Here is a solution: Create a rule in /etc/udev/rules.d: # Palm Handheld BUS="usb",SYSFS{serial}="PalmSN12345678",NAME="pilot"
You can either add it into 50-udev.rules or create 10-udev.rules.
Then create permissions inetc/udev/permissions.d: # Palm Handheld rw pilot*:root:usb:0666
Add this to either 50-udev.permissions or 10-udev.permissions
There is a good website on udev: http://www.reactivated.net/udevrules.php I had read through this web site. And had set up 10-udev.rules. But with no success. Also set debug but did not see anything being logged. It appears that udev_call is not working. Also with hotplug off the sync is alot smoother and does not stall my system. Do you actually see the ttyUSB1 being created and removed in /dev?
On Monday 21 March 2005 8:52 am, byroncoughlin@comcast.net wrote:
Here is a solution: Create a rule in /etc/udev/rules.d: # Palm Handheld BUS="usb",SYSFS{serial}="PalmSN12345678",NAME="pilot"
You can either add it into 50-udev.rules or create 10-udev.rules.
Then create permissions inetc/udev/permissions.d: # Palm Handheld rw pilot*:root:usb:0666
Add this to either 50-udev.permissions or 10-udev.permissions
There is a good website on udev: http://www.reactivated.net/udevrules.php
I had read through this web site. And had set up 10-udev.rules. But with no success. Also set debug but did not see anything being logged. It appears that udev_call is not working. Also with hotplug off the sync is alot smoother and does not stall my system. Do you actually see the ttyUSB1 being created and removed in /dev? Yes, /dev/ttyUSB[01] are created dynamically.
Two things you need to consider. First, add your user id to the uucp group since /dev/usb/ttyUSB[01] and /dev/ttyUSB[01] are also in uucp's group. Next, to test the hotsync try the dlpsh command: gaf@sauron:~> dlpsh -p /dev/usb/ttyUSB1 --interactive Listening to port: /dev/usb/ttyUSB1 Please press the HotSync button now... connected! Note that I used /dev/usb/ttyUSB1 not /dev/ttyUSB1 Another utility that is useful is usbview. This will show information about the connection. -- Jerry Feldman <gaf@blu.org> Boston Linux and Unix user group http://www.blu.org PGP key id:C5061EA9 PGP Key fingerprint:053C 73EC 3AC1 5C44 3E14 9245 FB00 3ED5 C506 1EA9
On Mon March 21 2005 8:52 am, byroncoughlin@comcast.net wrote: [snip]
Also with hotplug off the sync is alot smoother and does not stall my system. Do you actually see the ttyUSB1 being created and removed in /dev?
I have a Tungsten/W and it syncs fine - just can't import any info. from the Addressbook directly from 9.3, nor memos either way, etc. Kpilot is configured for it, but "nada!" Can you offer any good site to get into for setup? I don't use it as wireless. Thanks, Fred -- The only bug free software from MickySoft is still shrink-wrapped in their warehouse..."
Greetings, I'm trying to set up a firewall on a server which has BIND installed. I want to be able to slave domains off the BIND server that is installed on this box. However, whenever I try to get a DNS response from this box, I get the following in my /var/log/messages: Mar 21 10:10:22 life named[3662]: zone www.domain.com/IN: refresh: NODATA response from master xxx.xxx.xxx.xxx#53 Here's my iptables -L output: [root@server /]# iptables -L Chain INPUT (policy ACCEPT) target prot opt source destination RH-Firewall-1-INPUT all -- anywhere anywhere Chain FORWARD (policy ACCEPT) target prot opt source destination RH-Firewall-1-INPUT all -- anywhere anywhere Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain RH-Firewall-1-INPUT (2 references) target prot opt source destination ACCEPT all -- anywhere anywhere ACCEPT icmp -- anywhere anywhere icmp any ACCEPT ipv6-crypt-- anywhere anywhere ACCEPT ipv6-auth-- anywhere anywhere ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:imaps ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:pop3s ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:20000 ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:mysql ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:pop3 ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:9999 ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:webcache ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:10000 ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:postgres ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:https ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:ssh ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:smtp ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:http ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:ftp ACCEPT udp -- anywhere anywhere udp dpt:domain REJECT all -- anywhere anywhere reject-with icmp-host-prohibited (As you can probably tell, I copied a RedHat firewall config script here... it works fine with the exception of DNS.) Here's my iptables config file: # Firewall configuration written by redhat-config-securitylevel # Manual customization of this file is not recommended. *filter :INPUT ACCEPT [0:0] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [0:0] :RH-Firewall-1-INPUT - [0:0] -A INPUT -j RH-Firewall-1-INPUT -A FORWARD -j RH-Firewall-1-INPUT -A RH-Firewall-1-INPUT -i lo -j ACCEPT -A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT -A RH-Firewall-1-INPUT -p 50 -j ACCEPT -A RH-Firewall-1-INPUT -p 51 -j ACCEPT -A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 993 -j ACCEPT -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 995 -j ACCEPT -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 20000 -j ACCEPT -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 3306 -j ACCEPT -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 110 -j ACCEPT -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 9999 -j ACCEPT -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 8080 -j ACCEPT -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 10000 -j ACCEPT -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 5432 -j ACCEPT -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 443 -j ACCEPT -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 25 -j ACCEPT -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j ACCEPT -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 21 -j ACCEPT -A RH-Firewall-1-INPUT -p udp -i eth0 --destination-port 53 -j ACCEPT -A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited COMMIT I'm somewhat new to iptables and would appreciate any insite at all. Thanks for your help! -JM
participants (4)
-
byroncoughlin@comcast.net
-
Fred A. Miller
-
Jerry Feldman
-
Jordan Michaels