On Tue, 8 Mar 2005 20:58:42 -0500, Binand Sethumadhavan <[EMAIL PROTECTED]> wrote: > On Tue, 8 Mar 2005 19:11:40 +0530, Thaths <[EMAIL PROTECTED]> wrote: > > > Just add the following line to your /etc/hosts.deny file : > > > sshd : ALL EXCEPT LOCAL, 192.168.0.0/255.255.255.0 > > > > Correct me if I am wrong, but won't this only work if sshd is being > > launched through inetd instead of as a daemon? > > On my RHEL systems: > > [EMAIL PROTECTED] root]# ldd /usr/sbin/sshd > libwrap.so.0 => /usr/lib/libwrap.so.0 (0x00a50000) > [snip] > [EMAIL PROTECTED] root]# rpm -qf /usr/lib/libwrap.so.0 > tcp_wrappers-7.6-34 > > sshd is compiled with tcpwrappers support, so it doesn't need to run > from xinetd. >
I think even xinetd controlled services can be controlled by the hosts.allow and hosts.deny files as long as they are compiled with tcpwrappers support. Eg: Telnet - an xinetd based service - can be controlled using hosts.deny[allow] file . Ravi ------------------------------------------------------- SF email is sponsored by - The IT Product Guide Read honest & candid reviews on hundreds of IT Products from real users. Discover which products truly live up to the hype. Start reading now. http://ads.osdn.com/?ad_id=6595&alloc_id=14396&op=click _______________________________________________ linux-india-help mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/linux-india-help
