RE: Blackhole

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



In fact, get away from ssh1 - it has some well-known vulnerabilities, that AFAIK, no one has fixed.  Got to ssh2.  See www.ssh.org.
 
    -Tom

-----Original Message-----
From: redhat-list-bounces@xxxxxxxxxx [mailto:redhat-list-bounces@xxxxxxxxxx]On Behalf Of Chris Kenward
Sent: Monday, April 11, 2005 2:20 PM
To: 'General Red Hat Linux discussion list'
Subject: RE: Blackhole



Hi Reuben 

> 2. Run several rootkit detection. Rookit hunter ( http://www.rootkit.nl/) 
> and chkrootkit ( http://www.chkrootkit.org/) are two commons program for 
> rootkit detection. 

Have now used therootkit as well... Impressive!! This is one of the items it 
came up with... How do I change SSH so that access directly as root is NOT 
allowed? 

* Check: SSH 
   Searching for sshd_config... 
   Found /etc/ssh/sshd_config 
   Checking for allowed root login... 
   Watch out Root login possible. Possible risk! 

Regards 
Chris 


-- 
redhat-list mailing list 
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe 
https://www.redhat.com/mailman/listinfo/redhat-list 

-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subjecthttps://www.redhat.com/mailman/listinfo/redhat-list


[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux