Re: restricting ssh access

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Monday 21 April 2003 06:19 pm, Aaron Konstam wrote:
> On Sat, Apr 19, 2003 at 10:14:23PM +0200, Jochen K?chelin wrote:
> > what do i have to enter
> > in hosts.allow to allow ssh access only
> > from a certain domain?
> >
> > or is there another more secure way to
> > restrict access to connect over ssh?
>
> Semms to me the folloowing line would work:
> sshd: <domain identity>
> domain would be like: 191.135.

But would require an entry in /etc/hosts.deny to forbid other connections.

I use both. To deny everything not allowed in /etc/hosts.allow:
# cat /etc/hosts.deny
ALL: ALL

Allow specific connections:

# cat /etc/hosts.allow
ALL: 127.0.0.1
sshd: xxx.xxx.xxx.xxx

- -- 
- -Michael

pgp key:  http://www.tuxfan.homeip.net:8080/gpgkey.txt
Red Hat Linux 7.{2,3}|8.0 in 8M of RAM: http://www.rule-project.org/
- --
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE+pKMEn/07WoAb/SsRAqDLAJ9tSO8eG5SDSQq+zhe8MGReimla9ACfWdSq
ostV7IE5+4DAjHLUqU45PZY=
=pdUv
-----END PGP SIGNATURE-----





[Index of Archives]     [Fedora Users]     [Centos Users]     [Kernel Development]     [Red Hat Install]     [Red Hat Watch]     [Red Hat Development]     [Red Hat Phoebe Beta]     [Yosemite Forum]     [Fedora Discussion]     [Gimp]     [Stuff]     [Yosemite News]

  Powered by Linux