RE: SSH Security

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



From: redhat-list-bounces@xxxxxxxxxx [mailto:redhat-list-bounces@xxxxxxxxxx]
On Behalf Of Alexey Fadyushin
Sent: Thursday, September 30, 2004 10:02 AM
To: ddelao@xxxxxxxxx; General Red Hat Linux discussion list
Subject: Re: SSH Security

You should use option AllowUsers in file /etc/ssh/sshd_config. This option
lists the names of users which are allowed to connect via ssh and host 
from which them are allowed to connect.  For example:
AllowUsers: *@192.168.11.1
should allow any user to connect from host 192.168.11.1. Connections 
from other addresses willn ot succeed.

Also you can use files /etc/hosts.allow and/or /etc/hosts.deny which 
define restrictions for connections to daemons which use libwrap (SSH 
does use it).

It is also possible to filter incoming connections to port ssh with 
iptables, so the packets from any hosts not allowed to connect to SSH 
will be dropped.

Alexey Fadyushin.
Brainbench MVP for Linux
http://www.brainbench.com

Darryl W. DeLao Jr. wrote:
> How can I tell the SSH server to only allow certain IP's the ability to
> login?


AllowUsers is a list of local user accounts allowd to ssh in.
AllowUsers: username1 username2 username3

The option you are looking for:
ListenAddress ###.###.###.###:port

Both supported using protocol 2


HTH




-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux