<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: inetd.sec deny services in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/inetd-sec-deny-services/m-p/3984200#M294709</link>
    <description>For now, I gathered everything from all&lt;BR /&gt;the /etc/services listings and took the&lt;BR /&gt;first column and added them to the&lt;BR /&gt;/var/adm/inetd.sec file on all the systems.&lt;BR /&gt;The reason I have to block this box is &lt;BR /&gt;because it's a Nagios scanning server that&lt;BR /&gt;probes all ports causing me headaches. Just&lt;BR /&gt;like the tool Satin.&lt;BR /&gt;&lt;BR /&gt;dtspc allow 127.0.0.1 loopback&lt;BR /&gt;DAServer deny 10.40.167.110&lt;BR /&gt;SNAplus deny 10.40.167.110&lt;BR /&gt;SrpCentralDaemon deny 10.40.167.110&lt;BR /&gt;SrpSiteDaemon deny 10.40.167.110&lt;BR /&gt;actcp deny 10.40.167.110&lt;BR /&gt;bftp deny 10.40.167.110&lt;BR /&gt;bgp deny 10.40.167.110&lt;BR /&gt;biff deny 10.40.167.110&lt;BR /&gt;bootpc deny 10.40.167.110&lt;BR /&gt;bootps deny 10.40.167.110&lt;BR /&gt;bpcd deny 10.40.167.110&lt;BR /&gt;bpjava-msvc deny 10.40.167.110&lt;BR /&gt;bprd deny 10.40.167.110&lt;BR /&gt;c34_main deny 10.40.167.110&lt;BR /&gt;chargen deny 10.40.167.110&lt;BR /&gt;clvm-cfg deny 10.40.167.110&lt;BR /&gt;comms_high deny 10.40.167.110&lt;BR /&gt;comms_normal deny 10.40.167.110&lt;BR /&gt;conference deny 10.40.167.110&lt;BR /&gt;console deny 10.40.167.110&lt;BR /&gt;courier deny 10.40.167.110&lt;BR /&gt;cvmmon deny 10.40.167.110&lt;BR /&gt;cvmon deny 10.40.167.110&lt;BR /&gt;daytime deny 10.40.167.110&lt;BR /&gt;desmevt deny 10.40.167.110&lt;BR /&gt;diagmond deny 10.40.167.110&lt;BR /&gt;discard deny 10.40.167.110&lt;BR /&gt;domain deny 10.40.167.110&lt;BR /&gt;dtspc deny 10.40.167.110&lt;BR /&gt;echo deny 10.40.167.110&lt;BR /&gt;efs deny 10.40.167.110&lt;BR /&gt;eklogin deny 10.40.167.110&lt;BR /&gt;ekshell deny 10.40.167.110&lt;BR /&gt;erdb_bck deny 10.40.167.110&lt;BR /&gt;erdb_svr deny 10.40.167.110&lt;BR /&gt;eusrv deny 10.40.167.110&lt;BR /&gt;exec deny 10.40.167.110&lt;BR /&gt;finger deny 10.40.167.110&lt;BR /&gt;ftp deny 10.40.167.110&lt;BR /&gt;ftp-data deny 10.40.167.110&lt;BR /&gt;ftp-ftam deny 10.40.167.110&lt;BR /&gt;grmd deny 10.40.167.110&lt;BR /&gt;hacl-cfg deny 10.40.167.110&lt;BR /&gt;hacl-dlm deny 10.40.167.110&lt;BR /&gt;hacl-gs deny 10.40.167.110&lt;BR /&gt;hacl-hb deny 10.40.167.110&lt;BR /&gt;hacl-local deny 10.40.167.110&lt;BR /&gt;hacl-probe deny 10.40.167.110&lt;BR /&gt;hacl-test deny 10.40.167.110&lt;BR /&gt;hcserver deny 10.40.167.110&lt;BR /&gt;hostnames deny 10.40.167.110&lt;BR /&gt;hp-clic deny 10.40.167.110&lt;BR /&gt;hp-sca deny 10.40.167.110&lt;BR /&gt;hp-sco deny 10.40.167.110&lt;BR /&gt;hpidsadmin deny 10.40.167.110&lt;BR /&gt;hpidsagent deny 10.40.167.110&lt;BR /&gt;hpoms-ci-lstn deny 10.40.167.110&lt;BR /&gt;hpoms-dps-lstn deny 10.40.167.110&lt;BR /&gt;hpwebjetd deny 10.40.167.110&lt;BR /&gt;http deny 10.40.167.110&lt;BR /&gt;iasqlsvr deny 10.40.167.110&lt;BR /&gt;ident deny 10.40.167.110&lt;BR /&gt;ingreslock