10-23-2006
inetd.conf in linux
I need to put the following line in inetd.conf:
stats stream tcp nowait nobody /usr/local/bin/mrtgsysinfo mrtgsysinfo
but my version of linux don't seem to allow that, ie there is no inetd.conf. How do i set that up in linux (red hat enterprise 3).
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi there
I'm trying to set up swat on my linux box at home and when i read the man pages on it it says that i have to edit a file called inetd.conf but i did a search like
find / -name inetd.conf
but it only comes up with this.
/etc/linuxconf/archive/Home-Office/etc/inetd.conf
find:... (2 Replies)
Discussion started by: nemex
2 Replies
2. UNIX for Advanced & Expert Users
Hi!!,
I have been working on a HP UX box all these days.. For adding a user defined service, I used to put an entry for this service corresponing to a port number in /etc/services. These services were then defined in inetd.conf.
Now I have moved to Mandrake linux. I can find a file named... (2 Replies)
Discussion started by: jyotipg
2 Replies
3. UNIX for Dummies Questions & Answers
I'm trying to edit the inetd.conf but for some reason when I vi into it, it says "Read Only" even though I am root and the perms are 777?!? (2 Replies)
Discussion started by: shorty
2 Replies
4. Solaris
Anyone have a perl script that can be run via a web browser to turn ftp or telnet on and off in etc/inetd.conf ? Believe it or not but I ride a motorcycle a lot in the summer and carry a laptop in my saddlebags to connect from almost anywhere via Verizon alongside the highway. However, have too... (0 Replies)
Discussion started by: thomi39
0 Replies
5. Solaris
Hello Guys,
Do we need to configure this file only if we add SAN disk or even if we add local disk, do we need to modify? (4 Replies)
Discussion started by: mokkan
4 Replies
6. Red Hat
hi,
I use red hat linux .
When I start up network service .
I get below error in eth2
root@vls etc]# service network restart
Shutting down interface eth2:
Shutting down loopback interface:
Bringing up loopback interface:
Bringing up interface eth2: RTNETLINK answers: File exists
Error... (10 Replies)
Discussion started by: chuikingman
10 Replies
7. AIX
Hello,
We're working on securing the AIX environment. started with disabling unused services on AIX.
Below are the entries which are not commented on my test LPAR (even other LPARs).
ntalk dgram udp wait root /usr/sbin/talkd talkd
daytime stream tcp nowait root... (1 Reply)
Discussion started by: system.engineer
1 Replies
8. Shell Programming and Scripting
Hello all,
Newbie here.
I'm currently tasked with updating rsyslog.conf and auditd.conf on a large set of servers. I know the exact logging configurations that I want to enable. I have updated both files on on a server and hope to use the updated files as a template for the rest of the... (3 Replies)
Discussion started by: Mide
3 Replies
9. Solaris
Hi,
I've installed Solaris 11.3(live media) and configured DNS. Everytime I reboot the server, resolv.conf got deleted and it created a new nsswitch.conf.
I used below to configure both settings:
# svccfg -s dns/client
svc:/network/dns/client> setprop config/nameserver = (xx.xx.xx.aa... (1 Reply)
Discussion started by: flexihopper18
1 Replies
LEARN ABOUT DEBIAN
in.rshd
RSHD(8) BSD System Manager's Manual RSHD(8)
NAME
rshd -- remote shell server
SYNOPSIS
rshd [-aiklnvxPL] [-p port]
DESCRIPTION
rshd is the server for the rsh(1) program. It provides an authenticated remote command execution service. Supported options are:
-n, --no-keepalive
Disables keep-alive messages. Keep-alives are packets sent at certain intervals to make sure that the client is still there, even
when it doesn't send any data.
-k, --kerberos
Assume that clients connecting to this server will use some form of Kerberos authentication. See the EXAMPLES section for a sample
inetd.conf(5) configuration.
-x, --encrypt
For Kerberos 4 this means that the connections are encrypted. Kerberos 5 can negotiate encryption even without this option, but if
it's present rshd will deny unencrypted connections. This option implies -k.
-v, --vacuous
If the connecting client does not use any Kerberised authentication, print a message that complains about this fact, and exit. This
is helpful if you want to move away from old port-based authentication.
-P When using the AFS filesystem, users' authentication tokens are put in something called a PAG (Process Authentication Group). Multi-
ple processes can share a PAG, but normally each login session has its own PAG. This option disables the setpag() call, so all tokens
will be put in the default (uid-based) PAG, making it possible to share tokens between sessions. This is only useful in peculiar
environments, such as some batch systems.
-i, --no-inetd
The -i option will cause rshd to create a socket, instead of assuming that its stdin came from inetd(8). This is mostly useful for
debugging.
-p port, --port=port
Port to use with -i.
-a This flag is for backwards compatibility only.
-L This flag enables logging of connections to syslogd(8). This option is always on in this implementation.
FILES
/etc/hosts.equiv
~/.rhosts
EXAMPLES
The following can be used to enable Kerberised rsh in inetd.cond(5), while disabling non-Kerberised connections:
shell stream tcp nowait root /usr/libexec/rshd rshd -v
kshell stream tcp nowait root /usr/libexec/rshd rshd -k
ekshell stream tcp nowait root /usr/libexec/rshd rshd -kx
SEE ALSO
rsh(1), iruserok(3)
HISTORY
The rshd command appeared in 4.2BSD.
AUTHORS
This implementation of rshd was written as part of the Heimdal Kerberos 5 implementation.
HEIMDAL
November 22, 2002 HEIMDAL