info-cvs
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: help on pserver connection


From: p
Subject: Re: help on pserver connection
Date: Thu, 9 Oct 2003 21:02:58 -0700
User-agent: Mutt/1.5.4i

On Fri 10 Oct 03, 11:43 AM, kent emia <address@hidden> said:
> hello to all.. ... as of the moment i succesfully setup a winNT CVS
> server and its not that hard at all. workstations can login/logout
> checkin/checkout files
> 
> but since we are switching all workstations to linux, i want to try it
> in linux. im having hard time seting up a CVS SERVER in a redhat9
> environment. 
> 
> im encountering this problem:
> 'cvs [login aborted]: reading from server: Connection reset by peer'
> 
> as i've read
> http://www.cvshome.org/docs/manual/cvs-1.11.7/cvs_21.html#SEC184 it says
> that i am missing pserver in my 'inetd.conf' but i have it right there
> this is my 'inetd.conf' file
> 
> cvspserver stream tcp nowait root /usr/local/bin/cvs cvs
> --allow-root=/repo pserver
> 
> that is in one line
> 
> running 'nmap localhost' on the server i can see 
> '2401/tcp   open        cvspserver' in it.. 
> 
> im wondering what else could be wrong....

hi kent,

i'm a cvs newbie, but here are some ideas:

1. anytime you edit /etc/inetd.conf, you need to restart the inetd service
   by doing:

      /etc/init.d/inetd restart

   i thought redhat used xinetd, though (i'm exclusively debian).


2. try using tcpdump to make sure packets are being received:

   tcpdump -i eth0 tcp port 2401

3. don't forget your log files.  i'm not sure where your syslogd will
   put the logs on redhat, so you can just grep for them:

   # cd /var/log
   # grep cvs * | less

   there *should* be something in there.

4. look in /etc/hosts.deny and /etc/hosts.allow.  many people put
   "ALL: ALL" in /etc/hosts.deny and only "allow" services on a host by
   host (or network by network) basis.  this is the most secure way to
   firewall: shut everything off and then turn stuff on little by
   little, rather than allowing everything and walling things off
   service by service.

hth,
pete

-- 
GPG Instructions: http://www.dirac.org/linux/gpg
GPG Fingerprint: B9F1 6CF3 47C4 7CD8 D33E 70A9 A3B9 1945 67EA 951D




reply via email to

[Prev in Thread] Current Thread [Next in Thread]