Hmm, I'll try to help.
If you're running rsync daemon mode using port 873/tcp, you can filter the
ipchain by the port number.  (There is an entry in services for 873/udp -
does anyone know if this is this used, or just reserved?)

Something as little as:

/sbin/ipchains -A output DENY -i $extif 873

where $extif is the external interface.  Maybe add -l at the end to log the
attempts.

Otherwise if you're running it using rsh, ssh, whatever, I think you should
be able to set up your permissions there (I haven't used either yet, so I
speak from ignorance on rsh/ssh).

HTH,
Lillian


Message: 11
From:   "Liston Johnson" <[EMAIL PROTECTED]>
To:     <[EMAIL PROTECTED]>
Subject:        Security
Date:   Tue, 14 Nov 2000 10:26:08 -0000

This is a multi-part message in MIME format.
------=_NextPart_000_0028_01C04E25.4D700F80
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Hi
Can anyone give me some examples of using rsync with ipchains in order to
stop someone from the outside using rsync to copy files/directories from a
server.
Thanks.

Liston Johnson
iCrunch Ltd
2nd Floor
326 Kensal Road
London
W10 5BZ
Tel +44 (0)20 8354 4872
Fax +44 (0)20 8354 4801
Mobile +44 (0)7932 110 719
Email [EMAIL PROTECTED]
www.icrunch.com - Best Entertainment Site, NMA Awards 2000



Reply via email to