09-30-2002
While cbkihong suggestion relating to firewalls is definately a component in a long-term solution to secure your servers - in this instance it may be easier to setup the inetd.sec file to specifically limit access to the telnet daemon.
The syntax is:
<service name> <allow|deny> <host/net addresses, host/net names>
The man page will help further.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
hello there! :)
i'm a newbie here...and i have a question, how can you logout while you're chatting in commode?
thanx!
:) (2 Replies)
Discussion started by: hapiworm
2 Replies
2. UNIX for Dummies Questions & Answers
how can I get on to telnet keep getting the page cant be found:confused: (1 Reply)
Discussion started by: tamworther
1 Replies
3. UNIX for Advanced & Expert Users
Hi,
When we use telnet (from unix workstation or windows) to remotely access the Unix server, the environment variables such as: DISPLAY, TERM, LOGNAME are communicate to the telnet server during the telnet session negotiation. By default these variables are passed to the server.
We can... (1 Reply)
Discussion started by: vtran4270
1 Replies
4. Shell Programming and Scripting
Hi,
I have automated a build process that does the following activities.
1. check out code from cvs to a specific directory
2. build the revision checked out with 'ANT'
3. integrate the compiled code with the QA/UAT or new environment
(/apps/QA or /apps/UAT or /apps/new directory)
I... (1 Reply)
Discussion started by: yoi2hot4ya
1 Replies
5. Shell Programming and Scripting
Somewhat long story:
I have a simple Perl CGI script that uses Expect to Telnet to a device and grab some data, and then spits it back to Perl for display on the Webpage.
This works for many devices I've tried, but one device just fails, it keeps rejecting the password on this device, only... (1 Reply)
Discussion started by: jondo
1 Replies
6. Shell Programming and Scripting
HI All
Some body wrote to me this Telnet Script :
#!/opt/perl/bin/perl
$ip = $ARGV;
die ("IP must be passed as an argument. $!\n") unless defined($ip);
use Net::Telnet ();
$handle = new Net::Telnet (Timeout => 10, Prompt => '/.*(#|>|\))\s*$/');
$handle->open("$ip");... (10 Replies)
Discussion started by: Darknight
10 Replies
7. OS X (Apple)
I wanted to learn Telnet protocol so I read an RFC-854 on telnet but now i'm kinda stuck ...where to go now????
Need guidance from you guys...about some website or any resources that could help to learn more about it. (1 Reply)
Discussion started by: jFreak619
1 Replies
8. Emergency UNIX and Linux Support
We are using the solaris server and if i am using rm -rf to delete the directories its asking the confirmation for each and every file inside the directory.Is there any way to disable ( should not ask the confirmation) only for a particular session? (12 Replies)
Discussion started by: sureshbabuc
12 Replies
9. UNIX for Dummies Questions & Answers
Hi,
I was writing one script which includes to switch to the another telnet automatically from the present telnet server. I was using rlogin but firstly it takes the same user name of the present telnet and secondly it is prompting for the password.
But i want to switch to the another telnet... (2 Replies)
Discussion started by: Prateek
2 Replies
10. UNIX for Dummies Questions & Answers
Hi,
I want to know the difference between these two services. Both are under xinetd. Both are used for enabling and disabling Telnet service. So, can somebody please explain me the difference between the two ?
Thanks in advance :) (0 Replies)
Discussion started by: kashifsd17
0 Replies
LEARN ABOUT OPENSOLARIS
tcpdmatch
TCPDMATCH(1M) TCPDMATCH(1M)
NAME
tcpdmatch - tcp wrapper oracle
SYNOPSYS
tcpdmatch [-d] [-i inet_conf] daemon client
tcpdmatch [-d] [-i inet_conf] daemon[@server] [user@]client
DESCRIPTION
tcpdmatch predicts how the tcp wrapper would handle a specific request for service. Examples are given below.
The program examines the tcpd access control tables (default /etc/hosts.allow and /etc/hosts.deny) and prints its conclusion. For maximal
accuracy, it extracts additional information from your inetd network configuration file.
When tcpdmatch finds a match in the access control tables, it identifies the matched rule. In addition, it displays the optional shell com-
mands or options in a pretty-printed format; this makes it easier for you to spot any discrepancies between what you want and what the pro-
gram understands.
ARGUMENTS
The following two arguments are always required:
daemon A daemon process name. Typically, the last component of a daemon executable pathname.
client A host name or network address, or one of the `unknown' or `paranoid' wildcard patterns.
When a client host name is specified, tcpdmatch gives a prediction for each address listed for that client.
When a client address is specified, tcpdmatch predicts what tcpd would do when client name lookup fails.
Optional information specified with the daemon@server form:
server A host name or network address, or one of the `unknown' or `paranoid' wildcard patterns. The default server name is `unknown'.
Optional information specified with the user@client form:
user A client user identifier. Typically, a login name or a numeric userid. The default user name is `unknown'.
OPTIONS
-d Examine hosts.allow and hosts.deny files in the current directory instead of the default ones.
-i inet_conf
Specify this option when tcpdmatch is unable to find your inetd.conf network configuration file, or when you suspect that the pro-
gram uses the wrong one.
EXAMPLES
To predict how tcpd would handle a telnet request from the local system:
tcpdmatch in.telnetd localhost
The same request, pretending that hostname lookup failed:
tcpdmatch in.telnetd 127.0.0.1
To predict what tcpd would do when the client name does not match the client address:
tcpdmatch in.telnetd paranoid
On some systems, daemon names have no `in.' prefix, or tcpdmatch may need some help to locate the inetd configuration file.
FILES
The default locations of the tcpd access control tables are:
/etc/hosts.allow
/etc/hosts.deny
SEE ALSO
tcpdchk(1M), tcpd configuration checker
hosts_access(4), format of the tcpd access control tables.
hosts_options(4), format of the language extensions.
inetd.conf(4), format of the inetd control file.
inetd(1M), how to invoke tcpd from inetd using the libwrap library.
inetadm(1M), managing inetd services in the Service Management Framework.
AUTHORS
Wietse Venema (wietse@wzv.win.tue.nl),
Department of Mathematics and Computing Science,
Eindhoven University of Technology
Den Dolech 2, P.O. Box 513,
5600 MB Eindhoven, The Netherlands
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+--------------------+-----------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+--------------------+-----------------+
|Availability | SUNWtcpd |
+--------------------+-----------------+
|Interface Stability | Committed |
+--------------------+-----------------+
NOTES
Source for tcp_wrappers is available in the SUNWtcpdS package.
TCPDMATCH(1M)