All I have in my hosts.deny is ALL: ALL.
Then I let only the things I want through with hosts.allow.

I was under the impression this was the most secure way to do it.



Andy Zbikowski wrote:

> Hmmm, betcha you have a ALL:Parinoid entry in /etc/hosts.deny. With that
> option, you won't be able to access just about everything if your ip and
> hostname don't matchup/resolve. The soultion is, fix your host name. =)
>
> You could add a ALL: IP Range of your ISP to hosts.allow, or if your on
> static IP add a entry to /etc/hosts on the server machine. If your going
> from an internal host to an internal host, get bind working to resolve
> names for your internal network or add an entry in /etc/hosts for every
> machine.
>
> --
>         \\\|///
>       \\  - -  //
>        (  @ @ )
> ----oOOo--(_)-oOOo--------------------------------------------
> Andy Zbikowski, Sys Admin   | (WEB) http://www.ltiflex.com
> LTI Flexible Products, Inc. | (PH)  763-428-9119 (EX) 132
> 21801 Industrial Blvd       | (FX)  763-428-9126
> Rogers, MN  55374           | (PCS) 612-306-6055
> ---------------Ooooo------------------------------------------
>                (   )
>       ooooO     ) /
>       (   )    (_/
>        \ (
>         \_)
>
>   ------------------------------------------------------------------------
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: tclug-list-unsubscribe at mn-linux.org
> For additional commands, e-mail: tclug-list-help at mn-linux.org


---------------------------------------------------------------------
To unsubscribe, e-mail: tclug-list-unsubscribe at mn-linux.org
For additional commands, e-mail: tclug-list-help at mn-linux.org