SSH Security
Mike Burger
mburger at bubbanfriends.org
Wed Sep 29 21:01:04 UTC 2004
On Wed, 29 Sep 2004, Charles Leeds wrote:
>
> 1) Daemons that use xinetd are protected by hosts.deny and hosts.allow,
> and therefore can use them
> 2) The SSH RPM that ships with RHEL does _NOT_ use xinetd, and cannot
> use hosts.allow and hosts.deny out of the box
> 3) SSH can be compiled/configured to use xinetd
#2 would be a big departure from previous Red Hat compilations of OpenSSH,
which have been making use of tcpwrappers since, at least, the 7.x series.
Have you actually tried it, yet?
> Reuben D. Budiardja wrote:
>
> >On Wednesday 29 September 2004 11:04, Margaret Doll wrote:
> >
> >
> >>Use /etc/hosts.deny and /etc/hosts.allow
> >>
> >>
> >
> >hosts.allow and hosts.deny control access to other servicess too beside SSH.
> >they also allow you to use domain name to allow access. "man hosts.allow" and
> >'man hosts.deny'.
> >
> >RDB
> >
> >
> >
>
>
--
Mike Burger
http://www.bubbanfriends.org
Visit the Dog Pound II BBS
telnet://dogpound2.citadel.org or http://dogpound2.citadel.org
To be notified of updates to the web site, visit
http://www.bubbanfriends.org/mailman/listinfo/site-update, or send a
message to:
site-update-request at bubbanfriends.org
with a message of:
subscribe
More information about the redhat-list
mailing list