- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- non system users access w/ ftp
Operating System - HP-UX
1753550
Members
5521
Online
108795
Solutions
Forums
Categories
Company
Local Language
юдл
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Forums
Discussions
юдл
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Go to solution
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-02-2000 06:58 PM
тАО09-02-2000 06:58 PM
HI:
I noticed several entries in the log:
/var/adm/syslog/syslog.log of non system
users trying to ftp into our HP UX (10.20 OS).
For example here is a typical entry:
Aug 30 04:09:50 sysname l ftpd[22956]: connection from a027068.ap.plala.or.jp at Wed Aug 30 04:09:50 2000
Most entries have European IP's.
Two questions:
1. Is this normal?
2. How can I make sure they did not succeed in getting into our system?
I noticed several entries in the log:
/var/adm/syslog/syslog.log of non system
users trying to ftp into our HP UX (10.20 OS).
For example here is a typical entry:
Aug 30 04:09:50 sysname l ftpd[22956]: connection from a027068.ap.plala.or.jp at Wed Aug 30 04:09:50 2000
Most entries have European IP's.
Two questions:
1. Is this normal?
2. How can I make sure they did not succeed in getting into our system?
Solved! Go to Solution.
3 REPLIES 3
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-02-2000 11:54 PM
тАО09-02-2000 11:54 PM
Re: non system users access w/ ftp
There are many ways to resolve your problem.
Looks like the network is accessible from outside where your server is physically located. If that is the case anyone can ftp to your server. One way to find out if the ftp connection succed. Check syslog.log if following line are present whenever someone tries to ftp.
Log for successful ftp:
Sep 03 03:31:44 sysname ftpd[7893]: connection from user_sys_name at Wed Sep 03 03:31:44 2000
Sep 03 03:31:44 sysname ftpd[7893]: FTP LOGIN FROM user_sys_name, xyz Sep 03 03:31:44 sysname ftpd[7893]: PORT
Sep 03 03:32:17 sysname ftpd[7893]: PORT
Sep 03 03:34:24 sysname ftpd[7893]: User xyz logged out
Also make sure that the network where is server is accessible only by valid users.
The below can be done only when you don't require ftp services on your server.
Comment below line from "/etc/inted.conf" if you want to disable ftp services on your server and restart inetd daemon from command line by "/usr/sbin/inetd -c".
ftp stream tcp nowait root /usr/lbin/ftpd ftpd -l
OR
comment the below lines from "/etc/services"
ftp-data 20/tcp # File Transfer Protocol (Data)
ftp 21/tcp # File Transfer Protocol (Control)
Looks like the network is accessible from outside where your server is physically located. If that is the case anyone can ftp to your server. One way to find out if the ftp connection succed. Check syslog.log if following line are present whenever someone tries to ftp.
Log for successful ftp:
Sep 03 03:31:44 sysname ftpd[7893]: connection from user_sys_name at Wed Sep 03 03:31:44 2000
Sep 03 03:31:44 sysname ftpd[7893]: FTP LOGIN FROM user_sys_name, xyz Sep 03 03:31:44 sysname ftpd[7893]: PORT
Sep 03 03:32:17 sysname ftpd[7893]: PORT
Sep 03 03:34:24 sysname ftpd[7893]: User xyz logged out
Also make sure that the network where is server is accessible only by valid users.
The below can be done only when you don't require ftp services on your server.
Comment below line from "/etc/inted.conf" if you want to disable ftp services on your server and restart inetd daemon from command line by "/usr/sbin/inetd -c".
ftp stream tcp nowait root /usr/lbin/ftpd ftpd -l
OR
comment the below lines from "/etc/services"
ftp-data 20/tcp # File Transfer Protocol (Data)
ftp 21/tcp # File Transfer Protocol (Control)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-03-2000 05:23 AM
тАО09-03-2000 05:23 AM
Re: non system users access w/ ftp
you may want to configure your inetd.sec file to deny access from any node outside of your network address
see man inetd.sec
see man inetd.sec
My house is the bank's, my money the wife's, But my opinions belong to me, not HP!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-03-2000 06:03 AM
тАО09-03-2000 06:03 AM
Solution
Wayn:
A couple of comments.
As already suggested, make sure that the ftpd deamon is run with logging when itetd starts. The -l option logs general session information. Adding the -v option wiil include files retrieved and stored to the syslog information. See: ftpd (1M).
For more information on the configuration of the /var/adm/inetd.sec security file, see inetd (4).
Ftpd can also be made to reject remote logins to local user accounts by configuring entries in /etc/ftpusers. See ftpusers (4).
You might find this gives you additional protection and/or peace-of-mind.
Lastly, there's no simplier approach than frequently changing passwords unless the FTP is anonymous.
..JRF...
A couple of comments.
As already suggested, make sure that the ftpd deamon is run with logging when itetd starts. The -l option logs general session information. Adding the -v option wiil include files retrieved and stored to the syslog information. See: ftpd (1M).
For more information on the configuration of the /var/adm/inetd.sec security file, see inetd (4).
Ftpd can also be made to reject remote logins to local user accounts by configuring entries in /etc/ftpusers. See ftpusers (4).
You might find this gives you additional protection and/or peace-of-mind.
Lastly, there's no simplier approach than frequently changing passwords unless the FTP is anonymous.
..JRF...
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
News and Events
Support
© Copyright 2024 Hewlett Packard Enterprise Development LP