At 14:56 14/01/01, you wrote:
>Using "all:all" in /etc/hosts.deny and "all:local 192.168" in /etc/hosts.allow
>seems to kill swat (Samba web admin) and ssh (connections are immediately
>closed) while allowing other traffic such as cups web admin. Any ideas how to
>securly work around this or why it is happening?
>
>Thanks!
>
>John LeMay Jr.
>Senior Enterprise Consultant
>NJMC, LLC.

There must be a different reason why those daemons get killed off because, they
are not linked in any way to /etc/hosts.*.
The tcpd daemon uses /etc/hosts.* as its config files to see what is 
blocked and
whats let thru, but this is only done through the inetd daemon stuff, such as
telnet, ftp etc... but not services which run on their own, such as httpd, 
samba, sshd
and I assume swat as well.
For example this is a line for the pop3 server:
pop-3   stream  tcp     nowait  root    /usr/sbin/tcpd  ipop3d
inetd is woken up by a connection attempt at port 110, then it starts up 
tcpd, which
checks /etc/hosts.* and then decides whether or not to start up the pop3 
daemon.

So since swat and ssh shouldnt be started from inetd anyway the fact that 
/etc/httpd.*
contain all:all means nothing, coz that only affects services defined in 
/etc/inetd.conf.
Try looking through the logs in /var/log and check if there is any reason 
mentioned
why those 2 services are dying.

If you really want to block all ports and only let some through you should use
ipchains.


Sadin Nurkic


Reply via email to