08-08-2011
I need to explicitly specify the portmap in /etc/hosts.allow & deny ?
Even though as in orig post the 'hosts.deny' file is empty and 'hosts.allow' contains
/etc/hosts.allow
all : all
all :all@all
Ill try explictly adding the portmapper; I thought the issue was with iptables (closed port) but not sure....
Oh crud....
Nevermind - problem resolved due to typo in hosts file (how embarrassing)
Last edited by drs.grid; 08-08-2011 at 05:57 PM..
10 More Discussions You Might Find Interesting
1. Linux
I have a linux box build11 which can be pinged from build18 (Windows) box. And we can only login to the box (using SSH) from build18 box. Plz help to characterize the problem, network, DNS, DHCP, etc (or whatever which I am unsure)
Any idea what may be the reason ? :confused:
Thanks in... (4 Replies)
Discussion started by: csaha
4 Replies
2. UNIX for Advanced & Expert Users
i'm not much of an advanced unix programmer but I'm trying to write a script to access files on box1 after ssh from box 1 to box2. when ssh is invoked in the script i'm getting logged into box2 and losing complete touch with box1 which is normal i guess.
but my main aim with my script is when i... (3 Replies)
Discussion started by: pharos467
3 Replies
3. OS X (Apple)
Hi
Do I have to open my ssh port if I like to connect to another machine?
- if yes, how?
Or is that only if I want to access my one computer from the outside?
I run Mac OS 10.4 and like to access a unix box on the other side.
/andreas (1 Reply)
Discussion started by: lulle
1 Replies
4. Shell Programming and Scripting
I have to login with ssh to a UNIX box and execute a script in it.
How will i make use of ssh-keygen so that while login using ssh it wont ask the passwod. ssh-copy-id is not working in my UNIX box . What might be the reason. Please help. (1 Reply)
Discussion started by: codeman007
1 Replies
5. Solaris
Hello all. This is my first post so please be gentle.
I have a situation where I am trying to run a windows batch file to SSH/FTP from a Windows box to a Solaris server.
The batch file is not working because it can not find the SSH key.
Does any one know how to set up an SSH key on a... (8 Replies)
Discussion started by: UofU
8 Replies
6. Red Hat
removing the post (6 Replies)
Discussion started by: titanic4u
6 Replies
7. Red Hat
Hi all
Has anyone ever successfully set up ssh key pairs for "passwordless" logins between rhel and Solaris?
I've set it up many times before between Solaris systems but i'm having difficulty doing between the two OS's in question.
What I have done so far is append the contents of the rhel... (30 Replies)
Discussion started by: notreallyhere
30 Replies
8. IP Networking
Hello,
I have two virtual machines ubuntu on virtual box vm1 and vm2 , i'd like to use ssh to connect from vm1 to vm2, please what's the configuration should do?
Thank you (1 Reply)
Discussion started by: chercheur857
1 Replies
9. Red Hat
I am able to connect a RHEL server from my Windows machine using Putty (via ssh). My question is what is the advantage of using Xming instead of Putty? Is it that Xming would enable a graphical connect from the Windows machine to RHEL server?
I hope my question is clear that what is the... (9 Replies)
Discussion started by: RHCE
9 Replies
10. Red Hat
There was a security analysis run on one server which has RHEL 5.8 installed and it is showing security vulnerabilities with respect to ssh in OpenSSH with reference no CVE-2007-4752. The vulnerability solution in the security report is showing solution as below:
1) Download and apply the... (3 Replies)
Discussion started by: RHCE
3 Replies
LEARN ABOUT CENTOS
tcpdchk
TCPDCHK(8) System Manager's Manual TCPDCHK(8)
NAME
tcpdchk - tcp wrapper configuration checker
SYNOPSIS
tcpdchk [-a] [-d] [-i inet_conf] [-v]
DESCRIPTION
tcpdchk examines your tcp wrapper configuration and reports all potential and real problems it can find. The program examines the tcpd
access control files (by default, these are /etc/hosts.allow and /etc/hosts.deny), and compares the entries in these files against entries
in the inetd network configuration file.
tcpdchk reports problems such as non-existent pathnames; services that appear in tcpd access control rules, but are not controlled by tcpd;
services that should not be wrapped; non-existent host names or non-internet address forms; occurrences of host aliases instead of official
host names; hosts with a name/address conflict; inappropriate use of wildcard patterns; inappropriate use of NIS netgroups or references to
non-existent NIS netgroups; references to non-existent options; invalid arguments to options; and so on.
Where possible, tcpdchk provides a helpful suggestion to fix the problem.
OPTIONS
-a Report access control rules that permit access without an explicit ALLOW keyword.
-d Examine hosts.allow and hosts.deny files in the current directory instead of the default ones.
-i inet_conf
Specify this option when tcpdchk is unable to find your inetd.conf network configuration file, or when you suspect that the program
uses the wrong one.
-v Display the contents of each access control rule. Daemon lists, client lists, shell commands and options are shown in a pretty-
printed format; this makes it easier for you to spot any discrepancies between what you want and what the program understands.
FILES
The default locations of the tcpd access control tables are:
/etc/hosts.allow
/etc/hosts.deny
SEE ALSO
tcpdmatch(8), explain what tcpd would do in specific cases.
hosts_access(5), format of the tcpd access control tables.
hosts_options(5), format of the language extensions.
inetd.conf(5), format of the inetd control file.
AUTHORS
Wietse Venema (wietse@wzv.win.tue.nl),
Department of Mathematics and Computing Science,
Eindhoven University of Technology
Den Dolech 2, P.O. Box 513,
5600 MB Eindhoven, The Netherlands
TCPDCHK(8)