Date: Fri, 12 May 2006 18:15:15 +0100 From: Daniel Bye <freebsd-questions@slightlystrange.org> To: FreeBSD Questions <freebsd-questions@freebsd.org> Subject: Re: Pros and Cons of running under inetd.... Message-ID: <20060512171515.GC34035@catflap.slightlystrange.org> In-Reply-To: <4464B95D.1040702@computer.org>
index | next in thread | previous in thread | raw e-mail
[-- Attachment #1 --] On Fri, May 12, 2006 at 11:35:41AM -0500, Eric Schuele wrote: > Hello, > > I run sshd and ftpd on my laptop. I generally start them via: > sshd_enable="YES" > ftpd_enable="YES" > in my rc.conf. > > What are the pros/cons of running them via inetd? > > This is in no way a high load or production machine. Just my laptop > that I need access to from time to time. > > The one pro I have noticed (which is rather important to me) is that > ftpd does not heed hosts.allow directives when NOT run via inetd. Am I > correct in this? I prefer to use tcpwrappers to further protect my sshd > and ftpd. I generally keep ftpd firewalled off from the world and when > someone needs to (anonymous) ftp something to me I open the firewall. > But it would be nice to allow only their IP using hosts.allow (as I just > enable/disable a generic ruleset in ipfw). So should I forget to > disable the ruleset in ipfw then I am not open all day till I reboot. When sshd starts, it needs to generate keys and set up its cryptographic environment, so you will notice a bit of lag before getting a login prompt. This may or may not mean anything to you, depending on how beefy your laptop is. Check man sshd for the -i option. sshd should, by default, be compiled with tcpwrappers support anyway. You can test whether this is the case by putting something like this at the top of your hosts.allow: sshd : 127.0.0.1 : deny and then try connecting on the loopback interface. If you see `refused connect from localhost' in your /var/log/auth.log, then your sshd uses hosts.allow and running it from inetd won't give you any benefit. I don't know about ftpd, as I don't use it. Dan -- Daniel Bye PGP Key: http://www.slightlystrange.org/pgpkey-dan.asc PGP Key fingerprint: D349 B109 0EB8 2554 4D75 B79A 8B17 F97C 1622 166A _ ASCII ribbon campaign ( ) - against HTML, vCards and X - proprietary attachments in e-mail / \ [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.3 (FreeBSD) iD8DBQFEZMKiixf5fBYiFmoRAunjAJ4yI2t7asNt6x0LzmODryxsh6hUKwCdGXyK DDc8cF18SQTicBkosY2aW4Q= =A1Ol -----END PGP SIGNATURE-----help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20060512171515.GC34035>
