summaryrefslogtreecommitdiffstats
path: root/etc/inetd.conf
Commit message (Collapse)AuthorAgeFilesLines
* [DAIVD O'BRIEN's OPINION]obrien2002-11-121-6/+0
| | | | Head off what I think is an abuse of the TRB, and disable lukemftpd.
* Tweak the warning language.obrien2002-10-291-4/+4
|
* # WARNING: lukemftpd does not support PAM, MAC, per-class nologin files,rwatson2002-10-241-0/+5
| | | | | | | | | | | # or any login.conf resource limits or features; use it only if this is # appropriate for your environment. If you require these features, use # the regular FreeBSD ftpd below. Discourage users from using lukemftpd if they rely any of these standard FreeBSD features that are fully supported by our native ftpd. There may be other features that are not yet supported that I have not yet discovered.
* Correct comment. We use rpcbind now, not portmapgordon2002-08-091-1/+1
| | | | Submitted by: Mike Makonnen <makonnen@pacbell.net>
* Add an IPv6 sample line for tftpd.ume2002-04-111-0/+1
| | | | MFC after: 2 weeks
* Add a sample line for lukemftp.obrien2002-03-261-0/+1
|
* In the words of the submitter:dd2002-03-091-1/+1
| | | | | | | | | | Kerberized CVS (kserver) listens on the same port as normal CVS (pserver). In /etc/inetd.conf cvs kserver is disabled by default, but set to listen to the service port 'cvs' which doesn't exist. It should listen to 'cvspserver'. PR: 34317 Submitted by: Sean Chittenden <sean@chittenden.org>
* Fix a typo in swat example.maxim2002-02-131-1/+1
| | | | | | | Spotted by: Sergey Osokin <osa@freebsd.org.ru> Reviewed by: ru Approved by: ru MFC after: 1 week
* Chroot to /tftpboot for tftp.obrien2001-10-221-1/+1
| | | | Reviewed by: mdodd, peter
* Fix tabbing damage in last commit.obrien2001-10-101-3/+3
|
* Add commented-out/prototype entries for samba's swat configuration tool.jkh2001-10-031-1/+3
| | | | | Requested by: "William Wong" <willwong@samurai.com> MFC after: 1 week
* Move the uucpd entry down a bit to live with other optional serviceskris2001-10-011-1/+3
| | | | | | and correct the path to /usr/local as an example. Submitted by: ru
* Default to disabling all inetd.conf entries, in particular, telnetdrwatson2001-08-021-8/+13
| | | | | | | | | | | | | | | | | | | | | | | | | | and ftpd. This more conservative default reduces the exposure of freshly installed machines, which is especially valuable for machines that receive minimal further configuration before being put into production. Generally speaking, SSH has superseded the use of both telnet and ftp in many environments. In light of recent remotely exploitable security holes in both telnetd and ftpd, this choice retains flexibility (both telnetd and ftpd daemons remain installed and easily enableable) while protecting users who don't need the additional risk. This change brings our configuration into line with the majority of other UNIX vendors, including OpenBSD and NetBSD. To address the concerns of those requiring remote access via telnet from first install, changes will shortly be committed to sysinstall to provide the ability to edit inetd.conf during the installation process, allowing telnetd and ftp to be re-enabled during the installation process. While I'm at it, slightly improve commenting for inetd.conf so that it's more clear to users how to enable and disable services. Further commenting to indicate the functions of various columns would probably also be useful. Reviewed by: imp, chris, jake, nate, -arch, -stable
* Integrate the IPv6 entries with the rest of them to avoid things gettingpeter2001-03-301-32/+18
| | | | | | out of sync. A similar change was made by itojun on the OpenBSD tree a few weeks ago. This should stop people disabling one server and forgetting the other one (eg: ftp and/or telnet)
* Disable rsh and rlogin by default. ssh and telnet are still available forkris2000-10-041-4/+4
| | | | remote access on default installations.
* Turn fingerd OFF by default. Comparative essentials like telnetdjkh2000-10-031-2/+2
| | | | | | are bad enough, but finger is hardly a critical system service and it's traditionally been vulnerable to a variety of attacks; anybody remember RTFM and his worm?
* Fix a misspelling in the comments for tha IPv6 auth service and change themjhb2000-03-251-2/+2
| | | | to more closely resembles those in the IPv4 sction.
* Fix a typo. (s/eExample/Example/)shin2000-03-051-1/+1
| | | | Submitted by: Robert Muir <rmuir@looksharp.net>
* Add IPv6 services into inetd.conf.shin2000-02-271-0/+31
| | | | | | | | Also enable some standard IPv6 apps by default. These entries will be simply ignored on systems with no INET6 defined. Approved by: jkh Suggested by: peter
* Include a note below the example qmail entry that mentions that inetd isdbaker2000-01-101-1/+4
| | | | | no longer the correct way to have qmail handle incoming qmail smtp connections. Also provide a url to the correct method.
* Update the cvs pserver example so that it gives some more obvious cluespeter1999-12-261-3/+5
| | | | | | about the --allow-root switch. PR: 14463
* $Id$ -> $FreeBSD$peter1999-08-271-1/+1
|
* Add -n to the example and explanation of the internal auth service.green1999-07-241-3/+4
|
* Document the -o and -t options to the internal auth service and give ansheldonh1999-07-231-7/+4
| | | | | | | | | example of their usage in the sample config. Merge the two examples for the green internal auth service. This commit failed the first time around because Brian beat me to the punch on inetd.8 . I like my descriptions better and I'm pretty sure Brian won't mind.
* I think the last revision got lost here. Identd needs to be run as root,green1999-07-161-2/+2
| | | | | | at least for now. I relegated the getcred sysctls to only root, but if they're deemed to be "allowable" to export to users, I'll do so and revert this change.
* Document the new {auth,ident,tap} service and provide examples in thesheldonh1999-07-161-6/+13
| | | | | | configuration file. Requested by: green
* This is the working internal ident service. Turn it on by settinggreen1999-07-151-2/+3
| | | | | | the make variable REAL_IDENT, and ~/.fakeid support can be added with FAKEID set. Note that the default behavior is the same as the old behavior.
* Due to recent pidentd port changes (switch to sysctl), identd must beache1999-07-151-2/+2
| | | | runned as root again, not kmem:kmem
* comsat sandbox prevents biff/comsat from being able to print partialdillon1998-12-011-1/+3
| | | | | | mailbox contents. comsat instead simply prints that new mail is available. Add appropriate comment to inetd.conf but leave comsat in sandbox.
* Added group bind(53), added sandbox users tty(4), kmem(5), and bind(53),dillon1998-12-011-4/+4
| | | | | | | | | | adjustd inetd.conf to run comsat and ntalk from tty sandbox, and the (commented out) ident from the kmem sandbox. Note that it is necessary to give each group access it's own uid to prevent programs running under a single uid from being able to gdb or otherwise mess with other programs (with different group perms) running under the same uid.
* Add example for the internal "ident server".phk1998-11-041-1/+5
|
* Limit the fingerd daemon to:wosch1998-09-301-2/+2
| | | | | runs only 3 simultaneous fingerd processes and limit the connections-per-ip-per-minute to 10.
* Add Id keywordsbrian1998-09-021-0/+1
|
* Clean up the kerberos entries, and add example CVS entriesmarkm1998-08-151-4/+4
|
* MFC: sample qmail entry.hoek1998-07-181-0/+4
|
* Restore the Samba entries which were spammed when someone addedjkh1997-09-281-0/+6
| | | | the imap4 entry.
* Add commented out example entry for imap4ache1997-01-121-0/+4
|
* The kerberised network services should only be active in inetd.confpeter1996-11-101-4/+4
| | | | | | | | | | | | | | if kerberos is installed. So far as I'm aware, kerberos aware clients detect ECONNREFUSED and (if allowed) fall back to the non-kerberos servers. They do not know how to interpret messages such as "rlogind: unknown option -k". I believe Garrett also mentioned this. Unfortunately, this adds an extra step to bringing up kerberos. It also stops /var/log/messages getting quite so many useless (and confusing) error messages when somebody does a port scan on you.
* In the brave new world, that that does not make us strong, kills us.pst1996-10-021-28/+38
| | | | | | Turn OFF the "small servers" by default. FreeBSD systems should only serve actively used programs. Jewels like chargen and echo are too useful in attack scenarios.
* Add commented out example for bootpsphk1996-09-191-0/+1
|
* changed /etc/[daily,weekly,monthly] to not rotate the logfiles bygraichen1996-01-051-0/+2
| | | | | | | "hand", changed /etc/crontab to call /usr/sbin/newsyslog every hour (the entry was there before - but we haven't had any newsyslog until today :-) and changed /etc/inetd.conf to also contain (commentet out) entries for rpc.rquotad and rpc.sprayd (taken from NetBSD)
* Add /tftpboot as an argument to the commented-out example for tftp, sojoerg1995-12-231-1/+1
| | | | | people don't compromise their system by blindly un-commenting the entry.
* inetd.conf:gibbs1995-09-151-0/+1
| | | | | | | Add rkinit at 2108/tcp. services: Add rkinitd.
* Restore tabs in inetd lineache1995-07-291-1/+1
| | | | | Submitted by: Obtained from:
* Rename in.identd -> identd according recent ports renameache1995-07-271-1/+1
|
* Add ident (commented out)ache1995-04-081-0/+1
|
* Disable UDP echo, chargen, date, and daytime services.wollman1994-12-211-4/+4
|
* Uncomment uucpd by default, it is working and secure nowache1994-12-191-1/+1
|
* Change the example line for popper to point to /usr/local/libexec/popperats1994-11-181-1/+1
| | | | instead of /usr/local/etc/popper. The 2.0 installation installs it there.
* Secure fingerd by defaultpst1994-09-291-1/+1
|
OpenPOWER on IntegriCloud