03-13-2014
If I got you right, your setup allows one access to users having changed their IP address. I'm not sure this is what you want. Why not block access for the entire range of IP addresses and explicitely allow single users' nodes? Or, why not block/allow them in /etc/passwd?
8 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I have been trying to use the find command to grab the latest file in a directory and move it to another area. I can't seem to get only that file, I end up getting everything for the day.
Any ideas?
Thank you (1 Reply)
Discussion started by: n9ninchd
1 Replies
2. Shell Programming and Scripting
Dear All,
I have a file in which there are 54 fields, i want to grab the all the lines and send to a new file where filed18 has lenght greater than 14. How can i do it without if condition and faster way:
currently i am reading file line by line and comparing the length
read fileLine... (9 Replies)
Discussion started by: bilalghazi
9 Replies
3. Emergency UNIX and Linux Support
Hi,
I need a way to grab the total combines since inception, total pages read from webalizer on my centos server or any other location (as long as since inception) and display the result live on my website
So with each visit it would be increasing, or perhaps live (ajax) not sure
But can... (0 Replies)
Discussion started by: lawstudent
0 Replies
4. Shell Programming and Scripting
Hey guys, I need a command that grabs only this part of the .txt file (that is attached), and outputs it to another .txt file with only these contents below. Thanks in advanced brothers:
Disk: Local Disk (C:), NTFS
Disk Defragmentation Summary
Disk Size 230.85 GB
Free Space Size... (4 Replies)
Discussion started by: aabbasi
4 Replies
5. Shell Programming and Scripting
I am a newbie and what I have is a captured file of content. I want to be able to grab 2 pieces of data, multiple times and print them to the screen.
DataFile
owner: locke
user: fun
data size: 60
location: Anaheim
owner: david
user: work
data size: 80
location: Orange
my script... (2 Replies)
Discussion started by: greglocke
2 Replies
6. Shell Programming and Scripting
Hello All
I have a file with this type of records:
=LDR 01157nas a22003011a 4500
=001 vtls000000013
=003 VRT
=005 20111020150800.0
=008 100128c19699999sp\a|||||\||||0\\\||spa|
=037 \\$a1327$i090$j090$k03
=039 ... (14 Replies)
Discussion started by: ldiaz2106
14 Replies
7. Shell Programming and Scripting
Hello,
What I would like to do is a shell script which will read a database file, then it will compare the current date/hour/minute in each line existing in the database file.
Today is 20140305 (year_month_day) & assume that the time is 15:11 at the moment.
under /var/log/
database.txt
... (5 Replies)
Discussion started by: baris35
5 Replies
8. Shell Programming and Scripting
Sorry for the weird title but i have the following problem.
We have several files which have between 10000 and about 500000 lines in them. From these files we want to remove lines which contain a pattern which is located in another file (around 20000 lines, all EAN codes). We also want to get... (28 Replies)
Discussion started by: SDohmen
28 Replies
LEARN ABOUT CENTOS
ftphosts
ftphosts(4) File Formats ftphosts(4)
NAME
ftphosts - FTP Server individual user host access file
SYNOPSIS
/etc/ftpd/ftphosts
DESCRIPTION
The ftphosts file is used to allow or deny access to accounts from specified hosts. The following access capabilities are supported:
allow username addrglob [addrglob...]
Only allow users to login as username from host(s) that match addrglob.
deny username addrglob [addrglob...]
Do not allow users to login as username from host(s) that match addrglob.
A username of * matches all users. A username of anonymous or ftp specifies the anonymous user.
addrglob is a regular expression that is matched against hostnames or IP addresses. addrglob may also be in the form address:netmask or
address/CIDR, or be the name of a file that starts with a slash ('/') and contains additional address globs. An exclamation mark (`!')
placed before the addrglob negates the test.
The first allow or deny entry in the ftphosts file that matches a username and host is used. If no entry exists for a username, then access
is allowed. Otherwise, a matching allow entry is required to permit access.
EXAMPLES
You can use the following ftphosts file to allow anonymous access from any host except those on the class A network 10, with the exception
of 10.0.0.* IP addresses, which are allowed access:
allow ftp 10.0.0.*
deny ftp 10.*.*.*
allow ftp *
10.0.0.* can be written as 10.0.0.0:255.255.255.0 or 10.0.0.0/24.
FILES
/etc/ftpd/ftphosts
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWftpr |
+-----------------------------+-----------------------------+
|Interface Stability |External |
+-----------------------------+-----------------------------+
SEE ALSO
in.ftpd(1M), ftpaccess(4), attributes(5)
SunOS 5.10 1 May 2003 ftphosts(4)