On Wed, 2006-06-14 at 15:00 -0400, William L. Maltby wrote: > On Wed, 2006-06-14 at 20:22 +0200, M. Fioretti wrote: > > On Wed, Jun 14, 2006 12:38:51 PM -0500, Les Mikesell > > (lesmikesell@xxxxxxxxx) wrote: > > > > > On Wed, 2006-06-14 at 18:56 +0200, M. Fioretti wrote: > > > > > > > I've read on several howtos that one way to make ssh more secure, > > > > <snip> P.S. Also, if you change the SSH port from 22 to 459 (but better pick one outside the reserved range I think) on the target machine so that something like ssh -p 459 ... is needed to connect, then all the nodes trying to penetrate are stymied. From rom "man ssh", /etc/ssh/sshrc might be useful for part of what you want and "man sshd" might have something in the "command=" and "from="pattern-list" sections that is useful. > <snip sig stuff> -- Bill
Attachment:
signature.asc
Description: This is a digitally signed message part
_______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx http://lists.centos.org/mailman/listinfo/centos