<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Continually receive bootpd message in syslog in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/continually-receive-bootpd-message-in-syslog/m-p/3813730#M268744</link>
    <description>Edit /etc/inetd.conf and comment out the bootp line; you then tell inetd to re-read the configuration file by sending a SIGHUP to the daemon. HP-UX makes this easy so all you need to do to send this signal is "inetd -c". &lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Tue, 27 Jun 2006 21:14:48 GMT</pubDate>
    <dc:creator>A. Clay Stephenson</dc:creator>
    <dc:date>2006-06-27T21:14:48Z</dc:date>
    <item>
      <title>Continually receive bootpd message in syslog</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/continually-receive-bootpd-message-in-syslog/m-p/3813729#M268743</link>
      <description>&lt;!--!*#--&gt;Hi all,&lt;BR /&gt;&lt;BR /&gt;I often receive the message:&lt;BR /&gt; bootpd[3470]: Option 43: Client specified unacceptable opt&lt;BR /&gt;ion length (92 octets)&lt;BR /&gt;in the syslog, whilst it's not a problem, it's annoying and fills the syslog. Obviously some device on the network is continually sending out bootpd requests, but we don't use it and have no reason to booy anything by this request. How can I stop or remove this from the server, we do not need this service I believe.&lt;BR /&gt;&lt;BR /&gt;All the best,&lt;BR /&gt;&lt;BR /&gt;Rob.</description>
      <pubDate>Tue, 27 Jun 2006 20:59:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/continually-receive-bootpd-message-in-syslog/m-p/3813729#M268743</guid>
      <dc:creator>Robert Milne</dc:creator>
      <dc:date>2006-06-27T20:59:38Z</dc:date>
    </item>
    <item>
      <title>Re: Continually receive bootpd message in syslog</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/continually-receive-bootpd-message-in-syslog/m-p/3813730#M268744</link>
      <description>Edit /etc/inetd.conf and comment out the bootp line; you then tell inetd to re-read the configuration file by sending a SIGHUP to the daemon. HP-UX makes this easy so all you need to do to send this signal is "inetd -c". &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Jun 2006 21:14:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/continually-receive-bootpd-message-in-syslog/m-p/3813730#M268744</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2006-06-27T21:14:48Z</dc:date>
    </item>
    <item>
      <title>Re: Continually receive bootpd message in syslog</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/continually-receive-bootpd-message-in-syslog/m-p/3813731#M268745</link>
      <description>Hi Clay,&lt;BR /&gt;&lt;BR /&gt;Thanks, fast response too !&lt;BR /&gt;Just one question before I do, if I run the inetd -c command, this will not have any impact on current running sessions/services such as telnet ?  Is it safe ?  This is on a production server with a number of users running live and I just didn't want to kill or disrupt any of their sessions. I assume that a inetd -k would probably do this, but just wanted to be sure.&lt;BR /&gt;&lt;BR /&gt;All the best,&lt;BR /&gt;&lt;BR /&gt;Rob.</description>
      <pubDate>Tue, 27 Jun 2006 21:25:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/continually-receive-bootpd-message-in-syslog/m-p/3813731#M268745</guid>
      <dc:creator>Robert Milne</dc:creator>
      <dc:date>2006-06-27T21:25:30Z</dc:date>
    </item>
    <item>
      <title>Re: Continually receive bootpd message in syslog</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/continually-receive-bootpd-message-in-syslog/m-p/3813732#M268746</link>
      <description>It's "inetd -c" and no that will not disrupt established sessions. "Inetd -c" is a safe command to issue anytime. You could do exactly the same thing by determining the PID of the inetd daemon and then doing a "kill -1 PID". That will send a SIGHUP to inetd and the signal handler says reread the configuration file and reconfigure yourself. The only possible impact would be missing a connection at the exact moment inetd was doing reconfiguration --- whichs is completed within a few tens of milliseconds. Because almost all protocols automatically retry, even this low-probability event would have no impact.&lt;BR /&gt;&lt;BR /&gt;Bear in mind the the inetd daemon (yes, that's redundant) does very little itself. It simply listens for connections and then forks and execs a new process (e.g telnetd, ftpd) so that the kills that you send to inetd aren't even directed at established connections.</description>
      <pubDate>Tue, 27 Jun 2006 22:28:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/continually-receive-bootpd-message-in-syslog/m-p/3813732#M268746</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2006-06-27T22:28:55Z</dc:date>
    </item>
    <item>
      <title>Re: Continually receive bootpd message in syslog</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/continually-receive-bootpd-message-in-syslog/m-p/3813733#M268747</link>
      <description>This actually reminds of an incident last year on a Sun box in which I almost gave the local expert Solaris sysadmin a heart attack by issueing a "kill -1 inetd's_PID" (Sun like most UNIX flavors doesn't have the -c inetd option). He was convinced that chaos was going to result on his production machine and clients were going to be disconnected. He "knew" he was supposed to reboot any time inetd's configuration file was changed (I was actually doing some security hardening for them); he also "knew" that kill always kills -- except when it doesn't which was why some of his kill -9's didn't work. He was absolutely amazed when my kill didn't seem to do anything to inetd.&lt;BR /&gt;&lt;BR /&gt;I then had him read inetd's man page and pay attention to signal handling. It's always a good idea for a sysadmin to know some C/C++ so that deep, down he understands just what a kill actually does.</description>
      <pubDate>Tue, 27 Jun 2006 22:44:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/continually-receive-bootpd-message-in-syslog/m-p/3813733#M268747</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2006-06-27T22:44:28Z</dc:date>
    </item>
    <item>
      <title>Re: Continually receive bootpd message in syslog</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/continually-receive-bootpd-message-in-syslog/m-p/3813734#M268748</link>
      <description>&lt;!--!*#--&gt;Clay,&lt;BR /&gt;&lt;BR /&gt;Thanks, done that, looks good. I noticed the following entry in syslog:&lt;BR /&gt;&lt;BR /&gt;Jun 28 16:38:39 krone inetd[724]: Rereading configuration&lt;BR /&gt;Jun 28 16:38:39 krone inetd[724]: bootps/udp: Deleted service&lt;BR /&gt;Jun 28 16:38:39 krone inetd[724]: Thru with configuration&lt;BR /&gt;Jun 28 16:38:39 krone inetd[724]: Configuration complete&lt;BR /&gt;&lt;BR /&gt;So I'm convinced.&lt;BR /&gt;Lastly to "harden" security for use (or rather misuse) of services like ftp and tftp is this the best way to turn these off, by disabling in inetd.conf and running inetd -c as we did here. Then if required as a temporary or one off to do a file transfer or whatever, renabling and disabling when complete ?&lt;BR /&gt;&lt;BR /&gt;Thanks again,&lt;BR /&gt;&lt;BR /&gt;Rob.</description>
      <pubDate>Wed, 28 Jun 2006 01:42:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/continually-receive-bootpd-message-in-syslog/m-p/3813734#M268748</guid>
      <dc:creator>Robert Milne</dc:creator>
      <dc:date>2006-06-28T01:42:57Z</dc:date>
    </item>
    <item>
      <title>Re: Continually receive bootpd message in syslog</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/continually-receive-bootpd-message-in-syslog/m-p/3813735#M268749</link>
      <description>Yes, that is one approach although ftp can generally be sufficiently hardened via the ftpaccess and ftpusers file. You should also note that a box can still serve as an ftp client even if the ftpd daemon is disabled. You should (at a minimum) also permanently disable the finger, daytime, time, echo, discard and chargen services.</description>
      <pubDate>Wed, 28 Jun 2006 09:38:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/continually-receive-bootpd-message-in-syslog/m-p/3813735#M268749</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2006-06-28T09:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: Continually receive bootpd message in syslog</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/continually-receive-bootpd-message-in-syslog/m-p/3813736#M268750</link>
      <description>Clay,&lt;BR /&gt;&lt;BR /&gt;Thanks, yes already do use the ftpaccess and ftpusers files.&lt;BR /&gt;Thanks again for all and now I leave the feedback !&lt;BR /&gt;&lt;BR /&gt;Rob.</description>
      <pubDate>Wed, 28 Jun 2006 19:48:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/continually-receive-bootpd-message-in-syslog/m-p/3813736#M268750</guid>
      <dc:creator>Robert Milne</dc:creator>
      <dc:date>2006-06-28T19:48:34Z</dc:date>
    </item>
  </channel>
</rss>

