RE: SSH2

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Certainly, I remeber it worked with ssh1...  I got my ssh2 from ssh.org (.com?)...  Maybe I'll go through my compile options & see if I can find it in the makefile.
 
    -Tom

-----Original Message-----
From: redhat-list-bounces@xxxxxxxxxx [mailto:redhat-list-bounces@xxxxxxxxxx]On Behalf Of R. McFarlane
Sent: Tuesday, April 05, 2005 4:51 PM
To: General Red Hat Linux discussion list
Subject: Re: SSH2



At 01:20 PM 4/5/2005, Burke, Thomas G., had this to say : 

>All, 
> 
>         I've always thought this interesting, so I'll ask...  I thought 
> SSH(2) used hosts.deny & hosts.allow.  I find it interesting, then, that 
> I get so many (L)users trying to hack my SSH connection.  Any 
> thoughts?  Maybe I missed something in my setup? 


         hosts.deny and hosts.allow are part of TCP wrappers. AFAIK, you 
have to build ssh with support for it, to use these files. 

         The ssh "attacks" are part of a "script-kit" or worm trying to 
break in through weak passwords and/or older ssh (v1). These attacks are 
filling up the logs that is for sure. :( 


Sincerely, 

R. McFarlane 

cross platform specialist 
Mac - Linux - windows 

McFarlane Computing 
on-site/remote tutorials, support & training 
(phone) 391-8972 
(fax) 391-8972 
(pager) 413-8577 
(email) techie @ mcfarlanecomputing . net 

-- 
redhat-list mailing list 
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe 
https://www.redhat.com/mailman/listinfo/redhat-list 

-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subjecthttps://www.redhat.com/mailman/listinfo/redhat-list


[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux