Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 3 Mar 2003 10:48:15 -0500 (EST)
From:      Andre Guibert de Bruet <andy@siliconlandmark.com>
To:        Terry Lambert <tlambert2@mindspring.com>
Cc:        Wayne Barnes <currently@klentaq.com>, current@FreeBSD.ORG
Subject:   Re: can't sshd into box
Message-ID:  <20030303101317.P59207@alpha.siliconlandmark.com>
In-Reply-To: <3E6303EE.9516823A@mindspring.com>
References:  <20030303000955.A69139@klentaq.com> <20030303020915.B59207@alpha.siliconlandmark.com> <3E6303EE.9516823A@mindspring.com>

next in thread | previous in thread | raw e-mail | index | archive | help

On Sun, 2 Mar 2003, Terry Lambert wrote:

> Andre Guibert de Bruet wrote:
> > On Mon, 3 Mar 2003, Wayne Barnes wrote:
> > >     Immediately after rebooting, I get this:
> > >
> > > root@etaq3:/home/wayne>telnetd -debug
                             ^^^^^^^
> > > telnetd: bind: Address already in use
> > >
> > >     This doesn't happen on my other (working) system.
> > >     Could this be a clue to my problem?
> >
> > Telnetd is telling you that something else is listening on port 23. This
> > is most probably inetd. Do a 'killall inetd' then try that command.
>
> That's not only going to stop inetd from sitting on the port,
> it will probably also make telnet into the box start working,
> if it's related to the TCP wrappers (if he had modified his
> hosts.allow with the advice from a previous poster, he would
> not be having this problem, if that happens, so rather than
> posting his problem over and over again, maybe he should read
> the responses, and at least tell us if they worked?).
>
> Otherwise, another common culprit is ipfw; if he has the
> firewall enabled, the default is to block everything.
>
> Given that he got a connection, and that it was subsequently
> closed, though, rather than not getting a connection at all,
> it's a safe bet that it's the TCP wrappers, not the ipfw, that
> is causing the trouble.
>
> In which case, he should take the advice on the hosts.allow
> file contents that he was given earlier, and it will fix his
> problem...

Terry,

Part of the original message said the following:
<quote>
    I have installed 5.0 into a new Dell.  I have not set up anything
special yet (no firewall, no natd, etc.).
<...>
    Is there a new default connecton protection that I must turn off, or
something?  [/etc/hosts.allow  is the default setting, I see no answer
there.]
</quote>

If I recall correctly, we don't ship GENERIC with any firewalling options
enabled, so like you said, this is not likely to be a firewalling issue.

5.0R's /etc/hosts.allow shipped with something like the following at the
top of the file:
# Start by allowing everything (this prevents the rest of the file
# from working, so remove it when you need protection).
# The rules here work on a "First match wins" basis.
ALL : ALL : allow

If Wayne was trying to run 'telnetd -debug', would it not make sense for
him to kill inetd first (or at least reconfigure inetd.conf then hup it)
before running the daemon in debug mode at the command line?

Wayne: Can you successfully login using telnet over the loopback
interface?

Regards,

> Andre Guibert de Bruet | Enterprise Software Consultant >
> Silicon Landmark, LLC. | http://siliconlandmark.com/    >

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030303101317.P59207>