deny 10.40.167.110&lt;BR /&gt;instl_bootc deny 10.40.167.110&lt;BR /&gt;instl_boots deny 10.40.167.110&lt;BR /&gt;isakmp deny 10.40.167.110&lt;BR /&gt;kerberos deny 10.40.167.110&lt;BR /&gt;kerberos5 deny 10.40.167.110&lt;BR /&gt;kerberos_master deny 10.40.167.110&lt;BR /&gt;klogin deny 10.40.167.110&lt;BR /&gt;kpasswd deny 10.40.167.110&lt;BR /&gt;krbupdate deny 10.40.167.110&lt;BR /&gt;kshell deny 10.40.167.110&lt;BR /&gt;lanmgrx.osB deny 10.40.167.110&lt;BR /&gt;lansrm deny 10.40.167.110&lt;BR /&gt;ldcconn deny 10.40.167.110&lt;BR /&gt;link deny 10.40.167.110&lt;BR /&gt;login deny 10.40.167.110&lt;BR /&gt;mcsemon deny 10.40.167.110&lt;BR /&gt;msql deny 10.40.167.110&lt;BR /&gt;ncpm-ft deny 10.40.167.110&lt;BR /&gt;ncpm-hip deny 10.40.167.110&lt;BR /&gt;ncpm-pm deny 10.40.167.110&lt;BR /&gt;netbios_dgm deny 10.40.167.110&lt;BR /&gt;netbios_ns deny 10.40.167.110&lt;BR /&gt;netbios_ssn deny 10.40.167.110&lt;BR /&gt;netdist deny 10.40.167.110&lt;BR /&gt;netnews deny 10.40.167.110&lt;BR /&gt;netwall deny 10.40.167.110&lt;BR /&gt;nfsd deny 10.40.167.110&lt;BR /&gt;nfsd-keepalive deny 10.40.167.110&lt;BR /&gt;nfsd-status deny 10.40.167.110&lt;BR /&gt;nft deny 10.40.167.110&lt;BR /&gt;nntp deny 10.40.167.110&lt;BR /&gt;ntalk deny 10.40.167.110&lt;BR /&gt;ntp deny 10.40.167.110&lt;BR /&gt;omni deny 10.40.167.110&lt;BR /&gt;p7_c32 deny 10.40.167.110&lt;BR /&gt;p7_c33 deny 10.40.167.110&lt;BR /&gt;p7_c33upd deny 10.40.167.110&lt;BR /&gt;p7_c35 deny 10.40.167.110&lt;BR /&gt;p7_e30 deny 10.40.167.110&lt;BR /&gt;p7_g06 deny 10.40.167.110&lt;BR /&gt;pdclientd deny 10.40.167.110&lt;BR /&gt;pdeventd deny 10.40.167.110&lt;BR /&gt;pmlockd deny 10.40.167.110&lt;BR /&gt;pop deny 10.40.167.110&lt;BR /&gt;pop3 deny 10.40.167.110&lt;BR /&gt;portmap deny 10.40.167.110&lt;BR /&gt;printer deny 10.40.167.110&lt;BR /&gt;psmond deny 10.40.167.110&lt;BR /&gt;pvalarm deny 10.40.167.110&lt;BR /&gt;pvserver deny 10.40.167.110&lt;BR /&gt;qotd deny 10.40.167.110&lt;BR /&gt;r4-sna-cs deny 10.40.167.110&lt;BR /&gt;r4-sna-ft deny 10.40.167.110&lt;BR /&gt;recserv deny 10.40.167.110&lt;BR /&gt;registrar deny 10.40.167.110&lt;BR /&gt;remotefs deny 10.40.167.110&lt;BR /&gt;rfa deny 10.40.167.110&lt;BR /&gt;rje deny 10.40.167.110&lt;BR /&gt;rlb deny 10.40.167.110&lt;BR /&gt;rlp deny 10.40.167.110&lt;BR /&gt;route deny 10.40.167.110&lt;BR /&gt;samd deny 10.40.167.110&lt;BR /&gt;sftp deny 10.40.167.110&lt;BR /&gt;shell deny 10.40.167.110&lt;BR /&gt;smtp deny 10.40.167.110&lt;BR /&gt;sna-cs deny 10.40.167.110&lt;BR /&gt;snmp deny 10.40.167.110&lt;BR /&gt;snmp-trap deny 10.40.167.110&lt;BR /&gt;spc deny 10.40.167.110&lt;BR /&gt;supdup deny 10.40.167.110&lt;BR /&gt;swat deny 10.40.167.110&lt;BR /&gt;syslog deny 10.40.167.110&lt;BR /&gt;systat deny 10.40.167.110&lt;BR /&gt;talk deny 10.40.167.110&lt;BR /&gt;tcpmux deny 10.40.167.110&lt;BR /&gt;telaagui deny 10.40.167.110&lt;BR /&gt;telaaguig deny 10.40.167.110&lt;BR /&gt;telaaguim deny 10.40.167.110&lt;BR /&gt;telaaguis deny 10.40.167.110&lt;BR /&gt;telaconf deny 10.40.167.110&lt;BR /&gt;telaconfstart deny 10.40.167.110&lt;BR /&gt;telainetd deny 10.40.167.110&lt;BR /&gt;telainetdstart deny 10.40.167.110&lt;BR /&gt;telalert deny 10.40.167.110&lt;BR /&gt;telalertstart deny 10.40.167.110&lt;BR /&gt;telaremt deny 10.40.167.110&lt;BR /&gt;telnet deny 10.40.167.110&lt;BR /&gt;tempo deny 10.40.167.110&lt;BR /&gt;tftp deny 10.40.167.110&lt;BR /&gt;time deny 10.40.167.110&lt;BR /&gt;timed deny 10.40.167.110&lt;BR /&gt;tsap deny 10.40.167.110&lt;BR /&gt;uucp deny 10.40.167.110&lt;BR /&gt;uucp-path deny 10.40.167.110&lt;BR /&gt;veesm deny 10.40.167.110&lt;BR /&gt;vnetd deny 10.40.167.110&lt;BR /&gt;vopied deny 10.40.167.110&lt;BR /&gt;who deny 10.40.167.110&lt;BR /&gt;whois deny 10.40.167.110&lt;BR /&gt;</description>
    <pubDate>Thu, 19 Apr 2007 10:06:12 GMT</pubDate>
    <dc:creator>jerry1</dc:creator>
    <dc:date>2007-04-19T10:06:12Z</dc:date>
    <item>
      <title>inetd.sec deny services</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/inetd-sec-deny-services/m-p/3984196#M294705</link>
      <description>How can you deny all the possible services&lt;BR /&gt;to one host with one line in inetd.sec?&lt;BR /&gt;&lt;BR /&gt;"*" does not work for "all" services field.&lt;BR /&gt;&lt;BR /&gt;*  deny  10.40.111.10</description>
      <pubDate>Wed, 18 Apr 2007 13:09:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/inetd-sec-deny-services/m-p/3984196#M294705</guid>
      <dc:creator>jerry1</dc:creator>
      <dc:date>2007-04-18T13:09:12Z</dc:date>
    </item>
    <item>
      <title>Re: inetd.sec deny services</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/inetd-sec-deny-services/m-p/3984197#M294706</link>
      <description>I don't think you can.  The way I read the inetd.sec man page is that you MUST specify a particular service name on each line.  Wild cards can only be used for the hosts/ip addresses that you wish to allow or deny.</description>
      <pubDate>Wed, 18 Apr 2007 13:14:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/inetd-sec-deny-services/m-p/3984197#M294706</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2007-04-18T13:14:14Z</dc:date>
    </item>
    <item>
      <title>Re: inetd.sec deny services</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/inetd-sec-deny-services/m-p/3984198#M294707</link>
      <description>Why you don't try to use the /etc/host.allow /etc/host.deny to do that? that's a good option, the /etc/inetd.sec doesn't allow you to put an * in the &lt;SERVICE name=""&gt; field&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Regards&lt;/SERVICE&gt;</description>
      <pubDate>Wed, 18 Apr 2007 13:24:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/inetd-sec-deny-services/m-p/3984198#M294707</guid>
      <dc:creator>Marco A.</dc:creator>
      <dc:date>2007-04-18T13:24:38Z</dc:date>
    </item>
    <item>
      <title>Re: inetd.sec deny services</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/inetd-sec-deny-services/m-p/3984199#M294708</link>
      <description>Hi,&lt;BR /&gt; What you are trying will not work. Since you want to deny complete network services, it is best to use TCP WRAPPERS for hosts based access control with /etc/hosts.deny.&lt;BR /&gt;&lt;BR /&gt;Refer the last section in this link;&lt;BR /&gt;&lt;A href="http://www.stanford.edu/group/itss-ccs/security/unix/tcpwrappers.html" target="_blank"&gt;http://www.stanford.edu/group/itss-ccs/security/unix/tcpwrappers.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;Prabu.S</description>
      <pubDate>Wed, 18 Apr 2007 22:56:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/inetd-sec-deny-services/m-p/3984199#M294708</guid>
      <dc:creator>Senthil Prabu.S_1</dc:creator>
      <dc:date>2007-04-18T22:56:36Z</dc:date>
    </item>
    <item>
      <title>Re: inetd.sec deny services</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/inetd-sec-deny-services/m-p/3984200#M294709</link>
      <description>For now, I gathered everything from all&lt;BR /&gt;the /etc/services listings and took the&lt;BR /&gt;first column and added them to the&lt;BR /&gt;/var/adm/inetd.sec file on all the systems.&lt;BR /&gt;The reason I have to block this box is &lt;BR /&gt;because it's a Nagios scanning server that&lt;BR /&gt;probes all ports causing me headaches. Just&lt;BR /&gt;like the tool Satin.&lt;BR /&gt;&lt;BR /&gt;dtspc allow 127.0.0.1 loopback&lt;BR /&gt;DAServer deny 10.40.167.110&lt;BR /&gt;SNAplus deny 10.40.167.110&lt;BR /&gt;SrpCentralDaemon deny 10.40.167.110&lt;BR /&gt;SrpSiteDaemon deny 10.40.167.110&lt;BR /&gt;actcp deny 10.40.167.110&lt;BR /&gt;bftp deny 10.40.167.110&lt;BR /&gt;bgp deny 10.40.167.110&lt;BR /&gt;biff deny 10.40.167.110&lt;BR /&gt;bootpc deny 10.40.167.110&lt;BR /&gt;bootps deny 10.40.167.110&lt;BR /&gt;bpcd deny 10.40.167.110&lt;BR /&gt;bpjava-msvc deny 10.40.167.110&lt;BR /&gt;bprd deny 10.40.167.110&lt;BR /&gt;c34_main deny 10.40.167.110&lt;BR /&gt;chargen deny 10.40.167.110&lt;BR /&gt;clvm-cfg deny 10.40.167.110&lt;BR /&gt;comms_high deny 10.40.167.110&lt;BR /&gt;comms_normal deny 10.40.167.110&lt;BR /&gt;conference deny 10.40.167.110&lt;BR /&gt;console deny 10.40.167.110&lt;BR /&gt;courier deny 10.40.167.110&lt;BR /&gt;cvmmon deny 10.40.167.110&lt;BR /&gt;cvmon deny 10.40.167.110&lt;BR /&gt;daytime deny 10.40.167.110&lt;BR /&gt;desmevt deny 10.40.167.110&lt;BR /&gt;diagmond deny 10.40.167.110&lt;BR /&gt;discard deny 10.40.167.110&lt;BR /&gt;domain deny 10.40.167.110&lt;BR /&gt;dtspc deny 10.40.167.110&lt;BR /&gt;echo deny 10.40.167.110&lt;BR /&gt;efs deny 10.40.167.110&lt;BR /&gt;eklogin deny 10.40.167.110&lt;BR /&gt;ekshell deny 10.40.167.110&lt;BR /&gt;erdb_bck deny 10.40.167.110&lt;BR /&gt;erdb_svr deny 10.40.167.110&lt;BR /&gt;eusrv deny 10.40.167.110&lt;BR /&gt;exec deny 10.40.167.110&lt;BR /&gt;finger deny 10.40.167.110&lt;BR /&gt;ftp deny 10.40.167.110&lt;BR /&gt;ftp-data deny 10.40.167.110&lt;BR /&gt;ftp-ftam deny 10.40.167.110&lt;BR /&gt;grmd deny 10.40.167.110&lt;BR /&gt;hacl-cfg deny 10.40.167.110&lt;BR /&gt;hacl-dlm deny 10.40.167.110&lt;BR /&gt;hacl-gs deny 10.40.167.110&lt;BR /&gt;hacl-hb deny 10.40.167.110&lt;BR /&gt;hacl-local deny 10.40.167.110&lt;BR /&gt;hacl-probe deny 10.40.167.110&lt;BR /&gt;hacl-test deny 10.40.167.110&lt;BR /&gt;hcserver deny 10.40.167.110&lt;BR /&gt;hostnames deny 10.40.167.110&lt;BR /&gt;hp-clic deny 10.40.167.110&lt;BR /&gt;hp-sca deny 10.40.167.110&lt;BR /&gt;hp-sco deny 10.40.167.110&lt;BR /&gt;hpidsadmin deny 10.40.167.110&lt;BR /&gt;hpidsagent deny 10.40.167.110&lt;BR /&gt;hpoms-ci-lstn deny 10.40.167.110&lt;BR /&gt;hpoms-dps-lstn deny 10.40.167.110&lt;BR /&gt;hpwebjetd deny 10.40.167.110&lt;BR /&gt;http deny 10.40.167.110&lt;BR /&gt;iasqlsvr deny 10.40.167.110&lt;BR /&gt;ident deny 10.40.167.110&lt;BR /&gt;ingreslock deny 10.40.167.110&lt;BR /&gt;instl_bootc deny 10.40.167.110&lt;BR /&gt;instl_boots deny 10.40.167.110&lt;BR /&gt;isakmp deny 10.40.167.110&lt;BR /&gt;kerberos deny 10.40.167.110&lt;BR /&gt;kerberos5 deny 10.40.167.110&lt;BR /&gt;kerberos_master deny 10.40.167.110&lt;BR /&gt;klogin deny 10.40.167.110&lt;BR /&gt;kpasswd deny 10.40.167.110&lt;BR /&gt;krbupdate deny 10.40.167.110&lt;BR /&gt;kshell deny 10.40.167.110&lt;BR /&gt;lanmgrx.osB deny 10.40.167.110&lt;BR /&gt;lansrm deny 10.40.167.110&lt;BR /&gt;ldcconn deny 10.40.167.110&lt;BR /&gt;link deny 10.40.167.110&lt;BR /&gt;login deny 10.40.167.110&lt;BR /&gt;mcsemon deny 10.40.167.110&lt;BR /&gt;msql deny 10.40.167.110&lt;BR /&gt;ncpm-ft deny 10.40.167.110&lt;BR /&gt;ncpm-hip deny 10.40.167.110&lt;BR /&gt;ncpm-pm deny 10.40.167.110&lt;BR /&gt;netbios_dgm deny 10.40.167.110&lt;BR /&gt;netbios_ns deny 10.40.167.110&lt;BR /&gt;netbios_ssn deny 10.40.167.110&lt;BR /&gt;netdist deny 10.40.167.110&lt;BR /&gt;netnews deny 10.40.167.110&lt;BR /&gt;netwall deny 10.40.167.110&lt;BR /&gt;nfsd deny 10.40.167.110&lt;BR /&gt;nfsd-keepalive deny 10.40.167.110&lt;BR /&gt;nfsd-status deny 10.40.167.110&lt;BR /&gt;nft deny 10.40.167.110&lt;BR /&gt;nntp deny 10.40.167.110&lt;BR /&gt;ntalk deny 10.40.167.110&lt;BR /&gt;ntp deny 10.40.167.110&lt;BR /&gt;omni deny 10.40.167.110&lt;BR /&gt;p7_c32 deny 10.40.167.110&lt;BR /&gt;p7_c33 deny 10.40.167.110&lt;BR /&gt;p7_c33upd deny 10.40.167.110&lt;BR /&gt;p7_c35 deny 10.40.167.110&lt;BR /&gt;p7_e30 deny 10.40.167.110&lt;BR /&gt;p7_g06 deny 10.40.167.110&lt;BR /&gt;pdclientd deny 10.40.167.110&lt;BR /&gt;pdeventd deny 10.40.167.110&lt;BR /&gt;pmlockd deny 10.40.167.110&lt;BR /&gt;pop deny 10.40.167.110&lt;BR /&gt;pop3 deny 10.40.167.110&lt;BR /&gt;portmap deny 10.40.167.110&lt;BR /&gt;printer deny 10.40.167.110&lt;BR /&gt;psmond deny 10.40.167.110&lt;BR /&gt;pvalarm deny 10.40.167.110&lt;BR /&gt;pvserver deny 10.40.167.110&lt;BR /&gt;qotd deny 10.40.167.110&lt;BR /&gt;r4-sna-cs deny 10.40.167.110&lt;BR /&gt;r4-sna-ft deny 10.40.167.110&lt;BR /&gt;recserv deny 10.40.167.110&lt;BR /&gt;registrar deny 10.40.167.110&lt;BR /&gt;remotefs deny 10.40.167.110&lt;BR /&gt;rfa deny 10.40.167.110&lt;BR /&gt;rje deny 10.40.167.110&lt;BR /&gt;rlb deny 10.40.167.110&lt;BR /&gt;rlp deny 10.40.167.110&lt;BR /&gt;route deny 10.40.167.110&lt;BR /&gt;samd deny 10.40.167.110&lt;BR /&gt;sftp deny 10.40.167.110&lt;BR /&gt;shell deny 10.40.167.110&lt;BR /&gt;smtp deny 10.40.167.110&lt;BR /&gt;sna-cs deny 10.40.167.110&lt;BR /&gt;snmp deny 10.40.167.110&lt;BR /&gt;snmp-trap deny 10.40.167.110&lt;BR /&gt;spc deny 10.40.167.110&lt;BR /&gt;supdup deny 10.40.167.110&lt;BR /&gt;swat deny 10.40.167.110&lt;BR /&gt;syslog deny 10.40.167.110&lt;BR /&gt;systat deny 10.40.167.110&lt;BR /&gt;talk deny 10.40.167.110&lt;BR /&gt;tcpmux deny 10.40.167.110&lt;BR /&gt;telaagui deny 10.40.167.110&lt;BR /&gt;telaaguig deny 10.40.167.110&lt;BR /&gt;telaaguim deny 10.40.167.110&lt;BR /&gt;telaaguis deny 10.40.167.110&lt;BR /&gt;telaconf deny 10.40.167.110&lt;BR /&gt;telaconfstart deny 10.40.167.110&lt;BR /&gt;telainetd deny 10.40.167.110&lt;BR /&gt;telainetdstart deny 10.40.167.110&lt;BR /&gt;telalert deny 10.40.167.110&lt;BR /&gt;telalertstart deny 10.40.167.110&lt;BR /&gt;telaremt deny 10.40.167.110&lt;BR /&gt;telnet deny 10.40.167.110&lt;BR /&gt;tempo deny 10.40.167.110&lt;BR /&gt;tftp deny 10.40.167.110&lt;BR /&gt;time deny 10.40.167.110&lt;BR /&gt;timed deny 10.40.167.110&lt;BR /&gt;tsap deny 10.40.167.110&lt;BR /&gt;uucp deny 10.40.167.110&lt;BR /&gt;uucp-path deny 10.40.167.110&lt;BR /&gt;veesm deny 10.40.167.110&lt;BR /&gt;vnetd deny 10.40.167.110&lt;BR /&gt;vopied deny 10.40.167.110&lt;BR /&gt;who deny 10.40.167.110&lt;BR /&gt;whois deny 10.40.167.110&lt;BR /&gt;</description>
      <pubDate>Thu, 19 Apr 2007 10:06:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/inetd-sec-deny-services/m-p/3984200#M294709</guid>
      <dc:creator>jerry1</dc:creator>
      <dc:date>2007-04-19T10:06:12Z</dc:date>
    </item>
    <item>
      <title>Re: inetd.sec deny services</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/inetd-sec-deny-services/m-p/3984201#M294710</link>
      <description>Jerry,&lt;BR /&gt;&lt;BR /&gt;together with feeling your pain, I am under the impression that, the scanning server, Naggios or with any other name, is doing the scans for a purpose, which is more than likely security vulnerability analysis.&lt;BR /&gt;&lt;BR /&gt;Most what you have listed that you denied to this box, should have been turned off anyways for any host, in inetd.conf. And the ones that you have a legitimate need for, should be exceptions to scanning this server, which should be controlled by your IT security department.&lt;BR /&gt;&lt;BR /&gt;Shutting your server to this scanning server, may get you into trouble with SOX audits as this will create a false sense of security. But again, if the security people are wise enough, the ip address of the scanning server should be a floating one to circumvent what you have done. It is a cat and mouse game.&lt;BR /&gt;&lt;BR /&gt;Good luck.</description>
      <pubDate>Thu, 19 Apr 2007 10:15:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/inetd-sec-deny-services/m-p/3984201#M294710</guid>
      <dc:creator>Mel Burslan</dc:creator>
      <dc:date>2007-04-19T10:15:16Z</dc:date>
    </item>
  </channel>
</rss>

