only socks v4. v5only to check only socks v5. rfc931 This module is for authentication TCP connections using the protocol defined in RFC 1413 (which obsoletes RFC 931). It is always loaded, and does not recognize the host nor ip fields. lhex This module acts as a proxy, communicating with a LHEx server to perform authentication of client connections. It takes a single (mandatory) option, which is the IP-address of the LHEx server to use. webproxy This module performs a basic HTTP CONNECT to verify that the host where the connection originated from doesn't run an open WWW proxy. It is useful to reject abusive clients using a relay to evade kill lines and bans. Multiple instances (with different ports) are allowed. This module understands five options: reject to reject connections originating from a host where an open proxy was detected. log to log hostnames where an open proxy is detected. cache[=value] to set the cache lifetime in minutes. By default, caching is enabled for 30 minutes. A value of 0 disables caching. careful to make sure that we connected to our own ircd; without this parameter, module will accept any "HTTP/1.? 200" with an exception of servers sending "Date:" header along (which is common with some Apache+PHP configurations). EXAMPLE
The following file will cause the IRC daemon to reject all connections originating from a system where an open proxy is running for hosts within *.fr and *.enserb.u-bordeaux.fr but not for other hosts matching *.u-bordeaux.fr. For all connections, an ident lookup (RFC 1413) will be performed as well as checking for WWW proxy on port 8080 and 3128. In addition, every connection is authenticated with the LHEx server at IP-address 127.0.0.1. Client will be let in after ident and lhex are done but if socks or webproxy finds an open proxy, client will be removed asap. module rfc931 module lhex option = 127.0.0.1 delayed module socks option = reject,paranoid host = *.enserb.u-bordeaux.fr host = !*.u-bordeaux.fr host = *.fr port = 1080 module webproxy option = reject port = 8080 module webproxy option = reject,careful port = 3128 CAVEATS
When the option extinfo is set, connections registering as a server or a service with the IRC server are not guaranteed to receive the "user" authentication provided by modules (such as the rfc931 module). COPYRIGHT
(c) 1998,1999 Christophe Kalt For full COPYRIGHT see LICENSE file with IRC package. FILES
"iauth.conf" SEE ALSO
iauth(8) AUTHOR
Christophe Kalt. $Date: 2004/12/16 16:14:06 $ IAUTH.CONF(5)
All times are GMT -4. The time now is 05:31 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy