All I have in my hosts.deny is ALL: ALL. Then I let only the things I want through with hosts.allow. I was under the impression this was the most secure way to do it. Andy Zbikowski wrote: > Hmmm, betcha you have a ALL:Parinoid entry in /etc/hosts.deny. With that > option, you won't be able to access just about everything if your ip and > hostname don't matchup/resolve. The soultion is, fix your host name. =) > > You could add a ALL: IP Range of your ISP to hosts.allow, or if your on > static IP add a entry to /etc/hosts on the server machine. If your going > from an internal host to an internal host, get bind working to resolve > names for your internal network or add an entry in /etc/hosts for every > machine. > > -- > \\\|/// > \\ - - // > ( @ @ ) > ----oOOo--(_)-oOOo-------------------------------------------- > Andy Zbikowski, Sys Admin | (WEB) http://www.ltiflex.com > LTI Flexible Products, Inc. | (PH) 763-428-9119 (EX) 132 > 21801 Industrial Blvd | (FX) 763-428-9126 > Rogers, MN 55374 | (PCS) 612-306-6055 > ---------------Ooooo------------------------------------------ > ( ) > ooooO ) / > ( ) (_/ > \ ( > \_) > > ------------------------------------------------------------------------ > --------------------------------------------------------------------- > To unsubscribe, e-mail: tclug-list-unsubscribe at mn-linux.org > For additional commands, e-mail: tclug-list-help at mn-linux.org --------------------------------------------------------------------- To unsubscribe, e-mail: tclug-list-unsubscribe at mn-linux.org For additional commands, e-mail: tclug-list-help at mn-linux.org