I write a script which will stop an application, then restart it.
Sometimes it is succesful, sometimes not.
The problem is, when stop the application, some ports are still listenning (or not released). When start the application, it reports that ports are used, and can't continues.
I use
to delay the start job, but seems somtime I need wait for more than 5 minutes to release the ports.
Are there any way to detect the ports, and wait until the ports are all released?
I believe i have most of samba configured right but i get this error each time time try to run it. I was given suggestion that i touch the file, i did, but i still cannot rid myself of this error.
Any suggestions (2 Replies)
How can i check which service is activated on my AIX Box?
how one can check particular port is open or not (like ftp/telnet port)?
I dont have admin rights (1 Reply)
Hi. I ran nmap on my server, and I get the following:
Starting Nmap 4.76 ( http://nmap.org ) at 2009-03-19 16:33 EDT
Interesting ports on -------- (-----):
Not shown: 997 closed ports
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
6881/tcp open bittorrent-tracker
The... (0 Replies)
Hi,
I need to run an application (Hudson) listening to port 8080 on a remote Solaris server. I have managed to start that application and tried to access it with my browser from my local PC, but unsuccessfully.
I need to find out what is blocking the access to that port (or any other). A... (9 Replies)
Hi there,
I'm driven crazy by a new problem.
It seems very complex to me and I see no way to come around.
In my script, I receive the path to a tgz file and I want to output the md5 sum of the file inside the tgz. I want a way to detect if tar fails.
I'm using the following command
tar... (7 Replies)
Does anyone know if there is a C API call to get the status of a TCP port? As opposed to running netstat and parsing the results. At the moment I have to attempt to bind() and pick up on the address in use error which isn't very elegant
Thanks
---------- Post updated at 10:42 AM ----------... (0 Replies)
Hi gurus,
1st:
Is possible to detect port scanning just by using utilities included in linux (netstat, iptables...), Yes there is utility called psad but I would write some scripts for my own and learn something new :)
2nd:
Could you point me to good tutorial for writing own Intrusion... (1 Reply)
Hello,
Is there any API or any other approach to detect whether the network cable is connected to the network adapter, say, en0, en1 or en2?
The OS is AIX6.1.
Thank you. (4 Replies)
i want to kill a tcp connection by killing its pid
with netstat -an i got the tcp ip connection on port 5914
but when i type ps -a or ps-e there is not such process running on port 5914
is it possible that because i do not log on with proper user account i can not see that process running? (30 Replies)
Discussion started by: alinamadchian
30 Replies
LEARN ABOUT CENTOS
sepolicy-network
sepolicy-network(8)sepolicy-network(8)NAME
sepolicy-network - Examine the SELinux Policy and generate a network report
SYNOPSIS
sepolicy network [-h] (-l | -a application [application ...] | -p PORT [PORT ...] | -t TYPE [TYPE ...] | -d DOMAIN [DOMAIN ...])
DESCRIPTION
Use sepolicy network to examine SELinux Policy and generate network reports.
OPTIONS -a, --application
Generate a report listing the ports to which the specified init application is allowed to connect and or bind.
-d, --domain
Generate a report listing the ports to which the specified domain is allowed to connect and or bind.
-l, --list
List all Network Port Types defined in SELinux Policy
-h, --help
Display help message
-t, --type
Generate a report listing the port numbers associate with the specified SELinux port type.
-p, --port
Generate a report listing the SELinux port types associate with the specified port number.
EXAMPLES
sepolicy network -p 22
22: tcp ssh_port_t 22
22: udp reserved_port_t 1-511
22: tcp reserved_port_t 1-511
sepolicy network -a /usr/sbin/sshd
sshd_t: tcp name_connect
111 (portmap_port_t)
53 (dns_port_t)
88, 750, 4444 (kerberos_port_t)
9080 (ocsp_port_t)
9180, 9701, 9443-9447 (pki_ca_port_t)
32768-61000 (ephemeral_port_t)
all ports < 1024 (reserved_port_type)
all ports with out defined types (port_t)
sshd_t: tcp name_bind
22 (ssh_port_t)
5900-5983, 5985-5999 (vnc_port_t)
6000-6020 (xserver_port_t)
32768-61000 (ephemeral_port_t)
all ports > 500 and < 1024 (rpc_port_type)
all ports with out defined types (port_t)
sshd_t: udp name_bind
32768-61000 (ephemeral_port_t)
all ports > 500 and < 1024 (rpc_port_type)
all ports with out defined types (port_t)
AUTHOR
This man page was written by Daniel Walsh <dwalsh@redhat.com>
SEE ALSO sepolicy(8), selinux(8), semanage(8)
20121005 sepolicy-network(8)