Sponsored Content
Top Forums UNIX for Dummies Questions & Answers Restricting access to a machine by IP Address Post 41946 by hassan2 on Sunday 19th of October 2003 05:27:32 PM
Old 10-19-2003
solaris 9 come with tcpwrapper which you can use to restricte access to certain ip address.

To enable tcpwrapper edit /etc/inetd.conf or /etc/inet/inetd.conf
to restrict telnet access

Do the following:
change this

telnet stream tcp6 nowait root /usr/sbin/in.telnetd in.telnetd

to

telnet stream tcp6 nowait root /usr/local/bin/tcpd /usr/sbin/in.telnetd

then edit /etc/hosts.allow and put the entry

in.telnetd: x.x.x.x

also

edit /etc/hosts.deny and put the entry

ALL: ALL

You can also do the above to restrict ip access for ftp, rsync, rcp,ssh and so on

Note

x.x.x.x is the ip address you want to allow access, it can also be in form of x.x.0.0/255.255.0.0
 

10 More Discussions You Might Find Interesting

1. Cybersecurity

restricting access...

restricted access... Hi I need to restrict users shell access to only $HOME under /home for each user. I don't want them getting out of their own directories. From what I understand chroot is something I could use, but I want to avoid this since it involves creating symbolic links to a number... (9 Replies)
Discussion started by: alwayslearningunix
9 Replies

2. UNIX for Dummies Questions & Answers

Restricting access

I need to create a user that only has access to 1 directory (e.g. /vol/mita/test). The user needs to be able to rsh into that directory to run a script. The user should not be able to navigate to any other directories above /vol/mita/test. Any help would be appreciated! (4 Replies)
Discussion started by: ngagne
4 Replies

3. Solaris

restricting access

Hi All, I'm on Solaris 8, I need to provide Read-only access to a user to 2 directories only. Using rsh (restricted shell) as the user's login shell, I can restrict the user's access to a certain directory only, but how can I set in such a way that the user can access only the 2 directories... (4 Replies)
Discussion started by: max_min
4 Replies

4. UNIX for Advanced & Expert Users

restricting root access

I'm the admin in a shop in which my developers have and use the root account, all UNIX newbies. I've been unable to convince management myself that this is an unacceptable practice. I've looked in a couple books I have and can't find any chapters, discussions, etc that make the argument that... (2 Replies)
Discussion started by: keith.m
2 Replies

5. Solaris

restricting access to a server

We want to secure access to a server by restricting the number of users who can login to it. Our users are NIS users. Only few of them can telnet/ssh this server. Do you have any idea on how to implement that? thanks. (1 Reply)
Discussion started by: melanie_pfefer
1 Replies

6. UNIX for Dummies Questions & Answers

Setting permissions and restricting access

Hi all, I have user called "Z". The home directory is /home/Z. I have another directory /home/Z/OP. Within /home/Z/OP, i have 2 directories /home/Z/OP/OP1 and /home/Z/OP2. I want to restrict access for Z to only access /home/Z/OP and /home/Z/OP1 and /home/Z/OP2. What kind of... (4 Replies)
Discussion started by: new2ss
4 Replies

7. UNIX for Advanced & Expert Users

Restricting access to code

Hi All, I am facing a problem, regarding code security on a server. We have configured a server which contains our code (ear present in jboss/server/xyz/deploy) in it, and need to bind the code to the server itself so that no one can take the code out of the. the problem is that the password of... (3 Replies)
Discussion started by: akshay61286
3 Replies

8. Solaris

Restricting FTP access for a particular directory

Dear All, I have created a user called "x" who is allowed only to FTP and it is working fine. Here my problem is, I want to give access to a particular directory say for eg:- /dump/test directory. I don't find any option in the useradd command to restrict access to this particular directory only... (1 Reply)
Discussion started by: Vijayakumarpc
1 Replies

9. UNIX for Dummies Questions & Answers

Restricting SFTP access

Hello, I am using MySecureShell to chroot all sftp accesses. The problem that I have is that my boss does not want root to be able to use sftp. Root should still be able to ssh. Any ideas? (2 Replies)
Discussion started by: mojoman
2 Replies

10. Solaris

Restricting commands & access

Dear all, I am administering a DC environment of over 100+ Solaris servers used by various teams including Databases. Every user created on the node belonging to databases is assigned group staff(10) . I want that all users belonging to staff should NOT be able to execute certain system... (6 Replies)
Discussion started by: Junaid Subhani
6 Replies
XAddHost()																XAddHost()

Name
  XAddHost - add a host to the access control list.

Synopsis
  XAddHost(display, host)
	Display *display;
	XHostAddress *host;

Arguments
  display  Specifies a connection to an X server; returned from XOpenDisplay().

  host	   Specifies the network address of the host machine to be added.

Description
  XAddHost()  adds the specified host to the access control list for the server specified by display.  The access control list is a primitive
  security feature that allows access to the server only by other machines listed in a file on the machine running the server.	On UNIX-based
  systems, this file is called /etc/X?.hosts, where ? is the number of the server.

  The application that calls XAddHost() and the server whose list is being updated must be running on the same host machine.

  The  address	data must be a valid address for the type of network in which the server operates, as specified in the family member.  Inter-
  net, DECnet and ChaosNet networks are currently supported.

  For TCP/IP, the address should be in network byte order.  For the DECnet family, the server performs no automatic swapping on  the  address
  bytes.   A  Phase  IV  address is two bytes long.  The first byte contains the least significant eight bits of the node number.  The second
  byte contains the most significant two bits of the node number in the least significant two bits of the byte, and the area in the most sig-
  nificant six bits of the byte.

  For more information on access control, see Volume One, Chapter 15, Other Programming Techniques.

Structures
     typedef struct {
	 int family;	       /* for example FamilyInternet */
	 int length;	       /* length of address, in bytes */
	 char *address;        /* pointer to where to find the bytes */
     } XHostAddress;

     /* The following constants for family member */
     #define FamilyInternet	  0
     #define FamilyDECnet	  1
     #define FamilyChaos	  2

Errors
  BadAccess
  BadValue

See Also
  XAddHosts(), XDisableAccessControl(), XEnableAccessControl(), XListHosts(), XRemoveHost(), XRemoveHosts(), XSetAccessControl().

Xlib - Host Access															XAddHost()
All times are GMT -4. The time now is 09:00 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy