SSH2

R. McFarlane yarhl at mcfarlanecomputing.net
Tue Apr 5 20:51:27 UTC 2005


At 01:20 PM 4/5/2005, Burke, Thomas G., had this to say :

>All,
>
>         I've always thought this interesting, so I'll ask...  I thought 
> SSH(2) used hosts.deny & hosts.allow.  I find it interesting, then, that 
> I get so many (L)users trying to hack my SSH connection.  Any 
> thoughts?  Maybe I missed something in my setup?


         hosts.deny and hosts.allow are part of TCP wrappers. AFAIK, you 
have to build ssh with support for it, to use these files.

         The ssh "attacks" are part of a "script-kit" or worm trying to 
break in through weak passwords and/or older ssh (v1). These attacks are 
filling up the logs that is for sure. :(


Sincerely,

R. McFarlane

cross platform specialist
Mac - Linux - windows

McFarlane Computing
on-site/remote tutorials, support & training
(phone) 391-8972
(fax) 391-8972
(pager) 413-8577
(email) techie @ mcfarlanecomputing . net 




More information about the redhat-list mailing list