Hi, i need help from u ..if u can .i have tried to install gnats bug tracking system on my system .now i am facing problem in installing the demons. Demons are not getting started. we have put entries in services and inetd.conf . when we are trying to start the service through gnatsd . we are getting the error message "520 you are not on the host access list:stdin (stdin). I had put host in gnatsd.conf & checked gnatsd.access also but above error message still occur. i had given following parameter whenever execute the configure at shell prompt i.e. #./configure ./configure --with-full-gnats --prefix=home/GNATS_ROOT/gnats-3.113/prefix --eprefix=home/GNATS_ROOT/gnats-3.113/e-prefix --with-gnats-root = home/GNATS_ROOT/gnats-3.113/data --with-gnats-server = gnats.com --with-gnats-service = gnats --with-gnats-user = gnats --with-gnats-port = 1529 --verbose Note: i am also attaching gnatsd.conf,gnatsd.access and inetd.conf file for ur help to understand the whole issue. i am very thankful if u give ur valuable suggestion. with thanx & regards [EMAIL PROTECTED]
# # Hosts that can do lookups with the GNATS daemon. # # Any line which begins with a `#' is considered a comment, and GNATS # will ignore it. # # Each entry has the format: # # host:access-level:whatever # # * host: the hostname or IP address of the user contacting gnatsd. # Wildcard characters are supported: # "*" matches anything; "?" matches any single character # * access-level: (default = edit) # deny - gnatsd closes the connection # none - no further access until userid and password given # view - query and view PRs with Confidential=no only # viewconf - query and view PRs with Confidential=yes # edit - full edit access # admin - full admin access (not currently used) # This is just the default access level for the user's host. Normally, # this will get overridden (increased) with the USER command. See the # gnatsd.access file. # # We currently don't make use of the third field. Ideas include # listing the categories, the PRs matching a given submitter-id, and # the PRs of a certain category to a particular site. # #192.168.*:view: #software.free.com:edit: #gnats:edit:* # setting done by us is as follows 191.55.1.177:edit:* 127.0.0.1:edit:* gnats:admin:*
# # User access levels with the GNATS daemon. # # Any line which begins with a `#' is considered a comment, and GNATS # will ignore it. # # Each entry has the format: # # userid:password:access-level:database-alias # # Wildcard characters are supported for userid, password and database. # "*" matches anything; "?" matches any single character # # * userid: a user id to gain access to gnatsd # * password: a password for the user # * access-level: (default = edit) # deny - gnatsd closes the connection # none - no further access until userid and password given # view - query and view PRs with Confidential=no only # viewconf - query and view PRs with Confidential=yes # edit - full edit access # admin - full admin access (not currently used) # This overrides (increases but never lowers) the access level given # as the default for the user's host in the /etc/gnatsd.conf file. # * database-alias: a comma-separated list of database aliases to # match alias entries from the second field of the database file # /etc/gnats-db.conf. This field is only used in /etc/gnatsd.access. # It's ignored in gnatsd-adm/gnatsd.access since this file is already # database specific. # # setting done by us is as follows *:*:edit: root:password:edit: gnats:gnats:edit:
# # inetd.conf This file describes the services that will be available # through the INETD TCP/IP super server. To re-configure # the running INETD process, edit this file, then send the # INETD process a SIGHUP signal. # # Version: @(#)/etc/inetd.conf 3.10 05/27/93 # # Authors: Original taken from BSD UNIX 4.3/TAHOE. # Fred N. van Kempen, <[EMAIL PROTECTED]> # # Modified for Debian Linux by Ian A. Murdock <[EMAIL PROTECTED]> # # Modified for RHS Linux by Marc Ewing <[EMAIL PROTECTED]> # # <service_name> <sock_type> <proto> <flags> <user> <server_path> <args> # # Echo, discard, daytime, and chargen are used primarily for testing. # # To re-read this file after changes, just do a 'killall -HUP inetd' # #echo stream tcp nowait root internal #echo dgram udp wait root internal #discard stream tcp nowait root internal #discard dgram udp wait root internal #daytime stream tcp nowait root internal #daytime dgram udp wait root internal #chargen stream tcp nowait root internal #chargen dgram udp wait root internal #time stream tcp nowait root internal #time dgram udp wait root internal # # These are standard services. # ftp stream tcp nowait root /usr/sbin/tcpd in.ftpd -l -a telnet stream tcp nowait root /usr/sbin/tcpd in.telnetd # # Shell, login, exec, comsat and talk are BSD protocols. # shell stream tcp nowait root /usr/sbin/tcpd in.rshd login stream tcp nowait root /usr/sbin/tcpd in.rlogind #exec stream tcp nowait root /usr/sbin/tcpd in.rexecd #comsat dgram udp wait root /usr/sbin/tcpd in.comsat talk dgram udp wait nobody.tty /usr/sbin/tcpd in.talkd ntalk dgram udp wait nobody.tty /usr/sbin/tcpd in.ntalkd #dtalk stream tcp wait nobody.tty /usr/sbin/tcpd in.dtalkd # # Pop and imap mail services et al # #pop-2 stream tcp nowait root /usr/sbin/tcpd ipop2d #pop-3 stream tcp nowait root /usr/sbin/tcpd ipop3d #imap stream tcp nowait root /usr/sbin/tcpd imapd # # The Internet UUCP service. # #uucp stream tcp nowait uucp /usr/sbin/tcpd /usr/lib/uucp/uucico -l # # Tftp service is provided primarily for booting. Most sites # run this only on machines acting as "boot servers." Do not uncomment # this unless you *need* it. # #tftp dgram udp wait root /usr/sbin/tcpd in.tftpd #bootps dgram udp wait root /usr/sbin/tcpd bootpd # # Finger, systat and netstat give out user information which may be # valuable to potential "system crackers." Many sites choose to disable # some or all of these services to improve security. # finger stream tcp nowait nobody /usr/sbin/tcpd in.fingerd #cfinger stream tcp nowait root /usr/sbin/tcpd in.cfingerd #systat stream tcp nowait guest /usr/sbin/tcpd /bin/ps -auwwx #netstat stream tcp nowait guest /usr/sbin/tcpd /bin/netstat -f inet # # Authentication # auth stream tcp wait root /usr/sbin/in.identd in.identd -e -o # # End of inetd.conf support stream tcp nowait gnats /home/GNATS_ROOT/gnats-3.113/e-prefix/libexec/gnats/gnatsd gnatsd linuxconf stream tcp wait root /bin/linuxconf linuxconf --http #swat stream tcp nowait.400 root /usr/sbin/swat swat linuxconf stream tcp wait root /bin/linuxconf linuxconf --http