On Sat, 1 Jan 2000, Todd A. Jacobs wrote:

> Next, upgrade your version of SSH to one that isn't vulnerable to buffer
> overflows, change your passwords, and make sure that SSH is compiled to
> run from inetd. It's much slower that way, but by limiting SSH sessions to
> systems defined only in your hosts.allow file will add a further layer of
> protection for you.

No need to do this, ssh can be compiled to use libwrap
(/etc/hosts.allow,deny). The rpms generally are created with this option,
if you compile from source you need to include a flag to configure.


Bill Carlson
------------
Systems Programmer    [EMAIL PROTECTED]    |  Opinions are mine,
Virtual Hospital      http://www.vh.org/        |  not my employer's.
University of Iowa Hospitals and Clinics        |



-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to