Re: SSH2

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



At 01:20 PM 4/5/2005, Burke, Thomas G., had this to say :

All,

I've always thought this interesting, so I'll ask... I thought SSH(2) used hosts.deny & hosts.allow. I find it interesting, then, that I get so many (L)users trying to hack my SSH connection. Any thoughts? Maybe I missed something in my setup?


hosts.deny and hosts.allow are part of TCP wrappers. AFAIK, you have to build ssh with support for it, to use these files.

The ssh "attacks" are part of a "script-kit" or worm trying to break in through weak passwords and/or older ssh (v1). These attacks are filling up the logs that is for sure. :(


Sincerely,

R. McFarlane

cross platform specialist
Mac - Linux - windows

McFarlane Computing
on-site/remote tutorials, support & training
(phone) 391-8972
(fax) 391-8972
(pager) 413-8577
(email) techie @ mcfarlanecomputing . net


--
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux