like I said it was perms, allow yer inet supplier and deny others, google on tcp wrappers to get and history and usage of why those files are an important part of your security,
thanx,
bill