Re: blocking ip's with proftpdFrom: Kutulu (email@example.com)
- Previous message: John Stauffacher: "Re: kazaa,gnutella,aimster blocks"
- In reply to: Kaos: "blocking ip's with proftpd"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
Message-ID: <firstname.lastname@example.org> From: "Kutulu" <email@example.com> To: "Kaos" <firstname.lastname@example.org>, <email@example.com> Subject: Re: blocking ip's with proftpd Date: Fri, 12 Oct 2001 06:53:24 -0400
From: "Kaos" <firstname.lastname@example.org>
Sent: Friday, October 12, 2001 12:25 AM
> Can anyone shed some light on how I can deny ip's with proftpd?
> I cant find anything on the web......
Also, if you are runnnig protftpd from your inetd superserver, you can use
the tcpwrappers support within tcpd. Find the line containing your ftp
entry (should begin "ftp stream tcp...", and replace the call to
/usr/sbin/proftpd with /usr/sbin/tcpd, like:
ftp stream tcp nowait root /usr/sbin/tcpd proftpd
There should be other similar entries that call tcpd for you to mimic. Also
make sure proftpd is in the directory where tcpd expects to find it's
daemons, usually /usr/sbin or /usr/libexec. Again, find an existing
tcpwrapped server and check that proftpd is in the same directory, or
symlink it. Once that's done you can use the hosts.allow and hosts.deny
files as normal.