02-18-2006
have you tried looking for the manpages of hosts.allow and hosts.deny yet? It's not exactly pan-unix, but it's a good solution,
short of setting up some firewalls rules I think you're just going to have to use this and a couple different methods in order to achieve the desired results...
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
hello dear all ,
i use both sun solaries 7 and linux red hat 6.1 and i added my pc IP address in /etc/hosts .
How do i refresh this file in order to make my new ip active ?? without restart .
Thanks all (2 Replies)
Discussion started by: tamemi
2 Replies
2. UNIX for Dummies Questions & Answers
Hi!
Im trying to use host.allow & host.deny to resrtic access to my sun machine, but it doesnt seem to work... I want to allow full access from certain IPīs (ssh,http,ftp,etc...) but deny all kind of conections from outsideworld, the way that im doing that is:
hosts.allow
ALL:127.0.0.1... (2 Replies)
Discussion started by: Sorrento
2 Replies
3. Cybersecurity
I was wondering where in UNIX is file where I can delete hosts that can or ca not access UNIX machine
thanks in advance (1 Reply)
Discussion started by: amon
1 Replies
4. UNIX for Dummies Questions & Answers
Hello everyone,
This is my first posts and I did search for a questions but did not find a question that answered my question unless of course I overlooked it.
I'm running Solaris 8. I use ssh for the users but I have a user called "chatterbox" that uses telnet but I need for chatterbox to... (1 Reply)
Discussion started by: huddlestonsnk
1 Replies
5. UNIX for Dummies Questions & Answers
Hello,
where can I get complete specification for /etc/hosts? I found a lot of snippets but nothing where the format of file is completely written (I'm especially interested in comments in /etc/hosts)
Thank you for help! (3 Replies)
Discussion started by: MartyIX
3 Replies
6. IP Networking
Hello everyone.
Im using last redhat enterprise edition and in my working environment, i'm always reconfiguring both interfaces , eth0 and eth1, everytime i change any interface, (i use ifconfig to change ip, and after i execute "/etc/init.d/network restart") my "/etc/hosts" file... (9 Replies)
Discussion started by: trutoman
9 Replies
7. UNIX for Dummies Questions & Answers
Ive change /etc/hosts many times but it reverts to the previous setting automatically. Ive restarted the server after the edit. Any ideas what im doing wrong
Previous /etc/hosts
127.0.0.1 localhost.localdomain localhost
# Auto-generated hostname. Please do not remove this... (3 Replies)
Discussion started by: wizecho
3 Replies
8. AIX
hi all
just installed the netsec.options.tcpwrapper from expansion pack, which used to be a rpm, for my aix 6.1 test box.
it is so unpredictable. i set up the hosts.deny as suggested for all and allow the sshd for specific ip addresses/hostnames.
the tcpdchk says the hosts allowed and... (0 Replies)
Discussion started by: wf201626
0 Replies
9. UNIX for Dummies Questions & Answers
Hi there,
For /etc/hosts.deny was it used to deny access from the internet? (2 Replies)
Discussion started by: alvinoo
2 Replies
10. Solaris
Am trying to copy a tar file onto a series of remote hosts and untar it at the destination. Need to do this without having to do multiple ssh.
Actions to perform within a single ssh session via shell script
- copy a file
- untar at destination (remote host)
OS : Linux RHEL6 (3 Replies)
Discussion started by: sankasu
3 Replies
TCPDCHK(8) System Manager's Manual TCPDCHK(8)
NAME
tcpdchk - tcp wrapper configuration checker
SYNOPSYS
tcpdchk [-a] [-d] [-i inet_conf] [-v]
DESCRIPTION
tcpdchk examines your tcp wrapper configuration and reports all potential and real problems it can find. The program examines the tcpd
access control files (by default, these are /etc/hosts.allow and /etc/hosts.deny), and compares the entries in these files against entries
in the inetd or tlid network configuration files.
tcpdchk reports problems such as non-existent pathnames; services that appear in tcpd access control rules, but are not controlled by tcpd;
services that should not be wrapped; non-existent host names or non-internet address forms; occurrences of host aliases instead of official
host names; hosts with a name/address conflict; inappropriate use of wildcard patterns; inappropriate use of NIS netgroups or references to
non-existent NIS netgroups; references to non-existent options; invalid arguments to options; and so on.
Where possible, tcpdchk provides a helpful suggestion to fix the problem.
OPTIONS
-a Report access control rules that permit access without an explicit ALLOW keyword. This applies only when the extended access control
language is enabled (build with -DPROCESS_OPTIONS).
-d Examine hosts.allow and hosts.deny files in the current directory instead of the default ones.
-i inet_conf
Specify this option when tcpdchk is unable to find your inetd.conf or tlid.conf network configuration file, or when you suspect that
the program uses the wrong one.
-v Display the contents of each access control rule. Daemon lists, client lists, shell commands and options are shown in a pretty-
printed format; this makes it easier for you to spot any discrepancies between what you want and what the program understands.
FILES
The default locations of the tcpd access control tables are:
/etc/hosts.allow
/etc/hosts.deny
SEE ALSO
tcpdmatch(8), explain what tcpd would do in specific cases.
hosts_access(5), format of the tcpd access control tables.
hosts_options(5), format of the language extensions.
inetd.conf(5), format of the inetd control file.
tlid.conf(5), format of the tlid control file.
AUTHORS
Wietse Venema (wietse@wzv.win.tue.nl),
Department of Mathematics and Computing Science,
Eindhoven University of Technology
Den Dolech 2, P.O. Box 513,
5600 MB Eindhoven, The Netherlands
TCPDCHK(8)