Hi all,Strange question, and I'm seeing this behavior on a few CentOS 6.3 servers running 2.6.32-279.14.1.el6.x86_64. Does anyone know what process would write to iptables and hosts.deny... [by clutch68rs]
Currently I have few ips in hosts.allow as sshd: ipaddresses to restrict ssh access and sshd: ALL in hosts.deny. Can we put those two rules together in one file hosts.allow? What would be syntax? It is remote host (running CentOS) and I don't want to lock myself out if it does not work. If I use just hosts.allow, do I leave the hosts.deny empty?
For some reason, my APF / iptables has started throwing up an error when I try to use the "advanced" format for adding "deny" rules:
[~]> apf -d tcp:in:d=80:d=126.96.36.199
iptables v1.3.5: host/network `tcp:in:d=80:d=188.8.131.52' not found
Try `iptables -h' or 'iptables --help' for more information.
iptables v1.3.5: host/network `tcp:in:d=80:d=123.123.123.
I have in my organization varied OS types (AIX,RHEL,Solaris)
My need was to block ftp connections from some addresses on my organization,
but to not disable the protocol.
In the linux servers i did that with the hosts.deny file that used by the vsftpd deamon.
In my AIX servers, i have the simple ftp protocol that not support hosts.deny and hosts.allow files.
I read on the internet about the
I want to make a bunch of websites unaccessible on my computer.
My hosts.allow file:
# /etc/hosts.allow: list of hosts that are allowed to access the system.
# See the manual pages hosts_access(5) and hosts_options(5).
# Example: ALL: LOCAL @some_netgroup
# ALL: .foobar.edu EXCEPT terminalserver.foobar.edu
# If you're going to protect the portma