You could start the ssh server on that machine with -vvv to get a
detailled, verbose logging. That does not always lead to entries making
clear what happens, but to entries you can use for googling (or asking
here).
I would also have a look at DNS - compare forward and reverse lookups (are
th
Jay Leafey wrote:
Clint Dilks wrote:
Hi People
I am setting up some systems with ssh public keys and as part of this
I am using the from directive inside .ssh/authorized_keys. Currently
I am using the IP address to control the source. eg from="10.0.0.1"
but on one CentOS 4 System that is u
Clint Dilks wrote:
Hi People
I am setting up some systems with ssh public keys and as part of this I
am using the from directive inside .ssh/authorized_keys. Currently I am
using the IP address to control the source. eg from="10.0.0.1" but on
one CentOS 4 System that is up to date this will
Hi People
I am setting up some systems with ssh public keys and as part of this I
am using the from directive inside .ssh/authorized_keys. Currently I am
using the IP address to control the source. eg from="10.0.0.1" but on
one CentOS 4 System that is up to date this will only work if I repl
4 matches
Mail list logo