All, I've always thought this interesting, so I'll ask... I thought SSH(2) used hosts.deny & hosts.allow. I find it interesting, then, that I get so many (L)users trying to hack my SSH connection. Any thoughts? Maybe I missed something in my setup? -Tom -- redhat-list mailing list unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe https://www.redhat.com/mailman/listinfo/redhat-list