10 More Discussions You Might Find Interesting
1. Solaris
I have problem with oracle solaris 10 running on oracle sparc T4-2 server.
Os information: 5.10 Generic_150400-03 sun4v sparc sun4v
Output from tcpstat.d script
TCP bytes: out outRetrans in inDup inUnorder
6833763 7300 98884 0... (2 Replies)
Discussion started by: insatiable1610
2 Replies
2. AIX
Hi,
I have in my organization varied OS types (AIX,RHEL,Solaris)
My need was to block ftp connections from some addresses on my organization,
but to not disable the protocol.
In the linux servers i did that with the hosts.deny file that used by the vsftpd deamon.
In my AIX servers, i have... (6 Replies)
Discussion started by: moshesa
6 Replies
3. AIX
hi all
just installed the netsec.options.tcpwrapper from expansion pack, which used to be a rpm, for my aix 6.1 test box.
it is so unpredictable. i set up the hosts.deny as suggested for all and allow the sshd for specific ip addresses/hostnames.
the tcpdchk says the hosts allowed and... (0 Replies)
Discussion started by: wf201626
0 Replies
4. UNIX for Advanced & Expert Users
I'm using vsftpd which is being controlled by inetd.
I have a user that I want to only be able to connect from one specific IP address on the same internal network so I can backup files on a separate system.
Is this possible with TCP wrappers? I got the notion that it was because of a few... (4 Replies)
Discussion started by: mashiox
4 Replies
5. AIX
Hi All,
Any idea what is the security wrappers on AIX 5.3?
Any idea will be highly appreciated, thanks. (1 Reply)
Discussion started by: itik
1 Replies
6. AIX
With things installed and wrapping ftpd on AIX 5.1 in hosts.deny I have;
ALL: ALL
in hosts.allow;
ftpd: x.x.x.x
ALL: x.x.x.x
I get this on connect via ftp;
421 Service not available, remote server has closed connection
So its working as far as blocking but the hosts.allow seems to be... (1 Reply)
Discussion started by: traken
1 Replies
7. Solaris
I want to log tcp-wrapper events Solaris 10. I researched and saw that I could make a syslog entry in the hosts.deny, which I did below. After restarting syslog and having ssh blocking, I see nothing logging. I also do not get the email that should be generated. The file was taken from a... (2 Replies)
Discussion started by: csgonan
2 Replies
8. IP Networking
I have written a TCP/IP client and server program. The client sends a message to the server and then the server sends a file back to the client. The client reads the buffer and stores it another file in the client side.
I need to know what are the various exceptions that I need to handle in... (0 Replies)
Discussion started by: Rajeshsu
0 Replies
9. Cybersecurity
I have installed TCP wrappers , Good package ...
I have a problem with the hosts_options part ...
I am not able to use the twist command .. It just dosent respond
I have compiled wrappers 7.6 for Solaris 8 with ipv6 support ...
Everything works fine except the twist doesnt work
I have... (1 Reply)
Discussion started by: DPAI
1 Replies
10. Cybersecurity
!HELLO ,
What is the maximum number of hosts on a TCP/IP internet?
plz can u help me.
:rolleyes: (2 Replies)
Discussion started by: smdakram
2 Replies
ftphosts(4) File Formats ftphosts(4)
NAME
ftphosts - FTP Server individual user host access file
SYNOPSIS
/etc/ftpd/ftphosts
DESCRIPTION
The ftphosts file is used to allow or deny access to accounts from specified hosts. The following access capabilities are supported:
allow username addrglob [addrglob...]
Only allow users to login as username from host(s) that match addrglob.
deny username addrglob [addrglob...]
Do not allow users to login as username from host(s) that match addrglob.
A username of * matches all users. A username of anonymous or ftp specifies the anonymous user.
addrglob is a regular expression that is matched against hostnames or IP addresses. addrglob may also be in the form address:netmask or
address/CIDR, or be the name of a file that starts with a slash ('/') and contains additional address globs. An exclamation mark (`!')
placed before the addrglob negates the test.
The first allow or deny entry in the ftphosts file that matches a username and host is used. If no entry exists for a username, then access
is allowed. Otherwise, a matching allow entry is required to permit access.
EXAMPLES
You can use the following ftphosts file to allow anonymous access from any host except those on the class A network 10, with the exception
of 10.0.0.* IP addresses, which are allowed access:
allow ftp 10.0.0.*
deny ftp 10.*.*.*
allow ftp *
10.0.0.* can be written as 10.0.0.0:255.255.255.0 or 10.0.0.0/24.
FILES
/etc/ftpd/ftphosts
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWftpr |
+-----------------------------+-----------------------------+
|Interface Stability |External |
+-----------------------------+-----------------------------+
SEE ALSO
in.ftpd(1M), ftpaccess(4), attributes(5)
SunOS 5.10 1 May 2003 ftphosts(4)