Solved

TFTP

Posted on 2000-03-29
6
569 Views
Last Modified: 2010-04-21
What is a TFTP wrapper.  I will like a technical but easy to follow description as to how it works.

Please indicate sites where I can get information installing and downloading a good TFTP wrapper program.  For Either Linux and/or Unix.
0
Comment
Question by:problem
6 Comments
 
LVL 4

Expert Comment

by:Gtrist
ID: 2667259
Try the following:
man tftp
I am running SCO OS5.0.5 and it has the man page.
0
 
LVL 1

Expert Comment

by:dserna
ID: 2667380
I don't think that there is a dedicated tftp wrapper per se. But, there is a piece of software written by Wietse Venema called TCP Wrappers. They function like a firewall, meaning you can control who can or can't connect to your tftp service running on your machine. It also logs all attempts to connect to you tftp service. The way it works is that it's a small program that gets invoked when people connect to your tftp service. It decides if it will let the person use the tftp service or not based on a list that you create that has in it who can or can't connect. The little program also logs all connections. If you have a need for the tftp service to be active on your system, I highly recommend that you install tcp_wrappers on your machine. It's not only for tftp but also for telnet, ftp, etc. You can find the source code for tcp_wrappers and info about it here:

ftp://ftp.porcupine.org/pub/security/index.html

There are also a few free firewall packages out there which can give you the power to filter tcp.icmp,udp traffic as well. Here are a few links to them:

IPChains(Mainly for Linux):
http://www.rustcorp.com/linux/ipchains/

IPFilter :

http://coombs.anu.edu.au/~avalon/

Hope that helps.



0
 

Author Comment

by:problem
ID: 2669935
deserna.. Your response was helpful, but I needed a nuts and bolts explanation up-front as to how the wrapper works.

What kind of configuration is need with the Unix System Files/ what files re affected. etc. etc.
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 5

Expert Comment

by:n0thing
ID: 2671509
1- You'll have to download TCP wrapper from the above link and install it by doing a configure;make;make install; after untaring it.
2- Second you'll have to edit your /etc/inetd.conf and
add the following:
tftp      dgram      udp      wait      root      /usr/sbin/tcpd      in.tftpd
3- Edit /etc/hosts.allow and put in the IP address of the hosts you want to have access to your tftp server.
Example:
tftp:hostname1,hostname2,123.4.4.4

A wrapper is in short a program which does the validation  your source address against a list of allowed addresses prior to letting you access the services on ones system. So basicly, if you only hostA to access your system, HostB cannot connect to it to use the service. It's another layer of security sitting on top of the regular user/password authentication process.
You could also use the same TCP wrapper for other services such as telnet, ftp ... You could consult the manual for more details. It's too long to explain the nuts&bolts here.


0
 

Author Comment

by:problem
ID: 2684662
Need more information/explanation as to the TCP wrapper .. examples will help..
0
 
LVL 2

Accepted Solution

by:
festive earned 250 total points
ID: 2685744
The TCP WRAPPER program as suggested above is a program that you use to replace your existing service handler for a particular service.

Some examples of these are in.tfptd, in.telnetd, in.rlogind.

The way it works is by masquerading as the service that you replace and using two configuration files (hosts.allow and hosts.deny) to regulate who can connect to the service.

A typical example of this use (which can be implemented on some/most of the services in your inetd.conf file is to "WRAP" a service like tftp (as discussed above).

The impact that this will have (after you configure your /etc/hosts.allow and /etc/hosts.deny is to restrict access to those services (ie the ones that you have configured) to only IP addresses/hosts mentioned in the /etc/hosts.allow file.

I believe that the line mentioned (for the hosts.allow file should read "in.tftpd:<ipaddress>,<orhostname>"
(note the in.tftpd).
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Host issue and need to move VM's 2 245
check unix curl command return value 7 84
Linux hostname change 2 56
Writing a UNIX script menu allowing for multiple options. 5 34
Introduction Regular patching is part of a system administrator's tasks. However, many patches require that the system be in single-user mode before they can be installed. A cluster patch in particular can take quite a while to apply if the machine…
Java performance on Solaris - Managing CPUs There are various resource controls in operating system which directly/indirectly influence the performance of application. one of the most important resource controls is "CPU".   In a multithreaded…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now