Symptoms:
The first incoming network connection from vsftpd after loading kernel module cannot be controlled even though ftp is defined as TCP or HOST rule.
Cause:
vsftpd is listening for incoming ftp connections via the accept system call. This is a blocking operation until a client is attempting to connect. If vsftpd is blocking in the accept system call before CA Privileged Identity Manager (PIM) startup, then it does not get to PIM syscall interception. Therefore, an incoming ftp connection will not be caught or processed by PIM. After vsftpd processes the first ftp connection, it calls accept system call again to wait for more ftp connections. This time, PIM will intercept the accept system call and all subsequent ftp connections will be processed by PIM. This occurs on the platform where streams is not used (Linux and AIX).
Resolution:
Here are three workarounds for this:
The workaround #3 of tripAccept execution can be controlled by SEOS_syscall.call_tripAccept_from_seload token in seos.ini and also specialpgm for tripAccept is configured by default now.