<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: xinet question in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/xinet-question/m-p/4659713#M41507</link>
    <description>&lt;!--!*#--&gt;Do you mean "xinet" or "xinetd"?&lt;BR /&gt;&lt;BR /&gt;      &lt;A href="http://www.xinet.com/index.php" target="_blank"&gt;http://www.xinet.com/index.php&lt;/A&gt;&lt;BR /&gt;      &lt;A href="http://www.xinetd.org/" target="_blank"&gt;http://www.xinetd.org/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Can anyone tell me what are the security&lt;BR /&gt;&amp;gt; risks?&lt;BR /&gt;&lt;BR /&gt;Knowing nothing (else) about what you're&lt;BR /&gt;doing, I can't.</description>
    <pubDate>Sun, 11 Jul 2010 19:55:53 GMT</pubDate>
    <dc:creator>Steven Schweda</dc:creator>
    <dc:date>2010-07-11T19:55:53Z</dc:date>
    <item>
      <title>xinet question</title>
      <link>https://community.hpe.com/t5/operating-system-linux/xinet-question/m-p/4659712#M41506</link>
      <description>Hi,&lt;BR /&gt;I need to enable xinet on several Linux machines (SLES 9/10).&lt;BR /&gt;Can anyone tell me what are the security risks?&lt;BR /&gt;&lt;BR /&gt;thanks,&lt;BR /&gt;A.K.&lt;BR /&gt;</description>
      <pubDate>Sun, 11 Jul 2010 19:48:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/xinet-question/m-p/4659712#M41506</guid>
      <dc:creator>A.K.</dc:creator>
      <dc:date>2010-07-11T19:48:20Z</dc:date>
    </item>
    <item>
      <title>Re: xinet question</title>
      <link>https://community.hpe.com/t5/operating-system-linux/xinet-question/m-p/4659713#M41507</link>
      <description>&lt;!--!*#--&gt;Do you mean "xinet" or "xinetd"?&lt;BR /&gt;&lt;BR /&gt;      &lt;A href="http://www.xinet.com/index.php" target="_blank"&gt;http://www.xinet.com/index.php&lt;/A&gt;&lt;BR /&gt;      &lt;A href="http://www.xinetd.org/" target="_blank"&gt;http://www.xinetd.org/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Can anyone tell me what are the security&lt;BR /&gt;&amp;gt; risks?&lt;BR /&gt;&lt;BR /&gt;Knowing nothing (else) about what you're&lt;BR /&gt;doing, I can't.</description>
      <pubDate>Sun, 11 Jul 2010 19:55:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/xinet-question/m-p/4659713#M41507</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2010-07-11T19:55:53Z</dc:date>
    </item>
    <item>
      <title>Re: xinet question</title>
      <link>https://community.hpe.com/t5/operating-system-linux/xinet-question/m-p/4659714#M41508</link>
      <description>Hi,&lt;BR /&gt;I am installing nrpe package and would like to enable it to allow access from the Nagios host.&lt;BR /&gt;&lt;BR /&gt;BTW,&lt;BR /&gt;what other options I can use instead of xinet?&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;A.K.</description>
      <pubDate>Sun, 11 Jul 2010 20:14:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/xinet-question/m-p/4659714#M41508</guid>
      <dc:creator>A.K.</dc:creator>
      <dc:date>2010-07-11T20:14:02Z</dc:date>
    </item>
    <item>
      <title>Re: xinet question</title>
      <link>https://community.hpe.com/t5/operating-system-linux/xinet-question/m-p/4659715#M41509</link>
      <description>&lt;!--!*#--&gt;Do you know what you're talking about?  I&lt;BR /&gt;don't know what you're talking about.  A&lt;BR /&gt;Google search for:&lt;BR /&gt;      nrpe nagios xinet&lt;BR /&gt;gets redirected to a search for:&lt;BR /&gt;      nrpe nagios xinetd&lt;BR /&gt;I assume, for good reason.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Do you mean "xinet" or "xinetd"?&lt;BR /&gt;&lt;BR /&gt;Still wondering...&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;That Google search, by the way, turns up&lt;BR /&gt;several documents which might be useful,&lt;BR /&gt;depending on what you're really looking for.</description>
      <pubDate>Mon, 12 Jul 2010 02:31:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/xinet-question/m-p/4659715#M41509</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2010-07-12T02:31:02Z</dc:date>
    </item>
    <item>
      <title>Re: xinet question</title>
      <link>https://community.hpe.com/t5/operating-system-linux/xinet-question/m-p/4659716#M41510</link>
      <description>"xinet" seems to be digital asset management and at first glance, not at all helpful in running Nagios NRPE.&lt;BR /&gt;&lt;BR /&gt;"xinetd" on the other hand, is a very common and very widely used software component for running network services on many Unix-style systems, not only Linux. It is the "internet super-server daemon". See the description in Wikipedia:&lt;BR /&gt;&lt;A href="http://en.wikipedia.org/wiki/Inetd" target="_blank"&gt;http://en.wikipedia.org/wiki/Inetd&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Traditional Unix systems may still use "inetd", but many Linux distributions and some Unix systems already offer xinetd instead of inetd by default.&lt;BR /&gt;&lt;BR /&gt;xinetd allows you to restrict the source IP addresses and the number of connections allowed for each service you run through xinetd. These are very useful features for keeping your network services secure.&lt;BR /&gt;&lt;BR /&gt;xinetd can run many services at the same time, and its default configuration may include several traditional "debugging/testing" services (chargen, discard, echo, time, daytime): make sure you disable these services unless you really need them.&lt;BR /&gt;&lt;BR /&gt;Every network service can be a security risk - but xinetd is so simple, stable and widely used that it should be a pretty small risk when properly configured. I would be more concerned about NRPE: because it is normally used to gather information from the system, it may have to run more complex things, possibly even as root. Be very very careful in configuring NRPE.&lt;BR /&gt;&lt;BR /&gt;MK</description>
      <pubDate>Mon, 12 Jul 2010 12:13:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/xinet-question/m-p/4659716#M41510</guid>
      <dc:creator>Matti_Kurkela</dc:creator>
      <dc:date>2010-07-12T12:13:54Z</dc:date>
    </item>
    <item>
      <title>Re: xinet question</title>
      <link>https://community.hpe.com/t5/operating-system-linux/xinet-question/m-p/4659717#M41511</link>
      <description>You can restrict access by source ip address through xinetd if you have nrpe started through it (recommended rather than starting nrpe standalone).&lt;BR /&gt;Edit the file /etc/xinetd.d/nrpe&lt;BR /&gt;and add the only_from attribute for this service. To the right of the equals sign add IP addresses (or whole subnets) for clients' source IPs who are permitted to connect to nrpe.&lt;BR /&gt;There, of course, should be the IP address of your Nagios server among them.&lt;BR /&gt;After having made changes to the file send the xinetd PID a SIGHUP or execute "service xinetd reload".&lt;BR /&gt;Then enable a service check on your Nagios server that accesses your nrpe (probably you would have to define some nrpe check command on the nrpe host in e.g. /ect/nagios/nrpe.cfg first; but for any changes/additions to that file you don't need to reload xinetd like above because the nrpe daemon is spawned each time a connect request comes in anew by xinetd whereupon it reads the contents of nrpe.cfg)&lt;BR /&gt;</description>
      <pubDate>Tue, 13 Jul 2010 09:50:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/xinet-question/m-p/4659717#M41511</guid>
      <dc:creator>Ralph Grothe</dc:creator>
      <dc:date>2010-07-13T09:50:18Z</dc:date>
    </item>
  </channel>
</rss>

