<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: non system users access w/ ftp in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/non-system-users-access-w-ftp/m-p/2442308#M759655</link>
    <description>you may want to configure your inetd.sec file to deny access from any node outside of your network address&lt;BR /&gt;see man inetd.sec&lt;BR /&gt;</description>
    <pubDate>Sun, 03 Sep 2000 12:23:42 GMT</pubDate>
    <dc:creator>melvyn burnard</dc:creator>
    <dc:date>2000-09-03T12:23:42Z</dc:date>
    <item>
      <title>non system users access w/ ftp</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/non-system-users-access-w-ftp/m-p/2442306#M759653</link>
      <description>HI:&lt;BR /&gt;&lt;BR /&gt;I noticed several entries in the log: &lt;BR /&gt;/var/adm/syslog/syslog.log of non system &lt;BR /&gt;users trying to ftp into our HP UX (10.20 OS). &lt;BR /&gt;&lt;BR /&gt;For example here is a typical entry:&lt;BR /&gt;Aug 30 04:09:50 sysname l ftpd[22956]: connection from a027068.ap.plala.or.jp at Wed Aug 30 04:09:50 2000&lt;BR /&gt;&lt;BR /&gt;Most entries have European IP's. &lt;BR /&gt;&lt;BR /&gt;Two questions: &lt;BR /&gt;1. Is this normal?&lt;BR /&gt;2. How can I make sure they did not succeed in getting into our system?&lt;BR /&gt;</description>
      <pubDate>Sun, 03 Sep 2000 01:58:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/non-system-users-access-w-ftp/m-p/2442306#M759653</guid>
      <dc:creator>johnson</dc:creator>
      <dc:date>2000-09-03T01:58:50Z</dc:date>
    </item>
    <item>
      <title>Re: non system users access w/ ftp</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/non-system-users-access-w-ftp/m-p/2442307#M759654</link>
      <description>There are many ways to resolve your problem.&lt;BR /&gt;Looks like the network is accessible from outside where your server is physically located. If that is the case anyone can ftp to your server. One way to find out if the ftp connection succed. Check syslog.log if following line are present whenever someone tries to ftp.&lt;BR /&gt;Log for successful ftp:&lt;BR /&gt;Sep 03 03:31:44 sysname ftpd[7893]: connection from user_sys_name at Wed Sep 03 03:31:44 2000&lt;BR /&gt;Sep 03 03:31:44 sysname ftpd[7893]: FTP LOGIN FROM user_sys_name, xyz Sep 03 03:31:44 sysname ftpd[7893]: PORT&lt;BR /&gt;Sep 03 03:32:17 sysname ftpd[7893]: PORT&lt;BR /&gt;Sep 03 03:34:24 sysname ftpd[7893]: User xyz logged out&lt;BR /&gt;&lt;BR /&gt;Also make sure that the network where is server is accessible only by valid users.&lt;BR /&gt;&lt;BR /&gt;The below can be done only when you don't require ftp services on your server.&lt;BR /&gt;Comment below line from "/etc/inted.conf" if you want to disable ftp services on your server and restart inetd daemon from command line by "/usr/sbin/inetd -c".&lt;BR /&gt;ftp          stream tcp nowait root /usr/lbin/ftpd      ftpd -l&lt;BR /&gt;OR&lt;BR /&gt;comment the below lines from "/etc/services"&lt;BR /&gt;ftp-data      20/tcp                 # File Transfer Protocol (Data)&lt;BR /&gt;ftp           21/tcp                 # File Transfer Protocol (Control)</description>
      <pubDate>Sun, 03 Sep 2000 06:54:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/non-system-users-access-w-ftp/m-p/2442307#M759654</guid>
      <dc:creator>Vincente Fernandes</dc:creator>
      <dc:date>2000-09-03T06:54:07Z</dc:date>
    </item>
    <item>
      <title>Re: non system users access w/ ftp</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/non-system-users-access-w-ftp/m-p/2442308#M759655</link>
      <description>you may want to configure your inetd.sec file to deny access from any node outside of your network address&lt;BR /&gt;see man inetd.sec&lt;BR /&gt;</description>
      <pubDate>Sun, 03 Sep 2000 12:23:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/non-system-users-access-w-ftp/m-p/2442308#M759655</guid>
      <dc:creator>melvyn burnard</dc:creator>
      <dc:date>2000-09-03T12:23:42Z</dc:date>
    </item>
    <item>
      <title>Re: non system users access w/ ftp</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/non-system-users-access-w-ftp/m-p/2442309#M759656</link>
      <description>Wayn:&lt;BR /&gt;&lt;BR /&gt;A couple of comments.&lt;BR /&gt;&lt;BR /&gt;As already suggested, make sure that the ftpd deamon is run with logging when itetd starts.  The -l option logs general session information.  Adding the -v option wiil include files retrieved and stored to the syslog information.  See: ftpd (1M).&lt;BR /&gt;&lt;BR /&gt;For more information on the configuration of the /var/adm/inetd.sec security file, see inetd (4).&lt;BR /&gt;&lt;BR /&gt;Ftpd can also be made to reject remote logins to local user accounts by configuring entries in /etc/ftpusers.  See ftpusers (4).&lt;BR /&gt;You might find this gives you additional protection and/or peace-of-mind.&lt;BR /&gt;&lt;BR /&gt;Lastly, there's no simplier approach than frequently changing passwords unless the FTP is anonymous.&lt;BR /&gt;&lt;BR /&gt;..JRF...</description>
      <pubDate>Sun, 03 Sep 2000 13:03:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/non-system-users-access-w-ftp/m-p/2442309#M759656</guid>
      <dc:creator>James R. Ferguson</dc:creator>
      <dc:date>2000-09-03T13:03:48Z</dc:date>
    </item>
  </channel>
</rss>

