On Friday 15 March 2002 05:40 pm, you wrote:
> On Fri, Mar 15, 2002 at 02:23:37PM -0800, Harry Putnam wrote:
> > Did you make and adjustments to disallow any traffic from the internet
> > on 143? (Or I guess 110 in your case) I wondered how to make it so
> > only 192.XXX.XXX is allowed to connect to it.  Or even so that it
> > isn't even seen from the internet.  So a scan would not show it open
> > or running.
>
> I've got a Linksys firewall between my Linux system and the outside world.
> The Linksys only passed a few pre-defined ports through (like 25 and 80).
> Everything is blocked by default.  You could do the same thing using
> ipchains or similar.  I believe you should be able to do in your xinetd.d
> config file.  See http://www.xinetd.org/sample.shtml for a sample config
> that restricts access this way.
>

Hi, I've been following the discussion, since I am considering something on 
this line also. 
I am thinking of using ipopd instead of imapd. But ipopd and imapd is started 
from xinetd in my system (default RH 7.2). If that's the case for you too, 
would not just adding the some line in hosts.allow and hosts.deny solve this 
problem? Is it almost the same case with other services as telnet and ftpd?

I might be missing somthing here, since I am somewhat a newbie in this thing.

Thanks.
Reuben D. Budiardja



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to