On Sat, 2008-01-12 at 16:07 +0100, Frank Büttner wrote: > William L. Maltby schrieb: > snip > > these files need to have the correct contents. > > > > E.g. mine have > > > > # hosts.allow This file describes the names of the hosts which are > > # allowed to use the local INET services, as decided > > # by the '/usr/sbin/tcpd' server. > > # > > ALL: 192.168.2. 127.0.0. > > > > > > # hosts.deny This file describes the names of the hosts which are > > # *not* allowed to use the local INET services, as decided > > # by the '/usr/sbin/tcpd' server. > > # > > # The portmap line is redundant, but it is left to remind you that > > # the new secure portmap uses hosts.deny and hosts.allow. In > > # particular you should know that NFS uses portmap! > > ALL: ALL > > > >> <snip sig stuff> > > > > HTH > This both files are empty. > > After long try I found the problem.:) > I was an dead name server entry at /etc/resolv.conf. > After remove it, nfs works how it shut do. That is good to hear. If you have any exposure to the 'Net or some untrusted users on you local net, it would be good to have some rules in the /etc/hosts.{allow | deny}. > <snip sig stuff> -- Bill _______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx http://lists.centos.org/mailman/listinfo/centos