Sponsored Content
Operating Systems Linux Red Hat cannot ssh (use NFS) on RHEL box, but can mount external & ssh out of RHEL box Post 302545501 by drs.grid on Monday 8th of August 2011 02:30:21 PM
Old 08-08-2011
I need to explicitly specify the portmap in /etc/hosts.allow & deny ?
Even though as in orig post the 'hosts.deny' file is empty and 'hosts.allow' contains


/etc/hosts.allow
all : all
all :all@all
Ill try explictly adding the portmapper; I thought the issue was with iptables (closed port) but not sure....


Oh crud....
Nevermind - problem resolved due to typo in hosts file (how embarrassing)

Last edited by drs.grid; 08-08-2011 at 05:57 PM..
 

10 More Discussions You Might Find Interesting

1. Linux

Can't SSH / ping Linux box !!!

I have a linux box build11 which can be pinged from build18 (Windows) box. And we can only login to the box (using SSH) from build18 box. Plz help to characterize the problem, network, DNS, DHCP, etc (or whatever which I am unsure) Any idea what may be the reason ? :confused: Thanks in... (4 Replies)
Discussion started by: csaha
4 Replies

2. UNIX for Advanced & Expert Users

Access files from prev box after SSH to another box

i'm not much of an advanced unix programmer but I'm trying to write a script to access files on box1 after ssh from box 1 to box2. when ssh is invoked in the script i'm getting logged into box2 and losing complete touch with box1 which is normal i guess. but my main aim with my script is when i... (3 Replies)
Discussion started by: pharos467
3 Replies

3. OS X (Apple)

open ssh port (22) to connect to other box

Hi Do I have to open my ssh port if I like to connect to another machine? - if yes, how? Or is that only if I want to access my one computer from the outside? I run Mac OS 10.4 and like to access a unix box on the other side. /andreas (1 Reply)
Discussion started by: lulle
1 Replies

4. Shell Programming and Scripting

how to use ssh-keygen to login to a UNIX box

I have to login with ssh to a UNIX box and execute a script in it. How will i make use of ssh-keygen so that while login using ssh it wont ask the passwod. ssh-copy-id is not working in my UNIX box . What might be the reason. Please help. (1 Reply)
Discussion started by: codeman007
1 Replies

5. Solaris

Setting up SSH key on windows box.

Hello all. This is my first post so please be gentle. I have a situation where I am trying to run a windows batch file to SSH/FTP from a Windows box to a Solaris server. The batch file is not working because it can not find the SSH key. Does any one know how to set up an SSH key on a... (8 Replies)
Discussion started by: UofU
8 Replies

6. Red Hat

RHEL: Users unable to login via SSH

removing the post (6 Replies)
Discussion started by: titanic4u
6 Replies

7. Red Hat

SSH Keys between RHEL 5 and Solaris 10

Hi all Has anyone ever successfully set up ssh key pairs for "passwordless" logins between rhel and Solaris? I've set it up many times before between Solaris systems but i'm having difficulty doing between the two OS's in question. What I have done so far is append the contents of the rhel... (30 Replies)
Discussion started by: notreallyhere
30 Replies

8. IP Networking

ssh on virtual box (4.0.4)

Hello, I have two virtual machines ubuntu on virtual box vm1 and vm2 , i'd like to use ssh to connect from vm1 to vm2, please what's the configuration should do? Thank you (1 Reply)
Discussion started by: chercheur857
1 Replies

9. Red Hat

Xming Vs ssh connect to RHEL server from Windows machine

I am able to connect a RHEL server from my Windows machine using Putty (via ssh). My question is what is the advantage of using Xming instead of Putty? Is it that Xming would enable a graphical connect from the Windows machine to RHEL server? I hope my question is clear that what is the... (9 Replies)
Discussion started by: RHCE
9 Replies

10. Red Hat

Vulnerability with ssh in OpenSSH in an RHEL installation

There was a security analysis run on one server which has RHEL 5.8 installed and it is showing security vulnerabilities with respect to ssh in OpenSSH with reference no CVE-2007-4752. The vulnerability solution in the security report is showing solution as below: 1) Download and apply the... (3 Replies)
Discussion started by: RHCE
3 Replies
TCPDCHK(8)						      System Manager's Manual							TCPDCHK(8)

NAME
tcpdchk - tcp wrapper configuration checker SYNOPSIS
tcpdchk [-a] [-d] [-i inet_conf] [-v] DESCRIPTION
tcpdchk examines your tcp wrapper configuration and reports all potential and real problems it can find. The program examines the tcpd access control files (by default, these are /etc/hosts.allow and /etc/hosts.deny), and compares the entries in these files against entries in the inetd or tlid network configuration files. tcpdchk reports problems such as non-existent pathnames; services that appear in tcpd access control rules, but are not controlled by tcpd; services that should not be wrapped; non-existent host names or non-internet address forms; occurrences of host aliases instead of official host names; hosts with a name/address conflict; inappropriate use of wildcard patterns; inappropriate use of NIS netgroups or references to non-existent NIS netgroups; references to non-existent options; invalid arguments to options; and so on. Where possible, tcpdchk provides a helpful suggestion to fix the problem. OPTIONS
-a Report access control rules that permit access without an explicit ALLOW keyword. This applies only when the extended access control language is enabled (build with -DPROCESS_OPTIONS). -d Examine hosts.allow and hosts.deny files in the current directory instead of the default ones. -i inet_conf Specify this option when tcpdchk is unable to find your inetd.conf or tlid.conf network configuration file, or when you suspect that the program uses the wrong one. -v Display the contents of each access control rule. Daemon lists, client lists, shell commands and options are shown in a pretty- printed format; this makes it easier for you to spot any discrepancies between what you want and what the program understands. FILES
The default locations of the tcpd access control tables are: /etc/hosts.allow /etc/hosts.deny SEE ALSO
tcpdmatch(8), explain what tcpd would do in specific cases. hosts_access(5), format of the tcpd access control tables. hosts_options(5), format of the language extensions. inetd.conf(5), format of the inetd control file. tlid.conf(5), format of the tlid control file. AUTHORS
Wietse Venema (wietse@wzv.win.tue.nl), Department of Mathematics and Computing Science, Eindhoven University of Technology Den Dolech 2, P.O. Box 513, 5600 MB Eindhoven, The Netherlands TCPDCHK(8)
All times are GMT -4. The time now is 09:30 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy