ftp, telnet, ...

Locked
Message
Author
falkue1
Posts: 21
Joined: 08. Jan 2000 17:38
Location: Regensburg

ftp, telnet, ...

#1 Post by falkue1 »

Moin Moin,

ich habe ein kleines Problem mit meinem ftp-Dienst auf Suse 6.2!

Nachdem ich einen Firewall installieren wollte (und diese Installation rückgängig gemacht habe), hat mein ftp und telnet - Dienst den DIENST quitiert.

meine inetd.conf:
# See "man 8 inetd" for more information.
#
# If you make changes to this file, either reboot your machine or send the
# inetd a HUP signal:
# Do a "ps x" as root and look up the pid of inetd. Then do a
# "kill -HUP <pid of inetd>".
# The inetd will re-read this file whenever it gets that signal.
#
# <service_name> <sock_type> <proto> <flags> <user> <server_path> <args>
#
# echo stream tcp nowait root internal
# echo dgram udp wait root internal
# discard stream tcp nowait root internal
# discard dgram udp wait root internal
# daytime stream tcp nowait root internal
# daytime dgram udp wait root internal
# chargen stream tcp nowait root internal
# chargen dgram udp wait root internal
time stream tcp nowait root internal
time dgram udp wait root internal
#
# These are standard services.
#
ftp stream tcp nowait root /usr/sbin/tcpd wu.ftpd -a
# ftp stream tcp nowait root /usr/sbin/tcpd proftpd
# ftp stream tcp nowait root /usr/sbin/tcpd in.ftpd
#
# If you want telnetd not to "keep-alives" (e.g. if it runs over a ISDN
# uplink), add "-n". See 'man telnetd' for more deatails.
# telnet stream tcp nowait root /usr/sbin/tcpd in.telnetd
# nntp stream tcp nowait news /usr/sbin/tcpd /usr/sbin/leafnode
# smtp stream tcp nowait root /usr/sbin/sendmail sendmail -bs
# printer stream tcp nowait root /usr/sbin/tcpd /usr/bin/lpd -i
#
# Shell, login, exec and talk are BSD protocols.
# The option "-h" permits ``.rhosts'' files for the superuser. Please look at
# man-page of rlogind and rshd to see more configuration possibilities about
# .rhosts files.
shell stream tcp nowait root /usr/sbin/tcpd in.rshd -L
# shell stream tcp nowait root /usr/sbin/tcpd in.rshd -aL
#
# If you want rlogind not to "keep-alives" (e.g. if it runs over a ISDN
# uplink), add "-n". See 'man rlogind' for more deatails.
login stream tcp nowait root /usr/sbin/tcpd in.rlogind
# login stream tcp nowait root /usr/sbin/tcpd in.rlogind -a
# exec stream tcp nowait root /usr/sbin/tcpd in.rexecd
#talk dgram udp wait root /usr/sbin/tcpd in.talkd
#ntalk dgram udp wait root /usr/sbin/tcpd in.talkd
#
#
# Pop et al
#
# pop2 stream tcp nowait root /usr/sbin/tcpd in.pop2d
#pop3 stream tcp nowait root /usr/sbin/tcpd /usr/sbin/popper -s
#
# Imapd - Interactive Mail Access Protocol server
# Attention: This service is very insecure
# imap2 stream tcp nowait root /usr/sbin/tcpd imapd
#
# Comsat - has to do with mail.
#
# comsat dgram udp wait root /usr/sbin/tcpd in.comsat
#
# The Internet UUCP service.
#
# uucp stream tcp nowait uucp /usr/sbin/tcpd /usr/lib/uucp/uucico -l
#
# Tftp service is provided primarily for booting. Most sites
# run this only on machines acting as "boot servers."
#
# tftp dgram udp wait nobody /usr/sbin/tcpd in.tftpd /tftpboot
# bootps dgram udp wait root /usr/sbin/bootpd bootpd -c /tftpboot
#
# Finger, systat and netstat give out user information which may be
# valuable to potential "system crackers." Many sites choose to disable
# some or all of these services to improve security.
# Try "telnet localhost systat" and "telnet localhost netstat" to see that
# information yourself!
#
#finger stream tcp nowait nobody /usr/sbin/tcpd in.fingerd -w
# systat stream tcp nowait nobody /usr/sbin/tcpd /bin/ps -auwwx
# netstat stream tcp nowait root /usr/sbin/tcpd /bin/netstat -a
ident stream tcp wait nobody /usr/sbin/in.identd in.identd -w -e -t120
#
# Sun-RPC based services.
# <service name/version><sock_type><rpc/prot><flags><user><server><args>
#
# rstatd/1-3 dgram rpc/udp wait root /usr/sbin/tcpd rpc.rstatd
# rusersd/2-3 dgram rpc/udp wait root /usr/sbin/tcpd rpc.rusersd
# walld/1 dgram rpc/udp wait root /usr/sbin/tcpd rpc.rwalld
#
# For man on the fly and ht://dig (full text search)
#
#http-rman stream tcp nowait.10000 nobody /usr/sbin/tcpd
#/usr/sbin/http-rman #
# For XCept4
#
#btx stream tcp nowait root /usr/sbin/tcpd
#/usr/lib/xcept4/bin/ceptd -i/usr/lib/xcept4/etc/init.ceptd
#-u/usr/lib/xcept4/etc/users.ceptd -l/var/log/log.ceptd # # For rplay daemon
#
# Old versions of rplay:
# rplay dgram udp wait root /usr/sbin/tcpd rplayd -b 8192 -c 60 -s 8192
# New Versions of rplay (>=3.3.0)
rplay dgram udp wait root /usr/sbin/tcpd rplayd -t 30 -c 60 -s
16384 -F0 --inetd #
# vbox (Voice Box)
#
#vboxd stream tcp nowait root /usr/sbin/tcpd /usr/sbin/vboxd
#
# For midinetd
#
#midinet stream tcp nowait root /usr/sbin/tcpd in.midinetd
#
# These are to start Samba, an smb server that can export filesystems to
# Pathworks, Lanmanager for DOS, Windows for Workgroups, Windows95, Lanmanager
# for Windows, Lanmanager for OS/2, Windows NT, etc. Lanmanager for dos is
# available via ftp from ftp.microsoft.com in bussys/MSclient/dos/. Please read
# the licensing stuff before downloading. Use the TCP/IP option in the client.
# Add your server to the \etc\lmhosts (or equivalent) file on the client.
#
# IMPORTANT: In S.u.S.E. Linux 5.0 samba is started by the init skript
# /sbin/init.d/smb. Th following entries should stay disabled
#
# netbios-ssn stream tcp nowait root /usr/sbin/smbd smbd -l /var/log/samba -s /etc/smb.conf
# netbios-ns dgram udp wait root /usr/sbin/nmbd nmbd
#
# swat is the Samba Web Administration Tool
# swat stream tcp nowait.400 root /usr/sbin/swat swat
#
#
# amanda backup server with indexing capabilities
#
# amandaidx stream tcp nowait root /usr/lib/amanda/amindexd amindexd
# amidxtape stream tcp nowait root /usr/lib/amanda/amidxtaped amidxtaped
#
#
# the rsync daemon
#
# rsync stream tcp nowait root /usr/sbin/tcpd rsyncd --daemon
#
#
# Mimer database
#
# mimer stream tcp nowait root /opt/mimer/bin/mimtcp mimtcp -l
#
#
# End.

