Re: SSH Security

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 29 Sep 2004, Charles Leeds wrote:

> 
> 1) Daemons that use xinetd are protected by hosts.deny and hosts.allow, 
> and therefore can use them
> 2) The SSH RPM that ships with RHEL does _NOT_ use xinetd, and cannot 
> use hosts.allow and hosts.deny out of the box
> 3) SSH can be compiled/configured to use xinetd

#2 would be a big departure from previous Red Hat compilations of OpenSSH, 
which have been making use of tcpwrappers since, at least, the 7.x series.

Have you actually tried it, yet?

> Reuben D. Budiardja wrote:
> 
> >On Wednesday 29 September 2004 11:04, Margaret Doll wrote:
> >  
> >
> >>Use /etc/hosts.deny and /etc/hosts.allow
> >>    
> >>
> >
> >hosts.allow and hosts.deny control access to other servicess too beside SSH. 
> >they also allow you to use domain name to allow access. "man hosts.allow" and 
> >'man hosts.deny'.
> >
> >RDB
> >
> >  
> >
> 
> 

-- 
Mike Burger
http://www.bubbanfriends.org

Visit the Dog Pound II BBS
telnet://dogpound2.citadel.org or http://dogpound2.citadel.org

To be notified of updates to the web site, visit 
http://www.bubbanfriends.org/mailman/listinfo/site-update, or send a 
message to:

site-update-request@xxxxxxxxxxxxxxxxx

with a message of: 

subscribe

-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux