Red Hat ENTERPRISE LINUX 5 - DEPLOYMENT Deployment Manual page 690

Hide thumbs Also See for ENTERPRISE LINUX 5 - DEPLOYMENT:
Table of Contents

Advertisement

Chapter 43. Securing Your Network
The only_from and no_access options can use a list of IP addresses or host names, or can specify
an entire network. Like TCP Wrappers, combining xinetd access control with the enhanced logging
configuration can increase security by blocking requests from banned hosts while verbosely recording
each connection attempt.
For example, the following /etc/xinetd.d/telnet file can be used to block Telnet access from a
particular network group and restrict the overall time range that even allowed users can log in:
service telnet
{
disable
flags
= REUSE
socket_type
= stream
wait
= no
user
= root
server
= /usr/kerberos/sbin/telnetd
log_on_failure
+= USERID
no_access
= 172.16.45.0/24
log_on_success
+= PID HOST EXIT
access_times
= 09:45-16:15
}
In this example, when a client system from the 10.0.1.0/24 network, such as 10.0.1.2, tries to
access the Telnet service, it receives the following message:
Connection closed by foreign host.
In addition, their login attempts are logged in /var/log/messages as follows:
Sep
7 14:58:33 localhost xinetd[5285]: FAIL: telnet address from=172.16.45.107
Sep
7 14:58:33 localhost xinetd[5283]: START: telnet pid=5285 from=172.16.45.107
Sep
7 14:58:33 localhost xinetd[5283]: EXIT: telnet status=0 pid=5285 duration=0(sec)
When using TCP Wrappers in conjunction with xinetd access controls, it is important to understand
the relationship between the two access control mechanisms.
The following is the sequence of events followed by xinetd when a client requests a connection:
1. The xinetd daemon accesses the TCP Wrappers hosts access rules using a libwrap.a library
call. If a deny rule matches the client, the connection is dropped. If an allow rule matches the
client, the connection is passed to xinetd.
2. The xinetd daemon checks its own access control rules both for the xinetd service and
the requested service. If a deny rule matches the client, the connection is dropped. Otherwise,
xinetd starts an instance of the requested service and passes control of the connection to that
service.
Important
Care should be taken when using TCP Wrappers access controls in conjunction with
xinetd access controls. Misconfiguration can cause undesirable effects.
664
= no

Advertisement

Table of Contents
loading

Table of Contents