Ich bin jedoch der Meinung, daß es nicht an dieser File liegt.
Ein seltsames Phänomen ist auch, daß wenn ein User auf meinem System den Befehl "nmap -sT IP_ADRESSE" eingibt er alle Ports als freigegeben sieht, jedoch kann ich als root keinen sehen und User die sich von außerhalb einwählen wollen auch nicht!!!
Anbei noch ein Auszug aus der rc.config:
#
# Firewall settings - See /usr/doc/packages/firewall
# for a detailed description
#
FW_START=""
FW_LOCALNETS=""
FW_FTPSERVER=""
FW_WWWSERVER=""
FW_SSLSERVER=""
FW_SSLPORT=""
FW_MAILSERVER=""
FW_DNSSERVER=""
FW_NNTPSERVER=""
FW_NEWSFEED=""
FW_WORLD_DEV=""
FW_INT_DEV=""
FW_LOG_ACCEPT=""
FW_LOG_DENY=""
FW_ROUTER=""
FW_FRIENDS=""
FW_INOUT=""
FW_SSH=""
FW_TRANSPROXY_OUT=""
FW_TRANSPROXY_IN=""
FW_REDIRECT=""
FW_TCP_LOCKED_PORTS=""
FW_UDP_LOCKED_PORTS=""

Der Auszug zeigt meine rückgängig gemachte FW - Config.

Ich hoffe daß mir jemand bei dem Problem helfen kann.

Danke schön
Tschüß FALK

MiH

Re: ftp, telnet, ...

#2 Post by MiH »

auch Moin,

kein wunder! die telnet-dienste sind komplett auskommentiert und als ftp steht dir (nur) der wu.ftp zur verfügung, welchen du aber offensichtlich nicht verwenden willst/kannst. nimm mal die kommentarzeichen bei in.ftp unf in.telnet raus, dann sollte es laufen.

falkue1
Posts: 21
Joined: 08. Jan 2000 17:38
Location: Regensburg

Re: ftp, telnet, ...

#3 Post by falkue1 »

Danke schön!

Tschüß
FALK

Locked