Re: ALL: PARANOID from /etc/hosts.deny Should be Commented by default

2001-05-05 Thread Scott Dier
* Joey Hess <[EMAIL PROTECTED]> [010425 11:12]: > This is actually quite doable, you just need to have a clued isp[1] who > sets up a nifty little forwarding trick in the reverse DNS. Here's an > exmple of how my old ISP did it: > >net152 ns kitenet.net. >153

Re: ALL: PARANOID from /etc/hosts.deny Should be Commented by default

2001-05-01 Thread kaneda
On Thursday 19 April 2001 17:33, Nathan Dabney wrote: > How about we first ask the user upon install if they want to be able to > accept outside connections at all. > > I think this thread could be solved by designing a few types of installs > and giving defaults for host.deny and host.allow and ot

Re: ALL: PARANOID from /etc/hosts.deny Should be Commented by default

2001-04-25 Thread Tollef Fog Heen
* Joey Hess | Daniel Stone wrote: | > Here's where theory and practice come into play. I only have a small chunk | > of 203.36.158.* (113-127, afaik), so how can you DNS-delegate that? At | > least, if there is a way, Telstra haven't figured it out yet. | | This is actually quite doable, you jus

Re: ALL: PARANOID from /etc/hosts.deny Should be Commented by default

2001-04-25 Thread Jeremy T. Bouse
Another tighter configuration provided the provider is using atleast BIND8 is to add the following to their 158.36.203.IN-ADDR.ARPA zone $ORIGIN 158.36.203.IN-ADDR.ARPA. $GENERATE 113-127 $ CNAME $.113-127 $GENERATE 1-2 113-127 NS ns$.example.com. In this example the BIND8 server

Re: ALL: PARANOID from /etc/hosts.deny Should be Commented by default

2001-04-25 Thread Joey Hess
Daniel Stone wrote: > Here's where theory and practice come into play. I only have a small chunk > of 203.36.158.* (113-127, afaik), so how can you DNS-delegate that? At > least, if there is a way, Telstra haven't figured it out yet. This is actually quite doable, you just need to have a clued isp