On Wed, 29 Sep 2004, Charles Leeds wrote: > > 1) Daemons that use xinetd are protected by hosts.deny and hosts.allow, > and therefore can use them > 2) The SSH RPM that ships with RHEL does _NOT_ use xinetd, and cannot > use hosts.allow and hosts.deny out of the box > 3) SSH can be compiled/configured to use xinetd #2 would be a big departure from previous Red Hat compilations of OpenSSH, which have been making use of tcpwrappers since, at least, the 7.x series. Have you actually tried it, yet? > Reuben D. Budiardja wrote: > > >On Wednesday 29 September 2004 11:04, Margaret Doll wrote: > > > > > >>Use /etc/hosts.deny and /etc/hosts.allow > >> > >> > > > >hosts.allow and hosts.deny control access to other servicess too beside SSH. > >they also allow you to use domain name to allow access. "man hosts.allow" and > >'man hosts.deny'. > > > >RDB > > > > > > > > -- Mike Burger http://www.bubbanfriends.org Visit the Dog Pound II BBS telnet://dogpound2.citadel.org or http://dogpound2.citadel.org To be notified of updates to the web site, visit http://www.bubbanfriends.org/mailman/listinfo/site-update, or send a message to: site-update-request@xxxxxxxxxxxxxxxxx with a message of: subscribe -- redhat-list mailing list unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe https://www.redhat.com/mailman/listinfo/redhat-list