You are not logged in.
Hi I am using a pc as a local server.
Since I have done an upgrade today to 2.6.20-ARCH, telnet to this server is no longer possible.
So it looks like a security feature is set now.
When I do a telnet from the console itself to the local interface ip address or to 127.0.0.1 I got
" connection closed by foreign host"
service telnet
{
flags = REUSE
socket_type = stream
wait = no
user = root
server = /usr/sbin/in.telnetd
log_on_failure += USERID
disable = no
}
checked /etc/host.allow > there as nothing , so I have add the client address
I never configured iptables or any other firewall.
> same problem.
Any idea ?
Last edited by go4it (2007-02-21 23:12:55)
Offline
nmap 192.168.1.3
gives me: 23/ tcp open telnet
Last edited by go4it (2007-02-22 09:46:04)
Offline
Have you checked /etc/host.deny?
cg
Offline
Have you checked /etc/host.deny?
cg
Yes, I created this files, but without success.
finally I found that ArchLinux uses
hosts.deny instead of host.deny
hosts.allow intead of host.allow
I found
ALL: ALL: DENY in hosts.deny
and nothing allowed in hosts.allow !
Conclusion: After upgrade remote access is NOT allowed.
Fix: just added
ALL: 192.168.1.2: ALLOW
ALL: 127.0.0.1: ALLOW
in hosts.allow
and now it's working ! ![]()
Edit:
tested a few masks now:
these works:
ALL: 192.168.1.: ALLOW
ALL: 192.168.1.0/255.255.255.0: ALLOW
ALL: 192.168.1.0/255.255.255.192: ALLOW
type
xinetd -reuse to activate what you changed.
Last edited by go4it (2007-02-22 17:40:52)
Offline