Hi,
i need help from u ..if u can .i have tried to install gnats
bug tracking system on my system .now i am facing problem in installing the
demons. Demons are not getting started. we have put entries in services and
inetd.conf .
when we are trying to start the service through gnatsd . we are
getting the error message "520 you are not on the host access list:stdin
(stdin).
I had put host in gnatsd.conf & checked gnatsd.access also but
above error message still occur.
i had given following parameter whenever execute the configure
at shell prompt i.e. #./configure
./configure --with-full-gnats
--prefix=home/GNATS_ROOT/gnats-3.113/prefix
--eprefix=home/GNATS_ROOT/gnats-3.113/e-prefix
--with-gnats-root =
home/GNATS_ROOT/gnats-3.113/data
--with-gnats-server = gnats.com
--with-gnats-service = gnats
--with-gnats-user = gnats
--with-gnats-port = 1529
--verbose
Note: i am also attaching gnatsd.conf,gnatsd.access and inetd.conf file
for ur help to understand the whole issue.
i am very thankful if u give ur valuable suggestion.
with thanx & regards
[EMAIL PROTECTED]
#
# Hosts that can do lookups with the GNATS daemon.
#
# Any line which begins with a `#' is considered a comment, and GNATS
# will ignore it.
#
# Each entry has the format:
#
# host:access-level:whatever
#
# * host: the hostname or IP address of the user contacting gnatsd.
# Wildcard characters are supported:
# "*" matches anything; "?" matches any single character
# * access-level: (default = edit)
# deny - gnatsd closes the connection
# none - no further access until userid and password given
# view - query and view PRs with Confidential=no only
# viewconf - query and view PRs with Confidential=yes
# edit - full edit access
# admin - full admin access (not currently used)
# This is just the default access level for the user's host. Normally,
# this will get overridden (increased) with the USER command. See the
# gnatsd.access file.
#
# We currently don't make use of the third field. Ideas include
# listing the categories, the PRs matching a given submitter-id, and
# the PRs of a certain category to a particular site.
#
#192.168.*:view:
#software.free.com:edit:
#gnats:edit:*
# setting done by us is as follows
191.55.1.177:edit:*
127.0.0.1:edit:*
gnats:admin:*
#
# User access levels with the GNATS daemon.
#
# Any line which begins with a `#' is considered a comment, and GNATS
# will ignore it.
#
# Each entry has the format:
#
# userid:password:access-level:database-alias
#
# Wildcard characters are supported for userid, password and database.
# "*" matches anything; "?" matches any single character
#
# * userid: a user id to gain access to gnatsd
# * password: a password for the user
# * access-level: (default = edit)
# deny - gnatsd closes the connection
# none - no further access until userid and password given
# view - query and view PRs with Confidential=no only
# viewconf - query and view PRs with Confidential=yes
# edit - full edit access
# admin - full admin access (not currently used)
# This overrides (increases but never lowers) the access level given
# as the default for the user's host in the /etc/gnatsd.conf file.
# * database-alias: a comma-separated list of database aliases to
# match alias entries from the second field of the database file
# /etc/gnats-db.conf. This field is only used in /etc/gnatsd.access.
# It's ignored in gnatsd-adm/gnatsd.access since this file is already
# database specific.
#
# setting done by us is as follows
*:*:edit:
root:password:edit:
gnats:gnats:edit:
#
# inetd.conf This file describes the services that will be available
# through the INETD TCP/IP super server. To re-configure
# the running INETD process, edit this file, then send the
# INETD process a SIGHUP signal.
#
# Version: @(#)/etc/inetd.conf 3.10 05/27/93
#
# Authors: Original taken from BSD UNIX 4.3/TAHOE.
# Fred N. van Kempen, <[EMAIL PROTECTED]>
#
# Modified for Debian Linux by Ian A. Murdock <[EMAIL PROTECTED]>
#
# Modified for RHS Linux by Marc Ewing <[EMAIL PROTECTED]>
#
# <service_name> <sock_type> <proto> <flags> <user> <server_path> <args>
#
# Echo, discard, daytime, and chargen are used primarily for testing.
#
# To re-read this file after changes, just do a 'killall -HUP inetd'
#
#echo stream tcp nowait root internal
#echo dgram udp wait root internal
#discard stream tcp nowait root internal
#discard dgram udp wait root internal
#daytime stream tcp nowait root internal
#daytime dgram udp wait root internal
#chargen stream tcp nowait root internal
#chargen dgram udp wait root internal
#time stream tcp nowait root internal
#time dgram udp wait root internal
#
# These are standard services.
#
ftp stream tcp nowait root /usr/sbin/tcpd in.ftpd -l -a
telnet stream tcp nowait root /usr/sbin/tcpd in.telnetd
#
# Shell, login, exec, comsat and talk are BSD protocols.
#
shell stream tcp nowait root /usr/sbin/tcpd in.rshd
login stream tcp nowait root /usr/sbin/tcpd in.rlogind
#exec stream tcp nowait root /usr/sbin/tcpd in.rexecd
#comsat dgram udp wait root /usr/sbin/tcpd in.comsat
talk dgram udp wait nobody.tty /usr/sbin/tcpd in.talkd
ntalk dgram udp wait nobody.tty /usr/sbin/tcpd in.ntalkd
#dtalk stream tcp wait nobody.tty /usr/sbin/tcpd in.dtalkd
#
# Pop and imap mail services et al
#
#pop-2 stream tcp nowait root /usr/sbin/tcpd ipop2d
#pop-3 stream tcp nowait root /usr/sbin/tcpd ipop3d
#imap stream tcp nowait root /usr/sbin/tcpd imapd
#
# The Internet UUCP service.
#
#uucp stream tcp nowait uucp /usr/sbin/tcpd /usr/lib/uucp/uucico -l
#
# Tftp service is provided primarily for booting. Most sites
# run this only on machines acting as "boot servers." Do not uncomment
# this unless you *need* it.
#
#tftp dgram udp wait root /usr/sbin/tcpd in.tftpd
#bootps dgram udp wait root /usr/sbin/tcpd bootpd
#
# Finger, systat and netstat give out user information which may be
# valuable to potential "system crackers." Many sites choose to disable
# some or all of these services to improve security.
#
finger stream tcp nowait nobody /usr/sbin/tcpd in.fingerd
#cfinger stream tcp nowait root /usr/sbin/tcpd in.cfingerd
#systat stream tcp nowait guest /usr/sbin/tcpd /bin/ps -auwwx
#netstat stream tcp nowait guest /usr/sbin/tcpd /bin/netstat -f inet
#
# Authentication
#
auth stream tcp wait root /usr/sbin/in.identd in.identd -e -o
#
# End of inetd.conf
support stream tcp nowait gnats
/home/GNATS_ROOT/gnats-3.113/e-prefix/libexec/gnats/gnatsd gnatsd
linuxconf stream tcp wait root /bin/linuxconf linuxconf --http
#swat stream tcp nowait.400 root /usr/sbin/swat swat
linuxconf stream tcp wait root /bin/linuxconf linuxconf --http