On Tue, 8 Mar 2005 20:58:42 -0500, Binand Sethumadhavan
<[EMAIL PROTECTED]> wrote:
> On Tue, 8 Mar 2005 19:11:40 +0530, Thaths <[EMAIL PROTECTED]> wrote:
> > > Just add the following line to your /etc/hosts.deny file :
> > > sshd : ALL EXCEPT LOCAL, 192.168.0.0/255.255.255.0
> >
> > Correct me if I am wrong, but won't this only work if sshd is being
> > launched through inetd instead of as a daemon?
> 
> On my RHEL systems:
> 
> [EMAIL PROTECTED] root]# ldd /usr/sbin/sshd
>        libwrap.so.0 => /usr/lib/libwrap.so.0 (0x00a50000)
>        [snip]
> [EMAIL PROTECTED] root]# rpm -qf /usr/lib/libwrap.so.0
> tcp_wrappers-7.6-34
> 
> sshd is compiled with tcpwrappers support, so it doesn't need to run
> from xinetd.
> 

I think even xinetd controlled services can be controlled by the
hosts.allow and hosts.deny files as long as they are compiled with
tcpwrappers support.

Eg: Telnet  - an xinetd based service - can be controlled using
hosts.deny[allow] file .

Ravi


-------------------------------------------------------
SF email is sponsored by - The IT Product Guide
Read honest & candid reviews on hundreds of IT Products from real users.
Discover which products truly live up to the hype. Start reading now.
http://ads.osdn.com/?ad_id=6595&alloc_id=14396&op=click
_______________________________________________
linux-india-help mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/linux-india-help

Reply via email to