If you can try turning off your firewall (even if it looks good for me), while testing,
/etc/init.d/iptables stop
regards,
Guillermo.
On 7/12/06,
Robert List <list06@abbacomm.net> wrote:
Did you check your logs to see what the error(s)s was/were? It will pretty
much tell you exactly what happened there.
Then of course I do this when I deal with inetd or more specifically in this
case xinetd... YMMV
netstat -a | more
then I would tailor some /etc/hosts.allow and /etc/hosts.deny files
#
# hosts.deny This file describes the names of the hosts which are
# *not* allowed to use the local INET services, as decided
# by the '/usr/sbin/tcpd' server.
#
# The portmap line is redundant, but it is left to remind you that
# the new secure portmap uses hosts.deny and hosts.allow. In particular
# you should know that NFS uses portmap!
ALL:ALL
And then
#
# hosts.allow This file describes the names of the hosts which are
# allowed to use the local INET services, as decided
# by the '/usr/sbin/tcpd' server.
#
# in.tftpd in.telnetd sshd
#
in.tftpd: someipaddressornetworkhere
what it sounds like is a SOURCE and/or destination ip address issue with the
firewall or hosts.allow and hosts.deny files.
- rh
--
Robert Hanson - Abba Communications
Computer & Internet Services
(509) 624-7159 - www.abbacomm.net
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos