Solved

TFTP

Posted on 2000-03-29
6
575 Views
Last Modified: 2010-04-21
What is a TFTP wrapper.  I will like a technical but easy to follow description as to how it works.

Please indicate sites where I can get information installing and downloading a good TFTP wrapper program.  For Either Linux and/or Unix.
0
Comment
Question by:problem
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 4

Expert Comment

by:Gtrist
ID: 2667259
Try the following:
man tftp
I am running SCO OS5.0.5 and it has the man page.
0
 
LVL 1

Expert Comment

by:dserna
ID: 2667380
I don't think that there is a dedicated tftp wrapper per se. But, there is a piece of software written by Wietse Venema called TCP Wrappers. They function like a firewall, meaning you can control who can or can't connect to your tftp service running on your machine. It also logs all attempts to connect to you tftp service. The way it works is that it's a small program that gets invoked when people connect to your tftp service. It decides if it will let the person use the tftp service or not based on a list that you create that has in it who can or can't connect. The little program also logs all connections. If you have a need for the tftp service to be active on your system, I highly recommend that you install tcp_wrappers on your machine. It's not only for tftp but also for telnet, ftp, etc. You can find the source code for tcp_wrappers and info about it here:

ftp://ftp.porcupine.org/pub/security/index.html

There are also a few free firewall packages out there which can give you the power to filter tcp.icmp,udp traffic as well. Here are a few links to them:

IPChains(Mainly for Linux):
http://www.rustcorp.com/linux/ipchains/

IPFilter :

http://coombs.anu.edu.au/~avalon/

Hope that helps.



0
 

Author Comment

by:problem
ID: 2669935
deserna.. Your response was helpful, but I needed a nuts and bolts explanation up-front as to how the wrapper works.

What kind of configuration is need with the Unix System Files/ what files re affected. etc. etc.
0
Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

 
LVL 5

Expert Comment

by:n0thing
ID: 2671509
1- You'll have to download TCP wrapper from the above link and install it by doing a configure;make;make install; after untaring it.
2- Second you'll have to edit your /etc/inetd.conf and
add the following:
tftp      dgram      udp      wait      root      /usr/sbin/tcpd      in.tftpd
3- Edit /etc/hosts.allow and put in the IP address of the hosts you want to have access to your tftp server.
Example:
tftp:hostname1,hostname2,123.4.4.4

A wrapper is in short a program which does the validation  your source address against a list of allowed addresses prior to letting you access the services on ones system. So basicly, if you only hostA to access your system, HostB cannot connect to it to use the service. It's another layer of security sitting on top of the regular user/password authentication process.
You could also use the same TCP wrapper for other services such as telnet, ftp ... You could consult the manual for more details. It's too long to explain the nuts&bolts here.


0
 

Author Comment

by:problem
ID: 2684662
Need more information/explanation as to the TCP wrapper .. examples will help..
0
 
LVL 2

Accepted Solution

by:
festive earned 250 total points
ID: 2685744
The TCP WRAPPER program as suggested above is a program that you use to replace your existing service handler for a particular service.

Some examples of these are in.tfptd, in.telnetd, in.rlogind.

The way it works is by masquerading as the service that you replace and using two configuration files (hosts.allow and hosts.deny) to regulate who can connect to the service.

A typical example of this use (which can be implemented on some/most of the services in your inetd.conf file is to "WRAP" a service like tftp (as discussed above).

The impact that this will have (after you configure your /etc/hosts.allow and /etc/hosts.deny is to restrict access to those services (ie the ones that you have configured) to only IP addresses/hosts mentioned in the /etc/hosts.allow file.

I believe that the line mentioned (for the hosts.allow file should read "in.tftpd:<ipaddress>,<orhostname>"
(note the in.tftpd).
0

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

My previous tech tip, Installing the Solaris OS From the Flash Archive On a Tape (http://www.experts-exchange.com/articles/OS/Unix/Solaris/Installing-the-Solaris-OS-From-the-Flash-Archive-on-a-Tape.html), discussed installing the Solaris Operating S…
Installing FreeBSD… FreeBSD is a darling of an operating system. The stability and usability make it a clear choice for servers and desktops (for the cunning). Savvy?  The Ports collection makes available every popular FOSS application and packag…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

634 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question